It1-FolioViews-HitpMcs
senso-concept-Mcs

Mcsh-creation:: {2025-09-15}

overview of It1

description::
it.nfo is part of it.nfo.

name::
* McsEngl.it.nfo,

FvMcs.tech.INFORMATION-(it)

NAME

name::
* McsEngl.conceptIt0,
* McsEngl.tech.INFORMATION-(it)@cptIt,
* McsEngl.FvMcs.tech.INFORMATION-(it)@cptIt,
* McsEngl.data-technology@cptIt0, {2007-12-15}
* McsEngl.data-tech@cptIt0, {2011-08-30}
* McsEngl.datatech@cptIt0, {2011-08-29}
* McsEngl.information-technology@cptIt0,
* McsEngl.tchInf@cptIt,
* McsEngl.techInfo@cptIt0, {2014-01-18} {2011-09-08}
* McsEngl.techInf@cptIt0, {2012-11-18}
* McsEngl.infotech@cptIt0,
* McsEngl.it@cptIt0,
* McsEngl.tech.info@cptIt0,
* McsEngl.techData@cptIt0, {2011-09-02}
====== lagoGreek:
* McsElln.πληρορίας-τεχνολογία@cptIt,
* McsElln.ΠΛΗΡΟΦΟΡΙΑΚΗ-ΤΕΧΝΟΛΟΓΙΑ@cptIt,
* McsElln.τεχνολογία-πληρορίας@cptIt,
* McsElln.ΤΕΧΝΟΛΟΓΙΑ-ΤΩΝ-ΠΛΗΡΟΦΟΡΙΩΝ@cptIt,
* McsElln.ΤΕΧΝΟΛΟΓΙΕΣ-ΠΛΗΡΟΦΟΡΙΑΣ@cptIt,
* McsElln.ΤΕΧΝΟΛΟΓΙΕΣ-ΤΩΝ-ΠΛΗΡΟΦΟΡΙΩΝ@cptIt,
* McsElln.ΨΗΦΙΑΚΗ-ΤΕΧΝΟΛΟΓΙΑ@cptIt,

* McsElln.ΠΤ@cptIt0,
====== lagoSinago:
* McsEngl.tekofo@lagoSngo, {2014-02-06}
* McsEngl.teknoXdato@lagoSngo, {2008-01-03}
* McsEngl.tekno'info@lagoSngo,

DEFINITION

ΑΡΧΙΚΟΣ ΟΡΙΣΜΟΣ ΑΝΑΛΥΣΗΣ για αυτή εδώ τη βάση.

ΠΛΗΡΟΦΟΡΙΑΚΕΣ ΤΕΧΝΟΛΟΓΙΕΣ ονομάζω ΚΑΘΕ ΤΕΧΝΟΛΟΓΙΑ#cptEconomy212.1# που χρησιμοποιειται για οποιαδήποτε λειτουργία (επεξεργασια, επικοινωνια, ...) της ᾳνθρωπινης-πληροφοριας#cptCore445.1#'
[ΝΙΚΟΣ, ΣΕΠΤ. 1994]

Information technology (IT), as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware." In short, IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit and retrieve information, securely.
Recently it has become popular to broaden the term to explicitly include the field of electronic communication so that people tend to use the abbreviation ICT (Information and Communications Technology).
[http://en.wikipedia.org/wiki/Information_technology]

(paper in EAD150) INFORMATION TECHNOLOGY is a wide ranging term that encompasses most of the new ways of using, managing and creating knowledge. This includes office-automation, data processing, factory automation and telecommunications.
[Nikos, 1990]

Any <tecnology> that deals with HUMAN INFORMATION.
[Nikos, 1992]

Some have suggested that washing machines can nowadays be regarded as bits of INFORMATION TECHNOLOGY.
[Moore, 1989, 69#cptResource81]

"ΠΙΟ ΤΥΠΙΚΑ ΣΑΝ "ΠΛΗΡΟΦΟΡΙΚΗ" ΘΑ ΜΠΟΡΟΥΣΑΜΕ ΣΕ ΜΙΑ ΠΡΩΤΗ ΦΑΣΗ ΝΑ ΟΡΙΣΟΥΜΕ
- ΤΗΝ ΕΠΙΣΤΗΜΗ ΚΑΙ ΤΕΧΝΟΛΟΓΙΑ ΠΟΥ ΕΧΕΙ ΣΑΝ ΑΝΤΙΚΕΙΜΕΝΟ ΤΗ ΣΥΛΛΟΓΗ, ΑΠΟΘΗΚΕΥΣΗ, ΕΠΕΞΕΡΓΑΣΙΑ ΚΑΙ ΔΙΑΝΟΜΗ ΠΛΗΡΟΦΟΡΙΩΝ ΜΕ ΤΗ ΒΟΗΘΕΙΑ ΥΠΟΛΟΓΙΣΤΙΚΩΝ ΣΥΣΤΗΜΑΤΩΝ.
ΣΗΜΕΙΩΣΤΕ ΟΤΙ Ο ΟΡΟΣ "ΠΛΗΡΟΦΟΡΙΚΗ" ΕΧΕΙ ΕΥΡΩΠΑΙΚΗ ΠΡΟΕΛΕΥΣΗ ΚΑΙ ΦΑΙΝΕΤΑΙ ΝΑ ΕΠΙΚΡΑΤΕΙ ΤΟΥ ΑΓΓΛΟΣΑΞΑΝΙΚΟΥ ΟΡΟΥ computer science, ΕΠΕΙΔΗ ΑΚΡΙΒΩΣ ΥΠΟΔΗΛΩΝΕΙ ΤΗΝ ΑΝΑΓΚΗ ΑΝΑΛΥΣΗΣ ΟΛΟΚΛΗΡΗΣ ΤΗΣ ΔΙΑΔΙΚΑΣΙΑΣ ΕΠΙΚΟΙΝΩΝΙΑΣ ΚΑΙ ΤΟΥ ΣΥΣΤΑΤΙΚΟΥ ΣΤΟΙΧΕΙΟΥ ΤΗΣ ΔΙΑΔΙΚΑΣΙΑΣ ΑΥΤΗΣ, ΔΗΛΑΔΗ ΤΗΣ ΠΛΗΡΟΦΟΡΙΑΣ ΚΑΙ ΟΧΙ ΜΟΝΟ ΤΟΥ ΜΕΣΟΥ ή ΕΡΓΑΛΕΙΟΥ ΠΟΥ ΧΡΗΣΙΜΟΠΟΙΕΙΤΑΙ ΑΠΟ ΤΟΝ ΑΝΘΡΩΠΟ, ΔΗΛΑΔΗ ΤΟΥ ΥΠΟΛΟΓΙΣΤΗ".
[ΚΟΙΛΙΑΣ, 1993, 16#cptResource468]

Τελικός ορισμός σύνθεσης.

ΤΕΧΝΟΛΟΓΙΕΣ ΠΛΗΡΟΦΟΡΙΑΣ ονομάζω κάθε τεχνολογία ΕΠΙΚΟΙΝΩΝΙΑΣ#cptIt244.2# ή ΕΠΕΞΕΡΓΑΣΙΑΣ-ΠΛΗΡΟΦΟΡΙΩΝ#cptIt245.2#.
[hmnSngo.1995-02]

ΤΕΧΝΟΛΟΓΙΕΣ ΠΛΗΡΟΦΟΡΙΑΣ ονομάζουμε HARDWARE#cptIt1# & SOFTWARE τεχνολογιες με τις οποίες επεξεργαζόμαστε και επικοινωνούμε ΠΛΗΡΟΦΟΡΙΕΣ.
[hmnSngo.1995-03]

tchInf'PART

name::
* McsEngl.tchInf'PART@cptIt,

_SPECIFIC:
* license#cptItsoft215#

tchInf'human

name::
* McsEngl.tchInf'human@cptIt,
* McsEngl.human.techInfo@cptIt,
* McsEngl.humanTchInf@cptIt,

_SPECIFIC:
* hacker
* programer##
* user##

tchInf'professional#cptIt6: attEnv#

name::
* McsEngl.tchInf'professional@cptIt,

human.HACKER

name::
* McsEngl.human.HACKER@cptIt,
* McsEngl.human.hacker@cptIt,

hacker'resource

name::
* McsEngl.hacker'resource@cptIt,

_ADDRESS.WPG:
* https://www.cs.berkeley.edu/~bh/hacker.html,
* ηθικός-χάκερ: http://www.tovima.gr/society/article/?aid=708037,

tchInf'addiction

name::
* McsEngl.tchInf'addiction@cptIt,

_ADDRESS.WPG:
* {2015-07-17} http://www.tovima.gr/world/article/?aid=723221,

_SPECIFIC:
* internet-addiction#qlink#ql:inet'addiction##

Technology is fun and exciting, but be sure you're taking care of yourself physically, emotionally, and spiritually.
Step away from it all every once in a while and relax.
It will all still be there when you get back.
[NCZOnline 2015-08-18]

tchInf'Conference

name::
* McsEngl.tchInf'Conference@cptIt,

tchInf'EU-project#cptIt3#

name::
* McsEngl.tchInf'EU-project@cptIt,

tchInf'Data ::this.part#cptIt242#

name::
* McsEngl.tchInf'Data ::this.part@cptIt,

tchInf'education#ql:education.infotech#

name::
* McsEngl.tchInf'education@cptIt,

tchInf'Evaluation#attEnv#

name::
* McsEngl.tchInf'Evaluation@cptIt,
* McsEngl.conceptIt446,
* McsEngl.tchInf'evaluation@cptIt446,
* McsEngl.information-technology-EVALUATION@cptIt,
* McsElln.ΠΛΗΡΟΦΟΡΙΑΚΩΝ-ΤΕΧΝΟΛΟΓΙΩΝ-ΑΞΙΟΛΟΓΗΣΗ@cptIt,

_GENERIC:
* EVALUATION#cptCore546.107#

_DESCRIPTION:
INFO-TECH EVALUATION I call EVALUATION#cptCore782.1# of information technology.
[NIKOS, MAY 1995]
===
ΚΑΘΕ πληροφοριακή τεχνολογια, την αξιολογουμαι, τη συγκρίνουμε με άλλες που κάνουν την ίδια δουλειά ή με το τί θα θέλαμε να κανουμε και το τί κανουμε. Δηλαδη αυτό το χαρακτηριστικό ειναι και εσωτερικο και εξωτερικό χαρακτηριστικό της έννοιας.
[ΝΙΚΟΣ, ΣΕΠΤ. 1994]
===
ΠΡΕΠΕΙ παντα να ξεκαθαριζεται βάση ποιού ΧΑΡΑΚΤΗΡΙΣΤΙΚΟΥ γίνεται η σύγκριση ΚΑΙ πιο είναι το ΚΡΙΤΗΡΙΟ με το οποίο γίνεται η σύγκριση.

ADVANTAGE

DISADVATAGE

ΣΥΓΚΡΙΣΗ ΜΕ ΤΟ ΣΚΟΠΟ

Ενω οι πληροφοριακές τεχνολογίες έχουν κάνει πάρα πολά, ΣΕ ΣΧΕΣΗ όμως με το τί προβλέπεται να κάνουν, ΔΕΝ έχουν κάνει σχεδον τίποτα ΣΗΜΕΡΑ.
[ΝΙΚΟΣ, ΣΕΠΤ. 1994]

SPEC

name::
* McsEngl.SPEC=system performance evaluation corp@cptIt,

SPEC is a nonprofit company creating by companies DEC, HP, IBM, INTEL, SUN, etc to develop and support standardized benchmarks.

SPEC is best known for its CPU performace suite, but it has developed, and continues to investigate, benchmarks in other areas, such as graphics and networks.
[BYTE, oct. 1994, 66]

tchInf'Importance

name::
* McsEngl.tchInf'Importance@cptIt,
* McsEngl.conceptIt447,
* McsEngl.importance.InfoTech@cptIt447,
* McsEngl.information-technology-IMPORTANCE@cptIt,
* McsElln.πληροφοριακων-τεχνολογιων-ΣΗΜΑΝΤΙΚΟΤΗΤΑ@cptIt,

_GENERIC:
* importance#cptCore781#

_DESCRIPTION:
The notion that IT is strategic is newer still- at least in academic and professional literature... some companies actually began to exploit...[IT].. in the 1970s, if not earlier. However, the strategic opportunities and threats in the late 1980s are much more significant, not only because of the rapid advance of IT but also because of the accompanying economic and social changes that are unfolding.
[Earl#cptResource11# 1989 ix#cptResource11]

tchInf'Exposition#cptIt148: attEnv#

name::
* McsEngl.tchInf'Exposition@cptIt,

tchInf'law#attEnv#

name::
* McsEngl.tchInf'law@cptIt,

_GENERIC:
* law#cptCore23#

ΣΤΙΣ 27 ΙΟΥΝΙΟΥ 1992 ΨΗΦΙΣΤΗΚΕ ΣΤΗΝ ΟΛΟΜΕΛΕΙΑ ΤΗΣ ΒΟΥΛΗΣ Η ΚΥΡΩΣΗ ΤΗΣ ΕΥΡΩΠΑΙΚΗΣ ΣΥΜΒΑΣΗΣ, ΠΟΥ ΘΕΤΕΙ ΤΟ ΠΛΑΙΣΙΟ ΕΝΤΟΣ ΤΟΥ ΟΠΟΙΟΥ ΠΡΕΠΕΙ ΝΑ ΛΕΙΤΟΥΡΓΟΥΝ ΤΑ ΙΔΙΩΤΙΚΑ ΚΑΙ ΔΗΜΟΣΙΑ ΑΡΧΕΙΑ ΠΟΥ ΔΙΑΘΕΤΟΥΝ ΠΛΗΡΟΦΟΡΙΕΣ ΓΙΑ ΤΗΝ ΚΟΙΝΩΝΙΚΗ, ΟΙΚΟΝΟΜΙΚΗ ΚΑΙ ΙΔΙΩΤΙΚΗ ΖΩΗ ΤΩΝ ΠΟΛΙΤΩΝ.

tchInf'managing#cptEconomy11.7#

name::
* McsEngl.tchInf'managing@cptIt,

tchInf'Price

name::
* McsEngl.tchInf'Price@cptIt,

_GENERIC:
* PRICE#cptEconomy541.44#

tchInf'Market#cptIt86: attEnv#

name::
* McsEngl.tchInf'Market@cptIt,

tchInf'sector

name::
* McsEngl.tchInf'sector@cptIt,

tchInf'company#cptItorg0#

name::
* McsEngl.tchInf'company@cptIt,

EITO

name::
* McsEngl.EITO@cptIt,

_DESCRIPTION:
Since 1993, the European Information Technology Observatory offers high quality and up-to-date information on European and global markets for information technology, telecommunications and consumer electronics. The EITO is managed by Bitkom Research GmbH, a wholly owned subsidiary of BITKOM, the Federal Association for Information Technology, Telecommunications and New Media in Germany.

EITO collaborates with leading market research institutes including IDC and GfK. The research activities of the EITO Task Force are supported by the European Commission and the OECD. EITO is sponsored by Deutsche Telekom, KPMG and Telecom Italia.
[http://www.eito.com/epages/63182014.sf/en_GB/?ObjectPath=/Shops/63182014/Categories/AboutUs/About_EITO]

tchInf'sector.information

name::
* McsEngl.tchInf'sector.information@cptIt,

tchInf'sector.knowledge#cptEconomy38.36.15: attEnv#

name::
* McsEngl.tchInf'sector.knowledge@cptIt,

ΣΕΠΕ

tchInf'security

name::
* McsEngl.tchInf'security@cptIt,
* McsEngl.security.it@cptIt,
* McsEngl.infotech'security@cptIt,
* McsEngl.tchInf'security@cptIt,

ratting

name::
* McsEngl.ratting@cptIt,

Ratting: Οι χάκερς μπαίνουν στα σπίτια μας
ΑΘΗΝΑ 22/09/2014
Εμείς κοιμόμαστε και η τύχη μας δουλεύει! Ή μάλλον ακριβέστερα δουλεύουν οι χάκερς οι οποίοι με μία ενέργεια που ονομάζεται "ratting", στέλνουν εναν ιό ο οποίος τους επιτρέπει να αποκτήσουν πρόσβαση στην επιφάνεια εργασίας του υπολογιστή χωρίς να γίνονται αντιληπτοί.

Το αποτέλεσμα; Ευνόητο...

Όπως αποκαλύπτει η Mail on Sunday, οι χάκερς παρεμβαίνουν στις κάμερες ασφαλείας όπου κι αν είναι τοποθετημένες, "εισβάλλουν" στις webcams των υπολογιστών και προβάλλουν ζωντανά στο διαδίκτυο -χωρίς καμία άδεια- ό,τι αυτές προβάλλουν!

Σύμφωνα με έρευνα της εφημερίδας, υπάρχουν ειδικά site στο διαδίκτυο στα οποία προβάλλεται η καθημερινότητα μιας οικογένειας χωρίς να το γνωρίζει!

Οι χάκερς μπαίνουν στο σύστημα ακόμα και σε κάμερες που έχουν μπει ως συστήματα ασφαλείας ακόμα και μέσα σε σπίτια.

Οι δημοσιογράφοι της εφημερίδας είδαν την περασμένη εβδομάδα τα εξής σε ζωντανή σύνδεση:

- Μωρά στην κούνια τους να κοιμούνται
- Εναν μαθητή να παίζει στο σπίτι του στον υπολογιστή στο βόρειο Λονδίνο
- Ενα άλλο αγοράκι να κοιμάται στο κρεβάτι του
- Το αποδυτήριο του ιερέα σε εκκλησία στο Σάρει
- Μια ηλικιωμένη γυναίκα να κάθεται στην πολυθρόνα της στο σαλόνι του σπιτιού της
- Δυο άνδρες σε μια κουζίνα να τρώνε

Εκτός από τις κάμερες ασφαλείας στις οποίες μπορούν να εισβάλλουν οι χάκερς, υπάρχουν και άλλες συσκευές στις οποίες μπορούν να "μπουν" με αποτέλεσματα να χάνεται κάθε έννοια ιδιωτικότητας.

Μπορούν να παρεισφρήσουν ακόμα και στις ειδικές συσκευές ενδοεπικοινωνίας για τα μωρά οι οποίες κυκλοφορούν με ενσωματωμένη κάμερα.

Μόνο στην Βρετανία η έρευνα αποκάλυψε ότι υπάρχουν ανεβασμένες στο διαδίκτυο 60.000 ώρες ζωντανής αναμετάδοσης από τις κάμερες.
[http://www.nooz.gr/tech/ratting-i-allios-oi-xakers-mpainoun-sta-spitia-mas]

resource

_ADDRESS.WPG:
* {2017-03-07} Quincy-Larson, The CIA just lost control of its hacking arsenal. Here’s what you need to know, https://medium.freecodecamp.org/the-cia-just-lost-control-of-its-hacking-arsenal-heres-what-you-need-to-know-ea69fc1ce38c,
* Rights, Remedies, and Security Models http://szabo.best.vwh.net/rrsmodels.html,

SPECIFIC

Ransomware

name::
* McsEngl.ransomware@cptIt,

_ADDRESS.WPG:
* https://securitydaily.org/trustlookwannacrytoolkit-wannacrytoolkit-scanner-removal-toolkit/,
* https://www.nomoreransom.org/,

tchInf'Resource#attEnv#

name::
* McsEngl.tchInf'Resource@cptIt,
* McsEngl.it'resource@cptIt,

_GENERIC:
ResourceInfHmn#cptResource843#

_ADDRESS.WPG:
* http://reports.weforum.org/global-information-technology-report-2016//
* http://www.gartner.com/it-glossary//
* http://www.techterms.com//

_SPECIFIC:
* BOOKS/ARTICLS#ql:[Level relation4: cptResource852 cptIt0]##source.nfo[Level relation4: cptResource852 cptIt0]#
* PERIODICALS#cptIt489#

ΒΙΒΛΙΑ ΝΑ ΑΓΟΡΑΣΩ

Ο ΒΟΗΘΟΣ ΤΟΥ ΤΕΧΝΙΚΟΥ ΤΩΝ PC, 6500 DRX[OKT 1993]. ΚΛΕΙΔΑΡΙΘΜΟΣ.

tchInf'Standard#cptIt139#

name::
* McsEngl.tchInf'Standard@cptIt,

tchInf'Troubleshooting

name::
* McsEngl.tchInf'Troubleshooting@cptIt,
* McsEngl.conceptIt52.1,
* McsEngl.troubleshooting@cptIt52.1,

_DESCRIPTION:
faulty-symptoms (eg messages) and Procedures to correct them.

PROCESS

APPLICATION STOPS RUNNING UNEXPECTEDLY

* Run chksdsk /f, to repair lost clusters.

RUNNING A DISK COMPACTION PROGRAM

* Run chksdsk /f, to repair lost clusters.

MESSAGE

BAD OR MISSING COMMAND INTERPETER κατά το άνοιγμα

το hardware δεν έκανε καλή επαφή. ή είχε το CD μέσα δίσκο.
Τελικά ο δίσκος με COMMAND.COM είχε χαλασμένα σέκτορς. Καλό θα είναι να βάλεις ένα καινούργιο COMMAND.COM από μία κασέτα με σύστεμ φάιλς.

DATA ERROR READING DRIVE D κατα το ανοιγμα:

Ελειπε το ντιρέκτορι TEMP.

tchInf'virtualization

_CREATED: {2015-08-17}

name::
* McsEngl.tchInf'virtualization@cptIt,
* McsEngl.virtualization@cptIt,

_DESCRIPTION:
Virtualization is the abstraction of IT resources that masks the physical nature and boundaries of those resources from resource users. An IT resource can be a server, a client, storage, networks, applications or OSs. Essentially, any IT building block can potentially be abstracted from resource users.
[http://www.gartner.com/it-glossary/virtualization]

real-entity

name::
* McsEngl.physical-entity@cptIt,

SPECIFIC

name::
* McsEngl..specific@cptIt,

_SPECIFIC:
* virtual-computer##
* virtual-network##
* virtual-os##
* virtual-storage##

tchInf'ENVIRONMENT#cptCore756#

name::
* McsEngl.tchInf'ENVIRONMENT@cptIt,

_SPECIFIC:
* health-isssue#cptItsoft15#
* impact-on-economy#cptItsoft275#

tchInf'doing.FUNCTION ::this.att

name::
* McsEngl.tchInf'doing.FUNCTION ::this.att@cptIt,
* McsEngl.conceptIt0.2, (old 246)
* McsEngl.information-technology-FUNCTION@cptIt,
* McsEngl.function.infotech@cptIt246,
* McsElln.ΠΛΗΡΟΦΟΡΙΑΚΗΣ-ΤΕΧΝΟΛΟΓΙΑΣ-ΛΕΙΤΟΥΡΓΙΑ@cptIt,
* McsElln.ΛΕΙΤΟΥΡΓΙΑ@cptIt246,

_GENERIC:
* Doing#cptCore475#

_DESCRIPTION:
Λειτουργια πληροφοριακής-τεχνολογίας ονομάζω καθε ΛΕΙΤΟΥΡΓΙΑ που επιτελεί η ΠΛΗΡΟΦΟΡΙΑΚΗ-ΤΕΧΝΟΛΟΓΙΑ#cptIt0.1#.
[hmnSngo.1995-02]

IMPORTANCE#cptCore781#

Η λειτουργία που εκτελεί η τεχνολογία είναι πολύ σημαντικό πράγμα. Βάση αυτής γίνεται δε κυρίως η ταξινόμηση της πληροφορίας.

SPECIFIC

_SPECIFIC: ALPHABETICALLY:
* communicating#cptItsoft53#
* eTrading#cptItsoft51#
* goal##
* mission##
* processing (program's-doing)#cptItsoft444#

tchInf'mission

name::
* McsEngl.tchInf'mission@cptIt,
* McsEngl.the-dream@cptIt,

* McsElln.ΤΟ-ΟΡΑΜΑ@cptIt,

_DESCRIPTION:
ΣΤΙΓΜΙΑΙΑ ΠΡΟΣΒΑΣΗ ΣΤΟ ΣΥΝΟΛΟ ΤΗΣ ΑΝΘΡΩΠΙΝΗΣ ΓΝΩΣΗΣ ΑΠΟ
- ΟΠΟΙΟΔΗΠΟΤΕ ΜΕΡΟΣ ΤΟΥ ΚΟΣΜΟΥ ΚΑΙ
- ΣΕ ΟΠΟΙΑΔΗΠΟΤΕ ΣΤΙΓΜΗ.

tchInf'goal

name::
* McsEngl.tchInf'goal@cptIt,
* McsEngl.goal.it@cptIt215,
* McsEngl.it-goal@cptIt,

_DESCRIPTION:
ΣΚΟΠΟΣ ΠΤ ειναι ο ΣΚΟΠΟΣ#cptCore784.1# των 'πληροφορικών τεχνολογιών'.
[hmnSngo.1995-05]
===
GOALS are functions to be done.

tchInf'EVOLUTING

name::
* McsEngl.tchInf'EVOLUTING@cptIt,

_ADDRESS.WPG::
* http://elmp.gr/,
* http://www.lifo.gr/articles/technology_articles/181543/ikseres-oti-yparxei-moyseio-pliroforikis-stin-athina,

_GENERIC:
* this.attribute,
* Evolution#cptCore725#
* techInf'time,

_QUERY:
* GENERAL-HISTORY#ql:[Field FdTimeSubject:information'technology]## history.nfo:information'technology#

{time.1981-1990
"The Information Age" is a label given to the 1980s by jourmalists and academicians alike.
[Ligon, 1986, 1#cptResource61]

{time.1981-08-12:
This was followed by the 1981-08-12 release of the IBM PC, which would revolutionize the computer market.
[http://en.wikipedia.org/wiki/Personal_computer] 2007-11-29

{time.1941}: {time.GERMANY; It#it0#; }
===
COMPUTER:
The German K. Zuse completed a prograble general purpose computer. It used electrical relays and the binary arithmetic system. 2to3 sec were the time for a multiplication.
[video]

{time.1943}: {time.UK; It#it0#; }
===
COLOSSUS, COMPUTER:
A code braking machine operated in UK. It was the first computer used not for computations. [video]

{time.1946}: {time.usa#cptCore227#; It#it0#}:
===
ENIAC COMPUTER:
It cost $3 million in 1992 dollars.
It made 5000 additions per sec.
[video]

{time.1946}: {time.It#it0#}:
===
FIRST COMPUTER CORPORATION.
Eckert - Mauchly computer corporation were established.
[video]

{time.1948}: {time.UK; It#it0#; }
===
FIRST STORED PROGRAMEBLE COMPUTER:
Was built by Fredy Williams, UK.
[video]

{time.1950}: {time.It#it0#; }
===
COMPUTER INDUSTRY:
REMINGTON-RAND bought the Eckert-Mauchly computer corporation
[video]

{time.1950}: {time.Ussr#cptCore19#; It#it0#; }
===
USSR:
Κατασκευάστηκε στην Ουκρανία ο πρώτος Η/Υ της Ευρώπης, ο ΜΕΣΜ.

{time.1951}: {time.UK; It#it0#; }
===
LEO:
The british company Lyons completed its first computer for business use.
[video]

{time.1952}: {time.It#it0#; }
===
UNIVAC:
Predicts presidential elections and became well known. [video]

{time.1953}: {time.It#it0#; }
===
UNIVAC:
3 were installed. [video]

{time.1953}: {time.It#it0#; }
===
IBM 650:
Its first computer. Less powerfull than univac but better suitable to old equipment and with better sellforce. [video]

{time.1954}: {time.It#it0#; }
===
IBM 650 COMPUTER:
It sold 1000 computers.
[video]

{time.1959}: {time.It#it0#; }
===
Integrated Circuits:
were anounced. To oλοκληρωμένο κύκλωμα επινοήθηκε το 1959 απο μια νεα εταιρια, την Fairchild semiconductor, που δημιουργήθηκε απο μια ομαδα 8 ασων στα ηλεκτρονικα, οταν εφυγαν απο την πρωτοπορο Shockley Transistor Corporation.

{time.1960}: {time.It#it0#; }
===
INTEGRATED CIRCUIT:
An Integrated Circuit costed $1,000 and had fewer than 10 transistors.

{time.1964}: {time.It#it0#; }
===
IBM 360 COMPUTER:
IBM Ριχνει στην αγορα τον εκπληκτικα πετυχημενο 360.
[JARRET, 1987, 145#cptResource117#]

{time.1969}: {time.It#it0#; }
===
THE SMALLEST COMPUTER:
were built with integrated circuits for the moon mission. [video]

{time.1971}: {time.World#cptCore321#; Economy#cptEconomy323#}:
===
ΣΟΑ:
ΔΙΕΘΝΗ ΤΡΑΠΕΖΑ ΕΠΕΝΔΥΣΕΩΝ ΔΤΕ. ΙΔΡΥΘΗΚΕ ΚΙΑ ΑΡΧΙΣΕ ΝΑ ΛΕΙΤΟΥΡΓΕΙ ΜΕ ΚΑΤΑΣΤΑΤΙΚΟ ΚΕΦΑΛΑΙΟ 1 ΔΙΣ ΡΟΥΒΛΙΑ.
[ΦΟΥΝΤΟΥΛΗΣ, 1986, 148]

ΣΟΑ. ΨΗΦΙΣΕ ΤΟ ΣΥΝΘΕΤΟ ΠΡΟΓΡΑΜΜΑ ΓΙΑ ΠΕΡΙΟΔΟ 15to20 ΧΡΟΝΩΝ
[ΚΟΛΕΣΟΦ, 1985, 197#cptResource173]

ΔΤΕ. ΕΚΤΕΛΕΙ ΤΙΣ ΣΥΝΑΛΛΑΓΕΣ ΣΕ ΜΕΤΑΤΡΕΨΙΜΑ ΡΟΥΒΛΙΑ ΚΑΙ ΠΑΙΖΕΙ ΜΕΓΑΛΟ ΡΟΛΟ ΣΤΗΝ ΠΡΑΓΜΑΤΟΠΟΙΗΣΗ ΤΩΝ ΜΕΤΡΩΝ ΓΙΑ ΤΟ ΔΙΕΘΝΗ ΣΟΣΙΑΛΙΣΤΙΚΟ ΚΑΤΑΜΕΡΙΣΜΟ ΕΡΓΑΣΙΑΣ
[ΚΟΛΕΣΟΦ, 1985, 162#cptResource157##cptResource173]
===
1971: {time.Ussr#cptCore19#; It#it0#; ROBOT'TECHNOLOGY; }
===
ROBOT:
ΤΟ ΠΡΩΤΟ ΚΑΤΑΣΚΕΥΑΖΕΤΑΙ. ΣΤΙΣ ΗΠΑ ΣΤΙΣ ΑΡΧΕΣ ΔΕΚΑΕΤΙΑΣ '60

{time.1980}:
=== ΟΗΕ: {time.It#it0#; Un#}#cptCore321.3.42##{time.; }
ΕΞΕΤΑΣΕ ΖΗΤΗΜΑΤΑ ΣΧΕΤΙΚΑ ΜΕ ΤΗΝ ΠΛΗΡΟΦΟΡΙΑ ΚΑΙ ΑΠΟΦΑΣΙΣΕ ΝΑ ΚΑΛΕΣΕΙ ΤΙΣ ΧΩΡΕΣ ΜΕΛΗ ΤΟΥ ΝΑ ΔΗΜΙΟΥΡΓΗΣΟΥΝ ΜΙΑ ΝΕΑ ΔΙΕΘΝΗ ΠΛΗΡΟΦΟΡΙΑΚΗ ΤΑΞΗ.
[ΒΕΝΕΡΗΣ, 1986, 153#cptResource156#]

{time.1981}: {time.usa#cptCore227#; It#it0#;  }
===
IBM/PC:
Ο IBM/PC είναι ο πρωτος Μ/Υ που διεδωσε το 16bit στην υπολογιστικη των επιχειρησεων.
[JARRET, 1987, 80#cptResource117#]

IBM wasn't the first company to sell a personal computer when it introduced the 5150 in August 1981, but its entry is credited with igniting the PC era. CNET News.com examines the past, present and future of the PC in a special report.
IBM's introduction of the 5150 PC has been viewed alternately as a stroke of brilliant technological foresight and the biggest business blunder of the 20th century. Either way, it is safe to say that the world would be a vastly different place--though not necessarily a better one--had IBM not jumped into the PC market.
Participants in the project to develop the first IBM PC say they were concerned less about making history than about making deadline. But one decision did wind up changing the world--or at least the computer world. IBM opted to build its system using off-the-shelf parts, a radical departure from the way things traditionally got done at Big Blue.
[http://news.cnet.com/news/0-1003-200-6840338.html?tag=mn_hd]

{time.1981}: {time.World#cptCore321#; It#it0#; }
===
ΕΠΙΚΟΙΝΩΝΙΑ:
ΔΗΜΙΟΥΡΓΕΙΤΑΙ ΥΠΟ ΤΗΝ ΑΙΓΙΔΑ ΤΗΣ ΟΥΝΕΣΚΟ ΤΟ ΔΙΕΘΝΕΣ ΠΡΟΓΡΑΜΜΑ PIDC ΓΙΑ ΤΗΝ ΑΝΑΠΤΥΞΗ ΤΗΣ ΕΠΙΚΟΙΝΩΝΙΑΣ. ΣΚΟΠΟΣ ΤΟΥ, Η ΒΟΗΘΕΙΑ ΣΤΙΣ ΑΝΑΠΤΥΣΟΜΕΝΕΣ ΧΩΡΕΣ ΓΙΑ ΤΗΝ ΕΝΔΥΝΑΜΩΣΗ ΤΗΣ ΑΥΤΟΤΕΛΟΥΣ ΑΝΑΠΤΥΞΗΣ ΤΟΥΣ ΣΤΟΝ ΤΟΜΕΑ ΤΗΣ ΕΠΙΚΟΙΝΩΝΙΑΣ.

{time.1984}: {time.It#it0#; }
===
MACINTOCH:
Introduced. It used a user friedly operating system.

{time.1986, OKT 20: {time.UK; It#it0#; }
===
ΑΓΓΛΙΑ:
ΤΟ ΧΡΗΜΑΤΙΣΤΗΡΙΟ ΛΕΙΤΟΥΡΓΕΙ ΑΠΟ ΤΩΡΑ ΜΕ ΚΟΜΠΟΥΤΕΡΣ.
[ΤΗΛΕΟΡΑΣΗ]

{time.1992}: {time.It#it0#; }
===
ON LINE DATABASE:
ΓΥΡΩ ΣΤΟ 1986 ΜΕ 1987 ΥΠΗΡΧΑΝ ΠΑΝΩ ΑΠΟ 3.500 ΣΕ ΟΛΟ ΤΟ ΚΟΣΜΟ, ΕΝΩ ΣΗΜΕΡΑ Ο ΑΡΙΘΜΟΣ ΑΥΤΟΣ ΞΕΠΕΡΝΑ ΤΙΣ 20.000, ΚΑΤΙ ΠΟΥ ΥΠΟΓΡΑΜΙΖΕΙ ΤΟΝ ΕΝΤΟΝΟ ΡΥΘΜΟ ΑΝΑΠΤΥΞΗΣ ΤΕΤΟΙΩΝ ΣΥΣΤΗΜΑΤΩΝ

FORCAST#cptCore395#

_TIME: *2015: {time.It#it0#; COMMUNICATION'TECHNOLOGY}:
=== ΤΗΛΕΟΡΑΣΗ:
ΘΑ ΕΜΦΑΝΙΣΘΟΥΝ ΟΙ ΠΡΩΤΕΣ ΤΡΙΔΙΑΣΤΑΤΕΣ ΤΗΛΕΟΡΑΣΕΙΣ ΓΙΑ ΤΙΣ ΟΠΟΙΕΣ ΔΕΝ ΘΑ ΑΠΑΙΤΟΥΝΤΑΙ ΕΙΔΙΚΑ ΓΥΑΛΙΑ.
[ΚΑΘΗΜΕΡΙΝΗ, 2 ΜΑΙΟ 1993, 46]

ΟΠΩΣ ΠΟΛΥ ΚΑΘΑΡΑ ΔΙΑΦΑΙΝΕΤΑΙ ΑΠΟ ΤΑ ΤΕΛΕΥΤΑΙΑ ΣΤΟΙΧΕΙΑ ΤΩΝ ΔΙΕΘΝΩΝ ΕΓΚΡΙΤΩΝ ΟΙΚΟΝΟΜΙΚΩΝ ΕΝΤΥΠΩΝ ΤΗΣ ΠΛΗΡΟΦΟΡΙΚΗΣ, Ο ΚΕΝΤΡΙΚΟΣ ΑΞΟΝΑΣ ΤΗΣ ΠΑΓΚΟΣΜΙΑΣ ΒΙΟΜΗΧΑΝΙΑΣ ΜΕΤΑΤΟΠΙΖΕΤΑΙ ΣΤΑΘΕΡΑ ΠΡΟΣ ΤΟΥΣ ΤΟΜΕΙΣ ΤΟΥ
SOFTWARE KAI ΤΩΝ
ΥΠΗΡΕΣΙΩΝ.
[COMPUTER GO, JAN 1994, 66]

Computer technology for the next 30 years will be driven by the entertainment industry. That's what Ed McCracken, the CEO of Silicon Graphics, said at the recent PC Forum - the who's who meeting of the computer industry.
[BYTE, MAY 1994, 10]

tchInf'WHOLE

WHOLE'CONCEPT,
info-tech sector#cptIt466#
Είναι χαρακτηριστικο, κοινωνικών οργανισμών, οικονομικών και μή.

ASSOCIATION#cptEconomy7.83#

ognCompany#cptEconomy7#

InfoTech-COMPANY#cptEconomy7.108: attPar#
Κάθε τεχνολογία είναι προϊόν μιας (ολότητας) εταιρίας.

tchInf'GENERIC

_GENERIC:
* epistem#cptCore406#
* technology#ql:[Level CONCEPT:rl? conceptEconomy212]##cptEconomy212#

SPECIFIC

name::
* McsEngl.tchInf.specific@cptIt,

_SPECIFIC: tchInf.Alphabetically:
* techInf.audio#cptItsoft22#
* techInf.communication#cptItsoft244#
* techInf.hardware#cptItsoft1#
* techInf.knowledge#cptItsoft458#
* techInf.machine#cptItsoft277.1#
* techInf.media
* techInf.multimedia#cptItsoft105#
* techInf.processing#cptItsoft245#
* techInf.security#cptItsoft302#
* techInf.software#cptItsoft64#
* techInf.system#cptItsoft277#
* techInf.systemNo##
* techInf.tool#cptItsoft277.2#
* techInf.video#cptItsoft509#

tchInf.SPECIFIC_DIVISION.FUNCTION[246#cptIt246#]:
_SPECIFIC:
* techInf.processing#cptItsoft245#
* techInf.communicating#cptItsoft244#
* techInf.storing#cptItsoft136#
===
* techInf.audio#cptItsoft22#
* techInf.video#cptItsoft509#

_tchInf.SPECIFIC_DIVISION.Hardware:
_SPECIFIC:
* techInf.hardware#cptItsoft1#
* techInf.hardware-and-software-
* techInf.software#cptItsoft64#

it.SPECIFIC_DIVISION.COUNTRY:
_SPECIFIC:
Καθε τεχνολογια είναι προιον κάποιας ΕΤΑΙΡΙΑΣ κάποιας χώρας. Ετσι η ταξινομηση βάσει χώρας, γίνεται βάση της ΤΙΜΗΣ που έχει το χαρακτηριστικο "ΧΩΡΑ" του χαρακτηριστικου "ΕΤΑΙΡΙΑ".
[ΝΙΚΟΣ, ΣΕΠΤ. 1994]

tchInf.SPECIFIC-DIVISION.information

name::
* McsEngl.tchInf.SPECIFIC-DIVISION.information@cptIt,

_SPECIFIC:
* audio-techInfo#cptItsoft22#
* character-string-techInfo
* image-techInfo
* video-techInfo#cptItsoft509#
===
* knowledge-techInfo#cptItsoft458#

tchInf.MEDIA

_CREATED: {2012-11-18}

name::
* McsEngl.tchInf.MEDIA@cptIt,
* McsEngl.media-tech@cptIt, {2012-11-18}
* McsEngl.tech.info.media@cptIt, {2012-11-18}
* McsEngl.tech.media@cptIt, {2012-11-19}

_DESCRIPTION:
Media (singular medium) are the storage and transmission channels or tools used to store and deliver information or data. It is often referred to as synonymous with mass media or news media, but may refer to a single medium used to communicate any data for any purpose.[1][2][3]
[http://en.wikipedia.org/wiki/Media_(communication)]

Media-organization#ql:orginf.media#

SPECIFIC

Mass vs. local
Mass media is distinguished from local media by the notion that whilst the former aims to reach a very large market such as the entire population of a country, the latter broadcasts to a much smaller population and area, and generally focuses on regional news rather than global events. A third type of media, speciality media, provides for specific demographics, such as specialty channels on TV (sports channels, porn channels, etc.). These definitions are not set in stone, and it is possible for a media outlet to be promoted in status from a local media outlet to a global media outlet. Some lcoal media, which takes an interest in state or provincial news can rise to prominence due to their investigative journalism, and to the local region's preference of updates in national politics rather than regional news. The Guardian, formerly known as the Manchester Guardian is an example of one such media outlet. Once a regional daily newspaper, The Guardian is currently a nationally respected paper.[7]
[http://en.wikipedia.org/wiki/Mass_media]

tchInf.media.ALTERNATIVE

_CREATED: {2012-11-19}

name::
* McsEngl.tchInf.media.ALTERNATIVE@cptIt,
* McsEngl.alternative-media@cptIt, {2012-11-18}

Alternative media are media (newspapers, radio, television, magazines, movies, Internet, etc.) which provide alternative information to the mainstream media in a given context, whether the mainstream media are commercial, publicly supported, or government-owned. Alternative media differ from mainstream media along one or more of the following dimensions: their content, aesthetic, modes of production, modes of distribution, and audience relations.[1] Alternative media often aim to challenge existing powers, to represent marginalized groups, and to foster horizontal linkages among communities of interest.[2] Proponents of alternative media argue that the mainstream media are biased in the selection and framing of news and information. While sources of alternative media can also be biased (sometimes proudly so), proponents claim that the bias is significantly different than that of the mainstream media because they have a different set of values, objectives, and frameworks. Hence these media provide an "alternative" viewpoint, different information and interpretations of the world that cannot be found in the mainstream.

Because the term "alternative" has connotations of self-marginalization, some media outlets now prefer the term "independent" over "alternative".

Several different categories of media may fall under the heading of alternative media. These include, but are not limited to, radical and dissident media, social movement media, ethnic/racial media, indigenous media, community media, subcultural media, student media, and avant-garde media. Each of these categories highlights the perceived shortcomings of dominant media to serve particular audiences, aims and interests, and attempts to overcome these shortcomings through their own media.

The traditional, binary definition of alternative media as stated above has been expanded in the last decade. Simply comparing alternative media to the mainstream media ignores the profound effect that making media has on the makers. As producers and actors within their community, modern alternative media activists redefine their self-image, their interpretation of citizenship, and their world. Clemencia Rodriguez explains, "I could see how producing alternative media messages implies much more than simply challenging the mainstream media ... It implies having the opportunity to create one's own images of self and environment; it implies being able to recodify one's own identity with the signs and codes that one chooses, thereby disrupting the traditional acceptance of those imposed by outside sources.” [3]

With the increasing importance attributed to digital technologies, questions have arisen about where digital media fit in the dichotomy between alternative and mainstream media. Blogs, Facebook, Twitter and other similar sites, while not necessarily created to be information media, increasingly are being used to spread news and information, potentially acting as alternative media as they allow ordinary citizens to bypass the gatekeepers of traditional, mainstream media and share the information and perspectives these citizens deem important.[2] Additionally, digital media provide an alternative space for deviant, dissident or non-traditional views, and allow for the creation of new, alternative communities that can provide a voice for those normally marginalized by the mainstream media.[4] However, some have criticized the weaknesses of the Web. First, for its ability to act as both "alternative and a mass medium brings with it the tension of in-group and out-group communication." Second, the Web "rarely lives up to its potential" with constraints to access.[5]

Digital technologies have also led to an alternative form of video more commonly known as citizen generated journalism. Individuals and smaller groups have the potential to describe and make public their interpretations of the world.[6] Video shot on camcorders, FLIP cameras, and now cell phones have been utilized by the alternative media to commonly show human rights abuses. In turn the mainstream media picks up on these videos when it fits their narrative of what it deems "newsworthy".[7]
[http://en.wikipedia.org/wiki/Alternative_media]

tchInf.media.BROADCAST

_CREATED: {2012-11-18}

name::
* McsEngl.tchInf.media.BROADCAST@cptIt,
* McsEngl.broadcast-tech@cptIt, {2012-11-18}
* McsEngl.tech.broadcast@cptIt, {2012-11-18}
* McsEngl.tech.info.media.broadcast@cptIt, {2012-11-18}

Broadcast media (also known as electronic media) transmit their information electronically and comprise television, radio, film, movies, CDs, DVDs, and other devices such as cameras and video consoles[citation needed]
[http://en.wikipedia.org/wiki/Mass_media]

_SPECIFIC:
* film#cptResource871#
* radio#cptItsoft214#
* television#cptItsoft216#

tchInf.media.MASS

_CREATED: {2012-11-19}

name::
* McsEngl.tchInf.media.MASS@cptIt,
* McsEngl.conceptIt0.3,
* McsEngl.mass-media-tech@cptIt, {2012-11-19}
* McsEngl.tech.mass-media@cptIt, {2012-11-19}
* McsEngl.tech.info.media.mass@cptIt, {2012-11-19}
====== lagoGreek:
* McsElln.μέσα-μαζικής-επικοινωνίας-ΜΜΕ@cptIt,
* McsElln.ΜΜΕ-Μέσα-μαζικής-Επικοινωνίας@cptIt,

_DESCRIPTION:
The mass media are all those media technologies that are intended to reach a large audience by mass communication. Broadcast media (also known as electronic media) transmit their information electronically and comprise television, radio, film, movies, CDs, DVDs, and other devices such as cameras and video consoles[citation needed]. Alternatively, print media use a physical object as a means of sending their information, such as a newspaper, magazines, comics,[1] books, brochures, newsletters, leaflets, and pamphlets. The organizations that control these technologies, such as television stations or publishing companies, are also known as the mass media.[2][3][need quotation to verify] Internet media is able to achieve mass media status in its own right, due to the many mass media services it provides, such as email, websites, blogging, Internet and television. For this reason, many mass media outlets have a presence on the web, by such things as having TV ads that link to a website, or having games in their sites to entice gamers to visit their website. In this way, they can utilise the easy accessibility that the Internet has, and the outreach that Internet affords, as information can easily be broadcast to many different regions of the world simultaneously and cost-efficiently. Outdoor media is a form of mass media that comprises billboards, signs, placards placed inside and outside of commercial buildings and objects like shops and buses, flying billboards (signs in tow of airplanes), blimps, and skywriting.[4] Public speaking and event organising can also be considered as forms of mass media.[5]
...
While a telephone is a two way communication device, mass media refers to medium which can communicate a message to a large group, often simultaneously.
[http://en.wikipedia.org/wiki/Mass_media]

Resource

_ADDRESS.WPG:
* https://opengov.ellak.gr/2017/09/11/methodi-chiragogisis-ton-mme/,

SPECIFIC

_SPECIFIC:
* cinema#cptItsoft240#
* internet#cptItsoft67#
* mobile-phone#cptItsoft284#
* radio#cptItsoft214#
* television

In the 2000s, a classification called the "seven mass media" became popular. In order of introduction, they are:
* Print (books, pamphlets, newspapers, magazines, etc.) from the late 15th century
* Recordings (gramophone records, magnetic tapes, cassettes, cartridges, CDs, DVDs) from the late 19th century
* Cinema from about 1900
* Radio from about 1910
* Television from about 1950
* Internet from about 1990
* Mobile phones from about 2000
[http://en.wikipedia.org/wiki/Mass_media]

tchInf.media.PRINT

_CREATED: {2012-11-18}

name::
* McsEngl.tchInf.media.PRINT@cptIt,
* McsEngl.print-tech@cptIt, {2012-11-18}
* McsEngl.tech.print@cptIt, {2012-11-18}
* McsEngl.tech.info.media.print@cptIt, {2012-11-18}

_DESCRIPTION:
Alternatively, print media use a physical object as a means of sending their information, such as a newspaper, magazines, comics,[1] books, brochures, newsletters, leaflets, and pamphlets.
[http://en.wikipedia.org/wiki/Mass_media]

_SPECIFIC:
* book_printed#ql:printed_book_cptresource#
* broshure
* comic
* leaflet
* magazine
* newsletter
* newspaper
* pamphlet

aait

FvMcs.techInfo'Eu-project

NAME

name::
* McsEngl.conceptIt3,
* McsEngl.techInfo'Eu-project@cptIt,
* McsEngl.FvMcs.techInfo'Eu-project@cptIt,
* McsEngl.EEC/EC/EU-IT-program@cptIt,
* McsEngl.eu'it-project@cptIt3, {2012-04-06}
* McsEngl.eu-project@cptIt,
* McsEngl.eu'project@cptIt3,
* McsEngl.project.eu.IT@cptIt3,
====== lagoGreek:
* McsElln.ΚΟΙΝΟΤΙΚΟ/ΕΟΚΙΚΟ-ΠΡΟΓΡΑΜΑ-ΠΛΗΡΟΦΟΡΙΚΗΣ-ΚΑΙ-ΤΗΛΕΠΙΚΟΙΝΩΝΙΩΝ@cptIt,
* McsElln.ΠΡΟΓΡΑΜΜΑΤΑ-ΠΛΗΡΟΦΟΡΙΚΗΣ-ΤΗΣ-ΕΟΚ@cptIt,

DEFINITION

ΕΕ ΠΤ ΕΡΓΟ ονομάζω κάθε ΕΡΓΟ#cptEconomy519# για 'πληροφοριακές τεχνολογίες' της ΕΕ.
[hmnSngo.1995-05]

Κάποιο πρόγραμμα/έργο πληροφορικής χρηματοδοτούμενο απο Ευρωπαϊκή ένωση και κάποια χώρα.

projectEuIt'GENERIC

_GENERIC:
organization investment#cptEconomy519#

projectEuIt'WHOLE

_WHOLE:
* sympan'societyHuman.european_union#cptCore13#
* ict-sector#cptEconomy38.28#
* techData#cptItsoft0#

projectEuIt'Managing

name::
* McsEngl.projectEuIt'Managing@cptIt,

projectEuIt'Goal

name::
* McsEngl.projectEuIt'Goal@cptIt,

projectEuIt'Producer

name::
* McsEngl.projectEuIt'Producer@cptIt,

projectEuIt'Budget

name::
* McsEngl.projectEuIt'Budget@cptIt,

projectEuIt'Time-interval

name::
* McsEngl.projectEuIt'Time-interval@cptIt,

projectEuIt'Market

name::
* McsEngl.projectEuIt'Market@cptIt,

320 ΕΚΑΤΟΜΥΡΙΑ ΚΑΤΑΝΑΛΟΤΕΣ.

SPECIFIC

projectEuIt.BRITE

name::
* McsEngl.projectEuIt.BRITE@cptIt,
* McsEngl.BRITE-eu-it-project@cptIt3i,

projectEuIt.DRIVE

name::
* McsEngl.projectEuIt.DRIVE@cptIt,
* McsEngl.DRIVE-eu-it-project@cptIt3i,

projectEuIt.APTITUDE

name::
* McsEngl.projectEuIt.APTITUDE@cptIt,
* McsEngl.APTITUDE-eu-it-project@cptIt3i,

ΕΡΓΟ ΤΟΥ RACE ΜΕ ΑΝΤΙΚΕΙΜΕΝΟ ΤΗΝ ΤΗΛΕΡΓΑΣΙΑ.

projectEuIt.ELOQUENT

name::
* McsEngl.projectEuIt.ELOQUENT@cptIt,
* McsEngl.ELOQUENT-eu-it-project@cptIt3i,

ELOQUENT ΕΙΝΑΙ ΕΝΑ ΦΙΛΟΔΟΞΟ ΚΟΙΝΟΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΠΟΥ ΠΕΡΙΛΑΜΒΑΝΕΙ ΓΡΗΓΟΡΗ ΚΑΙ ΟΛΟΚΛΗΡΩΜΕΝΗ ΕΚΜΑΘΗΣΗ ΕΠΤΑ ΓΛΩΣΣΩΝ ΧΩΡΩΝ-ΜΕΛΩΝ ΤΗΣ ΕΟΚ ΜΕ ΤΗ ΧΡΗΣΗ ΤΩΝ ΝΕΩΝ ΤΕΧΝΟΛΟΓΙΩΝ. ΟΙ ΓΛΩΣΣΕΣ ΕΙΝΑΙ ΕΛΛΗΝΙΚΑ, ΙΤΑΛΙΚΑ, ΓΕΡΜΑΝΙΚΑ, ΑΓΓΛΙΚΑ, ΙΣΠΑΝΙΚΑ, ΓΑΛΛΙΚΑ ΚΑΙ ΙΡΛΑΝΔΙΚΑ.
[HELLENEWS/ΕΞΠΡΕΣ, ΝΟΕΜ 1993, 3]

projectEuIt.ESPRIT

name::
* McsEngl.projectEuIt.ESPRIT@cptIt,
* McsEngl.esprit@cptIt2020,
* McsEngl.information-technologies-programme@cptIt,

_DESCRIPTION:
ΕSPRIT: ΕΥΡΩΠΑΙΚΟ ΣΤΡΑΤΗΓΙΚΟ ΠΡΟΓΡΑΜΜΑ ΓΙΑ ΤΗΝ ΕΡΕΥΝΑ ΚΑΙ ΤΗΝ ΑΝΑΠΤΥΞΗ ΣΤΙΣ ΤΕΧΝΟΛΟΓΙΕΣ ΤΗΣ ΠΛΗΡΟΦΟΡΙΑΣ.
ΤΟ ΜΕΓΑΛΥΤΕΡΟ ΚΟΙΝΟΤΙΚΟ ΕΡΕΥΝΗΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΠΛΗΡΟΦΟΡΙΚΗΣ.

_WHOLE:
4th Framework Programme,
===
Esprit forms part of the EU's Fourth Framework Programme, which runs from 1994 to 1998.
[http://www.cordis.lu/esprit/src/intro.htm]

ΠΕΡΙΟΧΕΣ ΔΡΑΣΤΗΡΙΟΤΗΤΑΣ
1) ΜΙΚΡΟΗΛΕΚΤΡΟΝΙΚΗ
2) ΤΕΧΝΟΛΟΓΙΑ ΣΥΣΤΗΜΑΤΩΝ ΛΟΓΙΣΜΙΚΟΥ
3) ΕΦΑΡΜΟΓΕΣ high performance computing and networking
4) Advanced business and home systems-peripherals. Multimedia
5) Computer integrated manufacturing and engineering
6) ΕΡΕΥΝΑ ΓΙΑ ΣΥΝΕΧΗ ΤΡΟΦΟΔΟΤΗΣΗ ΤΟΥ ΤΕΧΝΟΛΟΓΙΚΟΥ ΚΑΙ ΕΠΙΣΤΗΜΟΝΙΚΟΥ ΥΠΟΒΑΘΡΟΥ ΤΗΣ ΕΥΡΩΠΗΣ
7) Open microprocessor systems initiative (OMI).

ΔΙΕΥΘΥΝΤΗΣ (1993may18) ΕΞΕΛΕΓΗ Ο ΕΛΛΗΝΑΣ Γ. ΜΗΤΑΚΙΔΗΣ.

ESSI {European Systems Software Initiative} ΣΤΑ ΠΛΑΙΣΙΑ ΤΟΥ ESPRIT.

BUDGET#cptEconomy540.16#

... with a budget of ECU 2,035 million covering a five-year period and representing over 15% of the total budget for the FOURTH FRAMEWORK PROGRAMME.
Budget Breakdown:
- Technologies for businesss Processes 9%
- Long-term research 10%
- Multimedia systems 8%
- High Performance Computing and Networking 13%
- Technologies for Components and Subsystems 25%
- Open Microprocessor Systems Initiative 9%
- Integration in Manufacturing 12%
- Software technologies 14%
[esprit Bulding the Information Society, 1996]

MANAGEMENT

George Metakides, Director Esprit,
Esprit, the information technologies (IT) programme, is an integrated programme of industrial R&D projects and technology take-up measures. It is managed by DG III, the Directorate General for Industry of the European Commission.
[http://www.cordis.lu/esprit/src/intro.htm]

resourceInfHmn#cptResource843#

http://www.cordis.lu/esprit/home.html

projectEuIt.IMPACT

name::
* McsEngl.projectEuIt.IMPACT@cptIt,
* McsEngl.IMPACT-eu-it-project@cptIt3i,

ΑΝΑΚΟΙΝΩΘΗΚΕ ΠΡΟΣΚΛΗΣΗ ΓΙΑ ΓΕΩΓΡΑΦΙΚΑ ΠΛΗΡΟΦΟΡΙΑΚΑ ΣΥΣΤΗΜΑΤΑ.

projectEuIt.ORA {OPPORTUNITIES FOR RURAL AREAS}

name::
* McsEngl.projectEuIt.ORA {OPPORTUNITIES FOR RURAL AREAS}@cptIt,
* McsEngl.ORA-eu-it-project@cptIt3i,

MITRE:
ΕΡΓΟ ΤΟΥ ORA ΜΕ ΑΝΤΙΚΕΙΜΕΝΟ ΤΗΝ ΤΕΛΕΡΓΑΣΙΑ.

PATRA {PSYCHOLOGICAL ASPECTS OF TELEWORKING IN RURAL AREAS}
PATRA: ΕΡΓΟ ΤΟΥ ORA ΜΕ ΑΝΤΙΚΕΙΜΕΝΟ ΤΗΝ ΤΕΛΕΡΓΑΣΙΑ.

projectEuIt.SPRINT

name::
* McsEngl.projectEuIt.SPRINT@cptIt,
* McsEngl.SPRINT-eu-it-project@cptIt3i,

ΑΦΟΡΑ ΤΗ ΜΕΤΑΦΟΡΑ ΤΕΧΝΟΛΟΓΙΑΣ. ΠΡΟΑΓΕΙ ΤΗ ΔΗΜΙΟΥΡΓΙΑ ΚΑΙ ΤΗΝ ΑΝΑΠΤΥΞΗ ΔΙΚΤΥΩΝ ΓΙΑ ΤΗΝ ΤΕΧΝΟΛΟΓΙΚΗ ΣΥΝΕΡΓΑΣΙΑ ΑΝΑΜΕΣΑ ΣΤΙΣ ΕΠΙΧΕΙΡΗΣΕΙΣ.
Ο ΜΕΓΑΛΟΣ ΣΤΟΧΟΣ ΕΙΝΑΙ Η ΤΕΛΙΚΗ ΕΝΩΣΗ ΟΛΩΝ ΤΩΝ ΕΠΙΣΤΗΜΟΝΙΚΩΝ ΠΑΡΚΩΝ.

projectEuIt.STAR {Special Telecommunications Action for Regional development}

name::
* McsEngl.projectEuIt.STAR {Special Telecommunications Action for Regional development}@cptIt,
* McsEngl.STAR-eu-it-project@cptIt3i,

CREATION: 1986, 1500 mil. ECU, προκειμένου να αναβαθμιστεί η τηλεπικοινωνιακή υποδομή και να προωθηθεί η εισαγωγή Προημγένων τηλεπικοινωνιακών υπηρεσιών στις "λιγότερο ευνοημένες περιοχές της κοινότητας"

ΕΛΛΗΝΙΚΟ STAR:
195 εκ. ECU (100 EC).

ΤΗΛΕΜΑΤΙΚΗ: μπορεί να θεωρηθεί ως διάδοχος του STAR.

STAR-IT (STAR-ΙΔΙΩΤΙΚΟΥ ΤΟΜΕΑ)

εφαρμόστηκε τον οκτώβριο του 1991 με προϋπολογισμό 12,2 εκ. ECU.

ΕΡΓΑ ΠΟΥ ΥΛΟΠΟΙΗΘΗΚΑΝ ΣΤΟ ΠΛΑΙΣΙΟ ΤΟΥ STAR-IT:
1. Ηλεκτ. δίκτυο ΚΑΠΑ-ΤΕΛ, Δ&Γ ΚΑΛΟΦΩΛΙΑΣ,
2. Τράπεζα νομικών πληροφοριών ΝΟΜΟΣ#cptIt195.1#, jumlp195.1, DATABANK, INTRASOFT,
3. ΗΛΕΚΤΡΟΝΙΚΟ ΠΑΝΕΛΑΔΙΚΟ ΔΙΚΤΥΟ ΓΙΑ ΤΗΝ ΑΓΟΡΑ ΤΩΝ ΜΕΣΩΝ ΜΑΖΙΚΗΣ ΕΠΙΚΟΙΝΩΝΙΑΣ, A.G.B.
4. Αναβάθμιση Κέντρου Παροχής Ηλεκτρονικών Υπηρεσιών Πληροφόρησης για τον Τυπο, SPOT/THOMSON
5. COMPULINK, COMPUPRESS,
6. Κέντρο παροχής Υπηρεσιών Ηλ. πληροφόρησης, M.R.B.
7. Μελέτη και Πιλοτικό Δίκτυο Τουριστικής Εκμετάλευσης, ΤΕΜΗΚ.
8. Μελέτη Συστήματος διακίνησης μηνυμάτων φωνής. ABC.
9. Τηλεπικοινωνιακό σύστημα για την ανάπτυξη των εξαγωγών και την προώθηση της Συμμετοχής των ΜΜΕ στις Αγορές. ΕΝΑΛΜΕ.
10. ΤΗΛΕΕΙΚΟΝΟΓΡΑΦΙΑ ΣΤΟΝ ΤΟΥΡΙΣΜΟ, DIGITAL TECHNOLOGY HELLAS.
11. Τηλεργασία για ειδικές ανάγκες. ITEC.
12. Videotex Συνδέσμου, ΣΥΝΔΕΣΜΟΣ ΑΕ & ΕΠΕ.
13. Οφθαλμολογικό κέντρο τηλειατρικής. ΟΦΘΑΛΜΟΛΟΓΙΚΟ ΚΕΝΤΡΟ ΑΘΗΝΩΝ.
14. Τηλεμέτρηση μετρητων κοινης ωφελείας, ΜΑΡΑΚ- ΠΟΛΥΤΕΧΝΕΙΟ ΚΡΗΤΗΣ.
15. Τράπεζα πληροφοριών και σύστημα διακίνησης μηνυμάτων, ΣΥΝΔΕΣΜΟΣ ΕΛΛΗΝΙΚΩΝ ΓΡΑΦΕΙΩΝ ΜΕΛΕΤΩΝ.
16. Διαχειριση και παροχή τουριστικών πληροφοριών, INTRASOFT - ΠΕΡΙΦΕΡΕΙΑ ΚΡΗΤΗΣ.
17. Κεντρο παροχής πολλαπλης χρησης πληροφοριών, ΠΣΕ.
[COMPUTER GO, APRI 1994, 72]

projectEuIt.STRIDE

name::
* McsEngl.projectEuIt.STRIDE@cptIt,
* McsEngl.STRIDE-eu-it-project@cptIt3i,

SCRIPT

ΣΤΟ STRIDE HELLAS ΕΝΤΑΧΘΗΚΕ ΤΟ SCRIPT, ΠΟΥ ΣΤΟΧΕΥΕΙ ΣΤΗΝ ΚΑΤΑΣΚΕΥΗ ΕΝΟΣ ΟΛΟΚΛΗΡΩΜΕΝΟΥ ΠΕΡΙΒΑΛΛΟΝΤΟΣ ΓΙΑ ΤΗ ΣΥΛΛΟΓΗ, ΕΠΕΞΕΡΓΑΣΙΑ, ΑΡΧΕΙΟΘΕΤΗΣΗ, ΔΕΙΚΤΟΔΟΤΗΣΗ, ΑΝΑΚΛΗΣΗ ΚΑΙ ΕΚΔΟΣΗ ΚΕΙΜΕΝΩΝ ΚΑΙ ΕΙΚΟΝΩΝ ΣΕ ΟΠΤΙΚΟΥΣ ΔΙΣΚΟΥΣ.
ΑΝΑΔΟΧΟΣ ΕΙΝΑΙ ΤΟ ΙΤΥ, ΕΝΩ ΓΙΑ ΤΗ ΒΑΣΗ ΥΠΕΥΘΥΝΗ ΕΙΝΑΙ Η INTRASOFT.
-  ΜΕΤΑΣΧΗΜΑΤΙΖΕΙ ΤΙΣ ΕΝΤΥΠΕΣ ΠΛΗΡΟΦΟΡΙΕΣ ΚΑΙ ΦΩΤΟΓΡΑΦΙΕΣ ΣΕ ΣΥΜΠΙΕΣΜΕΝΑ ΓΡΑΦΙΚΑ.

ΧΑΡΤΟΓΡΑΦΗΣΗ ΔΗΜΩΝ:
ΚΑΤΩ ΑΠΟ ΤΟ ΠΛΑΙΣΙΟ-ΤΟΥ ΓΙΝΕΤΑΙ ΚΑΙ Η ΗΛΕΚΤΡΟΝΙΚΗ ΧΑΡΤΟΓΡΑΦΗΣΗ ΤΩΝ ΔΗΜΩΝ
ΠΕΙΡΑΙΑ,
ΝΙΚΑΙΑΣ,
ΚΕΡΑΤΣΙΝΙΟΥ,
ΠΕΡΑΜΑΤΟΣ,
ΔΡΑΠΕΤΣΩΝΑΣ
ΜΕ ΤΟ ΠΡΟΓΡΑΜΑ "ΓΕΩΓΡΑΦΙΚΑ ΣΥΣΤΗΜΑΤΑ ΠΛΗΡΟΦΟΡΙΩΝ". ΤΟ ΚΑΝΕΙ Η ΕΤΑΙΡΙΑ "ΑΝΑΠΤΥΞΙΑΚΗ ΔΗΜΩΝ ΠΕΙΡΑΙΑ ΑΝ.ΔΗ.Π. ΑΕ"
ΤΟ ΧΑΡΤΟΓΡΑΦΙΚΟ ΠΕΡΙΕΧΟΜΕΝΟ ΠΕΡΙΛΑΜΒΑΝΕΙ:
-ΡΥΜΟΤΟΜΙΚΕΣ ΚΑΙ ΟΙΚΟΔΟΜΙΚΕΣ ΓΡΑΜΕΣ ΑΠΟ ΧΑΡΤΕΣ 1:5000
-ΑΞΟΝΕΣ ΔΡΟΜΩΝ
-ΙΣΟΥΨΕΙΣ ΚΑΜΠΥΛΕΣ
-ΑΚΤΟΓΡΑΜΜΗ
-ΔΙΟΙΚΗΤΙΚΑ ΟΡΙΑ ΔΗΜΩΝ
-ΠΟΛΕΟΔΟΜΙΚΕΣ ΖΩΝΕΣ
-ΖΩΝΕΣ ΑΝΤΙΚΕΙΜΕΝΙΚΩΝ ΑΞΙΩΝ
-ΓΡΑΜΜΕΣ ΤΡΑΙΝΩΝ, ΑΣΤΙΚΩΝ ΣΥΓΚΟΙΝΩΝΙΩΝ
-ΤΟΠΟΓΡΑΦΙΚΑ ΣΤΟΙΧΕΙΑ.
ΕΠΙΣΗΣ ΠΑΝΩ ΣΤΑ ΧΑΡΤΟΓΡΑΦΙΚΑ ΣΤΟΙΧΕΙΑ ΕΝΤΑΣΣΟΝΤΑΙ ΑΡΙΘΜΗΣΗ ΚΑΙ ΟΝΟΜΑΤΟΛΟΓΙΑ ΟΔΩΝ, ΠΛΗΘΥΣΜΙΑΚΕΣ ΚΑΤΑΣΤΑΣΕΙΣ, ΠΛΗΡΟΦΟΡΙΕΣ ΚΤΗΡΙΩΝ, ΑΠΑΣΧΟΛΗΣΗ, ΚΑΤΑΓΡΑΦΗ ΔΗΜΟΤΙΚΗΣ ΠΕΡΙΟΥΣΙΑΣ Κ.Α.
[ΚΑΘΗΜΕΡΙΝΗ, 15 ΔΕΚΕ 1993, 7]

projectEuIt.TEDIS

name::
* McsEngl.projectEuIt.TEDIS@cptIt,
* McsEngl.TEDIS-eu-it-project@cptIt3i,

(Trade electronic data interchange systems). Σκοπος του ο συντονισμος της αναπτυξης συστηματων ηλεκτρονικης ανταλλαγης δεδομενων για το εμποριο, τη βιομηχανια και τη δημοσια διοικηση. τηλ 2357330.

projectEuIt.TELEMATIQUE/ΤΗΛΕΜΑΤΙΚΗ

name::
* McsEngl.projectEuIt.TELEMATIQUE/ΤΗΛΕΜΑΤΙΚΗ@cptIt,
* McsEngl.TELEMATIQUE-eu-it-project@cptIt3i,

ΤΗΛΕΜΑΤΙΚΗ: Συνεχεια του προγραμματος STAR. Σκοπος της η προωθηση της χρησης προηγμενων τηλεπικοινωνιακων υπηρεσιων στις λιγοτερο αναπτυγμενες περιοχες της κοινοτητας. τηλ 2359539.
ΣΥΝΟΛΙΚΟΣ ΠΡΟΥΠΟΛΟΓΙΣΜΟΣ ΤΟΥ ΕΛΛΗΝΙΚΟΥ ΠΡΟΓΡΑΜΑΤΟΣ 61 MECU ΜΕ ΚΟΙΝΟΤΙΚΗ ΣΥΜΜΕΤΟΧΗ ΝΑ ΞΕΠΕΡΝΑ ΤΑ 32 MECU.
H ΠΡΑΓΜΑΤΙΚΗ ΥΛΟΠΟΙΗΣΗ ΤΩΝ ΕΡΓΩΝ ΔΕΝ ΠΡΟΚΕΙΤΑΙ ΝΑ ΞΕΚΙΝΗΣΕΙ ΠΡΙΝ ΤΟ ΙΑΝΟΥΑΡΙΟ ΤΟΥ 1993.

FvMcs.techInfo'Exposition

NAME

name::
* McsEngl.conceptIt148,
* McsEngl.techInfo'Exposition@cptIt,
* McsEngl.FvMcs.techInfo'Exposition@cptIt,
* McsEngl.exposition.InfoTech@cptIt148,
* McsEngl.IT-EXPOSITION@cptIt,
* McsElln.ΕΚΘΕΣΕΙΣ@cptIt,
* McsElln.ΕΚΘΕΣΗ@cptIt,

DEFINITION

ΕΚΘΕΣΗ ΠΤ είναι παρουσίαση απο 'εταιρίες' 'πληροφοριακών τεχνολογιών'.
[hmnSngo.1995-05]

GENERIC

_GENERIC:
* exposition,
* techData-environment,

ENTITY#cptCore780#

_ENTITY:
* techData#cptItsoft0#

SPECIFIC

FOREIGN EXPOSITIONS

CEBIT

Η ΜΕΓΑΛΥΤΕΡΗ ΔΙΘΝΗ ΕΚΘΕΣΗ ΠΛΗΡΟΦΟΡΙΚΗΣ ΠΟΥ ΓΙΝΕΤΑΙ ΚΑΘΕ ΧΡΟΝΟ ΣΤΟ ΑΝΟΒΕΡΟ ΓΕΡΜΑΝΙΑΣ.

COMDEX

Η μεγαλύτερη έκθεση πληροφορικής στήν αμερική.

1993 fall: ΛΑΣ ΒΕΓΚΑΣ, 15η COMDEX/FALL'93, 15 NOVEMBER:
- 170.000 ΕΠΙΣΚΕΠΤΕΣ. 2200 ΕΚΘΕΤΕΣ, 7000 ΝΕΑ ΠΡΟΙΟΝΤΑ.
- ΑΝΑΓΝΩΡΙΣΗ ΦΩΝΗΣ:

COMTEK

ΜΟΣΧΑ 26-30 ΑΠΡΙΛΙΟΥ 1993.
ΜΕΓΑΛΑ ΟΝΟΜΑΤΑ.

MACWORLD

PC EXPO

Η 11 ΕΓΙΝΕ ΣΤΗ ΝΕΑ ΥΟΡΚΗ ΤΟΝ ΙΟΥΝΙΟ 1993. 300 ΕΤΑΙΡΙΕΣ.
[CGO, OCT 1993, 63]

GREEK EXPOSITION

AMTECH

6η 1993. ΔΙΟΡΓΑΝΩΤΗΣ ΤΟ ΕΛΛΗΝΟΑΜΕΡΙΚΑΝΙΚΟ ΕΜΠΟΡΙΚΟ ΕΠΙΜΕΛΗΤΗΡΙΟ.

CAD/CAM & GRAPHICS

2η 1992, Compupress A.E.

INFOSYSTEM; ΘΕΣΣΑΛΟΝΙΚΗ

ΕΜΠΕΙΡΙΑ

ΕΜΠΕΙΡΙΑ'93: ΓΙΑ 4 ΧΡΟΝΙΑ. ΖΑΠΕΙΟ 1/15 ΑΠΡΙΛΙΟΥ. ΓΙΑ ΤΟΝ ΚΟΣΜΟ ΤΗΣ APPLE.

FvMcs.techInfo'Impact-on-economy

NAME

name::
* McsEngl.conceptIt275,
* McsEngl.techInfo'Impact-on-economy@cptIt,
* McsEngl.FvMcs.techInfo'Impact-on-economy@cptIt,
* McsEngl.InfoTech-&-economy@cptIt,
* McsEngl.IT-&-economy/economic-system@cptIt,
* McsElln.ΠΛΗΡΟΦΟΡΙΑΚΕΣ-ΤΕΧΝΟΛΟΓΙΕΣ-&-ΟΙΚΟΝΟΜΙΑ@cptIt,

IMPACT on OrgProducer

MAGNITUDE

In 1958, Leavitt and Whisler predicted in an article in the Harvard Business Review that the advent of the computer and management science would significantly change the structure and processes of most corporations.
In addition, they suggested that the roles of top executives and others in the corporation would be significantly changed by this new technology.
During the quarter century since, Little has been published to suggest that they were right.
Most of the comentators who have summarized the evidence to date (for example, Hofer[1970]; and Bariff and Galbraith [1978]) have found some evidence of a few changes in some organizations, but, on the whole, there has been nothing to become excited about. No truly significant changes were observable.
[Rockart-et-al, 1984, 85#cptResource89]

CHANGE IN CUSTOMER/SUPPLIER RELATIONSHIP

Integrating the supplier-customer relationship provides an opportunity for competitive advantage. The best known examples of this are American Hospital Supply (AHS) and American Airlines (AA), which forged special relationships using creative applications of information technology...
AHS captured increased market share when it put its customers online with its order entry system...
AA's famous Sabre reservations system let travel agents schedule all airlines through the AA system...
[VINCENT,#cptResource108# 1990, 5#cptResource108]

THIRD REVOLUTION

After more than a century from conception to reality, the COMPUTER evolved rapidly in technological capability and in applications. It made possible a third industrial revolution based on cybernetics.
the FIRST industrial revolution substituted machine power for human, animal, and natural sources:
the SECOND brought forth mass production through the assembly line; and
the THIRD replaced human control of production processes with machine control. Operating on the feedbadk of data, machines could be guided, controlled, and corrected th the computer; the age of automation and robotics began.
[Wren, 1987, 407#cptResource127]

EVOLUTION#cptCore546.171#

{time.1977 USA:
In 1977 the US department of Commerce issued an extensive nine-volume report titled the INFORMATION ECONOMY, which shows that 46% of the GNP is linked to information-related activity, and that nearly half the labor-force works at some sort of information related job, earning 53% of labor income.
[Meltzer, 1981, 5#cptResource74]#

OTHER-VIEW#cptCore505#

Several authorities-- among them John Naisbitt, who wrote Megatrends, and Thomas Peter and Robert Waterman, authors of In Search of Excellence-- have noted the shift in the United States from an industrial economy to one of service and information.
[Mondy-et-al#cptResource80# 1991 20#cptResource80]

SPECIFIC

Specific_concepts (level 3) =

ΕΥΡΩΠΗ ΤΗΣ ΠΛΗΡΟΦΟΡΙΑΣ

FvMcs.techInfo'Worker

name::
* McsEngl.conceptIt6,
* McsEngl.techInfo'Worker@cptIt,
* McsEngl.FvMcs.techInfo'Worker@cptIt,
* McsEngl.IT-professional@cptIt,
* McsEngl.info-tech-people@cptIt,
* McsEngl.professional.InfoTech@cptIt,
* McsEngl.worker.infotech@cptIt,
* McsEngl.workforce.IT@cptIt,
* McsEngl.wkrIt@cptIt,
* McsElln.ΕΠΑΓΓΕΛΜΑΤΙΑΣ-ΠΛΗΡΟΦΟΡΙΑΚΗΣ-ΤΕΧΝΟΛΟΓΙΑΣ@cptIt,

DEFINITION

ΕΠΑΓΓΕΛΜΑΤΙΑ ΠΛΗΡΟΦΟΡΙΑΚΗΣ ΤΕΧΝΟΛΟΓΙΑΣ ονομάζω κάθε ΕΠΑΓΓΕΛΜΑΤΙΑ#cptEconomy364.1# της 'πληροφοριακής-τεχνολογιας#cptIt0.1#'.
[ΝΙΚΟΣ, ΝΟΕΜ. 1994]

wkrIt'GENERIC

_GENERIC:
* entity.whole.systemBio.organism.animal.human.worker#cptEconomy364#

wkrIt'WHOLE

_WHOLE:
* techData#cptItsoft0#

wkrIt'EVOLUTION#cptCore546.171#

name::
* McsEngl.wkrIt'EVOLUTION@cptIt,

By the end of the next decade, two-thirds of the people employed will be working with information.

LABOR UTILIZATION
     1700  1800  1900  1988  1995
agricalture    70  65  40  3  3
manufacturing    10  15  40  26  15
service    15  15  15  15  15
information    5  5  5  56  67
total      100  100  100  100  100
[VINCENT,#cptResource108# 1990, 7#cptResource108]

SPECIFIC

wkrIt.specific,

wkrIt.ANALYST

name::
* McsEngl.wkrIt.ANALYST@cptIt,

REQUIREMENTS ENGINERING is the activity of the software development where initial specifications are produced. We call analysts those who are in charged of RE.

wkrIt.DESIGNER

name::
* McsEngl.wkrIt.DESIGNER@cptIt,

wkrIt.INFORMATION-MANAGER

name::
* McsEngl.wkrIt.INFORMATION-MANAGER@cptIt,

A data processing manager is typically in charge of various computer specialists, such as
- system analysts,
- programmers,
- machine operators,
who support the system.
[Mondy-et-al, 1988, 187#cptResource80]

wkrIt.PROGRAMER

name::
* McsEngl.wkrIt.PROGRAMER@cptIt,

wkrIt.USER

name::
* McsEngl.wkrIt.USER@cptIt,

FvMcs.techInfo'Market

NAME

name::
* McsEngl.conceptIt86,
* McsEngl.techInfo'Market@cptIt,
* McsEngl.FvMcs.techInfo'Market@cptIt,
* McsEngl.information-technology-market@cptIt,
* McsEngl.it-market@cptIt86,
* McsEngl.it-spread@cptIt,
* McsEngl.market.InfoTech@cptIt,
====== lagoGreek:
* McsElln.ΑΓΟΡΑ-ΠΛΗΡΟΦΟΡΙΚΗΣ@cptIt,
* McsElln.ΕΞΑΠΛΩΣΗ@cptIt,

DEFINITION

Here, I confuse 'sector' and 'market=trade-system'.
[hmnSngo.2012-05-08]

Η ΠΟΣΟΤΗΤΑ στην οποία υπάρχει κάθε πληροφοριακή τεχνολογία, μάς δείχνει αυτό που λέμε ΑΓΟΡΑ για κάθε τέτοια τεχνολογία.

GENERIC

_GENERIC:
* market#cptEconomy74#
* measure#cptCore88#

WHOLE

_WHOLE:
* techData#cptItsoft0#

SPECIFIC

Specific_concepts (level 3) =

GREEK MARKET#cptItsoft200#

market.IT.GREEK

NAME

name::
* McsEngl.market.IT.GREEK@cptIt,
* McsEngl.conceptIt200,
* McsEngl.greek-it-market@cptIt,
* McsEngl.market.it.greek@cptIt200,
* McsElln.ΑΓΟΡΑ-ΠΛΗΡΟΦΟΡΙΚΗΣ-ΕΛΛΑΔΑΣ@cptIt,

DEFINITION

_DESCRIPTION:

measure#cptCore88#

ΒΙΟΜΗΧΑΝΙΕΣ, ΜΕΛΗ ΣΕΒ:
75% ΧΡΗΣΙΜΟΠΟΙΟΥΝ, 48% ΕΧΟΥΝ ΤΜΗΜΑ ΠΛΗΡΟΦΟΡΙΚΗΣ (1992)

ΒΙΟΜΗΧΑΝΙΕΣ ΜΕ <100 ΑΤΟΜΑ:
60% ΧΡΗΣΙΜΟΠΟΙΟΥΝ ΥΠΟΛΟΓΙΣΤΕΣ. (1992)

ΑΥΞΗΣΗ ΤΖΙΡΟΥ ΕΝΟΣ ΧΡΟΝΟΥ

1989-1992:
μεση αύξηση 23%
[ΒΗΜΑ 4 ΣΕΠΤ 1994, Δ11]

1993:
Η αύξηση ήταν 11,5%
[ΒΗΜΑ 4 ΣΕΠΤ 1994, Δ11]

ΙΣΟΛΟΓΙΣΜΟΣ ΕΠΙΧΕΙΡΗΣΕΩΝ

ΠΟΛΕΣ ΕΠΙΧΕΙΡΗΣΕΙΣ ΚΛΕΙΝΟΥΝ ΤΗ ΧΡΗΣΗ ΤΟ ΚΑΛΟΚΑΙΡΙ.

GREEK & EU

η συμβολή της αγοράς πληροφορικής στο ΑΕΠ της χώρας φθάνει μόλις το 38% του αντίστοιχου της ευρωπαϊκης ένωσης. Επιπλέον η ανα εργαζόμενο δαπάνη για πληροφορική είναι μόλις 15% της μέσης ευρωπαικής.
[ΒΗΜΑ, 4 ΣΕΠΤ. 1994, Δ11]

EVOLUTING#cptCore546.171#

HISTORY { *.MARKET.?/MARKET.?}

History#ql::ITH.NFO:[Group software.market.?]# {SOFTWARE.MARKET.?}

History#ql::ITH.NFO:[Group ec.? market.?]# {EC.? MARKET.?}

FvMcs.techInfo.info.AUDIO

NAME

name::
* McsEngl.conceptIt22,
* McsEngl.techInfo.info.AUDIO@cptIt,
* McsEngl.FvMcs.techInfo.info.AUDIO@cptIt,
* McsEngl.audio-infotech@cptIt,
* McsEngl.audio-technology@cptIt,
* McsEngl.audio'technology@cptIt22,
* McsEngl.InfoTech'sound@cptIt22,
* McsEngl.sound-Info-tech@cptIt,
* McsEngl.sound'technology@cptIt22,
* McsEngl.techAudio@cptIt22,
* McsEngl.tech.audio@cptIt22,

DEFINITION


techAudio'GENERIC

_GENERIC:
* entity.economic.satisfier.working.tech.info#cptItsoft0#

techAudio'CD-QUALITY AUDIO

name::
* McsEngl.techAudio'CD-QUALITY AUDIO@cptIt,

CD QUALITY:
16bit εγγραφη και αναπαραγωγη στα 44.1KHz

techAudio'EVOLUTION#cptCore546.171#

name::
* McsEngl.techAudio'EVOLUTION@cptIt,

2000:
* DTS,
* DOLBY HEADPHONES,
* DOLBY SURROUND PROLOGIC II,

1999:
* DOLBY DIGITAL SURROUND-EX,
* THX SURROUND-EX,

1997:
* DVD

1993:
* DTS,

1992:
* DOLBY DIGITAL:

1990:
* THX ULTRA
* THX SELECT

1987:
* DOLBY SURROUND, PROLOGIC

1986:
* DAT

1982:
* DOLBY SURROUND,
* CD PLAYER,
* THX,

1980:
* LASERDISC

1979:
* WALKMAN

1978:
* STEREO SURROUND,

1976:
* VHS,
* DOLBY STEREO,

1964:
* Κασσέτα ήχου,

1962:
* 1η Στερεοφωνική Ραδιοφωνική Μετάδοση (FM)

1955:
* Tadd-AO

1954:
* φορητό ραδιόφωνο

1952:
* cinerama

1948:
* μονοφωνικός δίσκος LP

1940:
* 1η πολυκάναλη ταινία (fantasia)

1931:
* ΣΤΕΡΕΟΦΩΝΙΚΗ ΗΧΟΓΡΑΦΗΣΗ

1928:
* 1η ΤΑΙΝΙΑ ΜΕ ΟΜΙΛΙΑ

1921:
1η ΡΑΔΙΟΦΩΝΙΚΗ ΜΕΤΑΔΟΣΗ (ΑΜ)

1887:
ΓΡΑΜΜΟΦΩΝΟ

1877:
ΦΩΝΟΓΡΑΦΟΣ

techAudio'MODE

name::
* McsEngl.techAudio'MODE@cptIt,

μονοφωνική, στερεοφωνικη.

SPECIFIC


* techAudio.specific,

_SPECIFIC:
* AUDIO-HARDWARE#cptIt40: attSpe#
* AUDIO-SOFTWARE#cptIt247: attSpe#
 * AUDIO-DATA(SIGNAL)#cptIt986: attSpe#
 * AUDIO-PROGRAM

techAudio.MICROPHONE

name::
* McsEngl.microphone@cptIt,

Q: What type of signal does a microphone capture?
Digital audio
25%
Electromagnetic waves
35%
Compression waves
28%
Binary audio data
12%
[http://www.techterms.com/ 2014-08-08]

FvMcs.techInfo.info.KNOWLEDGE

_CREATED: {2011-09-02}

name::
* McsEngl.conceptIt458,
* McsEngl.knowledge-technology@cptIt458, {2011-09-02}
* McsEngl.techKnowledge@cptIt458, {2011-09-02}
* McsEngl.techKno@cptIt458, {2011-09-02}
* McsElln.τεχνολογία-γνώσης@cptIt458, {2011-09-02}

techKno'DEFINITION

_DESCRIPTION:
It is data-technology on knowledge[458.1#cptIt458.1#]

techKno'GENERIC

_GENERIC:
* entity.economic.satisfier.working.tech.info#cptItsoft0#

techKno'ENVIRONMENT#cptCore756#

name::
* McsEngl.techKno'ENVIRONMENT@cptIt,

techKno'OTHER-VIEW#cptCore505#

name::
* McsEngl.techKno'OTHER-VIEW@cptIt,

techKno'Knowledge

name::
* McsEngl.techKno'Knowledge@cptIt,
* McsEngl.conceptIt458.1,
* McsEngl.digital-knowledge@cptIt458.1, {2011-09-02}
* McsEngl.kno@cptIt458.1, {2011-09-02}
* McsEngl.knowledge.digital@cptIt458.1, {2011-09-02}

_GENERIC:
* data#cptItsoft242#

_DESCRIPTION:
It is data other than text, hypertext, audio, picture.
[hmnSngo.2011-09-02]

techKno'Method#cptIt525#

name::
* McsEngl.techKno'Method@cptIt,

techKno'OrgProducing

name::
* McsEngl.techKno'OrgProducing@cptIt,
* McsEngl.knowledge-organization@cptIt458i,
* McsEngl.orgProducingKnowledge@cptIt458i,

_SPECIFIC:
* Autonomy#cptIt348#
* ctroo,

ctroo

name::
* McsEngl.ctroo@cptIt458i,

_DESCRIPTION:
Semantic Analysis Reinvented

Can a computer understand text like a human does? Current semantic analysis algorithms, that rely heavily on statistical models, ontologies and other surface level methods, surely cannot.

In order to truly understand text a computer needs to perform deep natural language analysis. It must grasp the main concepts and ideas, and understand which are more important than others.

CTROO has achieved this, by developing groundbreaking technology.

So can a computer understand text like a human does? Not yet, but at CTROO we
have come very close.
[http://corporate.ctroo.com/]
===
Ctroo's mission is to create tools to help navigate in the vast oceans of textual data that surround us.

It is one thing to organize the world's information, but it is a whole different story finding the information that matters.
How does on find relevant information? By understanding it, by knowing how to filter out the irrelevant pieces.

Since our inception in 2008 we have dedicated ourselves to providing the best deep semantic analysis solution.
A solution that can understand texts and discover relevant information wherever it may lie.

Our current products are testament to our technologies ability to greatly improve search result quality, and yet they
only represent a small fraction of the portfolio of products that can be created utilizing our breakthrough technological solution.
[http://corporate.ctroo.com/category/about]

ctroo'Resource

name::
* McsEngl.ctroo'Resource@cptIt,

_SPECIFIC:
* http://corporate.ctroo.com//

ctroo'Technology

name::
* McsEngl.ctroo'Technology@cptIt,

Technology

Ctroo has developed a state of the art semantic engine capable of deeply analyzing natural language texts. The semantic engine reads texts as a person would, extracting the main topics, key concepts and ideas at every point along the text.

The engine further analyzes the results recognizing named-entities such as person, location, currency and so forth, alongside more complex entities such as book and movie names. Once done, it grades the results constructing a map based on the importance of each result.

This basic information can then be used to create queries for search engines, ad servers, corporate databases etc.
In some cases query results can then filtered using the same technology to get the most up to date and relevant results.

The ability to programmatically comprehend the "key concepts” creates the building blocks to solve problems such as real time conversation analysis, text summarization, automatic document tagging, understanding natural language queries and much more.
[http://corporate.ctroo.com/category/technology]

ctroo'Textrata

name::
* McsEngl.ctroo'Textrata@cptIt,

_ADDRESS.WPG:
* https://chrome.google.com/webstore/detail/kbkhdhjklhhdkkjmhidmojggenkoeblm,

techKno'Program#cptIt497#

name::
* McsEngl.techKno'Program@cptIt,

techKno'System

_CREATED: {2011-09-06}

name::
* McsEngl.techKno'System@cptIt,
* McsEngl.conceptIt458.2,
* McsEngl.sysKno@cptIt458.2, {2011-09-07}
* McsEngl.systemDataKnowledge@cptIt458.2, {2011-09-07}
* McsEngl.systemKnowledge@cptIt458.2, {2011-09-07}

_GENERIC:
* entity.whole.system.it_human#cptItsoft180#

sysKno.SPECIFIC

name::
* McsEngl.sysKno.SPECIFIC@cptIt,

_SPECIFIC:
* decision-suport-system
* expert-system

SPECIFIC

name::
* McsEngl.techKno.specific@cptIt,

_SPECIFIC: techKno.Alphabetically:
* AI-tech#cptItsoft478#
* machine-learning--tech#cptItsoft358#
* machine-reasoning--tech#cptItsoft485#
* machine-translation--tech#cptItsoft57#
* natural-language-processing--tech#cptItsoft359#
* speech-recognition--tech#cptItsoft540#
* speech-to-text--tech#cptItsoft540#
* text-to-speech--tech#cptItsoft541#

FvMcs.techInfo.info.VIDEO

NAME

name::
* McsEngl.conceptIt509,
* McsEngl.techInfo.info.VIDEO@cptIt,
* McsEngl.FvMcs.techInfo.info.VIDEO@cptIt,
* McsEngl.video-infotech@cptIt509,
* McsEngl.video-technology@cptIt509,
* McsEngl.infotech.video@cptIt509,
* McsEngl.techVdo@cptIt, {2014-01-25}

GENERIC

_GENERIC:
* entity.economic.satisfier.working.tech.info#cptItsoft0#

FULL MOTION VIDEO

30 frames per second fps, 640x480 pixels

resourceInfHmn#cptResource843#

2002νοέμβριος:
ραμ: βίντεο

2001ιουνιος:
ραμ: mpeg-4

1999οκτώβριος:
ΡΑΜ: Βίντεο στο PC.

1998φεβρουάριος:
ΑΦΙΕΡΩΜΑ: VIDEO ΣΤΟ PC
[RAM 1998feb]

VIDEO-SIGNAL#ql:[Level CONCEPT:rl? conceptIt987];cptIt987: attPar#

SPECIFIC

_SPECIFIC:#ql:_GENERIC cptIt509#

_SPECIFIC:
* hardware-video-tech#cptIt38#
* program-video-tech#cptItsoft28#
* software-video-tech##

hardware-VIDEO

name::
* McsEngl.hardware-VIDEO@cptIt,
* McsEngl.conceptIt38,
* McsEngl.hardware.video@cptIt38,
* McsEngl.video-hardware@cptIt,
* McsEngl.video'hardware@cptIt38,

DEFINITION

GENERIC

_GENERIC:
Video-Technology#ql:[Level CONCEPT:rl? conceptIt509]##cptIt509#

ENVIRONMENT#cptCore756#

VIDEO-SOFTWARE#cptIt28#

SPECIFIC


CARD#ql:[Level CONCEPT:rl? conceptIt988]##cptIt988: attSpe#
DVD#ql:[Level CONCEPT:rl? conceptIt981]##cptIt981: attSpe#
LASERDISC#cptIt374: attSpe#
TV#cptIt216: attSpe#
 TELEVISION ADAPTER
VIDEO-PLAYER#cptIt382: attSpe#
VIDEOCAMERA#cptIt41: attSpe#

CABLE/ΚΑΛΩΔΙΟ

Composite τύπου RCA:
είναι ανάλογο με αυτό του ήχου, ξεχωριστό για κάθε κανάλι.

S-VIDEO:
στρογγυλό με συρματάκια και ένα πλαστικό που δείχνει πως να μπει. Σαν τα πληκτρολόγια των κομπιούτερ.

SCART:
Η θύρα αυτή είναι το ευρωπαϊκό πρότυπο, μοιάζει με παράλληλη στο κομπιούτερ.

FvMcs.techInfo.doing.AI

name::
* McsEngl.conceptIt478,
* McsEngl.ai@cptIt,
* McsEngl.ai-technology@cptIt478,
* McsEngl.artificial-intelligence-science@cptIt,
* McsEngl.artificial-intelligence-technology@cptIt,
* McsEngl.science.ai@cptIt478,
* McsEngl.tchInfAi,
* McsEngl.techAI@cptIt478, {2011-09-02}
* McsEngl.techKno-AI@cptIt,
* McsElln.ΤΕΧΝΗΤΗ-ΝΟΗΜΟΣΥΝΗ@cptIt,
* McsElln.ΤΕΧΝΗΤΗΣ ΝΟΗΜΟΣΥΝΗΣ ΕΠΙΣΤΗΜΗ@cptIt,
* McsElln.ΤΕΧΝΗΤΗΣ ΝΟΗΜΟΣΥΝΗΣ ΤΕΧΝΟΛΟΓΙΑ@cptIt,

Ever since the American computer scientist John McCarthy coined the term “Artificial Intelligence” in 1955, the public has imagined a future of sentient computers and robots that think and act like humans. But while such a future may indeed arrive, it remains, for the moment, a distant prospect.
[https://www.project-syndicate.org/commentary/computing-will-mimic-human-brain-by-bruno-michel-2016-06]

ai'DEFINITION

AI = automation of knowledge management.
[hmnSngo.2018-02-09]

AI is and the theories and the technology.
[Nikos]

"ARTIFICIAL INTELLIGENCE is the study of intelligence using the ideas and methods of computation. Unfortunately a definition of intelligence seems impossible at the moment because intelligence appears to be an amalgam of so many information-processing and information-representation abilities"
[Winston-et-al, 1990, foreword#cptResource112]

the field of artificial intelligence (AI), a branch of computer science that is aiming at computational models of human cognition.
[Natural Language Processing FAQ, D.R. Radev, 2000aug22]

The term Artificial Intelligence (AI) was first used by John McCarthy who used it to mean "the science and engineering of making intelligent machines".[1] It can also refer to intelligence as exhibited by an artificial (man-made, non-natural, manufactured) entity. While AI is the generally accepted term, others, including both Computational intelligence and Synthetic intelligence, have been proposed as potentially being "more accurate".[2] The terms strong and weak AI can be used to narrow the definition for classifying such systems. AI is studied in overlapping fields of computer science, psychology, philosophy, neuroscience, and engineering, dealing with intelligent behavior, learning, and adaptation and usually developed using customized machines or computers.

Research in AI is concerned with producing machines to automate tasks requiring intelligent behavior. Examples include control, planning and scheduling, the ability to answer diagnostic and consumer questions, handwriting, natural language, speech, and facial recognition. As such, the study of AI has also become an engineering discipline, focused on providing solutions to real life problems, knowledge mining, software applications, and strategy games like computer chess and other video games. One of the biggest difficulties with AI is that of "comprehension". Many devices have been created that can do amazing things, but critics of AI claim that no actual comprehension by the AI machine has taken place.
[http://en.wikipedia.org/wiki/Artificial_Intelligence]

"AI" is the field of computer science that seeks to understand and implement computer-based technology that can simulate the characteristics of human intelligence. A common goal of artificial intelligence work involves developing computer programs capable of learning from experience in order to solve problems.
"AI" refers to the development or capability of a machine that can proceed or perform functions that are normally concerned with human intelligence, such as learning, adapting, reasoning, self-correction, and automatic improvement.
[SOURCE: PC-GLOSSARY 1993]

Definition of Artificial Intelligence
In Unified Theories of Cognition, Allen Newell defines intelligence as: the degree to which a system approximates a knowledge-level system. Perfect intelligence is defined as the ability to bring all the knowledge a system has at its disposal to bear in the solution of a problem (which is synonymous with goal achievement). This may be distinguished from ignorance, a lack of knowledge about a given problem space.
Artificial Intelligence, in light of this definition of intelligence, is simply the application of artificial or non-naturally occurring systems that use the knowledge-level to achieve goals. A more practical definition that has been used for AI is attempting to build artificial systems that will perform better on tasks that humans currently do better. Thus, at present, tasks like real number division are not AI because computers easily do that task better (faster with less error) than humans. However, visual perception is AI since it has proved very difficult to get computers to perform even basic tasks. Obviously, this definition changes over time but it does capture the essential nature of AI questions.
[http://krusty.eecs.umich.edu/cogarch4/toc_defs/defs_theory/defs_ai.html] 1998feb16

AI is the field of information-technology#cptIt0.1# that attempts to simulate human cognitive processes, such as
- learning,
- reasoning,
- problem solving, and
- natural language communication.
[Mondy-et-al, 1988, 198#cptResource80]

AI is the capability of a machine to imitate intelligent [ability to learn and understand or to deal with new or trying situations] human behavior.
[Franklin Language Master 1991]

ai'GENERIC

_GENERIC:
* entity.economic.satisfier.working.tech.info#cptItsoft0#
* entity.model.information.system.weak.science#cptCore406#

ai'PART

_PART:
* image-understanding-technology
* KNOWLEDGE-MANAGEMENT-SYSTEM#cptIt497#
Mechanical-Learning#cptIt358#
Mechanical-Reasoning#cptIt485#
Natural-Language-Processing-Technology#cptIt359#
 Mechanical-Translation#cptIt57#
 Speech-To-Text-Technology/Speech-Recognition#cptIt540#
 Text-To-Speech#cptIt541#
SYMBOLIC AI-TECHNOLOGY
NON-SYMBOLIC AI-TECHNOLOGY

ai'ENVIRONMENT#cptCore756#

name::
* McsEngl.ai'ENVIRONMENT@cptIt,

AI and COMPUTER SCIENCE

AI is a field that overlaps with computer science rather than being a strict subfield. Different areas of AI are more closely related to psychology, philosophy, logic, linguistics, and even neurophysiology.
[internet] 1998may06

AI and Forlmal-Logic

Digital computers have always been thought of as electronic brains, but have yet to demonstrate much intelligent capability. Logic and mathematics are among the areas where computers can be expected to show truly intelligent capabilities first, and this will contribute to another revolution in how we use computers.
[internet] {1998-04-30}

ai'OTHER-VIEW#cptCore505#

name::
* McsEngl.ai'OTHER-VIEW@cptIt,

Meaning-based-computing

name::
* McsEngl.MBC@cptIt478i,
* McsEngl.meaning-based-computing@cptIt478i,

What is the meaning of meaning based computing?
By Tom Foremski | November 25, 2007, 8:50pm PST

Meaning based computing is one of the topics I discussed recently with Mike Lynch, head of Autonomy, the UK’s fastest growing software company.

Autonomy is in the search business but in a different way from that of Google or Yahoo or Microsoft. Autonomy’s software is aimed at the specific needs of enterprise search. And its technology can infer the “meaning” of content through a combination of statistical and other approaches.
[http://www.zdnet.com/blog/foremski/what-is-the-meaning-of-meaning-based-computing/216]

ai'doing

name::
* McsEngl.ai'doing@cptIt,

_ADDRESS.WPG:
* https://www.weforum.org/agenda/2016/04/this-microscope-uses-artificial-intelligence-to-detect-cancer-cells//

ai'doing.REASONING#cptIt485: attPar#

name::
* McsEngl.ai'doing.REASONING@cptIt,

ai'Task

name::
* McsEngl.ai'Task@cptIt,

Some AI Tasks
Human intelligence involves both ``mundane'' and ``expert'' reasoning.

By mundane reasoning I mean all those things which (nearly) all of us can routinely do (to various abilities) in order to act and interact in the world. This will include:
Vision: The ability to make sense of what we see.
Natural Language: The ability to communicate with others in English or another natural language.
Planning: The ability to decide on a good sequence of actions to achieve your goals. Robotics: The ability to move and act in the world, possibly responding to new perceptions.

By expert reasoning I mean things that only some people are good at, and which require extensive training. It can be especially useful to automate these tasks, as there may be a shortage of human experts. Expert reasoning includes:
Medical diagnosis.
Equipment repair.
Computer configuration.
Financial planning.
Expert Systems are concerned with the automation of these sorts of tasks.
AI research is concerned with automating both these kinds of reasoning. It turns out, however, that it is the mundane tasks that are by far the hardest to automate.
[alison Causey Fri Aug 19 10:42:17 BST 1994 ] 1998may06

ai'evaluation

name::
* McsEngl.ai'evaluation@cptIt,

_ADDRESS.WPG:
* http://www.matrix24.gr/2015/07/efarmogi-tis-google-anagnorise-ena-zevgari-mavron-os-goriles//

ai'Feasibility

name::
* McsEngl.ai'Feasibility@cptIt,

Is AI Possible?
Before we embark on a course in Artificial Intelligence, we should consider for a moment whether automating intelligence is really possible!
Artificial intelligence research makes the assumption that human intelligence can be reduced to the (complex) manipulation of symbols, and that it does not matter what medium is used to manipulate these symbols - it does not have to be a biological brain! This assumption does not go unchallenged among philosophers etc. Some argue that true intelligence can never be achieved by a computer, but requires some human property which cannot be simulated. There are endless philosophical debates on this issue (some on comp.ai.philosophy), brought recently to public attention again in Penrose's book.
The most well known contributions to the philosophical debate are Turing's ``Turing test'' paper, and Searle's ``Chinese room''. Very roughly, Turing considered how you would be able to conclude that a machine was really intelligent. He argued that the only reasonable way was to do a test. The test involves a human communicating with a human and with a computer in other rooms, using a computer for the communication. The first human can ask the other human/computer any questions they like, including very subjective questions like ``What do you think of this Poem''. If the computer answers so well that the first human can't tell which of the two others is human, then we say that the computer is intelligent.
Searle argued that just behaving intelligently wasn't enough. He tried to demonstrate this by suggesting a thought experiment (the ``Chinese room''). Imagine that you don't speak any Chinese, but that you have a huge rule book which allows you to look up chinese sentences and tells you how to reply to them in Chinese. You don't understand Chinese, but can behave in an apparently intelligent way. He claimed that computers, even if they appeared intelligent, wouldn't really be, as they'd be just using something like the rule book of the Chinese room.
Many people go further than Searle, and claim that computers will never even be able to appear to be really intelligent (so will never pass the Turing test). There are therefore a number of positions that you might adopt:

Computers will never even appear to be really intelligent, though they might do a few useful tasks that conventionally require intelligence. Computers may eventually appear to be intelligent, but in fact they will just be simulating intelligent behaviour, and not really be intelligent. Computers will eventually be really intelligent. Computers will not only be intelligent, they'll be concious and have emotions. My view is that, though computers can clearly behave intelligently in performing certain limited tasks, full intelligence is a very long way off and hard to imagine (though I don't see any findamental reason why a computer couldn't be genuinely intelligent.) However, these philosophical issues rarely impinge on AI practice and research. It is clear that AI techniques can be used to produce useful programs that conventionally require human intelligence, and that this work helps us understand the nature of our own intelligence. This is as much as we can expect from AI for now, and it still makes it a fascinating topic!
[alison Causey Fri Aug 19 10:42:17 BST 1994 ] 1998may06

ai'human

name::
* McsEngl.ai'human@cptIt,
* McsEngl.humanWkr.ai@cptIt,

_GENERIC:
* technologist#ql:hmn.technologist#

hmn.Hassabis.Demis

name::
* McsEngl.hmn.Hassabis.Demis@cptIt,
* McsEngl.Demis-Hassabis@cptIt,
* McsEngl.Hassabis.Demis@cptIt,
* McsEngl.human.Demis-Hassabis@cptIt,

_EMAIL:
* please contact my assistant Sarah-Jane Allen: sjallen@google.com

_ADDRESS.WPG:
* https://deepmind.com/join-us.html,
* http://demishassabis.com/contact//

ai'Knowledge-representation

name::
* McsEngl.ai'Knowledge-representation@cptIt,
* McsEngl.conceptIt478.1,
* McsEngl.brainepto'representation'language'in'ai@cptIt478.1,

_GENERIC
* COMPUTER_BRAINEPTO_REPRESENTATION_METHOD#

ai'Organization

name::
* McsEngl.ai'Organization@cptIt,

NRC National Reserach Center of CANADA

_CREATED: {1997-10-23}

name::
* McsEngl.NRC National Reserach Center of CANADA@cptIt,

IIT Institute for Information Technology

Integrated Reasoning Group

_CREATED: {1997-10-23}

name::
* McsEngl.Integrated Reasoning Group@cptIt,

The Integrated Reasoning Group performs research and development in the area of applied Artificial Intelligence. In particular we are interested in the problems which inhibit deployment of knowledge-based systems in modern corporate settings. In these organizations, information is typically available in large volumes, distributed, and represented in diverse forms. Knowledge is embodied in humans, documents, operating practices, and software.
[http://ai.iit.nrc.ca/IR_public/]

Artificial Intelligence Research Groups and Resources

ACM Special Interest Group on Artificial Intelligence (SIGART) : Information on sponsored conferences, comprehensive listing of international conferences and workshops, bulletin, jobs, journals and news, directory of AI societies and organisations, and related links.

American Association of Artificial Intelligence (AAAI)

Artificial Intelligence and Simulation of Behaviour, Society for the Study of (AISB) : The UK's largest and foremost Artificial Intelligence society. Quarterly newsletter, biennial conference, occasional financial support for specialist workshops and symposia, travel award scheme for young researchers, and special workshops for research students.

Association for Uncertainty in Artificial Intelligence (AUAI)

Australian National University (ANU) - Artificial Intelligence

Austrian Research Institute for Artificial Intelligence (OFAI) : Also see joint page with Medical Cybernetics and Artificial Intelligence at the University of Vienna (IMKAI) which includes an interactive library information system with bibliographic details of books, research papers, conference papers, journal articles from many subfields of artificial intelligence.

Bern - Computer Vision and Artificial Intelligence

Brown - Computer Science AI Research Lab : Eugene Charniak, Tom Dean, Leslie Kaelbling. Research in robotics and natural language.

Brunel - Artificial Intelligence

BUBL - Artificial Intelligence - Gopher Menu : Various AI-related mailing lists, Usenet groups, archives, databases, journals, and other information sources.

California-Irvine (UCI) - Machine Learning Group : UCI's repository of databases for machine learning research, digests of the Machine Learning List, programs (FOCL, Occam, and HYDRA) developed at UCI, and research papers.

Cambridge - Automated Reasoning Group

Cambridge - Logic Programming Group

Carnegie Mellon - Artificial Intelligence Repository : Public domain and freely distributable software, plus information about events, conferences and publications. The AI Programming Languages section includes directories for Common Lisp, Prolog, Scheme, Smalltalk, and other AI-related programming languages. The AI Software Packages section includes subdirectories for intelligent agent architectures, artificial life and complex adaptive systems, distributed ai, expert systems, fuzzy logic, genetic programming, knowledge representation, machine learning, neural networks, natural language processing, planning, reasoning, robotics, search, speech recognition and synthesis, vision, and many others.

Carnegie Mellon (CMU) - Computer Science and Artificial Intelligence Research Directory

Carnegie Mellon (CMU) - CADET Project : Case-based reasoning and electro-mechanical design.

Carnegie Mellon (CMU) - Machine Learning Course : Lecture slides and syllabus for CMU's fall 1994 course on Machine Learning, offered to upper-level undergraduates and graduate students.

Carnegie Mellon (CMU) - Oz Project : "Developing technology and art to help artists create high quality interactive drama, based in part on AI technologies. This especially means building believable agents in dramatically interesting micro-worlds."

Carnegie Mellon (CMU) - Prodigy Project : AI planning and learning system. Includes explanation-based learning, partial evaluation, experimentation, graphical knowledge acquisition, automatic abstraction and case-based reasoning. Jaime Carbonell.

Chicago - Artificial Intelligence Laboratory

City - Constraint Programming Archive : Bibliographies, papers, conferences, and external links on constraint programming and computational logics. Also FAQ for comp.constraints.

Colorado - Linguistic Geometry : Research on the development of syntactic tools for knowledge representation and reasoning about large-scale hierarchical complex systems, based on the broad application of the theory of formal languages and grammars. Boris Stilman.

Data Mining and Knowledge Discovery in Databases

Edinburgh - Artificial Intelligence

Edinburgh - Artificial Intelligence - FTP Directory of Research Papers

Edinburgh - Artificial Intelligence - Research : Machine vision, mathematical reasoning, mobile robots.

Edinburgh - Artificial Intelligence Applications Institute (AIAI)

European Association for Logic, Language and Information (FoLLI)

European Coordinating Committee for Artificial Intelligence (ECCAI)

European Inductive Logic Programming Pan-European Network (ILPNET) : Research at the intersection of machine learning and logic programming.

FISC (Financement Insertion en Sciences Cognitives) Mailing List - English or French : International mailing list devoted to jobs, post-docs and grants in cognitive science, interpreted broadly to include all disciplines covered by this resource guide. Highly recommended. Also see the most recent vacancies posted .

French National Institute for Research in Computer Science and Control (INRIA) - AI, Cognitive Sciences and Man-Machine Communication

Georgia Tech - Artificial Intelligence

Georgia Tech - Artificial Intelligence Abstracts

German National Research Centre for Computer Science (GMD) - Artificial Intelligence Research Division

German National Research Centre for Computer Science (GMD) - Machine Learning Group

German Research Centre for Artificial Intelligence (DFKI)

Hybrid and Integrated Systems - Special Interest Group

Hybrid Intelligent Systems Home Page : Maintained by Sumit Virman and Larry Medsker at American University (AU).

Illinois - Artificial Intelligence Group : Computer and robot vision, navigational schemes, knowledge representation, automated decision systems, deductive and inductive reasoning methods, analysis and generation of natural language, cognitive modelling and simulation, robotic motion, task planning, and plan execution/error recovery schemes.

Illinois - AI Group and Inductive Learning Group - Resource Page : Useful resources for AI researchers, especially those in machine learning.

Imperial Cancer Research Fund - Advanced Computation Laboratory (ACL) : The theory and application of logic programming and artificial intelligence to support the understanding of the biological bases of cancer, and improved methods for its prevention, diagnosis and treatment. Research projects include the integration of digital image processing and decision support systems, a generic technology for risk assessment and counselling, techniques and methodologies for cognitive modelling, symbolic decision theory for autonomous agents, argument construction for reasoning under uncertainty, and many others.

Innsbruck - Mathematics - Artificial Intelligence and Rational Aesthetics : Research on system theory, Walsh functions, differential equations, pilgrim step transformation, logic, geometry, didactics, theory of harmony of colours, artificial intelligence and rational aesthetics. Roman Rudolf Liedl.

Institut Dalle Molle d'Intelligence Artificielle Perceptive (IDIAP), Valais : Research on neural networks, computer vision, logic programming, optical character recognition, speaker verification and identification, speech recognition, uncertainty management in expert systems and other areas.

Institute for Logic, Language and Computation (ILLC), Amsterdam

Intelligent Hybrid Systems : Maintained by Sukhdev Khebbal and Suran Goonatilake at University Colllege London (UCL).

Iowa - Artificial Intelligence Research Group : Vasant Honavar and others, principally on symbolic/connectionist systems. Research papers available online.

Istituto Dalle Molle di Studi sull'Intelligenza Artificiale (IDSIA), Lugano Research on AI tools, robotics (execution, planning and learning of sensor-based activities), knowledge discovery, artificial life, linguistics and second language learning, reinforcement learning, evolutionary computation, neural networks and other areas.

Istituto per la Ricerca Scientifica e Tecnologica (IRST) - Knowledge Representation and Reasoning Group : Includes CRACK, an online description logics evaluator, and pointers to external AI, description logics, knowledge representation and ontology links.

Istituto per la Ricerca Scientifica e Tecnologica (IRST) / Genoa (DIST) / Trento (DISA) - Mechanized Reasoning Group - Technical Reports : Publications on knowledge representation, modal logics, reasoning with contexts, logics for multiagent belief and knowledge, interactive theorem proving, meta-level theorem proving, reasoning by abstraction, reasoning by analogy, planning and theory of planning.

Italian Association for Artificial Intelligence / Associazione Italiana per l'Intelligenza Artificiale (AI*IA)

Kaiserslautern - Algorithmic Learning Group : Research on algorithmic learning, computational learning, inductive inference, AI and other topics.

Knowledge Based Systems (KBS), Bibliography on Validation and Verification of : 160+ entry bibliography in BiBTeX format.

KEML - Knowledge Engineering Methods and Languages : Archive of the KEML mailing list, events and proceedings, papers, bibliographies, and external links to research groups and resources.

Knowledge Query and Manipulation Language (KQML) : A language and protocol for exchanging information and knowledge. Part of a larger effort, ARPA Knowledge Sharing Effort, which is aimed at developing techniques and methodology for building large-scale knowledge bases which are sharable and reusable.

Knowledge Representation : A list of projects, people, conferences and resources related to knowledge representation, automated reasoning and computational logics, maintained by Enrico Franconi at IRST.

Lancaster - Applied Artificial Intelligence / AI in Education Group : Research in the broad spectrum of theoretical AI - knowledge representation, human-computer interaction, cognitive modelling, expert systems and neural networks - and its application to realistic problems in industry, commerce and education.

Lausanne (EPFL) - Artificial Intelligence Laboratory (LIA) : Research on constraint satisfaction and constraint programming, case-based reasoning, software agents, model-based and qualitative reasoning, and natural language processing.

LIFIA - Laboratoire d'Informatique Fondamentale et d'Intelligence Artificielle : at the Informatique et Mathematique Appliquee de Grenoble (IMAG) Institute. Research in logics and automated deduction, knowledge bases, multi-agent paradigm for AI, neural nets, computer vision, robot programming, and mobile robotics.

Lockheed - Artificial Intelligence Center

Logic Programming : World-wide information on logic programming, Prolog and other languages. Maintained by Jonathan Bowen at Oxford.

London-Birkbeck College - Computer Science : Research in applied artificial intelligence.

London-Imperial College (ICL) - Computing : Research in advanced languages and architectures, logic programming, theory and formal methods.

London-King's College (KCL) - Image Processing Group

London-Queen Mary and Westfield College (QMW) - Distributed Artificial Intelligence Unit : Research and publications in distributed AI and agent-based computing, including social level characterisations of responsible agents, multi-agent negotiation, social reasoning and multi-agent rationality, formalising agent interactions, negotiation between intelligent agents, knowledge sharing and communication between disparate agencies, integration of goal generation and planning in agents with goal autonomy, coordinating agents for telecommunications applications, and information gathering agents.

Machine Intelligence Institute (MII) : Ronald Yager.

Machine Learning and Case-Based Reasoning : International index of researchers' home pages.

Machine Learning Databases and Domain Theories

Machine Learning Library in C++ (MLC++)

Machine Learning List (ML-LIST)

Manchester - Artificial Intelligence Group : Knowledge representation, reasoning, natural language, memory, learning and neural networks.

Maryland - Document Understanding Bibliography (DOCBIB) : Includes references in fields relating to document analysis and recognition, ie pattern recognition, image processing and computer vision.

Massachusetts (UMass) - Case-Based Reasoning Group

Massachusetts (UMass) - Distributed Artificial Intelligence Group : Research in multiple agent interaction, sensor interpretation, sound understanding, real-time scheduling, and resource-constrained scheduling.

Massachusetts (UMass) - Machine Learning Laboratory : Research on problem-solving systems, self-improving systems, automatic feature construction, apprentice learning and inductive generalization.

Massachusetts (UMass) - Resource-Bounded Reasoning Research Group : Research on the implications of limited computational resources on the design of intelligent agents, including decision theory, real-time planning, autonomous agent architectures and reasoning under uncertainty.

Michigan - Artificial Intelligence Laboratory : Research and publications on real time planning and control for unmanned ground vehicles, distributed intelligent agents, the Soar architecture and other topics.

Microsoft Research - Decision Theory Group : Probability theory, decision theory, Bayesian statistics, AI and decision analysis.

MIT - AI Laboratory : Home Page - projects, publications, people, events, library catalogues, computing resources and software, other MIT and network resources.

MIT - AI Laboratory Publications : Pointers to several resources for finding current and archived MIT AI Lab publications, including those unavailable online.

MIT - AI Laboratory On-Line Bibliography : Selected bibliography of MIT AI Lab publications containing only those publications and their abstracts which are available online in the FTP directory.

MIT - AI Laboratory Publications FTP server : All MIT AI Lab publications which are available online, organized by year of publication and publication number.

Monash - Artificial Intelligence

National Research Council of Canada (NRC) - Institute for Information Technology (IIT) - Artificial Intelligence Resources : Comprehensive resource including links to archives for news groups and mailing lists, bibliographies, books, companies, conferences, employment opportunities, FAQs, journals, locations, news groups, personal home pages, publishers, repositories and resource lists, search engines, societies and WAIS servers, and extensive subject index. Also see elsewhere under NRC IIT for individual resources.

New South Wales - Artificial Intelligence : Research in cognitive science, control applications, knowledge acquisition, machine learning, multi-agent problem solving, natural language understanding, neural networks, qualitative methods, robotics, vision and pattern recognition.

Northwestern - Institute for the Learning Sciences (ILS)

Nottingham - Artificial Intelligence Research Group Research and papers on knowledge-based systems, knowledge acquisition, autonomous agents, intelligent tutoring systems, planning, natural language understanding, cognitive modelling and associated tools, evolutionary simulation, adaptive behaviour, and artificial life.

Nottingham - Intelligent Tutoring Systems

Nottingham - Knowledge Acquisition

Nottingham - Knowledge-Based Systems

Nottingham - Machine Intelligence Group : Including timetable research, character and pattern recognition, constraint logic programming, and unification theory.

Nottingham - Planning

Oregon - Computational Intelligence Research Laboratory (CIRL) : Search, knowledge representation and reasoning. Matt Ginsberg on dynamic backtracking, planning, reasoning about action and nonmonotonic logics.

Ottawa - Knowledge Acquisition and Machine Learning Research Group (KAML)

Quadralay Corporation - Fuzzy Space : Fuzzy logic archive, including comp.ai.fuzzy FAQ, fuzzy systems tutorial, information on fuzzy expert systems and fuzzy environmental control.

Rochester - Computer Science (URCS) - Artificial Intelligence : Research projects include natural language dialogue and interactive planning, virtual reality, plausible inference, classification, and default logics, knowledge representation tools, and episodic logic.

Rochester - Computer Science (URCS) - AI Technical Reports : Planning, knowledge representation, temporal reasoning, discourse, natural language processing, cognitive modelling, genetic algorithms, reinforcement learning, vision, speech recognition, neural networks, supervised and unsupervised learning, embodiment, object recognition and other topics. James Allen, Dana Ballard, Graeme Hirst et al.

SRI International - Engineering Research : Links to Artificial Intelligence Center (AIC), Computer Science Laboratory (CSL), research groups in virtual perception, machine vision and robotics.

SRI International - Artificial Intelligence Center (AIC) : Research in natural language, perception, representation and reasoning.

Stanford - ARPA Knowledge Sharing Effort : Includes papers, public domain ontologies and software, and email archives including discussion on knowledge representation by Pat Hayes, John Sowa, John McCarthy, Tom Gruber and others.

Stanford - Artificial Intelligence And Robotics : Research on artificial intelligence and formal reasoning, expert systems, large knowledge bases, agent-based architectures, image understanding, robotics, machine learning, mathematical theory of computation, program synthesis and verification, natural language understanding, parallel architectures, design/manufacturing, and portable LISP systems.

Stanford - Center for Advanced Medical Informatics (CAMIS) - Research Groups : Past and current research, including project descriptions for MYCIN, EMYCIN, TEIRESIAS, AM, EURISKO and many other early expert systems.

Stanford - Formal Reasoning Group : Research on the analysis and development of formal reasoning in artificial intelligence. Includes link to John McCarthy's home page.

Stanford - Knowledge Systems Laboratory : Research on knowledge representation for shareable engineering knowledge bases and systems, computational environments for modelling physical devices, architectures for adaptive intelligent systems, and expert systems for science and engineering.

Stanford - Logic Group

Stanford - Nobotics : Modelling artificial agents and their environments. Emphasis on computational reasons for ascribing mental attitudes to machines, and on the relation between symbolic reasoning and sensory-motor activity. Yoav Shoham.

Sussex - Computing and Cognitive Sciences (COGS) : Interdisciplinary research in AI, philosophy, psychology and linguistics.

Texas - Artificial Intelligence Laboratory

Texas - Machine Learning Research Group : Research on combining empirical and knowledge-based learning techniques including applications such as natural language acquisition, problem solver speedup, diagnosis, qualitative modelling, and tutoring systems.

Texas - Qualitative Reasoning Research Group : Research and publications on qualitative reasoning about the physical world, spatial reasoning and intelligent robotics, resource-limited approaches to knowledge representation. Benjamin Kuipers.

ThoughtTreasure : Artificial intelligence program consisting of an English and French lexicon, ontology database, syntactic parser, surface semantic parser, anaphoric parser, text agents, planning agents, understanding agents, learning, tools/utilities, and applications. ANSI C source code and online book available. Erik Mueller.

Unified Computer Science Technical Reports Index

Vienna - Medical Cybernetics and Artificial Intelligence (IMKAI) : Also see joint page with the Austrian Research Institute for Artificial Intelligence (OFAI) which includes an interactive library information system with bibliographic details of books, research papers, conference papers, journal articles from many subfields of artificial intelligence.


Wales-Bangor - Computing as Compression : Research on the SP theory ie that all kinds of computing and formal reasoning may usefully be understood as information compression by pattern matching, unification and metrics-guided search. Relates to algorithmic information theory (AIT), minimum length encoding (MLE), machine learning, data mining, pattern recognition, deduction, abduction and case-based reasoning. Gerry Wolff.

Washington - Artificial Intelligence : Planning, machine learning.

Waterloo - Logic Programming and Artificial Intelligence Group (LPAIG)

Western Ontario - Cognitive Modelling and Machine Learning : Publications on symbolic modelling of cognitive tasks, inductive logic programming (ILP), and other topics in machine learning. Charles Ling.

Wisconsin - Artificial Intelligence : Jude Shavlick. Neural/symbolic hybrids. Also computer vision, robotics, machine learning, neural networks, deductive problem solving and expert systems. Research papers by FTP.

Yale - Artificial Intelligence Group : Research on problems in planning, vision, navigation, and manipulation that are central to the construction of intelligent autonomous systems. Current research projects include planning, reasoning and spatial mapping, realtime visual tracking, hand-eye coordination, distraction-proof contour tracking, incremental focus of attention, mobile robotics, vision-based grasping, obstacle avoidance, and colour tracking.

York - Intelligent Systems Group : Research and on-line publications on knowledge representation and reasoning, planning, natural language processing, requirements analysis, logic programming, causal and nonmonotonic reasoning, case-based reasoning, inductive learning, constraint solving and spatial and temporal reasoning. Also see separate research papers page.

Zurich (UNIZH) - Artificial Intelligence Laboratory : Interdisciplinary research and publications on the study of intelligence in natural and artificial systems, specialising in situated design and autonomous agent design. Neural network-based, biologically inspired robots. Rolf Pfeifer.
--------------------------------------------------------------------------------
Note that http://www.cs.ucl.ac.uk/misc/ai/ is the only stable permanent URL for this site. Please don't set up links to any other server (such as www-mice) displayed by your browser.
This page is maintained by Stephanie Warrick <S.Warrick@cs.ucl.ac.uk>. Updates and suggestions for additions are welcome from people engaged in academic or non-commercial scientific research.
... Interdepartmental guide to artificial intelligence, cognitive science, neuroscience and robotics research at University College London

ai'Project

name::
* McsEngl.ai'Project@cptIt,

ai'Program#cptIt497.6#

name::
* McsEngl.ai'Program@cptIt,

ai'resourceInfHmn#cptResource843#

name::
* McsEngl.ai'resourceInfHmn@cptIt,

_ADDRESS.WPG:
* https://www.weforum.org/agenda/2016/09/what-artificial-intelligence-will-look-like-in-2030??
* https://www.weforum.org/agenda/2016/06/5-ways-artificial-intelligence-will-disrupt-science??

Artificial Intelligence Repository (CMU).
The Artificial Intelligence Repository was established by Mark Kantrowitz in 1993 to collect files, programs and publications of interest to Artificial Intelligence researchers, educators, students, and practitioners.
http://www.cs.cmu.edu/Web/Groups/AI/html/repository.html

Artificial Intelligence Resources (IIT-NRC Canada).
These are some Internet Services that may be useful to AI researchers - Bibliographies, Conferences, FAQs, Journals, Laboratories and Organizations, Publishers.
http://ai.iit.nrc.ca/ai_point.html

G6G Directory of Intelligent Software
contains over 700 "Intelligent Software" product abstracts covering 15 advanced technology "corridors," i.e., Expert (Knowledge-Based) Systems; Fuzzy Logic; Hypermedia, Hypertext, and Multimedia; Intelligent Software Tools; Neural Networks; Object-Oriented Programming; Virtual Reality; Voice and Speech Systems; etc.
http://www.intelligent-dir.com/

European Coordinating Committee for Artificial Intelligence (ECCAI); the Electronic Transactions on Artificial Intelligence (ETAI) journal.
http://www.eccai.org/

International Joint Committee on Artificial Intelligence (IJCAI).
http://www.ijcai.org/

Stephnie Warrick page:
http://www.cs.ucl.ac.uk/misc/ai/,
S.Warrick@cs.ucl.ac.uk.

ai.EVOLUTING#cptCore546.171#

name::
* McsEngl.ai.EVOLUTING@cptIt,

{time.1972}:
=== DREYFUS CRITIQUE
Another influential critic was Hubert Dreyfus who in 1972 published What Computer's Can't Do: A Critique of Artificial Reason. From a basis in phenomenological philosophy, he pointed out a number of fundamental differences between computers and human beings: humans have consciousness, understand and tolerate ambiguous sentences, have bodily experiences that influence thinking; they have motives and drives, become tired or lose interest. Dreyfus argues that computer programmes cannot achieve any of these qualities.
[Peter Gardenfors. Cognitive science: from computers to anthills as models of human thought]

{time.1956}:
Artificial intelligence (AI) was founded as a distinct discipline at a 1956 conference.
[http://en.wikipedia.org/wiki/Cybernetics]

FvMcs.techInfo.doing.COMMUNICATING-(techCmn)

name::
* McsEngl.conceptIt244,
* McsEngl.techInfo.doing.COMMUNICATING-(techCmn)@cptIt,
* McsEngl.FvMcs.techInfo.doing.COMMUNICATING-(techCmn)@cptIt,
* McsEngl.CommTech@cptIt,
* McsEngl.comTech@cptIt244,
* McsEngl.commTech@cptIt244,
* McsEngl.COMMUNICATION technology@cptIt,
* McsEngl.communication-technology@cptIt244,
* McsEngl.it.communication@cptIt244,
* McsEngl.infotech.communication@cptIt244,
* McsEngl.technology.communication@cptIt244,
* McsEngl.techCmn@cptIt244, {2013-12-30}
* McsEngl.techComm@cptIt244, {2012-04-01}
* McsElln.ΤΗΛΕΠΙΚΟΙΝΩΝΙΕΣ@cptIt,
* McsElln.ΒΙΟΜΗΧΑΝΙΑ ΤΗΛΕΠΙΚΟΙΝΩΝΙΑΚΩΝ ΠΡΟΙΟΝΤΩΝ ΚΑΙ ΥΠΗΡΕΣΙΩΝ@cptIt,
* McsElln.ΤΕXΝΟΛΟΓΙΑ-ΕΠΙΚΟΙΝΩΝΙΩΝ@cptIt244,

DEFINITION

ΤΕΧΝΟΛΟΓΙΑ ΕΠΙΚΟΙΝΩΝΙΩΝ είναι κάθε ΤΕΧΝΟΛΟΓΙΑ-ΠΛΗΡΟΦΟΡΙΩΝ#cptIt0.1# με την οποια γίνεται ή η ιδια κάνει μεταφορά πληροφορίας.
[ΝΙΚΟΣ, ΣΕΠΤ. 1994]

INFORMATION HANDLING TECHNOLOGY is any technology that deals with HUMAN-INFORMATION#cptIt221# but it can not automatically process this information to create new one.
[NIKOS, OCT 1993]

H βασική λειτουργία αυτής της τεχνολογίας είναι η επικοινωνία.

TechCmn'GENERIC

_GENERIC:
* entity.economic.satisfier.working.tech.info#cptItsoft0#

TechCmn'connection#cptIt168#

name::
* McsEngl.TechCmn'connection@cptIt,

TechCmn'error

NAME

name::
* McsEngl.TechCmn'error@cptIt,
* McsEngl.conceptIt12,
* McsEngl.tech-communication-error@cptIt,
====== lagoGreek:
* McsElln.ΣΦΑΛΜΑ-ΤΕΧΝΟΛΟΓΙΑΣ-ΕΠΙΚΟΙΝΩΝΙΑΣ@cptIt,

DEFINITION

"ΣΦΑΛΜΑ ΣΤΗ ΜΕΤΑΔΟΣΗ ΔΕΔΟΜΕΝΩΝ ΟΝΟΜΑΖΟΥΜΕ ΤΗΝ ΑΘΕΛΗΤΗ ΑΛΛΑΓΗ ΤΗΣ ΤΙΜΗΣ ΚΑΠΟΙΟΥ bit, ΤΗΝ ΕΞΑΦΑΝΙΣΗ ή ΚΑΙ ΤΗΝ ΠΡΟΣΘΕΣΗ ΜΠΙΤ ΣΤΟ block ΜΕΤΑΔΟΣΗΣ"
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 62#cptResource223]

ΑΓΝΟΗΣΗ

ΑΝΑΓΝΩΡΙΣΗ ΑΠΟ ΤΟ ΔΕΚΤΗ


 PARITY/ΙΣΟΤΙΜΙΑ#cptIt92#
 ΔΙΔΙΑΣΤΑΤΕΣ ΤΕΧΝΙΚΕΣ ΕΛΕΓΧΟΥ ΙΣΟΤΙΜΙΑΣ
 ΚΥΚΛΙΚΟΙ ΚΩΔΙΚΕΣ
 ΚΩΔΙΚΕΣ ΣΤΑΘΕΡΟΥ ΛΟΓΟΥ

PARITY

name::
* McsEngl.conceptIt92,
* McsEngl.parity-error-control@cptIt,
====== lagoGreek:
* McsElln.ΙΣΟΤΙΜΙΑ-ΕΛΕΓΧΟΣ-ΛΑΘΩΝ@cptIt,

_DESCRIPTION:
Ειναι ένας τρόπος ελέγχου λαθών κατα τη μετάδοση των δεδομένων. Ενα μπιτ που δεν ανήκει στα δεδομένα, αλλά προστίθεται σε καθε μπάιτ για να κάνει το άθροισμα των μπιτς παντα μονό, ή πάντα ζυγό.
===
ΧΡΗΣΙΜΟΠΟΙΕΙΤΑΙ ΚΥΡΙΩΣ ΣΤΗΝ ΑΣΥΓΧΡΟΝΗ ΜΕΤΑΔΟΣΗ ΚΑΙ ΕΝ ΓΕΝΕΙ ΕΙΝΑΙ ΧΡΗΣΙΜΗ ΕΚΕΙ ΠΟΥ Η ΕΦΑΡΜΟΓΗ ΔΕΝ ΕΙΝΑΙ ΚΑΙ ΤΟΣΟ ΑΠΑΙΤΗΤΙΚΗ.
Η ΤΕΧΝΙΚΗ ΑΥΤΗ ΑΝΑΓΝΩΡΙΖΕΙ ΤΟΝ ΠΕΡΙΤΤΟ ΑΡΙΘΜΟ ΣΦΑΛΜΑΤΩΝ ΟΧΙ ΑΡΤΙΟ ΑΡΙΘΜΟ ΣΦΑΛΜΑΤΩΝ.

ΑΝΑΓΝΩΡΙΣΗ ΚΑΙ ΔΙΟΡΘΩΣΗ ΟΤΑΝ ΓΙΝΟΝΤΑΙ ΑΝΤΙΛΗΠΤΑ


 ΥΠΟΚΑΤΑΣΤΑΣΗ ΣΥΜΒΟΛΟΥ
 BACKWARD ERROR CORRECTION - ARQ
 FORWARD ERROR CORRECTION - FEC

ΑΝΤΙΜΕΤΩΠΙΣΗ-ΣΦΑΛΜΑΤΩΝ

name::
* McsElln.ΑΝΤΙΜΕΤΩΠΙΣΗ-ΣΦΑΛΜΑΤΩΝ@cptIt,

Μεθοδοι διόρθωσης λαθών:
MNP,
CCIT V.42,
ARQ.

ΠΡΕΠΕΙ ΝΑ ΓΝΩΡΙΖΟΥΜΕ ΕΞ ΑΡΧΗΣ ΟΤΙ ΓΙΑ ΝΑ ΕΠΙΤΥΧΟΥΜΕ ΤΗΝ ΑΝΑΓΝΩΡΙΣΗ ΤΩΝ ΣΦΑΛΜΑΤΩΝ, ΕΙΜΑΣΤΕ ΥΠΟΧΡΕΩΜΕΝΟΙ ΝΑ ΧΡΗΣΙΜΟΠΟΙΗΣΟΥΜΕ ΠΡΟΣΘΕΤΑ ΜΠΙΤ ΑΠΟ ΑΥΤΑ ΤΗΣ ΚΑΘΑΡΗΣ ΠΛΗΡΟΦΟΡΙΑΣ.

ΡΥΘΜΟΣ-ΕΜΦΑΝΙΣΗΣ-ΣΦΑΛΜΑΤΩΝ

name::
* McsElln.ΡΥΘΜΟΣ-ΕΜΦΑΝΙΣΗΣ-ΣΦΑΛΜΑΤΩΝ@cptIt,

BER {Bit error rate}
BLER {Block error rate}
- ΓΙΑ ΔΕΔΟΜΕΝΗ ΓΡΑΜΜΗ, Ο ΡΥΘΜΟΣ ΑΥΞΑΝΕΙ ΟΣΟ ΥΨΗΛΟΤΕΡΟΣ ΕΙΝΑΙ Ο ΡΥΘΜΟΣ ΜΕΤΑΔΟΣΗΣ.

TechCmn'doing.FUNCTION

NAME

name::
* McsEngl.TechCmn'doing.FUNCTION@cptIt,
* McsEngl.conceptIt53,
* McsEngl.communicating.data@cptIt53, {2011-09-08}
* McsEngl.communication-function@cptIt,
* McsEngl.function.communication@cptIt53,

* McsElln.ΛΕΙΤΟΥΡΓΙΑ-ΕΠΙΚΟΙΝΩΝΙΑΣ@cptIt,

DEFINITION

ΛΕΙΤΟΥΡΓΙΑ ΕΠΙΚΟΙΝΩΝΙΑΣ είναι ΛΕΙΤΟΥΡΓΙΑ-ΠΤ#cptIt246.1# με την οποία συντελείται ΕΠΙΚΟΙΝΩΝΙΑ ΠΛΗΡΟΦΟΡΙΩΝ.
[hmnSngo.1995-05]

GENERIC

_GENERIC:
* info-tech-function#cptItsoft0.2#

MANtoMAN-COMMUNICATION#cptCore717#

measure#cptCore88#

Σύμφωνα με στοιχεία της Διεθνούς Ενωσης Τηλεπικοινωνιών το 75% του πληθυσμού της Γης ακόμη χρησιμοποιεί μόνον το 12% των παραγομένων παγκοσμίως τηλεπικοινωνιακών ΥΠΗΡΕΣΙΩΝ.
[ΚΑΘΗΜΕΡΙΝΗ, 27 ΝΟΕΜ. 1994, 63]

TechCmn'frequency#cptCore1013: attPar#

name::
* McsEngl.TechCmn'frequency@cptIt,

TechCmn'importance#cptCore781#

name::
* McsEngl.TechCmn'importance@cptIt,

_DESCRIPTION:
As in the past, the nations which have the best communication facilities may have the highest ECONOMIC GROWTH.
The corporations which have the best electronic communications may surpass their competition.
[Martin, 1990, #cptResource134]

"ΔΙΕΘΝΗΣ ΕΙΝΑΙ ΑΥΤΗ ΤΗ ΣΤΙΓΜΗ Η ΑΝΑΓΝΩΡΙΣΗ ΟΤΙ ΟΙ ΤΗΛΕΠΙΚΟΙΝΩΝΙΕΣ ΕΙΝΑΙ ΙΣΩΣ Η ΠΙΟ ΚΡΙΣΙΜΗ ΠΕΡΙΟΧΗ ΤΟΥ ΝΕΥΡΙΚΟΥ ΣΥΣΤΗΜΑΤΟΣ ΤΗΣ ΜΟΝΤΕΡΝΑΣ ΚΟΙΝΩΝΙΑΣ, ΤΗΣ ΚΟΙΝΩΝΙΑΣ ΜΕΤΑ ΤΟ 2000."
[COMPUTER GO, DEC 1992, 213]

TechCmn'mode-of-transfer

name::
* McsEngl.TechCmn'mode-of-transfer@cptIt,

TechCmn'model

name::
* McsEngl.TechCmn'model@cptIt,

ΣΕ ΕΝΑ ΜΟΝΤΕΛΟ ΕΠΙΚΟΙΝΩΝΙΩΝ ΔΕΔΟΜΕΝΩΝ ΠΕΡΙΛΑΜΒΑΝΟΝΤΑΙ:
Η ΠΗΓΗ ΤΗΣ ΠΛΗΡΟΦΟΡΙΑΣ
Η ΜΟΝΑΔΑ ΚΩΔΙΚΟΠΟΙΗΣΗΣ ΚΑΙ ΜΕΤΑΤΡΟΠΗΣ ΤΗΣ ΠΛΗΡΟΦΟΡΙΑΣ ΣΕ ΜΟΡΦΗ ΚΑΤΑΛΛΗΛΗ ΓΙΑ ΤΟ ΣΥΣΤΗΜΑ ΜΕΤΑΔΟΣΗΣ,
Η ΜΟΝΑΔΑ ΕΚΠΟΜΠΗΣ ΤΗΣ ΔΙΑΜΟΡΦΩΜΕΝΗΣ ΠΛΕΟΝ ΠΛΗΡΟΦΟΡΙΑΣ,
ΤΑ ΜΕΣΑ ΜΕΤΑΔΟΣΗΣ
Η ΜΟΝΑΔΑ ΛΗΨΗΣ ΤΗΣ ΠΛΗΡΟΦΟΡΙΑΣ
Η ΜΟΝΑΔΑ ΑΠΟΚΩΔΙΚΟΠΟΙΗΣΗΣ
Η ΜΟΝΑΔΑ ΠΑΡΟΥΣΙΑΣΗΣ ΤΗΣ ΠΛΗΡΟΦΟΡΙΑΣ ΣΤΗ ΛΗΨΗ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 25#cptResource223]

TechCmn'polling

NAME

name::
* McsEngl.TechCmn'polling@cptIt,
* McsEngl.conceptIt165,
* McsEngl.polling@cptIt165,

DEFINITION

Μια μέθοδος ΕΛΕΓΧΟΥ ΕΠΙΚΟΙΝΩΝΙΑΚΗΣ ΑΚΟΛΟΥΘΙΑΣ συσκευών επικοινωνίας σε ένα κοινό κύκλωμα, στέλνοντας μία αίτηση σε καθε συσκευή, ερωτώντας αν θέλει να μεταδώσει.

ΤΟ POLLING ΕΙΝΑΙ ΟΥΣΙΑΣΤΙΚΑ ΜΗΝΥΜΑ ΠΡΟΣΚΛΗΣΗΣ ΠΟΥ ΣΤΕΛΝΕΤΑΙ ΑΠΟ ΤΟ MASTER ΣΕ ΚΑΘΕ ΕΝΑΝ ΑΠΟ ΤΟΥΣ ΣΤΑΘΜΟΥΣ SLAVE ΚΑΙ ΤΟΥΣ ΖΗΤΑ ΝΑ ΤΟΥ ΜΕΤΑΔΩΣΟΥΝ ΔΕΔΟΜΕΝΑ. Ο SLAVE ΕΙΝΑΙ ΥΠΟΧΡΕΩΜΕΝΟΣ ΝΑ ΑΠΑΝΤΗΣΕΙ ΣΤΟ MASTER ΕΙΤΕ ΣΤΕΛΝΟΝΤΑΣ ΜΗΝΥΜΑΤΑ (ΑΝ ΕΧΕΙ), ΕΙΤΕ ΑΠΛΩΣ ΑΠΑΝΤΩΝΤΑΣ ΑΡΝΗΤΙΚΑ, ΕΝΗΜΕΡΩΝΟΝΤΑΣ ΤΟΝ ΟΤΙ ΕΛΑΒΕ ΤΗΝ ΠΡΟΣΚΛΗΣΗ-ΤΟΥ ΑΛΛΑ ΔΕΝ ΕΧΕΙ ΔΕΔΟΜΕΝΑ ΠΡΟΣ ΑΠΟΣΤΟΛΗ.

ΤΟ SELECT ΕΙΝΑΙ ΕΝΑ ΜΗΝΥΜΑ ΤΟΥ MASTER ΠΡΟΣ ΚΑΠΟΙΟΝ ΑΠΟ ΤΟΥΣ SLAVE ΜΕ ΤΟ ΟΠΟΙΟ ΤΟΝ ΡΩΤΑ ΑΝ ΕΙΝΑΙ ΕΤΟΙΜΟΣ ΝΑ ΔΕΧΘΕΙ ΔΕΔΟΜΕΝΑ ΠΟΥ Ο MASTER ΕΧΕΙ ΕΤΟΙΜΑ ΓΙΑ ΑΠΟΣΤΟΛΗ ΠΡΟΣ ΑΥΤΟΝ.

TechCmn'signal

NAME

name::
* McsEngl.TechCmn'signal@cptIt,
* McsEngl.conceptIt25,
* McsEngl.signal@cptIt25,
* McsElln.ΣΗΜΑ@cptIt25,

signal'DEFINITION

name::
* McsEngl.signal'DEFINITION@cptIt,

In the fields of communications, signal processing, and in electrical engineering more generally, a signal is any time-varying quantity. Signals are often scalar-valued functions of time (waveforms), but may be vector valued and may be functions of any other relevant independent variable.
The concept is broad, and hard to define precisely. Definitions specific to subfields are common.
[http://en.wikipedia.org/wiki/Signal_%28information_theory%29]

signal'GENERIC

_GENERIC:
data#cptCore181.62#

signal'modulation

name::
* McsEngl.signal'modulation@cptIt,
* McsEngl.conceptIt31,
* McsEngl.signal-modulation@cptIt,
* McsEngl.signal'modulation@cptIt31,
* McsElln.ΤΕΧΝΙΚΕΣ-ΜΕΤΑΔΟΣΗΣ-ΔΕΔΟΜΕΝΩΝ@cptIt,

ΔΙΑΜΟΡΦΩΣΗ

Η ΕΠΑΞΕΡΓΑΣΙΑ ΤΟΥ ΣΗΜΑΤΟΣ ΠΛΗΡΟΦΟΡΙΑΣ ΠΟΥ ΤΟ ΚΑΘΙΣΤΑ ΚΑΤΑΛΛΗΛΟ ΓΙΑ ΔΙΕΛΕΥΣΗ ΑΠΟ ΤΟ ΚΑΝΑΛΙ.
ΤΟ ΔΙΑΜΟΡΦΩΜΕΝΟ ΣΗΜΑ ΕΙΝΑΙ ΑΥΤΟ ΠΟΥ ΜΕΤΑΔΙΔΕΤΑΙ ΤΕΛΙΚΑ ΜΕΣΑ ΑΠΟ ΤΟ ΚΑΝΑΛΙ ΕΠΙΚΟΙΝΩΝΙΑΣ ΚΑΙ ΕΧΕΙ ΑΝΑΛΟΓΙΚΗ ή ΨΗΦΙΑΚΗ ΜΟΡΦΗ.

ΦΟΡΕΑΣ

ΦΟΡΕΑΣ ΟΝΟΜΑΖΕΤΑΙ ΕΝΑ ΗΜΙΤΟΝΙΚΟ ΣΥΝΗΘΩΣ ΣΗΜΑ ΜΕ ΣΥΧΝΟΤΗΤΑ ΥΨΗΛΟΤΕΡΗ ΑΠΟ ΑΥΤΗ ΤΟΥ ΣΗΜΑΤΟΣ-ΠΛΗΡΟΦΟΡΙΑΣ, ΤΕΤΟΙΑ ΩΣΤΕ ΝΑ ΜΠΟΡΕΙ ΝΑ ΔΙΕΛΘΕΙ ΑΠΟ ΤΟ ΚΑΝΑΛΙ ΜΕΤΑΔΟΣΗΣ. Ο ΦΟΡΕΑΣ ΕΙΝΑΙ ΣΤΗΝ ΟΥΣΙΑ ΤΟ ΜΕΤΑΦΟΡΙΚΟ ΜΕΣΟ ΤΟΥ ΣΗΜΑΤΟΣ ΠΛΗΡΟΦΟΡΙΑΣ.
ΤΟ ΧΡΗΣΙΜΟ ΣΗΜΑ, Η ΠΛΗΡΟΦΟΡΙΑ ΔΗΛΑΔΗ, ΔΙΑΜΟΡΦΩΝΕΙ ΤΟ ΦΟΡΕΑ ΕΠΗΡΕΑΖΟΝΤΑΣ ΚΑΠΟΙΟ ΧΑΡΑΚΤΗΡΙΣΤΙΚΟ-ΤΟΥ ΟΠΩΣ ΤΟ ΠΛΑΤΟΣ, Η ΣΥΧΝΟΤΗΤΑ ή Η ΦΑΣΗ ΤΟΥ.
Ο ΔΕΚΤΗΣ ΑΠΟ ΤΗΝ ΑΛΛΗ ΠΛΕΥΡΑ ΑΠΟΔΙΑΜΟΡΦΩΝΕΙ ΤΟ ΦΟΡΕΑ, ΕΞΑΓΟΝΤΑΣ ΤΟ ΧΡΗΣΙΜΟ ΣΗΜΑ.

SPECIFIC

Specific_concepts (level 3) =

ΜΕΤΑΔΟΣΗ ΑΝΑΛΟΓΙΚΩΝ ΣΗΜΑΤΩΝ ΣΕ ΑΝΑΛΟΓΙΚΟ ΦΟΡΕΑ
ΔΙΑΜΟΡΦΩΣΗ ΠΛΑΤΟΥΣ (AM)
ΔΙΑΜΟΡΦΩΣΗ ΣΥΧΝΟΤΗΤΑΣ (FM)
ΔΙΑΜΟΡΦΩΣΗ ΦΑΣΗΣ (PM)

ΜΕΤΑΔΟΣΗ ΨΗΦΙΑΚΟΥ ΣΗΜΑΤΟΣ ΣΕ ΑΝΑΛΟΓΙΚΟ ΦΟΡΕΑ
ΨΗΦΙΑΚΗ ΔΙΑΜΟΡΦΩΣΗ ΠΛΑΤΟΥΣ ASK
ΨΗΦΙΑΚΗ ΔΙΑΜΟΡΦΩΣΗ ΣΥΧΝΟΤΗΤΑΣ FSK
ΨΗΦΙΑΚΗ ΔΙΑΜΟΡΦΩΣΗ ΦΑΣΗΣ PSK
QAM {QUADRATURE AMPLITUDE MODULATION}
TCM {TRELLIS CODE MODULATION}

ΜΕΤΑΔΟΣΗ ΑΝΑΛΟΓΙΚΩΝ ΣΗΜΑΤΩΝ ΣΕ ΨΗΦΙΑΚΟ ΦΟΡΕΑ
ΔΙΑΜΟΡΦΩΣΕΙΣ ΠΑΛΜΩΝ
ΘΕΩΡΗΜΑ ΔΕΙΓΜΑΤΟΛΗΨΙΑΣ
ΠΑΛΜΟΚΩΔΙΚΗ ΔΙΑΜΟΡΦΩΣΗ
ΔΙΑΜΟΡΦΩΣΗ ΔΕΛΤΑ

ΜΕΤΑΔΟΣΗ ΨΗΦΙΑΚΟΥ ΣΗΜΑΤΟΣ ΣΕ ΨΗΦΙΑΚΟ ΦΟΡΕΑ
NON RETURN TO ZERO
RETURN TO ZERO
BIPHASE
DELAY MODULATION

ΔΙΑΜΟΡΦΩΣΗ ΣΗΜΑΤΟΣ

υπάρχει πληροφορία και σε άλλο σημείο.

ΠΑΡΑΓΟΝΤΕΣ ΑΝΑΓΝΩΡΙΣΗΣ

ΟΙ ΔΥΟ ΚΡΙΣΙΜΟΙ ΠΑΡΑΓΟΝΤΕΣ ΣΤΗΝ ΑΝΑΓΝΩΡΙΣΗ ΤΟΥ ΣΗΜΑΤΟΣ ΕΙΝΑΙ Η ΕΝΤΑΣΗ (signal strength) ΚΑΙ Ο ΛΟΓΟΣ ΣΗΜΑΤΟΣ ΠΡΟΣ ΘΟΡΥΒΟ (S/N).

SPECIFIC

name::
* McsEngl.signal.specific@cptIt,

_SPECIFIC:
* analog-signal##
* audio-signal##
* digital-signal#ql:software.signal#
* speech-signal##
* text-signal##
* video-signal##

_SPECIFIC: TIME-BASED-DATA:
AUDIO-SIGNAL#cptIt986#
VIDEO-SIGNAL#cptIt987#

TechCmn'speed

NAME

name::
* McsEngl.TechCmn'speed@cptIt,
* McsEngl.conceptIt68,
* McsEngl.baund-rate@cptIt,
* McsEngl.communication-speed@cptIt,
* McsEngl.communication'speed@cptIt68,
* McsEngl.data-signalling-rate@cptIt,
* McsEngl.data-transfer-rate@cptIt,
* McsEngl.modulation-rate@cptIt,
* McsEngl.speed'in'communication@cptIt68,
* McsElln.ΡΥΘΜΟΣ-ΜΕΤΑΔΟΣΗΣ-ΔΕΔΟΜΕΝΩΝ@cptIt,
* McsElln.ΤΑΧΥΤΗΤΑ-ΕΠΙΚΟΙΝΩΝΙΑΣ@cptIt,

"ΡΥΘΜΟΣ ΜΕΤΑΔΟΣΗΣ" ΕΙΝΑΙ ΚΑΤΑΛΛΗΛΟΤΕΡΟΣ ΓΙΑΤΙ ΜΕ ΤΗ ΛΕΞΗ ΤΑΧΥΤΗΤΑ ΕΡΧΕΤΑΙ ΣΤΟ ΝΟΥ Η ΓΡΗΓΟΡΑΔΑ ΜΕ ΤΗΝ ΟΠΟΙΑ ΤΑΞΙΔΕΥΟΥΝ ΤΑ ΔΕΔΟΜΕΝΑ ΣΤΗ ΓΡΑΜΜΗ, ΕΝΩ Ο ΟΡΟΣ ΑΝΤΙΠΡΟΣΩΠΕΥΕΙ ΤΟ ΡΥΘΜΟ ΜΕ ΤΟΝ ΟΠΟΙΟ ΕΚΠΕΜΠΟΝΤΑΙ ΤΑ bit ΑΠΟ ΤΟΝ ΠΟΜΠΟ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 520#cptResource223]

ΡΥΘΜΟΣ BOUND εκφράζει τη συχνότητα εναλλαγής ενός μεταδιδόμενου σήματος πχ οι παλμοί ανά δευτερόλεπτο ενός τετραγωνικού παλμού.
Ισούται με το ΡΥΘΜΟ ΜΕΤΑΔΟΣΗΣ ΔΕΔΟΜΕΝΩΝ, άν κάθε bit κωδικοποιείται σε ένα παλμό πχ στην κωδικοποίηση NRZ-L. Μπορεί να είναι και μικρότερος ή μεγαλύτερος με το ρυθμό-δεδομένων.
[ΠΗΓΗ: ΡΑΜ 1997ιουλ, 105]

DEFINITION

ΤΑΧΥΤΗΤΑ ΕΠΙΚΟΙΝΩΝΙΑΣ εννοώ
- το χρόνο που χρειάζεται για να βρούμε μια πληροφορία μέσα στη μνήμη ή σε μιά αποθήκη (access time), ή
- τη ποσότητα πληροφορίας που μεταφέρεται (μέσα σένα κομπιούτερ ή ανάμεσα σε δύο κομπιούτερ) στη μονάδα του χρόνου.
[ΝΙΚΟΣ, ΙΟΥΝ 1994]

speedComm'GENERIC

_GENERIC:
* measure#cptCore979#

speedComm'BAUND'RATE: MODULATION RATE.

name::
* McsEngl.speedComm'BAUND'RATE: MODULATION RATE.@cptIt,

ΠΕΡΙΓΡΑΦΕΙ ΤΟΝ ΑΡΙΘΜΟ ΤΩΝ ΜΕΤΑΒΟΛΩΝ ΤΟΥ ΔΙΑΜΟΡΦΩΜΕΝΟΥ ΣΗΜΑΤΟΣ ΠΟΥ ΕΓΙΝΑΝ ΣΤΗ ΜΟΝΑΔΑ ΤΟΥ ΧΡΟΝΟΥ.
- ΑΝ Η ΤΕΧΝΙΚΗ ΔΙΑΜΟΡΦΩΣΗΣ ΠΟΥ ΧΡΗΣΙΜΟΠΟΙΕΙΤΑΙ, ΑΝΤΙΣΤΟΙΧΕΙ ΕΝΑ ΜΠΙΤ ΣΕ ΚΑΘΕ ΜΕΤΑΒΟΛΗ ΤΟΥ ΔΙΑΜΟΡΦΩΜΕΝΟΥ ΣΗΜΑΤΟΣ, ΤΟΤΕ ΤΟ BAUD RATE ΤΑΥΤΙΖΕΤΑΙ ΜΕ ΤΟ BIT RATE.

speedComm'CHANNEL'CAPACITY

name::
* McsEngl.speedComm'CHANNEL'CAPACITY@cptIt,

ΧΩΡΗΤΙΚΟΤΗΤΑ ΚΑΝΑΛΙΟΥ. ΕΙΝΑΙ Ο ΜΕΓΙΣΤΟΣ ΑΡΙΘΜΟΣ ΤΩΝ ΣΥΜΒΟΛΩΝ ΠΟΥ ΜΠΟΡΟΥΝ ΝΑ ΜΕΤΑΦΕΡΘΟΥΝ ΜΕΣΩ ΤΟΥ ΚΑΝΑΛΙΟΥ ΣΤΗ ΜΟΝΑΔΑ ΤΟΥ ΧΡΟΝΟΥ. ΕΚΦΡΑΖΕΤΑΙ ΚΑΙ ΑΥΤΟΣ ΣΕ bps.
- Η ΧΩΡΗΤΙΚΟΤΗΤΑ ΕΞΑΡΤΑΤΑΙ ΑΠΟ ΤΟ ΕΥΡΟΣ ΖΩΝΗΣ ΣΥΧΝΟΤΗΤΩΝ ΤΟΥ ΚΑΝΑΛΙΟΥ (BANDWIDTH)

SPECIFIC

name::
* McsEngl.speedComm.specific@cptIt,

_SPECIFIC:
* access-time#cptIt499#

speedComm.ACCESS-TIME

name::
* McsEngl.speedComm.ACCESS-TIME@cptIt,
* McsEngl.conceptIt499,
* McsEngl.access-time@cptIt,
* McsEngl.access'time@cptIt499,
* McsEngl.seek-time@cptIt,
* McsElln.ΠΡΟΣΠΕΛΑΣΗΣ-ΧΡΟΝΟΣ@cptIt,

DEFINITION

The access time for a storage device such as a disk is the amount of time required to begin delivering data after the CPU sends a data request. Since different operating environments can affect access times, the figure given is usually an average time. Benchmark tests will often measure a system's access times.

The time required for a memory device to produce a dependable output signal after it receives an input signal requesting the contents at an address is called its access time.
[SOURCE: PC-GLOSSARY 1993]

SEEK TIME is the length of time the DISK HEAD takes to move from whatever track it happens to be on, to whatever track you want to read.

SPECIFIC

RAM ACCESS'TIME

name::
* McsEngl.RAM ACCESS'TIME@cptIt,

70 ns THE AVERAGE SPEED.

STORAGE ACCESS'TIME

name::
* McsEngl.STORAGE ACCESS'TIME@cptIt,

3.9 ms MICRODISK (MICROPOLIS/ΠΟΥΛΙΑΔΗΣ)

speedComm.TRANSFER-RATE (bps)

name::
* McsEngl.speedComm.TRANSFER-RATE (bps)@cptIt,
* McsEngl.bitrate@cptIt,
* McsEngl.bps@cptIt,
* McsEngl.transfer-rate@cptIt,
* McsEngl.bandwidth.bitrate@cptIt,
* McsEngl.bit-rate@cptIt,
* McsEngl.bitrate@cptIt,
* McsEngl.transfer-rate@cptIt,

_DESCRIPTION:
TRANSFER RATE is the speed at which bits can be transfered from the disk to the computer.

bps.BUS

name::
* McsEngl.bps.BUS@cptIt,

bps.INFORMATION.PURE

name::
* McsEngl.bps.INFORMATION.PURE@cptIt,

ΡΥΘΜΟΣ ΜΕΤΑΔΟΣΗΣ ΚΑΘΑΡΗΣ ΠΛΗΡΟΦΟΡΙΑΣ. ΜΕΤΡΙΕΤΑΙ ΣΕ bps. ΣΤΗ ΓΡΑΜΜΗ ΜΕΤΑΔΙΔΟΝΤΑΙ ΕΚΤΟΣ ΑΠΟ ΤΗΝ ΚΑΘΑΡΗ ΠΛΗΡΟΦΟΡΙΑ ΚΑΙ ΕΠΙΠΛΕΟΝ ΧΑΡΑΚΤΗΡΕΣ ΕΛΕΓΧΟΥ.

bps.NETWORK (*=Μελλοντικά)

name::
* McsEngl.bps.NETWORK (*=Μελλοντικά)@cptIt,
* McsEngl.transfer-rate.network@cptIt,
====== lagoGreek:
* McsElln.ευρυζωνική-ταxύτητα@cptIt,

_SPECIFIC:
1125 Tbps Παγκόσμιο ρεκόρ στη μετάδοση ψηφιακών δεδομένων/πληροφοριών σημείωσε ομάδα Βρετανών ερευνητών από το University College του Λονδίνου (UCL) πετυχαίνοντας την ασύλληπτη ταχύτητα των 1,125 Tb/sec (τεραμπίτ ανά δευτερόλεπτο).
[http://www.altsantiri.gr/technology/asillipti-tachitita-sti-metadosi-dedomenon/ 12-02-2016]
---
255 terabits. 2014, http://www.naftemporiki.gr/story/873736/astronomiko-rekor-metadosis-dedomenon-sta-255-tbps,
---
1,4 terabits. 2014.
----------------------------------------------------------------------------
2,4 gbps: SONET
* 1 gbps: PLANET, IBM WAN
* 1 gbps: Metaring, IBM LAN
----------------------------------------------------------------------------
*600/1000 mbps: FFOL, FDDI Follow-On LAN
*150 mbps: B-ISDN
*140 mbps: Κανονική τηλεόραση
100 mbps: FDDI, DQDB
43 mbps: T-3
34 mbps: υπαρχοντες κωδικοποιητες τηλεόρασης
* 30 mbps: LAN, CAD
16/4 mbps: Token-Ring
10 mbps: Ethernet
2,5 mbps: ARCnet
* 2 mbps: video conference, Hi-Fi sound, color fax, videophone high q/ty
   enhanced parallel port
1,544 mbps: MAN, T-1, Μικροκυματικοί ασύρματοι
1 mbps: WAN
-----------------------------------------------------------------------------
230 kbps: AppleTalk
150   kbps: ταχύτητα διαμεταγωγης δεδομένων CD'ROM DRIVE.(1992)
*128 kbps: Videophone χαμηλης ποιότητας
* 64 kbps: Τηλεφωνια, φαξ, Interactive data medium quality
50 kbps: modem υψηλής ταχύτητας, Parallel port
56 kbps: ψηφιακές αποκλειστικές γραμμες.
38,4 kbps: serial port RS-422
19,2 kbps: VSAT χαμηλου κόστους δορυφόροι., data switch, serial port
   0.3-19,2 kbps for ANALOG NETWORK.
12-123 kbps: parallel port
9,6 kbps: modem
2,4 kbps: modem

CHARACTERS PER SECOND cps
1000 cps: telephone lines
5-30 cps: telegraph lines

{time.2014}:
Ρεκόρ ευρυζωνικών ταχυτήτων στα 1,4 terabits ανά δευτερόλεπτο
Από Alcatel – Lucent και British Telecoms
Πέμπτη, 23 Ιανουαρίου 2014 12:27 UPD:12:27
REUTERS/SUZANNE PLUNKETT
Ρεκόρ ταχύτητας σε ευρυζωνικές συνδέσεις σημείωσαν οι Alcatel – Lucent και BT (British Telecoms) σε δοκιμή στο Λονδίνο, ανακοινώνοντας ότι πέτυχαν ταχύτητες των 1,4 terabits ανά δευτερόλεπτο.
Το τεστ διεξήχθη σε ένα link 410 χιλιομέτρων μεταξύ του πύργου της ΒΤ στο κεντρικό Λονδίνο και του Ίπσουΐτς. Η ταχύτητα αυτή αντιστοιχεί στην αποστολή 44 μη συμπιεσμένων ταινιών HD μέσα σε ένα δευτερόλεπτο.
Το συγκεκριμένο επίτευγμα θεωρείται εξαιρετικά υψηλής σημασίας για τους παρόχους υπηρεσιών διαδικτύου (ΙSΡ), καθώς θα έχει ως αποτέλεσμα την αποστολή πολύ μεγαλύτερων όγκων δεδομένων μέσα από τις υπάρχουσες υποδομές, χωρίς να απαιτούνται ιδιαίτερες αναβαθμίσεις.
«Η BT και η Alcatel – Lucent βγάζουν περισσότερο από αυτό που έχουν ήδη» εξήγησε στο BBC o Όλιβερ Τζόνσον, διευθύνων σύμβουλος της εταιρείας αναλύσεων broadband Point Topic. «Τους επιτρέπει να αυξήσουν τις δυνατότητές τους χωρίς να πρέπει να δαπανήσουν πολλά χρήματα».
Σύμφωνα με τον Κέβιν Ντρούρι, στέλεχος της Alcatel – Lucent, η μέθοδος που χρησιμοποιήθηκε παραπέμπει στη μείωση του διαστήματος μεταξύ των λωρίδων σε έναν πολυσύχναστο αυτοκινητόδρομο.. Η κεντρική ιδέα είναι η «ευκαμψία», έτσι ώστε να μπορούν οι συνδέσεις να προσαρμόζονται στα εκάστοτε δεδομένα - σαν να «ανοίγουν» περισσότερες λωρίδες σε έναν αυτοκινητόδρομο τις ώρες αιχμής. Η υποδομή που χρησιμοποιήθηκε αποκαλείται Flegrid (flexible grid, εύκαμπτο δίκτυο).
Σύμφωνα με την Alcatel – Lucent, η ζήτηση για υψηλότερο bandwidth αυξάνεται περίπου 35% κάθε χρόνο, καθιστώντας την αναζήτηση αποδοτικότερων τρόπων μεταφοράς δεδομένων ένα εξαιρετικά πιεστικό θέμα για τους ISP, ειδικά λόγω της ανόδου δημοφιλών και «βαριών» (από πλευράς μεταφοράς δεδομένων) υπηρεσιών, σαν το Netflix.
Υπάρχουν ακόμη πιο γρήγορες μέθοδοι μετάδοσης δεδομένων (όπως για παράδειγμα μέσω της χρήσης τεχνολογίας λέιζερ), ωστόσο πρόκειται για το πρώτο τεστ κατά το οποίο επιτυγχάνονται τόσο υψηλές ταχύτητες υπό συνθήκες «πραγματικού κόσμο», δηλαδή εκτός εργαστηρίων.
[http://www.naftemporiki.gr/story/756492]

bps.STORAGE

name::
* McsEngl.bps.STORAGE@cptIt,
* McsEngl.transfer-rate.secondary-memory@cptIt,


900 kbps: Kittyhawk hp hard disk glass technology
330 kbps: CD'ROM of Toshiba, ταχυτητα διαμεταγωγης δεδομένων (1993)
150 kbps: ταχύτητα διαμεταγωγης δεδομένων CD'ROM DRIVE.(1992)
30 kbps: TAXYΤΗΤΑ ΜΕΤΑΦΟΡΑΣ ΕΝΟΣ ΕΞΩΤΕΡΙΚΟΥ HARD DISK

SPECIFIC

name::
* McsEngl.techComm.specific@cptIt,

_SPECIFIC:
* CAMERA#cptIt184#
* cinema#cptIt240#
* network.computer#cptIt21#
* COPY-MACHINE/ΦΩΤΟΤΥΠΙΚΟ#cptIt249#
* FAX#cptIt290#
* GRAMOPHONE#cptIt448#
* MICROFILM
* PAGER#cptIt267#
* PRINTING-MACHINE#cptIt241#
* RADIO#cptIt214#
* SCANNERS#cptIt131#
* TAPE-RECORDER/ΜΑΓΝΗΤΟΦΩΝΟ#cptIt449#
* TELEGRAPH
* TELEPHONE#cptIt166#
* TELEVISION#cptIt216#
* TELEX
* VIDEO MACHINE
* VIDEOPHONE#cptIt189#

DivisionSpecific.HARDWARE:
* HARDWARE-comm-tech#cptIt289#
* SOFTWARE-comm-tech#cptIt373#

TechCmn.HARDWARE

NAME

name::
* McsEngl.TechCmn.HARDWARE@cptIt,
* McsEngl.conceptIt289,
* McsEngl.commtech'hardware@cptIt289,
* McsEngl.hardware-communication-technology@cptIt,
* McsEngl.hardware.CommTech@cptIt289,
* McsEngl.hardware.communication@cptIt,

DEFINITION

_DESCRIPTION:

GENERIC

_GENERIC:
communication technology#cptIt244#

SPECIFIC

Specific_concepts (level 3) =

DTE {DATA TERMINAL EQUIPMENT}/ΤΕΡΜΑΤΙΚΗ ΣΥΣΚΕΥΗ

 ΥΠΟΛΟΓΙΣΤΕΣ

 ΤΕΡΜΑΤΙΚΑ#cptIt33: attSpe#

 ΕΚΤΥΠΩΤΕΣ#cptIt61: attSpe#

DCE {DATA CIRCUIT-TERMINATING EQUIPMENT}/ΣΥΣΚΕΥΗ ΕΠΙΚΟΙΝΩΝΙΑΣ

 Modem#cptIt66: attSpe#

 Multiplexer#cptIt36: attSpe#

 Sharing devices

   line sharing units

   digital sharing units

SPECIFIC

COMMUNICATION-CHANNEL/ΜΕΣΑ-ΜΕΤΑΔΟΣΗΣ#cptIt168: attSpe#


Μοdem#cptIt66: attSpe#
PORTS/interfaces#cptIt115: attPar#

systems

BOOKS#cptIt241: attSpe#

FAX#cptIt290: attSpe#

PAGER#cptIt267: attSpe#

PBX/ΤΗΛΕΦΩΝΙΚΑ ΚΕΝΤΡΑ
 TELEPHONE#cptIt166: attSpe#

Photos#cptIt184: attSpe#

radio#cptIt214: attSpe#

television#cptIt216: attSpe#

telex

Video#cptIt38: attSpe#

Videophone#cptIt189: attSpe#

ΦΩΤΟΤΥΠΙΚΟ#cptIt249: attSpe#

TechCmn.time.EVOLUTING#cptCore546.171#

name::
* McsEngl.TechCmn.time.EVOLUTING@cptIt,

comtech'FUTURE

name::
* McsEngl.comtech'FUTURE@cptIt,
* McsEngl.conceptIt313,
* McsEngl.CommTech'future@cptIt313,
* McsEngl.communication-technology-FUTURE@cptIt,

ΒΑΣΙΚΟΙ ΣΤΟΧΟΙ

ΠΕΝΤΕ ΦΑΙΝΟΝΤΑΙ ΝΑ ΕΙΝΑΙ ΟΙ ΒΑΣΙΚΟΙ ΣΤΟΧΟΙ:
- ΠΛΗΡΗΣ ΨΗΦΙΑΚΟΠΟΙΗΣΗ ΤΩΝ ΔΙΚΤΥΩΝ.
- ΕΝΙΑΙΑ ΔΙΚΤΥΑ ΟΠΤΙΚΩΝ ΙΝΩΝ.
- ΕΞΥΠΝΑ ΔΙΚΤΥΑ.
- ΕΝΤΑΣΗ ΣΤΙΣ ΑΣΥΡΜΑΤΕΣ ΕΠΙΚΟΙΝΩΝΙΕΣ.
- ΔΙΑΧΕΙΡΙΣΗ ΤΩΝ ΔΙΚΤΥΩΝ ΑΠ'ΑΚΡΟΥ ΕΙΣ ΑΚΡΟΝ.
[COMPUTER GO, DEC 1992, 214]

ΧΡΕΩΣΗ

Ο ΚΑΘΕ ΧΡΗΣΤΗΣ ΘΑ ΜΠΟΡΕΙ ΝΑ ΧΡΗΣΙΜΟΠΟΙΕΙ ΟΠΟΙΑΔΗΠΟΤΕ ΣΥΣΚΕΥΗ ΚΑΙ ΝΑ ΧΡΕΩΝΕΤΑΙ ΑΝΤΙΣΤΟΙΧΑ, ΕΝΩ ΣΗΜΕΡΑ ΧΡΕΩΝΟΝΤΑΙ ΟΙ ΣΥΣΚΕΥΕΣ.

FvMcs.techInfo.doing.SATELLITE_NAVIGATION_SYSTEM -(sns)

_CREATED: {2016-12-15}

name::
* McsEngl.conceptIt1015,
* McsEngl.satellite-navigation-system@cptIt,
* McsEngl.SNS!=satellite-navigation-system,

SPECIFIC

name::
* McsEngl.sns.specific@cptIt,

cpt.techInfo.doing.GPS {1995}

_CREATED: {2008-05-20}

name::
* McsEngl.conceptIt559,
* McsEngl.techInfo.doing.GPS@cptIt,
* McsEngl.gps@cptIt559,

gps'DEFINITION

The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather, anywhere on or near the Earth, where there is an unobstructed line of sight to four or more GPS satellites. It is maintained by the United States government and is freely accessible to anyone with a GPS receiver.

The GPS program provides critical capabilities to military, civil and commercial users around the world. In addition, GPS is the backbone for modernizing the global air traffic system.

The GPS project was developed in 1973 to overcome the limitations of previous navigation systems,[1] integrating ideas from several predecessors, including a number of classified engineering design studies from the 1960s. GPS was created and realized by the U.S. Department of Defense (DoD) and was originally run with 24 satellites. It became fully operational in 1994.

Advances in technology and new demands on the existing system have now led to efforts to modernize the GPS system and implement the next generation of GPS III satellites and Next Generation Operational Control System (OCX).[2] Announcements from the Vice President and the White House in 1998 initiated these changes. In 2000, U.S. Congress authorized the modernization effort, referred to as GPS III.

In addition to GPS, other systems are in use or under development. The Russian GLObal NAvigation Satellite System (GLONASS) was in use by only the Russian military, until it was made fully available to civilians in 2007. There are also the planned European Union Galileo positioning system, Chinese Compass navigation system, and Indian Regional Navigational Satellite System.
[http://en.wikipedia.org/wiki/Gps]

gps'POSITION

name::
* McsEngl.gps'POSITION@cptIt,

NAMEAON:
gpss'COORDINATE,

ΓΙΑΝΝΕΝΑ:
- αεροδρόμιο κόμβος 39.692222 20.821660 | 394153N0204930E
- κόμβος ανατολής 39.622322 20.861155 | 393734N0205167E
- κόμβος περιφερειακού και χατζ/ελεούσα 39.685755 20.815111
- χατζηκώστα 39.681000 20.825660

Latitude / Longitude Coordinate Converter
The following calculators will convert Latitude / Longitude coordinates between three different units types:
* Degrees Minutes Seconds - DD MM SS (Ex = 39 54 32 W).
* Decimal Degrees (Example = 39.8967deg) - minutes and seconds are converted to decimal format.
* GPS Coords (Example= 39deg 58.589min) - seconds are converted to decimal format.
http://www.sanidumps.com/gpscoords.php:

gps'FORMAT-LAT-LON

name::
* McsEngl.gps'FORMAT-LAT-LON@cptIt,

GPS Coordinate Converter, Maps and Info
* http://boulter.com/gps//

DDMMSS_FORMAT:
* 39 deg, 41 min, 24 sec N
* 3°21'00"W (Alt0176=°)

DECIMAL_FORMAT:
* 39.690110 N

GPS_FORMAT:
* 39 deg 41.4066 min N

GPSS_15_CHAR_FORMAT:
* 394141N
* 225465S0431268W - or 22 degs 54.65 mins South 43 degs 12.68 minutes West.

UK Grid:
SU 93050 67050

WGS84 lat/lon:

Colorado, for instance can be expressed as [39deg, -108deg] or [39 N, 108 W]. The calculators assume positive numbers.

[LL] switches format of the displayed position:
* e.g. 512381N0003959W - the standard GPSS 15 character lat/lon format based on degrees and minutes.
* e/g. 51.39683 -0.65983 - lat/lon in decimal degrees - as given by Google Earth and some software.
* e.g. SU 93311 67805 - UK Ordnance Survey grid, or Irish grid, to 1 metre precision.

1.3 Formats for Geographic Position
Many of the GPSS files include the location of places expressed in lat/lon - or in some cases a grid system. GPSS will recognise the format by the presence of the first field (or just a comma), the presence of a decimal character, and the length of the string. All latitude & longitudes should be in WGS84. The 15 character format is reccomended, since it has been in use with GPSS for many years, and will therefore be supported by old versions of GPSS and other support software. It is also closer to the format of lat/lon in the NMEA standard, and can therefore be checked against raw NMEA sentences recorded from the GPS.
* ,523075N0073075W - 15 characters WGS84, where 3075 = 30.75 minutes.
* ,+52.123456 -123.123456 - space character between WGS84 degrees
* ,SU 12345 67890 - 14 characters. UK grid to 1m precision
* ,SU123678 - 8 characters. UK grid to 100m precision
* 412.3,167.8 - First field used. UK grid expressed as two x,y numbers
* ,A123456 - 7 characters. Irish grid to 100m precision.
* ,A 12345 67890 - 13 characters. Irish grid to 1m precision.
* ,123456 - Singapore Grid (or other 6 figure properly configured)
* ,32U 012345 0067890 - 18 characters. UTM grid.
* ,32U0123450067890 - 16 chars UTM (not reccomended)
* ,32U012300678 - 12 chars UTM to 100m precision.
* ,5230750N00730750W - 17 characters, where 30750 = 30.750 minutes.
GPSS v4.94 and later only.
Where possible, it is reccomended that one of the first two lat/lon formats are used, since it may mean other software is available to process the data.

gps'WAYPOINT

name::
* McsEngl.gps'WAYPOINT@cptIt,

NAMEANO:
waypoint-559i,

Waypoints are sets of coordinates that identify a point in physical space. For the purposes of terrestrial navigation, these coordinates usually include longitude and latitude, and sometimes altitude (particularly for air navigation). Waypoints have only become widespread for navigational use by the layman since the development of advanced navigational systems, such as the Global Positioning System (GPS) and certain other types of radio navigation. Waypoints located on the surface of the Earth are usually defined in two dimensions (e.g., longitude and latitude); those used in the Earth's atmosphere or in outer space are defined in at least three dimensions (four if time is one of the coordinates, as it might be for some waypoints outside the Earth).

Although the term waypoint has only come into common use in recent years, the equivalent of a waypoint in all but name has existed for as long as human beings have navigated. Waypoints have traditionally been associated with distinctive features of the real world, such as rock formations, springs, oases, mountains, buildings, roadways, waterways, railways, and so on. Today, these associations persist, but waypoints are more often associated with physical artifacts created specifically for navigation, such as radio beacons, buoys, satellites, etc.

In the modern world, waypoints are increasingly abstract, often having no obvious relationship to any distinctive features of the real world. These waypoints are used to help define invisible routing paths for navigation. For example, artificial airways—“highways in the sky” created specifically for purposes of air navigation—often have no clear connection to features of the real world, and consist only of a series of waypoints in the sky through which pilots navigate; these airways are designed to facilitate air traffic control and routing of traffic between heavily traveled locations, and do not reference natural terrain features. Abstract waypoints of this kind have been made practical by modern navigation technologies, such as land-based radio beacons and the satellite-based Global Positioning System (GPS).

Abstract waypoints typically have only specified longitude and latitude or UTM coordinates, and often a name if they are marked on charts, and are located using a radio navigation system such as a VOR or GPS receiver. A waypoint can be a destination, a fix along a planned course used to make a journey, or simply a point of reference useful for navigation.
[http://en.wikipedia.org/wiki/Waypoint]

gps'POI

name::
* McsEngl.gps'POI@cptIt,

A point of interest, or POI, is a specific point location that someone may find useful or interesting. An example is a point on the Earth representing the location of the Space Needle, or a point on Mars representing the location of the mountain, Olympus Mons.

The term is widely used in cartography, especially in electronic variants including GIS, and GPS navigation software. In this area the location of this point is called a waypoint.

A GPS point of interest consists at the very minimum of the latitude and longitude of the POI, although a name or description for the POI is usually included too. Other information such as altitude or a telephone number might also be attached. GPS applications typically use icons to represent different categories of POI on a map graphically.[1]
[http://en.wikipedia.org/wiki/Point_of_interest]

gps'SOFTWARE

name::
* McsEngl.gps'SOFTWARE@cptIt,

Wed 18 Oct 06 - 16:03
Μήνυμα#23

Κόκκινα!
Ομάδα: Μέλη
Πληροφορίες
Μηνύματα: 6.364
Μέλος από: 5 Sep 05
Τόπος: Χουντοχώρι (aka Παπάγος)
Αρ. Μέλους: 275

Τα προγράμματα GPS.

Υπάρχει μια πληθώρα προγραμμάτων που χρησιμοποιούν το στίγμα του GPS για να μας δείξουν κάτι. Τα πιο απλά είναι κάτι σαν ηλεκτρονικές πυξίδες και δείχνουν τα βασικά: Υψόμετρο, ταχύτητα, προσανατολισμό, στίγμα κλπ.
Τα πιο προχωρημένα χρησιμοποιούν αυτά τα στοιχεία και έναν χάρτη, οπότε μας δείχνουν και που βρισκόμαστε.
Θα συζητήσουμε λίγο για αυτά τα προγράμματα παίρνοντας σαν παράδειγμα το OziExplorerCE, επειδή πρώτον το γνωρίζω καλά, και δεύτερον είναι αρκετά αντιπροσωπευτικό για τις δυνατότητες αυτού του τύπου προγραμμάτων.
Χρειαζόμαστε κατ΄αρχήν έναν χάρτη, ο οποίος να είναι ακριβείας ως προς την απεικόνιση του. (Οι περισσότεροι δεν είναι, ακόμα και αυτοί που σαν χαρτί φαίνονται φοβεροί)
Τον χάρτη αυτό μπορούμε ακόμα και να τον σκανάρουμε από χαρτί, ή να τον ζωγραφίσουμε οι ίδιοι, αν έχουμε τέτοια λόξα. Μπορούμε να κλέψουμε και να ράψουμε κάτι και από το GoogleEarth.
Όταν τον έχουμε λοιπόν σε ψηφιακή μορφή, πρέπει να τον καλιμπράρουμε, δηλαδή να πούμε στο πρόγραμμα τι μας δείχνει αυτός ο χάρτης. Αυτό το κάνουμε, σημαδεύοντας 2 τουλάχιστον σημεία του χάρτη και δίνοντας τις συντεταγμένες αυτών των σημείων στο πρόγραμμα. Τα σημεία αυτά τα βρίσκουμε από αλλού, π.χ. από το GoogleEarth, ή τα καταγράφουμε οι ίδιοι με το GPS και ένα από τα απλά προγραμματάκια που είπαμε στην αρχή.
Το πρόγραμμα μετά υπολογίζει μόνο του σε πιο σημείο του χάρτη αναφέρεται το στίγμα του GPS και μας το δείχνει. Το OziExplorerCE προσφέρει και πολλά άλλα ωραία πράγματα εκτός από το στίγμα μας. Μπορούμε να προγραμματίσουμε μία διαδρομή και να το βάλουμε να μας ειδοποιεί κάθε φορά που πρέπει να αλλάξουμε πορεία, φτιάχνοντας έτσι ένα δικό μας σύστημα πλοήγησης.
Ανάλογα τον χάρτη που έχουμε, μπορεί ένα τέτοιο πρόγραμμα να είναι πάρα πολύ εύχρηστο. Σκεφτείτε έναν πολύ λεπτομερειακό χάρτη ενός βουνού (υπάρχουν πάρα πολύ καλοί στην Ανάβαση www.mountains.gr ), όπου μπορούμε να αλωνίσουμε με το KTM μας όλα τα μονοπάτια με ασφάλεια. Το συγκεκριμένο πρόγραμμα μπορεί επίσης να καταγράψει και την διαδρομή που κάναμε σε αρχείο. Αυτό το αρχείο μπορούμε να το ξαναπαίξουμε μετά σε πραγματικό χρόνο στο OziExplorer στο PC μας, και να κάνουμε και διάφορες αναλύσεις και διαγράμματα (ταχύτητα, υψόμετρα κλπ)

Η πιο εξεζητημένη εφαρμογή του GPS είναι τα προγράμματα πλοήγησης. Αυτά είναι αρκετά σύνθετα προγράμματα που εκ των πραγμάτων φέρουν και έναν διανυσματικό χάρτη μεγάλης ακριβείας. Ο χάρτης αυτός δεν απεικονίζει απλά τον χώρο, αλλά έχει και άπειρες πληροφορίες ως προς τον τύπο του δρόμου, ονόματα οδών και αριθμούς σπιτιών, συνήθεις ταχύτητες που μπορούμε να πετύχουμε σε κάθε δρόμο, που έχει βενζινάδικα, φαρμακεία, νοσοκομεία κλπ (τα λεγόμενα σημεία ενδιαφέροντος, ή αλλιώς POI). Μπορούμε επίσης να γεμίσουμε τα αρχεία του με δικές μας πληροφορίες. Πού φάγαμε τον καλύτερο γύρο πίτα, ποιους δρόμους δεν θέλουμε με τίποτα να χρησιμοποιήσουμε κλπ.
Αυτά τα προγράμματα ξέρουν που βρισκόμαστε, χρησιμοποιώντας το στίγμα του GPS. Όταν λοιπόν πούμε που θέλουμε να πάμε, υπολογίζουν την διαδρομή και μας πάνε μόνα τους. Η πλοήγηση γίνεται με τη διαδρομή που βλέπουμε στο display του PocketPC, αλλά και με φωνητικές οδηγίες. Αν για κάποιον λόγο αγνοήσουμε την πρόταση και πάμε από αλλού, το πρόγραμμα υπολογίζει εκ νέου μια εναλλακτική διαδρομή για να μας πάει στον προορισμό μας. Η μεγαλύτερη χρηστικότητά τους είναι βέβαια όταν είμαστε μέσα σε μια άγνωστη πόλη και δεν έχουμε ιδέα πως θα πάμε.
Όπως είναι απλό να φανταστεί κανείς, ένα πρόγραμμα πλοήγησης ζει κυρίως από τον χάρτη του. Ένας και μοναδικός μονόδρομος που είναι καταχωρημένος λάθος μπορεί να μας ξινίσει την σούπα, αν και τις περισσότερες φορές απλά πας στον επόμενο και αφήνεις το πρόγραμμα να το παίξει ήρωας και να σου βρει άλλον δρόμο.
Υπάρχουν πολλά προγράμματα πλοήγησης, πολλά από αυτά έχουν φανταστική τεχνολογία και το ενοχλητικό χαρακτηριστικό, ότι δεν έχουν χάρτες για την Ελλάδα! Με λίγα λόγια, την Ελλάδα την έχουνε όλοι στο φτύσιμο. Το μοναδικό πρόγραμμα που προσφέρει την δυνατότητα να κάνεις σοβαρή πλοήγηση στην Ελλάδα είναι ο Destinator. Σαν πρόγραμμα πλοήγησης είναι κάτω του μετρίου συγκρινόμενο με άλλα (τουλάχιστον μέχρι την έκδοση PN), έχει όμως την ιδιαιτερότητα ότι υπάρχει μία ελληνική εταιρία που προμηθεύει χάρτες για την Ελλάδα (η NGI, www.ngi.gr), και αυτό το καθιστά μονόδρομο.

Άλλα χρήσιμα προγραμματάκια για GPS είναι αυτά που συλλέγουν τις πληροφορίες του στίγματος με κάποιο τρόπο. Ένα πολύ καλό είναι το GPS2GE (GPS to GoogleEarth), το οποίο δημιουργεί τα κατάλληλα αρχεία για εισαγωγή της διαδρομής στο GoogleEarth (Παράδειγμα το apollon.zip στην αρχή του τόπικ).
Ένα επίσης απαραίτητο κατά την γνώμη μου πρόγραμμα είναι το Francon GPSGateCE. Αυτό κάνει το εξής: Πιάνει για τον εαυτό του την θήρα επικοινωνίας με την κεραία GPS και εμφανίζει διάφορες εικονικές θήρες, όπου στην κάθε μία μπορεί κανείς να βάλει κάποιο άλλο πρόγραμμα GPS να τρέχει. Αυτό σημαίνει ότι μπορεί έτσι να τρέχει π.χ. ο Destinator και το OziExplorerCE παράλληλα, προσφέροντας έτσι το μάξιμουμ χρηστικότητας του συστήματος. Επί πλέον, το GPSGateCE μπορεί να καταγράψει αυτούσια την ροή των πληροφοριών του GPS, οπότε μπορεί κανείς να το βάλει να ξαναπαίξει τα στοιχεία και να είναι σαν να πηγαίνει εκείνη την στιγμή την διαδρομή. Με αυτόν τον τρόπο έγιναν τα διάφορα παραδείγματα στην αρχή του τόπικ, από μία και μοναδική καταγραμμένη διαδρομή.
--------------------
Στάθης
http://www.mybike.gr/index.php?showtopic=6273&st=15&start=15

gps'DESTINATOR (dpn)

name::
* McsEngl.gps'DESTINATOR (dpn)@cptIt,
* McsEngl.destinator@cptIt559i,
* McsEngl.dpn-gps@cptIt559i,

dpn'Version

name::
* McsEngl.dpn'Version@cptIt,

Destinator v7.0.0.588.11

Αν έχετε άλλες ερωτήσεις σχετικά με το λογισμικό του Destinator, μπορείτε να επικοινωνήσετε με τον προμηθευτή σας ή την Τεχνική υποστήριξη:
Τηλέφωνο: +49 (0)1805-123012
Email: support-eu@destinatortechnologies.com
Δικτυακός τόπος: www.destinatortechnologies.com:
* http://www.ngi.gr//:

dpn'ΧΩΜΑΤΟΔΡΟΜΟΙ

name::
* McsEngl.dpn'ΧΩΜΑΤΟΔΡΟΜΟΙ@cptIt,

Για σας! Εγω εχω NAVIMATE 330, και θα ηθελα να του βαλω αλλους χαρτες, πχ Βουλγαριας, Σκοπια. Αν γινετε αυτο, θα χαρω παρα πολυ. Και οσον αφορα το DESTINATOR, δεν μου αρεσε καθολου. Λογο της δουλειας μου ταξιδευω σιχνα και το DESTINATOR με πηγε πολλες φορες απο χωματοδρομο και απο τα βουνα.

Καλησπερα φιλε μου και καλως ηρθες.

Για να βαλεις αλλους χαρτες , ριξε μια ματια εδω :
http://www.ngi.gr/page.php?languagei...9&categoryid=1

Απο εκει και περα , το οτι το Destinator δεν σε πηγε σωστα , ισως δεν εχεις βαλει σωστα καποια πραγματα. Καταρχην απενεργοποιουμε τους χωματοδρομους και επειτα , οταν βαζουμε μια διαδρομη που δεν την ξερουμε, παταμε παντα "Ταχεια" και οχι "Συντομη"!

dpn'MENU

name::
* McsEngl.dpn'MENU@cptIt,

dpn'menu.ΜΕΤΑΒΑΣΗ

name::
* McsEngl.dpn'menu.ΜΕΤΑΒΑΣΗ@cptIt,

ντ'ΜΕΤΑΒΑΣΗ,

ντ'ΔΙΕΥΘΥΝΣΗ

name::
* McsElln.ντ'ΔΙΕΥΘΥΝΣΗ@cptIt,

ντ'POI

name::
* McsElln.ντ'POI@cptIt,

ντ'ΕΝΔΙΑΦΕΡΟΝΤΑ_ΣΗΜΕΙΑ,

Ενέργειες POI
Όταν έχετε επιλέξει μια θέση POI (χρήσιμου σημείου), πατήστε στο κουμπί Ενέργειες για να εμφανίσετε τις εντολές που αναφέρονται παρακάτω.
Ορισμός αφετηρίας
Σας επιτρέπει να ορίσετε την επιλεγμένη θέση ως αφετηρία της διαδρομής. Χρησιμοποιείτε αυτήν την εντολή όταν υπολογίζετε μια διαδρομή από σημείο το οποίο είναι διαφορετικό από την τρέχουσα θέση σας.
Εμφάνιση στο χάρτη
Σας επιτρέπει να δείτε την επιλεγμένη διεύθυνση στο χάρτη.
Προσθήκη στα Αγαπημένα
Σας επιτρέπει να προσθέσετε μια διεύθυνση στον κατάλογο με τις αγαπημένες θέσεις, όπως φαίνεται στην παρακάτω εικόνα. Για περισσότερες πληροφορίες, ανατρέξτε στην ενότητα " Αγαπημένα"

ντ'ΠΡΟΣΦΑΤΕΣ-ΘΕΣΕΙΣ

name::
* McsElln.ντ'ΠΡΟΣΦΑΤΕΣ-ΘΕΣΕΙΣ@cptIt,

ντ'ΑΓΑΠΗΜΕΝΑ

name::
* McsElln.ντ'ΑΓΑΠΗΜΕΝΑ@cptIt,

Ομάδες αγαπημένων
Μπορείτε να πατήσετε στο κουμπί Ενέργειες από την οθόνη Αγαπημένα για να προσθέσετε, επεξεργαστείτε ή διαγράψετε ομάδες, όπως περιγράφεται παρακάτω.

Ενέργειες Αγαπημένων
Από αυτήν την οθόνη, μπορείτε να πατήσετε στο κουμπί Ενέργειες για να εμφανίσετε τις ακόλουθες εντολές:
Ορισμός αφετηρίας
Σας επιτρέπει να ορίσετε την επιλεγμένη θέση ως αφετηρία της διαδρομής. Χρησιμοποιείτε αυτήν την εντολή όταν υπολογίζετε μια διαδρομή από σημείο το οποίο είναι διαφορετικό από την τρέχουσα θέση σας.
Εμφάνιση στο χάρτη
Σας επιτρέπει να δείτε την επιλεγμένη διεύθυνση στο χάρτη.
Επεξεργασία αγαπημένης θέσης
Σας επιτρέπει να αλλάξετε το όνομα, το σχόλιο ή τη θέση της ομάδας για την επιλεγμένη θέση.
Διαγραφή αγαπημένης θέσης
Πατήστε στο κουμπί για να διαγράψετε την επιλεγμένη θέση.
Αποστολή SMS
Αν χρησιμοποιείτε συσκευή πλοήγησης με τηλέφωνο, μπορείτε να στείλετε, σε ένα μήνυμα SMS, την τρέχουσα θέση σας. Για περισσότερες πληροφορίες, ανατρέξτε στην "Αποστολή διεύθυνσης SMS" (βλ. " Αποστολή διεύθυνσης SMS " στη σελίδα 36).
Πληροφορίες
Αυτό το κουμπί εμφανίζει πρόσθετες πληροφορίες για τη διεύθυνση, όπως λεπτομέρειες διεύθυνσης, αριθμός τηλεφώνου και άλλα σχόλια για την αγαπημένη θέση που καταχωρήσατε.

Ειδοποίηση για Αγαπημένα
Οι ειδοποιήσεις σας ενημερώνουν ότι βρίσκεστε σε συγκεκριμένη απόσταση από κάποια αγαπημένη θέση.
Μπορείτε να πατήσετε στο κουμπί Ειδοποιήσεις για να ορίσετε τις αποστάσεις για την 1η και 2η ειδοποίηση. Όταν βρεθείτε σε απόσταση μικρότερη από την καθορισμένη, η ειδοποίηση θα ενεργοποιηθεί, όπως φαίνεται παρακάτω.
Σημειώσεις:
Οι ρυθμίσεις των ειδοποιήσεων για Αγαπημένα επηρεάζουν όλες τις Ομάδες Αγαπημένων.
Η 2η ειδοποίηση πρέπει να είναι ρυθμισμένη ώστε να απενεργοποιείται σε μικρότερη απόσταση από την 1η ειδοποίηση.
Οι ειδοποιήσεις μπορούν να ενεργοποιηθούν για μία ομάδα, αλλά όχι για μεμονωμένες θέσεις. Βέβαια, μπορείτε να δημιουργήσετε μία ομάδα που θα περιέχει μόνο μία θέση.
Μπορείτε να απενεργοποιήσετε τις ειδοποιήσεις για όλες τις ομάδες επιλέγοντας τη ρύθμιση Off για την 1η ειδοποίηση.
Μπορείτε να απενεργοποιήσετε τις ειδοποιήσεις για μια συγκεκριμένη ομάδα αφαιρώντας το σημάδι ελέγχου δίπλα στην επιλεγμένη ομάδα. Ενεργοποιήστε την απενεργοποιημένη ειδοποίηση προσθέτοντας ένα σημάδι ελέγχου δίπλα στην επιλεγμένη ομάδα.

ντ'ΕΠΑΦΕΣ

name::
* McsElln.ντ'ΕΠΑΦΕΣ@cptIt,

dpn'menu.ΔΙΑΔΡΟΜΗ

name::
* McsEngl.dpn'menu.ΔΙΑΔΡΟΜΗ@cptIt,

ντ'ΔΙΑΔΡΟΜΗ,

ντ'ΟΔΗΓΙΕΣ-ΚΑΤΕΥΘΥΝΣΗΣ

name::
* McsElln.ντ'ΟΔΗΓΙΕΣ-ΚΑΤΕΥΘΥΝΣΗΣ@cptIt,

ντ'ΑΚΥΡΩΣΗ-ΔΙΑΔΡΟΜΗΣ

name::
* McsElln.ντ'ΑΚΥΡΩΣΗ-ΔΙΑΔΡΟΜΗΣ@cptIt,

ντ'ΕΠΙΣΚΟΠΗΣΗ-ΔΙΑΔΡΟΜΗΣ

name::
* McsElln.ντ'ΕΠΙΣΚΟΠΗΣΗ-ΔΙΑΔΡΟΜΗΣ@cptIt,

ντ'ΑΠΟΦΥΓΗ-ΔΡΟΜΩΝ

name::
* McsElln.ντ'ΑΠΟΦΥΓΗ-ΔΡΟΜΩΝ@cptIt,

ντ'ΔΗΜΙΟΥΡΓΙΑ-ΠΑΡΑΚΑΜΨΗΣ

name::
* McsElln.ντ'ΔΗΜΙΟΥΡΓΙΑ-ΠΑΡΑΚΑΜΨΗΣ@cptIt,

ντ'ΠΛΗΡΟΦΟΡΙΕΣ-TMC

name::
* McsElln.ντ'ΠΛΗΡΟΦΟΡΙΕΣ-TMC@cptIt,

ντ'ΠΛΗΡΟΦΟΡΙΕΣ_ΚΥΚΛΟΦΟΡΙΑΣ,

Πληροφορίες κυκλοφορίας από ραδιοφωνικές μεταδόσεις FM λαμβάνονται από τον δέκτη GPS με ενεργοποιημένο το TMC και παρακολουθούνται από το λογισμικό πλοήγησης.

Σημείωση: Πηγαίνετε στη διεύθυνση http://www.tmcforum.com για πληροφορίες σχετικά με τις Ευρωπαϊκές χώρες που διαθέτουν την υπηρεσία TMC. Απαιτείται δέκτης TMC για λήψη των αναμεταδόσεων TMC.

dpn'menu.ΕΠΙΛΟΓΕΣ

name::
* McsEngl.dpn'menu.ΕΠΙΛΟΓΕΣ@cptIt,

ντ'ΛΕΙΤΟΥΡΓ-ΗΜΕΡΑΣ

name::
* McsElln.ντ'ΛΕΙΤΟΥΡΓ-ΗΜΕΡΑΣ@cptIt,

ντ'ΠΡΟΒΟΛΗ_ΗΜΕΡΑΣ,

ντ'ΛΕΙΤΟΥΡΓ-3D

name::
* McsElln.ντ'ΛΕΙΤΟΥΡΓ-3D@cptIt,

ντ'ΠΡΟΒΟΛΗ_ΗΜΕΡΑΣ,

ντ'ΕΛΕΥΘΕΡΗ-ΠΕΡΙΗΓΗΣΗ

name::
* McsElln.ντ'ΕΛΕΥΘΕΡΗ-ΠΕΡΙΗΓΗΣΗ@cptIt,

Αυτή η λειτουργία σας επιτρέπει να εξετάσετε το χάρτη χωρίς ο δέκτης GPS να σας επαναφέρει στην τρέχουσα θέση σας. Πατήστε στο κουμπί Ελεύθ περιήγηση για να αποσυνδεθείτε από τον δέκτη GPS.
Όταν είστε έτοιμοι να επανασυνδεθείτε με τον δέκτη GPS, πηγαίνετε στο μενού Ρυθμίσεις και πατήστε στο κουμπί Σήμα GPS . Από την οθόνη Σήμα GPS, πατήστε στο κουμπί GPS On .

ντ'ΚΑΤΑΣΤ-ΠΕΖΟΥ

name::
* McsElln.ντ'ΚΑΤΑΣΤ-ΠΕΖΟΥ@cptIt,

Το κουμπί Κατάσταση πεζού σας επιτρέπει να εναλλάσσεστε μεταξύ της μετακίνησης με τα πόδια ή με όχημα. Στην Κατάσταση Πεζού, δεν έχετε τους περιορισμούς των οχημάτων, π.χ. μονόδρομοι. Κατά τη δημιουργία μιας διαδρομής πεζού, το Destinator αποφεύγει τους αυτοκινητόδρομους ή άλλους δρόμους στους οποίους δεν κινούνται οι πεζοί. Οι φωνητικές οδηγίες δεν είναι διαθέσιμες στη συγκεκριμένη κατάσταση λειτουργίας.

ντ'ΕΠΙΛΟΓΗ-ΧΑΡΤΗ

name::
* McsElln.ντ'ΕΠΙΛΟΓΗ-ΧΑΡΤΗ@cptIt,

Μπορείτε να επιλέξετε από τις ακόλουθες εντολές επιλογής χάρτη:
- Ανανέωση
Σας επιτρέπει να ανανεώσετε την οθόνη όταν τοποθετείται νέα κάρτα μνήμης στη συσκευή.
- Διαγραφή
Σας επιτρέπει να διαγράψετε μόνιμα τον επιλεγμένο χάρτη.
Σημείωση: Δεν μπορείτε να διαγράψετε τον τρέχοντα χάρτη.
- ΟΚ/Επιλογή
Σας επιτρέπει να ορίσετε έναν επιλεγμένο χάρτη ως τρέχοντα.

ντ'ΡΥΘΜΙΣΕΙΣ

name::
* McsElln.ντ'ΡΥΘΜΙΣΕΙΣ@cptIt,

Το κουμπί Ειδοποιήσεις σας επιτρέπει να ορίσετε τους τύπους των φωνητικών ή οπτικών ειδοποιήσεων που θέλετε να χρησιμοποιείτε.

Το κουμπί Γλώσσα σας επιτρέπει να επιλέξετε τη γλώσσα για τις ανακοινώσεις ειδοποιήσεων, τα ονόματα των δρόμων και τις οδηγίες κατεύθυνσης.

Το κουμπί Όψη & Αίσθ σας επιτρέπει να επιλέξετε διαφορετικό skin.

Το κουμπί Σήμα GPS σας επιτρέπει να διαμορφώσετε τις ρυθμίσεις GPS.

Το κουμπί Βοήθεια ανοίγει το αρχείο βοήθειας του Destinator.

dpn'menu.ΠΡΟΣΘΕΤΑ

name::
* McsEngl.dpn'menu.ΠΡΟΣΘΕΤΑ@cptIt,

ντ'ΠΡΟΣΘΕΤΑ,

ντ'ΔΙΑΔΡΟΜΗ-ΜΕ-ΣΤΑΣΗ

name::
* McsElln.ντ'ΔΙΑΔΡΟΜΗ-ΜΕ-ΣΤΑΣΗ@cptIt,

Η Διαδρομή με στάσεις σας επιτρέπει να σχεδιάσετε μία διαδρομή με έως δώδεκα στάσεις.
Όταν πατήσετε στο κουμπί ΜΕΤ, η διαδρομή θα υπολογιστεί σταδιακά, από το σημείο αναχώρησης μέχρι την πρώτη στάση. Μόλις φτάσετε στην πρώτη στάση, η διαδρομή θα επανυπολογιστεί μέχρι τη δεύτερη στάση κοκ.

ντ'ΕΚΠΑΙΔΕΥΣΗ

name::
* McsElln.ντ'ΕΚΠΑΙΔΕΥΣΗ@cptIt,

Το κουμπί Εκπαίδευση ανοίγει το πρόγραμμα Destinator Guide Tour. Αυτή η περιήγηση είναι ένας εξαιρετικός τρόπος εξοικείωσης με τις διαθέσιμες λειτουργίες πλοήγησης.

ντ'MP3 PLAYER

name::
* McsElln.ντ'MP3 PLAYER@cptIt,

ντ'ΠΡΟΒΟΛΗ-ΕΙΚΟΝΩΝ

name::
* McsElln.ντ'ΠΡΟΒΟΛΗ-ΕΙΚΟΝΩΝ@cptIt,

ντ'ΔΙΑΦΟΡΑ

name::
* McsElln.ντ'ΔΙΑΦΟΡΑ@cptIt,

ντ'ΣΗΜΕΙΟ-ΣΤΟ-ΧΑΡΤΗ

name::
* McsElln.ντ'ΣΗΜΕΙΟ-ΣΤΟ-ΧΑΡΤΗ@cptIt,

Σημείο στον χάρτη
Μπορείτε να πλοηγηθείτε σε οποιοδήποτε σημείο πατώντας στη θέση του κατευθείαν επάνω στην οθόνη Χάρτης σε προβολή 2D ή 3D. Αυτή η λειτουργία είναι ιδιαίτερα χρήσιμη όταν θέλετε να πλοηγηθείτε σε συγκεκριμένο σημείο στον χάρτη, αλλά δεν γνωρίζετε την οδό. Μόλις πατήσετε στο χάρτη, θα εμφανιστεί το μενού γρήγορης επιλογής.
Μετάβαση εκεί – Αυτό το κουμπί σας επιτρέπει να υπολογίσετε μια διαδρομή από το σημείο του χάρτη.
Στα Αγαπημένα – Αυτό το κουμπί σας επιτρέπει να αποθηκεύσετε ένα σημείο στον χάρτη ως αγαπημένο προορισμό. Αυτή η δυνατότητα είναι χρήσιμη όταν βλέπετε μια θέση στην οποία θέλετε να επιστρέψετε αργότερα.
Ορισμός αφετηρ - Αυτό το κουμπί σας επιτρέπει να ορίσετε το επιλεγμένο σημείο ως αφετηρία της διαδρομής αντί για το καθορισμένο. Αυτή η δυνατότητα είναι χρήσμη όταν θέλετε να υπολογίσετε μια διαδρομή από ένα σημείο διαφορετικό από την τρέχουσα θέση σας.
Αποστολή μην SMS – Αν χρησιμοποιείτε συσκευή πλοήγησης με τηλέφωνο, μπορείτε να στείλετε, σε ένα μήνυμα SMS, την τρέχουσα θέση σας. Για περισσότερες πληροφορίες, ανατρέξτε στην "Αποστολή διεύθυνσης SMS" (βλ. " Αποστολή διεύθυνσης SMS " στη σελίδα 36).

dpn'BUTTON

name::
* McsEngl.dpn'BUTTON@cptIt,

dpn'DESTINATION

name::
* McsEngl.dpn'DESTINATION@cptIt,

dpn'POI

name::
* McsEngl.dpn'POI@cptIt,

Destinator PN allows you to navigate to various Points of Interest that are grouped into 45 categories. For example, Destinator PN can guide you to the closest bank, shopping center, or a restaurant of your choice.

dpn'MAP

name::
* McsEngl.dpn'MAP@cptIt,
* McsEngl.destinator'map@cptIt,

ΑΓΓΛΙΑ_ΙΡΛΑΝΔΙΑ: 2006.Q4

ΑΛΒΑΝΙΑ: 2007.Q1

ΑΥΣΤΡΙΑ: 2006.Q4

ΒΑΛΤΙΚΕΣ_ΧΩΡΕΣ: 2007.Q1

ΒΟΣΝΙΑ_ΕΡΖΕΓΟΒΙΝΗ: 2007.Q1

ΒΟΥΛΓΑΡΙΑ: 2007.Q1

ΓΑΛΛΙΑ: 2006.Q4

ΓΕΡΜΑΝΙΑ: 2006.Q4

ΔΑΝΙΑ_ΝΟΡΒΗΓΙΑ_ΣΟΥΗΔΙΑ_ΦΙΛΑΝΔΙΑ: 2006.Q4

ΔΡΟΜΟΙ_ΕΥΡΩΠΗΣ_ΑΝΑΤΟΛΗ: 2007.Q1

ΔΡΟΜΟΙ_ΕΥΡΩΠΗΣ_ΔΥΣΗ: 2006.Q4

ΚΡΟΑΤΙΑ: 2007.Q1

ΕΛΛΑΔΑ:
* UNICODE: 2008.Q1.V97, geointelligence
* ΑΓΓΛΙΚΑ: 2006.Q4, : 2005.Q4

ΙΒΙΡΙΚΙ: 2006.Q4

ΙΤΑΛΙΑ: 2006.Q4

ΚΑΛΙΝΙΓΡΑΝΤ: 2007.Q1

ΚΥΠΡΟΣ:
* UNICODE: 2007.Q4

ΜΠΕΝΕΛΟΥΞ: 2006.Q4

ΜΟΛΔΑΒΙΑ: 2007.Q1

ΟΥΓΓΑΡΙΑ: 2007.Q1

ΟΥΚΡΑΝΙΑ: 2007.Q1

ΠΟΛΩΝΙΑ: 2007.Q1

ΡΩΣΣΙΑ: 2006.R2

ΣΕΡΒΙΑ_ΜΑΥΡΟΒΟΥΝΙΟ: 2007.Q1

ΣΚΟΠΙΑ: 2007.Q1

ΣΛΟΒΑΚΙΑ: 2007.Q1

ΣΛΟΒΕΝΙΑ: 2007.Q1

ΤΣΕΧΙΑ: 2007.Q1

gps'EGNOS

name::
* McsEngl.gps'EGNOS@cptIt,

Egnos, η απάντηση της Ευρώπης στο GPS
2/10/2009 4:50:36 μμ

Το νέο σύστημα δορυφορικής πλοήγησης Egnos παρουσίασε η Ευρωπαϊκή Ένωση, ένα σύστημα που θα βελτιώσει έως και 5 φορές την ακρίβεια του σήματος.

Το Egnos αποτελεί άμεσο ανταγωνιστή του Αμερικάνικου GPS που σήμερα προσφέρει ακρίβεια 10 μέτρων στους χρήστες.

Το Ευρωπαϊκό σύστημα θα έχει ακρίβεια 2 μέτρων χρησιμοποιώντας δεδομένα από 3 δορυφόρους, 40 επίγειους σταθμούς και 4 κέντρα ελέγχου.

Το Egnos, που θα είναι διαθέσιμο από το 2010, θα βοηθήσει σε μεγάλο βαθμό τις προσγειώσεις των αεροπλάνων και αποτελεί μια πρώτη δοκιμή για τις υπηρεσίες πλοήγησης πριν την παρουσίαση του Galileo που αναμένεται να αλλάξει τα πράγματα στην πλοήγηση.

Το σύστημα δορυφορικής πλοήγησης Galileo θα τεθεί σε λειτουργία το 2014 και αποτελεί ένα φιλόδοξο σχέδιο 4 δισεκατομμυρίων ευρώ που έχει καθυστερήσει στην εφαρμογή του λόγω της ασυμφωνίας των κρατών μελών για την χρηματοδότησή του.

Το Egnos θα είναι διαθέσιμο σε όσους διαθέτουν συσκευές συμβατές με GPS/SBAS και καλύπτει την Ευρώπη των 27 ενώ αναμένεται να επεκταθεί και σε γειτονικά κράτη.

Σ.Κ.
[http://new.e-go.gr/tech/article.asp?catid=6421&subid=2&pubid=4705604#]

gps'GPSS

name::
* McsEngl.gps'GPSS@cptIt,
* McsEngl.gpss@cptIt559i,

gpss'ADDRESS

name::
* McsEngl.gpss'ADDRESS@cptIt,

http://www.gpss.tripoduk.com/
free GPS Software and mapping for navigation on Laptop, Pocket PC and Smartphone.
maps for 162 countries - to street level for all the USA; voice guidance in 12 languages.

GPS Software on Pocket PC based GPS and Smartphones
http://www.gpss.tripoduk.com/gpssonce.htm:
* maps europe: http://www.gpss.tripoduk.com/eurodown.htm:
* HELP: http://www.un-real-estate.com/gpss/

gpss'BUTTON

name::
* McsEngl.gpss'BUTTON@cptIt,

[HELP] ?
Every page has a "help" button on the left, seen as [?]
the HELP button gives help The colour indicates if the GPS is working. It will normally be green, but if inside the house, with poor GPS signals, it may be yellow. This is the same colour as the "GPS light" on the instrument panel.
- explains what these buttons do. See "getting help ..." above.

[WHAT] - takes you to the "whatmenu" to select what to find, and shows what is selected. what menu

[FIND] - re-calculates the "near menu" of nearest 10 places, then makes the nearest place the "find spot", ready as a new destination.

[DESTINATION] - makes "find spot" or "explore" position the destination, or switches off the destination.

[HOME] - makes destination your "home" position, to guide you home.

[ZOOMIN] - zooms in one scale towards the most detailed, smallest area, map.

[ZOOMOUT] - zooms out to the next scale of larger area, less detailed, map.

[MENU] - change button page.

gpss'ADD-MAPS

name::
* McsEngl.gpss'ADD-MAPS@cptIt,

* http://www.gpss.tripoduk.com/addmaps.htm

Whatever the source of the map image put into GPSS as a BMP file, it will have a little DES text file, to define things like the lat/lon corners, and a WAW file with supporting WAV sound files, for things like spoken position on the map.

The types of file found within GPSS are :
* Displayed Maps supported by MAPS.DIR, .BMP, .DES and .CPR files.
* 'Where are We' speech facility supported by .WAW and .WAV files
* Search for nearest place, or place by name, with .GTX files and GPSS.CAT, .FND
* Commentary on nearby places and roads supported by .GEO files
* Route and Turn-By-Turn Guidance supported by .RGI and .ROO files

gpss'WAW (WhereAreWe) files

name::
* McsEngl.gpss'WAW (WhereAreWe) files@cptIt,

WHERE ARE WE ?" FACILITY - WAW Files.

gps'MACHINE

name::
* McsEngl.gps'MACHINE@cptIt,

Mio c520

mio C520 MioMap V3 (Ευρώπη)
[C520]  390.00EUR
mio C520 MioMap V3 (Ευρώπη)

Widescreen οθόνη αφής 4.3” για ακόμα πιο εύκολη πλοήγηση. Προεγκατεστημένοι οι χάρτες 42 ευρωπαϊκών χωρών (περιλαμβάνεται και η Ελλάδα) Νέος αναβαθμισμένος χάρτης για την Ελλάδα με πολύ μεγάλη κάλυψη. Δωρεάν αναβαθμίσεις χάρτη (μέσω internet). Ασύρματη τεχνολογία Bluetooth για κλήσεις hands-free. Φωνητική πλοήγηση στα ελληνικά και σε άλλες 15 γλώσσες. MP3 player και photo viewer. Όλη η πληροφορία στην οθόνη σας: τώρα έχετε τη δυνατότητα να προβάλετε στην οθόνη του Mio C520 ταυτόχρονα το χάρτη μαζί με πληροφορίες για τη διαδρομή σας, όπως Σημεία ενδιαφέροντος, το χρόνο και την απόσταση του ταξιδιού σας. Δυνατότητα προειδοποιήσεων για τις σταθερές κάμερες ελέγχου ταχύτητας. Ευρεία γκάμα σημείων ενδιαφέροντος, πολλά από τα οποία συνοδεύονται και από τηλέφωνο επικοινωνίας. Τεχνικά Χαρακτηριστικά Επεξεργαστής: 400Mhz GPS Chipset: SiRFStarIII Μνήμη: ROM 1GB / RAM 64 MB / επέκταση μνήμης SD/MMC. Οθόνη: Αφής 4,3”, LCD, 65.000 χρώματα / Ανάλυση 480x272 / Προσανατολισμός: Landscape Μπαταρία: Εσωτερική Lithium / 1300 mAh USB 2.0 Ηχείο ενσωματωμένο. Ασύρματη τεχνολογία Bluetooth για κλήσεις hands-free. Λειτουργικό Σύστημα Microsoft Windows CE v5.0 Σύστημα Πλοήγησης MioMap V3.3 (νέος ανανεωμένος) Picture viewer + Audio player Calculator Στη συσκευασία περιλαμβανονται: USB καλώδιο Βάση στήριξης + φόρτισης Βεντούζα στήριξης Φορτιστής αυτοκινήτου Θήκη μεταφοράς AC Adapter Εγγύηση 2 χρόνια αντιπροσωπειας
Αυτό το προιόν προστέθηκε στον κατάλογό μας την Παρασκευή 21 Μαρτίου, 2008.
[http://www.net-electric.gr/catalog/mio-c520-miomap-v3-p-2266.html] 2008-04-16

gps'ownership

name::
* McsEngl.gps'ownership@cptIt,

_DESCRIPTION:
Who Owns GPS?
The Global Positioning System (GPS) is a national resource of the United States; it can be shut down at any time.

These days, some people can't find their way across town without consulting
the Global Positioning System (GPS) receivers in their vehicles. GPS data
comes from at least 24 satellites in medium Earth orbit. These satellites
are operated and maintained by the U.S. Air Force. Thus, the GPS program is
owned by the U.S. Department of Defense -- and they can shut it down if
they deem it necessary. However, GPS has not been deactivated since it
became operational in 1995. Concerns about terrorists interfering with the
GPS receivers in U.S. civilian aircraft are largely unfounded, since all
aircraft are required to maintain a secondary means of navigation, and air
traffic control would still be able to maintain proper flight operations.

Read More: http://www.wisegeek.com/who-owns-gps.htm?m, {2016-02-04}

gps'standard

name::
* McsEngl.gps'standard@cptIt,

Brief Introduction of SiRF and NMEA

Connecting to the GPS Receiver is the first hurdle to overcome, but first a brief introduction. Firstly there are two GPS Standards, NMEA and SiRF. Although SiRF is the up and coming new boy on the block, NMEA is the acquired standard and one used by 95% of GPS applications. Why two standards ? NMEA is getting old, it was designed to talk at 4800 baud (4kbps). Modem speeds today are 56kbps so you can see NMEA is slow. SiRF has brought about that change by increasing speeds and utilising full serial speeds up to 115200kbps. The thing is although NMEA is slow, some GPS Receivers will work at higher than 4800, but this is what NMEA prefers. The amount of GPS data sent down the serial port is very small and can easily be transmitted in 4800 baud so although you could reach higher speeds, there isn't really any necessary to do so. SiRF uses higher speeds because it can transmit the data quickly and put the processor into a wait state which in theory means it utilises less power, newer SiRF chipsets like SiRF IIe also have low power consumption which help even further with sustaining power to the GPS Receiver.
[http://www.pocketgpsworld.com/winfastnavigatorppc.php]

Many GPS receivers can relay position data to a PC or other device using the NMEA 0183 protocol. NMEA 2000[15] is a newer and less widely adopted protocol. Both are proprietary and controlled by the US-based National Marine Electronics Association. References to the NMEA protocols have been compiled from public records, allowing open source tools like gpsd to read the protocol without violating intellectual property laws. Other proprietary protocols exist as well, such as the SiRF and MTK protocols. Receivers can interface with other devices using methods including a serial connection, USB or Bluetooth.
[http://en.wikipedia.org/wiki/Gps]

gps.EVOLUTION

name::
* McsEngl.gps.EVOLUTION@cptIt,

_ADDRESS.WPG:
* https://en.wikipedia.org/wiki/Global_Positioning_System#Timeline_and_modernization,

{time.1972}:
In 1972, the USAF Central Inertial Guidance Test Facility (Holloman AFB), conducted developmental flight tests of two prototype GPS receivers over White Sands Missile Range, using ground-based pseudo-satellites.[citation needed]

{time.1978}:
In 1978, the first experimental Block-I GPS satellite was launched.[21]

{time.1983}:
In 1983, after Soviet interceptor aircraft shot down the civilian airliner KAL 007 that strayed into prohibited airspace because of navigational errors, killing all 269 people on board, U.S. President Ronald Reagan announced that GPS would be made available for civilian uses once it was completed,[33][34] although it had been previously published [in Navigation magazine] that the CA code (Coarse Acquisition code) would be available to civilian users.

{time.1985}:
By 1985, ten more experimental Block-I satellites had been launched to validate the concept.
Beginning in 1988, Command & Control of these satellites was transitioned from Onizuka AFS, California to the 2nd Satellite Control Squadron (2SCS) located at Falcon Air Force Station in Colorado Springs, Colorado.[35][36]

{time.1989}:
On February 14, 1989, the first modern Block-II satellite was launched.
The Gulf War from 1990 to 1991 was the first conflict in which the military widely used GPS.[37]

{time.1991}:
In 1991, a project to create a miniature GPS receiver successfully ended, replacing the previous 50 pound military receivers with a 2.75 pound handheld receiver.[10]

{time.1992}:
In 1992, the 2nd Space Wing, which originally managed the system, was inactivated and replaced by the 50th Space Wing.

{time.1993}:
By December 1993, GPS achieved initial operational capability (IOC), indicating a full constellation (24 satellites) was available and providing the Standard Positioning Service (SPS).[38]

{time.1995}:
Full Operational Capability (FOC) was declared by Air Force Space Command (AFSPC) in April 1995, signifying full availability of the military's secure Precise Positioning Service (PPS).[38]

{time.1996}:
In 1996, recognizing the importance of GPS to civilian users as well as military users, U.S. President Bill Clinton issued a policy directive[39] declaring GPS a dual-use system and establishing an Interagency GPS Executive Board to manage it as a national asset.

{time.1998}:
In 1998, United States Vice President Al Gore announced plans to upgrade GPS with two new civilian signals for enhanced user accuracy and reliability, particularly with respect to aviation safety and in 2000 the United States Congress authorized the effort, referring to it as GPS III.

{time.2000}:
On May 2, 2000 "Selective Availability" was discontinued as a result of the 1996 executive order, allowing users to receive a non-degraded signal globally.

{time.2004}:
In 2004, the United States Government signed an agreement with the European Community establishing cooperation related to GPS and Europe's planned Galileo system.
In 2004, United States President George W. Bush updated the national policy and replaced the executive board with the National Executive Committee for Space-Based Positioning, Navigation, and Timing.[40]
November 2004, Qualcomm announced successful tests of assisted GPS for mobile phones.[41]

{time.2005}:
In 2005, the first modernized GPS satellite was launched and began transmitting a second civilian signal (L2C) for enhanced user performance.[42]

{time.2007}:
On September 14, 2007, the aging mainframe-based Ground Segment Control System was transferred to the new Architecture Evolution Plan.[43]

{time.2009}:
On May 19, 2009, the United States Government Accountability Office issued a report warning that some GPS satellites could fail as soon as 2010.[44]
On May 21, 2009, the Air Force Space Command allayed fears of GPS failure saying "There's only a small risk we will not continue to exceed our performance standard."[45]

{time.2010}:
On January 11, 2010, an update of ground control systems caused a software incompatibility with 8000 to 10000 military receivers manufactured by a division of Trimble Navigation Limited of Sunnyvale, Calif.[46]
On February 25, 2010,[47] the U.S. Air Force awarded the contract to develop the GPS Next Generation Operational Control System (OCX) to improve accuracy and availability of GPS navigation signals, and serve as a critical part of GPS modernization.
[https://en.wikipedia.org/wiki/Global_Positioning_System#Timeline_and_modernization]

sns.GALILEO

name::
* McsEngl.sns.GALILEO@cptIt,

snsgll'Resource

name::
* McsEngl.snsgll'Resource@cptIt,

_ADDRESS.WPG:
* EU's Galileo satellite system goes live after 17 years
http://www.bbc.com/news/science-environment-38329341 {2016-12-15}

FvMcs.techInfo.HARDWARE

name::
* McsEngl.conceptIt1,
* McsEngl.techInfo.HARDWARE@cptIt,
* McsEngl.FvMcs.techInfo.HARDWARE@cptIt,
* McsEngl.hard@cptIt1, {2011-09-07}
* McsEngl.hardware@cptIt1,
* McsEngl.IT HARDWARE@cptIt,
* McsEngl.it.hardware@cptIt1,
* McsEngl.InfoTech.hardware@cptIt1,
* McsEngl.techDataHard@cptIt1, {2011-09-07}
* McsEngl.itHrd@cptIt1, {2012-05-28}
* McsElln.ΜΗΧΑΝΙΚΟ ΜΕΡΟΣ@cptIt,
* McsElln.ΤΕΧΝΙΚΟΜΗΧΑΝΙΚΟΣ ΕΞΟΠΛΙΣΜΟΣ@cptIt,
* McsElln.ΥΛΙΚΟ@cptIt,
* McsElln.υλικό-πληροφοριακής-τεxνολογίας-εννΠτ@cptIt, {2012-11-18}

DEFINITION

HARDWARE είναι ΚΑΘΕ ΣΥΣΚΕΥΗ που χρησιμοποιείται στην πληροφοριακή-τεχνολογια#cptIt0.1#.
[hmnSngo.1994-04]

HARDWARE ονομάζουν ΚΑΘΕ "σκληρή" οντοτητα, δηλ. συσκευή.

itHrd'GENERIC

_GENERIC:
* entity.economic.satisfier.working.tech.info#cptItsoft0#

itHrd'PRICE#cptEconomy541.44#

name::
* McsEngl.itHrd'PRICE@cptIt,

itHrd'measure#cptCore88#

name::
* McsEngl.itHrd'measure@cptIt,

Εξάπλωση της τεχνολογιας. Πόσοι ήδη έχουν αγοράσει την τεχνολογια, αλλά και οι ΔΥΝΑΜΕΙ αγοραστες.

SPECIFIC

name::
* McsEngl.itHard.specific@cptIt,

_SPECIFIC: itHrd.Alphabetically:
* itHrd.communication#cptItsoft289#
* itHrd.device#cptItsoft1.2#
* itHrd.machine#cptItsoft1.1#
* itHrd.network#cptItsoft21.5#
* itHrd.fax#cptItsoft290#
* itHrd.pager#cptItsoft267#
* itHrd.photo#cptItsoft184#
* itHrd.projector
* itHrd.radio#cptItsoft214#
* itHrd.scanner#cptItsoft131#
* itHrd.slide
* itHrd.telephone#cptItsoft166#
* itHrd.telex;
* itHrd.television#cptItsoft216#
* itHrd.video#cptItsoft382#
* itHrd.videophone#cptItsoft189#
* itHrd.videotape
===
* ΒΙΒΛΙΑ
* ΔΟΡΥΦΟΡΙΚΗ'ΚΕΡΑΙΑ#cptIt395#
* ΕΠΙΠΛΑ.ΓΡΑΦΕΙΟΥ
* ΠΕΡΙΟΔΙΚΑ
* ΣΥΣΤΗΜΑΤΑ BAR-CODE & OCR (ΑΝΑΓΝΩΣΤΕΣ BARCODES)
* ΤΑΜΕΙΑΚΗ'ΜΗΧΑΝΗ#cptIt272#
* ΦΩΤΟΤΥΠΙΚΑ-ΦΩΤΟΑΝΤΙΓΡΑΦΙΚΑ
* ΦΩΤΟΤΥΠΙΚΟ#cptIt249#

parts of a computer system

_SPECIFIC:
* computer's-box#cptItsoft983#
* computer's-battery#cptItsoft181#
* computer's-bus#cptItsoft71#
* computer's-DISPLAY#cptIt42#
* computer's-ELECTRONIC-CLOCK#cptIt229#
* computer's-INTEGRATED-CIRCUIT#cptIt222#
* computer's-processor#cptIt13#
* computer's-RAM#cptItsoft140#
* computer's-MOTHERBOARD#cptIt984#
* computer's-PORT#cptIt115#
* computer's-storage#cptItsoft14#
* computer's-ΚΑΡΤΕΣ-ΕΠΕΚΤΑΣΗΣ#cptIt979#

Peripheral | ΠΕΡΙΦΕΡΕΙΑΚΑ

_SPECIFIC:
* AUDIO#cptIt40#
* CDROM DRIVE#cptIt265#
* COPY'DISKETTE'SYSTEMS# illp#
* LASER POINTER, gen
* LCD'OVERHEAD#cptIt351#
* CURSOR MOVEMENT#cptIt188#
* Printer#cptIt61#
* SCANNER#cptIt131#
* Security#cptIt43#
* UPS#cptIt2014#
* Video#cptIt38#
* Automatic equipment controllers

consumable | ΑΝΑΛΩΣΙΜΑ

_SPECIFIC:
ΔΙΣΚΕΤΕΣ
ΜΕΛΑΝΟΤΑΙΝΙΕΣ
ΧΑΡΤΙ

itHard.Device

_CREATED: {2012-05-28}

name::
* McsEngl.itHard.Device@cptIt,
* McsEngl.conceptIt1.2,
* McsEngl.infotech-device@cptIt1.2, {2012-05-28}

_DESCRIPTION:
It is hardware part of a machine with a relatively independent structure eg a motherboard.
[hmnSngo.2012-05-28]

itHard.Machine

_CREATED: {2012-05-28}

name::
* McsEngl.itHard.Machine@cptIt,
* McsEngl.conceptIt1.1,
* McsEngl.infotech-device@cptIt1.2, {2012-05-28}

_DESCRIPTION:
It is hardware that works relatively independently eg a printer (a printer works with a computer, but a computer works and without a printer but a computer can not work without a motherboard(device)).
[hmnSngo.2012-05-28]

_SPECIFIC:
* itHrd.ATM#cptItsoft98.9#
* itHrd.fax#cptItsoft290#
* itHrd.pager#cptItsoft267#
* itHrd.photo_camera#cptItsoft184#
* itHrd.projector#cptIt337#
* itHrd.radio#cptItsoft214#
* itHrd.scanner#cptItsoft131#
* itHrd.telephone#cptItsoft166#
* itHrd.telex##
* itHrd.television#cptItsoft216#
* itHrd.video#cptItsoft382#
* itHrd.videophone#cptItsoft189#

FvMcs.techInfo.doing.MACHINE-REASONING

NAME

name::
* McsEngl.conceptIt485,
* McsEngl.techInfo.doing.MACHINE-REASONING@cptIt,
* McsEngl.FvMcs.techInfo.doing.MACHINE-REASONING@cptIt,
* McsEngl.automated-reasoning@cptIt485,
* McsEngl.inference-mechanism@cptIt,
* McsEngl.machine-reasoning@cptIt,
* McsEngl.mechanical-reasoning@cptIt,
* McsEngl.mechanized-reasoning@cptIt,
* McsEngl.reasoning@cptIt485,
* McsEngl.reasoning.mechanical@cptIt485,
* McsEngl.reasoning-technology@cptIt485,
* McsEngl.techReasoning@cptIt485, {2011-09-02}
====== lagoGreek:
* McsElln.ΑΥΤΟΜΑΤΟΠΟΙΗΜΕΝΗ-ΣΥΛΛΟΓΙΣΤΙΚΗ-πτ485@cptIt,

DEFINITION

MECHANICAL-REASONING is REASONING#cptCore373.1# by a Information-Machine-System#cptIt453.1#.
[NIKOS 1997oct]

Automated reasoning is an area of computer science dedicated to understanding different aspects of reasoning in a way that allows the creation of software which allows computers to reason completely or nearly completely automatically. As such, it is usually considered a subfield of artificial intelligence, but it also has strong connections to theoretical computer science and even philosophy.

The most developed subareas of automated reasoning probably are automated theorem proving (and the less automated but more pragmatic subfield of interactive theorem proving) and automated proof checking (viewed as guaranteed correct reasoning under fixed assumptions), but extensive work has also been done in reasoning by analogy, induction and abduction. Other important topics are reasoning under uncertainty and non-monotonic reasoning. An important part of the uncertainty field is that of argumentation, where further constraints of minimality and consistency are applied on top of the more standard automated deduction. John Pollock's Oscar system is an example of an automated argumentation system that is more specific than being just an automated theorem prover. Formal argumentation is subfield of artificial intelligence.

Tools and techniques include the classical logics and calculi from automated theorem proving, but also fuzzy logic, Bayesian inference, reasoning with maximal entropy and a large number of less formal ad-hoc techniques.

[edit] Conferences and workshops

* International Joint Conference on Automated Reasoning (IJCAR)
* Conference on Automated Deduction (CADE)
* International Workshop on Implementation of Logics
* Workshop on Empirically Successful Computerized Reasoning

[edit] Journals

* Journal of Automated Reasoning

Communities
* Association for Automated Reasoning (AAR)
[http://en.wikipedia.org/wiki/Automated_reasoning]

To understand what automated reasoning is, we must first understand what reasoning is.
Reasoning is the process of drawing conclusions from facts. For the reasoning to be sound, these conclusions must follow inevitably from the facts from which they are drawn. In other words, reasoning [...] is not concerned with some conclusion that has a good chance of being true when the facts are true. Indeed, reasoning as used here refers to logical reasoning, not of common-sense reasoning or probabilistic reasoning. The only conclusions that are acceptable are those that follow logically from the supplied facts.
The object of automated reasoning is to write computer programs that assist in solving problems and in answering questions requiring reasoning. The assistance provided by an automated reasoning program is available in two different modes. You can use such a program in an iterative fashion; that is, you can instruct it to draw some conclusions and present them to you, and then, based on your analysis of the conclusions, it can in the next run execute your new set of instructions. Or you can use such a program in a batch mode; that is, you can assign it an entire reasoning task and await the final result. Larry Wos; Ross Overbeek; Ewing Lusk; Jim Boyle
Automated reasoning: Introduction and Applications.
McGraw Hill 1992.

GENERIC

_GENERIC:
* tech-knowledge#cptItsoft458#
* INFERENCING#cptCore475.152#

WHOLE

_WHOLE:
* AI#cptIt478#

* As such, it is usually considered a subfield of artificial intelligence, but it also has strong connections to theoretical computer science and even philosophy.
[http://en.wikipedia.org/wiki/Automated_reasoning]

PART#cptCore546.13#


* AUTOMATED_THEOREM_PROVING
* INTERACTIVE_THEOREM_PROVING
* REASONING_BY_ANALOGY
* REASONING_BY_INDUCTION
* REASONING_BY_ABDUCTION
* REASONING_UNDER_UNCERTAINTY
* NONMONOTONIC_REASONING
* AUTOMATED_DEDUCTION
* ARGUMENTATION
* AUTOMATED_ARGUMENTATION
* FORMAL_ARGUMENTATION

The most developed subareas of automated reasoning probably are automated theorem proving (and the less automated but more pragmatic subfield of interactive theorem proving) and automated proof checking (viewed as guaranteed correct reasoning under fixed assumptions), but extensive work has also been done in reasoning by analogy, induction and abduction. Other important topics are reasoning under uncertainty and non-monotonic reasoning. An important part of the uncertainty field is that of argumentation, where further constraints of minimality and consistency are applied on top of the more standard automated deduction. John Pollock's Oscar system is an example of an automated argumentation system that is more specific than being just an automated theorem prover. Formal argumentation is subfield of artificial intelligence.
[http://en.wikipedia.org/wiki/Automated_reasoning] 2007-12-04

PROGRAM (reasoner)

_CREATED: {2007-12-06}

name::
* McsEngl.PROGRAM (reasoner)@cptIt,
* McsEngl.conceptIt485.2,
* McsEngl.inferencing'program@cptIt485.2,
* McsEngl.krp'inference'mechanism@cptIt,
* McsEngl.krp'Inferencing@cptIt,
* McsEngl.krp'Mechanical'Reasoning@cptIt,
* McsEngl.reasoner@cptIt485.2,

_DEFINITION:
INFERENCE ABILITY the system must and when STORES knowledge (eg adding a specific-cpt to automatically add the inherited attributes) and when RETRIEVES knowledge (find a concept that satisfies some criteria).
[hmnSngo.2000jul29]

reasoner'FUNCTION:
SOME TASKS:
1) DEFINITION RELATED TASKS:
-- What is A? (Get the def of A)

2) GEN-SUB RELATION TASKS:
-- Is A a B? (Is A sub of B)

3) WHOLE-PART RELATIONS TASK:
-- Is A part of B?
-- Find X with A,B,C,... (What X has as parts A,B,C,...) 2000jul26

4) ENVIRONMENT RELATIONS INFERENCES:

5) TEMPORAL-KNOWLEDGE (EVOLUTION) INFERENCES:
-- What happent in 1995? 2000jul26
-- When A died? 2000jul26
-- Show me the evolution of A. 2000jul26

6) VIEWS INFERENCES:
-- What are the views on A? 2000jul26

reasoner'SPECIFEINO:
* INFERENCE_ENGINE#cptIt485.1: attSpe#
* SEMANTIC_REASONER
* OWL_REASONER##

AUTOMATED-PROOF-CHECKING

Proof checking is the process of using software for checking proofs for correctness. It is one of the most developed fields in automated reasoning.
[http://en.wikipedia.org/wiki/Automated_proof_checking]

AUTOMATED-THEOREM-PROVING

_CREATED: {2007-12-04}

name::
* McsEngl.AUTOMATED-THEOREM-PROVING@cptIt,
* McsEngl.automated-theorem-proving@cptIt,

_GENERIC:
* math-program#cptItsoft952#

Automated theorem proving (ATP) or automated deduction, currently the most well-developed subfield of automated reasoning (AR), is the proving of mathematical theorems by a computer program.
[http://en.wikipedia.org/wiki/Automated_theorem_proving]

INFERENCE-ENGINE

_CREATED: {2007-12-06}

name::
* McsEngl.INFERENCE-ENGINE@cptIt,
* McsEngl.conceptIt485.1,
* McsEngl.inference'engine@cptIt485.1,

_DEFINITION:
* In computer science, and specifically the branches of knowledge engineering and artificial intelligence, an inference engine is a computer program that tries to derive answers from a knowledge base. It is the "brain" that expert systems use to reason about the information in the knowledge base for the ultimate purpose of formulating new conclusions. Inference engines are considered to be a special case of reasoning engines, which can use more general methods of reasoning.
[http://en.wikipedia.org/wiki/Inference_engine]

TUTEINO:
* program-knowledge#cptItsoft497#

_GENERIC

_SPECIFIC:
* EXPERT_SYSTEM'S_INFERENCE_ENGING
* KRP'S_INFERENCE_ENGINE

INTERACTIVE-THEOREM-PROVING

Interactive theorem proving is the field of computer science and mathematical logic concerned with tools to develop formal proofs by man-machine collaboration. This involves some sort of proof assistant: an interactive proof editor, or other interface, with which a human can guide the search for proofs, the details of which are stored in, and some steps provided by, a computer.

Examples include:

* HOL theorem provers - A family of tools ultimately derived from the LCF theorem prover. In these systems the logical core is a library of their programming language. Theorems represent new elements of the language and can only be introduced via "strategies" which guarantee logical correctness. Strategy composition gives users the ability to produce significant proofs with relatively few interactions with the system. Members of the family include:
o HOL4 - The "primary descendant". Moscow ML based.
o HOL Lite - A thriving "minimalist fork". OCaml based.
o Isabelle - With a BSD license. Based on Standard ML.
o ProofPower - Went proprietary, then returned to open source. Based on Standard ML.

* Prototype Verification System (PVS) - a proof language and system based on higher-order logic

* Coq - Which allows the expression of mathematical assertions, mechanically checks proofs of these assertions, helps to find formal proofs, and extracts a certified program from the constructive proof of its formal specification.

* PhoX - A proof assistant based on higher-order logic which is eXtensible

* MINLOG - A proof assistant based on first-order minimal logic.
[http://en.wikipedia.org/wiki/Interactive_theorem_proving]

reasoning'Method

name::
* McsEngl.reasoning'Method@cptIt,
* McsEngl.conceptIt485.3,
* McsEngl.knowledge-reasoning-method@cptIt485.3,

_GENERIC:
* knowledge-processing-method#cptItsoft525.2#

SEMANTIC-REASONER

_CREATED: {2007-12-06}

name::
* McsEngl.SEMANTIC-REASONER@cptIt,
* McsEngl.reasoning'engine@cptIt485i,
* McsEngl.rules'engine@cptIt485i,
* McsEngl.semantic'reasoner@cptIt485i,

_DEFINITION:
A semantic reasoner, reasoning engine, rules engine, or simply a reasoner, is a piece of software able to infer logical consequences from a set of asserted facts or axioms. The notion of a semantic reasoner generalizes that of an inference engine, by providing a richer set of mechanisms to work with. The inference rules are commonly specified by means of an ontology language, and often a description language. Many reasoners use first order predicate logic to perform reasoning; inference commonly proceeds by forward chaining and backward chaining. There are also examples of probalistic reasoners, including Pei Wang's non-axiomatic reasoning system, Novamente's probablistic logic network, which tip their hat to reasoning Bayesian networkss.
[http://en.wikipedia.org/wiki/Semantic_reasoner]

_SPECIFIC:
Existing semantic reasoners:
* Bossam, a RETE-based rule engine with native supports for reasoning over OWL ontologies, SWRL ontologies, and RuleML rules.
* Hoolet, an implementation of an OWL-DL reasoner. [1]
* Pellet, an open-source Java OWL DL reasoner. [2]
* KAON2 is an infrastructure for managing OWL-DL, SWRL, and F-Logic ontologies.
* RACER system, a semantic web reasoning system and information repository
* Jena (framework), an open source semantic web framework for Java.
* FaCT, a description logic (DL) classifier. [3]
* FaCT++, the new generation of FaCT OWL-DL reasoner. [4]
* SweetRules, an integrated set of tools for Semantic web rules and ontologies. [5]
* Internet Business Logic, a kind of Wiki for writing and running knowledge. It combines three kinds of semantics: English, Logic, and Data. It provides automatic generation and execution of complex networked SQL, with English explanations of the results. Can also be used as an SOA endpoint on the Internet. Shared use is free.
[http://en.wikipedia.org/wiki/Semantic_reasoner]

TUTEINO:
* program-knowledge#cptItsoft497#

METHODOLOGY

assumption-based reasoning

Case-based reasoning

Model-based reasoning

multi-layered cooperative reasoning

object-oriented reasoning

Qualitative reasoning

CASE-BASED-REASONING

Case-based reasoning (CBR), broadly construed, is the process of solving new problems based on the solutions of similar past problems. An auto mechanic who fixes an engine by recalling another car that exhibited similar symptoms is using case-based reasoning. A lawyer who advocates a particular outcome in a trial based on legal precedents or a judge who creates case law is using case-based reasoning. So, too, an engineer copying working elements of nature (practicing biomimicry), is treating nature as a database of solutions to problems. Case-based reasoning is a prominent kind of analogy making.

It has been argued that case-based reasoning is not only a powerful method for computer reasoning, but also a pervasive behavior in everyday human problem solving. Or, more radically, that all reasoning is based on past cases experienced or accepted by the being actively exercising choice – prototype theory – most deeply explored in human cognitive science.
[http://en.wikipedia.org/wiki/Case-based_reasoning]

RETE-ALGORITHM

The Rete algorithm is an efficient pattern matching algorithm for implementing production rule systems. The Rete algorithm was designed by Dr Charles L. Forgy of Carnegie Mellon University, first published in a working paper in 1974, and later elaborated in his 1979 Ph.D. thesis and a 1982 paper (see References). Rete has become the basis for many popular expert systems, including CLIPS, Jess, JBoss Rules, and Soar.

A nai"ve implementation of an expert system might check each rule against the known facts in the Knowledge base, firing that rule if necessary, then moving on to the next rule (and looping back to the first rule when finished). For even moderate sized rules and facts knowledge-bases, this nai"ve approach performs far too slowly.

The Rete algorithm (usually pronounced either 'REET', 'REE-tee' or, in Europe, 're-tay' after the Latin pronunciation, from the Latin 'rete' for net, or network) provides the basis for a more efficient implementation of an expert system. A Rete-based expert system builds a network of nodes, where each node (except the root) corresponds to a pattern occurring in the left-hand-side of a rule. The path from the root node to a leaf node defines a complete rule left-hand-side. Each node has a memory of facts which satisfy that pattern. This structure is essentially a generalized Trie.

As new facts are asserted or modified, they propagate along the network, causing nodes to be annotated when that fact matches that pattern. When a fact or combination of facts causes all of the patterns for a given rule to be satisfied, a leaf node is reached and the corresponding rule is triggered.

The Rete algorithm is designed to sacrifice memory for increased speed. In most cases, the speed increase over nai"ve implementations is several orders of magnitude (because Rete performance is theoretically independent of the number of rules in the system). In very large expert systems, however, the original Rete algorithm tends to run into memory consumption problems. Other algorithms, both novel and Rete-based, have since been designed which require less memory.
[http://en.wikipedia.org/wiki/Rete_algorithm]

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt485#

Commonsense reasoning investigates the reasoning mechanisms of an agent interacting with the real world in which it often has to take the troublesome decision of completing or withdrawing information in order to be coherent with its observations and undertake suitable actions. Classical formalisms such as first-order logics are, in general, inadequate to deal with the complex reasoning task required by a human-level intelligent agent behaving, with commonsense, in the real world. Therefore different forms of reasoning, such as
-nonmonotonic reasoning,
-belief revision,
-abduction,
-contextual reasoning etc., have been devised in the knowledge representation research community to challenge limitations of classical formalisms with new forms of reasoning mechanisms.
[Roma univ 1996 Report]

constraint reasoning, belief revision, temporal reasoning

Deductive and Inductive Reasoning

Deductive reasoning can be described as reasoning of the form if A then B. Deduction is in some sense the direct application of knowledge in the production of new knowledge. However, this new knowledge does not represent any new semantic information: the rule represents the knowledge as completely as the added knowledge since any time the assertions (A) are true then the conclusion B is true as well.
In contrast to this, inductive reasoning results in the addition of semantic information. There are a great many ways in which inductive inference has been characterized but most are similar to those specified by the philosopher John Stuart Mill (1843). Basically, in this paradigm, positive instances of some phenomena that have a common trait identify that trait as indicating some larger commonality. Similarly, negative instances that differ for some trait from the positive instances are also indicative of a crucial feature. This methodology is at the center of concept acquisition programs and plays a key role in many AI systems. In general, induction is more difficult than deduction because of both the addition of new semantic information and because the inferred concept may not be the correct one. In induction, assertions do not necessarily lead to true conclusions.
[http://krusty.eecs.umich.edu/cogarch4/toc_defs/defs_capa/defs_reasoning.html] 1998feb18

NONMONOTONIC-REASONING

It is the ability of a kms to draw conclusions based on the absence of knowledge from a database. The addition of new sentences to the database may be cause for the system to retract earlier conclusions.
[KIF manual]

MISC

assumption-based reasoning

Case-based reasoning

Model-based reasoning

multi-layered cooperative reasoning

object-oriented reasoning

Qualitative reasoning

USE

We use MR in order to perform
- diagnosis
- planning/scheduling
- design
- process control
...
They use this 'attribute' to classify kbs.
[nikkas 1999aug31]

FvMcs.techInfo.MULTIMEDIA

NAME

name::
* McsEngl.conceptIt105,
* McsEngl.techInfo.MULTIMEDIA@cptIt,
* McsEngl.FvMcs.techInfo.MULTIMEDIA@cptIt,
* McsEngl.hypermedia-technology@cptIt,
* McsEngl.it'multimedia@cptIt105,
* McsEngl.multimedia@cptIt105,
* McsEngl.multimedia@cptIt,
* McsElln.ΠΟΛΥΜΕΣΑ@cptIt,

O όρος πολυμέσα χρησιμοποιήθηκε για πρωτη φορά τη δεκαετία του '60, προκειμενου να γίνει κατανοητή η περγραφή των απλών σήμερα -αλλά επαναστατικών τότε- ΠΑΡΟΥΣΙΆΣΕΩΝ με ταινίες και slides.
[PC MASTER, OCT. 1994, 32]

DEFINITION

MULTIMEDIA:
The presentation of information on a computer using audio, video, text, animation, and graphics.
[BYTE, JUL 1993, 108]

"Generally the term multimedia means the integration of text, graphics, sound, animation and video to convey information. A key element of the concept is interaction"
[Frater-at-al, 1992, 3#cptResource224]

The term fist appeared in education durinng 1960s and 1970s, when it described new media supporting the learning process in classroom instruction.
[Frater-at-al, 1992, 2#cptResource224]

Η ένωση των τριων διαφορετικών κόσμων
- της πληροφορικής
- της μουσικής
- του κινοματογράφου
είναι το μεγάλο επίτευγμα των multimedia.
[PC MASTER, OCT. 1994, 35]

GENERIC

_GENERIC:
* entity.economic.satisfier.working.tech.info#cptItsoft0#

SOFTWARE


AUDIO#cptIt247: attPar#
HYPERTEXT#cptIt255: attPar#
VIDEO#cptIt28: attPar#

PROGRAMS#ql:[Field program:hypermedia | hypertext]# {HYPERTEXT/HYPERMEDIA}

conversion

limitations

Need (the driving force)

Vendors

AUTHORING'TOOL

name::
* McsEngl.AUTHORING'TOOL@cptIt,

AUTHORING TOOL: Εχει καθιερωθεί να λέγονται τα προγραμματα με τα οποία κατασκευάζονται multimedia applications.

BIBLIOGRAPHY#ql:hypertext@resource.nfo#

Doug Engelbart

age
66 year old. (Pollack 1991 F13)
[so he was born at 1925]

1977: Tymshare Inc.
In 1977, Dr. Engelbart moved to Tymshare Inc., a computer service provider that sold his system under the name Augment (as in augment human intelligence). But Augment was offered on big computers, and business faded when personal computers proliferated. (Pollack 1991 F13)

1989: Bootstrap
In 1989, Dr. Engerlbart set up the Bootstrap Project to try to interest companies in using his techniques to "bootstrap" themselsves toward better performance. Initial funding came from Apple Computer, Sun Microsystems and Mitch Kapor, the founder of the Lotus Development Corporation.
But that funding ran out and, partly because times are tough, partly because Dr. Engelbart's ideas are somewhat difficult to understand, has not been replaced. He now runs Bootstrap with his daughter Christina Engelbart, operating out of a donated office in Fremont, Calif., and trying to keep the project alive with seminars and videotapes.
[Pollack 1991 F13]

EVOLUTION#cptCore546.171#

Η αρχή των πολυμέσων έγινε με τη χρήση της οπτικής τεχνολογίας. Η πρώτη προσπάθεια ήταν αυτή της philiphs με το συστημα LaserVision, το οποίο βασιζόταν σε μια συσκευή βιντεοδίσκου και είχε τη δυνατότητα να αποθηκεύει εικόνες ζωντανού βίντεο και ήχο (το καθενα απο αυτά σε αναλογική μορφή). Το σύστημα αυτό, που παρουσιάστηκε για πρωτη φορά στην αγορά το 1978 ως καταναλωτικό προϊόν, έδωσε μια πρωτη "γεύση" του γεφυρώματος δύο αρκετά διαφορετικών κόσμων, του βίντεο και των υπολογιστών.
[PC MASTER, OCT. 1994, 32]

GREEK'COMPANIES

name::
* McsEngl.GREEK'COMPANIES@cptIt,

Bαβέλ, Πουλιάδης, Οptical Systems,

STANDARD#cptIt139#

MPC

MPC. 1990. The first standard for MULTIMEDIA personal computers.
Video is not yet included in the official MPC definition.
[Frater-at-al, 1992, 5#cptResource224]

MULTIMEDIA PC MARKETING COUNCIL: Είναι η ομάδα εταιριών, Microsoft, Fujitsu, NEC,... που δημιούργησαν το MPC standard.

ULTIMEDIA; IBM

Δεν καλύπτει MIDI input.

TED NELSON

1961: begining:
Mr. Nelson has been pursuing hypertext since 1061, when he was a graduate studern in sociology and he wanted to organize his notes. (Pollack 1991 F13)

1967: xanadu company:
He formed the Hanadu Operating Company to develop the necessary software in 1979. (Pollack 1991 F13)

1988: Autodesk:
In 1988, Autodesk, a leading personal computer software company, bought 80 percent of Xanadu and put the company on a firm financial footing.... Sensitive to the credibility issue, they say a version of the software might be ready -for testing- in six months to a year...
Xanadu will be a database program to help people work together and keep track of documents...
When, or if, Xanadu finally appears, Autodesk is expected to sell it to corporations. (Pollack 1991 F13)

age:
54 (Pollack 1991 F13)
[so he was born at 1937]

his goal:
But Mr. Nelson wants to create a Xanadu for public use, to store and collect the knowledge of the world.
[Pollack 1991 F13]

SPECIFIC

Specific_concepts (level 3) =

PROGRAMS#ql:[Field program:hypertext/hypermedia]# {|4| HYPERTEXT/HYPERMEDIA}

Electronic'Book#cptIt316: attSpe#

ΑΛΦΑ ΜΙ: Τράπεζα οικονομικών πληροφοριών, Αγ Κωνσταντίνου 3, 10431 Αθήνα, τηλ. 5248403, 5240951.

ΟΠΤΙΚΗ ΕΠΕΞΕΡΓΑΣΙΑ ΕΓΓΡΑΦΩΝ: DATAMEDIA AE (FILENET) 7.5 million documenets for the Greek Red Cross.

FvMcs.techInfo.doing.NATURAL-LANGUAGE-PROCESSING-(nlp)

_CREATED: {2000-09-13}

name::
* McsEngl.conceptIt359,
* McsEngl.techInfo.doing.NATURAL-LANGUAGE-PROCESSING-(nlp)@cptIt,
* McsEngl.FvMcs.techInfo.doing.NATURAL-LANGUAGE-PROCESSING-(nlp)@cptIt,
* McsEngl.natural-language-processing-field@cptIt,
* McsEngl.natural-language-processing-technology@cptIt,
* McsEngl.nlp@cptIt359,

DEFINITION

Natural language processing (NLP) is a field of computer science and linguistics concerned with the interactions between computers and human (natural) languages; it began as a branch of artificial intelligence.[1] In theory, natural language processing is a very attractive method of human–computer interaction. Natural language understanding is sometimes referred to as an AI-complete problem because it seems to require extensive knowledge about the outside world and the ability to manipulate it.

Whether NLP is distinct from, or identical to, the field of computational linguistics is a matter of perspective. The Association for Computational Linguistics defines the latter as focusing on the theoretical aspects of NLP. On the other hand, the open-access journal "Computational Linguistics", styles itself as "the longest running publication devoted exclusively to the design and analysis of natural language processing systems" (Computational Linguistics (Journal))

Modern NLP algorithms are grounded in machine learning, especially statistical machine learning. Research into modern statistical NLP algorithms requires an understanding of a number of disparate fields, including linguistics, computer science, and statistics. For a discussion of the types of algorithms currently used in NLP, see the article on pattern recognition.
[http://en.wikipedia.org/wiki/Natural_language_processing]

nlp'GENERIC

_GENERIC:
* tech-knowledge#cptItsoft458#

nlp'WHOLE

_WHOLE:
AI Science#cptIt478#

nlp'machine-translation

_CREATED: {2000-09-13}

NAME

name::
* McsEngl.nlp'machine-translation@cptIt,
* McsEngl.conceptIt57,
* McsEngl.machine-translation-technology@cptIt,
* McsEngl.machine'translation'technology@cptIt57,
* McsEngl.mechanical-translation@cptIt,
* McsEngl.mechanical'translation@cptIt57,
* McsEngl.techInfo.MACHINE-TRANSLATION@cptIt,

DEFINITION

WHOLE

_WHOLE:
(nlp)#cptItsoft359#
AI Science#cptIt478#

Method

name::
* McsEngl.conceptIt57.1,

Program-#cptIt497.15#

nlp'Method

name::
* McsEngl.nlp'Method@cptIt,
* McsEngl.conceptIt359.1,

nlp'natural-language-generation-tech

_CREATED: {2000-09-14}

NAME

name::
* McsEngl.nlp'natural-language-generation-tech@cptIt,
* McsEngl.conceptIt545,
* McsEngl.Natural-Language-Generation-field@cptIt,
* McsEngl.natural'language'generation@cptIt545,
* McsEngl.nlg@cptIt545,
* McsEngl.tech.Natural-Language-Generation@cptIt,

DEFINITION

The area of study called natural language generation (NLG) investigates how computer programs can be made
- to produce high-quality natural language text
- from computer-internal representations of information.
Motivations for this study range from entirely theoretical (linguistic, psycholinguistic) to entirely practical (for the production of output systems for computer programs).
[http://www.cse.ogi.edu/CSLU/HLTsurvey/, 1996, 4.1]

GENERIC

_GENERIC:
* tech-knowledge#cptItsoft458#

WHOLE

_WHOLE:
(nlp)#cptIt359#

ENVIRONMENT#cptCore756#

NLG and SEMANTICS

Any kind of generation of natural language output (e.g., summaries of financial data, traces of KBS system operations) usually requires semantic processing. Generation requires the construction of an appropriate meaning representation, and then the production of a sentence or sequence of sentences which express the same content in a way that is natural for a reader to comprehend, e.g., [MKS94]. To illustrate, if a database lists a 10 a.m.\ flight from London to Warsaw on the 1st--14th, and 16th--30th of November, then it is more helpful to answer the question What days does that flight go? by Every day except the 15th instead of a list of 30 days of the month. But to do this the system needs to know that the semantic representations of the two propositions are equivalent.
[http://www.cse.ogi.edu/CSLU/HLTsurvey/, 1996, 3.5.2]

SPECIFIC

_SPECIFIC:#ql:_GENERIC cptIt545#

nlp'natural-language-understanding-tech

_CREATED: {2000-09-14}

NAME

name::
* McsEngl.nlp'natural-language-understanding-tech@cptIt,
* McsEngl.conceptIt544,
* McsEngl.nlu@cptIt544,
* McsEngl.language'understanding@cptIt544,
* McsEngl.natural-language-understanding-field@cptIt,
* McsEngl.natural-language-understanding-technology@cptIt,
* McsEngl.nl'understanding@cptIt544,
* McsEngl.tech.Natural-Language-Understanding@cptIt,

DEFINITION

The machine will understand the meaning (worldview) of texts.Then it will find inconsistencies in text. The comparison with REALITY will be done by humans.
[hmnSngo.2010-02-12]

LANGUAGE-UNDERSTANDING-FIELD is the theories and technologies that try to determine the 'meaning' of 'logos'.
[hmnSngo.{2000-09-30}]

LANGUAGE-UNDERSTANDING is the process of determining the 'meaning' of 'logos'.
[hmnSngo.{2000-09-20}]

GENERIC

_GENERIC:
* tech-knowledge#cptItsoft458#

WHOLE

_WHOLE:
* NLP#cptItsoft359#

There is much evidence that human speech understanding involves the integration of a great variety of knowledge sources, including
- knowledge of the world or context,
- knowledge of the speaker and/or topic,
- lexical frequency,
- previous uses of a word or a semantically related topic,
- facial expressions,
- prosody,
- in addition to the acoustic attributes of the words.
[http://www.cse.ogi.edu/CSLU/HLTsurvey/, 1996, 1.8]

nlp'program#cptIt497.12#

name::
* McsEngl.nlp'program@cptIt,

nlp'Organization

name::
* McsEngl.nlp'Organization@cptIt,

nlp'ORGANIZATION.MACHINE'TRANSLATION

name::
* McsEngl.nlp'ORGANIZATION.MACHINE'TRANSLATION@cptIt,

MACHINE-TRANSLATION Universities and Organizations working on MT
- What's going on at University of Maryland (UMIACS),
http://www.umiacs.umd.edu/labs/CLIP/mt.html
- What's going on at Carnegie-Mellon (CMT)
http://www.lti.cs.cmu.edu/Research/CMT-home.html
- What's going on at New Mexico State University (CRL) http://crl.nmsu.edu/
- GAZELLE: ISI's projects
http://www.isi.edu/natural-language/projects/GAZELLE.html
- SPANAM: the Panamerican Health Organization (PAHO)
http://www.paho.org/english/machine.htm
- Brigham Young University (Translation Research Group) http://www.ttt.org/
- University of Essex (CL/MT Research Group) http://clwww.essex.ac.uk/group/

nlp'ORGANIZATION.ACADEMIC

name::
* McsEngl.nlp'ORGANIZATION.ACADEMIC@cptIt,

Australia:
Melbourne, University of
Microsoft Institute of Advanced Software Technology in association with Macquarie University

Canada:
Montreal, University of
Ottawa, University of
Simon Fraser University
Toronto, University of
Waterloo, University of

Finland:
Helsinki, University of

France:
Paris 7, Jussieu, University of

Germany:
Bonn, University of
Heidelberg, University of
Humboldt University, Berlin
Koblenz-Landau, University of
Munich, University of
Osnabrueck, University of
Saarland, University of the
Potsdam, University of
Stuttgart, University of
Tuebingen, University of

Italy:
Pisa, University of
Trento, University of

Japan:
Kyoto University

Korea:
Pohang University of Science and Technology, Pohang

Netherlands:
Amsterdam, University of
Groningen, University of
Nijmegen, University of
Tilburg, University of
Utrecht, University of

Sweden:
Goteborg (Gothenburg), University of
Skoevde, University of
Uppsala, University of

Switzerland:
Geneva, University of
Zurich, University of

UK:
Brighton, University of
Cambridge, University of
Durham, University of
Essex, University of
Edinburgh, University of
Sheffield, University of
Sussex, University of
University of Manchester Institute of Science and Technology

USA:
Brown University
Buffalo, SUNY at
California at Berkeley, University of
California at Los Angeles, University of
Carnegie-Mellon University
Columbia University
Cornell University
Delaware, University of
Duke University
Georgetown University
Georgia, University of
Georgia Institute of Technology
Harvard University
Indiana University
Johns Hopkins University
Massachusetts at Amherst, University of
Massachusetts Institute of Technology
Michigan, University of
New Mexico State University
New York University
Pennsylvania, University of
Rochester, University of
Southern California, University of
Stanford University
SUNY, Buffalo
Wisconsin - Milwaukee, University of
Yale University

nlp'ORGANIZATION.NON'ACADEMIC

name::
* McsEngl.nlp'ORGANIZATION.NON'ACADEMIC@cptIt,


AT&T Research Labs,
BBN Systems and Technologies Corporation,
Bellcore, Morristown, NJ,
DFKI (German research center for AI)
General Electric R&D
IRST, Italy
IBM T.J. Watson Research, NY
Lucent Technologies Bell Labs, Murray Hill, NJ
Microsoft Research, Redmond, WA
MITRE
NEC Corporation
SRI International, Menlo Park, CA
SRI International, Cambridge, UK
Xerox, Palo Alto, CA
XRCE, Grenoble, France

nlp'resourceInfHmn#cptResource843#

name::
* McsEngl.nlp'resourceInfHmn@cptIt,

nlp'SOURCE.BIBLIOGRAPHY

name::
* McsEngl.nlp'SOURCE.BIBLIOGRAPHY@cptIt,

nlp'SOURCE.INTERNET

name::
* McsEngl.nlp'SOURCE.INTERNET@cptIt,

The Association for Computational Linguistics site:
** http://www.aclweb.org
** The Association for Computational Linguistics is the major international organization in the field.

The ACL NLP/CL Universe:
http://www.aclweb.org/u/db/acl/
The largest index of Computational Linguistics and Natural Language Processing resources on the Web. It features a search engine which should allow you to find specific NLP-related Web pages.

The Computation and Language E-Print Archive:
http://xxx.lanl.gov/archive/cs/
The Computation and Language E-Print Archive is a fully automated electronic archive and distribution server for papers on computational linguistics, natural-language processing, speech processing, and related fields.

The Survey of the State of the Art of Human Language Technology:
** http://www.cse.ogi.edu/CSLU/HLTsurvey/
** This book surveys the state of the art of human language technology. The goal of the survey is to provide an interested reader with an overview of the field---the main areas of work, the capabilities and limitations of current technology, and the technical challenges that must be overcome to realize the vision of graceful human computer interaction using natural communication skills.

The Linguistic Data Consortium:
http://www.ldc.upenn.edu/
The Linguistic Data Consortium is an open consortium of universities, companies and government research laboratories. It creates, collects and distributes speech and text databases, lexicons, and other resources for research and development purposes. The University of Pennsylvania is the LDC's host institution.

The Language Technology Helpdesk:
http://www.ltg.ed.ac.uk/helpdesk/faq/index.html
Frequently-asked questions of the Human COmmunication Research Centre at U. Edinburgh.

Head-Driven Phrase Structure Grammar:
http://julius.ling.ohio-state.edu/HPSG/Hpsg.html
The HPSG offers current information relating to various aspects of the grammar formalism and linguistic theory of Head-Driven Phrase Structure Grammar, a constraint-based, lexicalist approach to grammatical theory that seeks to model human languages as systems of constraints on typed feature structures.

Lexical Functional Grammar:
http://clwww.essex.ac.uk/LFG/
This site provides access to information about various aspects of the grammatical theory known as Lexical Functional Grammar (LFG).

Word Grammar:
http://www.phon.ucl.ac.uk/home/Word-Grammar/wig-www.htm
This site houses publications on Word-Grammar and has some information on the group and its meetings.

nlp'SOURCE.NEWSGROUP#cptIt539#

name::
* McsEngl.nlp'SOURCE.NEWSGROUP@cptIt,

[3] What is comp.ai.nat-lang
Here follows the original charter for comp.ai.nat-lang.
Name: comp.ai.nat-lang
Moderation: This group will be unmoderated.

Purpose:
To discuss issues relating to natural language, especially computer-related issues from an AI viewpoint. The topics that will be discussed in this group will concentrate on, but are not limited to, the following:
* Natural Language Understanding
* Natural Language Generation
* Machine Translation
* Dialogue and Discourse Systems
* Natural Language Interfaces
* Parsing
* Computational Linguistics
* Computer-Aided Language Learning
This group will avoid discussing issues that are more properly covered by other newsgroups. For example, speech synthesis should be discussed in comp.speech. However, due to the interdisciplinary nature of the field, there may be overlap in material between other groups. To try to keep this to a minimum, topics should pertain to computer-related aspects of natural language.

Rules of Decorum:
Because of the unmoderated format, anyone with access to this newsgroup will be able to post without review. This is meant to encourage discussion of the topics. Please refrain from "flames" or unnecessary criticism of a person's viewpoints or personality in a harsh or insulting manner. Criticisms should constructive and polite whenever possible.
[Natural Language Processing FAQ, D.R. Radev, 2000aug22]

nlp'SOURCE.PERIODICAL

name::
* McsEngl.nlp'SOURCE.PERIODICAL@cptIt,

10.1. COMPUTATIONAL LINGUISTICS
Computational Linguistics is the only publication devoted exclusively to the design and analysis of natural language processing systems. From this unique quarterly, university and industry linguists, computational linguists, artificial intelligence (AI) investigators, cognitive scientists, speech specialists, and philosophers get information about computational aspects of research on language, linguistics, and the psychology of language processing and performance.
Published by The MIT Press for: The Association for Computational Linguistics.
URL: http://mitpress.mit.edu/journal-home.tcl?issn=08912017

10.2. JOURNAL OF NATURAL LANGUAGE ENGINEERING (JNLE)
Editors: Dr B. K. Boguraev, IBM Thomas J. Watson Research Center, New York, USA Professor Roberto Garigliano, University of Durham, UK Dr John I. Tait, University of Sunderland, UK
Published: March, June, September and December. ISSN:1351-3249.
Natural Language Engineering is an international journal designed to meet the needs of professionals and researchers working in all areas of computerised language processing, whether from the perspective of theoretical or descriptive linguistics, lexicology, computer science or engineering. Its principal aim is to bridge the gap between traditional computational linguistics research and the implementation of practical applications with potential real-world use. As well as publishing research articles on a broad range of topics – from text analysis, machine translation and speech generation and synthesis to integrated systems and multi modal interfaces – the journal also publishes book reviews. Its aim is to provide the essential link between industry and the academic community

10.3. COMPUTER SPEECH & LANGUAGE (CS&L)
Editors: Prof. S.J. Young & Dr. S.E. Levinson Send manuscripts (worldwide apart from the Americas) to: Prof. Steve Young, Cambridge University Engineering Dept., Trumpington Street, Cambridge, CB2 1PZ, England. Email: sjy@eng.cam.ac.uk Send manuscripts (from the Americas) to: Dr. Steve Levinson, Head Linguistics Reseach, AT&T Bell Laboratories, 600 Mountain Ave., Murray Hill, New Jersey 07974. USA. Email: sel@research.att.com US Subscription rates are $170, with a personal rate of $75. CS&L is published 4 times per year. The address for subscription orders is: Harcourt Brace and Company Limited, High Street, Foots Cray, Sidcup, Kent, DA14 SHP. England.

10.4. MACHINE TRANSLATION Published 4 times annually. ISSN 0922-6567.
Subscriptions: Institutions $141 plus $16 postage; Individuals $55 (members of ACL $46).
Kluwer Academic Publishers, PO Box 322, 3300 AH Dordrecht, The Netherlands, or Kluwer Academic Publishers, PO Box 358, Accord Station, Hingham, MA 02018-0358.

10.5. SPEECH TECHNOLOGY Published quarterly, since 1981.
Media Dimensions, New York, NY, USA

10.6. NATURAL LANGUAGE & LINGUISTIC THEORY (NALA) Published quarterly. ISSN 0167-806X Subscriptions: Individual $59,-/Dfl.156,-; Institutional $200,-/Dfl.383,- including p&h. Kluwer Academic Publishers USA: Order Dept, Box 358, Accord Station, Hingham, MA 02018-0358. Phone (617) 871-6600; Fax (617) 871-6528; E-mail: Kluwer@world.std.com Other: P.O.Box 322, 3300 AH Dordrecht, The Netherlands. Phone (31) 78 524400; Fax (31) 78 183273; Telex: kadc nl; E-mail: vanderLinden@wkap.nl

10.7. MIND AND LANGUAGE Editors: Cotheart, Davies, Guttenplan, Harris, Humphreys, Leslie, Smith, Wilson.
4 times annually Blackwell Publishers, Oxford, UK.

10.8. JOURNAL OF LOGIC, LANGUAGE AND INFORMATION Editor: Peter Gardenfors

nlp'speech-to-text-technology

_CREATED: {2000-09-14}

NAME

name::
* McsEngl.nlp'speech-to-text-technology@cptIt,
* McsEngl.conceptIt540,
* McsEngl.speech-recognition-technology@cptIt,
* McsEngl.speech-recognition@cptIt540,
* McsEngl.speech-to-text-technology@cptIt,
* McsEngl.tech.speech-to-text@cptIt,

DEFINITION

GENERIC

_GENERIC:
* tech-knowledge#cptItsoft458#

WHOLE

_WHOLE:
(nlp)#cptIt359#
AI Science#cptIt478#

Method

name::
* McsEngl.conceptIt540.2,

Program

name::
* McsEngl.conceptIt540.1,
* McsEngl.speech'recognizer@cptIt540.1,
* McsEngl.speech'recognition'system@cptIt540.1,

_GENERIC:
* NLP-PROGRAM#cptItsoft497.12#

_SPESIFEPTO:
* SPHINX4#cptItsoft1210: attSpe#

resourceInfHmn#cptResource843#

The Sounds of Speech
by Morris Halle of MIT

Identifying Words

When we speak we say words and when spoken to we hear words. In normal discourse, however, we do not separate---the---words---by---short---pauses, but rather run one word into the next. Yet in spite of this we still hear utterances as composed of discrete words. Why should that be so?
A clue is provided by the fact that in order for us to hear the words, the utterance must be in a language we know; in utterances in a language we do not know we do not hear the words. Similarly, when we hear a string of nonsense syllables, we cannot tell whether it is composed of one or of several words. Knowledge of language is therefore crucial.
In a way this is not surprising. Everybody who has studied a foreign language knows that learning the words is a major part of mastering the language. Knowing the words is not sufficient, but it surely is necessary. When we learn a word we store in our memory information that allows us both to say the word and to recognize it when said by someone else. And the reason we do not hear words when spoken to in a foreign language is that we have not learned them, we do not have them in our linguistic memory, i.e., in the part of our memory dedicated to language.

Speaking

A plausible account of an act of speaking might run as follows. Speakers select from their memories the words they wish to say. They then perform a special kind of gymnastics with their speech organs or articulators, i.e., with the tongue, lips, velum, and larynx. The gymnastics results in an acoustic signal that both the speaker and the interlocutors hear. Since in performing the gymnastics speakers do not pause at the end of each word, the words in the utterance run into one another. This model of speaking is represented graphically below:
Words in memory>>> Articulatory action>>> Acoustic signal
There is some evidence that when we hear speech the same process is activated but in reverse An acoustic signal strikes our ears; we interpret the signal in terms of the articulatory actions that gave rise to it, and we use this interpretation--rather than the acoustic signal itself--to access our memory.
Consider now the gymnastics that we execute as we pronounce the English words 'meet' and 'Mott'. In both words we begin with an action closing the oral cavity with the lips and end with an action by the tongue blade closing the oral cavity at a point in the anterior region of the hard palate. Between these two actions is an action of the tongue body: The tongue body is raised and advanced in 'meet', and lowered and retracted in 'Mott' without, however, closing the cavity. The production of these words is, thus, made up of distinct actions by three distinct articulators. The actions must, moreover, proceed in the order indicated: If the order of the three actions is reversed, different words are produced, viz., team, Tom. Facts of this kind motivate the hypothesis that the words we say are composed of discrete sounds or phonemes.

Words in Memory

As noted above, words are learned and are stored in our linguistic memory. If the words we utter are composed of discrete sounds, then it is reasonable to suppose that words in memory also consist of sequences of discrete sounds. Scientific study of language strongly supports this supposition although the evidence and argumentation are too complex to be given here.
In uttering a word we actualize the sequence of discrete sounds stored in memory as a sequence of actions of our articulators. Because, like other human actions, speaking is subject to limitations on accuracy, it is to be expected that there will be some slippage and that the discreteness of the sounds will be compromised to some extent in the utterance. In fact, X-ray motion pictures of speaking show that the actions of the articulators in producing a given sound do not begin and end at exactly the same time. This slippage, however, does not interfere with the hearer's ability to identify the words--i.e., to access them in memory. Inertia of the articulators is, of course, not the only factor in the failure of the speech signal to reproduce accurately various aspects of the word as represented in memory. Other factors are rapid speech rate and a variety of memory lapses.
In spite of the fact that burps, yawns, coughs, the sound made in blowing out a candle, and many other noises are produced by actions of the articulators, they are not perceived as sequences of phonemes, even though they may be indistinguishable acoustically and articulatorily from utterances of phoneme sequences. Not being words, these noises are not stored in the part of our memory that is dedicated to words. By hypothesizing that only items stored in the linguistic memory are composed of phonemes, we explain why burps, yawns, etc. are not perceived as phoneme sequences.
In sum, speech sounds are the constituents of words, and words are special in that only words are sequences of speech sounds.

Suggested Readings

Halle, Morris. 1992. "Phonological features". International encyclopedia of linguistics, Vol. III, ed. by William Bright, 207-11. Oxford: Oxford University Press.
Ladefoged, Peter, and Ian Maddieson. 1996. The sounds of the world's languages. Oxford, UK and Cambridge, MA: Blackwell.
McCarthy, John J. 1988. "Feature geometry and dependency: A review". Phonetica 45. 84-108.

COMMENT:
They are is NOT the 'words' we have stored in memory, but the CONCEPTS that have as name these words. And not just concepts but CONCEPTUAL-MODELS of the reality. Without these conceputal-models we don't understand an utterance.
Also, without the relations of the words with their meanings (=concepts) it would be impossible to remember all these words.
[hmnSngo.2002-04-14]

SPECIFIC

_SPECIFIC:#ql:_GENERIC cptIt540#

nlp'structure#cptCore515#

name::
* McsEngl.nlp'structure@cptIt,

_STRUCTURE:
AI includes and visual-understanding.
===
(Speech <---> Text)
Speech-To-Text-Field#cptIt540#
Text-To-Speech-(tts)#cptIt541#
===
(Logos <---> Conceptual-Information {2000-09-14}:
Natural-Language-Understanding#cptIt544#
 Speech-Understanding,
 Text-Understanding,
Natural-Language-Generation#cptIt545#
===
Text-Recognition:
 handwriting-recognition#cptIt543#
 optical-character-recognition#cptIt542#
===
language identification
Mechanical-Translation#cptIt57#

Major tasks in NLP[edit]

The following is a list of some of the most commonly researched tasks in NLP. Note that some of these tasks have direct real-world applications, while others more commonly serve as sub-tasks that are used to aid in solving larger tasks. What distinguishes these tasks from other potential and actual NLP tasks is not only the volume of research devoted to them but the fact that for each one there is typically a well-defined problem setting, a standard metric for evaluating the task, standard corpora on which the task can be evaluated, and competitions devoted to the specific task.

Automatic summarization
Produce a readable summary of a chunk of text. Often used to provide summaries of text of a known type, such as articles in the financial section of a newspaper.
Coreference resolution
Given a sentence or larger chunk of text, determine which words ("mentions") refer to the same objects ("entities"). Anaphora resolution is a specific example of this task, and is specifically concerned with matching up pronouns with the nouns or names that they refer to. The more general task of coreference resolution also includes identifying so-called "bridging relationships" involving referring expressions. For example, in a sentence such as "He entered John's house through the front door", "the front door" is a referring expression and the bridging relationship to be identified is the fact that the door being referred to is the front door of John's house (rather than of some other structure that might also be referred to).
Discourse analysis
This rubric includes a number of related tasks. One task is identifying the discourse structure of connected text, i.e. the nature of the discourse relationships between sentences (e.g. elaboration, explanation, contrast). Another possible task is recognizing and classifying the speech acts in a chunk of text (e.g. yes-no question, content question, statement, assertion, etc.).
Machine translation
Automatically translate text from one human language to another. This is one of the most difficult problems, and is a member of a class of problems colloquially termed "AI-complete", i.e. requiring all of the different types of knowledge that humans possess (grammar, semantics, facts about the real world, etc.) in order to solve properly.
Morphological segmentation
Separate words into individual morphemes and identify the class of the morphemes. The difficulty of this task depends greatly on the complexity of the morphology (i.e. the structure of words) of the language being considered. English has fairly simple morphology, especially inflectional morphology, and thus it is often possible to ignore this task entirely and simply model all possible forms of a word (e.g. "open, opens, opened, opening") as separate words. In languages such as Turkish, however, such an approach is not possible, as each dictionary entry has thousands of possible word forms.
Named entity recognition (NER)
Given a stream of text, determine which items in the text map to proper names, such as people or places, and what the type of each such name is (e.g. person, location, organization). Note that, although capitalization can aid in recognizing named entities in languages such as English, this information cannot aid in determining the type of named entity, and in any case is often inaccurate or insufficient. For example, the first word of a sentence is also capitalized, and named entities often span several words, only some of which are capitalized. Furthermore, many other languages in non-Western scripts (e.g. Chinese or Arabic) do not have any capitalization at all, and even languages with capitalization may not consistently use it to distinguish names. For example, German capitalizes all nouns, regardless of whether they refer to names, and French and Spanish do not capitalize names that serve as adjectives.
Natural language generation
Convert information from computer databases into readable human language.
Natural language understanding
Convert chunks of text into more formal representations such as first-order logic structures that are easier for computer programs to manipulate. Natural language understanding involves the identification of the intended semantic from the multiple possible semantics which can be derived from a natural language expression which usually takes the form of organized notations of natural languages concepts. Introduction and creation of language metamodel and ontology are efficient however empirical solutions. An explicit formalization of natural languages semantics without confusions with implicit assumptions such as closed world assumption (CWA) vs. open world assumption, or subjective Yes/No vs. objective True/False is expected for the construction of a basis of semantics formalization.[4]
Optical character recognition (OCR)
Given an image representing printed text, determine the corresponding text.
Part-of-speech tagging
Given a sentence, determine the part of speech for each word. Many words, especially common ones, can serve as multiple parts of speech. For example, "book" can be a noun ("the book on the table") or verb ("to book a flight"); "set" can be a noun, verb or adjective; and "out" can be any of at least five different parts of speech. Some languages have more such ambiguity than others. Languages with little inflectional morphology, such as English are particularly prone to such ambiguity. Chinese is prone to such ambiguity because it is a tonal language during verbalization. Such inflection is not readily conveyed via the entities employed within the orthography to convey intended meaning.
Parsing
Determine the parse tree (grammatical analysis) of a given sentence. The grammar for natural languages is ambiguous and typical sentences have multiple possible analyses. In fact, perhaps surprisingly, for a typical sentence there may be thousands of potential parses (most of which will seem completely nonsensical to a human).
Question answering
Given a human-language question, determine its answer. Typical questions have a specific right answer (such as "What is the capital of Canada?"), but sometimes open-ended questions are also considered (such as "What is the meaning of life?").
Relationship extraction
Given a chunk of text, identify the relationships among named entities (e.g. who is the wife of whom).
Sentence breaking (also known as sentence boundary disambiguation)
Given a chunk of text, find the sentence boundaries. Sentence boundaries are often marked by periods or other punctuation marks, but these same characters can serve other purposes (e.g. marking abbreviations).
Sentiment analysis
Extract subjective information usually from a set of documents, often using online reviews to determine "polarity" about specific objects. It is especially useful for identifying trends of public opinion in the social media, for the purpose of marketing.
Speech recognition
Given a sound clip of a person or people speaking, determine the textual representation of the speech. This is the opposite of text to speech and is one of the extremely difficult problems colloquially termed "AI-complete" (see above). In natural speech there are hardly any pauses between successive words, and thus speech segmentation is a necessary subtask of speech recognition (see below). Note also that in most spoken languages, the sounds representing successive letters blend into each other in a process termed coarticulation, so the conversion of the analog signal to discrete characters can be a very difficult process.
Speech segmentation
Given a sound clip of a person or people speaking, separate it into words. A subtask of speech recognition and typically grouped with it.
Topic segmentation and recognition
Given a chunk of text, separate it into segments each of which is devoted to a topic, and identify the topic of the segment.
Word segmentation
Separate a chunk of continuous text into separate words. For a language like English, this is fairly trivial, since words are usually separated by spaces. However, some written languages like Chinese, Japanese and Thai do not mark word boundaries in such a fashion, and in those languages text segmentation is a significant task requiring knowledge of the vocabulary and morphology of words in the language.
Word sense disambiguation
Many words have more than one meaning; we have to select the meaning which makes the most sense in context. For this problem, we are typically given a list of words and associated word senses, e.g. from a dictionary or from an online resource such as WordNet.
In some cases, sets of related tasks are grouped into subfields of NLP that are often considered separately from NLP as a whole. Examples include:

Information retrieval (IR)
This is concerned with storing, searching and retrieving information. It is a separate field within computer science (closer to databases), but IR relies on some NLP methods (for example, stemming). Some current research and applications seek to bridge the gap between IR and NLP.
Information extraction (IE)
This is concerned in general with the extraction of semantic information from text. This covers tasks such as named entity recognition, Coreference resolution, relationship extraction, etc.
Speech processing
This covers speech recognition, text-to-speech and related tasks.
Other tasks include:

Stemming
Text simplification
Text-to-speech
Text-proofing
Natural language search
Query expansion
Automated essay scoring
Truecasing
[http://en.wikipedia.org/wiki/Natural_language_processing#Major_tasks_in_NLP]

nlp'text-to-speech-technology (tts)

_CREATED: {2000-09-14}

NAME

name::
* McsEngl.nlp'text-to-speech-technology (tts)@cptIt,
* McsEngl.conceptIt541,
* McsEngl.speech-synthesis@cptIt,
* McsEngl.tech.Text-To-Speech@cptIt,
* McsEngl.text-to-speech-technology@cptIt,
* McsEngl.text'to'speech@cptIt541,
* McsEngl.tts@cptIt541,

DEFINITION

A Text-To-Speech (TTS) synthesizer is a computer-based system that should be able to read any text aloud, whether it was directly introduced in the computer by an operator or scanned and submitted to an Optical Character Recognition (OCR) system. Let us try to be clear. There is a fundamental difference between the system we are about to discuss here and any other talking machine (as a cassette-player for example) in the sense that we are interested in the automatic production of new sentences. This definition still needs some refinements. Systems that simply concatenate isolated words or parts of sentences, denoted as Voice Response Systems, are only applicable when a limited vocabulary is required (typically a few one hundreds of words), and when the sentences to be pronounced respect a very restricted structure, as is the case for the announcement of arrivals in train stations for instance. In the context of TTS synthesis, it is impossible (and luckily useless) to record and store all the words of the language. It is thus more suitable to define Text-To-Speech as the automatic production of speech, through a grapheme-to-phoneme transcription of the sentences to utter.
[Dutoit, ]

tts'GENERIC

_GENERIC:
* tech-knowledge#cptItsoft458#

tts'WHOLE

_WHOLE:
(nlp)#cptIt359#
AI Science#cptIt478#

tts'DSP'MODULE

name::
* McsEngl.tts'DSP'MODULE@cptIt,
* McsEngl.tts'Digital'Signal'Processing'Component@cptIt,

tts'synthesis'by'concatenation

name::
* McsEngl.tts'synthesis'by'concatenation@cptIt,

tts'synthesis'by'rule

name::
* McsEngl.tts'synthesis'by'rule@cptIt,
* McsEngl.tts'Rule'based'synthesizer@cptIt,

tts'METHODOLOGY

name::
* McsEngl.tts'METHODOLOGY@cptIt,

We will primarily be presenting concatenative methods for waveform generation, where we collect databases of real speech, and select appropriate units and concatenate them. These selected units are then typically altered by some form of signal processing function to change the pitch and duration. Concatenative synthesis is not the only method of waveform synthesis, another two models are formant synthesis, as in MITalk allen87 and hertz90, and articulatory synthesis. These three methods come from quite different directions though ultimately, we believe, will be joined together in a hybrid model of speech parameterization, trained from real data conjoined in non-trivial ways. There's plenty of research to be done.
[festvox 2000]

Generally there are 3 approaches to computer speech synthesis :
1. Articulatory synthesis - uses the computational models of the articulators and their movements to synthesise speech.
2. Rule-based synthesis/formant synthesis - a source-filter speech production method. The vocal tract filter is constructed from a number of resonances similar to the formants of natural speech. One of the most widely known rule-based systems is the MITalk from MIT.
3. Concatenative synthesis - is the process of synthesis by concatenating sub-speech units to form speech. It has become popular of late due to the advances in speech modification techniques, and the increasingly affordable cost of computing capabilities and memory.
[http://dea.brunel.ac.uk/cmsp/Home_Phuay-Hui_Low/Introduction.html]

tts'ARTICULATORY'SYNTHESSI

name::
* McsEngl.tts'ARTICULATORY'SYNTHESSI@cptIt,

DEFINETRO:
1. Articulatory synthesis - uses the computational models of the articulators and their movements to synthesise speech.
[http://dea.brunel.ac.uk/cmsp/Home_Phuay-Hui_Low/Introduction.html]

SPESIFEPTO:
* Παράδειγμα articulation synthesis αποτελεί η εργασία του καθηγητή P.Cook στο πανεπιστήμιο του Princeton (http://www.cs.princeton.edu/~prc/).
[http://web.media.mit.edu/~aggelos/papers/diplomatiki.pdf]

* http://esopos.ee.auth.gr/

tts'CONCATENATIVE'SYNTHESIS

name::
* McsEngl.tts'CONCATENATIVE'SYNTHESIS@cptIt,

DEFINETRO:
* Concatenative synthesis is based on the concatenation (or stringing together) of segments of recorded speech. Generally, concatenative synthesis produces the most natural-sounding synthesized speech. However, differences between natural variations in speech and the nature of the automated techniques for segmenting the waveforms sometimes result in audible glitches in the output. There are three main sub-types of concatenative synthesis.
[http://en.wikipedia.org/wiki/Speech_synthesis]

COMPARISON:
Diphone synthesis, and more generally any concatenative synthesis method, makes an absolutely fixed choice about which units exist, and in circumstances where something else is required, a mapping is necessary. When humans are given a context where an unusual phone is desired, for example in a foreign word, they will (often) attempt to produce it even though it falls outside their basic phonetic vocabulary. The articulatory system is flexible enough to produce (or attempt to produce) unfamiliar phones, as we all share the same underlying physical structures. Concatenative synthesizers, however, have a fixed inventory, and cannot reasonably be made to produce anything outside their pre-defined vocabulary. Formant and articulatory synthesizers have the advantage here. This is a basic trade off, concatenative synthesizers typically produce much more natural synthesis than formants synthesizer but at the cost of being only able to produce those phones defined within their inventory.
[festvox2.0/html/bsv-diphone-ch.html]

NON'UNIFORM'UNIT'SELECTION

name::
* McsEngl.NON'UNIFORM'UNIT'SELECTION@cptIt,

# non-uniform unit-selection: best fitting chunks of speech from large databases get concatenated, minimizing a double cost-function: best fit to neighbor unit and best fit to target prosody. Sounds most natural (similar to original speaker), but unflexible and large footprint. sample: RealSpeak mp3
[http://ttssamples.syntheticspeech.de/]

DIPHONE'SELECTION

name::
* McsEngl.DIPHONE'SELECTION@cptIt,

# diphone-synthesis: speech concatenated from diphone-units (two-phone combinations), prosody-fitting done by signal-manipulation (depends on unit-coding). relatively small footprint but not very natural. sample: Bell-Labs synthesis mp3
[http://ttssamples.syntheticspeech.de/]

tts'RULE'BASED'SYNTHESIS

name::
* McsEngl.tts'RULE'BASED'SYNTHESIS@cptIt,
* McsEngl.tts'formant'synthesis@cptIt,

DEFINETRO:
* Formant synthesis is a technique where the speech signal is broken down into iverlapping parts, such as formats (hence the name), voicing, asperation, nasality etc. The output of individual generators are then composed from streams of parameters describing the each sub-part of the speech. With carefully tuned parameters the quality of the speech can be close to that of natural speech, showing that this encoiding is sufficient to represent human speech. However automatic prediction of these parameters is harder and the typical quality of synthesizers based on this technology can be very understandable but still have a distinct no-human or robotic quality. Format synthesizers are best typified MITalk, the work of Dennis Klatt, and what was later commercialised as DECTalk. DECTalk is at present probably the most familar form of speech synthesis to the world. Dr Stephen Hawkins, Lucindian Professor of Mathematics at Cambridge University, has lost the use of his voice and uses a formant synthesizer for his speech.
[http://festvox.org/bsv/c2236.html]

* 2. Rule-based synthesis/formant synthesis - a source-filter speech production method. The vocal tract filter is constructed from a number of resonances similar to the formants of natural speech. One of the most widely known rule-based systems is the MITalk from MIT.
[http://dea.brunel.ac.uk/cmsp/Home_Phuay-Hui_Low/Introduction.html]

tts'Method

name::
* McsEngl.tts'Method@cptIt,
* McsEngl.conceptIt541.1,

tts'Program

name::
* McsEngl.tts'Program@cptIt,

Festival-(cmu-c++)#cptItsoft1078#

FreeTTS#cptItsoft1076# (java)#cptItsoft1076#

tts'PROSODY

name::
* McsEngl.tts'PROSODY@cptIt,

Prosody

Prosody, or the way things are spoken, is an extremely important part of the speech message. Changing the placement of emphasis in a sentence can change the meaning of a word, and this emphasis might be revealed as a change in pitch, volume, voice quality, or timing.

We'll present two approaches to taming the prosodic beast: limiting the domain to be spoken, and intonation modeling. By limiting the domain, we can collect enough data to cover the whole output. For some things, like weather or stock quotes, very high quality can be produced, since these are rather contained. For general synthesis, however, we need to be able to turn any text, or perhaps concept, into a spoken form, and we can never collect all the sentences anyone could ever say. To handle this, we break the prosody into a set of features, which we predict using statistically trained models.

- phrasing - duration - intonation - energy - voice quality
[http://festvox.org/bsv/x98.html]

tts'SPEECH'UNIT

name::
* McsEngl.tts'SPEECH'UNIT@cptIt,

The longer the units become, the more elements are there, but the quality increases along with the memory required. Other units which are widely used are
*** half-syllables,
*** syllables,
*** words, or
*** combinations of them, e.g. word stems and inflectional endings.
[comp-speech-faq 1997-09-06]

tts'DIPHONE

name::
* McsEngl.tts'DIPHONE@cptIt,
* McsEngl.diphone@cptIt541i,

_DEFINITION:
A solution to this dilemma is using diphones. Instead of splitting at the transitions, the cut is done at the center of the phonemes, leaving the transitions themselves intact. This gives about 400 elements (20*20) and the quality increases.
[comp-speech-faq 1997-09-06]

tts'Resource

name::
* McsEngl.tts'Resource@cptIt,

isrc.tts:
* http://www.asel.udel.edu/speech/ModelTalker.html: http://www.asel.udel.edu/speech/ModelTalker.html
* http://cgi.di.uoa.gr/~gxydas/en/resources.shtml by Gerasimos Xydas:
* http://en.wikipedia.org/wiki/Speech_synthesis: http://en.wikipedia.org/wiki/Speech_synthesis
* http://www.acoustics.hut.fi/publications/files/theses/lemmetty_mst/index.html: Review of Speech Synthesis Technology

* http://festvox.org/bsv/: Alan W Black and Kevin A. Lenzo
http://festvox.org/bsv/

* http://www.tcts.fpms.ac.be/synthesis/: Towards a Freely Available Multilingual Speech Synthesizer

* http://ttssamples.syntheticspeech.de/: This page is maintained by Felix Burkhardt

isrc.tts.FORMANT:
* http://www.speech.kth.se/wavesurfer/formant/: http://www.speech.kth.se/wavesurfer/formant/

For more general information about text to speech we recommend Dutoit's `An introduction to Text-to-Speech Synthesis' dutoit97.
*** Dutoit, T. An introduction to Text-to-Speech Synthesis Kluwer Acedemic Publishers, 1997.
*** http://tcts.fpms.ac.be/synthesis/introtts.html (Short introduction) December 17, 1999

For more detailed research issues in TTS see sproat98 or vansanten96.
Sproat, R. eds, "Multilingual Text-to-Speech Synthesis: The Bell Labs approach", Kluwer 1998.

tts'STRUCTURE

name::
* McsEngl.tts'STRUCTURE@cptIt,

TTS consists always of two components, which I call (following Dutoit's introduction):
* NLP (Natural Language Processing): conversion of orthographical text into phoneme-alphabet and prosody description.
* DSP (Digital Speech Processing): speech engine: synthesis of speechsignal from ouput of NLP-component.
[http://ttssamples.syntheticspeech.de/]

I try to give here a short but comprehensive introduction to state-of-the-art Text-To-Speech (TTS) synthesis by highlighting its Digital Signal Processing (DSP) and Natural Language Processing (NLP) components. As a matter of fact, since very few people associate a good knowledge of DSP with a comprehensive insight into NLP, synthesis mostly remains unclear, even for people working in either research area.
[Dutoit, ]

tts'VOICE

name::
* McsEngl.tts'VOICE@cptIt,

Voice in a new language
The following list is a basic check list of the core areas you will need to provide pieces for. You may, in some cases, get away with very simple solutions (e.g. fixed phone durations), or be able to borrow from other voices/languages, but whatever you end up doing, you will need to provide something for each part.

You will need to define
* Phone set
* Token processing rules (numbers etc)
* Prosodic phrasing method
* Word pronunciation (lexicon and/or letter-to-sound rules)
* Intonation (accents and F0 contour)
* Durations
* Waveform synthesizer
[http://festvox.org/bsv/x740.html]

tts.SPECIFIC

name::
* McsEngl.tts.SPECIFIC@cptIt,

_SPECIFIC:#ql:_GENERIC cptIt541#

The Museum of Speech Analysis and Synthesis has pictures of artificial speech systems going back over 150 years: worth a visit. (http://mambo.ucsc.edu/psl/smus/smus.html)

FvMcs.techInfo.doing.PROCESSING

NAME

name::
* McsEngl.conceptIt245,
* McsEngl.techInfo.doing.PROCESSING@cptIt,
* McsEngl.FvMcs.techInfo.doing.PROCESSING@cptIt,
* McsEngl.IPT@cptIt,
* McsEngl.information-processing-technology@cptIt,
* McsEngl.it.processing@cptIt245,
* McsElln.ΠΛΗΡΟΦΟΡΙΑΚΕΣ-ΤΕΧΝΟΛΟΓΙΕΣ-ΕΠΕΞΕΡΓΑΣΙΑΣ@cptIt,

DEFINITION

PROCESSING-information-technology I call ANY INFORMATION-TECHNOLOGY#cptIt0.1#, with the PROCESSING-FUNCTION#cptIt444#.
cptIt246=#cptIt270#
(the variable 246(of 245 concept, position information) has the value 270)
[ΝΙΚΟΣ, 17 ΣΕΠΤ. 1994]

Επεξεργασιας τεχνολογιες-πληροφοριων ονομάζω τεχνολογιες που επεξεργάζονται ΑΝΘΡΩΠΙΝΗ-ΓΛΩΣΣΑ#cptCore93.2#.
[hmnSngo.1995-02]

GENERIC

_GENERIC:
* entity.economic.satisfier.working.tech.info#cptItsoft0#

Doing#cptCore475#

* information-processing-function#cptItsoft444#

SPECIFIC

Specific_concepts (level 3) =

SYSTEM OR NOT SPECIFIC-DIVISION

SYSTEM


INFORMATION-TECHNOLOGY-SYSTEM#cptIt180: attSpe#

FUCTORY'AUTOMATION'SYSTEMS#cptIt239: attSpe#

CIM#cptIt238: attSpe#

ROBOTS#cptIt190: attSpe#

ΤΑΜΕΙΑΚΗ-ΜΗΧΑΝΗ#cptIt272: attSpe#

PART

PROTOCLS SPECIFIC_DIVISION


OPEN-SYSTEM#cptIt138: attSpe#
PROPRIETY SYSTEM

zzit

FvMcs.techInfo.SECURITY

name::
* McsEngl.conceptIt302,
* McsEngl.computer-security@cptIt,
* McsEngl.information-security-technology@cptIt,
* McsEngl.IT-SECURITY@cptIt,
* McsEngl.scrtIt@cptIt,
* McsEngl.security.it@cptIt,
* McsEngl.techDataSecurity@cptIt,
* McsElln.ΑΣΦΑΛΕΙΑ-ΤΕΧΝΟΛΟΓΙΑΣ-ΠΛΗΡΟΦΟΡΙΩΝ@cptIt,

sctIt'DEFINITION

Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security often differ from most other computer technologies because of its somewhat elusive objective of preventing unwanted computer behavior instead of enabling wanted computer behavior.
[http://en.wikipedia.org/wiki/Computer_security] {2011-09-10}

sctIt'GENERIC

_GENERIC:
* entity.economic.satisfier.working.tech.info#cptItsoft0#

sctIt'ATTRIBUTE

name::
* McsEngl.sctIt'ATTRIBUTE@cptIt,

ADAPTING:
Companies must consider security not as a state of perfection to be achieved and maintained, but as an on-going process of self-evaluation and informed actions, adapting to the threat landscape as it evolves.
[https://agenda.weforum.org/2015/08/good-immune-system-wards-off-cyber-threats/]

sctIt'access-control

_CREATED: {2012-07-14}

name::
* McsEngl.sctIt'access-control@cptIt,
* McsEngl.conceptIt302.6,
* McsEngl.access-control@cptIt302.6, {2012-07-14}

_DESCRIPTION:
Access control in computer systems and networks relies on access policies. The access control process can be divided into two phases: 1) policy definition phase where access is authorized, and 2) policy enforcement phase where access requests are approved or disapproved. Authorization is thus the function of the policy definition phase which precedes the policy enforcement phase where access requests are approved or disapproved based on the previously defined authorizations.
[http://en.wikipedia.org/wiki/Authorization]

sctIt'ACL

_CREATED: {2013-07-29}

name::
* McsEngl.sctIt'ACL@cptIt,
* McsEngl.access-control-list@cptIt,
* McsEngl.ACL@cptIt,

_DESCRIPTION:
An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.[1] Each entry in a typical ACL specifies a subject and an operation. For instance, if a file has an ACL that contains (Alice, delete), this would give Alice permission to delete the file.
[http://en.wikipedia.org/wiki/Access_control_list]

sctIt'attacker

name::
* McsEngl.sctIt'attacker@cptIt,
* McsEngl.sctIt'attacker@cptIt,

sctIt'character-encoding#cptIt243#

name::
* McsEngl.sctIt'character-encoding@cptIt,

sctIt'law

name::
* McsEngl.sctIt'law@cptIt,

sctIt'OAuth

name::
* McsEngl.sctIt'OAuth@cptIt,
* McsEngl.conceptIt302.3,
* McsEngl.OAuth@cptIt302.3,

_DESCRIPTION:
OAuth is an open standard for authorization. It allows users to share their private resources (e.g. photos, videos, contact lists) stored on one site with another site without having to hand out their credentials, typically supplying username and password tokens instead. Each token grants access to a specific site (e.g., a video editing site) for specific resources (e.g., just videos from a specific album) and for a defined duration (e.g., the next 2 hours). This allows a user to grant a third party site access to their information stored with another service provider, without sharing their access permissions or the full extent of their data.
OAuth is a service that is complementary to, but distinct from, OpenID.
[http://en.wikipedia.org/wiki/OAuth]

_ADDRESS.WPG:
* http://hueniverse.com/oauth//

_Controversy:

In July 2012, Eran Hammer resigned his role of lead author for the OAuth 2.0 project, withdrew from the IETF working group, and removed his name from the specification. Hammer pointed to a conflict between the web and enterprise cultures, citing the IETF as a community that is "all about enterprise use cases", that is "not capable of simple." What is now offered is a blueprint for an authorization protocol, he says, and "that is the enterprise way", providing a "whole new frontier to sell consulting services and integration solutions."[4]

Despite this, it has been noted[35][unreliable source?] that OAuth 2.0 doesn't fit enterprise cultures either. Management is unlikely to want to offer an external API upon a framework which is non-interoperable and presents unquantifiable risk.[original research?] The essential authentication design of OAuth 2.0 also clashes with the needs of enterprise level integration, making usage of a third party API authorized by OAuth 2.0 "difficult if not outright impossible."

In comparing OAuth 2.0 with 1.0, Hammer points out that it has become "more complex, less interoperable, less useful, more incomplete, and most importantly, less secure." He explains how architectural changes for 2.0 unbound tokens from clients, removed all signatures and cryptography at a protocol level and added expiring tokens because tokens couldn't be revoked while complicating the processing of authorization. Numerous items were left unspecified or unlimited in the specification because "as has been the nature of this working group, no issue is too small to get stuck on or leave open for each implementation to decide."[4]

Eran later gave a presentation at &yet elaborating on his views.[36]

David Recordon later also removed his name from the specifications for unspecified reasons. Dick Hardt took over the editor role, and the Framework was published in October 2012.[8]
[http://en.wikipedia.org/wiki/OAuth]

sctIt'OpenID

name::
* McsEngl.sctIt'OpenID@cptIt,
* McsEngl.conceptIt302.4,
* McsEngl.OpenID@cptIt302.4,

_DESCRIPTION:
OpenID is an open standard that describes how users can be authenticated in a decentralized manner, eliminating the need for services to provide their own ad hoc systems and allowing users to consolidate their digital identities.[1] Users may create accounts with their preferred OpenID identity providers, and then use those accounts as the basis for signing on to any website which accepts OpenID authentication. The OpenID standard provides a framework for the communication that must take place between the identity provider and the OpenID acceptor (the ‘relying party’).[2] An extension to the standard (the OpenID Attribute Exchange) facilitates the transfer of user attributes, such as name and gender, from the OpenID identity provider to the relying party (each relying party may request a different set of attributes, depending on its requirements).[3]

The OpenID protocol does not rely on a central authority to authenticate a user's identity. Moreover, neither services nor the OpenID standard may mandate a specific means by which to authenticate users, allowing for approaches ranging from the common (such as passwords) to the novel (such as smart cards or biometrics).

The term OpenID may also refer to an identifier as specified in the OpenID standard; these identifiers take the form of a unique URI, and are managed by some 'OpenID provider' that handles authentication.[1]

OpenID authentication is now used and provided by several large websites. Providers include AOL, BBC,[4] Google,[5] IBM, MySpace, Orange, PayPal, VeriSign, LiveJournal, Steam[6] and Yahoo!.[1][7][8][9]
[http://en.wikipedia.org/wiki/OpenID]

sctIt'ResourceInfHmnn#cptResource843#

name::
* McsEngl.sctIt'ResourceInfHmnn@cptIt,

BYTE, MAY 1993.

_ADDRESS.WPG:
* https://agenda.weforum.org/2015/08/good-immune-system-wards-off-cyber-threats/
* http://en.wikipedia.org/wiki/Information_security,
* http://en.wikipedia.org/wiki/Intypedia,

sctIt'vulnerability (attack)

name::
* McsEngl.sctIt'vulnerability (attack)@cptIt,
* McsEngl.sctIt'weakness@cptIt,
* McsEngl.vulnerability.It@cptIt,
* McsEngl.sctIt'attack@cptIt,
* McsEngl.sctIt'valnerability@cptIt,
* McsEngl.valnerability.infotech-security@cptIt,

_DESCRIPTION:
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw.[1] To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface.
Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities.[2] This practice generally refers to software vulnerabilities in computing systems.
A security risk may be classified as a vulnerability. The use of vulnerability with the same meaning of risk can lead to confusion. The risk is tied to the potential of a significant loss. Then there are vulnerabilities without risk: for example when the affected asset has no value. A vulnerability with one or more known instances of working and fully implemented attacks is classified as an exploitable vulnerability — a vulnerability for which an exploit exists. The window of vulnerability is the time from when the security hole was introduced or manifested in deployed software, to when access was removed, a security fix was available/deployed, or the attacker was disabled—see zero-day attack.
Security bug (security defect) is a narrower concept: there are vulnerabilities that are not related to software: hardware, site, personnel vulnerabilities are examples of vulnerabilities that are not software security bugs.
Constructs in programming languages that are difficult to use properly can be a large source of vulnerabilities.
[https://en.wikipedia.org/wiki/Vulnerability_(computing)]

preventing

SPECIFIC

_SPECIFIC:
* Chosen Ciphertext Attacks (CCAs),
* network-attack#ql:netsct'attack#

sctIt'DICTIONARY-ATTACK

name::
* McsEngl.sctIt'DICTIONARY-ATTACK@cptIt,
* McsEngl.dictionary-attack@cptIt,

In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.

Technique
A dictionary attack uses a targeted technique of successively trying all the words in an exhaustive list called a dictionary (from a pre-arranged list of values). In contrast with a brute force attack, where a large proportion key space is searched systematically, a dictionary attack tries only those possibilities which are most likely to succeed, typically derived from a list of words for example a dictionary (hence the phrase dictionary attack). Generally, dictionary attacks succeed because many people have a tendency to choose passwords which are short (7 characters or fewer), such as single words found in dictionaries or simple, easily predicted variations on words, such as appending a digit. However these are easy to defeat. Adding a single random character in the middle can make dictionary attacks untenable. Unlike Brute-force attacks, Dictionary attacks are not guaranteed to succeed.

Pre-computed dictionary attack[edit]

It is possible to achieve a time-space tradeoff by pre-computing a list of hashes of dictionary words, and storing these in a database using the hash as the key. This requires a considerable amount of preparation time, but allows the actual attack to be executed faster. The storage requirements for the pre-computed tables were once a major cost, but are less of an issue today because of the low cost of disk storage. Pre-computed dictionary attacks are particularly effective when a large number of passwords are to be cracked. The pre-computed dictionary need only be generated once, and when it is completed, password hashes can be looked up almost instantly at any time to find the corresponding password. A more refined approach involves the use of rainbow tables, which reduce storage requirements at the cost of slightly longer lookup times. See LM hash for an example of an authentication system compromised by such an attack.

Pre-computed dictionary attacks can be thwarted by the use of salt, a technique that forces the hash dictionary to be recomputed for each password sought, making precomputation infeasible provided the number of possible salt values is large enough.
[http://en.wikipedia.org/wiki/Dictionary_attack]

sctIt'ZERO-DAY

name::
* McsEngl.sctIt'ZERO-DAY@cptIt,

_DESCRIPTION:
A zero-day (also known as zero-hour or 0-day) vulnerability is an undisclosed and uncorrected computer application vulnerability that could be exploited to adversely affect the computer programs, data, additional computers or a network.[1] It is known as a "zero-day" because once a flaw becomes known, the programmer or developer has zero days (before disclosure) to fix it.[2]
Zero-day exploits are attempted before or on the day notice of the vulnerability is released to the public; sometimes before the author is aware or has developed and made available corrected code.[3] Zero-day attacks are a severe threat.
[https://en.wikipedia.org/wiki/Zero-day_(computing)]

SPECIFIC

name::
* McsEngl.sctIt.specific@cptIt,

_SPECIFIC: security.Alphabetically:
* antivirus-program#cptIt567#
* Authentication#cptItsoft308#
* computer
* cryptography#cptIt56#
* firewall#cptItsoft104#
* hardware--security-tech#cptIt302.1#
* network
* software--security-tech

sctIt.AUTHENTICATION

_CREATED: {2012-02-16}

name::
* McsEngl.sctIt.AUTHENTICATION@cptIt,
* McsEngl.conceptIt308,
* McsEngl.auth@cptIt308,
* McsEngl.authenticity@cptIt,
* McsEngl.authentication@cptIt308,

_DESCRIPTION:
Επιπλέον, σε μία τέτοια συναλλαγή, είναι απαραίτητο ο παραλήπτης να είναι σίγουρος για την ταυτότητα του αποστολέα (αυθεντικότητα). Δηλαδή, να γνωρίζει με σιγουριά ότι το μήνυμα που λαμβάνει και φαίνεται να το υπογράφει ο κ. Χ, είναι όντως από τον κ. Χ και όχι από κάποιον που παριστάνει τον Χ.
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]
===
Authentication (from Greek: αυθεντικός; real or genuine, from a????t?? authentes; author) is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person or software program, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be.
[http://en.wikipedia.org/wiki/Authentication]
===
Authentication techniques can be used to ensure that communication end-points are who they say they are.
[http://en.wikipedia.org/wiki/Computer_security]

auth'factor

name::
* McsEngl.auth'factor@cptIt,

_DESCRIPTION:
How do I “authenticate”? What is a factor?
There are three ways to authenticate yourself: (1) with something you know, like a password or PIN (personal identification number); (2) with something you have or own, like a USB key or debit card;(3) with something you are, like a fingerprint, retinal scan, or signature. Each one of these categories is called a factor, and sometimes they’re referred to as knowledge, possession, and inherence respectively.
[https://medium.com/@pamelawjd/bitcoin-security-made-easy-using-2-factor-authentication-92c3943471fa#.4dxpizew0]

auth'strategy

name::
* McsEngl.auth'strategy@cptIt,

_DESCRIPTION:
Passport recognizes that each application has unique authentication requirements. Authentication mechanisms, known as strategies, are packaged as individual modules. Applications can choose which strategies to employ, without creating unnecessary dependencies.
[http://passportjs.org/guide/]

SPECIFIC

_SPECIFIC:
In modern web applications, authentication can take a variety of forms. Traditionally, users log in by providing a username and password. With the rise of social networking, single sign-on using an OAuth provider such as Facebook or Twitter has become a popular authentication method. Services that expose an API often require token-based credentials to protect access.
[http://passportjs.org/guide/]

auth.BASIC

name::
* McsEngl.auth.BASIC@cptIt,
* McsEngl.basic-access-authentication@cptIt,
* McsEngl.basic-authentication@cptIt,

In the context of an HTTP transaction, basic access authentication is a method for an HTTP user agent to provide a user name and password when making a request.

Features[edit]
HTTP Basic authentication (BA) implementation is the simplest technique for enforcing access controls to web resources because it doesn't require cookies, session identifier and login pages. Rather, HTTP Basic authentication uses static, standard HTTP headers which means that no handshakes have to be done in anticipation.

As a standard protocol, username and password for BA can be passed in URL, for example:
https://username:password@www.example.com/path
Because of this, BA is frequently used where a restricted URL needs to be accessed programmatically, especially from shell scripts or batch files.

Security[edit]

The BA mechanism provides no confidentiality protection for the transmitted credentials. They are merely encoded with BASE64 in transit, but not encrypted or hashed in any way. Basic Authentication is, therefore, typically used over HTTPS.

Because BA header has to be sent with each HTTP request, the web browser needs to cache the credentials for a reasonable period to avoid constant prompting user for the username and password. Caching policy differs between browsers. Microsoft Internet Explorer by default caches them for 15 minutes.[1]

While HTTP does not provide a method for web server to instruct the browser to "log out" the user (forget cached credentials), there are a number of workarounds using specific features in various browsers. One of them is redirecting the user to an URL on the same domain containing credentials that are intentionally incorrect:

https://forget:forget@www.example.com/path
Unfortunately, this behavior is inconsistent between various browsers and browser versions.[2] Microsoft Internet Explorer offers a dedicated JavaScript method to clear cached credentials:[3]

<script>document.execCommand('ClearAuthenticationCache', 'false');</script>
[http://en.wikipedia.org/wiki/Basic_access_authentication]

auth.DIGEST-ACCESS

name::
* McsEngl.auth.DIGEST-ACCESS@cptIt,
* McsEngl.DAA@cptIt,
* McsEngl.digest-access-authentication@cptIt,

_DESCRIPTION:
Digest access authentication is one of the agreed-upon methods a web server can use to negotiate credentials with a user's web browser. It applies a hash function to a password before sending it over the network, which is safer than basic access authentication, which sends plaintext.
Technically, digest authentication is an application of MD5 cryptographic hashing with usage of nonce values to prevent replay attacks. It uses the HTTP protocol.
[http://en.wikipedia.org/wiki/Digest_access_authentication]

auth.DIGITAL-SIGNATURE#cptIt56.2#

name::
* McsEngl.auth.DIGITAL-SIGNATURE@cptIt,

auth.electrocardiogram (ECG)

name::
* McsEngl.auth.electrocardiogram (ECG)@cptIt,

auth.heartbeat,

auth.electroencephalograms (EEGs)

name::
* McsEngl.auth.electroencephalograms (EEGs)@cptIt,

auth.brainwave,

auth.FACTOR-AUTHENTICATION

name::
* McsEngl.auth.FACTOR-AUTHENTICATION@cptIt,

_DESCRIPTION:
Single-Factor, Two-Factor, Multi-factor. When you use only a password or a fingerprint to access your accounts, you’re using single-factor authentication?—?which means you’re using one thing to prove you are who you say you are. When you use a password plus something you have or are, you’re using two factors. Some companies, like Google, call this two-step verification or 2SV. While some security experts quibble over the terms verification and authentication, for our purposes the differences are irrelevant. The real question is, are we actually using two factors or just one disguised as two. As you might imagine, this is where things get a little tricky.
[https://medium.com/@pamelawjd/bitcoin-security-made-easy-using-2-factor-authentication-92c3943471fa#.4dxpizew0]

auth.facial-recognition

name::
* McsEngl.auth.facial-recognition@cptIt,

auth.PASSWORD#ql:sctit.password#

name::
* McsEngl.auth.PASSWORD@cptIt,

auth.PERSON

name::
* McsEngl.auth.PERSON@cptIt,

auth.PUBLIC-KEY

name::
* McsEngl.auth.PUBLIC-KEY@cptIt,
* McsEngl.public-key-authentication@cptIt,

_DESCRIPTION:
Public key authentication is an alternative means of identifying yourself to a login server, instead of typing a password. It is more secure and more flexible, but more difficult to set up.
In conventional password authentication, you prove you are who you claim to be by proving that you know the correct password. The only way to prove you know the password is to tell the server what you think the password is. This means that if the server has been hacked, or spoofed, an attacker can learn your password.
Public key authentication solves this problem. You generate a key pair, consisting of a public key (which everybody is allowed to know) and a private key (which you keep secret and do not give to anybody). The private key is able to generate signatures. A signature created using your private key cannot be forged by anybody who does not have that key; but anybody who has your public key can verify that a particular signature is genuine.
So you generate a key pair on your own computer, and you copy the public key to the server under a certain name. Then, when the server asks you to prove who you are, WinSCP can generate a signature using your private key. The server can verify that signature (since it has your public key) and allow you to log in. Now if the server is hacked or spoofed, the attacker does not gain your private key or password; they only gain one signature. And signatures cannot be re-used, so they have gained nothing.
There is a problem with this: if your private key is stored unprotected on your own computer, then anybody who gains access to that will be able to generate signatures as if they were you. So they will be able to log in to your server under your account. For this reason, your private key is usually encrypted when it is stored on your local machine, using a passphrase of your choice. In order to generate a signature, WinSCP must decrypt the key, so you have to type your passphrase.
This can make public-key authentication less convenient than password authentication: every time you log in to the server, instead of typing a short password, you have to type a longer passphrase. One solution to this is to use an authentication agent, a separate program which holds decrypted private keys and generates signatures on request. WinSCP can use PuTTY’s authentication agent, called Pageant. When you begin a Windows session, you start Pageant and load your private key into it (typing your passphrase once). For the rest of your session, you can start WinSCP any number of times and Pageant will automatically generate signatures without you having to do anything. When you close your Windows session, Pageant shuts down, without ever having stored your decrypted private key on disk. Many people feel this is a good compromise between security and convenience.
There is more than one public-key algorithm available. The most common is RSA, but others exist, notably DSA (otherwise known as DSS), the USA’s federal Digital Signature Standard.1)
[http://winscp.net/eng/docs/public_key]

auth.SOFTWARE

name::
* McsEngl.auth.SOFTWARE@cptIt,

auth.VOICE-RECOGNITION

name::
* McsEngl.auth.VOICE-RECOGNITION@cptIt,

sctIt.AUTHORIZATION

name::
* McsEngl.sctIt.AUTHORIZATION@cptIt,
* McsEngl.conceptIt302.2,
* McsEngl.authorization@cptIt302.2,

_DESCRIPTION:
Authorization (also spelt Authorisation) is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular. More formally, "to authorize" is to define access policy. For example, human resources staff are normally authorized to access employee records, and this policy is usually formalized as access control rules in a computer system. During operation, the system uses the access control rules to decide whether access requests from (authenticated) consumers shall be approved (granted) or disapproved (rejected). Resources include individual files' or items' data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the computer.
[http://en.wikipedia.org/wiki/Authorization]

So, since we're discussing SAML and OAuth and OpenID, and such, I
should mention this:

http://simplesamlphp.org/

It supports SAML, OpenID, OAuth, it's extendable and it supports
multiple backends (LDAP, MySQL, etc). It is also localizable.

- Ryan Lane

sctIt.COMPUTER

name::
* McsEngl.sctIt.COMPUTER@cptIt,
* McsEngl.security.computer@cptIt,

_SPECIFIC:
* computer-network-security##

sctIt.COMPUTER-NETWORK

name::
* McsEngl.sctIt.COMPUTER-NETWORK@cptIt,
* McsEngl.conceptIt288,
* McsEngl.net-security@cptIt,
* McsEngl.network-security@cptIt,
* McsEngl.network's-security@cptIt288,
* McsEngl.security.computer-network@cptIt,
* McsEngl.security.net@cptIt,
====== lagoGreek:
* McsElln.ΑΣΦΑΛΕΙΑ-ΔΙΚΤΥΟΥ@cptIt,
* McsElln.ασφάλεια.δικτύου-υπολογιστών@cptIt,

_WHOLE:
* network.computer#cptIt21#

_DESCRIPTION:
ΕΝΑ ΠΡΟΒΛΗΜΑ ΠΟΥ ΔΕΝ ΕΧΕΙ ΒΡΕΙ ΑΚΟΜΑ ΤΗ ΛΥΣΗ ΤΟΥ
[ΒΗΜΑ, 2 ΜΑΙΟ 1993, Δ39]

netsct'attack

name::
* McsEngl.netsct'attack@cptIt,
* McsEngl.network-attack@cptIt,

_SPECIFIC:
* Cross-site scripting (XSS),
* SQL injection,
* header injection,
* Directory traversal,
* Remote File Execution,
* Local File Inclusion,
* Denial of Service (DoS)

netsct'attack.BEAST

name::
* McsEngl.netsct'attack.BEAST@cptIt,
* McsEngl.beast-attack@cptIt,

How does the BEAST attack actually work?
When you visit an insecure web page, the attacker alters the returned page or returned JavaScript to add malicious JavaScript to the content that you download.
This malicious JavaScript runs automatically in your web browser (if you have use of JavaScript enabled)
The JavaScript opens a secure connection to (for example) https://gmail.com
The attacker compares the encrypted traffic between your browser and https://gmail.com with the known data that was sent by the JavaScript. Using several minutes of computer processing power, the attacker can figure out something called the “Initialization Vector” of your secure session.
This information allows them to access the future secure authentication cookies sent to the same web site in the same browser session.
These cookies can be “replayed” by the attacker to give them full access to your account as if they were already logged in. They can see any sensitive data that you have there and perform actions as you.
It is important to note that:

This attack requires JavaScript in a web browser to work.
It requires an insecure web connection be made and for the attacker to be able to modify the content returned to you.
The attacker must guess what secure web site you will visit.
The attacker must have time to gather and analyze data.
You must then connect to and login to that same web site in the same browser session (i.e. without closing and re-opening your browser or using a different browser).
The attacker must use that site as you while your logged in session is active (if you explicitly logout, that would usually also logout the attacker; lets hope the attacker has not changed your password on you!).
Also:

This attack affects SSL v3 and its successor, TLS v1.0
It does not affect web sites using TLS v1.1 or TLS v1.2 for encryption
[http://luxsci.com/blog/is-ssltls-really-broken-by-the-beast-attack-what-is-the-real-story-what-should-i-do.html]

netsct'attack.DIRECTORY-TRAVERSAL

name::
* McsEngl.netsct'attack.DIRECTORY-TRAVERSAL@cptIt,
* McsEngl.directory-traversal@cptIt,
* McsEngl.netsct'directory-traversal@cptIt,

netsct'attack.DoS

name::
* McsEngl.netsct'attack.DoS@cptIt,
* McsEngl.denial-of-service@cptIt,
* McsEngl.DoS@cptIt,
* McsEngl.netsct'DoS@cptIt,

netsct'attack.EAVESDROPPING

name::
* McsEngl.netsct'attack.EAVESDROPPING@cptIt,
* McsEngl.eavesdropping.computer-network@cptIt,
* McsEngl.netsct'eavesdropping@cptIt,

_DESCRIPTION:
Eavesdropping is the act of secretly listening to the private conversation of others without their consent, as defined by Black's Law Dictionary.[1] This is commonly thought to be unethical and there is an old adage that "eavesdroppers seldom hear anything good of themselves...eavesdroppers always try to listen to matters that concern them."[2]
[http://en.wikipedia.org/wiki/Eavesdropping]

netsct'attack.HEADER-INJECTION

name::
* McsEngl.netsct'attack.HEADER-INJECTION@cptIt,
* McsEngl.header-injection@cptIt,
* McsEngl.netsct'header-injection@cptIt,

netsct'attack.INSIDE-JOB

name::
* McsEngl.netsct'attack.INSIDE-JOB@cptIt,

Inside jobs, η σοβαρότερη απειλή για τα δίκτυα
ΑΘΗΝΑ 11/01/2015
Εταιρείες ξοδεύουν δισ. δολάρια, κάθε χρόνο για την προστασία τους από hackers, οι οποίοι επιτίθενται σε ολόκληρο το δίκτυο τους, ωστόσο ειδικοί προειδοποιούν πως δεν πρέπει να αγνοούν τη σοβαρότερη απειλή, για την οποία δεν είναι ακόμη έτοιμοι: οι δουλειές εκ των έσω.

Η Morgan Stanley, μία από τις μεγαλύτερες εταιρείες χρηματοπιστωτικών υπηρεσιών του κόσμου, αποκάλυψε τη Δευτέρα, ότι είχαν παραβιαστεί οι πληροφορίες ενός πελάτη. Αλλά αυτό δεν ήταν το αποτέλεσμα αποφασισμένων hacker ή επιθέσεων τύπου phishing. Αντί αυτού, η Morgan Stanley, είπε ότι ήταν ένας υπάλληλος που έκλεψε δεδομένα από περισσότερους από 350.000 λογαριασμούς πελατών.

Η κίνηση είναι μία αφορμή αφύπνισης σε εταιρείες, οι οποίες εκτιμάται ότι ξόδεψαν 71.1 δισεκατομμύρια δολάρια το 2014, για την ασφάλεια στο δίκτυο τους, μέχρι σχεδόν 8 % παραπάνω από το προηγούμενο έτος. Και ενώ οι hacker έχουν με επιτυχία επιτεθεί σε μεγάλες εταιρείες όπως η JPMorgan, η Target και η Home Depot, ειδικοί προειδοποιούν ότι οι υπάλληλοι αποτελούν απειλή, είτε ενεργούν σκόπιμα είτε τυχαία.

Ενώ η βιομηχανία για την ασφάλεια στο δίκτυο επινοεί μία διαρκώς αυξανόμενη λίστα μεθόδων τεχνολογίας για την προστασία από εισβολές, αποδεικνύεται ότι δεν υπάρχουν πολλά που μπορεί να γίνουν για να σταματήσει ένας εισβολέας, ο οποίος ήδη έχει πρόσβαση στα αρχεία της εταιρίας, τα οποία κατά τα άλλα θεωρούνται ως άκρως προστατευμένα δεδομένα.

Οι επιθέσεις εκ τω έσω χαρακτηρίζονται συχνά με τρεις τρόπους: είναι δύσκολο να εντοπιστούν και δεν συμβαίνουν συχνά. Αλλά όταν μια επίθεση όντως προέρχεται εκ των έσω, μπορεί να είναι καταστροφική. Ερευνητές ασφαλείας στο Ινστιτούτο Ponemon λένε ότι το 88% των επαγγελματιών πληροφορικής που ρωτήθηκαν, απάντησαν ότι αγωνίζονται να προσδιορίσουν τις εκ των έσω επιθέσεις, και οι σύμβουλοι ασφαλείας στο SpectorSoft λένε ότι λιγότερες από τις μισές επιχειρήσεις είναι σε θέση να τις παρατηρήσουν.

Λίγες εταιρείες δημοσιοποιούν αυτού του είδους τις επιθέσεις, και όταν αυτό συμβαίνει σπάνια υπολογίζουν τη ζημία. Η SpectorSoft υποστηρίζει ότι οι εκ των έσω επιθέσεις (που αποτελούν το 35% του συνόλου) κόστισαν στις Αμερικάνικες εταιρίες 40 δισεκατομμύρια δολάρια για το 2013 μόνο.

Πηγή: SecNews
[http://www.nooz.gr/tech/inside-jobs-i-sovaroteri-apeili-gia-ta-diktua]

netsct'attack.MAN-IN-THE-MIDDLE-ATTACK

name::
* McsEngl.netsct'attack.MAN-IN-THE-MIDDLE-ATTACK@cptIt,
* McsEngl.netsct'man-in-the-mieddle-attack@cptIt,
* McsEngl.man-in-the-middle-attack@cptIt,

The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point, can insert himself as a man-in-the-middle).[citation needed]

A man-in-the-middle attack can succeed only when the attacker can impersonate each endpoint to the satisfaction of the other — it is an attack on mutual authentication (or lack thereof). Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, SSL can authenticate one or both parties using a mutually trusted certification authority.
[http://en.wikipedia.org/wiki/Man-in-the-middle_attack]

netsct'attack.REMOTE-FILE-EXECUTION

name::
* McsEngl.netsct'attack.REMOTE-FILE-EXECUTION@cptIt,
* McsEngl.netsct'remote-file-execution@cptIt,
* McsEngl.remote-file-execution@cptIt,

netsct'attack.SPOOFING

name::
* McsEngl.netsct'attack.SPOOFING@cptIt,
* McsEngl.netsct'spoofing@cptIt,
* McsEngl.spoofing@cptIt,

This is a feature of the SSH protocol. It is designed to protect you against a network attack known as spoofing: secretly redirecting your connection to a different computer, so that you send your password to the wrong machine. Using this technique, an attacker would be able to learn the password that guards your login account, and could then log in as if they were you and use the account for their own purposes.
[http://winscp.net/eng/docs/ssh]

netsct'attack.SYBIL-ATTACK

name::
* McsEngl.netsct'attack.SYBIL-ATTACK@cptIt,
* McsEngl.sybil-attack@cptIt,

_DESCRIPTION:
While useful for privacy, the ability to own multiple accounts poses a challenge for applications like voting. For example, suppose we want to design a voting smart contract in which each person on Ethereum has one vote (perhaps to gauge community support for a certain EIP). Anyone could easily rig the system by voting with multiple accounts. Using fake accounts to manipulate a network is called a Sybil attack, and is a common problem on distributed networks like Ethereum.
[https://medium.com/marbleorg/introducing-humanity-90ddf9ead235]
===
The Sybil attack in computer security is an attack wherein a reputation system is subverted by forging identities in peer-to-peer networks. It is named after the subject of the book Sybil, a case study of a woman diagnosed with dissociative identity disorder.[1] The name was suggested in or before 2002 by Brian Zill at Microsoft Research.[2] The term "pseudospoofing" had previously been coined by L. Detweiler on the Cypherpunks mailing list and used in the literature on peer-to-peer systems for the same class of attacks prior to 2002, but this term did not gain as much influence as "Sybil attack".[3]
...
A notable Sybil attack (in conjunction with a traffic confirmation attack) was launched against the Tor anonymity network for several months in 2014 by unknown perpetrators.[6][7] Many in the network security community suspect the NSA/CIA to be responsible for the attack,[citation needed] and some speculate that the attack may have been connected to the investigation into the Silk Road website.[citation needed]
[https://en.wikipedia.org/wiki/Sybil_attack]

netsct.attack.XSS

name::
* McsEngl.netsct.attack.XSS@cptIt,
* McsEngl.cross-site-scripting@cptIt,
* McsEngl.netsct'XSS@cptIt,
* McsEngl.XSS@cptIt,

_ADDRESS.WPG:
* http://excess-xss.com//

_DESCRIPTION:
XSS is a code injection attack made possible through insecure handling of user input.
[http://excess-xss.com/]
===
Cross-site scripting (XSS) is a code injection attack that allows an attacker to execute malicious JavaScript in another user's browser.
The attacker does not directly target his victim. Instead, he exploits a vulnerability in a website that the victim visits, in order to get the website to deliver the malicious JavaScript for him. To the victim's browser, the malicious JavaScript appears to be a legitimate part of the website, and the website has thus acted as an unintentional accomplice to the attacker.
[http://excess-xss.com/]

preventing

_DESCRIPTION:
Preventing XSS
The most important way of preventing XSS attacks is to perform secure input handling.
Most of the time, encoding should be performed whenever user input is included in a page.
In some cases, encoding has to be replaced by or complemented with validation.
Secure input handling has to take into account which context of a page the user input is inserted into.
To prevent all types of XSS attacks, secure input handling has to be performed in both client-side and server-side code.
Content Security Policy provides an additional layer of defense for when secure input handling fails.
[http://excess-xss.com/]

netsct'local-file-execution

name::
* McsEngl.netsct'local-file-execution@cptIt,
* McsEngl.local-file-execution@cptIt,

netsct'obscurity

name::
* McsEngl.netsct'obscurity@cptIt,
* McsEngl.netsct'@cptIt,
* McsEngl.obscurity@cptIt,

obscurity is not security.
[http://www.acunetix.com/websitesecurity/ajax/]

sctIt.CRYPTOGRAPHY

_CREATED: {2013-07-24} {2012-02-16}

name::
* McsEngl.conceptIt56,
* McsEngl.crypt@cptIt56,
* McsEngl.cryptographic-system,
* McsEngl.cryptography@cptIt56,
* McsEngl.cryptology@cptIt56,
* McsEngl.cryptosystem, {2013-09-03}
* McsEngl.technology.information.security.cryprography@cptIt56, {2012-05-28}
* McsEngl.crypto,

crypto'DEFINITION

Cryptography (or cryptology; from Greek ???pt??, "hidden, secret"; and ???fe??, graphein, "writing", or -????a, -logia, "study", respectively)[1] is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).[2] More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries[3] and which are related to various aspects in information security such as data confidentiality, data integrity, and authentication.[4] Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.
[http://en.wikipedia.org/wiki/Cryptography]
===
Cryptographic techniques can be used to defend data in transit between systems, reducing the probability that data exchanged between systems can be intercepted or modified.
[http://en.wikipedia.org/wiki/Computer_security]

crypto'adversary

name::
* McsEngl.crypto'adversary@cptIt,
* McsEngl.adversary.crypt@cptIt,

In cryptography, an adversary (rarely opponent, enemy) is a malicious entity whose aim is to prevent the users of the cryptosystem from achieving their goal (primarily privacy, integrity, and availability of data). An adversary's efforts might take the form of attempting to discover secret data, corrupting some of the data in the system, spoofing the identity of a message sender or receiver, or forcing system downtime.

Actual adversaries, as opposed to idealized ones, are referred to as attackers. Not surprisingly, the former term predominates in the cryptographic and the latter in the computer security literature. Eve, Mallory, Oscar and Trudy are all adversarial characters widely used in both types of texts.
[http://en.wikipedia.org/wiki/Adversary_(cryptography)]

crypto'Algorithm (cipher)

name::
* McsEngl.crypto'Algorithm (cipher)@cptIt,
* McsEngl.algorithm.cryptography@cptIt,
* McsEngl.cipher@cptIt, /'saifer/
* McsEngl.cypher@cptIt,
* McsEngl.encryption-algorithm@cptIt,

_DESCRIPTION:
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.
An alternative, less common term is encipherment.
To encipher or encode is to convert information from plain text into code or cipher.
In non-technical usage, a "cipher" is the same thing as a "code"; however, the concepts are distinct in cryptography.
In classical cryptography, ciphers were distinguished from codes.

Codes generally substitute different length strings of characters in the output, whilst ciphers generaly substitute the same number of characters as are input. There are exceptions and some cipher systems may use slightly more, or less, characters when output versus the number that were input.

Codes operated by substituting according to a large codebook which linked a random string of characters or numbers to a word or phrase. For example, "UQJHSE" could be the code for "Proceed to the following coordinates". When using a cipher the original information is known as plaintext, and the encrypted form as ciphertext. The ciphertext message contains all the information of the plaintext message, but is not in a format readable by a human or computer without the proper mechanism to decrypt it.

The operation of a cipher usually depends on a piece of auxiliary information, called a key (or, in traditional NSA parlance, a cryptovariable). The encrypting procedure is varied depending on the key, which changes the detailed operation of the algorithm. A key must be selected before using a cipher to encrypt a message. Without knowledge of the key, it should be extremely difficult, if not impossible, to decrypt the resulting ciphertext into readable plaintext.

Most modern ciphers can be categorized in several ways

By whether they work on blocks of symbols usually of a fixed size (block ciphers), or on a continuous stream of symbols (stream ciphers).
By whether the same key is used for both encryption and decryption (symmetric key algorithms), or if a different key is used for each (asymmetric key algorithms). If the algorithm is symmetric, the key must be known to the recipient and sender and to no one else. If the algorithm is an asymmetric one, the enciphering key is different from, but closely related to, the deciphering key. If one key cannot be deduced from the other, the asymmetric key algorithm has the public/private key property and one of the keys may be made public without loss of confidentiality.
[http://en.wikipedia.org/wiki/Cipher]

cipher'Kerckhoffs-principle

name::
* McsEngl.cipher'Kerckhoffs-principle@cptIt,

In designing security systems, it is wise to assume that the details of the cryptographic algorithm are already available to the attacker. This is known as Kerckhoffs' principle — "only secrecy of the key provides security", or, reformulated as Shannon's maxim, "the enemy knows the system". The history of cryptography provides evidence that it can be difficult to keep the details of a widely used algorithm secret (see security through obscurity). A key is often easier to protect (it's typically a small piece of information) than an encryption algorithm, and easier to change if compromised. Thus, the security of an encryption system in most cases relies on some key being kept secret.
[http://en.wikipedia.org/wiki/Cryptographic_key]

SPECIFIC

name::
* McsEngl.cipher.Specific@cptIt,

cipher.BLOWFISH

name::
* McsEngl.cipher.BLOWFISH@cptIt,
* McsEngl.blowfish.cipher@cptIt,

_DESCRIPTION:
Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products. Blowfish provides a good encryption rate in software and no effective cryptanalysis of it has been found to date. However, the Advanced Encryption Standard now receives more attention.

Schneier designed Blowfish as a general-purpose algorithm, intended as an alternative to the aging DES and free of the problems and constraints associated with other algorithms. At the time Blowfish was released, many other designs were proprietary, encumbered by patents or were commercial/government secrets. Schneier has stated that, "Blowfish is unpatented, and will remain so in all countries. The algorithm is hereby placed in the public domain, and can be freely used by anyone."

Notable features of the design include key-dependent S-boxes and a highly complex key schedule.
[http://en.wikipedia.org/wiki/Blowfish_(cipher)]

cipher.DES|DEA

name::
* McsEngl.cipher.DES|DEA@cptIt,

_DESCRIPTION:
The Data Encryption Standard (DES, /?di??i?'?s/ or /'d?z/) is a previously predominant algorithm for the encryption of electronic data. It was highly influential in the advancement of modern cryptography in the academic world. Developed in the early 1970s at IBM and based on an earlier design by Horst Feistel, the algorithm was submitted to the National Bureau of Standards (NBS) following the agency's invitation to propose a candidate for the protection of sensitive, unclassified electronic government data. In 1976, after consultation with the National Security Agency (NSA), the NBS eventually selected a slightly modified version, which was published as an official Federal Information Processing Standard (FIPS) for the United States in 1977. The publication of an NSA-approved encryption standard simultaneously resulted in its quick international adoption and widespread academic scrutiny. Controversies arose out of classified design elements, a relatively short key length of the symmetric-key block cipher design, and the involvement of the NSA, nourishing suspicions about a backdoor. The intense academic scrutiny the algorithm received over time led to the modern understanding of block ciphers and their cryptanalysis.

DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size being too small; in January, 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes (see chronology). There are also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are infeasible to mount in practice. The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks. In recent years, the cipher has been superseded by the Advanced Encryption Standard (AES). Furthermore, DES has been withdrawn as a standard by the National Institute of Standards and Technology (formerly the National Bureau of Standards).

Some documentation makes a distinction between DES as a standard and DES as an algorithm, referring to the algorithm as the DEA (Data Encryption Algorithm).
[http://en.wikipedia.org/wiki/Data_Encryption_Standard]

cipher.DSA

name::
* McsEngl.cipher.DSA@cptIt,
* McsEngl.DSA@cptIt,

The Digital Signature Algorithm (DSA) is a Federal Information Processing Standard for digital-signatures#cptIt56.2#. It was proposed by the National Institute of Standards and Technology (NIST) in August 1991 for use in their Digital Signature Standard (DSS) and adopted as FIPS 186 in 1993.[1] Four revisions to the initial specification have been released: FIPS 186-1 in 1996,[2] FIPS 186-2 in 2000,[3] FIPS 186-3 in 2009,[4] and FIPS 186-4 in 2013.[5]
DSA is covered by U.S. Patent 5,231,668, filed July 26, 1991 and attributed to David W. Kravitz,[6] a former NSA employee. This patent was given to "The United States of America as represented by the Secretary of Commerce, Washington, D.C.", and NIST has made this patent available worldwide royalty-free.[7] Claus P. Schnorr claims that his U.S. Patent 4,995,082 (expired) covered DSA; this claim is disputed.[8] DSA is a variant of the ElGamal Signature Scheme
[http://en.wikipedia.org/wiki/Digital_Signature_Algorithm]

cipher.Message-authentication-code

name::
* McsEngl.cipher.Message-authentication-code@cptIt,
* McsEngl.cipher.MAC@cptIt,
* McsEngl.MAC@cptIt56i,
* McsEngl.message-authentication-code@cptIt56i,

_GENERIC:
* cryptographic-hash-funciton-56i#ql:cipher.cryptographic_hash_function#

Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key can be used to authenticate the hash value[4] upon receipt.
[http://en.wikipedia.org/wiki/Cryptography#Symmetric-key_cryptography]

cipher.Symmetric-key

name::
* McsEngl.cipher.Symmetric-key@cptIt,

Symmetric key ciphers are implemented as either block ciphers or stream ciphers. A block cipher enciphers input in blocks of plaintext as opposed to individual characters, the input form used by a stream cipher.
[http://en.wikipedia.org/wiki/Cryptography#Symmetric-key_cryptography]

crypto'attack

name::
* McsEngl.crypto'attack@cptIt,
* McsEngl.crypto'attack@cptIt,
* McsEngl.crypto'security@cptIt,
* McsEngl.crypto'valnerability@cptIt,
* McsEngl.cryptographic-attack@cptIt,

_ADDRESS.WPG:
* {time.2017-10-16} Estonia - Just One of Global Cryptography ‘Factorization’ Victims
https://cointelegraph.com/news/estonia-just-one-of-global-cryptography-factorization-victims,

crypto'attack.BRUTE-FORCE

name::
* McsEngl.crypto'attack.BRUTE-FORCE@cptIt,
* McsEngl.brute-force-attack@cptIt,

_DESCRIPTION:
attack of brute force (simply trying every possible combination in order to find the right key)
[http://computer.howstuffworks.com/encryption2.htm]

crypto'attacker

name::
* McsEngl.crypto'attacker@cptIt,

crypto'cryptanalysis

name::
* McsEngl.crypto'cryptanalysis@cptIt,
* McsEngl.cryptanalysis@cptIt56i,

The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme, thus permitting its subversion or evasion.
It is a common misconception that every encryption method can be broken.
[http://en.wikipedia.org/wiki/Cryptography#Cryptanalysis]

crypto'Cryptographic-hash-function (chfcn)

name::
* McsEngl.crypto'Cryptographic-hash-function (chfcn)@cptIt,
* McsEngl.conceptIt56.3,
* McsEngl.chfcn@cptIt,
* McsEngl.cryptographic-hash-function@cptIt,
* McsEngl.cipher.Cryptographic-hash-function@cptIt,
* McsEngl.cryptographic-hash-function@cptIt56.3,
* McsEngl.hash-function@cptIt,
* McsEngl.hash-function.cryptographic@cptIt,
* McsEngl.one-way-hash@cptIt,
====== lagoGreek:
* McsElln.συνάρτηση-κατακερματισμού-ψηφιακής-υπογραφής@cptIt,
* McsElln.συνάρτηση-κατατεμαχισμού-ψηφιακής-υπογραφής@cptIt,

_DESCRIPTION:
A Cryptographic Hash Function is one that performs this function but also fulfils three important requirements:
- it does so in a way that no information is given on what input data produced the hash (non reversible),
- it does so in a way that a minor change in the input change gives a very different output hash, that the hash cannot be calculated except using the hash function (no shortcuts),
- that there is an extremely low probability that two different inputs will produce the same hash.
[https://dappsforbeginners.wordpress.com/tutorials/introduction-to-development-on-ethereum/]
===
Cryptographic hash functions are mathematical operations run on digital data.
[https://en.wikipedia.org/wiki/SHA-2]
===
Cryptographic hash functions are a third type of cryptographic algorithm.
They take a message of any length as input, and output a short, fixed length hash which can be used in (for example) a digital signature.
For good hash functions, an attacker cannot find two messages that produce the same hash.
MD4 is a long-used hash function which is now broken;
MD5, a strengthened variant of MD4, is also widely used but broken in practice.
The U.S. National Security Agency developed the Secure Hash Algorithm series of MD5-like hash functions:
SHA-0 was a flawed algorithm that the agency withdrew;
SHA-1 is widely deployed and more secure than MD5, but cryptanalysts have identified attacks against it;
the SHA-2 family improves on SHA-1, but it isn't yet widely deployed, and the U.S. standards authority thought it "prudent" from a security perspective to develop a new standard to "significantly improve the robustness of NIST's overall hash algorithm toolkit."[25]
Thus, a hash function design competition is underway and meant to select a new U.S. national standard, to be called SHA-3, by 2012.
[http://en.wikipedia.org/wiki/Cryptography#Symmetric-key_cryptography]
===
the hash function is a one way function
[https://en.wikipedia.org/wiki/Trusted_timestamping]

_DESCRIPTION:
Στη διαδικασία της δημιουργίας και επαλήθευσης της υπογραφής εμπλέκεται και η έννοια της συνάρτησης κατακερματισμού (ή κατατεμαχισμού -one way hash). Με την εφαρμογή της συνάρτησης κατακερματισμού, από ένα μήνυμα ανεξαρτήτου του μεγέθους του, παράγεται η «σύνοψή του», η οποία είναι μία σειρά από bits συγκεκριμένου μεγέθους (π.χ. 128 ή 160 bits). Η σύνοψη του μηνύματος (fingerprint ή message digest) είναι μία ψηφιακή αναπαράσταση του μηνύματος, είναι μοναδική για το μήνυμα και το αντιπροσωπεύει.
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]

Input-of-chfcn

name::
* McsEngl.input-data@cptIt,
* McsEngl.input-message@cptIt,

Output-of-chfcn

name::
* McsEngl.cryptographic-hash@cptIt,
* McsEngl.hash@cptIt,
* McsEngl.hash-value@cptIt,
* McsEngl.digest@cptIt,

_DESCRIPTION:
First a hash is calculated from the data.
A hash is a sort of digital fingerprint of the original data: a string of bits that is practically impossible to duplicate with any other set of data.
[https://en.wikipedia.org/wiki/Trusted_timestamping]
===
A hash algorithm turns an arbitrarily-large amount of data into a fixed-length hash.
The same hash will always result from the same data, but modifying the data by even one bit will completely change the hash.
Like all computer data, hashes are large numbers, and are usually written as hexadecimal.
BitCoin uses the SHA-256 hash algorithm to generate verifiably "random" numbers in a way that requires a predictable amount of CPU effort.
Generating a SHA-256 hash with a value less than the current target solves a block and wins you some coins.
Also see http://en.wikipedia.org/wiki/Cryptographic_hash
[https://en.bitcoin.it/wiki/Hash]

Resource-of-chfcn

_ADDRESS.WPG:
* https://www.raymond.cc/blog/7-tools-verify-file-integrity-using-md5-sha1-hashes/,

SPECIFIC

* cpt.specific,

_SPECIFIC:
* MD4##
* MD5##
* SHA-0##
* SHA-1##
* SHA-2##
* SHA-3##

chfcn.MD5

name::
* McsEngl.chfcn.MD5@cptIt,
* McsEngl.MD5@cptIt,
* McsEngl.Message-Digest-algorithm-5@cptIt,

_DESCRIPTION:
First and foremost md5 is very bad.
[http://stackoverflow.com/questions/3336636/php-ajax-login-is-this-method-secure?rq=1]

program.MD5Sum

name::
* McsEngl.program.MD5Sum@cptIt,
* McsEngl.pgmMd5sum@cptIt,

_DESCRIPTION:
The program md5sum is designed to verify data integrity using the MD5 (Message-Digest algorithm 5) 128-bit cryptographic hash. MD5 hashes used properly can confirm both file integrity and authenticity.
[https://help.ubuntu.com/community/HowToMD5SUM]

program.WinMD5Sum

name::
* McsEngl.program.WinMD5Sum@cptIt,
* McsEngl.pgmWinMd5sum@cptIt,

_DESCRIPTION:
There are also graphical tools such as the one used in the walk-through provided below.

Download and install winMD5Sum, a free and open source hash verification program.

Right-click the ISO file.
Click Send To, then winMD5Sum.

Wait for winMD5Sum to load and finish the checksum (this may take a significant amount of time depending on your computer's performance).

Copy the corresponding hash from UbuntuHashes into the bottom text box.

Click "Compare"
[https://help.ubuntu.com/community/HowToMD5SUM#MD5SUM_on_Windows]

chfcn.SECURE-HASH-ALGORITHM

name::
* McsEngl.chfcn.SECURE-HASH-ALGORITHM@cptIt,
* McsEngl.cipher.SHA@cptIt,
* McsEngl.secure-hash-algorithm@cptIt56i,
* McsEngl.SHA@cptIt56i,

_GENERIC:
* cryptographic-hash-funciton-56i#ql:cipher.cryptographic_hash_function#

chfcn.SHA-1

name::
* McsEngl.chfcn.SHA-1@cptIt,
* McsEngl.SHA1@cptIt, {2012-12-15}

_DESCRIPTION:
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard.

SHA-1 produces a 160-bit (20-byte) hash value. A SHA-1 hash value is typically expressed as a hexadecimal number, 40 digits long.

SHA stands for "secure hash algorithm". The four SHA algorithms are structured differently and are distinguished as SHA-0, SHA-1, SHA-2, and SHA-3. SHA-1 is very similar to SHA-0, but corrects an error in the original SHA hash specification that led to significant weaknesses. The SHA-0 algorithm was not adopted by many applications. SHA-2 on the other hand significantly differs from the SHA-1 hash function.

SHA-1 is the most widely used of the existing SHA hash functions, and is employed in several widely used applications and protocols.

In 2005, cryptanalysts found attacks on SHA-1 suggesting that the algorithm might not be secure enough for ongoing use.[2] NIST required many applications in federal agencies to move to SHA-2 after 2010 because of the weakness.[3] Although no successful attacks have yet been reported on SHA-2, they are algorithmically similar to SHA-1. In 2012, following a long-running competition, NIST selected an additional algorithm, Keccak, for standardization as SHA-3[4][5]
[http://en.wikipedia.org/wiki/SHA1]

Νέα μέθοδος για "σπάσιμο" κωδικών SHA1
ΑΘΗΝΑ 14/12/2012
Ο ερευνητής ασφάλειας Jens Steube που φέρει το ψευδώνυμο Atom και είναι δημιουργός του προγράμματος ανάκτησης κωδικών HashCat, παρουσίασε μια νέα μέθοδο για σπάσιμο κωδικών SHA1 στη διάσκεψη Passwords^12 στο πανεπιστήμιο του Όσλο.

Η νέα έρευνα βελτιώνει την προσπάθεια κατά 21%.

Ο SHA-1 είναι ίσως ο πιο ευρέως χρησιμοποιούμενος αλγόριθμος κρυπτογράφησης που μετατρέπει το απλό κείμενο σε κρυπτογραφημένο hash.

Αυτού του είδους η κρυπτογράφηση ονομάζεται «μονόδρομη», το οποίο σημαίνει ότι από τον κρυπτογραφημένο κωδικό δεν μπορούμε να ακολουθήσουμε αντίστροφη λειτουργία ώστε να βρούμε το αρχικό κείμενο.

Όταν ένας χρήστης συνδέεται σε μια ιστοσελίδα, ο κωδικός κρυπτογραφείται και συγκρίνεται με τους αποθηκευμένους κωδικούς στη βάση δεδομένων. Στην περίπτωση που hackers εισβάλλουν στο διακομιστή της βάσης δεδομένων και πάρουν τη λίστα με τους κωδικούς πρόσβασης, αυτοί θα είναι σε κρυπτογραφημένη μορφή (hash).

Οι hackers μπορούν να σπάσουν αυτά τα hashes από τυχαίους κωδικούς χρησιμοποιώντας τον ίδιο αλγόριθμο μέχρι να έχουν ένα hash που ταιριάζει με κάποιο που έχουν υποκλέψει. Αλλά το να «σπάσει» ένας δύσκολος κωδικός πρόσβασης, θα πάρει πάρα πολύ χρόνο.

Η νέα μέθοδος καθιστά την διαδικασία ταχύτερη με τη μείωση του αριθμού των βημάτων που απαιτούνται για τον υπολογισμό των SHA1 hashes.

Πηγή: SecNews.gr
[http://www.nooz.gr/tech/nea-me8odos-gia-spasimo-kodikon-sha1]

sha1'evaluation

name::
* McsEngl.sha1'evaluation@cptIt,

As you read on you'll see that I advocate the use of a hashing algorithm called Secure Hashing Algorithm 1 (or SHA-1). Since I wrote this article, a team of researchers - Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu - have shown SHA-1 to be weaker than was previously thought. This means that for certain purposes such as digital signatures, stronger algorithms like SHA-256 and SHA-512 are now being recommended. For generating password hashes, SHA-1 still provides a more than adequate level of security for most applications today. You should be aware of this issue however and begin to think about using stronger algorithms in your code as they become more readily available.

For more information please see Bruce Schneier's analysis of the issue at http://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html
[http://phpsec.org/articles/2005/password-hashing.html]

chfcn.SHA-2

name::
* McsEngl.chfcn.SHA-2@cptIt,
* McsEngl.SHA-2@cptIt,
* McsEngl.SHA2@cptIt,

_ADDRESS.WPG:
* http://www.xorbin.com/tools/sha256-hash-calculator,

_DESCRIPTION:
General
Designers  National Security Agency
First published  2001
Series  (SHA-0), SHA-1, SHA-2, SHA-3
Certification  FIPS PUB 180-4, CRYPTREC, NESSIE

Detail
Digest sizes  224, 256, 384, or 512 bits
Structure  Merkle–Damgεrd construction
Rounds  64 or 80

Best public cryptanalysis
A 2011 attack breaks preimage resistance for 57 out of 80 rounds of SHA-512, and 52 out of 64 rounds for SHA-256.[1]
Pseudo-collision attack against up to 46 rounds of SHA-256.[2]

SHA-2 is a set of cryptographic hash functions designed by the NSA (U.S. National Security Agency).[3] SHA stands for Secure Hash Algorithm. Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed "hash" (the output from execution of the algorithm) to a known and expected hash value, a person can determine the data's integrity. For example, computing the hash of a downloaded file and comparing the result to a previously published hash result can show whether the download has been modified or tampered with.[4] A key aspect of cryptographic hash functions is their collision resistance: nobody should be able to find two different input values that result in the same hash output.
SHA-2 includes significant changes from its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.
SHA-256 and SHA-512 are novel hash functions computed with 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds. SHA-224 and SHA-384 are simply truncated versions of the first two, computed with different initial values. SHA-512/224 and SHA-512/256 are also truncated versions of SHA-512, but the initial values are generated using the method described in FIPS PUB 180-4. SHA-2 was published in 2001 by the NIST as a U.S. federal standard (FIPS). The SHA-2 family of algorithms are patented in US 6829355. The United States has released the patent under a royalty-free license.[5]
In 2005, an algorithm emerged for finding SHA-1 collisions in about 2000-times fewer steps than was previously thought possible.[6] Although (as of 2015) no example of a SHA-1 collision has been published yet, the security margin left by SHA-1 is weaker than intended, and its use is therefore no longer recommended for applications that depend on collision resistance, such as digital signatures. Although SHA-2 bears some similarity to the SHA-1 algorithm, these attacks have not been successfully extended to SHA-2.
Currently, the best public attacks break preimage resistance 52 rounds of SHA-256 or 57 rounds of SHA-512, and collision resistance for 46 rounds of SHA-256, as shown in the Cryptanalysis and validation section below.[1][2]
[https://en.wikipedia.org/wiki/SHA-2]

chfcn.SHA-3

name::
* McsEngl.chfcn.SHA-3@cptIt,
* McsEngl.Keccak-chfcn@cptIt,
* McsEngl.SHA-3@cptIt,
* McsEngl.SHA3@cptIt,

_DESCRIPTION:
On October 2, 2012, Keccak was selected as the winner of the NIST hash function competition.
A version of this algorithm became a FIPS standard on August 5, 2015 under the name SHA-3.[19]
[https://en.wikipedia.org/wiki/Cryptographic_hash_function]
===
SHA-3 (Secure Hash Algorithm 3), a subset of the cryptographic primitive family Keccak (/'k?t?ζk/, or /k?t???k/),[1][2][3] is a cryptographic hash function designed by Guido Bertoni, Joan Daemen, Michaλl Peeters, and Gilles Van Assche, building upon RadioGatϊn. SHA-3 is a member of the Secure Hash Algorithm family. The SHA-3 standard was released by NIST on August 5, 2015.[4][5] The reference implementation source code was dedicated to public domain via CC0 waiver.[6]
[https://en.wikipedia.org/wiki/SHA-3]

_ADDRESS.WPG:
* https://emn178.github.io/online-tools/keccak_256.html,

chfcnSHA-256d

name::
* McsEngl.double-SHA-256@cptIt,
* McsEngl.SHA-256d@cptIt,

_DESCRIPTION:
SHA-256d is also known as Double SHA-256 hash algorithm.
It is a cryptographic hash, first proposed by Ferguson and Schneier in the book “Practical Cryptography”.
Bitcoin is one such cryptocurrency that utilizes the SHA-256d hashing algorithm.
The SHA-256d hash is achieved by applying the regular SHA-256 hash twice, by first applying SHA-256 hash to the data and then once again to the resulting hash.

Many of the early released cryptocurrencies uses the SHA-256d algorithm such as: Bitcoin, Freicoin, Namecoin and Peercoin.
[https://cryptojunction.com/questions/question/what-is-the-difference-between-the-sha256d-and-sha256-hashing-algorithm]

crypto'cryptosystem

name::
* McsEngl.crypto'cryptosystem@cptIt,
* McsEngl.cryptosystem@cptIt56i,

crypto'digital-certificate

_CREATED: {2013-08-29}

name::
* McsEngl.crypto'digital-certificate@cptIt,
* McsEngl.digital-certificate@cptIt,
* McsEngl.identity-certificate@cptIt,
* McsEngl.public-key-certificate@cptIt,
====== lagoGreek:
* McsElln.πιστοποιητικό-δημοσίου-κλειδιού@cptIt,
* McsElln.ψηφιακό-πιστοποιητικό@cptIt,

_DESCRIPTION:
Από τους σημαντικότερους τύπους ψηφιακών πιστοποιητικών είναι το πιστοποιητικό δημοσίου κλειδιού ( public key certificate). Ο στόχος του πιστοποιητικού δημοσίου κλειδιού είναι η δημιουργία μιας σχέσης ταυτοποίησης μεταξύ του δημοσίου κλειδιού και του δικαιούχου του. Το πιστοποιητικό αναφέρει το δημόσιο κλειδί (το οποίο και είναι το αντικείμενο του πιστοποιητικού) και επιβεβαιώνει ότι το συγκεκριμένο πρόσωπο που αναφέρεται στο πιστοποιητικό είναι ο δικαιούχος του αντίστοιχου ιδιωτικού κλειδιού. Έτσι ο παραλήπτης που λαμβάνει ένα μήνυμα με ψηφιακή υπογραφή, μπορεί να είναι σίγουρος ότι το μήνυμα έχει σταλεί από το πρόσωπο που το υπογράφει.

Το ψηφιακό πιστοποιητικό, είναι στον ηλεκτρονικό κόσμο ότι είναι το διαβατήριο στο φυσικό κόσμο. Η συσχέτιση ενός δημοσίου κλειδιού με τον δικαιούχο του γίνεται με χρήση της ψηφιακής υπογραφής του Παρόχου Υπηρεσιών Πιστοποίησης, όπου ο Πάροχος με την ψηφιακή του υπογραφή, υπογράφει το πιστοποιητικό του δικαιούχου. Αν ένας χρήστης εμπιστεύεται έναν Πάροχο Υπηρεσιών Πιστοποίησης, εμπιστεύεται και το πιστοποιητικό που ο Πάροχος εκδίδει.
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]
===
In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document that uses a digital signature to bind a public key with an identity — information such as the name of a person or an organization, their address, and so forth. The certificate can be used to verify that a public key belongs to an individual.

In a typical public key infrastructure (PKI) scheme, the signature will be of a certificate authority (CA). In a web of trust scheme, the signature is of either the user (a self-signed certificate) or other users ("endorsements"). In either case, the signatures on a certificate are attestations by the certificate signer that the identity information and the public key belong together.

For provable security this reliance on something external to the system has the consequence that any public key certification scheme has to rely on some special setup assumption, such as the existence of a certificate authority.[1]
[http://en.wikipedia.org/wiki/Public_key_certificate]

dglcft'certificate-authority

name::
* McsEngl.dglcft'certificate-authority@cptIt,
* McsEngl.crypto'certificate-authority@cptIt,
* McsEngl.CA@cptIt,
* McsEngl.certificate-authority@cptIt,
* McsEngl.certification-authority@cptIt,
====== lagoGreek:
* McsElln.Πάροχος-Υπηρεσιών-Πιστοποίησης@cptIt,

_DESCRIPTION:
Ο Πάροχος Υπηρεσιών Πιστοποίησης είναι η οντότητα που παρέχει την υπηρεσία εκείνη με την οποία πιστοποιείται η σχέση ενός προσώπου με το δημόσιο κλειδί του. Ο τρόπος με τον οποίο γίνεται αυτό, είναι με την έκδοση ενός πιστοποιητικού (ένα ηλεκτρονικό αρχείο) στο οποίο ο Πάροχος Υπηρεσιών Πιστοποίησης πιστοποιεί την ταυτότητα του προσώπου και το δημόσιο κλειδί του.
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]
===
In cryptography, certificate authority, or certification authority (CA), is an entity that issues digital certificates. The digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or assertions made by the private key that corresponds to the public key that is certified. In this model of trust relationships, a CA is a trusted third party that is trusted by both the subject (owner) of the certificate and the party relying upon the certificate. CAs are characteristic of many public key infrastructure (PKI) schemes.

Commercial CAs charge to issue certificates that will automatically be trusted by most web browsers (Mozilla maintains a list of at least 57 trusted root CAs[1], though multiple commercial CAs or their resellers may share the same trusted root). The number of web browsers and other devices and applications that trust a particular certificate authority is referred to as ubiquity.

Aside from commercial CAs, some providers issue digital certificates to the public at no cost. Large institutions or government entities may have their own CAs.
[https://en.wikipedia.org/wiki/Certificate_authorities]

dglcft'content

name::
* McsEngl.dglcft'content@cptIt,

Contents of a typical digital certificate[edit source | editbeta]

See also: The contents of X.509, the digital certificate widely used in the Internet
Serial Number: Used to uniquely identify the certificate.

Subject: The person, or entity identified.

Signature Algorithm: The algorithm used to create the signature.

Signature: The actual signature to verify that it came from the issuer.

Issuer: The entity that verified the information and issued the certificate.

Valid-From: The date the certificate is first valid from.

Valid-To: The expiration date.

Key-Usage: Purpose of the public key (e.g. encipherment, signature, certificate signing...).

Public Key: The public key.

Thumbprint Algorithm: The algorithm used to hash the public key certificate.

Thumbprint (also known as fingerprint) : The hash itself, used as an abbreviated form of the public key certificate.
[http://en.wikipedia.org/wiki/Digital_certificate]

dglcft'resource

name::
* McsEngl.dglcft'resource@cptIt,

_ADDRESS.WPG:
* https://www.youtube.com/watch?v=LRMBZhdFjDI,

dglcft'X.509

name::
* McsEngl.dglcft'X.509@cptIt,

X.509 certificates include the public key and certain information about the certificate owner. This information lets the other side verify the integrity of the certificate itself and authenticity of the certificate owner. Verification can be done both by computer and to some extent by the human. X.509 certificate has an associated private key, which is usually stored separately from the certificate for security reasons.
[https://www.eldos.com/security/articles/4672.php]

crypto'digital-signature (dsr)

_CREATED: {2012-05-28}

name::
* McsEngl.crypto'digital-signature (dsr)@cptIt,
* McsEngl.conceptIt56.2,
* McsEngl.signature-of-crypto@cptIt,
* McsEngl.digital-signature@cptIt, {2012-05-28}
* McsEngl.dsr@cptIt, {2016-03-04}
* McsEngl.dsgr@cptIt, {2015-08-18}

_DESCRIPTION:
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or documents.
A valid digital signature gives a recipient reason to believe that the message was created by a known sender, that the sender cannot deny having sent the message (authentication and non-repudiation), and that the message was not altered in transit (integrity).
Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.
[https://en.wikipedia.org/wiki/Digital_signature]
===
2. Με το ιδιωτικό του κλειδί, ο αποστολέας κρυπτογραφεί τη-σύνοψη#ql:"cpt.fingerprint_in_digital_signature"#.
Αυτό που παράγεται είναι η ψηφιακή υπογραφή
.
Η υπογραφή είναι ουσιαστικά μία σειρά ψηφίων συγκεκριμένου πλήθους.
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]
===
3. Τι είναι η ψηφιακή υπογραφή
Οι ψηφιακές υπογραφές χρησιμοποιούν την κρυπτογραφία δημοσίου κλειδιού. Ο χρήστης διαθέτει δύο κλειδιά (το δημόσιο και το ιδιωτικό) τα οποία έχουν κάποιο μαθηματικό συσχετισμό. Η σχέση των κλειδιών είναι τέτοια όπου αν κάποιος γνωρίζει το ένα κλειδί να είναι πρακτικά αδύνατον να υπολογίσει το άλλο. Το ένα κλειδί χρησιμοποιείται για τη δημιουργία της υπογραφής και το άλλο για την επαλήθευσή της. Η διαφοροποίηση από την κρυπτογράφηση, έγκειται στο ότι για τη δημιουργία της ηλεκτρονικής υπογραφής ο αποστολέας χρησιμοποιεί το ιδιωτικό του κλειδί και για την επαλήθευσή της ο παραλήπτης χρησιμοποιεί το δημόσιο κλειδί του αποστολέα.

Στη διαδικασία της δημιουργίας και επαλήθευσης της υπογραφής εμπλέκεται και η έννοια της συνάρτησης κατακερματισμού (ή κατατεμαχισμού -one way hash). Με την εφαρμογή της συνάρτησης κατακερματισμού, από ένα μήνυμα ανεξαρτήτου του μεγέθους του, παράγεται η «σύνοψή του», η οποία είναι μία σειρά από bits συγκεκριμένου μεγέθους (π.χ. 128 ή 160 bits). Η σύνοψη του μηνύματος (fingerprint ή message digest) είναι μία ψηφιακή αναπαράσταση του μηνύματος, είναι μοναδική για το μήνυμα και το αντιπροσωπεύει.

Η συνάρτηση κατακερματισμού είναι μονόδρομη διότι από την σύνοψη που δημιουργεί, είναι υπολογιστικά αδύνατον κάποιος να εξάγει το αρχικό μήνυμα. Η πιθανότητα δύο μηνύματα να έχουν την ίδια σύνοψη είναι εξαιρετικά μικρή. Αυτό σημαίνει ότι αν το μήνυμα του αποστολέα έχει κάποια συγκεκριμένη σύνοψη και το μήνυμα που λάβει ο παραλήπτης (χρησιμοποιώντας την ίδια συνάρτηση κατακερματισμού) παράγει διαφορετική σύνοψη, τότε το μήνυμα κατά την μετάδοσή του έχει αλλοιωθεί (μη ακεραιότητα). Οποιαδήποτε αλλαγή σε ένα μήνυμα συνεπάγεται και τη δημιουργία διαφορετικής σύνοψης.

Η ηλεκτρονική υπογραφή, στην ουσία είναι η κρυπτογραφημένη με το ιδιωτικό κλειδί του αποστολέα σύνοψη. Δηλαδή, η ψηφιακή υπογραφή (σε αντίθεση με την ιδιόχειρη υπογραφή) είναι διαφορετική για κάθε μήνυμα!!

Θεωρώντας ότι ο αποστολέας έχει ένα συγκεκριμένο ζευγάρι κλειδιών και το ιδιωτικό του κλειδί είναι στην πλήρη κατοχή του, τότε το γεγονός ότι ο αποστολέας χρησιμοποιεί το ιδιωτικό του κλειδί για να κρυπτογραφήσει το μήνυμα, πιστοποιεί στον παραλήπτη που το αποκρυπτογραφεί με το αντίστοιχο δημόσιο κλειδί (του αποστολέα) την ταυτότητα του αποστολέα (αυθεντικότητα). Η ψηφιακή υπογραφή είναι ένας τρόπος αυθεντικοποίησης του αποστολέα του μηνύματος.

Μία ψηφιακή υπογραφή μπορεί να πλαστογραφηθεί εάν ο δικαιούχος του ιδιωτικού κλειδιού δεν το έχει υπό τον πλήρη έλεγχό του (π.χ. χάσει το μέσο στο οποίο έχει αποθηκευτεί το ιδιωτικό κλειδί).

4. Δημιουργία και επαλήθευση ψηφιακής υπογραφής
Η χρήση της ηλεκτρονικής υπογραφής περιλαμβάνει δύο διαδικασίες: τη δημιουργία της υπογραφής και την επαλήθευσή της. Παρακάτω, θα αναφέρουμε βήμα προς βήμα τις ενέργειες του αποστολέα και του παραλήπτη ώστε να γίνει κατανοητός ο μηχανισμός της δημιουργίας και επαλήθευσης της ψηφιακής υπογραφής.

Αποστολέας
1. Ο αποστολέας χρησιμοποιώντας κάποιον αλγόριθμο κατακερματισμού (one way hash) δημιουργεί τη σύνοψη του μηνύματος (message digest) που θέλει να στείλει. Ανεξάρτητα από το μέγεθος του μηνύματος, αυτό που θα παραχθεί θα είναι μία συγκεκριμένου μήκους σειρά ψηφίων.

2. Με το ιδιωτικό του κλειδί, ο αποστολέας κρυπτογραφεί τη σύνοψη. Αυτό που παράγεται είναι η ψηφιακή υπογραφή. Η υπογραφή είναι ουσιαστικά μία σειρά ψηφίων συγκεκριμένου πλήθους.

3. Η κρυπτογραφημένη σύνοψη (ψηφιακή υπογραφή) προσαρτάται στο κείμενο και το μήνυμα με τη ψηφιακή υπογραφή μεταδίδονται μέσω του δικτύου (σημειώνεται ότι ο αποστολέας αν επιθυμεί μπορεί να κρυπτογραφήσει το μήνυμά του με το δημόσιο κλειδί του παραλήπτη).

Παραλήπτης
1. Ο παραλήπτης αποσπά από το μήνυμα την ψηφιακή υπογραφή (κρυπτογραφημένη, με το ιδιωτικό κλειδί του αποστολέα, σύνοψη).

2. Εφαρμόζοντας στο μήνυμα που έλαβε τον ίδιο αλγόριθμο κατακερματισμού, ο παραλήπτης δημιουργεί τη σύνοψη του μηνύματος.

3. Στη συνέχεια, αποκρυπτογραφεί με το δημόσιο κλειδί του αποστολέα, την κρυπτογραφημένη σύνοψη του μηνύματος ( ψηφιακή υπογραφή).

4. Συγκρίνονται οι δύο συνόψεις και αν βρεθούν ίδιες, αυτό σημαίνει ότι το μήνυμα που έλαβε ο παραλήπτης είναι ακέραιο. Αν το μήνυμα έχει μεταβληθεί, η σύνοψη που θα παράγει ο παραλήπτης θα είναι διαφορετική από την σύνοψη που έχει κρυπτογραφηθεί.

Δημιουργία ψηφιακής υπογραφής
image002
Οι παραπάνω διεργασίες γίνονται από το ανάλογο λογισμικό στον υπολογιστή του χρήστη.

Επαλήθευση ψηφιακής υπογραφής
image
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]
===
A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit. Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.
[http://en.wikipedia.org/wiki/Digital_signature]

dsr'fingerprint

name::
* McsEngl.dsr'fingerprint@cptIt,
* McsEngl.dsr'message-digest@cptIt,
* McsEngl.fingerprint-in-digital-signature@cptIt,
====== lagoGreek:
* McsElln.σύνοψη-ψηφιακής-υπογραφής@cptIt,

_DESCRIPTION:
Στη διαδικασία της δημιουργίας και επαλήθευσης της υπογραφής εμπλέκεται και η έννοια της συνάρτησης κατακερματισμού (ή κατατεμαχισμού -one way hash).
Με την εφαρμογή της συνάρτησης κατακερματισμού, από ένα μήνυμα ανεξαρτήτου του μεγέθους του, παράγεται η «σύνοψή του», η οποία είναι μία σειρά από bits συγκεκριμένου μεγέθους (π.χ. 128 ή 160 bits).
Η σύνοψη του μηνύματος (fingerprint ή message digest) είναι μία ψηφιακή αναπαράσταση του μηνύματος, είναι μοναδική για το μήνυμα και το αντιπροσωπεύει.
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]

dsr'law

name::
* McsEngl.dsr'law@cptIt,
* McsEngl.law.digital-signature@cptIt,

Το Π.Δ. 150/2001 που εναρμόνισε την Οδηγία 99/93/ΕΚ του Ευρωπαϊκού Κοινοβουλίου και του Συμβουλίου σχετικά με το κοινοτικό πλαίσιο για ηλεκτρονικές υπογραφές, καθόρισε το πλαίσιο εκείνο μέσα στο οποίο μία ψηφιακή υπογραφή αναγνωρίζεται νομικά ως ιδιόχειρη. Αυτό σημαίνει ότι υπό συγκεκριμένες προϋποθέσεις, τα πρόσωπα που συμβάλλονται σε μία ηλεκτρονική συναλλαγή, και υπογράφουν ηλεκτρονικά, δεν μπορεί να την αρνηθούν.

Επιπλέον, το προεδρικό Διάταγμα, εκτός των άλλων,

καθόρισε τους όρους που πρέπει να ισχύουν σε ψηφιακά πιστοποιητικά για να θεωρούνται αναγνωρισμένα πιστοποιητικά και τους όρους που πρέπει να πληρούν οι Πάροχοι Υπηρεσιών Πιστοποίησης για να παρέχουν αναγνωρισμένα πιστοποιητικά.
έθεσε τις αρχές λειτουργίας της εσωτερικής αγοράς όσον αφορά την παροχή υπηρεσιών πιστοποίησης
έθεσε τις προϋποθέσεις νομικής αναγνώρισης εντός ΕΕ των αναγνωρισμένων πιστοποιητικών που εκδίδονται από Παρόχους Υπηρεσιών Πιστοποίησης εγκατεστημένους σε χώρες εκτός ΕΕ, και άλλες σχετικές προβλέψεις που αφορούν διεθνείς πτυχές.
έθεσε το πλαίσιο της ευθύνης των Παρόχων Υπηρεσιών Πιστοποίησης
ανέθεσε στην ΕΕΤΤ συγκεκριμένες αρμοδιότητες.

Οι αρμοδιότητες της ΕΕΤΤ όπως απορρέουν από το ΠΔ 150/2001, είναι επιγραμματικά οι εξής:

Η παροχή Εθελοντικής Διαπίστευσης, ύστερα από έγγραφη αίτηση του ενδιαφερόμενου Παρόχου Υπηρεσιών Πιστοποίησης, προκειμένου να επιτευχθεί βελτιωμένο επίπεδο παροχής υπηρεσιών πιστοποίησης. (άρθρο 4 παρ. 5 εδ.α) ή η ανάθεση σε δημόσιους ή ιδιωτικούς φορείς του έργου αυτού. Με την Εθελοντική Διαπίστευση απονέμονται δικαιώματα και επιβάλλονται υποχρεώσεις, συμπεριλαμβανομένων τελών, στον Πάροχο Υπηρεσιών Πιστοποίησης.
Η εποπτεία και ο έλεγχος των εγκατεστημένων στην Ελλάδα Παρόχων Υπηρεσιών Πιστοποίησης, καθώς και των φορέων διαπίστευσης και ελέγχου της συμμόρφωσης των υπογραφών προς το Παράρτημα ΙΙΙ του πδ. 150/2001 (εφόσον η ΕΕΤΤ αναθέσει τέτοια καθήκοντα σε άλλους φορείς) (άρθρο 4 παρ. 8).
Η διαπίστωση της συμμόρφωσης των διατάξεων δημιουργίας υπογραφής (υλικού ή λογισμικού που χρησιμοποιείται για την εφαρμογή του ιδιωτικού κλειδιού για τη δημιουργία της ηλεκτρονικής υπογραφής) προς το Παράρτημα ΙΙΙ του Προεδρικού Διατάγματος 150/2001 (άρθρο 4 παρ. 2, εδ.α) ή ανάθεση σε δημόσιους ή ιδιωτικούς φορείς του έργου αυτού.
Η επιβολή προστίμων σε Παρόχους Υπηρεσιών Πιστοποίησης, οι οποίοι ενεργούν ως διαπιστευμένοι, χωρίς να είναι (άρθρο 4 παρ.9)
Η ενημέρωση της Ευρωπαϊκής Επιτροπής για τις επωνυμίες και τις διευθύνσεις όλων των διαπιστευμένων εθνικών Παρόχων Υπηρεσιών Πιστοποίησης, καθώς και για τυχόν αλλαγές στις παραπάνω πληροφορίες (άρθρα 8 παρ. 2 και 3).

Η ΕΕΤΤ με την υπ. αρ. 248/71 Απόφασή της «Κανονισμός Παροχής Υπηρεσιών Πιστοποίησης Ηλεκτρονικής Υπογραφής» (ΦΕΚ 603/Β/16-5-2002) ρυθμίζει ζητήματα των αναγνωρισμένων πιστοποιητικών και θέτει το θεσμικό πλαίσιο για την εποπτεία και τον έλεγχο των εγκατεστημένων στην Ελλάδα Παρόχων Υπηρεσιών Πιστοποίησης.
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]

dsr'one-way-hash#ql:cryptographic-hash-function@cptIt56.3#

name::
* McsEngl.dsr'one-way-hash@cptIt,

crypto'dsr.KEYLESS-SIGNATURE-INFRASTRUCTURE

name::
* McsEngl.crypto'dsr.KEYLESS-SIGNATURE-INFRASTRUCTURE@cptIt,
* McsEngl.KSI-signature@cptIt,

_DESCRIPTION:
KSI signatures are cryptographic tags for electronic data which provide verification of the provenance, time and integrity of electronic data using only hash-function cryptography without the need for trusted administrators, secrets or the security of key-stores.
[https://guardtime.com/ksi-technology]

KSI

name::
* McsEngl.KSI@cptIt,
* McsEngl.Keyless-Signature-Infrastructure@cptIt,
* McsEngl.KSI@cptIt,
* McsEngl.Keyless-Signature-Infrastructure@cptIt,

_DESCRIPTION:
“Keyless Signature Infrastructure (KSI) is designed to provide scalable digital signature based authentication for electronic data, machines and humans.”
- Guardtime
[http://bravenewcoin.com/news/e-estonia-initiative-progresses-with-blockchain-partnerships/]
===
KSI™ (Keyless Signature Infrastructure®)
A globally distributed network infrastructure for the issuance and verification of KSI signatures.
KSI signatures are cryptographic tags for electronic data which provide verification of the provenance, time and integrity of electronic data using only hash-function cryptography without the need for trusted administrators, secrets or the security of key-stores.
[https://guardtime.com/ksi-technology]

ksi'service

name::
* McsEngl.ksi'service@cptIt,

_DESCRIPTION:
KSI Service
Access to the KSI Industrial Blockchain
The KSI Service provides access to the KSI Industrial Blockchain allowing organizations to instrument their networks with KSI Signatures and consequently detect changes in the integrity state of monitored digital assets in real-time. KSI Service ingests a hash value representing your data and returns a KSI Signature that can be used to independently assert the existence of data integrity, signing time, and signing entity of that data.
[https://guardtime.com/cybersecurity-platform#ksi-service]

ksi.EVOLUTION

name::
* McsEngl.ksi.EVOLUTION@cptIt,

{time.2007}:
In 2007 we invented Keyless Signature Infrastructure (KSI), a blockchain stack for generating cryptographic metadata at scale. The metadata proves the properties (time, identity, integrity, provenance) of the underlying data without reliance on trusted parties. {2017-02-05}
===
In 2007 we invented Keyless Signature Infrastructure, the first and only blockchain platform for ensuring the integrity of systems, networks and data at industrial scale.
[https://guardtime.com/about#who]

crypto'human

name::
* McsEngl.crypto'human@cptIt,

_ADDRESS.WPG:
* https://en.wikipedia.org/wiki/David_Chaum,

crypto'key

_CREATED: {2013-09-03}

name::
* McsEngl.crypto'key@cptIt,
* McsEngl.key.cryptography@cptIt,

_DESCRIPTION:
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the particular transformation of plaintext into ciphertext, or vice versa during decryption. Keys are also used in other cryptographic algorithms, such as digital signature schemes and message authentication codes.
[http://en.wikipedia.org/wiki/Cryptographic_key]

crypto'key'choice

name::
* McsEngl.crypto'key'choice@cptIt,

_DESCRIPTION:
To prevent a key from being guessed, keys need to be generated truly randomly and contain sufficient entropy. The problem of how to safely generate truly random keys is difficult, and has been addressed in many ways by various cryptographic systems. There is a RFC on generating randomness (RFC 4086, Randomness Requirements for Security). Some operating systems include tools for "collecting" entropy from the timing of unpredictable operations such as disk drive head movements. For the production of small amounts of keying material, ordinary dice provide a good source of high quality randomness.

When a password (or passphrase) is used as an encryption key, well-designed cryptosystems first run it through a key derivation function which adds a salt and compresses or expands it to the key length desired, for example by compressing a long phrase into a 128-bit value suitable for use in a block cipher.
[http://en.wikipedia.org/wiki/Cryptographic_key]

crypto'key'generating

name::
* McsEngl.crypto'key'generating@cptIt,

crypto'key'managing

name::
* McsEngl.crypto'key'managing@cptIt,

crypto'key'size

name::
* McsEngl.crypto'key'size@cptIt,

_DESCRIPTION:
For the one-time pad system the key must be at least as long as the message. In encryption systems that use a cipher algorithm, messages can be much longer than the key. The key must, however, be long enough so that an attacker cannot try all possible combinations.

A key length of 80 bits is generally considered the minimum for strong security with symmetric encryption algorithms. 128-bit keys are commonly used and considered very strong. See the key size article for a fuller discussion.

The keys used in public key cryptography have some mathematical structure. For example, public keys used in the RSA system are the product of two prime numbers. Thus public key systems require longer key lengths than symmetric systems for an equivalent level of security. 3072 bits is the suggested key length for systems based on factoring and integer discrete logarithms which aim to have security equivalent to a 128 bit symmetric cipher. Elliptic curve cryptography may allow smaller-size keys for equivalent security, but these algorithms have only been known for a relatively short time and current estimates of the difficulty of searching for their keys may not survive. As of 2004, a message encrypted using a 109-bit key elliptic curve algorithm had been broken by brute force.[1] The current rule of thumb is to use an ECC key twice as long as the symmetric key security level desired. Except for the random one-time pad, the security of these systems has not (as of 2008) been proven mathematically, so a theoretical breakthrough could make everything one has encrypted an open book. This is another reason to err on the side of choosing longer keys.
[http://en.wikipedia.org/wiki/Cryptographic_key]

crypto'key.SESSION

name::
* McsEngl.crypto'key.SESSION@cptIt,

crypto'key.WEAK

name::
* McsEngl.crypto'key.WEAK@cptIt,

crypto'law

name::
* McsEngl.crypto'law@cptIt,

_ADDRESS.WPG:
* http://www.cryptolaw.org//

crypto'message

name::
* McsEngl.crypto'message@cptIt,
* McsEngl.message.cryptography@cptIt56i,

_SPECIFIC:
* ciphertext#ql:crypt'ciphertext#,
* plaintext#ql:crypt'plaintext#

crypto'message.encrypted (ciphertext)

name::
* McsEngl.crypto'message.encrypted (ciphertext)@cptIt,
* McsEngl.crypt'ciphertext@cptIt,
* McsEngl.ciphertext@cptIt56i,
* McsEngl.cyphertext@cptIt56i,
* McsEngl.encoded-text@cptIt56i,
* McsEngl.encrypted-message@cptIt,
* McsEngl.encrypted-text@cptIt56i,

_GENERIC:
* message#ql:crypt'message#

In cryptography, ciphertext (or cyphertext) is the result of encryption performed on plaintext using an algorithm, called a cipher.[1] Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. Decryption, the inverse of encryption, is the process of turning ciphertext into readable plaintext. Ciphertext is not to be confused with codetext because the latter is a result of a Code, not a cipher.
[http://en.wikipedia.org/wiki/Ciphertext]

crypto'message.original (plaintext)

name::
* McsEngl.crypto'message.original (plaintext)@cptIt,
* McsEngl.crypt'plaintext@cptIt,
* McsEngl.plaintext-cryptography@cptIt56i,

_GENERIC:
* message#ql:crypt'message#

crypto'OpenSSL-project

name::
* McsEngl.crypto'OpenSSL-project@cptIt,
* McsEngl.OpenSSL-project@cptIt,

_DESCRIPTION:
Welcome to the OpenSSL Project
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation.
OpenSSL is based on the excellent SSLeay library developed by Eric A. Young and Tim J. Hudson. The OpenSSL toolkit is licensed under an Apache-style licence, which basically means that you are free to get and use it for commercial and non-commercial purposes subject to some simple license conditions.
[https://www.openssl.org/]

openssl'command

name::
* McsEngl.openssl'command@cptIt,

Standard commands
asn1parse ca ciphers cms
crl crl2pkcs7 dgst dh
dhparam dsa dsaparam ec
ecparam enc engine errstr
gendh gendsa genpkey genrsa
nseq ocsp passwd pkcs12
pkcs7 pkcs8 pkey pkeyparam
pkeyutl prime rand req
rsa rsautl s_client s_server
s_time sess_id smime speed
spkac srp ts verify
version x509

Message Digest commands (see the `dgst' command for more details)
md4 md5 mdc2 rmd160
sha sha1

Cipher commands (see the `enc' command for more details)
aes-128-cbc aes-128-ecb aes-192-cbc aes-192-ecb
aes-256-cbc aes-256-ecb base64 bf
bf-cbc bf-cfb bf-ecb bf-ofb
camellia-128-cbc camellia-128-ecb camellia-192-cbc camellia-192-ecb
camellia-256-cbc camellia-256-ecb cast cast-cbc
cast5-cbc cast5-cfb cast5-ecb cast5-ofb
des des-cbc des-cfb des-ecb
des-ede des-ede-cbc des-ede-cfb des-ede-ofb
des-ede3 des-ede3-cbc des-ede3-cfb des-ede3-ofb
des-ofb des3 desx idea
idea-cbc idea-cfb idea-ecb idea-ofb
rc2 rc2-40-cbc rc2-64-cbc rc2-cbc
rc2-cfb rc2-ecb rc2-ofb rc4
rc4-40 seed seed-cbc seed-cfb
seed-ecb seed-ofb

You can do that in one command:

openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -days XXX
You can add -nodes if you don't want to protect your private key with a passphrase.

Self-signed certs are not validated with any thirty party unless you import them to the browsers previously. If you need more security, you should use a certificate signed by a CA.
[http://stackoverflow.com/a/10176685]

openssl'program

name::
* McsEngl.openssl'program@cptIt,
* McsEngl.OpenSSL-toolkit@cptIt,

_ADDRESS.WPG:
* http://www.openssl.org/related/binaries.html,
* http://slproweb.com/products/Win32OpenSSL.html,

openssl'valnerability

name::
* McsEngl.openssl'valnerability@cptIt,

OpenSSL: The single line of code that broke online security
14 APR 2014 00:00 ALISTAIR FAIRWEATHER
OpenSSL's security loophole, dubbed Heartbleed, has revealed a fundamental truth about the internet: we should not take goodwill for granted.
OpenSSL is used as the backbone of online security by hundreds of thousands of websites, including Gmail, Pinterest, and Yahoo. (Reuters)
On New Years Eve in 2011, at one minute before 11pm, a British computer consultant named Stephen Henson finished testing a new version of a popular piece of free security software. With a few keystrokes he released OpenSSL version 1.0.1 into the public domain. Now, more than two years later, the events of that night have shaken the foundations of the internet.

OpenSSL is used as the backbone of online security by hundreds of thousands of websites. One of the most popular features it provides is Transport Layer Security (TLS), which scrambles (encrypts) private communications. When you're checking your bank account or your webmail and you see that green padlock in your browser's address bar, you're using TLS.

This encryption is necessary because without it hackers and governments could easily intercept and read all the data passed around the internet. Think of TLS as a system of armoured cars that securely transport your data across the public internet between secure locations – from you own computer to your bank's servers, for example.

What Stephen Henson didn't realise when he released the new version is that he missed a tiny bug in a new feature called Heartbeat. This feature, written by a German graduate student named Robin Seggelmann, had the best of intentions. As we all know, internet traffic is not 100% reliable. Quite a lot of effort goes into simply checking whether the computer on the other end of the line is still connected and "listening" to what your computer is sending.

Heartbeat makes this process quicker by eliminating the need for lengthy security checks, called renegotiations, every time the connection needs to be tested. It allows one computer to ask the other to repeat a word to test if it is still connected – a bit like the guards in the armoured car saying "copy" at the end of every two-way radio transmission.

Unfortunately, both Seggelmann and Henson missed the fact that this check can be abused to trick the listening computer into replying with up to 64 000 characters of data directly from its memory. The asking computer simply lies about the length of the word it is sending (cat is 64 000 letters long), and the replying computer doesn't bother to check – it just spits the data out of its memory.

And here's where it gets really ugly. That data can contain literally anything loaded into memory including passwords, email addresses and encryption keys. Instead of attacking the armoured car, the hackers now have a secret back door into the warehouse and the codes to the safe.

So the thousands of online services that use OpenSSL – such as Facebook, Gmail, Yahoo and Pinterest – have potentially become a goldmine for hackers for more than two years. Many cellphones running newer versions of Android are also vulnerable. All of these services are urging users to change their passwords as soon as possible. If you're not sure, change your password anyway.

The bug, evocatively named Heartbleed, has both the technology community and many ordinary users in uproar. Cries of "How could this be allowed to happen?" and "Someone needs to be held responsible!" are echoing around the internet.

You might expect OpenSSL to fire Seggelmann and Henson, except that they are volunteers and gave their time to the project for free. The "open" part of its name signals that the software is completely open source – it is created, improved and maintained by a global community of software developers, most of whom work for free. Much of the infrastructure of the internet, from databases to web servers, is built on the same model.

This fact has led many people to criticise the entire open source movement. They decry its "lack of professionalism" and its "buggy code". But many of the people complaining have happily built enormously profitable businesses on top of OpenSSL without once contributing to the project.

In fact, the OpenSSL Foundation, the organisation responsible for the software, has only five permanent members and less than a dozen major contributors, scattered around the globe. It received a piffling $2 000 in donations last year, and keeps the lights on by consulting to large corporations and government departments.

The development community has coalesced into two camps – those who feel empathy and forgiveness for the OpenSSL team, and those filled with righteous indignation at what they see as an egregious lapse. But, flawed or not, many will continue using OpenSSL. To rewrite it from scratch, by some estimates, would be a three-year job for a team of 25 developers, with a cost of over $15-million.

Regardless of the current panic and finger-pointing, Heartbleed has revealed a fundamental truth about the internet – some very important parts of its guts rely on goodwill and community spirit. We should not take that for granted. It's easy to blame – but it's far more productive to help.

Alistair is the Mail & Guardian's Chief Technology Officer..
Read more from Alistair Fairweather
Twitter: @afairweather
Google+: Alistair Fairweather
[http://mg.co.za/article/2014-04-14-00-openssl-the-single-line-of-code-that-broke-online-security]

_HEARTBLEED:
Επικίνδυνη ευπάθεια απλώθηκε σε όλο το Ίντερνετ
ΑΘΗΝΑ 10/04/2014
Βαρύ χτύπημα στην «καρδιά» του Διαδικτύου από την ευπάθεια Heartbleed, που έπληξε την τεχνολογία κρυπτογράφησης, η οποία χρησιμοποιείται από τα 2/3 των web servers, με αποτέλεσμα να είναι ευάλωτα στοιχεία όπως passwords και αριθμοί πιστωτικών καρτών.

Η ευπάθεια, στο OpenSSL, μία υλοποίηση ανοικτού κώδικα που χρησιμοποιούν ιστοσελίδες HTTPS που συλλέγουν προσωπικές ή οικονομικές πληροφορίες, υπήρχε εδώ και δύο χρόνια αλλά ανακαλύφθηκε μόλις πρόσφατα και οι ειδικοί ασφαλείας δεν γνωρίζουν ακόμη πόσους κωδικούς έχει καταφέρει να κλέψει.

Είναι ενδεικτικό πως πολύ μεγάλοι ιστότοποι συμβουλεύουν τον κόσμο να αλλάξει κωδικούς ασφαλείας.
[http://www.nooz.gr/world/ios-pou-klevei-kodikois-aplo8ike-se-olo-to-internet]

crypto'Organization

name::
* McsEngl.crypto'Organization@cptIt,

SECG

name::
* McsEngl.SECG@cptIt,

_DESCRIPTION:
The Standards for Efficient Cryptography Group (SECG), an industry consortium, was founded in 1998 to develop commercial standards that facilitate the adoption of efficient cryptography and interoperability across a wide range of computing platforms. SECG members include leading technology companies and key industry players in the information security industry.
[http://www.secg.org/]

crypto'program

name::
* McsEngl.crypto'program@cptIt,
* McsEngl.pgmCrypto@cptIt,

crypto'program.GnuPG

name::
* McsEngl.crypto'program.GnuPG@cptIt,
* McsEngl.GnuPG@cptIt,
* McsEngl.GNU-Privacy-Guard@cptIt,
* McsEngl.GPG@cptIt,

_DESCRIPTION:
The GNU Privacy Guard
GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of frontend applications and libraries are available. GnuPG also provides support for S/MIME and Secure Shell (ssh).

GnuPG is Free Software (meaning that it respects your freedom). It can be freely used, modified and distributed under the terms of the GNU General Public License .

The current version of GnuPG is 2.1.21. See the download page for other maintained versions.

Gpg4win provides a Windows version of the older GnuPG 2.0 branch. It is nicely integrated into an installer and features several frontends as well as English and German manuals.
[https://gnupg.org/]

_ADDRESS.WPG:
* https://gnupg.org/,
* https://www.gnupg.org/gph/en/manual/book1.html,
* http://thehackernews.com/2017/07/gnupg-libgcrypt-rsa-encryption.html,

Gpg4win

name::
* McsEngl.Gpg4win@cptIt,

_ADDRESS.WPG:
* https://www.gpg4win.org/,
* https://files.gpg4win.org/doc/gpg4win-compendium-en.pdf,

crypto'program.miniLock

name::
* McsEngl.crypto'program.miniLock@cptIt,
* McsEngl.miniLock@cptIt,

_DESCRIPTION:
Απλοποιώντας την κρυπτογράφηση
Παρασκευή, 04 Ιουλίου 2014 13:41 UPD:13:41
Μήνες μετά τις αποκαλύψεις της υπόθεσης Σνόουντεν, ο τομέας της ασφάλειας επικοινωνιών και των τεχνολογιών κρυπτογράφησης σημειώνει τεράστια άνοδο, καθώς όλο και περισσότεροι χρήστες (σε προσωπικό ή επαγγελματικό επίπεδο) επιζητούν νέους τρόπους να διασφαλίσουν το απόρρητο των επικοινωνιών τους. Ωστόσο, η χρήση προγραμμάτων/ εργαλείων κρυπτογράφησης παραμένει πολύπλοκο αντικείμενο- και αυτό θέλει να αλλάξει ο Ναντίμ Κομπεΐσι, ο οποίος αργότερα μέσα στον μήνα, στη συνδιάσκεψη χάκερ HOPE στη Ν. Υόρκη, θα παρουσιάσει τη beta έκδοση του miniLock: ενός εύχρηστου, δωρεάν και open-source προγράμματος (browser plugin) κρυπτογράφησης αρχείων, το οποίο ενδείκνυται για χρήση και από άτομα με περιορισμένες τεχνικές γνώσεις.
Όπως αναφέρεται σε σχετικό δημοσίευμα του Wired, κατά τον 23χροο Κομπεΐσι το «tagline» είναι ότι πρόκειται για «κρυπτογράφηση αρχείων που κάνει περισσότερα με λιγότερα…είναι τρομερά απλό, εύχρηστο και είναι αδύνατον να μπερδευτείς χρησιμοποιώντας το».
Το πρόγραμμα βρίσκεται ακόμα σε πειραματική φάση και ο ίδιος προτείνει να μην χρησιμοποιείται για πολύ «ευαίσθητα» αρχεία, ωστόσο φαίνεται ότι αποτελεί το «ευκολότερο» λογισμικό κρυπτογράφησης του είδους του. Σύμφωνα με το Wired, το οποίο δοκίμασε μία έκδοση του plugin για τον Chrome, η χρήση του είναι όντως πολύ εύκολη, ενώ η προστασία που παρέχεται είναι όντως πολύ υψηλού επιπέδου. Το MiniLock μπορεί να χρησιμοποιηθεί για την κρυπτογράφηση ο,τιδήποτε- από συνημμένα σε email αρχεία βίντεο μέχρι φωτογραφίες σε USB drive, ή αρχεία που αποθηκεύονται σε υπηρεσίες cloud αποθήκευσης.
Το miniLock παρέχει κρυπτογράφηση «public key». Σε συστήματα τέτοιου είδους οι χρήστες έχουν δύο κρυπτογραφικά «κλειδιά», ένα δημόσιο και ένα προσωπικό. Μοιράζονται το δημόσιο με όποιον θέλει να τους στείλει αρχεία με ασφάλεια. Ο,τιδήποτε έχει κρυπτογραφηθεί με το public key μπορεί να αποκρυπτογραφηθεί μόνο με το private key.
Το σύστημα του Κομπεΐσι απλοποιεί όλη τη διαδικασία, καθώς κάθε φορά που ενεργοποιείται το πρόγραμμα, ο χρήστης εισάγει έναν κωδικό/ passphrase, από τον οποίο δημιουργείται ένα public key (miniLock ID) και ένα private key, το οποίο ο χρήστης δεν βλέπει ποτέ και διαγράφεται όταν «κλείνει» το πρόγραμμα. Και τα δύο είναι τα ίδια όποτε ο χρήστης εισάγει τον ίδιο κωδικό. Το βασικό πλεονέκτημα είναι ότι οποιοσδήποτε μπορεί να χρησιμοποιήσει το πρόγραμμα σε οποιονδήποτε υπολογιστή χωρίς να ανησυχεί για την ασφαλή αποθήκευση ή μεταφορά του private key.
Ωστόσο, όπως αναφέρεται στο δημοσίευμα του Wired, το miniLock μπορεί να μην γίνει και πολύ ευπρόσδεκτο από την «κρυπτογραφική» κοινότητα, καθώς το πιο γνωστό προηγούμενο δημιούργημα του Κομπεΐσι ήταν το Cryptocat, το οποίο αν και ήταν εύκολο στη χρήση του παρουσίαζε πολλά προβλήματα- τα οποία όμως, κατά τον ίδιο, έχουν επιλυθεί.
[http://www.naftemporiki.gr/story/829386/minilock-aplopoiontas-tin-kruptografisi]

crypto'resourceInfHmn#cptResource843#

name::
* McsEngl.crypto'resourceInfHmn@cptIt,

_ADDRESS.WPG:
* https://www.weforum.org/agenda/2019/02/a-brief-history-of-cryptography-and-why-it-matters,
* http://www.cnet.com/news/new-chrome-extension-hopes-to-de-mystify-encryption// 2014-06-03,
* https://aboutlockify.com/security/open-source-standards-transparency//
* http://www.cpp-home.com/archives/333.html,

crypto'protocol

_CREATED: {2015-08-18} {2012-06-09} {2007-11-29}

name::
* McsEngl.crypto'protocol@cptIt,
* McsEngl.conceptIt1006,
* McsEngl.conceptIt9,
* McsEngl.cryptographic-protocol@cptIt,
* McsEngl.protocol.cryptographic@cptIt,
* McsEngl.cryptographic'protocol@cptIt9, {2007-11-29}
* McsEngl.encryption'protocol@cptIt9,
* McsEngl.security'protocol@cptIt9,
* McsEngl.cryptographic-protocol@cptIt124i,
* McsEngl.cryptographic-protocol@cptIt,
* McsEngl.cryptography-protocol@cptIt,
* McsEngl.cryptography-standard@cptCore459i,
* McsEngl.encryption-protocol@cptIt,
* McsEngl.protocol.cryptrographic@cptIt,
* McsEngl.security-protocol@cptIt,

DEFINITION

_DESCRIPTION:
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods.

A protocol describes how the algorithms should be used. A sufficiently detailed protocol includes details about data structures and representations, at which point it can be used to implement multiple, interoperable versions of a program.

Cryptographic protocols are widely used for secure application-level data transport. A cryptographic protocol usually incorporates at least some of these aspects:

Key agreement or establishment
Entity authentication
Symmetric encryption and message authentication material construction
Secured application-level data transport
Non-repudiation methods
For example, Transport Layer Security (TLS) is a cryptographic protocol that is used to secure web (HTTP) connections. It has an entity authentication mechanism, based on the X.509 system; a key setup phase, where a symmetric encryption key is formed by employing public-key cryptography; and an application-level data transport function. These three aspects have important interconnections. Standard TLS does not have non-repudiation support.

There are other types of cryptographic protocols as well, and even the term itself has various readings; Cryptographic application protocols often use one or more underlying key agreement methods, which are also sometimes themselves referred to as "cryptographic protocols". For instance, TLS employs what is known as the Diffie-Hellman key exchange, which although it is only a part of TLS per se, Diffie-Hellman may be seen as a complete cryptographic protocol in itself for other applications.

Cryptographic protocols can sometimes be verified formally on an abstract level. When it is done, there is a necessity to formalize the environment in which the protocol operate in order to identify threats. This is frequently done through the Dolev-Yao model

Advanced cryptographic protocols[edit]

A wide variety of cryptographic protocols go beyond the traditional goals of data confidentiality, integrity, and authentication to also secure a variety of other desired characteristics of computer-mediated collaboration. Blind signatures can be used for digital cash and digital credentials to prove that a person holds an attribute or right without revealing that person's identity or the identities of parties that person transacted with. Secure digital time-stamping can be used to prove that data (even if confidential) existed at a certain time. Secure multiparty computation can be used to compute answers (such as determining the highest bid in an auction) based on confidential data (such as private bids), so that when the protocol is complete the participants know only their own input and the answer. Undeniable signatures include interactive protocols that allow the signer to prove a forgery and limit who can verify the signature. Deniable encryption augments standard encryption by making it impossible for an attacker to mathematically prove the existence of a plaintext message. Digital mixes create hard-to-trace communications.
[http://en.wikipedia.org/wiki/Cryptographic_protocol]
===
There are a number of standards related to cryptography. Standard algorithms and protocols provide a focus for study; standards for popular applications attract a large amount of cryptanalysis.
[http://en.wikipedia.org/wiki/Cryptography_standards]

prlCrypto'cryptography#cptIt56#

name::
* McsEngl.prlCrypto'cryptography@cptIt,

SPECIFIC

prlCrypto.Data-Encryption-Standard

name::
* McsEngl.prlCrypto.Data-Encryption-Standard@cptIt,
* McsEngl.data-encryption-standard@cptIt,
* McsEngl.DES@cptIt,

_DESCRIPTION:
The Data Encryption Standard (DES, /?di??i?'?s/ or /'d?z/) is a previously predominant algorithm for the encryption of electronic data. It was highly influential in the advancement of modern cryptography in the academic world. Developed in the early 1970s at IBM and based on an earlier design by Horst Feistel, the algorithm was submitted to the National Bureau of Standards (NBS) following the agency's invitation to propose a candidate for the protection of sensitive, unclassified electronic government data. In 1976, after consultation with the National Security Agency (NSA), the NBS eventually selected a slightly modified version, which was published as an official Federal Information Processing Standard (FIPS) for the United States in 1977. The publication of an NSA-approved encryption standard simultaneously resulted in its quick international adoption and widespread academic scrutiny. Controversies arose out of classified design elements, a relatively short key length of the symmetric-key block cipher design, and the involvement of the NSA, nourishing suspicions about a backdoor. While these suspicions eventually have turned out to be unfounded, the intense academic scrutiny the algorithm received over time led to the modern understanding of block ciphers and their cryptanalysis.
DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size being too small; in January, 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes (see chronology). There are also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are infeasible to mount in practice. The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks. In recent years, the cipher has been superseded by the Advanced Encryption Standard (AES). Furthermore, DES has been withdrawn as a standard by the National Institute of Standards and Technology (formerly the National Bureau of Standards).
Some documentation makes a distinction between DES as a standard and DES as an algorithm, referring to the algorithm as the DEA (Data Encryption Algorithm).
[http://en.wikipedia.org/wiki/Data_Encryption_Standard]

prlCrypto.KERBEROS

name::
* McsEngl.prlCrypto.KERBEROS@cptIt,

Kerberos /'k??rb?r?s/ is a computer network authentication protocol which works on the basis of "tickets" to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos builds on symmetric key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication. [1] Kerberos uses port 88 by default.
[http://en.wikipedia.org/wiki/Kerberos_(protocol)]

_DESCRIPTION:
Cryptographic protocols are widely used for secure application-level data transport. A cryptographic protocol usually incorporates at least some of these aspects:
Key agreement or establishment
Entity authentication
Symmetric encryption and message authentication material construction
Secured application-level data transport
Non-repudiation methods
For example, Transport Layer Security (TLS) is a cryptographic protocol that is used to secure web (HTTP) connections. It has an entity authentication mechanism, based on the X.509 system; a key setup phase, where a symmetric encryption key is formed by employing public-key cryptography; and an application-level data transport function. These three aspects have important interconnections. Standard TLS does not have non-repudiation support.
There are other types of cryptographic protocols as well, and even the term itself has various readings; Cryptographic application protocols often use one or more underlying key agreement methods, which are also sometimes themselves referred to as "cryptographic protocols". For instance, TLS employs what is known as the Diffie-Hellman key exchange, which although it is only a part of TLS per se, Diffie-Hellman may be seen as a complete cryptographic protocol in itself for other applications.
Cryptographic protocols can sometimes be verified formally on an abstract level. When it is done, there is a necessity to formalize the environment in which the protocol operate in order to identify treats. This is frequently done through the Dolev-Yao model
[http://en.wikipedia.org/wiki/Cryptographic_protocol]
===
A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods.

A protocol describes how the algorithms should be used. A sufficiently detailed protocol includes details about data structures and representations, at which point it can be used to implement multiple, interoperable versions of a program.

Cryptographic protocols are widely used for secure application-level data transport. A cryptographic protocol usually incorporates at least some of these aspects:

* Key agreement or establishment
* Entity authentication
* Symmetric encryption and message authentication material construction
* Secured application-level data transport
* Non-repudiation methods

For example, Transport Layer Security (TLS) is a cryptographic protocol that is used to secure web (HTTP) connections. It has an entity authentication mechanism, based on the X.509 system; a key setup phase, where a symmetric encryption key is formed by employing public-key cryptography; and an application-level data transport function. These three aspects have important interconnections. Standard TLS does not have non-repudiation support.

There are other types of cryptographic protocols as well, and even the term itself has various different readings; Cryptographic application protocols often use one or more underlying key agreement methods, which are also sometimes themselves referred to as "cryptographic protocols". For instance, TLS employs what is known as the Diffie-Hellman key exchange, which although it is only a part of TLS per se, Diffie-Hellman may be seen as a complete cryptographic protocol in itself for other applications.

Cryptographic protocols can sometimes be verified formally on an abstract level.

[edit] Advanced cryptographic protocols

A wide variety of cryptographic protocols go beyond the traditional goals of data confidentiality, integrity, and authentication to also secure a variety of other desired characteristics of computer-mediated collaboration. Blind signatures can be used for digital cash and digital credentials to prove that a person holds an attribute or right without revealing that person's identity or the identities of parties that person transacted with. Secure digital time-stamping can be used to prove that data (even if confidential) existed at a certain time. Secure multiparty computation can be used to compute answers (such as determining the highest bid in an auction) based on confidential data (such as private bids), so that when the protocol is complete the participants know only their own input and the answer. Undeniable signatures include interactive protocols that allow the signer to prove a forgery and limit who can verify the signature. Deniable encryption augments standard encryption by making it impossible for an attacker to mathematically prove the existence of a plaintext message. Digital mixes create hard-to-trace communications.
[http://en.wikipedia.org/wiki/Cryptographic_protocol]

prlCrypto.SSH#cptIt587#

name::
* McsEngl.prlCrypto.SSH@cptIt,

crypto'TrueCrypt

name::
* McsEngl.crypto'TrueCrypt@cptIt,
* McsEngl.TrueCrypt@cptIt,

_DESCRIPTION:
TrueCrypt is a discontinued[a] source-available[b] freeware utility used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file or encrypt a partition or (under Microsoft Windows except Windows 8 with GPT) the entire storage device (pre-boot authentication). On 28 May 2014, the TrueCrypt website announced that the project was no longer maintained and recommended users to find alternate solutions.
An actively maintained BSD-licensed free software reimplementation named tc-play is available for Linux and DragonFly BSD.[2][6]
[http://en.wikipedia.org/wiki/TrueCrypt]

crypto'DOING

name::
* McsEngl.crypto'DOING@cptIt,

_DESCRIPTION:
Hashes play a role in security systems where they're used to ensure that transmitted messages have not been tampered with. The sender generates a hash of the message, encrypts it, and sends it with the message itself. The recipient then decrypts both the message and the hash, produces another hash from the received message, and compares the two hashes. If they're the same, there is a very high probability that the message was transmitted intact.
[http://www.webopedia.com/TERM/H/hashing.html]

crypto'doing.IDENTITY-PROVING

name::
* McsEngl.crypto'doing.IDENTITY-PROVING@cptIt,
* McsEngl.crypto'authentication@cptIt,
* McsEngl.crypto'identity@cptIt,

_DESCRIPTION:
PKI relies on trust authorities (a Certificate Authority - CA - in the case of identity or a Time Stamp Authority - TSA - in the case of time)
[https://guardtime.com/technology/ksi-technology]
===
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or documents.
[https://en.wikipedia.org/wiki/Digital_signature]

cer·tif·i·cate (πιστοποιητικό)
An official document attesting a certain fact, in particular.

Documents-proving-identity-of-humans (identity|identification-document):
- gov ID
- passport,

Citizenship-identification:

Residency-identification:

crypto'doing.INTEGRITY-PROVING

name::
* McsEngl.crypto'doing.INTEGRITY-PROVING@cptIt,
* McsEngl.crypto'integrity@cptIt,

_DESCRIPTION:
that the message was not altered in transit (integrity).

crypto'doing.PROVENANCE-PROVING

name::
* McsEngl.crypto'doing.PROVENANCE-PROVING@cptIt,

_DESCRIPTION:
The place of origin or earliest known history of something.

Provenance-certification:

crypto'doing.TIME-PROVING

name::
* McsEngl.crypto'doing.TIME-PROVING@cptIt,

_DESCRIPTION:
PKI relies on trust authorities (a Certificate Authority - CA - in the case of identity or a Time Stamp Authority - TSA - in the case of time)
[https://guardtime.com/technology/ksi-technology]

crypto'doing.DECRYPTING

name::
* McsEngl.crypto'doing.DECRYPTING@cptIt,
* McsEngl.crypto'decoding@cptIt,
* McsEngl.crypto'decryption@cptIt,
* McsEngl.decoding.crypt@cptIt,
* McsEngl.decryption@cptIt56i,
====== lagoGreek:
* McsElln.αποκρυπτογράφηση@cptIt,

_DESCRIPTION:
if i encrypt the password you can see the js and check what is the method i have used to do the encryption , and i think you can decrypt it.
[http://stackoverflow.com/questions/12157970/codeigniter-how-can-i-encrypt-password-before-submitting-the-form-to-the-contro]

crypto'doing.ENCRYPTING

name::
* McsEngl.crypto'doing.ENCRYPTING@cptIt,
* McsEngl.crypt'encryption@cptIt,
* McsEngl.encryption@cptIt56i,
* McsElln.κρυπτογράφηση@cptIt,

_DESCRIPTION:
Many people use the terms encryption or cryptography interchangeably. However, they are different. Cryptography is the science of secret communication, while encryption refers to one component of that science.
[http://www.brighthub.com/computing/enterprise-security/articles/65254.aspx]

crypto'GENERIC

_GENERIC:
* entity.economic.satisfier.working.tech.info.security#cptItsoft302#
* mapping-method#cptCore320#

SPECIFIC

* crypto.specific,

_SPECIFIC:
* asymmetric-key--cryptography,
* communication_cryptography##
* file-cryptography##
* https##
* symmetric-key--cryptography,

crypto.SPECIFIC-DIVISION.key

name::
* McsEngl.crypto.SPECIFIC-DIVISION.key@cptIt,

_SPECIFIC:
* asymmetric-key--cryptography,
* symmetric-key--cryptography,

crypto.AES

_CREATED: {2013-08-28}

name::
* McsEngl.crypto.AES@cptIt,
* McsEngl.AES@cptIt,
* McsEngl.advanced-encryption-standard@cptIt,

_DESCRIPTION:
The Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.[4] It is based on the Rijndael cipher[5] developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, who submitted a proposal which was evaluated by the NIST during the AES selection process.[6]

AES has been adopted by the U.S. government and is now used worldwide. It supersedes the Data Encryption Standard (DES),[7] which was published in 1977. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data.

In the United States, AES was announced by the NIST as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001.[4] This announcement followed a five-year standardization process in which fifteen competing designs were presented and evaluated, before the Rijndael cipher was selected as the most suitable (see Advanced Encryption Standard process for more details). It became effective as a federal government standard on May 26, 2002 after approval by the Secretary of Commerce. AES is included in the ISO/IEC 18033-3 standard. AES is available in many different encryption packages, and is the first publicly accessible and open cipher approved by the National Security Agency (NSA) for top secret information when used in an NSA approved cryptographic module (see Security of AES, below).

The name Rijndael (Dutch pronunciation: ['r?inda?l]) is a play on the names of the two inventors (Joan Daemen and Vincent Rijmen). Strictly speaking, the AES standard is a variant of Rijndael where the block size is restricted to 128 bits.
[http://en.wikipedia.org/wiki/Advanced_Encryption_Standard]

crypto.DSA

name::
* McsEngl.crypto.DSA@cptIt,
* McsEngl.DSA@cptIt,

_DESCRIPTION:
Uses the digital-signature-algorithm.

crypto.HMAC

name::
* McsEngl.crypto.HMAC@cptIt,
* McsEngl.HMAC@cptIt,

_DESCRIPTION:
In cryptography, a keyed-hash message authentication code (HMAC) is a specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination with a secret cryptographic key. As with any MAC, it may be used to simultaneously verify both the data integrity and the authentication of a message. Any cryptographic hash function, such as MD5 or SHA-1, may be used in the calculation of an HMAC; the resulting MAC algorithm is termed HMAC-MD5 or HMAC-SHA1 accordingly. The cryptographic strength of the HMAC depends upon the cryptographic strength of the underlying hash function, the size of its hash output, and on the size and quality of the key.

An iterative hash function breaks up a message into blocks of a fixed size and iterates over them with a compression function. For example, MD5 and SHA-1 operate on 512-bit blocks. The size of the output of HMAC is the same as that of the underlying hash function (128 or 160 bits in the case of MD5 or SHA-1, respectively), although it can be truncated if desired.

The definition and analysis of the HMAC construction was first published in 1996 by Mihir Bellare, Ran Canetti, and Hugo Krawczyk,[1] who also wrote RFC 2104. This paper also defined a variant called NMAC that is rarely if ever used. FIPS PUB 198 generalizes and standardizes the use of HMACs. HMAC-SHA1 and HMAC-MD5 are used within the IPsec and TLS protocols.
[http://en.wikipedia.org/wiki/HMAC]

crypto.FILE

name::
* McsEngl.crypto.FILE@cptIt,

crypto.FINANCIAL

_CREATED: {2012-05-28}

name::
* McsEngl.crypto.FINANCIAL@cptIt,
* McsEngl.conceptIt56.1,
* McsEngl.cryptography.financial@cptIt56.1, {2012-05-28}
* McsEngl.financital-cryptography@cptIt56.1, {2012-05-28}

_DESCRIPTION:
Financial cryptography (FC) is the use of cryptography in applications in which financial loss could result from subversion of the message system.
Cryptographers think of the field as originating in the work of Dr David Chaum who invented the blinded signature. This special form of a cryptographic signature permitted a virtual coin to be signed without the signer seeing the actual coin, and permitted a form of digital token money that offered untraceability. This form is sometimes known as Digital Cash.
A widely-used and previously-developed cryptographic mechanism is the Data Encryption Standard, which was used primarily for the protection of electronic funds transfers. However, it was the work of David Chaum that excited the cryptography community about the potential of encrypted messages as actual financial instruments.
Financial cryptography includes the mechanisms and algorithms necessary for the protection of financial transfers, in addition to the creation of new forms of money. Proof of work and various auction protocols fall under the umbrella of Financial Cryptography. Hashcash is being used to limit spam.
Financial cryptography is distinguished from traditional cryptography in that for most of recorded history, cryptography has been used almost entirely for military and diplomatic purposes.
As part of a business model, FC followed the guide of cryptography and only the simplest ideas were adopted. Account money systems protected by SSL such as PayPal and e-gold were relatively successful, but more innovative mechanisms, including blinded token money, were not.
Financial cryptography is frequently seen to have a very broad scope of application. Ian Grigg sees financial cryptography in seven layers [1], being the combination of seven distinct disciplines: cryptography, software engineering, rights, accounting, governance, value, and financial applications. Business failures can often be traced to the absence of one or more of these disciplines, or to poor application of them. This views FC as an appropriately crossdiscipline subject. Indeed, inevitably so, given that finance and cryptography are each built upon multiple disciplines.
Financial cryptography is to some extent organized around the annual meeting of the International Financial Cryptography Association Financial Cryptography, which is held each year in a different location.
[http://en.wikipedia.org/wiki/Financial_cryptography]

crypto.FORTUNA

name::
* McsEngl.crypto.FORTUNA@cptIt,

_DESCRIPTION:
Fortuna is a cryptographically secure pseudorandom number generator (PRNG) devised by Bruce Schneier and Niels Ferguson. It is named after Fortuna, the Roman goddess of chance.
[http://en.wikipedia.org/wiki/Fortuna_(PRNG)]

crypto.FTPS

name::
* McsEngl.crypto.FTPS@cptIt,
* McsEngl.FTPS@cptIt,
* McsEngl.FTP-over-SSL@cptIt,

_DESCRIPTION:
FTPS (also known as FTP-ES, FTP-SSL and FTP Secure) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.
FTPS should not be confused with the SSH File Transfer Protocol (SFTP), an incompatible secure file transfer subsystem for the Secure Shell (SSH) protocol. It is also different from Secure FTP, the practice of tunneling FTP through an SSH connection.
[http://en.wikipedia.org/wiki/FTPS]
===
SFTP is not to be confused with FTPS. SFTP is SSH File Transfer Protocol, while FTPS is FTP over SSL.1
[http://stackoverflow.com/questions/717854/sftp-from-within-php?rq=1]

ftps'evaluation

name::
* McsEngl.ftps'evaluation@cptIt,

FTPS
Pros:

Widely known and used
The communication can be read and understood by the human
Provides services for server-to-server file transfer
SSL/TLS has good authentication mechanisms (X.509 certificate features)
FTP and SSL/TLS support is built into many internet communication frameworks.
Cons:

Doesn’t have a uniform directory listing format
Requires a secondary DATA channel, which makes it hard to use behind the firewalls
Doesn’t define a standard for file name character sets (encodings)
Not all FTP servers support SSL/TLS
Doesn’t have a standard way to get and change file and directory attributes
[https://www.eldos.com/security/articles/4672.php]

crypto.KEY.ASSYMETRIC (public-key) {1976}

name::
* McsEngl.crypto.KEY.ASSYMETRIC (public-key) {1976}@cptIt,
* McsEngl.asymmetric-key-cryptography@cptIt,
* McsEngl.crypto.asymmetric@cptIt,
* McsEngl.crypto.public-key@cptIt,
* McsEngl.cryptography.asymmetric@cptIt,
* McsEngl.public-key-cryptography@cptIt,
====== lagoGreek:
* McsElln.κρυπτογραφία-δημοσίου-κλειδιού@cptIt,

_ADDRESS.WPG:
* http://www.youtube.com/watch?v=3QnD2c4Xovk,

_DESCRIPTION:
Public key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
This accomplishes two functions:
- authentication, which is when the public key is used to verify that a holder of the paired private key sent the message, and
- encryption, whereby only the holder of the paired private key can decrypt the message encrypted with the public key.
[https://en.wikipedia.org/wiki/Public-key_cryptography]
===
Public-private key cryptography is a class of encryption methods that require the creation of two separate keys; the “private key” known only to the owner, and the “public key” which is known to anyone.
It has several useful attributes, the first is the ability of anyone to encrypt data with a public key that can only be decrypted by the private key.
The second is the ability of the private key holder to sign a piece of information using their private key in such a way that it can be verified by anyone holding the public key, without giving any information away about the private key.
This second attribute is used for the accounts system in a-DCN#ql:decentralized_consensus_network_cpt#, and forms the basis of sending transactions.
[https://dappsforbeginners.wordpress.com/tutorials/introduction-to-development-on-ethereum/]
===
All cryptocurrencies are based on some form of public key encryption. What does this mean?
It means that messages can be encrypted with one key (the private key) and decrypted with
the public key
[http://mc2-umd.github.io/ethereumlab/docs/serpent_tutorial.pdf]
===
Η ασύμμετρη κρυπτογραφία (ή κρυπτογραφία δημοσίου κλειδιού- public key cryptography) χρησιμοποιεί δύο διαφορετικά κλειδιά για την κρυπτογράφηση και την αποκρυπτογράφηση. Κάθε χρήστης έχει στη διάθεσή του δύο κλειδιά. Το δημόσιο κλειδί είναι αυτό που ο χρήστης μπορεί να το γνωστοποιήσει σε τρίτους ενώ το ιδιωτικό είναι εκείνο που το φυλάσσει με ασφάλεια και μόνο αυτός θα πρέπει να το γνωρίζει και κατέχει. Για να επιτευχθεί η εμπιστευτικότητα, ο αποστολέας κρυπτογραφεί το μήνυμα με το δημόσιο κλειδί του παραλήπτη. Έτσι, το μήνυμα μπορεί να αποκρυπτογραφηθεί μονάχα από τον παραλήπτη (που είναι ο κάτοχος του αντίστοιχου ιδιωτικού κλειδιού εκτός και αν η μυστικότητα του ιδιωτικού κλειδιού έχει παραβιαστεί).
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]
===
Σε συστήματα τέτοιου είδους οι χρήστες έχουν δύο κρυπτογραφικά «κλειδιά», ένα δημόσιο και ένα προσωπικό. Μοιράζονται το δημόσιο με όποιον θέλει να τους στείλει αρχεία με ασφάλεια. Ο,τιδήποτε έχει κρυπτογραφηθεί με το public key μπορεί να αποκρυπτογραφηθεί μόνο με το private key.
[http://www.naftemporiki.gr/story/829386/minilock-aplopoiontas-tin-kruptografisi]
===
In a groundbreaking 1976 paper, Whitfield Diffie and Martin Hellman proposed the notion of public-key (also, more generally, called asymmetric key) cryptography in which two different but mathematically related keys are used—a public key and a private key.[26] A public key system is so constructed that calculation of one key (the 'private key') is computationally infeasible from the other (the 'public key'), even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair.[27] The historian David Kahn described public-key cryptography as "the most revolutionary new concept in the field since polyalphabetic substitution emerged in the Renaissance".[28]
[http://en.wikipedia.org/wiki/Cryptography#Public-key_cryptography]
===
With public key cryptography, two keys are created, one public, one private. Anything encrypted with either key can only be decrypted with its corresponding key. Thus if a message or data stream were encrypted with the server's private key, it can be decrypted only using its corresponding public key, ensuring that the data only could have come from the server.
[http://www.akadia.com/services/ssh_test_certificate.html]

SPECIFIC:
The Diffie–Hellman and RSA algorithms, in addition to being the first publicly known examples of high quality public-key algorithms, have been among the most widely used. Others include the Cramer–Shoup cryptosystem, ElGamal encryption, and various elliptic curve techniques. See Category:Asymmetric-key cryptosystems.
[http://en.wikipedia.org/wiki/Cryptography#Public-key_cryptography]

crypto'PGP

name::
* McsEngl.crypto'PGP@cptIt,
* McsEngl.PGP@cptIt,
* McsEngl.PrettyGoodPrivacy@cptIt,
* McsEngl.program.PGP@cptIt,

_ADDRESS.WPG:
* http://www.pgpi.org//

_DESCRIPTION:
Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, e-mails, files, directories and whole disk partitions to increase the security of e-mail communications. It was created by Phil Zimmermann in 1991.

PGP and similar software follow the OpenPGP standard (RFC 4880) for encrypting and decrypting data.
Original author(s)  Phil Zimmermann
Developer(s)  Phil Zimmermann
Initial release  1991
Written in  Multi-language
Operating system  Cross-platform
Website  http://www.openpgp.org
[http://en.wikipedia.org/wiki/Pretty_Good_Privacy]

crypto'Private-key

name::
* McsEngl.crypto'Private-key@cptIt,
* McsEngl.private-key@cptIt56i,

_DESCRIPTION:
In public-key cryptosystems, the public key may be freely distributed, while its paired private key must remain secret. The public key is typically used for encryption, while the private or secret key is used for decryption. Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie–Hellman key exchange protocol.[18]
[http://en.wikipedia.org/wiki/Cryptography#Public-key_cryptography]
===
With public key cryptography, two keys are created, one public, one private. Anything encrypted with either key can only be decrypted with its corresponding key. Thus if a message or data stream were encrypted with the server's private key, it can be decrypted only using its corresponding public key, ensuring that the data only could have come from the server.
[http://www.akadia.com/services/ssh_test_certificate.html]

crypto'Public-key

name::
* McsEngl.crypto'Public-key@cptIt,
* McsEngl.public-key@cptIt56i,

_DESCRIPTION:
In public-key cryptosystems, the public key may be freely distributed, while its paired private key must remain secret. The public key is typically used for encryption, while the private or secret key is used for decryption. Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie–Hellman key exchange protocol.[18]
[http://en.wikipedia.org/wiki/Cryptography#Public-key_cryptography]
===
With public key cryptography, two keys are created, one public, one private. Anything encrypted with either key can only be decrypted with its corresponding key. Thus if a message or data stream were encrypted with the server's private key, it can be decrypted only using its corresponding public key, ensuring that the data only could have come from the server.
[http://www.akadia.com/services/ssh_test_certificate.html]

crypto'Public-Key-Infrastracture (PKI)

name::
* McsEngl.crypto'Public-Key-Infrastracture (PKI)@cptIt,
* McsEngl.PKI@cptIt,
* McsEngl.public-key-infrastructure@cptIt,

_DESCRIPTION:
A public-key infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.[1]
In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA).
The user identity must be unique within each CA domain.
The third-party validation authority (VA) can provide this information on behalf of CA.
The binding is established through the registration and issuance process, which, depending on the level of assurance the binding has, may be carried out by software at a CA, or under human supervision.
The PKI role that assures this binding is called the registration authority (RA).
The RA ensures that the public key is bound to the individual to which it is assigned in a way that ensures non-repudiation.[citation needed]
[http://en.wikipedia.org/wiki/Public_key_infrastructure]
===
For the last 40 years PKI has been the only tool in the cryptographic toolshed for authenticating data via RSA based digital signatures. PKI relies on trust authorities (a Certificate Authority - CA - in the case of identity or a Time Stamp Authority - TSA - in the case of time)

PKI was invented prior to the Internet and was designed so that two parties can share a secret across an insecure channel – and for that purpose and that purpose alone it has been a massive success.

For everything else, and especially for authentication of data-at-rest, the complexities and cost of key management make it impossible to scale.
[https://guardtime.com/ksi-technology]

crypto'PuTTY

name::
* McsEngl.crypto'PuTTY@cptIt,
* McsEngl.program.putty@cptIt,
* McsEngl.putty@cptIt,
* McsEngl.putty.program@cptIt,
* McsEngl.SSH-client.PuTTY@cptIt,

_DESCRIPTION:
PuTTY is a Secure Shell (SSH) client, which gives us access to the command line of our web server.
[https://blog.florence.chat/tutorial-host-your-own-ipfs-node-and-help-the-next-generation-of-web-2860eb59e45e]

_ADDRESS.WPG:
* http://www.chiark.greenend.org.uk/~sgtatham/putty//
* http://en.wikipedia.org/wiki/PuTTY,

_ADDRESS.LOCAL:
* \pgmNET\putty,

putty'version

name::
* McsEngl.putty'version@cptIt,

{time.2013-08-06 PuTTY 0.63 released, fixing SECURITY HOLES
PuTTY 0.63, released today, fixes four security holes in 0.62 and before: vuln-modmul, vuln-signature-stringlen, vuln-bignum-division-by-zero, private-key-not-wiped. Other than that, there are mostly bug fixes from 0.62 and a few small features.
[http://www.chiark.greenend.org.uk/~sgtatham/putty/]

crypt'pagent

name::
* McsEngl.crypt'pagent@cptIt,
* McsEngl.pagent.program@cptIt,

crypt'puttygen

name::
* McsEngl.crypt'puttygen@cptIt,
* McsEngl.puttygen.program@cptIt,

crypto.ELLIPTIC-CURVE-CRYPTOGRAPHY

_CREATED: {2013-09-03}

name::
* McsEngl.crypto.ELLIPTIC-CURVE-CRYPTOGRAPHY@cptIt,
* McsEngl.ECC@cptIt,
* McsEngl.elliptic-curve-cryptography@cptIt,

_DESCRIPTION:
Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. One of the main benefits in comparison with non-ECC cryptography (with plain Galois fields as a basis) is the same level of security provided by keys of smaller size.
Elliptic curves are applicable for encryption, digital signatures, pseudo-random generators and other tasks. They are also used in several integer factorization algorithms that have applications in cryptography, such as Lenstra elliptic curve factorization.
[https://en.wikipedia.org/wiki/Elliptic_curve_cryptography] 2015-09-03,
===
Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was suggested independently by Neal Koblitz[1] and Victor S. Miller[2] in 1985.

Elliptic curves are also used in several integer factorization algorithms that have applications in cryptography, such as Lenstra elliptic curve factorization.
[http://en.wikipedia.org/wiki/Elliptic_curve_cryptography]

Elliptic Curve Digital Signature Algorithm

name::
* McsEngl.crypto'ECDSA@cptIt,
* McsEngl.ECDSA@cptIt,

_DESCRIPTION:
In cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic curve cryptography.
[https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm]

crypto.RSA {1978}

name::
* McsEngl.crypto.RSA {1978}@cptIt,
* McsEngl.RSA@cptIt56i,
* McsEngl.RSA-cryptosystem@cptIt,
* McsEngl.RSA-system@cptIt,

_DESCRIPTION:
the RSA signature algorithm which is fundamentally broken upon the realization of practical quantum computers.
[https://guardtime.com/technology/blt-technology]
===
In 1978, Ronald Rivest, Adi Shamir, and Len Adleman invented RSA, another public-key system.[29]
[http://en.wikipedia.org/wiki/Cryptography#Public-key_cryptography]
===
RSA cryptosystem.
ΑΝ ΠΟΤΕ ΚΑΝΕΙΣ ΣΠΑΣΕΙ ΤΟΝ ΚΩΔΙΚΟ, ΕΧΕΙ ΛΥΣΕΙ ΕΝΑ ΑΛΥΤΟ ΜΑΘΗΜΑΤΙΚΟ ΠΡΟΒΛΗΜΑ.

crypto.KEY.SYMMETRIC

name::
* McsEngl.crypto.KEY.SYMMETRIC@cptIt,
* McsEngl.cryptography.symmetric-key@cptIt56i,
* McsEngl.crypt.symmetric-key@cptIt56i,
* McsEngl.symmetric-key-cryptography@cptIt56i,

_DESCRIPTION:
symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data.
[http://en.wikipedia.org/wiki/Advanced_Encryption_Standard]
===
Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different, but related in an easily computable way). This was the only kind of encryption publicly known until June 1976.[18]
[http://en.wikipedia.org/wiki/Cryptography#Symmetric-key_cryptography]

crypto.KEY.NO

name::
* McsEngl.crypto.KEY.NO@cptIt,

Keyless-Signature-Infrastructure (KSI)

name::
* McsEngl.KSI@cptIt,
* McsEngl.Keyless-Signature-Infrastructure@cptIt,

_DESCRIPTION:
Keyless Signature Infrastructure (KSI) is designed to provide scalable digital signature based authentication for electronic data, machines and humans.

Unlike traditional approaches that depend on asymmetric key cryptography, KSI uses only hash-function cryptography, allowing verification to rely only on the security of hash-functions and the availability of a public ledger commonly referred to as a blockchain.
[https://guardtime.com/technology/ksi-technology]

KSI-blockchain

crypto.QUANTUM

name::
* McsEngl.crypto.QUANTUM@cptIt,
* McsEngl.crypto.quantum@cptIt,
* McsEngl.quantum-cryptography@cptIt,

_DESCRIPTION:
Quantum cryptography describes the use of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems.

Well-known examples of quantum cryptography are the use of quantum communication to securely exchange a key (quantum key distribution) and the hypothetical use of quantum computers that would allow the breaking of various popular public-key encryption and signature schemes (e.g., RSA and ElGamal).

The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical (i.e. non-quantum) communication (see below for examples). For example, quantum mechanics guarantees that measuring quantum data disturbs that data; this can be used to detect eavesdropping in quantum key distribution.
[http://en.wikipedia.org/wiki/Quantum_cryptography]

BLT

name::
* McsEngl.BLT-algorithm@cptIt,

_DESCRIPTION:
BLT: Blockchain Standard for Digital Identity
Quantum-Immune Alternative to RSA

BLT is a new cryptographic algorithm invented by Guardtime cryptographers Ahto Buldas, Risto Laanoja and Ahto Truu in 2014. It is a replacement for the RSA signature algorithm which is fundamentally broken upon the realization of practical quantum computers.

The RSA signature algorithm has been the underpinning of Internet security for the last 40 years but with the advent of quantum computing it is rapidly approaching the end of its shelf life.

As the sophistication of nation-state cyber-attacks continues to increase on a daily basis, there is an urgent need to find alternatives to RSA to protect strategic national assets and critical infrastructure.

BLT represents game-changing innovation for cyber-security and will ensure that critical infrastructure can remain protected even in an age of quantum computers.
[https://guardtime.com/technology/blt-technology]

Los Alamos National Laboratory

Ισχυρή κρυπτογράφηση για όλους
Παρασκευή, 05 Σεπτεμβρίου 2014 15:04
Για τη «μεγαλύτερη συμφωνία τεχνολογίας πληροφοριών» που έχει υπογραφεί ποτέ από το Los Alamos National Laboratory, η οποία φέρνει στην αγορά τη δυνατότητα πραγματικά ασφαλούς κρυπτογράφησης δεδομένων μετά από σχεδόν 20 χρόνια ανάπτυξης, κάνει λόγο ανακοίνωση του εργαστηρίου.
«Τα κβαντικά συστήματα αποτελούν την καλύτερη ελπίδα για πραγματικά ασφαλή κρυπτογράφηση δεδομένων, επειδή αποθηκεύουν ή μεταδίδουν πληροφορίες με τρόπους που είναι ?άθραυστοι? σε σχέση με συμβατικές κρυπτογραφικές μεθόδους» αναφέρει σχετικά ο Ντάνκαν ΜακΜπράντς, Chief Technology Officer του Los Alamos National Laboratory. «Αυτή η συμφωνία licencing με τη Whitewood Encryption Systems, Inc. είναι ιστορική από την άποψη ότι παίρνει τη ριζοσπαστική τεχνική δουλειά μας που αναπτύχθηκε μέσα σε πάνω από δύο δεκαετίες και την φέρνει σε εμπορικές εφαρμογές κρυπτογράφησης».
Αξιοποιώντας τις κβαντικές ιδιότητες του φωτός για την παραγωγή τυχαίων αριθμών και δημιουργώντας κρυπτογραφικά «κλειδιά» με αστραπιαία ταχύτητα, η εν λόγω τεχνολογία δίνει τη δυνατότητα για μία νέα εμπορικά διαθέσιμη πλατφόρμα για κρυπτογράφηση σε πραγματικό χρόνο σε υψηλά data rates. «Για πρώτη φορά, απλοί πολίτες και εταιρείες θα είναι σε θέση να χρησιμοποιήσουν κρυπτογραφικά συστήματα που μέχρι τώρα ήταν μόνο αντικείμενα πειραμάτων στα πιο προηγμένα εργαστήρια φυσικής και υπολογιστών, για εφαρμογές στον πραγματικό κόσμο» αναφέρεται σχετικά στην ανακοίνωση.
Εάν εφαρμοστεί σε ευρεία κλίμακα, η τεχνολογία διανομής κβαντικών κλειδιών (quantum key distribution) θα μπορούσε να ανοίξει τον δρόμο για πραγματικά ασφαλές ηλεκτρονικό εμπόριο, e-banking, επικοινωνίες και μεταφορές δεδομένων.
Η τεχνολογία την οποία αφορά η συγκεκριμένη συμφωνία είναι στην ουσία μία «συμπαγής» τεχνολογία δημιουργίας τυχαίων αριθμών, που δημιουργεί κρυπτογραφικά κλειδιά βασιζόμενη στην πραγματικά τυχαία κατάσταση πόλωσης των φωτονίων. Επειδή ο τυχαίος χαρακτήρας της πόλωσης των φωτονίων βασίζεται σε κβαντική μηχανική, ο «αντίπαλος» δεν είναι σε θέση να προβλέψει τα αποτελέσματα- κάτι που αποτελεί σημαντική βελτίωση σε σχέση με σημερινές γεννήτριες τυχαίων αριθμών, οι οποίες βασίζονται σε μαθηματικούς τύπους που μπορούν να «σπάσουν» από επαρκώς ισχυρούς υπολογιστές. Επιπλέον, κάθε προσπάθεια «τρίτων» να παρακολουθήσουν επικοινωνίες μεταξύ κατόχων κβαντικών κλειδιών προκαλεί αναταράξεις στο ίδιο το κβαντικό σύστημα, οπότε και η επικοινωνία μπορεί να ματαιωθεί και ο «εισβολέας» να εντοπιστεί πριν υποκλαπούν δεδομένα.
Η τεχνολογία του Los Alamos National Laboratory είναι επαρκώς απλή και «συμπαγής» έτσι ώστε να «αποδοθεί» ως μονάδα αντίστοιχη ενός μικρού USB drive ή ενός data-card reader. Μονάδες τέτοιου είδους θα μπορούσαν να κατασκευαστούν με πολύ χαμηλό κόστος, καθιστώντας τες εύκολα προσβάσιμες στο ευρύ καταναλωτικό κοινό.
[http://www.naftemporiki.gr/story/852448/isxuri-kruptografisi-gia-olous]

resource

_ADDRESS.WPG:
* {2018-12-26} https://medium.com/mit-technology-review/the-man-turning-china-into-a-quantum-superpower-6cb6c0739d2f,

crypto.SFTP

name::
* McsEngl.crypto.SFTP@cptIt,
* McsEngl.SFTP@cptIt,

_DESCRIPTION:
“SFTP” abbreviation is often mistakenly used to specify some kind of Secure FTP, by which people most often mean FTPS. Another (similar) mistake is that SFTP is thought to be some kind of FTP over SSL. In fact SFTP is an abbreviation of “SSH File Transfer Protocol”. This is not FTP over SSL and not FTP over SSH (which is also technically possible, but very rare).
SFTP is a binary protocol, the latest version of which is standardized in RFC 4253. All commands (requests) are packed to binary messages and sent to the server, which replies with binary reply packets. In later versions SFTP has been extended to provide not just file upload/download operations, but also some file-system operations, such as file lock, symbolic link creation etc.

Both FTPS and SFTP use a combination of asymmetric algorithm (RSA, DSA), symmetric algorithm (DES/3DES, AES, Twhofish etc.) and a key-exchange algorithm. For authentication FTPS (or, to be more precise, SSL/TLS protocol under FTP) uses X.509 certificates, while SFTP (SSH protocol) uses SSH keys.
[https://www.eldos.com/security/articles/4672.php]

sftp'evaluation

name::
* McsEngl.sftp'evaluation@cptIt,

SFTP
Pros:

Has good standards background which strictly defines most (if not all) aspects of operations
Has only one connection (no need for DATA connection)
The connection is always secured
The directory listing is uniform and machine-readable
The protocol includes operations for permission and attribute manipulation, file locking and more functionality
Cons:

The communication is binary and can’t be logged “as is” for human reading
SSH keys are harder to manage and validate
The standards define certain things as optional or recommended, which leads to certain compatibility problems between different software titles from different vendors.
No server-to-server copy and recursive directory removal operations
No built-in SSH/SFTP support in VCL and .NET frameworks

What to choose
As usually, the answer depends on what your goals and requirements are. In general, SFTP is technologically superior to FTPS. Of course, it’s a good idea to implement support for both protocols, but they are different in concepts, in supported commands and in many other things.

It’s a good idea to use FTPS when you have a server that needs to be accessed from personal devices (smartphones, PDAs etc.) or from some specific operating systems which have FTP support but don’t have SSH / SFTP clients. If you are building a custom security solution, SFTP is probably the better option.

As for the client side, the requirements are defined by the server(s) that you plan to connect to. When connecting to Internet servers, SFTP is more popular because it’s supported by Linux and UNIX servers by default.

For private host-to-host transfer you can use both SFTP and FTPS. For FTPS you would need to search for a free FTPS client and server software or purchase a license for commercial one. For SFTP support you can install OpenSSH package, which provides free client and server software. For commercial use we recommend Bitvise SSH server.
[https://www.eldos.com/security/articles/4672.php]

sftp'program

name::
* McsEngl.sftp'program@cptIt,

_ADDRESS.WPG:
* http://www.thegeekstuff.com/2011/06/windows-sftp-scp-clients//

sftp.program.CLIENT

name::
* McsEngl.sftp.program.CLIENT@cptIt,
* McsEngl.sftp-client@cptIt,

_ADDRESS.WPG:
* http://www.thegeekstuff.com/2011/06/windows-sftp-scp-clients//

_SPECIFIC:
* filezilla##
* Swish##

Swish

name::
* McsEngl.swish@cptIt,

_DESCRIPTION:
Easy SFTP for Windows
Swish adds support for SFTP to Windows Explorer so you can access your files on another computer securely via SSH.

Swish is easy to use because it integrates seamlessly with Windows Explorer so working with remote files feels just like working with the ones on your local computer.

We believe Swish is a better option for typical Windows users than other SFTP clients because it is so easy to use. Download it now and decide for yourself.
[http://www.swish-sftp.org/wiki]

sftp.program.FILEZILLA

name::
* McsEngl.sftp.program.FILEZILLA@cptIt,
* McsEngl.filezilla@cptIt,

_ADDRESS.WPG:
* https://filezilla-project.org//

_DESCRIPTION:
Welcome to the homepage of FileZilla, the free FTP solution. Both a client and a server are available. FileZilla is open source software distributed free of charge under the terms of the GNU General Public License
[https://filezilla-project.org/]

sftp.program.SERVER

name::
* McsEngl.sftp.program.SERVER@cptIt,
* McsEngl.sftp-server@cptIt,

sftp.PHP

name::
* McsEngl.sftp.PHP@cptIt,
* McsEngl.php'sftp@cptIt,

_ADDRESS.WPG:
* http://php.net/manual/en/function.ssh2-sftp.php,
* http://www.sitepoint.com/using-ssh-and-sftp-with-php//

crypto.SHA

name::
* McsEngl.crypto.SHA@cptIt,
* McsEngl.crypt.secure-hash-algorithm@cptIt56i,
* McsEngl.SHA-crypt@cptIt56i,

crypto.SSH

name::
* McsEngl.crypto.SSH@cptIt,
* McsEngl.conceptIt587,
* McsEngl.secure-shell@cptIt587,
* McsEngl.SSH@cptIt587,

_DESCRIPTION:
SSH is a cryptographically protected remote login protocol that replaces insecure telnet and rlogin protocols. It provides strong protection against password sniffing and third party session monitoring, better protecting your authentication credentials and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive protection against spoofing.
[http://winscp.net/eng/docs/doku.php]
===
Secure Shell (SSH) is a network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that it connects via a secure channel over an insecure network: a server and a client (running SSH server and SSH client programs, respectively).[1] The protocol specification distinguishes two major versions that are referred to as SSH-1 and SSH-2.
[http://en.wikipedia.org/wiki/Secure_Shell]

_GENERIC:
* network-protocol#ql:cmnprl@cptIt#

ssh'Conversion

name::
* McsEngl.ssh'Conversion@cptIt,

Convert SSH keys from OpenSSH to SSH2 and back
If you need to access machines running a different SSH implementation, say OpenSSH to SSH2, you can convert your key to enable passphrase-less logins. The following commands allow you to convert keys from from OpenSSH to SSH2 as well as from SSH2 to OpenSSH.

Convert OpenSSH to SSH2

ssh-keygen -e -f id_rsa.pub > id_rsa_ssh2.pub

Convert SSH2 to OpenSSH

ssh-keygen -i -f id_rsa_1024_a.pub > id_rsa_1024_a_openssh.pub
[http://tsengf.blogspot.com/2011/07/convert-ssh-keys-from-openssh-to-ssh2.html]

ssh'openSSH

name::
* McsEngl.ssh'openSSH@cptIt,
* McsEngl.openSSH@cptIt587i,

Resource:
* http://support.suso.com/supki/SSH_Tutorial_for_Windows,
* http://linux-sxs.org/networking/openssh.putty.html,
* http://winscp.net/eng/docs/ui_puttygen,
* http://the.earth.li/~sgtatham/putty/0.63/htmldoc//

ssh'Tool

name::
* McsEngl.ssh'Tool@cptIt,
* McsEngl.ssh'program@cptIt,

_ADDRESS.WPG:
* http://www.jasoncannon.me/20-windows-ssh-clients-you-can-use-to-connect-to-your-linux-server.html,

_SPECIFIC:
putty.exe - GUI ssh client for Windows useful for testing purposes
plink.exe - text ssh client for Windows, used to tunnel the ssh connection to the server
puttygen.exe - key generator for putty, used to convert your ssh private key into a key putty can use
pageant.exe optional - putty authentication agent, provides passwords for ssh key authentication
[http://wiki.apisnetworks.com/index.php/Subversion]

ssh'valnerability

name::
* McsEngl.ssh'valnerability@cptIt,

In November 2008, a theoretical vulnerability was discovered for all versions of SSH which allowed recovery of up to 32 bits of plaintext from a block of ciphertext that was encrypted using what was then the standard default encryption mode, CBC.[19] The most straightforward solution is to use CTR mode instead of CBC mode, since this renders SSH resistant to the attack.[19]
[http://en.wikipedia.org/wiki/Secure_Shell#Version_2.x]

ssh.SSH1

name::
* McsEngl.ssh.SSH1@cptIt,
* McsEngl.SCP@cptIt,
* McsEngl.SSH1@cptIt,

_DESCRIPTION:
In UNIX systems another security standard has grown. It was SSH family of protocols. The primary function of SSH was to secure remote shell access to UNIX systems. Later SSH was extended with file transfer protocol – first SCP (in SSH 1.x), then SFTP (in SSH2). Version 1 of the SSH protocol is outdated, insecure and generally not recommended for use. Consequently SCP is not used anymore and SFTP gains popularity day by day.
[https://www.eldos.com/security/articles/4672.php]

ssh.SSH2 {2006}

name::
* McsEngl.ssh.SSH2 {2006}@cptIt,
* McsEngl.SSH2@cptIt,

_DESCRIPTION:
"Secsh" was the official Internet Engineering Task Force's (IETF) name for the IETF working group responsible for version 2 of the SSH protocol.[15] In 2006, a revised version of the protocol, SSH-2, was adopted as a standard. This version is incompatible with SSH-1. SSH-2 features both security and feature improvements over SSH-1. Better security, for example, comes through Diffie-Hellman key exchange and strong integrity checking via message authentication codes. New features of SSH-2 include the ability to run any number of shell sessions over a single SSH connection.[16] Due to SSH-2's superiority and popularity over SSH-1, some implementations such as Lsh[17] and Dropbear,[18] only support SSH-2 protocol.
[http://en.wikipedia.org/wiki/Secure_Shell#Version_2.x]
===
What Is SSH?

The Secure Shell protocol version 2, or SSH2, specifies how a client can connect securely to an SSH server, and then use the resulting secure link to access the server's resources. Among other things, the client can run programs; transfer files; and forward other TCP/IP connections over the secure link. We call these the application features of SSH: to learn more about them, click here.

The SSH2 protocol is a descendant of the SSH v1.x series of protocols. SSH version 2 is standardized at IETF, and the majority of the world's SSH servers now support SSH version 2.

SSH2 Versus SSH1
SSH2 is a significant improvement over older versions of the Secure Shell protocol. It is better designed and more flexible; but most importantly, the protocols of the 1.x series have a major design flaw that renders them vulnerable to some active attacks. SSH2 has no such issues. Additionally, SSH2 has already achieved wide deployment, so everyone who still uses SSH1 is encouraged to upgrade to SSH2.
Bitvise does not support SSH1 in its products, and has no intention of implementing it.

How Secure Is SSH2?
The SSH2 protocol provides the services of server authentication; encryption; data integrity verification; and client authentication. Server authentication is performed using the DSA or the RSA public key algorithm. For encryption and data integrity verification, a number of algorithms are provided which every SSH2 product can implement in a modular fashion. Client authentication can be performed using a password, a public key algorithm such as DSA or RSA, as well as a variety of other methods.

The SSH2 protocol specification is publicly available and has been reviewed by several independent implementors. When properly implemented and used, the protocol is believed to be secure against all known cryptographic attacks, passive as well as active.
[http://www.bitvise.com/ssh2]

ssh2'library

name::
* McsEngl.ssh2'library@cptIt,

_JAVASCRIPTP:
* https://github.com/mimecuvalo/paramikojs,

_PYTHON:
* http://www.lag.net/paramiko//

crypto.SSL-TLS

name::
* McsEngl.crypto.SSL-TLS@cptIt,
* McsEngl.crypt.TLS-SSL@cptIt,
* McsEngl.SSL@cptIt,
* McsEngl.ssl-encryption@cptIt,
* McsEngl.secure-sockets-layer@cptIt124.1,
* McsEngl.SSL@cptIt124.1, {20012-06-09}
* McsEngl.TLS@cptIt124.2, {2012-06-09}
* McsEngl.transport-layer-security@cptIt124.2, {2012-06-09}

_GENERIC:
* cryptographic-protocol#ql:cryptographic_protocol@cptIt#

_DESCRIPTION:
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet.[1] They use asymmetric cryptography for authentication of key exchange, symmetric encryption for confidentiality and message authentication codes for message integrity. Several versions of the protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP).
In the TCP/IP model view, TLS and SSL encrypt the data of network connections at a lower sublayer of its application layer. In OSI model equivalences, TLS/SSL is initialized at layer 5 (the session layer) then works at layer 6 (the presentation layer): first the session layer has a handshake using an asymmetric cipher in order to establish cipher settings and a shared key for that session; then the presentation layer encrypts the rest of the communication using a symmetric cipher and that session key. In both models, TLS and SSL work on behalf of the underlying transport layer, whose segments carry encrypted data.
TLS is an IETF standards track protocol, first defined in 1999 and last updated in RFC 5246 (August 2008) and RFC 6176 (March 2011). It is based on the earlier SSL specifications (1994, 1995, 1996) developed by Netscape Communications[2] for adding the HTTPS protocol to their Navigator web browser.
[http://en.wikipedia.org/wiki/Secure_Socket_Layer] 2013-07-26,
===
TLS (Transport Layer Security) and SSL (Secure Sockets Layer) are protocols that provide data encryption and authentication between applications and servers in scenarios where that data is being sent across an insecure network, such as checking your email (How does the Secure Socket Layer work?). The terms SSL and TLS are often used interchangeably or in conjunction with each other (TLS/SSL), but one is in fact the predecessor of the other — SSL 3.0 served as the basis for TLS 1.0 which, as a result, is sometimes referred to as SSL 3.1. With this said though, is there actually a difference between the two?
[http://luxsci.com/blog/ssl-versus-tls-whats-the-difference.html]
===
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet.[1] TLS and SSL encrypt the segments of network connections at the Application Layer for the Transport Layer, using asymmetric cryptography for key exchange, symmetric encryption for privacy, and message authentication codes for message integrity.
Several versions of the protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP).
TLS is an IETF standards track protocol, last updated in RFC 5246, and is based on the earlier SSL specifications developed by Netscape Communications.[2]
===
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications on the Internet for such things as web browsing, e-mail, Internet faxing, instant messaging and other data transfers. There are slight differences between SSL and TLS, but the protocol remains substantially the same.
[http://en.wikipedia.org/wiki/Transport_Layer_Security]
===
SSL won't solve every security problem. If you download a Trojan'ed executable over a bidirectionally authenticated SSL connection, with super-reliable root certificates, you've still downloaded a Trojan'ed executable that will still compromise the machine it's run on. The only thing SSL did is ensure integrity (you got the exact Trojan'ed executable the provider sent), confidentiality (no one else could tell what Trojan'ed executable you got), and direct authenticity (the provider you got the Trojan from is certified by its CA).
--Greg Guerin on the java-dev mailing list, Sunday, 25 Nov 2007 12:14:59
[http://www.cafeaulait.org/] 2007-11-29

tls'certificate

name::
* McsEngl.tls'certificate@cptIt,
* McsEngl.certificate.ssl@cptIt,
* McsEngl.SSL-certificate@cptIt,
* McsEngl.sslcer@cptIt,

_GENERIC:
* digital-certificate#ql:digital_certificate@cptIt#

sslcer'field

name::
* McsEngl.sslcer'field@cptIt,

E = info@parallels.com
CN = Parallels Panel
OU = Parallels Panel
O = Parallels
L = Herndon
ST = Virginia
C = US

sslcer.DOMAIN-VALIDATION

name::
* McsEngl.sslcer.DOMAIN-VALIDATION@cptIt,

Domain Validation
Η SSL Domain πιστοποίηση εγγυάται ότι κατά την χρήση του SSL, η ανταλλαγή πληροφοριών με αυτό το domain θα είναι κωδικοποιημένη και ασφαλής. Παρέχει πιστοποίηση σε βασικό επίπεδο και για την έκδοσή του, απαιτείται αποκλειστικά η πιστοποίηση του Domain Name στο οποίο θα εγκατασταθεί. Το βασικό του πλεονέκτημα είναι η άμεση ενεργοποίησή του. Η διαδικασία έκδοσης πραγματοποιείται μέσα σε 10 λεπτά, καθώς η μοναδική ενέργεια που απαιτείται, είναι ένα απλό click στο mail έγκρισης που αποστέλλεται στην διεύθυνση του ιδιοκτήτη του ονόματος.
Είναι κατάλληλο:
για online επιχειρήσεις που χρειάζονται ένα χαμηλού κόστους SSL άμεσα χωρίς την υποβολή εταιρικών εγγράφων
για sites που σε κάποιες σελίδες τους απαιτούν ανταλλαγή πληροφορίας σε κρυπτογραφημένη μορφή, όπως είναι για παράδειγμα η είσοδος σε μία login page
για σελίδες που υλοποιούν συναλλαγές μικρή κλίμακας
[http://www.tophost.gr/ssl-certificates.htm]

sslcer.EXTENDED-VALIDATION

name::
* McsEngl.sslcer.EXTENDED-VALIDATION@cptIt,

Extended Validation
Η Extended Validation πιστοποίηση εγγυάται την υψηλότερου επιπέδου ασφάλεια που μπορεί να παρέχει μία σελίδα στους επισκέπτες της. Η διαδικασία έκδοσης του SSL απαιτεί την επιτυχή έγκριση 7 επιπέδων πιστοποίησης που αφορούν στο όνομα χώρου, την διεύθυνση της εταιρίας, την νόμιμη υπόστασή της καθώς και την λειτουργία της. Η ενεργοποίηση ολοκληρώνεται συνήθως σε διάστημα 10 ημερών και περιλαμβάνει την σταδιακή πιστοποίηση και έγκριση μίας λίστας από έγγραφα που απαιτούνται. Στα Extended Validated πιστοποιητικά, η μπάρα διευθύνσεων στον browser φέρει πράσινο χρώμα και επιβεβαιώνει στον επισκέπτη, ότι η επιχείρηση πίσω από τη σελίδα μέσω της οποίας πραγματοποιούν τις συναλλαγές τους, έχει πιστοποιηθεί σύμφωνα με τα αυστηρότερα standards της αγοράς.

Είναι ιδανικό SSL για εταιρίες που επιθυμούν να προβάλουν ότι έχουν περάσει από τον αυστηρότερο έλεγχο αξιολόγησης και να κερδίσουν άμεσα την εμπιστοσύνη του πελάτη.
[http://www.tophost.gr/ssl-certificates.htm]

sslcer.ORGANIZATION-VALIDATION

name::
* McsEngl.sslcer.ORGANIZATION-VALIDATION@cptIt,

Organization Validation
Η Organization Validation πιστοποίηση εγγυάται υψηλού επιπέδου ασφάλεια κατά την ανταλλαγή πληροφοριών με το Domain για το οποίο ενεργοποιήθηκε. Για την έκδοση ενός Organization Validated SSL, απαιτείται πιστοποίηση του ιδιοκτήτη του Domain Name, καθώς και της εταιρίας ή του φορέα που βρίσκεται πίσω από αυτό. Το SSL ενεργοποιείται σε 1-2 ημέρες από την παραγγελία του και αφού πιστοποιηθούν το όνομα και η ταχυδρομική διεύθυνση της εταιρίας που προμηθεύεται το SSL. Για την επιτυχή ολοκλήρωση της διαδικασίας, οι ζητούμενες πληροφορίες προς επιβεβαίωση, λαμβάνονται από whois αναζητήσεις και τραπεζικές ή τοπικές κυβερνητικές πηγές.

Είναι κατάλληλο για επιχειρήσεις που, εκτός από την δυνατότητα κρυπτογράφησης της πληροφορίας στην σελίδα τους, επιθυμούν να παρέχουν και πιστοποίηση για τα εταιρικά τους στοιχεία και την εταιρική τους ταυτότητα.
[http://www.tophost.gr/ssl-certificates.htm]

sslcer.SELF-SIGNED

name::
* McsEngl.sslcer.SELF-SIGNED@cptIt,
* McsEngl.self-signed-ssl-certificate@cptIt,

_ADDRESS.WPG:
* http://www.openssl.org/docs/HOWTO/certificates.txt,
* http://www.codeproject.com/Tips/239837/Configure-apache-localhost-to-use-secure-HTTP-HTTP,
* http://www.akadia.com/services/ssh_test_certificate.html,
* http://www.neilstuff.com/apache/apache2-ssl-windows.htm,
* https://devcenter.heroku.com/articles/ssl-certificate-self,

_DESCRIPTION:
When you use a self-signed certificate, you are saying to your customers "trust me - I am who I say I am." When you use a certificate signed by a CA, you are saying, "Trust me - Verisign agrees I am who I say I am."
[http://webdesign.about.com/od/ssl/a/signed_v_selfsi.htm]
===
How To Create a Self-Signed SSL Certificate
By Jennifer Kyrnin, About.com Guide
If you need to test an https connection but don't want to pay for the Certificate Authority (CA) to sign your certificate, you can sign it yourself. Web browsers will report self-signed certificates as suspicious, so don't use them when you need a real certificate.

Difficulty: Hard
Time Required: 30 minutes
Here's How:

Su to root and create a directory that only the root account has access to.
su -
mkdir certificates
chmod 700 certificates
cd certificates
Use openssl to generate a server key
openssl genrsa -des3 -out server.key 4096
Openssl will request a pass phrase. Type in a sentence that is long and complex but that you can remember (you'll have to type it at least twice). Try to make it at least 40 characters long, with punctuation and capital and lowercase letters. The more different characters you use the better.
Then create the certificate signing request with the server key you created in step 2.
openssl req -new -key server.key -out server.csr
Sign your certificate using SSL.
openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
You can set your certificate for any number of days, but I recommend 365 so that you remember to update it once a year.
Once you're done, you'll have the following files:
server.crt: The self-signed server certificate
server.csr: Server certificate signing request
server.key: The private server key, does not require a password when starting Apache
Place those files where they are required for your Web server, and turn on HTTPS. (If you don't know how, contact your server administrator.)
[http://webdesign.about.com/od/ssl/ht/new_selfsigned.htm]

Apache2.2.3

name::
* McsEngl.Apache2.2.3@cptIt,

Modifications to “Apache2 SSL on Windows” by Neil C. Obremski

edited by Luke Holladay 3/6/2007

This document updates Neil’s guide to work with Apache 2.2.3 and OpenSSL 0.9.8d.

1. Install OpenSSL

Download Openssl-0.9.8d-Win32.zip from hunter.campbus.com.

Unzip it somewhere.

Copy libeay32.dll and ssleay32.dll to your /system32 folder.

Download openssl.cnf from neilstuff.com and place it wherever you unzipped the files.

(It helped me to name this file openssl.conf as I downloaded it, else Windows thinks it’s a

different filetype.)

2. Create self-signed SSL

Open a command prompt in the directory where you unzipped OpenSSL.

Generate a CSR:

openssl req –config openssl.conf –new –out –blarg.csr –keyout –blarg.pem

Create the key:

openssl rsa –in blarg.pem –out blarg.key

Create the cert:

openssl x509 –in blarg.csr –out blarg.cert –req –signkey blarg.key –days 365

3. Install Apache2 w/SSL

Download Apache_2.2.3-Openssl_0.9.8d-Win32.zip from hunter.cambus.com.

Unzip it somewhere.

Open conf/httpd.conf and modify ServerRoot and Directory.

Open a command prompt in /bin and run “httpd –k install”.

4. Enable SSL in Apache2

Open conf/httpd.conf and uncomment the line that loads mod_ssl (LoadModule ssl_module

modules/mod_ssl.so), and the line which loads the ssl.conf file (Include conf/extra/httpdssl.conf).

Open conf/extra/httpd-ssl.conf and change VirtualHost settings.

(DocumentRoot, ServerAdmin, ServerName, ErrorLog, TransferLog)

Also, change SSLCertificateFile and SSLCertficateKeyFile to point to your .cert and .key files.

Restart Apache2.

Additional Notes:

It can much simpler to replace to default httpd.conf with a pared-down version, and separate

out your HTTP and HTTPS virtual hosts into separate conf files. For reference, I’ve included my

config files below. If you use these, make sure to back up your existing conf files and modify

these to fit your environment. Also be sure to create the directory within <install>/logs to hold

your site logfiles, or Apache will not start. (These were created for use with OpenCms, which is

why they point to a tomcat directory).

httpd.conf:

ServerName blarg.domain.com

ServerRoot "C:/Program Files/Apache"

Listen 80

Listen 443

ServerAdmin you@example.com

DocumentRoot "C:/Program Files/Apache"

Include conf/extra/httpd-mods.conf

Include conf/extra/httpd-vhosts.conf

Include conf/extra/httpd-default.conf

Include conf/sites-enabled/*.conf

AddType application/x-x509-ca-cert .crt

AddType application/x-pkcs7-crl .crl

SSLPassPhraseDialog builtin

SSLSessionCache none

SSLSessionCacheTimeout 300

SSLMutex default

<Directory />

Options FollowSymLinks

AllowOverride None

# Order deny,allow

# Deny from all

</Directory>

<Directory "C:/Program Files/tomcat/webapps/ROOT">

Options Indexes FollowSymLinks

AllowOverride None

Order allow,deny

Allow from all

</Directory>

<IfModule dir_module>

DirectoryIndex index.html

</IfModule>

<FilesMatch "^\.ht">

Order allow,deny

Deny from all

Satisfy All

</FilesMatch>

ErrorLog logs/error_log

LogLevel warn

<IfModule log_config_module>

LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\""

combined

LogFormat "%h %l %u %t \"%r\" %>s %b" common

<IfModule logio_module>

# You need to enable mod_logio.c to use %I and %O

LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}

i\" %I %O" combinedio

</IfModule>

CustomLog logs/access_log common

</IfModule>

DefaultType text/plain

<IfModule mime_module>

TypesConfig conf/mime.types

AddType application/x-compress .Z

AddType application/x-gzip .gz .tgz

</IfModule>

<IfModule ssl_module>

SSLRandomSeed startup builtin

SSLRandomSeed connect builtin

</IfModule>

extra/httpd-mods.conf

LoadModule actions_module modules/mod_actions.so

LoadModule alias_module modules/mod_alias.so

LoadModule asis_module modules/mod_asis.so

LoadModule auth_basic_module modules/mod_auth_basic.so

#LoadModule auth_digest_module modules/mod_auth_digest.so

#LoadModule authn_anon_module modules/mod_authn_anon.so

#LoadModule authn_dbm_module modules/mod_authn_dbm.so

LoadModule authn_default_module modules/mod_authn_default.so

LoadModule authn_file_module modules/mod_authn_file.so

#LoadModule authz_dbm_module modules/mod_authz_dbm.so

LoadModule authz_default_module modules/mod_authz_default.so

LoadModule authz_groupfile_module modules/mod_authz_groupfile.so

LoadModule authz_host_module modules/mod_authz_host.so

LoadModule authz_user_module modules/mod_authz_user.so

LoadModule autoindex_module modules/mod_autoindex.so

#LoadModule cern_meta_module modules/mod_cern_meta.so

LoadModule cgi_module modules/mod_cgi.so

#LoadModule dav_module modules/mod_dav.so

#LoadModule dav_fs_module modules/mod_dav_fs.so

#LoadModule deflate_module modules/mod_deflate.so

LoadModule dir_module modules/mod_dir.so

LoadModule env_module modules/mod_env.so

#LoadModule expires_module modules/mod_expires.so

#LoadModule file_cache_module modules/mod_file_cache.so

#LoadModule headers_module modules/mod_headers.so

LoadModule imagemap_module modules/mod_imagemap.so

LoadModule include_module modules/mod_include.so

#LoadModule info_module modules/mod_info.so

LoadModule isapi_module modules/mod_isapi.so

LoadModule log_config_module modules/mod_log_config.so

LoadModule mime_module modules/mod_mime.so

#LoadModule mime_magic_module modules/mod_mime_magic.so

LoadModule proxy_module modules/mod_proxy.so

LoadModule proxy_ajp_module modules/mod_proxy_ajp.so

LoadModule proxy_balancer_module modules/mod_proxy_balancer.so

LoadModule proxy_connect_module modules/mod_proxy_connect.so

LoadModule proxy_http_module modules/mod_proxy_http.so

LoadModule proxy_ftp_module modules/mod_proxy_ftp.so

LoadModule negotiation_module modules/mod_negotiation.so

LoadModule rewrite_module modules/mod_rewrite.so

LoadModule setenvif_module modules/mod_setenvif.so

#LoadModule speling_module modules/mod_speling.so

#LoadModule status_module modules/mod_status.so

#LoadModule unique_id_module modules/mod_unique_id.so

LoadModule userdir_module modules/mod_userdir.so

#LoadModule usertrack_module modules/mod_usertrack.so

#LoadModule vhost_alias_module modules/mod_vhost_alias.so

LoadModule ssl_module modules/mod_ssl.so

extra/httpd-vhosts.conf:

# Virtual Hosts

#

# If you want to maintain multiple domains/hostnames on your

# machine you can setup VirtualHost containers for them. Most configurations

# use only name-based virtual hosts so the server doesn't need to worry about

# IP addresses. This is indicated by the asterisks in the directives below.

#

# Please see the documentation at

# <URL:http://httpd.apache.org/docs/2.2/vhosts/>

# for further details before you try to setup virtual hosts.

#

# You may use the command line option '-S' to verify your virtual host

# configuration.

#

# Use name-based virtual hosting.

#

NameVirtualHost *:80

#

# VirtualHost example:

# Almost any Apache directive may go into a VirtualHost container.

# The first VirtualHost section is used for all requests that do not

# match a ServerName or ServerAlias in any <VirtualHost> block.

#

#<VirtualHost *:80>

# ServerAdmin webmaster@dummy-host.example.com

# DocumentRoot /www/docs/dummy-host.example.com

# ServerName dummy-host.example.com

# ServerAlias www.dummy-host.example.com

# ErrorLog logs/dummy-host.example.com-error_log

# CustomLog logs/dummy-host.example.com-access_log common

#</VirtualHost>

#<VirtualHost *:80>

# ServerAdmin webmaster@dummy-host2.example.com

# DocumentRoot /www/docs/dummy-host2.example.com

# ServerName dummy-host2.example.com

# ErrorLog logs/dummy-host2.example.com-error_log

# CustomLog logs/dummy-host2.example.com-access_log common

#</VirtualHost>

sites-enabled/site.conf:

<VirtualHost *:80>

ServerName blarg.domain.com

ServerAdmin you@domain.com

DocumentRoot "C:/Program Files/tomcat/webapps/ROOT"

ErrorLog logs/site/error_log

TransferLog logs/site/access_log

DirectoryIndex index.html index.htm error.htm

</VirtualHost>

sites-enabled/site-ssl.conf

<VirtualHost _default_:443>

SSLEngine on

SSLCipherSuite ALL:!ADH:!

EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL

SSLCertificateFile "C:/Program Files/Apache/conf/ssl/blarg.cert"

SSLCertificateKeyFile "C:/Program Files/Apache/conf/ssl/blarg.key"

ServerName blarg.domain.com

ServerAdmin you@domain.com

DocumentRoot "C:/Program Files/tomcat/webapps/ROOT"

ErrorLog logs/site/ssl_error_log

TransferLog logs/site/ssl_access_log

DirectoryIndex index.html index.htm error.htm

</VirtualHost>

sslcer.WILDCARD

name::
* McsEngl.sslcer.WILDCARD@cptIt,

Wildcard Certificates
Αν επιθυμείτε να κρυπτογραφήσετε συναλλαγές και δεδομένα σε subdomains που βρίσκονται κάτω από το κεντρικό όνομα χώρου της σελίδας σας, τα Wildcard Certificates είναι η σωστή επιλογή. Τα συγεκριμένα πιστοποιητικά παρέχουν προστασία στο top-level domain και σε απεριόριστα Subdomain Names, μειώνοντας τον απαιτούμενο χρόνο διαχείρισης αλλά και το κόστος με ένα μόνο πιστοποιητικό ασφαλείας.
[http://www.tophost.gr/ssl-certificates.htm]

tls'certificate-authority

name::
* McsEngl.tls'certificate-authority@cptIt,
* McsEngl.SSL-certificate-authority@cptIt,
* McsEngl.SSL-certificate-provider@cptIt,
* McsEngl.sslca@cptIt,

sslca'CSR

name::
* McsEngl.sslca'CSR@cptIt,
* McsEngl.Certificate-Signing-Request@cptIt,
* McsEngl.CSR@cptIt,

CSR Generation: Using OpenSSL (Apache w/mod_ssl, NGINX, OS X)
Solution
Generating a Certificate Signing Request (CSR) using OpenSSL (Apache & mod_ssl, NGINX)

A CSR is a file containing your certificate application information, including your Public Key. Generate your CSR and then copy and paste the CSR file into the web form in the enrollment process:
Generate keys and certificate:
To generate a pair of private key and public Certificate Signing Request (CSR) for a webserver, "server", use the following command :

openssl req -nodes -newkey rsa:2048 -keyout myserver.key -out server.csr

This creates a two files. The file myserver.key contains a private key; do not disclose this file to anyone. Carefully protect the private key.

In particular, be sure to backup the private key, as there is no means to recover it should it be lost. The private key is used as input in the command to generate a Certificate Signing Request (CSR).

You will now be asked to enter details to be entered into your CSR.

What you are about to enter is what is called a Distinguished Name or a DN.

For some fields there will be a default value, If you enter '.', the field will be left blank.


Country Name (2 letter code) [AU]: GB
State or Province Name (full name) [Some-State]: Yorks
Locality Name (eg, city) []: York
Organization Name (eg, company) [Internet Widgits Pty Ltd]: MyCompany Ltd
Organizational Unit Name (eg, section) []: IT
Common Name (eg, YOUR name) []: mysubdomain.mydomain.com
Email Address []:

Please enter the following 'extra' attributes to be sent with your certificate request

A challenge password []:
An optional company name []:

Use the name of the web-server as Common Name (CN). If the domain name (Common Name) is mydomain.com append the domain to the hostname (use the fully qualified domain name).

The fields email address, optional company name and challenge password can be left blank for a webserver certificate.

Your CSR will now have been created. Open the server.csr in a text editor and copy and paste the contents into the online enrollment form when requested.

Alternatively one may issue the following command to generate a CSR:

openssl req -nodes -newkey rsa:2048 -nodes -keyout myserver.key -out server.csr
-subj "/C=GB/ST=Yorks/L=York/O=MyCompany Ltd./OU=IT/CN=mysubdomain.mydomain.com"

Note: If the "-nodes" is entered the key will not be encrypted with a DES pass phrase.
[https://support.comodo.com/index.php?_m=knowledgebase&_a=viewarticle&kbarticleid=3&nav=0,33]

sslca'resource

name::
* McsEngl.sslca'resource@cptIt,

_ADDRESS.WPG:
* http://webdesign.about.com/od/ssl/tp/cheapest-ssl-certificates.htm,

sslca'warranty

name::
* McsEngl.sslca'warranty@cptIt,

sslca.COMODO

name::
* McsEngl.sslca.COMODO@cptIt,

_ADDRESS.WPG:
* https://www.comodo.com//
* free 90 days: http://ssl.comodo.com/free-ssl-certificate.php,

sslca.GlobalSign

name::
* McsEngl.sslca.GlobalSign@cptIt,

_ADDRESS.WPG:
* https://www.globalsign.com/

sslca.RapidSSL

name::
* McsEngl.sslca.RapidSSL@cptIt,

_ADDRESS.WPG:
* https://www.rapidssl.com//

sslca.RESELER

name::
* McsEngl.sslca.RESELER@cptIt,

_ADDRESS.WPG:
* http://www.tophost.gr/ssl-certificates.htm,

sslca.Symantec

name::
* McsEngl.sslca.Symantec@cptIt,

_ADDRESS.WPG:

Symantec SSL certificates now offer you the choice of three different encryption algorithms—RSA, DSA, and ECC—to help you create a more secure and scalable future for your business.

Elliptic Curve Cryptography (ECC) Algorithm
An ECC certificate is included at no additional cost with all Symantec Premium SSL certificates.
ECC provides stronger security and increased performance: it offers better protection than currently adopted encryption methods, but uses shorter key lengths (e.g. 256 bit ECC key provides the same level of security as 3,072 RSA key). The result? Stronger security that can handle the explosion in mobile device and tablet connections.
Requires fewer server processing cycles, allowing for more simultaneous SSL connections and faster processing.
ECC key lengths increase at a slower rate than other encryption method keys as security levels increase, potentially extending the life of your existing hardware and giving you a greater return on your investment.
Symantec's ECC certificate roots have been in place for over five years: You can be confident that your ECC certificate will work throughout your ecosystem
US Government approved: ECC is FIPS-certified (US Federal Information Processing Standard) and endorsed by the US National Security Agency.
Digital Signature Algorithm (DSA)
A DSA certificate is included at no additional cost with all Symantec Standard and Premium SSL certificates.
Delivers the same level of security and performance as the RSA algorithm, but uses a different algorithm for signing and encryption.
Offers a broader array of encryption options: You can install just RSA, just DSA, or both to enhance website security. (Apache server can support both RSA and DSA certificates in tandem on a single web server.)
Gives you more choices and greater flexibility to help make it easier to keep up with evolving national government requirements.
Helps maximize your ecosystem reach to everyone with whom your company does business.
DSA is US Government approved: DSA was created by the NSA in 1991 and is US Defense Security Service and FIPS-certified.
Resources
White Paper: Elliptic Curve Cryptography (ECC) Certificates Performance Analysis
White Paper: Algorithm Agility
Data Sheet: Symantec SSL Certification with ECC Algorithm
Data Sheet: Symantec SSL Certificates with the DSA Algorithm
FAQ: ECC and DSA Certificates Website Security Solutions
[https://www.symantec.com/page.jsp?id=how-ssl-works&tab=secTab4]

sslca.Thawte

name::
* McsEngl.sslca.Thawte@cptIt,

_ADDRESS.WPG:

sslca.TrustWave

name::
* McsEngl.sslca.TrustWave@cptIt,

_ADDRESS.WPG:

tls'enabling

name::
* McsEngl.tls'enabling@cptIt,
* McsEngl.ssl'enabling@cptIt,

_ADDRESS.WPG:
* http://stackoverflow.com/a/7184031,
* http://www.vanemery.com/Linux/Apache/apache-SSL.html,
* http://www.neilstuff.com/apache/apache2-ssl-windows.htm,

tls'evaluation

name::
* McsEngl.tls'evaluation@cptIt,
* McsEngl.ssl'evaluation@cptIt,

_DESCRIPTION:
TLS v1.0 is marginally more secure than SSL v3.0, its predecessor. However, subsequent versions of TLS — v1.1 and v1.2 are significantly more secure and fix many vulnerabilities present in SSL v3.0 and TLS v1.0. For example, the BEAST attack that can completely break web sites running on older SSL v3.0 and TLS v1.0 protocols. The newer TLS versions, if properly configured, prevent the BEAST and other attack vectors and provide many stronger ciphers and encryption methods.

Unfortunately, even now a majority of web sites do not use the newer versions of TLS and permit weak encryption ciphers. Check how well your favorite web site is configured.
[http://luxsci.com/blog/ssl-versus-tls-whats-the-difference.html]

tls'evoluting

name::
* McsEngl.tls'evoluting@cptIt,

tls'how-it-works

name::
* McsEngl.tls'how-it-works@cptIt,

Secure Sockets Layer (SSL): How It Works

What Happens When a Browser Encounters SSL
A browser attempts to connect to a website secured with SSL.
The browser requests that the web server identify itself.
The server sends the browser a copy of its SSL Certificate.
The browser checks whether it trusts the SSL Certificate. If so, it sends a message to the server.
The server sends back a digitally signed acknowledgement to start an SSL encrypted session.
Encrypted data is shared between the browser and the server.
Encryption Protects Data During Transmission
Web servers and web browsers rely on the Secure Sockets Layer (SSL) protocol to help users protect their data during transfer by create a uniquely encrypted channel for private communications over the public Internet. Each SSL Certificate consists of a key pair as well as verified identification information. When a web browser (or client) points to a secured website, the server shares the public key with the client to establish an encryption method and a unique session key. The client confirms that it recognizes and trusts the issuer of the SSL Certificate. This process is known as the "SSL handshake" and it begins a secure session that protects message privacy and message integrity.

Strong encryption, at 128 bits, can calculate 288 times as many combinations as 40-bit encryption. That's over a trillion times stronger. At current computing speeds, a hacker with the time, tools, and motivation to attack using brute force would require a trillion years to break into a session protected by an SGC-enabled certificate. To enable strong encryption for the most site visitors, choose an SSL Certificate that enables 128-bit minimum encryption for 99.9 percent of website visitors.

Credentials Establish Identity Online
Credentials for establishing identity are common: a driver's license, a passport, a company badge. SSL Certificates are credentials for the online world, uniquely issued to a specific domain and web server and authenticated by the SSL Certificate provider. When a browser connects to a server, the server sends the identification information to the browser.

To view a websites' credentials:

Click the closed padlock in a browser window
Click the trust mark (such as a Norton Secured Seal)
Look in the green address bar triggered by an Extended Validation (EV) SSL
Authentication Generates Trust in Credentials
Trust of a credential depends on confidence in the credential issuer, because the issuer vouches for the credential's authenticity. Certificate Authorities use a variety of authentication methods to verify information provided by organizations. Symantec, the leading Certificate Authority, is well known and trusted by browser vendors because of our rigorous authentication methods and highly reliable infrastructure. Browsers extend that trust to SSL Certificates issued by Symantec.

Extend Protection beyond HTTPS
Symantec SSL Certificates offer more services to protect your site and grow your online business. Our combination of SSL, vulnerability assessment and daily website malware scanning helps you provide site visitors with a safer online experience and extend security beyond https to your public-facing web pages. The Norton Secured Seal and Symantec Seal-in-Search technology help assure your customers that your site is safe from search to browse to buy.
[https://www.symantec.com/page.jsp?id=how-ssl-works&tab=secTab4]

tls'resource

name::
* McsEngl.tls'resource@cptIt,
* McsEngl.ssl'resource@cptIt,

_ADDRESS.WPG:
* SSL Server Test: https://www.ssllabs.com/ssltest/index.html,
* Hackers break SSL encryption used by millions of sites
Beware of BEAST decrypting secret PayPal cookies
By Dan Goodin, 19th September 2011
- http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl//
===
Securing Multiple Domains with SSL
By: GeoTrust
As the backbone of web security, secure sockets layer (SSL) technology is a must for securing sensitive data passing over the Internet — whether that's e-commerce traffic, remote access to internal servers, or other secure communications. Usually, one SSL certificate secures just one domain name or URL; however, some common situations are better handled with a type of certificate that allows multiple domains to be secured with just one certificate. Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
- http://www.itwhitepapers.com/?option=com_categoryreport&task=viewabstract&pathway=no&title=46632&frmurl=http%3a%2f%2fforms.madisonlogic.com%2fForm.aspx%3fpub%3d88%26pgr%3d75%26frm%3d300%26autodn%3d1%26src%3d5053%26ctg%3d1%26ast%3d46632%26crv%3d0%26cmp%3d15321%26yld%3d0%26clk%3d6149366275045327313%26em%3dkaseluris.nikos%2540gmail.com%26embed%3d1,

tls'support

name::
* McsEngl.tls'support@cptIt,

Website protocol support
Protocol version  Secure[9]  Websites supporting[9]
SSL 2.0    No    27.1%
SSL 3.0    Maybe[a]  99.8%
TLS 1.0    Maybe[a]  99.4%
TLS 1.1    Yes    13.4%
TLS 1.2    Yes    15.8%
Legend: a) BEAST mitigation required
[http://en.wikipedia.org/wiki/Secure_Socket_Layer]

tls.1.2 {2011/2008}

name::
* McsEngl.tls.1.2 {2011/2008}@cptIt,

TLS 1.2[edit]
TLS 1.2 was defined in RFC 5246 in August 2008. It is based on the earlier TLS 1.1 specification. Major differences include:

The MD5-SHA-1 combination in the pseudorandom function (PRF) was replaced with SHA-256, with an option to use cipher-suite specified PRFs.
The MD5-SHA-1 combination in the Finished message hash was replaced with SHA-256, with an option to use cipher-suite specific hash algorithms. However the size of the hash in the finished message is still truncated to 96-bits.
The MD5-SHA-1 combination in the digitally signed element was replaced with a single hash negotiated during handshake, defaults to SHA-1.
Enhancement in the client's and server's ability to specify which hash and signature algorithms they will accept.
Expansion of support for authenticated encryption ciphers, used mainly for Galois/Counter Mode (GCM) and CCM mode of Advanced Encryption Standard encryption.
TLS Extensions definition and Advanced Encryption Standard CipherSuites were added.
TLS 1.2 was further refined in RFC 6176 in March 2011 removing its backward compatibility with SSL such that TLS sessions will never negotiate the use of Secure Sockets Layer (SSL) version 2.0.
[http://en.wikipedia.org/wiki/Transport_Layer_Security]

tls.1.1 {2006}

name::
* McsEngl.tls.1.1 {2006}@cptIt,

TLS 1.1[edit]
TLS 1.1 was defined in RFC 4346 in April 2006.[8] It is an update from TLS version 1.0. Significant differences in this version include:

Added protection against Cipher block chaining (CBC) attacks.
The implicit Initialization Vector (IV) was replaced with an explicit IV.
Change in handling of padding errors.
Support for IANA registration of parameters.
[http://en.wikipedia.org/wiki/Transport_Layer_Security]

tls.1.0 {1999}

name::
* McsEngl.tls.1.0 {1999}@cptIt,

TLS 1.0[edit]
TLS 1.0 was first defined in RFC 2246 in January 1999 as an upgrade of SSL Version 3.0. As stated in the RFC, "the differences between this protocol and SSL 3.0 are not dramatic, but they are significant to preclude interoperability between TLS 1.0 and SSL 3.0. " TLS 1.0 does include a means by which a TLS implementation can downgrade the connection to SSL 3.0, thus weakening security.
[http://en.wikipedia.org/wiki/Transport_Layer_Security]

tls.GNU

name::
* McsEngl.tls.GNU@cptIt,
* McsEngl.GnuTLS@cptIt,

Bug στο GnuTLS εκθέτει σε χάκερ το Linux
ΑΘΗΝΑ 06/06/2014
Ένα άλλο σημαντικό θέμα ευπάθειας στην ασφάλεια έχει ανακαλυφθεί στη δημοφιλή Βιβλιοθήκη κρυπτογράφησης «GnuTLS» που αφήνει το Linux ευάλωτο σε απομακρυσμένη εκτέλεση κώδικα.

Το GnuTLS είναι μια εφαρμογή ελεύθερης βιβλιοθήκης πρωτοκόλλων Secure Socket Layer (SSL), Transport Layer Security (TLS) και Datagram Transport Layer Security (dtls) που χρησιμοποιούνται για να προσφέρουν ασφαλείς επικοινωνίες.

Ένας κακόβουλος διακομιστής θα μπορούσε να εκμεταλλευτεί αυτήν την ευπάθεια, στέλνοντας ένα πολύ μεγάλο Session ID και να εκτελέσει ένα κακόβουλο κώδικα σε “μια σύνδεση TLS/SSL client, χρησιμοποιώντας το GnuTLS”.

Πηγή: SecNews
[http://www.nooz.gr/tech/bug-sto-gnutls-kanei-eualoto-to-linux]

prlCrypto.SSL

name::
* McsEngl.prlCrypto.SSL@cptIt,
* McsEngl.conceptIt124.1,
* McsEngl.ssl@cptIt,

ssl.3.0 {1996}

name::
* McsEngl.ssl.3.0 {1996}@cptIt,
* McsEngl.ssl3@cptIt,

_DESCRIPTION:
SSL 1.0, 2.0 and 3.0
The SSL protocol was originally developed by Netscape.[6] Version 1.0 was never publicly released; version 2.0 was released in February 1995 but "contained a number of security flaws which ultimately led to the design of SSL version 3.0."[7] SSL version 3.0, released in 1996, was a complete redesign of the protocol produced by Paul Kocher working with Netscape engineers Phil Karlton and Alan Freier. Newer versions of SSL/TLS are based on SSL 3.0. The 1996 draft of SSL 3.0 was published by IETF as a historical document in RFC 6101.
[http://en.wikipedia.org/wiki/Transport_Layer_Security#SSL_1.0.2C_2.0_and_3.0]

Ευπάθεια ασφαλείας στο πρωτόκολλο SSL-3
ΑΘΗΝΑ 29/10/2014
Η Διεύθυνση Δίωξης Ηλεκτρονικού Εγκλήματος της Ελληνικής Αστυνομίας, ενημερώνει τους χρήστες του διαδικτύου σχετικά με τον εντοπισμό σοβαρής ευπάθειας στην ασφάλεια χρήσης του πρωτοκόλλου κρυπτογράφησης SSL-3, η οποία ονομάστηκε Poodle (Padding Oracle On Downloaded Legacy Encryption).

Ειδικότερα, το πρωτόκολλο κρυπτογράφησης SSL-3 χρησιμοποιείται ευρέως για την κρυπτογραφημένη επικοινωνία μεταξύ ενός περιηγητή (browser) και ενός διακομιστή (server).

Αν και το πρωτόκολλο SSL 3.0 είναι περίπου δεκαπέντε (15) ετών, εξακολουθεί να χρησιμοποιείται ευρέως στα περισσότερα προγράμματα περιήγησης (browsers) και ως εφεδρικό (backup) στους διακομιστές, εάν τα σύγχρονα πρωτόκολλα κρυπτογράφησης αποτύχουν να συνδεθούν.

Συγκεκριμένα, η εν λόγω ευπάθεια επιτρέπει σε έναν κακόβουλο χρήστη (cracker) να πραγματοποιήσει επιθέσεις, οι οποίες ονομάζονται ως "man-in-the-middle" και να παρακάμψει την κρυπτογραφημένη επικοινωνία μεταξύ ενός περιηγητή (browser) και ενός διακομιστή (server) συλλέγοντας ευαίσθητα προσωπικά δεδομένα, αλλά και τα cookies των συνδέσεων. Με τα στοιχεία αυτά, στη συνέχεια (ο κακόβουλος χρήστης) μπορεί να αποκτήσει πρόσβαση στους διαδικτυακούς λογαριασμούς των χρηστών.

Επιπροσθέτως, το σημαντικότερο πρόβλημα που προκύπτει από την ευπάθεια Poodle είναι ότι εξαναγκάζει την υποβάθμιση (downgrade) σε SSL 3.0, καθιστώντας ευάλωτο ακόμα και ένα σύστημα που χρησιμοποιεί ανώτερη μέθοδο κρυπτογράφησης, όπως το πρωτόκολλο TLS (Transport Layer Security).

Σημειώνεται ότι οι συνθήκες στις οποίες μπορεί κάποιος κακόβουλος χρήστης (cracker) να εκμεταλλευτεί την ανωτέρω ευπάθεια με σχετική ευκολία είναι στα δημόσια δίκτυα (όπως τα public WiFi).

Καλούνται οι χρήστες του διαδικτύου να λαμβάνουν τα ακόλουθα ελάχιστα μέτρα προστασίας, για την αποφυγή προσβολής από την παραπάνω ευπάθεια:

· Εάν ο περιηγητής (browser) τους το υποστηρίζει, να απενεργοποιήσουν το πρωτόκολλο SSL 3.0 ή να χρησιμοποιήσουν εργαλεία που υποστηρίζουν TLS_FALLBACK_SCSV (Transport Layer Security Signalling Cipher Suite Value), το οποίο θα αποτρέψει επιθέσεις υποβάθμισης (downgrades).

· Να έχουν πάντοτε ενημερωμένο (update) τον περιηγητή (browser) τους στην τελευταία επίσημη έκδοση.

· Να είναι ιδιαίτερα προσεκτικοί στη χρήση των δημόσιων δικτύων (public WiFi).
[http://www.nooz.gr/tech/eupa8eia-asfaleias-sto-protokollo-kruptografisis-ssl-3]

ssl.2.0 {1995}

name::
* McsEngl.ssl.2.0 {1995}@cptIt,

SSL 1.0, 2.0 and 3.0
The SSL protocol was originally developed by Netscape.[6] Version 1.0 was never publicly released; version 2.0 was released in February 1995 but "contained a number of security flaws which ultimately led to the design of SSL version 3.0."[7] SSL version 3.0, released in 1996, was a complete redesign of the protocol produced by Paul Kocher working with Netscape engineers Phil Karlton and Alan Freier. Newer versions of SSL/TLS are based on SSL 3.0. The 1996 draft of SSL 3.0 was published by IETF as a historical document in RFC 6101.
[http://en.wikipedia.org/wiki/Transport_Layer_Security#SSL_1.0.2C_2.0_and_3.0]

ssl.1.0 {}

name::
* McsEngl.ssl.1.0 {}@cptIt,

SSL 1.0, 2.0 and 3.0
The SSL protocol was originally developed by Netscape.[6] Version 1.0 was never publicly released; version 2.0 was released in February 1995 but "contained a number of security flaws which ultimately led to the design of SSL version 3.0."[7] SSL version 3.0, released in 1996, was a complete redesign of the protocol produced by Paul Kocher working with Netscape engineers Phil Karlton and Alan Freier. Newer versions of SSL/TLS are based on SSL 3.0. The 1996 draft of SSL 3.0 was published by IETF as a historical document in RFC 6101.
[http://en.wikipedia.org/wiki/Transport_Layer_Security#SSL_1.0.2C_2.0_and_3.0]

crypto.VISUAL

_CREATED: {2012-05-28}

name::
* McsEngl.crypto.VISUAL@cptIt,
* McsEngl.cryptography.visual@cptIt56i,
* McsEngl.visual-cryptography@cptIt56i,

_DESCRIPTION:
Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer.
One of the best-known techniques has been credited to Moni Naor and Adi Shamir, who developed it in 1994. They demonstrated a visual secret sharing scheme, where an image was broken up into n shares so that only someone with all n shares could decrypt the image, while any n-1 shares revealed no information about the original image. Each share was printed on a separate transparency, and decryption was performed by overlaying the shares. When all n shares were overlaid, the original image would appear.
Using a similar idea, transparencies can be used to implement a one-time pad encryption, where one transparency is a shared random pad, and another transparency acts as the ciphertext.
[http://en.wikipedia.org/wiki/Visual_cryptography]

crypto.EVOLUTING#cptCore546.171#

name::
* McsEngl.crypto.EVOLUTING@cptIt,

{time.1993}:
=== Clipper-chip-scandal:
If you work in information technology you might remember the Clipper chip scandal, where the NSA tried to mandate a backdoor in all encryption. That was in 1993.
[https://hackernoon.com/why-everyone-missed-the-most-important-invention-in-the-last-500-years-c90b0151c169]

{time.1978}:
=== RSA:
In 1978, Ronald Rivest, Adi Shamir, and Len Adleman invented RSA, another public-key system.[29]
[http://en.wikipedia.org/wiki/Cryptography#Public-key_cryptography]

{time.1976}:
=== Public-key--cryptography:
In a groundbreaking 1976 paper, Whitfield Diffie and Martin Hellman proposed the notion of public-key (also, more generally, called asymmetric key) cryptography in which two different but mathematically related keys are used—a public key and a private key.[26]
[http://en.wikipedia.org/wiki/Cryptography#Public-key_cryptography]

{time.1970s}:
The first major symmetric algorithm developed for computers in the United States was the Data Encryption Standard (DES), approved for use in the 1970s. The DES uses a 56-bit key.
[http://computer.howstuffworks.com/encryption2.htm]

sctIt.doing.COMMUNICATING

name::
* McsEngl.sctIt.doing.COMMUNICATING@cptIt,
* McsEngl.techcomm'security@cptIt,

_DESCRIPTION:
Η ανάπτυξη του διαδικτύου, το ηλεκτρονικό εμπόριο και οι συναλλαγές μέσω ανοιχτών δικτύων κάνουν επιτακτική την ανάγκη ασφάλειας στις συναλλαγές. Ο χρήστης που συναλλάσσεται ηλεκτρονικά απαιτεί τα δεδομένα (π.χ. ένα μήνυμα ή ένα κείμενο) που στέλνει να μην μπορούν να αποκαλυφθούν ή να διατεθούν σε μη εξουσιοδοτημένα γι αυτό άτομα (εμπιστευτικότητα). Τα δεδομένα, δεν θα πρέπει να είναι δυνατόν να αλλοιωθούν κατά την μετάδοσή τους. Ο παραλήπτης θα πρέπει να τα λάβει όπως ακριβώς ο αποστολέας τα έστειλε και να είναι σίγουρος ότι τα δεδομένα που λαμβάνει είναι αυτά που ο αποστολέας έχει στείλει (ακεραιότητα). Επιπλέον, σε μία τέτοια συναλλαγή, είναι απαραίτητο ο παραλήπτης να είναι σίγουρος για την ταυτότητα του αποστολέα (αυθεντικότητα). Δηλαδή, να γνωρίζει με σιγουριά ότι το μήνυμα που λαμβάνει και φαίνεται να το υπογράφει ο κ. Χ, είναι όντως από τον κ. Χ και όχι από κάποιον που παριστάνει τον Χ. Τέλος, συμμετέχοντας σε μία ηλεκτρονική συναλλαγή (π.χ. ηλεκτρονικό εμπόριο) θα πρέπει να μην είναι δυνατόν τα εμπλεκόμενα μέρη να αρνηθούν εκ των υστέρων την συμμετοχή τους στη συναλλαγή αυτή (μη αποποίηση ευθύνης).

Οι παραπάνω ιδιότητες, (εμπιστευτικότητα, ακεραιότητα, αυθεντικότητα, μη αποποίηση) στον ηλεκτρονικό κόσμο, αποτελούν αντικείμενο της επιστήμης που ασχολείται με την ασφάλεια των πληροφοριών. Διάφοροι μηχανισμοί, τεχνικές και τεχνολογίες έχουν αναπτυχθεί αποσκοπώντας να διασφαλίσουν τις ιδιότητες αυτές σε μία ηλεκτρονική συναλλαγή.
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]

sctIt.doing.PROCESSING

name::
* McsEngl.sctIt.doing.PROCESSING@cptIt,

sctIt.doing.STORING

name::
* McsEngl.sctIt.doing.STORING@cptIt,

sctIt.info.AVAILABILITY

_CREATED: {2015-08-18}

name::
* McsEngl.sctIt.info.AVAILABILITY@cptIt,
* McsEngl.availability.sctIt@cptIt,
====== lagoGreek:
* McsElln.διαθεσιμότητα@cptIt,

_DESCRIPTION:
Availability is best ensured by rigorously maintaining all hardware, performing hardware repairs immediately when needed and maintaining a correctly functioning operating system environment that is free of software conflicts. It’s also important to keep current with all necessary system upgrades. Providing adequate communication bandwidth and preventing the occurrence of bottlenecks are equally important. Redundancy, failover, RAID even high-availability clusters can mitigate serious consequences when hardware issues do occur. Fast and adaptive disaster recovery is essential for the worst case scenarios; that capacity is reliant on the existence of a comprehensive disaster recovery plan (DRP). Safeguards against data loss or interruptions in connections must include unpredictable events such as natural disasters and fire. To prevent data loss from such occurrences, a backup copy may be stored in a geographically-isolated location, perhaps even in a fireproof, waterproof safe. Extra security equipment or software such as firewalls and proxy servers can guard against downtime and unreachable data due to malicious actions such as denial-of-service (DoS) attacks and network intrusions.
[http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA]

sctIt.info.CONFIDENTIALITY

_CREATED: {2015-08-18}

name::
* McsEngl.sctIt.info.CONFIDENTIALITY@cptIt,
* McsEngl.confidentiality.sctIt@cptIt,
====== lagoGreek:
* McsElln.εμπιστευτικότητα@cptIt,

_DESCRIPTION:
Ο χρήστης που συναλλάσσεται ηλεκτρονικά απαιτεί τα δεδομένα (π.χ. ένα μήνυμα ή ένα κείμενο) που στέλνει να μην μπορούν να αποκαλυφθούν ή να διατεθούν σε μη εξουσιοδοτημένα γι αυτό άτομα (εμπιστευτικότητα).
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]
===
Confidentiality:
Confidentiality is roughly equivalent to privacy. Measures undertaken to ensure confidentiality are designed to prevent sensitive information from reaching the wrong people, while making sure that the right people can in fact get it: Access must be restricted to those authorized to view the data in question. It is common, as well, for data to be categorized according to the amount and type of damage that could be done should it fall into unintended hands. More or less stringent measures can then be implemented according to those categories.

Sometimes safeguarding data confidentiality may involve special training for those privy to such documents. Such training would typically include security risks that could threaten this information. Training can help familiarize authorized people with risk factors and how to guard against them. Further aspects of training can include strong passwords and password-related best practices and information about social engineering methods, to prevent them from bending data-handling rules with good intentions and potentially disastrous results.

A good example of methods used to ensure confidentiality is an account number or routing number when banking online. Data encryption is a common method of ensuring confidentiality. User IDs and passwords constitute a standard procedure; two-factor authentication is becoming the norm. Other options include biometric verification and security tokens, key fobs or soft tokens. In addition, users can take precautions to minimize the number of places where the information appears and the number of times it is actually transmitted to complete a required transaction. Extra measures might be taken in the case of extremely sensitive documents, precautions such as storing only on air gapped computers, disconnected storage devices or, for highly sensitive information, in hard copy form only.
[http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA]

sctIt.info.INTEGRITY

_CREATED: {2015-08-18}

name::
* McsEngl.sctIt.info.INTEGRITY@cptIt,
* McsEngl.integrity-of-info@cptIt,
* McsEngl.integrity.sctIt@cptIt,
* McsEngl.sctIt.integrity@cptIt,
====== lagoGreek:
* McsElln.ακεραιότητα@cptIt,

_DESCRIPTION:
Τα δεδομένα, δεν θα πρέπει να είναι δυνατόν να αλλοιωθούν κατά την μετάδοσή τους. Ο παραλήπτης θα πρέπει να τα λάβει όπως ακριβώς ο αποστολέας τα έστειλε και να είναι σίγουρος ότι τα δεδομένα που λαμβάνει είναι αυτά που ο αποστολέας έχει στείλει (ακεραιότητα).
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]
===
Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle. Data must not be changed in transit, and steps must be taken to ensure that data cannot be altered by unauthorized people (for example, in a breach of confidentiality). These measures include file permissions and user access controls. Version control maybe used to prevent erroneous changes or accidental deletion by authorized users becoming a problem. In addition, some means must be in place to detect any changes in data that might occur as a result of non-human-caused events such as an electromagnetic pulse (EMP) or server crash. Some data might include checksums, even cryptographic checksums, for verification of integrity. Backups or redundancies must be available to restore the affected data to its correct state.
[http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA]

sctIt.HARDWARE

name::
* McsEngl.sctIt.HARDWARE@cptIt,
* McsEngl.conceptIt302.1,
* McsEngl.conceptIt43,
* McsEngl.hardware-security@cptIt,
* McsEngl.hardware'security@cptIt43,
* McsEngl.security'hardware@cptIt43,

Hardlock E-Y-E:
Fast hellas AE, ΤΟΠΟΘΕΤΕΙΤΕ ΣΤΗ ΠΑΡΑΛΗΛΗ ΕΞΟΔΟ.

sctIt.HASH-FUNCTION

name::
* McsEngl.sctIt.HASH-FUNCTION@cptIt,
* McsEngl.function.hash@cptIt,
* McsEngl.hash-function@cptIt,
* McsEngl.hash-algorithm@cptIt,
* McsEngl.hashing@cptIt,

* McsEngl.fcnHsh@cptIt,
* McsEngl.hshal@cptIt,

_GENERIC:
* relation.math.binary#cptCore89.41#

_DESCRIPTION:
A hash function is a function that takes one piece of information of any size and maps it to another piece of data of a fixed size i.e. a 1MB file or a 500KB file when run through a hash function would produce two separate ‘hashes’ 128 bits in length.
[https://dappsforbeginners.wordpress.com/tutorials/introduction-to-development-on-ethereum/]
===
A hash function is any algorithm that maps data of variable length to data of a fixed length. The values returned by a hash function are called hash values, hash codes, hash sums, checksums or simply hashes.
[http://en.wikipedia.org/wiki/Hash_function]
===
Please note that password hashing is often wrongly referred to as "password encryption". Hashing is a more appropriate term since encryption is something that is supposed to be easily reversible.
[http://www.openwall.com/phpass/]

fcnHsh'input (archetype)

name::
* McsEngl.fcnHsh'input (archetype)@cptIt,
* McsEngl.hashing'input-data@cptIt,

_DESCRIPTION:
A hash function is any algorithm that maps data of variable length to data of a fixed length.
[http://en.wikipedia.org/wiki/Hash_function]

fcnHsh'output (code)

name::
* McsEngl.fcnHsh'output (code)@cptIt,
* McsEngl.digest@cptIt,
* McsEngl.hash@cptIt,
* McsEngl.hash-code@cptIt,
* McsEngl.hash-value@cptIt,
* McsEngl.hashing'hash-value@cptIt,
* McsEngl.message-digest@cptIt,

_DESCRIPTION:
A hash (also called a hash code, digest, or message digest) can be thought of as the digital fingerprint of a piece of data. You can easily generate a fixed length hash for any text string using a one-way mathematical process. It is next to impossible to (efficiently) recover the original text from a hash alone. It is also vastly unlikely that any different text string will give you an identical hash - a 'hash collision'. These properties make hashes ideally suited for storing your application's passwords. Why? Because although an attacker may compromise a part of your system and reveal your list of password hashes, they can't determine from the hashes alone what the real passwords are.
[http://phpsec.org/articles/2005/password-hashing.html]

fcnHsh'Program

name::
* McsEngl.fcnHsh'Program@cptIt,

QuickHash_GUI:
QuickHash is an open-source Linux, Windows, and Apple Mac GUI that enables rapid selection & hashing of data such as files (individually or recursively), text, entire folder trees of files, and physical disks. The user can also compare various files either as a pair or entire folders.
[http://quickhash-gui.org/]

SPECIFIC

MD5, SHA1, SHA256, SHA512 hash algorithms
[http://quickhash-gui.org/]

fcnHsh.CRYPTOGRAPHIC#ql:cryptographic-hash-function#

name::
* McsEngl.fcnHsh.CRYPTOGRAPHIC@cptIt,

fcnHsh.PASSWORD

name::
* McsEngl.fcnHsh.PASSWORD@cptIt,
* McsEngl.password-hashing@cptIt,

_ADDRESS.WPG:
* http://phpsec.org/articles/2005/password-hashing.html,

_DESCRIPTION:
In this article I'm going to cover password hashing, a subject which is often poorly understood by newer developers. Recently I've been asked to look at several web applications which all had the same security issue - user profiles stored in a database with plain text passwords. Password hashing is a way of encrypting a password before it's stored so that if your database gets into the wrong hands, the damage is limited. Hashing is nothing new - it's been in use in Unix system password files since long before my time, and quite probably in other systems long before that. In this article I'll explain what a hash is, why you want to use them instead of storing real passwords in your applications, and give you some examples of how to implement password hashing in PHP and MySQL.
[http://phpsec.org/articles/2005/password-hashing.html]
===
Please note that password hashing is often wrongly referred to as "password encryption". Hashing is a more appropriate term since encryption is something that is supposed to be easily reversible.
[http://www.openwall.com/phpass/]

fcnHsh.PHP

name::
* McsEngl.fcnHsh.PHP@cptIt,
* McsEngl.php'hash-algorithm@cptIt,
* McsEngl.php-hashing@cptIt,

_ADDRESS.WPG:
* Portable PHP password hashing framework
- http://www.openwall.com/phpass//

_SPECIFIC:
* md2
* md4
* md5
* sha1
* sha224
* sha256
* sha384
* sha512
* ripemd128
* ripemd160
* ripemd256
* ripemd320
* whirlpool
* tiger128,3
* tiger160,3
* tiger192,3
* tiger128,4
* tiger160,4
* tiger192,4
* snefru
* snefru256
* gost
* adler32
* crc32
* crc32b
* salsa10
* salsa20
* haval128,3
* haval160,3
* haval192,3
* haval224,3
* haval256,3
* haval128,4
* haval160,4
* haval192,4
* haval224,4
* haval256,4
* haval128,5
* haval160,5
* haval192,5
* haval224,5
* haval256,5

_CODE.PHP:
<?php
echo 'sha384: ';
echo hash('sha384', 'nikkas');
?>
===>
sha384: 139b68d4ff5731df78202c2b51684601fe05acadc9863b59f50e909f1aab9efbe5c8d93467c7f11c9a0553efa24f40d2

alice2287 at live dot com ¶1 year ago
For those wishing to increase the computational cost of brute-forcing their password hashes by iterating the hash command multiple times, but don't want to increase the risk of a hash collision, simply re-append the password to the hash each iteration.

<?php

$iterations = 10;
$hash = crypt($password,$salt);
for ($i = 0; $i < $iterations; ++$i)
{
$hash = crypt($hash . $password,$salt);
}

?>

This, of course, can be used with md5(), sha1(), etc. as well as crypt().

Some other recommendations:

- Use the highest number of iterations possible without introducing a significantly noticeable delay to authenticating users, or causing more CPU use than your host will allow.
- Use a unique salt for each user, ideally a random one.
- Use a salt of at least 24 bytes, especially if you're using a weaker algorithm like MD5 or SHA-1.
[http://php.net/manual/en/faq.passwords.php]

fcnHsh.SECURE

name::
* McsEngl.fcnHsh.SECURE@cptIt,

The Secure Hash Algorithm is a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), and may refer to:-

SHA-0: A retronym applied to the original version of the 160-bit hash function published in 1993 under the name "SHA". It was withdrawn shortly after publication due to an undisclosed "significant flaw" and replaced by the slightly revised version SHA-1.
SHA-1: A 160-bit hash function which resembles the earlier MD5 algorithm. This was designed by the National Security Agency (NSA) to be part of the Digital Signature Algorithm. Cryptographic weaknesses were discovered in SHA-1, and the standard was no longer approved for most cryptographic uses after 2010.
SHA-2: A family of two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. There are also truncated versions of each standardized, known as SHA-224 and SHA-384. These were also designed by the NSA.
SHA-3: A hash function formerly called Keccak, chosen in 2012 after a public competition among non-NSA designers. It supports the same hash lengths as SHA-2, and its internal structure differs significantly from the rest of the SHA family.
The corresponding standards are FIPS PUB 180 (original SHA), FIPS PUB 180-1 (SHA-1), FIPS PUB 180-2 (SHA-1, SHA-256, SHA-384, and SHA-512). NIST has said that FIPS 180-5 will include SHA-3.
[http://en.wikipedia.org/wiki/Secure_Hash_Algorithm]

fcnHsh.EVOLUTING

name::
* McsEngl.fcnHsh.EVOLUTING@cptIt,

{time.1953}:
Donald Knuth notes that Hans Peter Luhn of IBM appears to have been the first to use the concept, in a memo dated January 1953, and that Robert Morris used the term in a survey paper in CACM which elevated the term from technical jargon to formal terminology.[1]
[http://en.wikipedia.org/wiki/Hash_function#Origins_of_the_term]

sctIt.PASSWORD

name::
* McsEngl.sctIt.PASSWORD@cptIt,
* McsEngl.password-authentication@cptIt,
* McsEngl.password-security@cptIt,
* McsEngl.psdsct@cptIt,

_DESCRIPTION:
In conventional password authentication, you prove you are who you claim to be by proving that you know the correct password. The only way to prove you know the password is to tell the server what you think the password is. This means that if the server has been hacked, or spoofed, an attacker can learn your password.
[http://winscp.net/eng/docs/public_key]
===
So How Do I Authenticate Users?
We've established that it's incredibly difficult to recover the original password from a hash, so how will your application know if a user has entered the correct password or not? Quite simply - by generating a hash of the user-supplied password and comparing this 'fingerprint' with the hash stored in your user profile, you'll know whether or not the passwords match.
[http://phpsec.org/articles/2005/password-hashing.html]

psdsct'logging-in

name::
* McsEngl.psdsct'logging-in@cptIt,
* McsEngl.log-in@cptIt,
* McsEngl.logging-in@cptIt,

_DESCRIPTION:
* the process of using a username and password to access a resource.

psdsct'login (credentials)

name::
* McsEngl.psdsct'login (credentials)@cptIt,
* McsEngl.access-credential@cptIt,
* McsEngl.login@cptIt,
* McsEngl.login-credential@cptIt,
* McsEngl.psdsct'credentials@cptIt,

_DESCRIPTION:
It is the
* ID (username) and
* password
of a user
===
Spelling confusion
It is a common misconception that the noun login can be used as a verb. In reality, the term log in is a verb and refers to the process of identifying and authenticating the user, whereas the term login is a noun and refers to the credentials required to obtain access. For systems where a user must type in a username and password, the username and password combination is their login and the act of supplying these details for validation is then logging in.
Log in is a special kind of verb called a phrasal verb. A Phrasal verb is one comprising two words consisting of (1) a verb and (2) an another part of speech, either an adverb or a preposition. Because the phrasal verb log in is used so frequently, the space is often carelessly and incorrectly dropped.[1]

Etymology
The noun login comes from the verb (to) log in, which was formed by analogy with the verb to clock in. The expressions may also have a more literal origin[citation needed] — computer systems tend to keep a record, called a log, of users' access to the system; hence, to log in is to prompt an entry into the system's log by accessing the system. Signing in connotes the same idea, in that providing the credential that authenticates a user's right to entry is akin to a signature.[citation needed]
The terms began to enter common usage among computer users with the origin of the computer Bulletin Board System (BBS) in the 1970s.
[http://en.wikipedia.org/wiki/Login]

psdsct'login-session

name::
* McsEngl.psdsct'login-session@cptIt,

In computing, a login session is the period of activity between a user logging in and logging out of a (multi-user) system.

On Unix and Unix-like operating systems, a login session takes one of two main forms:

When a textual user interface is used, a login session is represented as a kernel session — a collection of process groups with the logout action managed by a session leader.
Where an X display manager is employed, a login session is considered to be the lifetime of a designated user process that the display manager invokes.
On Windows NT-based systems, login sessions are maintained by the kernel and control of them is within the purview of the Local Security Authority Subsystem Service (LSA). winlogon responds to the secure attention key, requests the LSA to create login sessions on login, and terminates all of the processes belonging to a login session on logout.
[http://en.wikipedia.org/wiki/Login_session]

psdsct'password

name::
* McsEngl.psdsct'password@cptIt,
* McsEngl.password@cptIt,

psdsct'program

name::
* McsEngl.psdsct'program@cptIt,

_SPECIFIC:
* password-cracking-program#ql:program.password_recovering#
* password-storage-program

psdsct'registering

name::
* McsEngl.psdsct'registering@cptIt,
* McsEngl.psdsct'registration@cptIt,
* McsEngl.register@cptIt,
* McsEngl.registration-process@cptIt,
* McsEngl.registration.login@cptIt,
* McsEngl.sign-up@cptIt,
====== lagoGreek:
* McsElln.άνοιγμα-λογαριασμού@cptIt,
* McsElln.εγγραφή@cptIt,
* McsElln.κάνω-εγγραφή@cptIt,

_DESCRIPTION:
During the registration process our new user will provide their desired password (preferably with verification and through a secure session).
[http://phpsec.org/articles/2005/password-hashing.html]

psdsct'resource

name::
* McsEngl.psdsct'resource@cptIt,

_ADDRESS.WPG:
* https://agenda.weforum.org/2015/08/4-technologies-that-could-kill-the-password/

psdsct'salt

name::
* McsEngl.psdsct'salt@cptIt,
* McsEngl.salt.password-security@cptIt,

_DESCRIPTION:
Both of these weaknesses in the hashing strategy can be overcome by making a small addition to our hashing algorithm. Before generating the hash we create a random string of characters of a predetermined length, and prepend this string to our plain text password. Provided the string (called a "salt") is of sufficient length - and of course sufficiently random - the resulting hash will almost certainly be different each time we execute the function. Of course we must also store the salt we've used in the database along with our hash but this is generally no more of an issue than extending the width of the field by a few characters.
When we validate a user's login credentials we follow the same process, only this time we use the salt from our database instead of generating a new random one. We add the user supplied password to it, run our hashing algorithm, then compare the result with the hash stored in that user's profile.
[http://phpsec.org/articles/2005/password-hashing.html]

psdsct'username (ID)

name::
* McsEngl.psdsct'username (ID)@cptIt,
* McsEngl.user-ID@cptIt,
* McsEngl.username@cptIt,

psdsct'valnerability

name::
* McsEngl.psdsct'valnerability@cptIt,
* McsEngl.password-security-valnerability@cptIt,
* McsEngl.valnerability-of-password-security@cptIt,
* McsEngl.weakness-of-password-security@cptIt,

Also never tell user things like "user doesn't exist" or "incorrect password". It's much better if you just print out "Incorrect username or password" so everyone cannot check for existing usernames and then try to guess password for these.
[http://stackoverflow.com/questions/3336636/php-ajax-login-is-this-method-secure?rq=1]

psdsct'CRACKING

name::
* McsEngl.psdsct'CRACKING@cptIt,
* McsEngl.brute-forcing@cptIt,
* McsEngl.cracking-of-password@cptIt,
* McsEngl.cracking@cptIt,

Weaknesses

As a security measure, storing only hashes of passwords in your database will ensure that an attacker's job is made that much more difficult. Let's look at the steps they'll now take in an effort to compromise your system. Assuming that they've managed to access your user database and list of hashes, there's no way that they can then recover the original passwords to your system. Or is there?

The attacker will be able to look at your hashes and immediately know that any accounts with the same password hash must therefore also have the same password. Not such a problem if neither of the account passwords is known - or is it? A common technique employed to recover the original plain text from a hash is cracking, otherwise known as 'brute forcing'. Using this methodology an attacker will generate hashes for numerous potential passwords (either generated randomly or from a source of potential words, for example a dictionary attack). The hashes generated are compared with those in your user database and any matches will reveal the password for the user in question.

Modern computer hardware can generate MD5 and SHA-1 hashes very quickly - in some cases at rates of thousands per second. Hashes can be generated for every word in an entire dictionary (possibly including alpha-numeric variants) well in advance of an attack. Whilst strong passwords and longer pass phrases provide a reasonable level of protection against such attacks, you cannot always guarantee that your users will be well informed about such practices. It's also less than ideal that the same password used on multiple accounts (or multiple systems for that matter) will reveal itself with an identical hash.
[http://phpsec.org/articles/2005/password-hashing.html]

psdsct'SAME-PASSWORD-USAGE

name::
* McsEngl.psdsct'SAME-PASSWORD-USAGE@cptIt,

IF you use same passwords, THEN if a site is hacked, then all other sites are hacked.
[hmnSngo.2013-07-24]

Using a salt overcomes the issue of multiple accounts with the same password revealing themselves with identical hashes in your database. Although two passwords may be the same the salts will almost certainly be different, so the hashes will look nothing alike.
[http://phpsec.org/articles/2005/password-hashing.html]

sctIt.SANDBOX

name::
* McsEngl.sctIt.SANDBOX@cptIt,
* McsEngl.sandbox@cptIt,

_DESCRIPTION:
In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested code, or untrusted programs from unverified third-parties, suppliers and untrusted users.

The sandbox typically provides a tightly-controlled set of resources for guest programs to run in, such as scratch space on disk and memory. Network access, the ability to inspect the host system or read from input devices are usually disallowed or heavily restricted. In this sense, sandboxes are a specific example of virtualization.
[http://en.wikipedia.org/wiki/Sandbox_%28computer_security%29]

sctIt.time.EVOLUTING#cptCore546.171#

name::
* McsEngl.sctIt.time.EVOLUTING@cptIt,

{time.1994}:
=== US Air Force attack:
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horse viruses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtain classified files, such as air tasking order systems data and furthermore able to penetrate connected networks of National Aeronautics and Space Administration's Goddard Space Flight Center, Wright-Patterson Air Force Base, some Defense contractors, and other private sector organizations, by posing as a trusted Rome center user.[6]
[http://en.wikipedia.org/wiki/Computer_security]

FvMcs.techInfo.SOFTWARE-(code.it)

name::
* McsEngl.conceptIt64,
* McsEngl.techInfo.SOFTWARE-(code.it)@cptIt,
* McsEngl.FvMcs.techInfo.SOFTWARE-(code.it)@cptIt,
* McsEngl.cmrcode.software@cptIt64, {2013-12-25}
* McsEngl.code.it@cptIt64, {2014-02-01}
* McsEngl.code.language.computer@cptIt, {2014-04-21}
* McsEngl.code.software@cptIt64, {2013-12-24}
* McsEngl.datatechSoftware@cptIt64, {2011-08-30}
* McsEngl.digital-data@cptIt64, {2013-12-25} [other]
* McsEngl.digital-information@cptIt,
* McsEngl.digital-information@cptIt64, {2013-12-25} [other]
* McsEngl.IT software@cptIt,
* McsEngl.it.software@cptIt64,
* McsEngl.software@cptIt64,
* McsEngl.swr@cptIt64,
* McsEngl.cmrcode@cptIt64, {2013-12-25}
* McsElln.ΛΟΓΙΣΜΙΚΟ@cptIt64,

DEFINITION

Software and CODE of computer-language are the same concepts.
[hmnSngo.2014-02-05]

SOFTWARE is anything a computer uses and is NOT hardware.
[1999oct29]

ΠΑΡΑΓΩΓΙΚΟΣ ΟΡΙΣΜΟΣ:
SOFTWARE I call any 'INFORMATION-TECHNOLOGY#cptIt0.1#' with the value software(450-2) at the attribute SOFT-HARD(450)
[NIKOS, 28 SEP. 1994]

SOFTWARE ονομάζω ΚΑΘΕ ΠΛΗΡΟΦΟΡΙΑ που χρησιμοποιείται απο πληροφοριακή τεχνολογια και είναι ΑΠΟΘΗΚΕΥΜΕΝΗ όχι σε μορφή ηλεκτρονικών κυκλωμάτων.
[ΝΙΚΟΣ, ΟΚΤ. 1994]

1.  Computers. the programs used to direct the operation of a computer, as well as documentation giving instructions on how to use them. Compare hardware (def. 5).
2.  anything that is not hardware but is used with hardware, esp. audiovisual materials, as film, tapes, records, etc.: a studio fully equipped but lacking software.
[http://dictionary.reference.com/browse/software]

SOFTWARE ονομάζουν ΚΑΘΕ "μαλακή" οντότητα, δηλ. ότι αντιπροσωπεύει
- πληροφορια προς επεξεργασία ή
- οδηγίες επεξεργασίες.
Μπορεί να είναι αποθηκευμένο με μαγνητικό τρόπο, οπτικο, ή ηλεκτρονικο(hardware).
[NIKOS, OKT. 1994]

software'WHOLE

_WHOLE:
* stmIt.computer.machine#cptItsoft227#

software'complexity

name::
* McsEngl.software'complexity@cptIt,

_DESCRIPTION:
The biggest challenge in modern software is in fact managing the complexity of it.
[http://howtonode.org/prototypical-inheritance]

software'doing#cptCore475#

name::
* McsEngl.software'doing@cptIt,

software'GOAL#cptIt215#

name::
* McsEngl.software'GOAL@cptIt,

software'doing.ENGINEERING

name::
* McsEngl.software'doing.ENGINEERING@cptIt,
* McsEngl.software-engineering@cptIt,

NCZOnline newsletter@nczonline.net via mail54.us4.mcsv.net
March 29, 2016
From nczonline.net, with love.

Hi everyone,

I've written several times about how the most difficult part of software engineering isn't the software, it's the people. One of those people skills that is very hard for software engineers to embrace is the art of delegation. By delegation, I mean assigning work that you could do yourself to someone else. Delegation strikes at the crossroads between ego and trust, and so is particularly difficult when you first get started. However, mastering delegation is something that will serve you well in your career, so it's worth working to get better at it.

Delegation usually pops up as a software engineer is excelling at their job. Managers start asking you to teach others how to do what you do and think the way you think. They want to formalize your processes because they work so well. As a result, you spend less time coding and more time interacting with others. Less time coding means you can no longer do the same volume of work that you previously did, and your first instinct tends to be to work more hours to make up for it.

Before long, you're burned out and start getting grumpy. You're working so hard and while excited by your new-found responsibilities, things are getting overwhelming. The only real option is to do less work. You can't give up the new work you've been asked to do, so you must give up some of the coding work that was previously your entire job. This is when stress sets in.

Your ego will tell you that your job is to write code and giving that up means you're not really doing your job. Plus, how can you really trust someone else to do it? If it doesn't get done, or get done correctly, it'll be even more work for you. This causes many to double-down on working more hours to compensate. Others, however, start to ask themselves this question: "is this something that I absolutely need to do, or is it something I just want to do?" When you can answer that question, you've made your first step towards effective delegation.

Ultimately, delegation is about trust. First, you need to trust your colleagues. The reason you're not a one-person team is because multiple people are more effective than one person. You need to trust your teammates and they need to trust you. (If you can't trust them for some reason, then that's a bigger problem that needs addressing.) Give your teammates the opportunity to impress you by trusting them, just as your manager has trusted you with more responsibility. Learning to let go is difficult, but once you do, you'll be even more effective and valuable.

Be well.

-N

software'EDUCATION-and-RESEARCH

name::
* McsEngl.software'EDUCATION-and-RESEARCH@cptIt,

software'endian (byte-order)

NAME

name::
* McsEngl.software'endian (byte-order)@cptIt,
* McsEngl.conceptIt552,
* McsEngl.byte-order@cptIt,
* McsEngl.byteorder@cptIt552,
* McsEngl.software'byte-order@cptIt,

DEFINITION

The order of bytes in units with more than one byte. Which part of the unit is first? The most or less significant?
[hmnSngo.2006-12-30]

The term is sometimes used to describe the ordering of units other than bytes; most often, bits within a byte.
[foldoc]

BOM

name::
* McsEngl.BOM@cptIt,
* McsEngl.byte-order-mark@cptIt,
* McsEngl.symbol.BOM@cptIt,

_ADDRESS.WPG:
* http://www.w3.org/International/questions/qa-byte-order-mark.en.php,

_DESCRIPTION:
UTF-8 encoding is made up of bytes. Each character is represented by one, two, three, or four bytes.
UTF-16 and UTF-32 encodings are made up of 16- and 32-bit units, respectively.
This means that byte order is significant. Luckily, developers are encouraged to use the Byte Order Mark (BOM) as the first character in UTF-16 or UTF-32 test data. This tells the interpreting software what byte order to use.
The two byte orders are called little- and big-endian.
Intel processors, which typically power computers running Windows, use little-endian byte order.
Most computers running Mac OS and most flavors of Unix use big-endian byte order.
The BOM is represented in UTF-16 encoding as 0xFEFF for big-endian byte order and 0xFFFE for little-endian.
They are 0x0000FEFF and 0xFFFE0000 in UTF-32 encoding.
As an example, consider the two bytes 0x4E and 0x00. As a 16-bit unit, they become 0x4E00 or 0x004E, depending on byte order.
0x4E00 (big-endian) is the Chinese character meaning "one," as is 0x004E (little-endian).
0x004E (big-endian) is the Latin character "N," as is 0x4E00 (little-endian).
As you can see, if the byte order is not interpreted correctly, disaster can result.
[Ken Lunde (lunde@adobe.com) Manager, CJKV Type Development, Adobe Systems September 2001]
===
Note that the BOM is three specific bytes (xEF xBB xBF). If your system should somehow change bit ordering or byte ordering, it may produce different characters and/or show them in a different order. Also, the specific characters displayed in the browser or editor depend on the encoding in use. ο»Ώ is what you will see for Latin-1 or CP1252, but it may be different for other character sets. It all depends on which glyphs are assigned to those three byte codes.
[http://wiki.simplemachines.org/smf/How_do_I_get_rid_of_a_Byte_Order_Mark]

SPECIFIC

LITTLE-ENDIAN--BYTE-ORDER

name::
* McsEngl.LittleEndian@cptIt,
* McsEngl.little-endian@cptIt,

_DESCRIPTION:
LITTLE-ENDIAN (INTEL): (first the least significant)
A computer architecture in which, within a given 16-or 32-bit word, bytes at lower addresses have lower significance (the word is stored "little-end-first"). The PDP-11 and VAX families of computers and Intel microprocessors and a lot of communications and networking hardware are little-endian.
FORMAT: LSB, MSB.
EXAMPLE: 0xFF00=255, 0x00FF=65.280,

EXAMPLE:
ο αριθμός έκδοσης που περιγράφει τη δομή του μπλοκ είναι έκδοσης-2, ο οποίος κωδικοποιείται σε μορφή «little-endian» 4 μπάιτ ως 0x02000000.

BIG-ENDIAN--BYTE-ORDER

name::
* McsEngl.BigEndian@cptIt552,

=== _NOTES: The Lilliputians, being very small, had correspondingly small political problems. The Big-Endian and Little-Endian parties debated over whether soft-boiled eggs should be opened at the big end or the little end.

_DESCRIPTION:
BIG-ENDIAN (MAC, UNIX): (first the MOST significant)
In this order, the bytes of a multibyte value are ordered from most significant to least significant.
Motorolla processors.
FORMAT: MSB, LSB.
EXAMPLE: 0xFF00=65.280, 0x00FF=255,

software'EU-IT-PROJECT

name::
* McsEngl.software'EU-IT-PROJECT@cptIt,

software'EXPOSITION#cptIt148#

name::
* McsEngl.software'EXPOSITION@cptIt,

software'EVALUATION#cptCore546.107#

name::
* McsEngl.software'EVALUATION@cptIt,

software'IMPORTANCE#cptCore781#

name::
* McsEngl.software'IMPORTANCE@cptIt,

software'freedom-day

name::
* McsEngl.software'freedom-day@cptIt,
* McsEngl.sfd@cptIt,
* McsEngl.software-freedom-day@cptIt,

_ADDRESS.WPG:
* http://softwarefreedomday.org//

_DESCRIPTION:
Software Freedom Day

is a worldwide celebration of Free and Open Source Software (FOSS). Our goal in this celebration is to educate the worldwide public about the benefits of using high quality FOSS in education, in government, at home, and in business -- in short, everywhere!

The non-profit organization Software Freedom International coordinates SFD at a global level, providing support, giveaways and a point of collaboration, but volunteer teams around the world organize the local SFD events to impact their own communities.

Many thanks to our Sponsors and Supporters without whom we could not make such an event happen.

Find out more about Software Freedom International and SFD....
Read about how Software Freedom underpins your human rights from our former President, Pia Waugh
Also find out more about Free Software.
Our Vision
Our vision is to empower all people to freely connect, create and share in a digital world that is participatory, transparent, and sustainable.

Our Objectives
1to celebrate software freedom and the people behind it

2to foster a general understanding of software freedom, and encourage adoption of free software and open standards

3to create more equal access to opportunities through the use of participatory technologies

4to promote constructive dialogue on responsibilities and rights in the information society

5to be inclusive of organizations and individuals that share our Vision

6to be pragmatic, transparent, and responsible as an organisation
[http://softwarefreedomday.org/en/component/content/article/38-sfistories/96-what-is-software-freedom-day]

software'HEALTH#cptIt15#

name::
* McsEngl.software'HEALTH@cptIt,

software'LEGISLATION#cptIt257#

name::
* McsEngl.software'LEGISLATION@cptIt,

software'MANAGEMENT#cptEconomy11.7#

name::
* McsEngl.software'MANAGEMENT@cptIt,

software'ognCompany#cptEconomy7#

name::
* McsEngl.software'ognCompany@cptIt,

software'PRICE#cptEconomy541.44#

name::
* McsEngl.software'PRICE@cptIt,

software'representation#cptIt204#

name::
* McsEngl.software'representation@cptIt,

software'resourceInfHmn#cptResource843#

name::
* McsEngl.software'resourceInfHmn@cptIt,

software'STANDARD#cptIt139#

name::
* McsEngl.software'STANDARD@cptIt,

software'STORAGE#cptIt14#

name::
* McsEngl.software'STORAGE@cptIt,

software'TROUBLESHOOTING#cptIt52#

name::
* McsEngl.software'TROUBLESHOOTING@cptIt,

software'worker#cptIt6#

name::
* McsEngl.software'worker@cptIt,

software'GENERIC

_GENERIC:
* entity.economic.satisfier.working.tech.info#cptItsoft0#

SPECIFIC

name::
* McsEngl.software.specific@cptIt,

_SPECIFIC: software.Alphabetically:
* binary-software#ql:software.binary#
* binaryNo-software#ql:software.binary.no#
* CDROM-title#cptIt147#
* user-data#cptItsoft97#
* data#cptItsoft242#
* dataNo#ql:software.data.no#
* file#cptItsoft354#
* mixed_code
* program#cptItsoft59#

software.SPECIFIC-DIVISION.autonomy

name::
* McsEngl.software.SPECIFIC-DIVISION.autonomy@cptIt,

_SPECIFIC:
* document#linkL#
* documentNo#linkL#

software.SPECIFIC-DIVISION.processing

name::
* McsEngl.software.SPECIFIC-DIVISION.processing@cptIt,

_SPECIFIC:
* data#cptItsoft242#
* dataNo processing|instruction#ql:software.data.no#

software.SPECIFIC-DIVISION.text

name::
* McsEngl.software.SPECIFIC-DIVISION.text@cptIt,

_SPECIFIC:
* binary-software#ql:software.binary#
* binaryNo-software#ql:software.binary.no#

software.SPECIFIC-DIVISION.storage

name::
* McsEngl.software.SPECIFIC-DIVISION.storage@cptIt,

_SPECIFIC:
* file#cptItsoft354#
* fileNo#ql:software.binary.no#

software.SPECIFIC-DIVISION.openess

name::
* McsEngl.software.SPECIFIC-DIVISION.openess@cptIt,

_SPECIFIC:
* OPEN-SOURCE#cptItsoft1083#
* CLOSED-SOURCE
===
Closed-source software is the kind that most people know best. For decades, software companies have shipped their products on tapes, floppy disks and CD-ROMs. People can install and use those programs but cannot change them or fix them. The human-readable version of the software--the source code--is jealously guarded by the software maker.

software.measure#cptCore88#

name::
* McsEngl.software.measure@cptIt,

software.autonomy.DOCUMENT

_CREATED: {2015-04-20}

name::
* McsEngl.software.autonomy.DOCUMENT@cptIt,
* McsEngl.document-software@cptIt,
* McsEngl.software.document@cptIt,

_DESCRIPTION:
Document-software is organized autonomous electronic-information (software) which may be or not stored (like a file).
[hmnSngo.2015-04-20]

_SPECIFIC:
* webpage#ql:webpage@cptIt19i#

software.autonomy.DOCUMENT.NO

_CREATED: {2015-04-20}

name::
* McsEngl.software.autonomy.DOCUMENT.NO@cptIt,

software.BINARY

_CREATED: {2013-12-25}

name::
* McsEngl.software.BINARY@cptIt,
* McsEngl.non-human-readable-software@cptIt, {2013-12-25}
* McsEngl.non-text-based-software@cptIt, {2013-12-25}
* McsEngl.software.human-readableNo@cptIt, {2013-12-25}
* McsEngl.software.text-basedNo@cptIt, {2013-12-25}

_DESCRIPTION:
In modern computers, almost all data is ultimately represented in binary form. Although the binary numeral system is usually cited as the main reason of this, many (if not most) data in modern computers are not numbers. Then, binary data can refer to any data represented directly in binary form rather than interpreted on a higher level or converted into some other form. Computers rarely deal with separate bits though, because for performance reasons bits are arranged to bytes, groups of some fixed number (usually 8) of bits. Hence, "binary data" in computers are actually sequences of bytes.
In applied computer science and in the information technology field, the term binary data is often specifically opposed to text-based data, referring to any sort of data that cannot be interpreted as text. The "text" vs. "binary" distinction can sometimes refer to the semantic content of a file (e.g. a written document vs. a digital image). However, it often refers specifically to whether the individual bytes of a file are interpretable as text (see character encoding) or cannot so be interpreted. When this last meaning is intended, the more specific terms binary format and text(ual) format are sometimes used. Note that semantically textual data can be represented in binary format (e.g. when compressed or in certain formats that intermix various sorts of formatting codes, as in the DOC format used by Microsoft Word); contrarily, image data is sometimes represented in textual format (e.g. the X PixMap image format used in the X Window System).
[http://en.wikipedia.org/wiki/Binary_data#In_computer_science] 2013-12-25

software.BINARY.NO

_CREATED: {2013-12-25}

name::
* McsEngl.software.BINARY.NO@cptIt,
* McsEngl.human-readable-software@cptIt, {2013-12-25}
* McsEngl.text-based-software@cptIt, {2013-12-25}
* McsEngl.software.human-readable@cptIt, {2013-12-25}
* McsEngl.software.text-based@cptIt, {2013-12-25}

_DESCRIPTION:
In modern computers, almost all data is ultimately represented in binary form. Although the binary numeral system is usually cited as the main reason of this, many (if not most) data in modern computers are not numbers. Then, binary data can refer to any data represented directly in binary form rather than interpreted on a higher level or converted into some other form. Computers rarely deal with separate bits though, because for performance reasons bits are arranged to bytes, groups of some fixed number (usually 8) of bits. Hence, "binary data" in computers are actually sequences of bytes.
In applied computer science and in the information technology field, the term binary data is often specifically opposed to text-based data, referring to any sort of data that cannot be interpreted as text. The "text" vs. "binary" distinction can sometimes refer to the semantic content of a file (e.g. a written document vs. a digital image). However, it often refers specifically to whether the individual bytes of a file are interpretable as text (see character encoding) or cannot so be interpreted. When this last meaning is intended, the more specific terms binary format and text(ual) format are sometimes used. Note that semantically textual data can be represented in binary format (e.g. when compressed or in certain formats that intermix various sorts of formatting codes, as in the DOC format used by Microsoft Word); contrarily, image data is sometimes represented in textual format (e.g. the X PixMap image format used in the X Window System).
[http://en.wikipedia.org/wiki/Binary_data#In_computer_science] 2013-12-25

software.DATA#cptIt242#

name::
* McsEngl.software.DATA@cptIt,

software.DATA.NO

_CREATED: {2013-12-25}

name::
* McsEngl.software.DATA.NO@cptIt,
* McsEngl.cmrcode.instruction@cptIt, {2013-12-25}
* McsEngl.cmrcode.processing@cptIt, {2013-12-25}
* McsEngl.instruction-software@cptIt, {2013-12-25}
* McsEngl.processing-software@cptIt, {2013-12-25}
* McsEngl.software.instruction@cptIt, {2013-12-25}
* McsEngl.software.processing@cptIt, {2013-12-25}

software.storage.FILE#cptIt354#

name::
* McsEngl.software.storage.FILE@cptIt,

software.storage.FILE.NO

_CREATED: {2015-04-20}

name::
* McsEngl.software.storage.FILE.NO@cptIt,
* McsEngl.fileNo@cptIt,

_DESCRIPTION:
FileNo is software NOT stored.
[hmnSngo.2015-04-20]

software.SIGNAL

_CREATED: {2014-01-23}

name::
* McsEngl.software.SIGNAL@cptIt,
* McsEngl.signal.digital@cptIt,

_DESCRIPTION:
We call the software 'signal' when we communicate it.

software'EVOLUTING#cptCore546.171#

name::
* McsEngl.software'EVOLUTING@cptIt,

FUTURE

HISTORY

FvMcs.techInfo.doing.STORAGE

_CREATED: {2012-11-18}

name::
* McsEngl.conceptIt136,
* McsEngl.techInfo.doing.STORAGE@cptIt,
* McsEngl.FvMcs.techInfo.doing.STORAGE@cptIt,
* McsEngl.techInfo.storage@cptIt,
* McsEngl.storage-information-technology@cptIt136,

GENERIC#cptCore546.17#

_GENERIC:
* entity.economic.satisfier.working.tech.info#cptItsoft0#

SPECIFIC

_SPECIFIC:
* computer-storage
* magnetic
* optical

FvMcs.techInfo.SYSTEM

_CREATED: {2012-05-05}

name::
* McsEngl.conceptIt277,
* McsEngl.techInfo.SYSTEM@cptIt,
* McsEngl.FvMcs.techInfo.SYSTEM@cptIt,
* McsEngl.system.INFORMATION-TECHONOLOGY@cptIt,
* McsEngl.entity.whole.system.it@cptIt277, {2012-06-09}
* McsEngl.system.infotech@cptIt277, {2012-05-05}
* McsEngl.system.technology.information@cptIt277, {2012-05-05}
=== _ABBREVIATION:
* McsEngl.stmIt@cptIt277,
* McsEngl.sysIt@cptIt277, {2012-05-05}

DEFINITION

_DESCRIPTION:
Any system#Core765# that includes information-technology#cptIt0#.
[hmnSngo.2012-05-05]

stmIt'GENERIC

_GENERIC:
* systemItHuman#cptItsoft180#
* entity.whole.system#cptCore765#

SPECIFIC

name::
* McsEngl.stmIt.specific@cptIt,

_SPECIFIC: stmIt.alphabetically:
* hardware-stmIt#cptItsoft49#
* computer-system#cptItsoft453#
* machine-stmIt#cptItsoft277.1#
* network-stmIt#cptItsoft451#
* networkNo-stmIt##
* software-stmIt#cptItsoft490#
* tool-stmIt#cptItsoft277.2#

stmIt.MACHINE

_CREATED: {2015-08-29}

name::
* McsEngl.stmIt.MACHINE@cptIt,
* McsEngl.conceptIt277.1,
* McsEngl.machine.It@cptIt277.1,

_GENERIC:
* machine#cptCore444#

SPECIFIC

_SPECIFIC:
* standalone##
* standaloneNo (device)##

_SPECIFIC:

stmIt.MACHINE.NO (tool)

_CREATED: {2015-08-29}

name::
* McsEngl.stmIt.MACHINE.NO (tool)@cptIt,
* McsEngl.conceptIt277.2,
* McsEngl.stmIt.tool@cptIt,
* McsEngl.toolIt@cpt277.2,

_GENERIC:
* tool#cptEconomy213#

stmIt.time.EVOLUTING

name::
* McsEngl.stmIt.time.EVOLUTING@cptIt,

FvMcs.stmIt.DATACENTER

_CREATED: {2015-08-17}

NAME

name::
* McsEngl.conceptIt1005,
* McsEngl.stmIt.DATACENTER@cptIt,
* McsEngl.FvMcs.stmIt.DATACENTER@cptIt,
* McsEngl.data-center@cptIt1005,
* McsEngl.datacenter@cptIt1005,
* McsEngl.stmDcr@cptIt1005,

DEFINITION

_DESCRIPTION:
The data center is the department in an enterprise that houses and maintains back-end information technology (IT) systems and data stores—its mainframes, servers and databases. In the days of large, centralized IT operations, this department and all the systems resided in one physical place, hence the name data center.

With today’s more distributed computing methods, single data center sites are still common, but are becoming less so. The term continues to be used to refer to the department that has responsibility for these systems, no matter how dispersed they are.

Market and industry trends are changing the way enterprises approach their data center strategies. Several factors are driving enterprises to look beyond traditional technology infrastructure silos and transform the way they view their data center environment and business processes. These include aging data center infrastructures that are at risk for not meeting future business requirements, an ongoing cost-consciousness, and the need to be more energy-efficient.

Many enterprises are looking to virtualization, fabric-based infrastructure, modular designs and cloud computing as they explore how best to optimize their resources.
[http://www.gartner.com/it-glossary/data-center/]
===
Known as the server farm or the computer room, the data center is where the majority of an enterprise servers and storage are located, operated and managed.
[http://www.cio.com/article/2425545/data-center/data-center-definition-and-solutions.html]
===
AN OVERVIEW ON DATA CENTERS
A data center is a facility that centralizes an organization’s IT operations and equipment, and where it stores, manages, and disseminates its data. Data centers house a network’s most critical systems and are vital to the continuity of daily operations. Consequentially, the security and reliability of data centers and their information is a top priority for organizations.

Although data center designs are unique, they can generally be classified as Internet or enterprise (or “internal”) data centers. Internet-facing data centers usually support relatively few applications, are typically browser-based, and have many users, typically unknown. In contrast, enterprise data centers service fewer users, but host more applications that vary from off-the-shelf to custom applications.

Data center architectures and requirements can differ significantly. For example, a data center built for a cloud service provider like Amazon EC2 satisfies significantly different facility, infrastructural, and security requirements than a completely private data center, such as one built for the Pentagon that is dedicated to securely maintaining classified data.

Regardless of classification, an effective data center operation is achieved through a balanced investment in the facility and equipment housed. The elements of a data center breakdown as follows:

Facility – the location and “white space,” or usable space, that is available for IT equipment. Providing around the clock access to information makes data centers one of the most energy consuming facilities in the world. A high emphasis is placed on design to optimize white space and environmental control to keep equipment within manufacturer-specified temperature/humidity range.
Support infrastructure – equipment contributing to securely sustaining the highest level of availability possible. The Uptime Institute defined four tiers data centers can fall under with availability ranging from 99.671% - 99.995%. Some components for supporting infrastructure include:
Uninterruptible power sources (UPS) – battery banks, generators, and redundant power sources
Environmental control – computer room air conditioners (CRAC), heating, ventilation, and air conditioning (HVAC) systems, and exhaust systems
Physical security systems – biometrics and video surveillance systems
IT equipment – actual equipment for IT operations and storage of the organization’s data. This includes servers, storage hardware, cables, and racks, as well as a variety of information security elements such as firewalls
Operations staff – to monitor operations and maintain IT and infrastructural equipment around the clock
Data centers have evolved significantly in recent years, adopting technologies such as virtualization to optimize resource utilization and increase IT flexibility. As enterprise IT needs continue to evolve toward on-demand services, many organizations are moving toward cloud-based services and infrastructure. A focus has also been placed on initiatives to reduce the enormous energy consumption of data centers by incorporating more efficient technologies and practices in data center management to minimize environmental impact. Data centers built to these standards have been coined “green data centers.”
[https://www.paloaltonetworks.com/resources/learning-center/what-is-a-data-center.html]

SPECIFIC

EVOLUTING

_FORCAST.2004:
Computing trends indicate that the data center of the future will likely include a hardware-level virtualization layer and a control system. Services will run in virtual machines and will be mapped onto available hardware resources. Not only will this greatly ease the management of data centers, it will also ease the handling of new hardware, as well as failed hardware. The failure of a single physical box will reduce the pool of available resources, not the availability of a particular service.
[http://queue.acm.org/detail.cfm?id=1017000]

FvMcs.sysIt.HARDWARE

_CREATED: {2012-05-05} {2011-09-06}

NAME

name::
* McsEngl.conceptIt180.1,
* McsEngl.sysIt.HARDWARE@cptIt,
* McsEngl.FvMcs.sysIt.HARDWARE@cptIt,
* McsEngl.conceptIt49,
* McsEngl.hardaware-system@cptIt180.1, {2011-09-06}
* McsEngl.sysHard@cptIt180.1, {2011-09-06}
* McsEngl.systemHardware@cptIt180.1, {2011-09-06}
* McsEngl.sysItHrd@cptIt49, {2012-05-05}
* McsEngl.sysHrd@cptIt49, {2012-05-05}

DEFINITION

_DESCRIPTION:
Only the "machine" part of a data-tech-system.
[hmnSngo.2011-09-06]

GENERIC

_GENERIC:
* entity.whole.system.it#cptItsoft277#

FvMcs.machine.PHOTO-CAMERA

NAME

name::
* McsEngl.conceptIt184,
* McsEngl.machine.PHOTO-CAMERA@cptIt,
* McsEngl.FvMcs.machine.PHOTO-CAMERA@cptIt,
* McsEngl.camera@cptIt184,
* McsEngl.photo-hardware@cptIt,
* McsElln.ΦΩΤΟΓΡΑΦΙΚΗ-ΜΗΧΑΝΗ@cptIt,

DEFINITION

A camera is a device that records and stores images. These images may be still photographs or moving images such as videos or movies. The term camera comes from the camera obscura (Latin for "dark chamber"), an early mechanism for projecting images. The modern camera evolved from the camera obscura.
[http://en.wikipedia.org/wiki/Camera]

GENERIC

_GENERIC:
* entity.economic.satisfierWorking.techInfo.machine#cptItsoft1.1#
* communication technology#cptIt244#

EVOLUTION#cptCore546.171#

{time.1839}:
Εφευρίσκεται η φωτογραφία.
[ΔΗΜΗΤΡΙΟΥ-5, 1986, 12#cptResource168]

Doing#cptCore475#

Communication#cptIt53#

Photograph#cptResource869#

ΦΩΤΟΓΡΑΦΙΑ είναι η <εικόνα> που παράγεται από μια φωτογραφική μηχανή.

ΔΙΑΦΡΑΓΜΑ (ΦΩΤΕΙΝΟΤΗΤΑ)

Διάφραγμα είναι μηχανισμός μέσα στο φακό, σάν την ίριδα του ματιού. Ανοίγει και κλείνει αφήνοντας να περάσει περισσότερο ή λιγότερο φώς.
Κάθε φακός με άνοιγμα ίσο με την εστιακή του απόσταση f περνά η ΙΔΙΑ ποσότητα φωτός.
Με μισό εμβαδό, δηλαδή a^2=f/2 or a=f/1,4 περνά η ΜΙΣΗ ποσότητα.
Τα υπόλοιπα διαφράγματα είναι f/2, f/2,8, f/4, f/5,6, f/8 κλπ Καθένα σημαίνει εμβαδό μισό από το προηγούμενο. Πολλές φορές παραλείπουμε το f και μιλάμε για διάφραγμα 4, 5,6, 8 κλπ.

Κλειστό διάφραγμα 16/22 έχουμε μεγάλο ΒΑΘΟΣ ΠΕΔΙΟΥ, καθαρότητα μπρος/πισω.
[RAM, 1997may, 147]

ΕΚΘΕΣΕΙΣ

PHOTOKINA, GERMANY 22nd 1992.

ΠΛΑΙΣΙΟ ΦΙΛΜ

Το μέγεθος του φιλμ είναι 36χ24mm (φιλμ 35mm)

ΣΚΟΠΕΥΤΡΟ

ΦΑΚΟΣ

ΕΣΤΙΑΚΗ ΑΠΟΣΤΑΣΗ / ΕΣΤΙΑΚΟ ΜΗΚΟΣ:
Είναι το βασικό χαρακτηριστικό ενός φακού. Είναι η απόσταση της ΕΣΤΙΑΣ (το σημείο σύγκλισης των ακτίνων του φωτος) από το φακό. Μετριέται σε χιλιοστά (mm) και συμβολίζεται με το γράμμα f. Οσο πιο μεγάλη είναι η εστιακή απόσταση, τόσο πιο τηλεφακός είναι ο φακός. Ενας νορμάλ φακός έχει f=50mm.
Μία φωτογραφία είναι εστιασμένη (το είδωλο φαίνεται καθαρά) όταν οι εστίες πέφτουν πάνω στην φωτοευαίσθητη επιφάνεια.
[RAM, 1997may, 147]

ΕΣΤΙΑΚΗ-ΑΠΟΣΤΑΣΗ  ΓΩΝΙΑ-ΚΑΛΥΨΗΣ (για πλαίσιο φιλμ 36χ24mm):
20 mm    94 μοίρες (ευρυγώνιος)
24 mm    84
28 mm    75
35 mm    63

Ο ίδιος φακός σε ΜΙΚΡΟΤΕΡΟ ΠΛΑΙΣΙΟ είναι περισσότερο τηλεφακός (καλύπτει λιγότερο θέμα)
και για ΜΕΓΑΛΥΤΕΡΟ ΠΛΑΙΣΙΟ είναι πιο ευρυγώνιος (καλύπτει περισσότερο θέμα).
[ψφ Απρίλιος 2004]

ΦΩΤΟΕΥΑΙΣΘΗΤΗ ΕΠΙΦΑΝΕΙΑ

Στις παραδοσιακές μηχανές είναι το ΦΙΛΜ, ενώ στις μοντέρνες είναι ο ημιαγωγός CCD που μετατρέπει το φώς σε ψηφιακό αρχείο.

Η ευαισθεσία του φίλμ μετριέται σε ASA ή ISO. Τα πιο συνηθισμένα φιλμ έχουν ευαισθησία 100ISO. Οι ψηφιακές κάμερες έχουν CCD ευαισθησίας αντίστοιχη των 100ISO.
[RAM 1997may, 146]

ΦΩΤΟΜΕΤΡΟ

Είναι συσκευή που μας δίνει ζευγάρια ταχύτητας/διαφράγματος για μια δεδομένη ευαισθησία φιλμ ή CCD.

ΑΕ (Auto Exposure) ονομάζεται η αυτοματη μέτρηση φωτός.
[RAM 1997may, 147]

ΦΩΤΟΦΡΑΧΤΗΣ

ΚΛΕΙΣΤΡΟ

Μηχανισμός που ανοίγει και κλείνει όταν πατάμε το κουμπί για να βγάλουμε φωτογραφία. Οσο περισσότερο κρατιέται ανοιχτός τόσο περισσότερο φως περνάει. Ο χρόνος που μένει ανοιχτος ονομάζεται ΤΑΧΥΤΗΤΑ ΛΗΨΗΣ και μετριέται σε κλάσματα του δευτερολέπτου.
[RAM 1997may, 147]

SPECIFIC

Specific_concepts (level 3) =

CLASSIC FILM CAMERA

CLASSIC FILM: ΧΡΗΣΙΜΟΠΟΙΕΙ ΚΡΥΣΤΑΛΛΟΥΣ ΑΛΟΓΟΝΙΔΙΩΝ ΤΟΥ ΑΡΓΥΡΟΥ.

camera.DIGITAL CAMERA

name::
* McsEngl.camera.DIGITAL CAMERA@cptIt,
* McsEngl.digital-camera@cptIt2021,
* McsEngl.camera.digital@cptIt2021,
* McsElln.ΨΗΦΙΑΚΗ-ΦΩΤΟΓΡΑΦΙΚΗ-ΜΗΧΑΝΗ@cptIt,

_DESCRIPTION:
Digital Camera is Camera that creates digital photos.

CCD

Charge-coupled device. ΣΥΣΚΕΥΗ ΜΕ ΖΕΥΞΗ ΦΟΡΤΙΟΥ.

Είναι ένα ΤΣΙΠ που αποτελείται από πολλές σειρές φωτοευαισθητων 'κελιων', τα οποία σχηματίζουν μια μήτρα (μια διάταξη σαν σκακιέρα).
Πρόκειται για επιφάνεια ημιαγωγού που έχει πάνω του χιλιάδες μικροσκοπικά φωτοτρανζίστορ (ή φωτοδιόδους).
[RAM, 1997may, 152]

resourceInfHmn#cptResource843#

Φωτογραφικές μηχανές Η επέλαση των ψηφιακών Η ποιότητα της μηχανής με τη συμβατική τεχνολογία του φιλμ είναι ακόμη αξεπέραστη από την ψηφιακή ΑΛΚΗΣ ΓΑΛΔΑΔΑΣ
(Εικόνα μεγέθους : 16012 bytes)
Οι ψηφιακές κάμερες έχουν αρχίσει να πληθαίνουν αλλά για μία ακόμη φορά δεν φαίνεται ότι τα «ήμερα» θα εκδιωχθούν από τα «άγρια». Η νέα τεχνολογία θα συνυπάρξει για αρκετά χρόνια με την παλιά, εκείνη που καταγράφει επάνω σε φιλμ τις εικόνες
Πέθανε το φιλμ; Οχι, και όλες αυτές οι μακάβριες εκφράσεις για ένα υλικό που μας συντροφεύει περισσότερο από έναν αιώνα τώρα είναι υπερβολικές. Το να λες «chip» αντί για «cheese» όμως μπροστά στον φακό της καινούργιας ψηφιακής μηχανής έχει αρχίσει να διαδίδεται. Στην αρχή σαν αστείο και τώρα σαν γεγονός.
Θα ζήσει το φιλμ; Ναι, και μόνο για όσους ασχολούνται αποκλειστικά με το Ιντερνετ ή με την καινούργία ηλεκτρονική τυπογραφία και τις παραποιήσεις της φωτογραφίας ίσως γίνει κάποια στιγμή παρελθόν. Το να λες ψηφιακή εικόνα όμως δεν σημαίνει ότι πρόκειται για κάτι καλύτερο από τη συμβατική εικόνα. Ισως αυτό συμβεί πολύ αργότερα.
Τι ευτυχία, θα σκεφθείτε, να μη χρειάζεσαι φιλμ και χημικά για την εμφάνιση της όποιας φωτογραφίας. Αποτυπώνεις σε ένα ηλεκτρονικό μέσο μια εικόνα και την περνάς από την κάμερα στον κομπιούτερ. Εκεί πλέον μπορείς να αρχίσεις τη λεγόμενη «επεξεργασία», όπου μπορείς να αλλάξεις το κάθε ελάχιστο κομματάκι της σαν να είναι ένα περίτεχνο ψηφιδωτό με τις ψηφίδες του ακόμη να μην έχουν κολλήσει τελείως.
Κατατακτήριες εξετάσεις
Οι φωτογραφικές μηχανές με ψηφιακή τεχνική κατατάσσονται σε τρεις συνομοταξίες. Αυτές τις αυτόματες, που σημαδεύεις το θέμα σου και πατάς το κουμπί (point-and-shoot), τις τριανταπεντάρες πεδίου και τις μεγάλες για την αίθουσα φωτογράφησης ενός επαγγελματία.
Με τις πιο φθηνές του τύπου point-and-shoot ασχολούνται σήμερα και αρκετοί επαγγελματίες όταν η ποιότητα της φωτογράφησης δεν είναι το πιο ενδιαφέρον γι' αυτούς στοιχείο αλλά η ίδια η αποτύπωση. Ετσι ένας τοπογράφος, ένας κτηματομεσίτης, ένας εκτιμητής ζημιών θα βρει ότι η πιο φθηνή ψηφιακή κάμερα είναι πολύ χρήσιμο εργαλείο, όταν μάθει μάλιστα να την ενσωματώνει σε άλλα ηλεκτρονικά έγγραφα και να τα στέλνει μέσω δικτύου γρήγορα, παρακάμπτοντας τις κλασικές πλέον οδύνες του ανυπόφορου... Βραδυδρομείου. Εννοείται ότι και με το ηλεκτρονικό ταχυδρομείο ένας ερασιτέχνης φωτογράφος αλλά ισόβιος χαζομπαμπάς μπορεί να στέλνει συνεχώς φωτογραφίες των παιδιών του σε φίλους και συγγενείς.
Στην άλλη συνομοταξία μπαίνουν ψηφιακές μηχανές με σώμα αντίστοιχο προς αυτές των 35 mm αλλά οι τιμές αγγίζουν προς το παρόν τα δυόμισι εκατομμύρια και έτσι είναι για επαγγελματίες, όπως οι φωτορεπόρτερ που ο χρόνος τους μερικές φορές πραγματικά μεταφράζεται όχι απλά σε χρήμα αλλά σε χρυσάφι.
Τέλος, στην τρίτη κατηγορία ανήκουν όσοι κάνουν φωτογραφήσεις για διαφημίσεις και μάλιστα τροποποιώντας δημιουργικά τα όσα πιάνει με την πρώτη το μάτι μας. Σε μερικές υπάρχει η δυνατότητα να παίρνεις απευθείας τους διαχωρισμούς στα τρία βασικά χρώματα και το ασπρόμαυρο αντίτυπο για έγχρωμες εκτυπώσεις.
Η πρώτη ερώτηση στο μυαλό τού καθενός φυσικά είναι: Ψηφιακή κάμερα εναντίον μιας με συμβατική τεχνολογία, ποια είναι η καλύτερη; Η πιο διπλωματική απάντηση είναι: «Εξαρτάται για τι δουλειά τη θέλεις». Η πιο ωμή όμως θα κλίνει σαφώς προς το μέρος της συμβατικής, που προς το παρόν δίνει φωτογραφίες σαφώς καλύτερες στο μάτι μας. Οι κακές γλώσσες μάλιστα επιμένουν ότι οι φωτογραφίες στις διαφημίσεις για να εξαρθούν τα προσόντα των ψηφιακών φωτογραφικών μηχανών έχουν γίνει από συμβατικές κάμερες με φιλμ!!!
Η δεύτερη πάντως και πιο κλασική ερώτηση σχετικά με την ψηφιακή φωτογράφηση είναι: «Το φιλμ της είναι ακριβότερο;». Εδώ γελάνε, όσοι φυσικά γνωρίζουν ήδη ότι σε μια ψηφιακής τεχνολογίας κάμερα δεν υπάρχει πλέον φιλμ. Τα στοιχεία που συνθέτουν την όποια εικόνα αποθηκεύονται ευαισθητοποιώντας ταυτόχρονα και ανάλογα με το χρώμα τους τις λεγόμενες συσκευές φορτίου CCD. Από εκεί ανιχνεύονται ένα ένα και ψηφιοποιούνται, δηλαδή παίρνουν μια συγκεκριμένη ακέραιη τιμή ανάλογα με το φορτίο που υπάρχει σε κάθε στοιχείο. Ετσι τελικά από την εικόνα του θέματος που θέλαμε να φωτογραφήσουμε προκύπτει ένα αρχείο όμοιο περίπου με τα οποιαδήποτε διακινούνται μέσα στον κομπιούτερ μας.
Ανάλογα με την αποτύπωση που επιθυμούμε να γίνει στην εικόνα του θέματός μας, μπορούμε να πάρουμε σε υψηλή ανάλυση, άρα καλύτερη ποιότητα, 10, 14, 20 ή και 30 φωτογραφίες (πόζες) ή σε χαμηλότερη ανάλυση, δηλαδή αρκετά χειρότερης ποιότητας, 20, 47, 80 ή και 108 φωτογραφίες (πόζες). Μπορούμε να αλλάζουμε από λήψη σε λήψη και από πόζα σε πόζα την ανάλυση της μηχανής μας, αλλά χάνουμε τον λογαριασμό για το πόσες φωτογραφίες μπορούμε ακόμη να πάρουμε.
Η πλακέτα που επάνω της αποτυπώνονται οι ψηφιακές φωτογραφίες κοστίζει όσο περίπου πέντε ρολά φιλμ αλλά φυσικά ζει πολλαπλάσιο χρόνο. Μερικές κάμερες που δεν έχουν απλά ένα σκόπευτρο αλλά οθόνη υγρού κρυστάλλου δίνουν τη δυνατότητα να βλέπουμε τις φωτογραφίες που έχουν τραβηχτεί ως εκείνη τη στιγμή έστω και αμυδρά σβήνοντας ό,τι έχει πάει απελπιστικά στραβά. Η πλακέτα με τη διάταξη CCD αλλάζει φυσικά οπουδήποτε και η ταύτιση του φωτογράφου κάποιες στιγμές με τον σκοτεινό θάλαμο και την παράξενη εκείνη ατμόσφαιρα πηγαίνει περίπατο οριστικά. Τώρα γίνονται όλα στο φως και η ειρωνεία είναι ότι κάτω από άπλετο φωτισμό μπορούν να γίνουν πλέον οι πιο ακατονόμαστες επεμβάσεις στις φωτογραφίες.
Φυσικά κάποια στιγμή, αφού περαστούν στη μνήμη του κομπιούτερ οι φωτογραφίες, θα σβηστούν και όλα θα είναι έτοιμα για καινούργιες λήψεις. Επειδή το να περαστούν οι φωτογραφίες ψηφιοποιημένες παίρνει αρκετά λεπτά, με ένα RS-232 για καθεμία έχουν ήδη κατασκευαστεί ειδικοί προσαρμοστές που κοστίζουν από 15.000 ως και 35.000 δραχμές για να γίνεται το πέρασμα από χρονοβόρα διαδικασία ένα παιχνιδάκι.
Το μεγάλο μειονέκτημα
Εδώ φυσικά προκύπτει ένα κατά τη γνώμη μου μεγάλο μειονέκτημα της ψηφιακής κάμερας. Απαιτεί από τον κάθε χειριστή της μια κάποια εξοικείωση όχι μόνο με βασικές λειτουργίες του κομπιούτερ αλλά και χειρισμό ενός μικρού πακέτου προγραμμάτων για να περαστούν οι φωτογραφίες, να ταξινομηθούν στον σκληρό δίσκο και αργότερα να διοχετευθούν στο Ιντερνετ. Καλώδια και προγράμματα θα ενθουσιάσουν τη νεότερη γενιά αλλά θα τρομοκρατήσουν ίσως μερικούς αμετανόητα ανεξοικείωτους με αυτά.
Ολες οι ψηφιακές μηχανές έρχονται με προγράμματα που όχι μόνο φροντίζουν το πέρασμα του υλικού της φωτογραφίας στον κομπιούτερ αλλά και την φύλαξή του στην κατάλληλη μορφή ώστε να είναι... ευανάγνωστο από τα μεγάλα κλασικά πακέτα επεξεργασίας της εικόνας. Το TWAIN (Tool Without An Interesting Name) είναι από τα πιο διάσημα και κατοικεί στον κομπιούτερ μας επιτρέποντας να αντλούνται οι φωτογραφίες από την κάμερα. Από τους δύο πιο διαδεδομένους τρόπους αποθήκευσης των εικόνων σε ψηφιακή μορφή, GIF και JPEG, οι κατασκευαστές φαίνεται να προτιμούν για τις ψηφιακές κάμερες το JPEG, που επιτρέπει μεγάλο βαθμό συμπίεσης άρα αρκετή οικονομία σε θέσεις μνήμης και μάλιστα συμπίεση σε όσο βαθμό επιθυμούμε εμείς. Εννοείται πως όλα αυτά εντάσσονται στο πνεύμα των νέων συσκευών που κατακλύζουν τον ιδιοκτήτη τους με άπειρες μικρές ή μεγάλες ανέσεις έστω και αν αυτός τελικά σαστίζει από το πλήθος τους.
Η γνώμη ενός ειδικού
Ο Γιάννης Γληνός είναι επαγγελματίας φωτογράφος, συνεργάτης των περιοδικών «RAM» και «High-Tech». Μόλις τελείωσε μια σειρά συγκριτικών δοκιμών για ψηφιακές κάμερες που τα αποτελέσματά της θα δημοσιευθούν στο τεύχος του «RAM» που κυκλοφορεί την 1η Απριλίου. Ζητήσαμε τη γνώμη του σχετικά με την ψηφιακή φωτογραφία και μας είπε ότι προς το παρόν οι τιμές των ψηφιακών φωτογραφικών μηχανών γι' αυτά που δίνουν είναι υψηλές. Ιδιαίτερα η ανάλυση έχει αρκετά χαμηλές επιδόσεις και για να φθάσει την απόδοση που έχουν οι συμβατικές μηχανές του ενός εκατομμυρίου, όπως μια Nikon F5 ή μια Canon, πρέπει ένας επαγγελματίας να πληρώσει περισσότερα από πέντε εκατομμύρια για την αντίστοιχη ψηφιακή. Από την άλλη όμως κατά τη γνώμη του πρέπει να πιστέψουμε στη φωτογραφία και στην τέχνη της έμπρακτα, διαθέτοντας κάποια χρήματα, ιδιαίτερα για να μυηθούν τα παιδιά στη φωτογραφία και στους χειρισμούς γύρω από αυτήν. Σχετικά με το δίλημμα ψηφιακή ή συμβατική κάμερα λέει: «Προς το παρόν μόνο για μια μικρή εκτύπωση ως 9Χ13 είναι καλές και οι ψηφιακές. Βέβαια το ότι δεν χρειάζεται να εμφανίσεις σου λύνει τα χέρια αν είσαι επαγγελματίας και μπορείς εύκολα να τις στείλεις σε οποιαδήποτε απόσταση χωρίς διαχωρισμούς και άλλους τέτοιους πονοκεφάλους. Οταν κάποιος βιάζεται, όταν θέλει οπωσδήποτε να τυπώσει κάποια φωτογραφία, όταν θέλει να στείλει κάτι μέσα από το Ιντερνετ τού είναι χρήσιμη η ψηφιακή.
Ενας που ξεκινάει τώρα να ασχολείται με τη φωτογραφία όμως πρέπει να αγοράσει πρώτα μια μηχανή συμβατική Reflex που να παίρνει φιλμ. Από 150.000 ως 1.000.000 δρχ., ανάλογα με το τι θέλεις. Για αντίστοιχη όμως ψηφιακή μηχανή Reflex πρέπει να δώσεις από ενάμισι εκατομμύριο και πέρα.
Αν διαθέτεις καλή συμβατική Reflex, τότε μπορείς να δοκιμάσεις και τις χάρες κάποιας «φθηνής» αυτόματης, κόμπακτ ψηφιακής, γύρω στις 250.000 δραχμές. Ολοι παραδέχονται ότι την ποιότητα της μηχανής με τη συμβατική τεχνολογία και το φιλμ ακόμη δεν την ξεπερνάει η ψηφιακή παρ' όλες τις καινοτομίες της. Από την άλλη, πολλοί κατασκευαστές συμβατικών μηχανών έχουν φθάσει κοντά στο όριό τους. Δύσκολα να κάνουν καλύτερες τις μηχανές τους, άρα δεν τους μένει άλλο από το να στραφούν στην ψηφιακή τεχνολογία όπου υπάρχει ο μεγάλος κράχτης για το κοινό. Ο κομπιούτερ και τα όσα μπορούμε να επιτύχουμε μαζί με τα πακέτα επεξεργασίας της εικόνας».
Φαίνεται ότι βυθιζόμαστε σε έναν κόσμο όλο και πιο ευέλικτο αλλά και εύπλαστο. Ανακατεύουμε τις φαντασιώσεις μας στην άλλοτε αδιάψευστη πραγματικότητα με τα χέρια μας και τα καινούργια μας μηχανήματα...

ΤΟ ΒΗΜΑ, 29-03-1998 Κωδικός άρθρου: B12474C162

SUBGENERAL#cptCore768#

my OLYMPUS CAMEDIA C-2

BUYING: 2002-05-03 Microland
price: 370 €
ccd: 2 mpixels
memory: smartmedia 16MB
bateries: 2AA

CANON RC-570

CANON RC-570 still video camera: Records 25 electronic photos. It is connected to a TV monitor.

HEWLETT PACKARD PHOTOSMART C30

67500 δρχ.
Aποσπώμενη μνήμη 4MB Compact Flash card
Αυτόματο Flash, ενσωματομένο
LCD 1.8-inch Color
Aνάλυση ΙΜΡ (1152Χ872) 24ΒΙΤ-COLOR
ΑΥΤΟΜΑΤΗ ΕΣΤΙΑΣΗ 2FT - άπειρο
[http://www.plaisio.gr/ 1999dec29]

OLYMPUS C-1000L

115900 δρχ. CCD 850K pixels LCD 1.8 inch 61Κ color TFT display Ανάλυση 640 x 480, 1024 x 768 Μνήμη 2,4,8MB (αποσπώμενη κάρτα Smartmedia) Compression Standard JPG file Αυτόματη εστίαση 0.3μ - άπειρο Φακός OLYMPUS 9.2-28mm, F2.8-3.9 Ενσωματωμένο αυτόματο Flash Interface RS232C, Έξοδος εκτυπωτή
[http://www.plaisio.gr/ 1999dec29]

QUICKTAKE 100 (APPLE)

Ειναι ψηφιακη εγχρωμη φωτογραφικη μηχανη της Apple. Θα κυκλοφορήσει και για windows except macintosh.
300000 δρχ, οκτ. 1994

SONY MAVICA MVC-FD51

163500 δρχ. +fpa
CCD 410K pixels
LCD 2.5 inch 61Κ color TFT display
Ανάλυση 640 x 480
Compression Standard JPG file
Εγγραφή σε δισκέττες 1.44ΜΒ
Aperture F4.8 , 35mm
Ενσωματωμένο Flash
[http://www.plaisio.gr/ 1999dec29]

SONY MAVICA MVC-FD91
325900 δρχ.+fpa
CCD 850.000 pixel
2.5'' LCD monitor
Μέγιστη Ανάλυση: 1024x768
Zoom: 14x Οπτικό
Οδηγός δισκέτας διπλής ταχύτητας και γρήγορης πρόσβασης
Ενσωματωμένο Flash
[http://www.plaisio.gr/ 1999dec29]

SOURCE: www.sony-europe.com/mavica
Η μοναδική που αποθηκεύει σε FloppyDisk 40 jpeg.
Οπτικό ζουμ 10χ.

FvMcs.machine.CINEMA

NAME

name::
* McsEngl.conceptIt240,
* McsEngl.machine.CINEMA@cptIt,
* McsEngl.FvMcs.machine.CINEMA@cptIt,
* McsEngl.cinema@cptIt240,
* McsEngl.techCmn.CINEMA@cptIt,
* McsElln.ΚΙΝΗΜΑΤΟΓΡΑΦΟΣ@cptIt,

GENERIC

_GENERIC:
* communication technology#cptIt244#

Doing#cptCore475#

_Doing:
* communicating#cptItsoft53#

EVOLUTION#cptCore546.171#

{time.1896}:
1896: εφευρίσκεται.
[ΔΗΜΗΤΡΙΟΥ-1, 1978, 126#cptResource166]

Film#cptResource871#

Movie-camera

resourceInfHmn#cptResource843#

_ADDRESS.WPG:
* http://en.wikipedia.org/wiki/History_of_cinema,

FvMcs.machine.COPY-MACHINE

NAME

name::
* McsEngl.conceptIt249,
* McsEngl.machine.COPY-MACHINE@cptIt,
* McsEngl.FvMcs.machine.COPY-MACHINE@cptIt,
* McsEngl.copy-machine-communication-technology@cptIt,
* McsEngl.copy'machine@cptIt249,
* McsEngl.techInfo.COPY-MACHINE@cptIt,
* McsElln.ΦΩΤΟΤΥΠΙΚΟ@cptIt249,

GENERIC

_GENERIC:
communication technology#cptIt244#

Doing#cptCore475#

Communication#cptIt53#

SPECIFIC

Specific_concepts (level 3) =

CANON CLC-10:
ΕΓΧΡΩΜΟ, ΜΕ ΤΟ ΕΧΤΡΑ ΕΞΑΡΤΗΜΑ IPU ΓΙΝΕΤΑΙ ΚΑΙ SCANNER KAI PRINTER.
INFORMA ΣΥΣΤΗΜΑΤΑ ΟΡΓΑΝΩΣΕΩΣ ΑΒΕΕ.

FvMcs.machine.FAX

NAME

name::
* McsEngl.conceptIt290,
* McsEngl.machine.FAX@cptIt,
* McsEngl.FvMcs.machine.FAX@cptIt,
* McsEngl.FAX@cptIt,
* McsEngl.fax@cptIt290,
* McsElln.ΤΗΛΕΟΜΟΙΟΤΥΠΙΑ@cptIt,
* McsElln.ΦΑΞ@cptIt290,

DEFINITION

_DESCRIPTION:

GENERIC

_GENERIC:
* entity.economic.satisfierWorking.techInfo.machine#cptItsoft1.1#

ognCompany#cptEconomy7#

Doing#cptCore475#

Communication#cptIt53#

ΜΝΗΜΕΣ

ΣΥΝΔΕΣΗ ΜΕ ΑΥΤΟΜΑΤΟ ΤΗΛΕΦΩΝΗΤΗ

ΕΝΣΩΜΑΤΩΜΕΝΗ ΤΗΛΕΦΩΝΙΚΗ ΣΥΣΚΕΥΗ

ΔΙΑΧΩΡΙΣΗ ΦΑΞ/ΤΗΛΕΦΩΝΟΥ

ΑΥΤΟΜΑΤΗ ΚΟΠΗ ΧΑΡΤΙΟΥ

ΟΘΟΝΗ

ΕΙΔΟΠΟΙΗΣΗ ΤΟΥ ΠΑΡΑΛΗΠΤΗ ΓΙΑ ΣΥΝΟΜΙΛΙΑ ΜΕ ΤΟΝ ΑΠΟΣΤΟΛΕΑ ΜΕΤΑ ΤΗ ΛΗΨΗ ΤΟΥ ΜΗΝΥΜΑΤΟΣ

ΠΑΡΑΓΩΓΗ ΦΩΤΟΑΝΤΙΓΡΑΦΩΝ

ΜΕΤΑΧΡΟΝΟΛΟΓΗΜΕΝΗ ΑΠΟΣΤΟΛΗ

ΕΠΙΛΟΓΗ ΜΕ ΚΑΤΕΒΑΣΜΕΝΟ ΑΚΟΥΣΤΙΚΟ

ΕΠΑΝΑΛΗΨΗ ΜΕΧΡΙ 7 ΦΟΡΕΣ ΓΙΑ ΑΠΟΣΤΟΛΗ ΦΑΞ

ΑΠΟΣΤΟΛΗ ΜΗΝΥΜΑΤΟΣ ΜΕ ΧΡΕΩΣΗ ΤΟΥ ΠΑΡΑΛΗΠΤΗ (POLLING)

ICFA

INTERNATIONAL COMPUTER FASCIMILE ASSOCIATION. ΣΚΟΠΟΣ-ΤΗΣ ΝΑ ΘΕΣΠΙΣΕΙ ΝΕΑ ΣΤΑΝΤΑΡΝΤΣ ΣΤΟ ΡΑΓΔΑΙΑ ΑΝΑΠΤΥΣΣΟΜΕΝΟ ΧΩΡΟ ΤΟΥ fax-computing, ΤΗΣ ΛΗΨΗΣ ΔΗΛΑΔΗ ΚΑΙ ΔΙΑΧΕΙΡΙΣΗΣ ΜΗΝΥΜΑΤΩΝ ΦΑΞ ΜΕΣΑ ΑΠΟ ΥΠΟΛΟΓΙΣΤΕΣ.
ΙΔΡΥΣΗ 1993 ΑΠΟ 42 ΕΤΑΙΡΙΕΣ.
[COMPUTER GO, MAY 1993]

SPECIFIC

Specific_concepts (level 3) =

FAX PROGRAMS

LanFax Redirector GL, fax server for LAN, Mantis

FAX INDEPENDENT DEVICES

FAX COMPUTER CARDS

FvMcs.machine.GRAMOPHONE

NAME

name::
* McsEngl.conceptIt448,
* McsEngl.machine.GRAMOPHONE@cptIt,
* McsEngl.FvMcs.machine.GRAMOPHONE@cptIt,
* McsEngl.GRAMOPHONE-communication-technology@cptIt,
* McsEngl.gramophone@cptIt448,
* McsEngl.techCmn.GRAMOPHONE@cptIt,
* McsElln.ΓΡΑΜΟΦΩΝΟ@cptIt448,

EVOLUTION#cptCore546.171#

ΓΡΑΜΜΟΦΩΝΟ:
1877 εφευρίσκεται.
[ΔΗΜΗΤΡΙΟΥ-5, 1986, 12#cptResource168]

Doing#cptCore475#

Communication#cptIt53#

GENERIC

_GENERIC:
communication technology#cptItsoft244#

FvMcs.machine.PAGER

NAME

name::
* McsEngl.conceptIt267,
* McsEngl.machine.PAGER@cptIt,
* McsEngl.FvMcs.machine.PAGER@cptIt,
* McsEngl.pager@cptIt267,
* McsElln.ΒΟΜΒΗΤΗΣ@cptIt,

DEFINITION

_DESCRIPTION:

GENERIC

_GENERIC:
* entity.economic.satisfierWorking.techInfo.machine#cptItsoft1.1#
communication technology#cptIt244#

WHOLE

_WHOLE:
RELATED-CONCEPTS#ql:cptIt267#

Doing#cptCore475#

Communication#cptIt53#

SPECIFIC

Specific_concepts (level 3) =

CONFIDANT

Η MOTOROLA ΕΚΑΝΕ ΕΠΙΔΕΙΞΗ ΤΟΥ ΠΙΟ ΠΡΟΣΦΑΤΟΥ ΤΥΠΟΥ ΒΟΜΒΗΤΟΥ, ΠΟΥ ΣΥΓΚΡΙΝΕΤΑΙ ΜΕ ΠΙΣΤΩΤΙΚΗ ΚΑΡΤΑ.
[ΚΑΘΗΜΕΡΙΝΗ, 7 ΜΑΡΤ 1993, 44]

FvMcs.machine.PRINTING-MACHINE

NAME

name::
* McsEngl.conceptIt241,
* McsEngl.machine.PRINTING-MACHINE@cptIt,
* McsEngl.FvMcs.machine.PRINTING-MACHINE@cptIt,
* McsEngl.printing-machine-communication-technology@cptIt,
* McsEngl.printing-machine@cptIt241,
* McsEngl.techInfo.PRINTING-MACHINE@cptIt,
====== lagoGreek:
* McsElln.ΤΥΠΟΓΡΑΦΕΙΟ@cptIt,

DEFINITION

ΤΥΠΟΓΡΑΦΕΙΟ είναι ΤΕΧΝΟΛΟΓΙΑ-ΕΠΙΚΟΙΝΩΝΙΩΝ#cptIt244.1# με την οποία πληροφορίες γράφονται πάνω σε χαρτί.
[ΝΙΚΟΣ, ΜΑΡΤ. 1995]

GENERIC

_GENERIC:
communication technology#cptIt244#

EVOLUTION#cptCore546.171#

1501-1600:
ΑΓΓΛΙΑ, τα τυπογραφεία απο 3 έγιναν 90.
[ΔΗΜΗΤΡΙΟΥ 1, 1978, 125#cptResource166]

1810-1901-1963:
ΑΓΓΛΙΑ, απο 580 το 1810, το 1901 εκδόθηκαν 6000 βιβλία και το 1963 26023.
[ΔΗΜΗΤΡΙΟΥ 1, 1978, 25#cptResource166]

1850-1900:
ΑΓΓΛΙΑ, ΕΦΗΜΕΡΙΔΕΣ:
απο 1/80 έγιναν 1/5 οι ενήλικες που διάβαζαν εφημερίδα.
[ΔΗΜΗΤΡΙΟΥ 1, 1978, 125#cptResource166]

1950-1970:
απο 250.000 βιβλία σε 2,5 δισ αντίτυπα που εκδόθηκαν το 1950, το 1970 εκδόθηκαν 550.000 βιβλία σε 8 δισ. αντίτυπα.
[ΔΗΜΗΤΡΙΟΥ-2, 1980, 86#cptResource167]

Doing#cptCore475#

Communication#cptIt53#

Printing-organization#cptEconomy7.107#

Product


BOOK/ΒΙΒΛΙΑ#cptResource844#
NEWSPAPER/ΕΦΗΜΕΡΙΔΕΣ#cptResource846#
PERIODICAL/ΠΕΡΙΟΔΙΚΑ,

FvMcs.machine.RADIO

NAME

name::
* McsEngl.conceptIt214,
* McsEngl.machine.RADIO@cptIt,
* McsEngl.FvMcs.machine.RADIO@cptIt,
* McsEngl.media.broadcast.RADIO@cptIt,
* McsEngl.radio@cptIt214,
* McsElln.ΡΑΔΙΟΦΩΝΟ@cptIt214,

DEFINITION

Τεχνολογία εκπομπης και λήψης.

GENERIC

_GENERIC:
* tech.info.media.broadcast#ql:tech.info.media.broadcast@cptIt#
* entity.economic.satisfierWorking.techInfo.machine#cptItsoft1.1#
* communication technology#cptItsoft244#

EVOLUTION#cptCore546.171#

{time.1969}:
υπήρχαν στη γη 232 ανα 1000 κατοίκους.
[ΔΗΜΗΤΡΙΟΥ 2, 1980, 203#cptResource167]

1919-1920:
επικρατεί η ραδιοφωνία.
[ΔΗΜΗΤΡΙΟΥ-2, 1980, 202#cptResource167]

Doing#cptCore475#

Communication#cptIt53#

ΣΥΣΤΗΜΑΤΑ ΕΚΠΟΜΠΗΣ

AM (Amplitude Modulation)

FM (Frequency Allocation)

DAB (Digital Audio Broadcasting):
ΘΕΩΡΕΙΤΑΙ Η ΤΡΙΤΗ ΓΕΝΙΑ ΤΩΝ ΡΑΔΙΟΦΩΝΙΚΩΝ ΣΥΣΤΗΜΑΤΩΝ ΕΚΠΟΜΠΗΣ. ΠΟΙΟΤΗΤΑ ΣΑΝ ΚΟΜΠΑΚΤ ΝΤΙΣΚ.

SPECIFICσυστημα εκπομπης κλάσση

DAB RADIO

BBC:
Θα εκπέμπει σε λίγους μήνες.
Ο ΔΕΚΤΗΣ θα κοστίζει αρκετές εκατοντάδες δολάρια.
[ΚΑΘΗΜΕΡΙΝΗ, 11 ΔΕΚ. 1994, 60]

radio.WEB

name::
* McsEngl.radio.WEB@cptIt,

radio.web.GREECE

name::
* McsEngl.radio.web.GREECE@cptIt,
* McsEngl.radio.greece.web@cptIt,

_WEBPAGE.RADIO:
* http://live24.gr//
* http://www.e-radio.gr//
* radio.amagi http://amagiradio.com//
* radio.stokokkino: http://live24.gr/radio/generic.jsp?sid=1379,
* radio.902: http://live24.gr/radio/generic.jsp?sid=1312,
* radio.vima_fm: http://www.e-radio.gr/player/player.asp?sid=722,
* radio.Real Fm 97,8: http://www.e-radio.gr/player/player.asp?sid=680,
* radio.sky: http://www.e-radio.gr/player/player.asp?sid=103,
* radio.alpha: http://www.e-radio.gr/player/player.asp?sid=104,

FvMcs.machine.TAPE-RECORDER

NAME

name::
* McsEngl.conceptIt449,
* McsEngl.machine.TAPE-RECORDER@cptIt,
* McsEngl.FvMcs.machine.TAPE-RECORDER@cptIt,
* McsEngl.techInfo.TAPE-RECORDER@cptIt,
* McsEngl.TAPE-RECORDER-communication-technology@cptIt,
* McsEngl.tape'recorder@cptIt449,
* McsElln.ΜΑΓΝΗΤΟΦΩΝΟ@cptIt449,

EVOLUTION#cptCore546.171#

ΜΑΓΝΗΤΟΦΩΝΟ:
1928 εφευρίσκεται.
[ΔΗΜΗΤΡΙΟΥ-5, 1986, 12#cptResource168]

GENERIC

_GENERIC:
communication technology#cptIt244#

Doing#cptCore475#

Communication#cptIt53#

FvMcs.machine.TELEPHONE

NAME

name::
* McsEngl.conceptIt166,
* McsEngl.machine.TELEPHONE@cptIt,
* McsEngl.FvMcs.machine.TELEPHONE@cptIt,
* McsEngl.phone@cptIt,
* McsEngl.telephone@cptIt,
====== lagoGreek:
* McsElln.ΤΗΛΕΦΩΝΟ@cptIt,
* McsElln.τηλέφωνο@cptIt,

DEFINITION

_DESCRIPTION:

GENERIC

_GENERIC:
* entity.economic.satisfierWorking.techInfo.machine#cptItsoft1.1#
* communication technology#cptIt244#

EVOLUTION#cptCore546.171#

1837:
ΤΗΛΕΓΡΑΦΟΣ, εφευρίσκεται.
[ΔΗΜΗΤΡΙΟΥ 5, 1986, 12#cptResource168]

1861/1876:
ΤΗΛΕΦΩΝΟ. Εφευρίσκεται.
[ΔΗΜΗΤΡΙΟΥ-5, 1986, 12#cptResource168]

1993:
ΤΟ ΤΗΛΕΦΩΝΟ ΤΟΥ ΜΕΛΛΟΝΤΟΣ ΠΑΡΟΥΣΙΑΣΕ ΠΡΙΝ ΛΙΓΕΣ ΜΕΡΕΣ. ΔΕΝ ΕΧΕΙ ΠΛΗΚΡΑ ΑΛΛΑ ΟΘΟΝΗ ΠΟΥ ΕΝΕΡΓΟΠΟΙΕΙΤΑΙ ΜΕ ΑΓΓΙΓΜΑ. ΧΕΙΡΙΖΕΤΑΙ ΕΙΚΟΝΕΣ, ΦΩΝΗ, ΔΕΔΟΜΕΝΑ, ΕΝΩ ΜΕΤΑΔΙΔΕΙ ΑΝΑ ΠΑΣΑ ΣΤΙΓΜΗ ΕΙΚΟΝΕΣ ΤΟΥ ΕΝΟΣ ΟΜΙΛΟΥΝΤΟΣ ΣΤΟΝ ΑΛΛΟ.
ΣΤΟΙΧΙΖΕΙ ΛΙΓΟΤΕΡΟ ΑΠΟ $500.
[ΚΑΘΗΜΕΡΙΝΗ, 14 ΜΑΡΤ 1993, 50]

WINDOWS'TELEPHONY:
ΚΟΙΝΗ ΠΡΟΤΑΣΗ INTEL, MICROSOFT ΓΙΑ ΤΗ ΔΗΜΙΟΥΡΓΙΑ ΕΝΟΣ ΝΕΟΥ ΠΡΟΤΥΠΟΥ ΓΙΑ ΝΑ ΚΑΝΕΙ ΠΙΟ ΕΥΚΟΛΗ ΤΗ ΧΡΗΣΗ ΤΗΛΕΦΩΝΩΝ ΜΕΣΩΝ ΚΟΜΠΙΟΥΤΕΡ.
[COMPUTER GO, JUN 1993, 53]

CONECTORS

RJ-11: είναι ο 8 ακίδων σύνδεσμος (βύσμα) που χρησιμοποιείται στις περισσότερες συνδέσεις φωνής.

RJ-45: είναι ο 8 ακίδων σύνδεσμος που χρησιποποιείται για μετάδοση δεδομένων μέσω twisted pair τηλεφωνικού καλωδίου.

Doing#cptCore475#

Communication#cptIt53#

FUTURE

Σε λιγα χρονια ο καθένας μας θα έχει σε λίγα χρόνια τον δικό του, "προσωπικό" τηλεφωνικό αριθμό, σε όποιο μέρος της Γης κι αν βρίσκεται, ανεξάρτητα από το κινητό τηλέφωνο το οποίο χρησιμοποιεί (το οποίο μπορεί να είναι είτε δικό του είτε νοικιασμένο).
[ΚΑΘΗΜΕΡΙΝΗ, 24 ΑΠΡΙ 1994, 42]

INVENTION

1886 by Graham Bell.

NETWORKS

IDT (INTERNATIONAL DISCOUNT TELECOMMUNICATIONS):
προσφέρει 50% φτηνότερα τηλεφωνήματα για Έλληνες στο εξωτερικο. Τηλ-201-928100

Phone-book

name::
* McsEngl.phone-book@cptIt,

Who Was Listed in the First Telephone Directory?
The first phone book listed 50 telephone owners but had no numbers because switchboard operators did the dialing.

Two years after Alexander Graham Bell patented his telephone in 1876,
Connecticut's New Haven District Telephone Company issued the first
telephone book in the United States. It was, in fact, just a single sheet
of paper. The names of 50 telephone owners were listed, but their actual
phone numbers weren't included because switchboard operators were expected
to connect the callers. This "list of subscribers," dated 21 February 1878,
listed residences, physicians, dentists, stores, and markets in the area
that had telephones. Later that year, a longer New Haven phone book was
published, which also included advertisements.
Read More: http://www.wisegeek.com/who-was-listed-in-the-first-telephone-directory.htm?m {2017-04-02}

PHONE RELIEFE

Είναι ενα σύστημα για να κρατα το τηλεφωνο στο αυτί.
031-253363.

POTS {PLAIN OLD TELEPHONE SERVICE}

measure#cptCore88#

XΩΡΙΣ ΤΗΛΕΦΩΝΟ ΤΟ 65% ΤΩΝ ΝΟΙΚΟΚΥΡΙΩΝ ΤΟΥ ΠΛΑΝΗΤΗ
[NAFTEMPORIKI {1998-04-23}]

Μόνο το 10% του πληθυσμού της γης διαθέτει τηλέφωνο.
[ΚΑΘΗΜΕΡΙΝΗ, 16 ΑΠΡ. 1995, 16]

SPECIFIC

Specific_concepts (level 3) =

ΑΣΥΡΜΑΤΟΣ

1896. εφευρίσκεται.
[ΔΗΜΗΤΡΙΟΥ-1, 1978, 126#cptResource166]

CELLULAR'PHONE#cptIt284: attSpe#

name::
* McsEngl.CELLULAR'PHONE@cptIt,

GENESIS GROUP TELEPHONE

ΤΟ ΤΗΛΕΦΩΝΟ ΤΟΥ ΜΕΛΛΟΝΤΟΣ ΠΑΡΟΥΣΙΑΣΕ ΠΡΙΝ ΛΙΓΕΣ ΜΕΡΕΣ. ΔΕΝ ΕΧΕΙ ΠΛΗΚΡΑ ΑΛΛΑ ΟΘΟΝΗ ΠΟΥ ΕΝΕΡΓΟΠΟΙΕΙΤΑΙ ΜΕ ΑΓΓΙΓΜΑ. ΧΕΙΡΙΖΕΤΑΙ ΕΙΚΟΝΕΣ, ΦΩΝΗ, ΔΕΔΟΜΕΝΑ, ΕΝΩ ΜΕΤΑΔΙΔΕΙ ΑΝΑ ΠΑΣΑ ΣΤΙΓΜΗ ΕΙΚΟΝΕΣ ΤΟΥ ΕΝΟΣ ΟΜΙΛΟΥΝΤΟΣ ΣΤΟΝ ΑΛΛΟ.
ΣΤΟΙΧΙΖΕΙ ΛΙΓΟΤΕΡΟ ΑΠΟ $500.
[ΚΑΘΗΜΕΡΙΝΗ, 14 ΜΑΡΤ 1993, 50]

MOBILE-TELEPHONY#cptIt292: attSpe#

phone.SATELLITE

name::
* McsEngl.phone.SATELLITE@cptIt,
* McsEngl.satellite-phone@cptIt2011,
* McsElln.ΔΟΡΥΦΟΡΙΚΟ-ΤΗΛΕΦΩΝΟ@cptIt,

_DESCRIPTION:
ΔΟΡΥΦΟΡΙΚΟ ΤΗΛΕΦΩΝΟ είναι ΤΗΛΕΦΩΝΟ που λειτουργεί σε ΔΙΚΤΥΟ ΔΟΡΥΦΟΡΩΝ.
[hmnSngo.1996-02]

BATTERY#cptIt181#

Στο Planet 1 η αυτονομία με μπαταρίες λιθίου είναι για συνομιλία μεχρι και 90 λεπτών.
[ΚΑΘΗΜΕΡΙΝΗ, 28 ΙΑΝ. 1996, 51]

NETWORK#cptIt126#

PRICE#cptEconomy541.44#

Το Planet 1 κοστίζει 3000 δολάρια.

Το κόστος επικοινωνίας υπολογίζεται σε 3 δολάρια το λεπτό.
[ΚΑΘΗΜΕΡΙΝΗ, 28 ΙΑΝ. 1996, 51]

structure#cptCore515#

Το Planet 1 της Comsat Communications απαιτεί τη χρήση σταθμού βάσης μεγέθους φορητού υπολογιστή και βάρους 2,5 κιλών.
[ΚΑΘΗΜΕΡΙΝΗ, 28 ΙΑΝ. 1996, 51]

WEIGHT

Το βάρος τους μαζί με τη μπαταρία ξεπερνά τα 400 γραμμάρια ενώ η κεραία φτάνει όταν είναι ανοικτή τα 20 εκατοστά.
[ΡΑΜ, 1998δεκ, 63]

WINDOWS'TELEPHONY

name::
* McsEngl.WINDOWS'TELEPHONY@cptIt,

ΚΟΙΝΗ ΠΡΟΤΑΣΗ INTEL, MICROSOFT ΓΙΑ ΤΗ ΔΗΜΙΟΥΡΓΙΑ ΕΝΟΣ ΝΕΟΥ ΠΡΟΤΥΠΟΥ ΓΙΑ ΝΑ ΚΑΝΕΙ ΠΙΟ ΕΥΚΟΛΗ ΤΗ ΧΡΗΣΗ ΤΗΛΕΦΩΝΩΝ ΜΕΣΩ ΚΟΜΠΙΟΥΤΕΡ.
[COMPUTER GO, JUN 1993, 53]

FvMcs.machine.TELEVISION

name::
* McsEngl.conceptIt216,
* McsEngl.machine.TELEVISION@cptIt,
* McsEngl.FvMcs.machine.TELEVISION@cptIt,
* McsEngl.machine.tv@cptIt216,
* McsEngl.media.broadcast.TELEVISION@cptIt,
* McsEngl.tv@cptIt216,
* McsEngl.television@cptIt216,
* McsElln.ΤΗΛΕΟΡΑΣΗ@cptIt216,

tv'GENERIC

_GENERIC:
* tech.info.media.broadcast#ql:tech.info.media.broadcast@cptIt#
* entity.economic.satisfierWorking.techInfo.machine#cptItsoft1.1#
* communication technology#cptIt244#

tv'ASSOCIATION-OF-COMMERCIAL-TELEVISION

name::
* McsEngl.tv'ASSOCIATION-OF-COMMERCIAL-TELEVISION@cptIt,

24 ΕΥΡΩΠΑΙΚΟΙ ΙΔΙΩΤΙΚΟΙ ΤΗΛΕΟΠΤΙΚΟΙ ΣΤΑΘΜΟΙ.

tv'Channel#cptResource973#

name::
* McsEngl.tv'Channel@cptIt,

tv'CONECTION

name::
* McsEngl.tv'CONECTION@cptIt,

DVI- HDCP
Last modified: Monday, January 13, 2003

Short for high-bandwidth digital-content protection, a specification developed by Intel for protecting digital entertainment content that uses the DVI interface. HDCP encrypts the transmission of digital content between the video source, or transmitter -- such as a computer, DVD player or set-top box -- and the digital display, or receiver -- such as a monitor, television or projector. HDCP is not designed to prevent copying or recording of digital content but to protect the integrity of content as it is being transmitted.

Implementation of HDCP requires a license obtainable from the Digital Content Protection, LLC, which then issues a set of unique secret device keys to all authorized devices. During authentication, the receiver will only accept content once it demonstrates knowledge of the keys. Furthermore, to prevent eavesdropping and stealing of the data, the transmitter and receiver will generate a shared secret value that is consistently checked throughout the transmission. Once authentication is established, the transmitter encrypts the data and sends it to the receiver for decryption.
[http://www.webopedia.com/TERM/H/HDCP.html]

tv'Content

name::
* McsEngl.tv'Content@cptIt,

tv'Size

name::
* McsEngl.tv'Size@cptIt,

LCD 32":
* 97x57 cm, Samsung.

tv'EVALUATION#cptCore546.107#

name::
* McsEngl.tv'EVALUATION@cptIt,

Για δεύτερη συνεχή χρονιά η Ευρωπαϊκή Ενωση Δημοσιογράφων Εικόνας & Ηχου απένειμε το βραβείο καλύτερης τηλεόρασης της χρονιάς στη Philips 28PW9761.
[ΚΑΘΗΜΕΡΙΝΗ, 6 ΟΚΤ. 1996, 63]

tv'EVOLUTION#cptCore546.171#

name::
* McsEngl.tv'EVOLUTION@cptIt,

1929: εφευρίσκεται.
[ΔΗΜΗΤΡΙΟΥ 5, 1986, 12#cptResource168]

1948-1952:
Επικρατεί.
[ΔΗΜΗΤΡΙΟΥ 2, 1980, 202#cptResource167]

1948-1954:
ΑΓΓΛΙΑ από 15.000 δέκτες έγιναν 4.000.000
ΑΜΕΡΙΚΗ από 102.000 " " 30.000.000
[ΔΗΜΗΤΡΙΟΥ 1, 1978, 127#cptResource166]

1969:
υπήρχαν στη γη 87 ανά 1000 κατοίκους.
[ΔΗΜΗΤΡΙΟΥ-2, 1980, 202#cptResource167]

tv'Doing#cptCore475#

name::
* McsEngl.tv'Doing@cptIt,

Communication#cptIt53#

SPECIFIC

* tv.specific,

tv.Interactive

name::
* McsEngl.tv.Interactive@cptIt,
* McsEngl.conceptIt293,
* McsEngl.interactive-television@cptIt,
* McsEngl.interactive'television@cptIt293,
* McsEngl.television'interactive@cptIt293,
* McsElln.ΑΜΦΙΔΡΟΜΗ-ΤΗΛΕΟΡΑΣΗ@cptIt,
* McsElln.ΑΜΦΙΔΡΟΜΟ-ΨΗΦΙΑΚΟ-ΤΗΛΕΟΠΤΙΚΟ-ΔΙΚΤΥΟ@cptIt,

_GENERIC:
* entity.whole.system.it_human#cptItsoft180#

USA vvv

ΘΑ ΒΓΕΙ ΣΤΟΝ ΑΕΡΑ ΣΤΙΣ ΗΠΑ ΜΕΣΑ ΣΤΟ 1993.
ΧΡΕΙΑΖΕΤΑΙ ΕΙΔΙΚΟΣ ΜΕΤΑΤΡΟΠΕΑΣ $200 ΔΟΛΑΡΙΑ.
ΧΡΗΣΕΙΣ. ΤΑΧΥΤΑΤΗ ΚΑΤΑΓΡΑΦΗ ΓΝΩΜΗΣ ΕΝΟΣ ΕΚΑΣΤΟΥ ΤΗΛΕΘΕΑΤΗ.
[ΒΗΜΑ 28 ΦΕΒΡ 1993]

TIME WARNER SYSTEM

TIME WARNER ENTERTAINMENT
ΣΧΕΔΙΑΖΕΙ ΕΝΑ ΑΜΦΙΔΡΟΜΟ ΚΑΛΩΔΙΑΚΟ ΔΙΚΤΥΟ ΣΤΟ ΟΡΛΑΝΤΟ ΤΗΣ ΦΛΟΡΙΝΤΑΣ, ΤΟ ΟΠΟΙΟ ΑΝΑΜΕΝΕΤΑΙ ΝΑ ΤΕΘΕΙ ΣΕ ΠΕΙΡΑΜΑΤΙΚΗ ΛΕΙΤΟΥΡΓΙΑ ΠΕΡΙ ΤΑ ΤΕΛΗ ΤΟΥ 1993 ΚΑΙ ΝΑ ΓΙΝΕΙ ΕΚΜΕΤΑΛΛΕΥΣΙΜΟ ΤΟ 1994.
- Η ΕΤΑΙΡΙΑ ΕΥΕΛΠΙΣΤΕΙ ΝΑ ΕΠΕΚΤΕΙΝΕΙ ΤΟ ΔΙΚΤΥΟ ΣΕ 25 ΑΣΤΙΚΕΣ ΠΕΡΙΟΧΕΣ ΤΩΝ ΗΠΑ ΤΑ ΕΠΟΜΕΝΑ 5 ΧΡΟΝΙΑ.
- ΟΙ ΣΥΝΔΡΟΜΗΤΕΣ ΘΑ ΜΠΟΡΟΥΝ ΝΑ ΔΙΑΛΕΓΟΥΝ ΤΑΙΝΙΕΣ ΤΗΣ ΑΡΕΣΚΕΙΑΣ ΤΟΥΣ, ΝΑ ΚΑΝΟΥΝ ΤΑ ΨΩΝΙΑ ΤΟΥΣ, ΝΑ ΠΑΙΖΟΥΝ ΠΑΙΧΝΙΔΙΑ ΜΕΤΑΞΥ ΤΟΥΣ, ΝΑ ΕΧΟΥΝ ΠΡΟΣΒΑΣΗ ΣΕ ΤΡΑΠΕΖΕΣ ΔΕΔΟΜΕΝΩΝ.
[ΒΗΜΑ, 23 ΜΑΙΟ 1993, Δ44]

ΔΕΚ. 1994:
Αρχισε πειραματικα η έναρξη λειτουργίας,
[ΚΑΘΗΜΕΡΙΝΗ, 18 ΔΕΚ. 1994, 51]

SPAIN vvv

ΗΔΗ ΤΟ ΚΡΑΤΙΚΟ ΤΗΛΕΟΠΤΙΚΟ ΔΙΚΤΥΟ ΠΑΡΕΧΕΙ ΤΕΤΟΙΟΥ ΕΙΔΟΥΣ ΥΠΗΡΕΣΙΕΣ ΣΕ 100.000 ΘΕΑΤΕΣ ΠΟΥ ΤΟΥΣ ΔΙΝΕΙ ΤΗ ΔΥΝΑΤΟΤΗΤΑ
- ΝΑ ΛΑΜΒΑΝΟΥΝ ΜΕΡΟΣ ΣΕ ΤΗΛΕΟΠΤΙΚΑ ΚΑΝΑΛΙΑ
- ΝΑ ΠΑΡΑΚΟΛΟΥΘΟΥΝ ΣΥΓΚΕΚΡΙΜΕΝΟ ΕΠΕΙΣΟΔΙΟ ΣΕΙΡΑΣ
- ΝΑ ΠΑΙΡΝΟΥΝ ΜΕΡΟΣ ΣΕ ΤΗΛΕΟΠΤΙΚΕΣ ΣΥΖΗΤΗΣΕΙΣ
[ΒΗΜΑ, 2 ΜΑΙΟ 1993, Δ44]

tv.Analog ΑΝΑΛΟΓΙΚΗ ΜΕΤΑΔΟΣΗ

name::
* McsEngl.tv.Analog ΑΝΑΛΟΓΙΚΗ ΜΕΤΑΔΟΣΗ@cptIt,

PAL, SECAM, NTSC, MAC, MUSE

MAC:
ΕΥΡΩΠΑΙΚΗ ΠΡΟΔΙΑΓΡΑΦΗ ΠΟΥ ΜΠΟΡΕΙ ΝΑ ΠΙΑΣΟΥΝ ΣΥΝΗΘΕΙΣ ΔΕΚΤΕΣ. ΘΑ ΓΙΝΕΙ ΤΟ ΣΥΣΤΗΜΑ ΥΨΗΛΗΣ ΕΥΚΡΙΝΕΙΑΣ.

NTSC:
ΗΠΑ, 525 ΓΡΑΜΜΕΣ, ΚΑΛΥΠΤΕΙ ΗΠΑ ΑΣΙΑ. 24.5 MHz
The National Television System Commitee, formulated this standard for color television sets in the U.S.: 525 horizontal lines per frame at 30 frames per second with interlaced scans. It is used by all televisions, VCRs, videodisc players, and broadcast and cable TV transmission in the US.

PAL:
ΓΕΡΜΑΝΙΚΟ ΣΥΣΤΗΜΑ 625 ΓΡΑΜΜΕΣ ΚΑΛΥΠΤΕΙ ΤΟ ΜΕΓΑΛΥΤΕΡΟ ΜΕΡΟΣ ΤΗΣ ΔΥΤΙΚΗΣ ΕΥΡΩΠΗΣ. 29.5 MHz.

768X560 σημεία.
[MULTIMEDIA & CD ROM (CGO), MART 1994, 7]

SECAM:
ΤΟ ΓΑΛΛΙΚΟ, 625 ΓΡΑΜΜΕΣ, ΚΑΛΥΠΤΕΙ ΓΑΛΛΙΑ ΑΝΑΤΟΛΙΚΗ ΕΥΡΩΠΗ ΑΦΡΙΚΗ ΜΕΣΗ ΑΝΑΤΟΛΗ.

tv.DIGITAL-TV

name::
* McsEngl.tv.DIGITAL-TV@cptIt,
* McsEngl.conceptIt216.1,
* McsEngl.digital'tv@cptIt216.1,

Digital Cable is the Same As DTV False. Digital Cable is in fact digital, meaning it is transmitted as ones and zeros, but that does not make it DTV or HDTV. It is true that you can get DTV from a Digital Cable subscription, but just because you are getting Digital Cable does not mean you can get DTV and/or HDTV signals.

DTV is the Same As HDTV False. Digital Television, DTV, is a set of 18 different formats for broadcasting televison in a digital format put out by the ATSC. High Defintion Television, HDTV, is six of those 18 DTV formats that has a resolution of at least 720p and has an aspect ratio of 16x9.
[http://www.hdtv.net/]

House approves new digital-TV deadline
Representatives want to complete the country's transition away from analog television by Feb. 17, 2009, freeing up airwaves
[http://news.com.com/, 2005-12-19]

ΤΟ ΜΕΛΛΟΝ ΣΤΗΝ ΤΗΛΕΟΡΑΣΗ ΕΙΝΑΙ ΨΗΦΙΑΚΟ
Η αλλαγή του αιώνα συμπίπτει με την κορύφωση της «ψηφιακής επανάστασης». Όλοι οι διεθνείς αναλυτές προβλέπουν ότι σε δέκα χρόνια από σήμερα τα αναλογικά κανάλια θα αποτελούν στις περισσότερες χώρες της Ευρώπης παρελθόν. Τι συμβαίνει, όμως, στην Ελλάδα; Οι προσδοκίες για το μέλλον είναι πολλές. Ωστόσο, το παρόν είναι θολό.
Του Μάριου Ροζάκου

Οι δύο «μαγικοί» αριθμοί που υπόσχονται να αλλάξουν το τηλεοπτικό τοπίο
1972: Η ψηφιακή τηλεόραση βγαίνει από τα επιστημονικά εργαστήρια. Ένα «παιδίον νέον», που θα έφερνε καταιγιστικές αλλαγές στο τηλεοπτικό πεδίο, είχε γεννηθεί. Από τότε, η τεχνολογική πρόοδος ήταν ραγδαία και σήμερα η διαδικασία της ψηφιοποίησης (της μετατροπής, δηλαδή, του ήχου και της εικόνας στα δύο «μαγικά» νούμερα 0 και 1) υπόσχεται να μπει σε κάθε τηλεοπτικό νοικοκυριό και να μεταμορφώσει τη μικρή οθόνη από βάτραχο σε πρίγκιπα κι εμάς από παθητικούς δέκτες τηλεοπτικών προγραμμάτων σε ενεργούς χρήστες προγραμμάτων, αλλά και υπηρεσιών.
Η ψηφιακή ραδιοτηλεοπτική μετάδοση (Digital Video Broadcasting – DVB) είναι το νέο αγγλοσαξονικό αρκτικόλεξο που φιλοδοξεί να μπει στη ζωή μας. Τα αρχικά θυμίζουν, όχι τυχαία, το DVD. Κοινό σημείο ανάμεσα στις δύο τεχνολογίες; Και οι δύο στοχεύουν στο να μεταφέρουν στις οθόνες μας άριστης ποιότητας εικόνα, που θα συνοδεύεται από κρυστάλλινο στερεοφωνικό ήχο. Το DVB, όμως, φιλοδοξεί να μας προσφέρει ακόμα περισσότερες καινοτομίες και να αλλάξει τις τηλεοπτικές μας συνήθειες (ακόμα και την «ιεροτελεστία» της τηλεσάρωσης, κοινώς ζάπινγκ).
Τα βασικά πλεονεκτήματα της νέας, ψηφιακής τεχνολογίας συνοψίζονται στα εξής:
§ Απόλυτη ευκρίνεια και άριστη ποιότητα ήχου (τα παράσιτα ανήκουν στο παρελθόν)
§ Ο τηλεθεατής μπορεί να επιλέξει τι θα παρακολουθήσει μέσα από μια ευρεία γκάμα προγραμμάτων (πληθώρα θεματικών καναλιών)
§ Ο τηλεθεατής μπορεί να επιλέξει ακόμα και πότε θα παρακολουθήσει το πρόγραμμα της αρεσκείας του
§ Πλήθος υπηρεσιών διατίθενται πλέον από απόσταση με το πάτημα ενός κουμπιού (τραπεζικές συναλλαγές εξ αποστάσεως, τηλεμπόριο, τηλεπαιχνίδια κ.ά.), ακόμη και σύνδεση στο Διαδίκτυο.
Επίσης, χάρη στην ψηφιακή τεχνολογία, ο τηλεθεατής θα έχει τη δυνατότητα να «καθίσει» στην καρέκλα του σκηνοθέτη και να επιλέξει, για παράδειγμα, την κάμερα από την οποία θα παρακολουθήσει ένα στιγμιότυπο ποδοσφαιρικού αγώνα ή πότε θα δει το σκορ, τα στατιστικά και ένα ριπλέι. Ο τομέας προγραμματισμού των καναλιών θα αδυνατίσει, καθώς ο τηλεθεατής θα είναι πλέον εκείνος που θα επιλέγει πότε θα δει μία εκπομπή. Η τεχνολογία παρέχει τη δυνατότητα προβολής 72 διαφορετικών ταινιών μέσα σε μια ημέρα ή μιας ταινίας 48 φορές μέσα στην ίδια ημέρα, με έναρξη προβολής κάθε μισή ώρα. Οι επιλογές του θεατή θα γίνονται με τη βοήθεια ενός τηλεχειριστηρίου που θα θυμίζει το σημερινό, αλλά θα έχει πολλές επιπλέον δυνατότητες. Τον ρόλο του βοηθού σε κάθε επιλογή θα παίζει ο Ηλεκτρονικός Οδηγός Προγράμματος (EPG), ένα είδος εξελιγμένης τηλεκειμενογραφίας (teletext) με εικόνες και πολλές δυνατότητες αμφίδρομων λειτουργιών.
Άλλες εντυπωσιακές καινοτομίες είναι η δυνατότητα, όταν χάσουμε την αρχή ενός προγράμματος, να τη δούμε σε βίντεο, ενώ ταυτοχρόνως θα μαγνητοσκοπείται η συνέχεια του προγράμματος. Για τον σκοπό αυτό, τρεις μεγάλες ιαπωνικές εταιρίες ηλεκτρονικών (πρόκειται για τις Sony, Matsushita και Toshiba) συνένωσαν πρόσφατα τις δυνάμεις τους και έχουν αρχίσει να εξελίσσουν τηλεοπτικούς δέκτες με σκληρό δίσκο και ενσωματωμένες ψηφιακές πολυκάναλες υπηρεσίες επόμενης γενιάς.
Στον νέο ψηφιακό κόσμο, οι συμβατικές διαφημίσεις πιθανότατα δεν θα έχουν θέση, καθώς θα είναι εύκολο ο τηλεθεατής να τις παρακάμψει. Γι’ αυτό, οι περισσότεροι αναλυτές προβλέπουν ότι το κοινό θα έχει την ευκαιρία να επωφεληθεί από μία σειρά κινήτρων, προκειμένου να παρακολουθήσει τα τηλεοπτικά σποτ. Στα μελλοντικά σχέδια των διαφημιστών εντάσσονται και οι διαδραστικές διαφημίσεις (interactive commercials), οι οποίες θα έχουν επικρατήσει μέχρι το 2010, σύμφωνα με τη Zenith Media.
Ελλάδα: η νεοφώτιστη στη λέσχη των ψηφιακών μπουκέτων
Από το 1997 οι συζητήσεις γύρω από την ψηφιακή τηλεόραση άρχισαν να γίνονται όλο και πιο έντονες στη χώρα μας. Εμφανίστηκαν οι πρώτες εταιρίες που ενδιαφέρονταν να επενδύσουν στον τομέα αυτό και η κυβέρνηση γνωστοποίησε την πρόθεσή της να χορηγήσει άδειες αφού πρώτα διαμορφώσει το απαραίτητο θεσμικό πλαίσιο.
Το κενό ήρθε να καλύψει ο νόμος 2644/1998 «για την παροχή συνδρομητικών ραδιοφωνικών και τηλεοπτικών υπηρεσιών». Ένα χρόνο αργότερα, η πρώτη ελληνική ψηφιακή πλατφόρμα ήταν έτοιμη να λειτουργήσει. Επρόκειτο για τη Nova, η οποία προσφέρει από τον Δεκέμβριο του 1999 συνδρομητικές ραδιοτηλεοπτικές υπηρεσίες μέσω δορυφόρου. Οι μέχρι τότε λίγοι σχετικά εραστές των δορυφορικών πιάτων και όσοι παρακολουθούσαν ξένους δορυφορικούς σταθμούς χάρη στην αναμετάδοσή τους στα ερτζιανά από την ΕΡΤ (η οποία ξεκίνησε το 1988 κάτω από ιδιάζουσες συνθήκες και συνεχίζεται κανονικά μέχρι σήμερα, καθώς «ουδέν μονιμότερον του προσωρινού» στη χώρα μας) θα είχαν πλέον μια ενδιαφέρουσα εναλλακτική πρόταση.
Οι συνδρομητές της Nova έχουν τη δυνατότητα να παρακολουθούν τα προγράμματα που μεταδίδονται από τα αναλογικά συνδρομητικά κανάλια της Multichoice Hellas (Filmnet, Supersport, K-TV) και επιπλέον τα Filmsat, BBC World, CNN International, Cartoon Network και Discovery. Προσφέρονται, επίσης, περισσότερα από 100 δορυφορικά προγράμματα ελεύθερης λήψης, ενώ οχτώ ελληνικοί επίγειοι αναλογικοί σταθμοί και ο σταθμός της Βουλής μπορούν να φτάσουν και ψηφιακά στους δέκτες μας μέσω του πακέτου της Nova (πρόκειται για τους ΕΤ1, ΝΕΤ, Μega, Antenna, Star, Alter Channel, Tempo και Mad TV).
Από το σύνολο των καινοτομιών που μπορεί να προσφέρει η ψηφιακή τεχνολογία, η Nova έχει εκμεταλλευτεί μέχρι στιγμής δύο: τις αμφίδρομες υπηρεσίες (όπως είναι η δυνατότητα επιλογής κάμερας, χρόνου εμφάνισης στατιστικών και ριπλέι) κατά την παρακολούθηση σημαντικών αθλητικών γεγονότων και την επιλογή κινηματογραφικών ταινιών και της ώρας μετάδοσής τους μέσα από μια προκαθορισμένη λίστα. Φυσικά, οι υπηρεσίες αυτές θα επεκταθούν στο μέλλον (η επιλογή κάμερας θα μπορεί να γίνει, για παράδειγμα, σε όλες τις αθλητικές μεταδόσεις και η επιλογή ώρας μετάδοσης θα προσφέρεται σε όλα τα προγράμματα).
Η Nova είναι η πρώτη και μοναδική αυτή τη στιγμή εταιρία που παρέχει υπηρεσίες ψηφιακής τηλεόρασης στη χώρα μας. Το χρονικό αυτό προβάδισμα θα το απολαμβάνει απ’ ό,τι φαίνεται για αρκετό καιρό ακόμα, καθώς –ύστερα από το ναυάγιο των διαπραγματεύσεων για μια κοινή εθνική πλατφόρμα– δύο άλλοι ισχυροί υποψήφιοι παίκτες στον χώρο της ψηφιακής που έχουν δηλώσει ότι θα δραστηριοποιηθούν τηρούν επί του παρόντος στάση αναμονής. Πρόκειται για την και το σχήμα Alpha-ΕΡΤ-ΟΤΕ. Η Intersat, παρά τα φιλόδοξα σχέδιά της, επέλεξε προσωρινά τη λύση της συνεργασίας με τη Multichoice (άρα και τη Nova), ενώ το σχήμα του Alpha με τις δύο δημόσιες επιχειρήσεις καλείται να αντιμετωπίσει το νέο τοπίο που δημιουργείται μετά τις εσωτερικές ανακατατάξεις σε αυτό. Ο ΟΤΕ αποφάσισε να αποχωρήσει τον Νοέμβριο του 2000 από το σχήμα, εκτιμώντας ότι η ανάμειξή του στην ψηφιακή τηλεόραση μέσα από την άμεση συμμετοχή σε μία πλατφόρμα ενέχει περισσότερο ρίσκο παρά δυνάμει κέρδος. Η ευνοϊκή μεταχείριση που επιφυλάσσει ο νόμος 2644/1998 στην ΕΡΤ και το γεγονός ότι ο Alpha έχει ήδη εξασφαλίσει άδεια, ενώ επίκειται και η εισαγωγή του στο Χρηματιστήριο Αξιών Αθηνών, υποδηλώνουν πάντως ότι οι δύο εταιρίες δεν έχουν πρόθεση να παραμείνουν θεατές των εξελίξεων.
Το μέλλον της ψηφιακής τηλεόρασης σε Ελλάδα και Ευρώπη: Μεγάλες προσδοκίες
Οι εταιρίες που φιλοδοξούν να ασχοληθούν με την ψηφιακή τηλεόραση στη χώρα μας είναι ήδη καταξιωμένες στον χώρο τους και τα σχέδιά τους φιλόδοξα, άρα το φιλοθεάμον κοινό έχει κάθε λόγο να τρέφει μεγάλες προσδοκίες για το μέλλον των ψηφιακών εκπομπών.
Η Ελλάδα ανήκει στις χώρες εκείνες της Ευρώπης όπου τα δορυφορικά πιάτα σπανίζουν ακόμα. Οι δορυφορικές παραβολικές κεραίες που είναι εγκατεστημένες στην Ελλάδα, το Βέλγιο, τη Φινλανδία, τη Νορβηγία και την Ιρλανδία αποτελούν συνολικά το 2% των δορυφορικών κεραιών της Γηραιάς Ηπείρου. Παράλληλα, στη χώρα μας δεν έχουν αναπτυχθεί ούτε καλωδιακά δίκτυα. Από την άλλη πλευρά, τα επίγεια αναλογικά κανάλια ελεύθερης λήψης που εκπέμπουν σήμερα φτάνουν στο τέλος της ζωής τους. Η μετατροπή τους σε επίγεια ψηφιακά ή δορυφορικά ψηφιακά κανάλια με ή χωρίς συνδρομή αποτελεί μονόδρομο.
Οι συνδρομητικές υπηρεσίες αναμένεται να κερδίσουν έδαφος και στην Ελλάδα, όπως συμβαίνει στην υπόλοιπη Ευρώπη. Υπολογίζεται ότι ο ρυθμός αύξησης των εσόδων από τους συνδρομητικούς σταθμούς στη χώρα μας θα ξεπεράσει σύντομα το 19%. Σε επίπεδο Ευρωπαϊκής Ένωσης, όπως εκτιμά η Zenith Media, μέχρι το 2008 το 57% των νοικοκυριών θα έχει στραφεί στη συνδρομητική τηλεόραση, ενώ μέσα στην επόμενη δεκαετία τα αναλογικά κανάλια αναμένεται είτε να έχουν κλείσει είτε να έχουν μετατραπεί σε ψηφιακά. Το ποσοστό των νοικοκυριών που ήδη πληρώνουν συνδρομή για να παρακολουθήσουν τα προγράμματα της αρεσκείας τους υπολογίζεται σήμερα στο 41%.
Όσον αφορά στον τρόπο μετάδοσης, η δορυφορική μετάδοση αναμένεται να είναι εκείνη που θα κυριαρχήσει στη χώρα μας, καθώς το μεγάλο της πλεονέκτημα είναι ότι μπορεί να προσφέρει άριστη ποιότητα εικόνας και ήχου σε όλη την επικράτεια. Η ιδιαίτερη μορφολογία του εδάφους υποχρεώνει σήμερα τους αναλογικούς σταθμούς να διαθέτουν μεγάλα ποσά για αναμεταδότες σε όλη την Ελλάδα, χωρίς να εξασφαλίζεται πάντα η καλή ποιότητα του σήματος. Μέχρι το 2008, το 61% των ευρωπαϊκών νοικοκυριών θα έχει πρόσβαση στην ψηφιακή τηλεόραση, σύμφωνα με τη Zenith Media, ενώ μία άλλη εταιρία που μελέτησε τον ευρωπαϊκό τηλεοπτικό τομέα, η BNP Equities, υπολόγισε ότι το ποσοστό αυτό μέχρι το 2006 θα έχει φτάσει το 40-50%.
Αμφίδρομη τηλεόραση: η επόμενη πρόκληση;
Το μεγάλο στοίχημα της μετάβασης στην ψηφιακή τεχνολογία δεν σχετίζεται, όμως, μόνο με την τηλεθέαση, αλλά και με τις αμφίδρομες υπηρεσίες. Ειδικοί αναλυτές εκτιμούν, μάλιστα, ότι το μεγαλύτερο τμήμα του τζίρου από την ψηφιακή τηλεόραση θα προέρχεται απ’ αυτές ακριβώς τις υπηρεσίες, και όχι από τα ραδιοτηλεοπτικά προγράμματα. Πολλοί είναι, εξάλλου, εκείνοι που υποστηρίζουν ότι για υπηρεσίες όπως το τηλεμπόριο, η τηλεόραση είναι σίγουρα πιο κατάλληλο μέσο απ’ ό,τι το Διαδίκτυο, γιατί το κοινό είναι ήδη εξοικειωμένο μ’ αυτή τη μέθοδο συναλλαγών. Η άποψη που διατύπωσε για την αμφίδρομη τηλεόραση πριν από πέντε χρόνια ο διευθυντής του RTL Plus GmbH, Helmut Thoma «είναι σαν να πας σ’ ένα εστιατόριο και να σου πει ο σεφ “ορίστε τα υλικά, τώρα κάνε μόνος σου το φαγητό”... Το κοινό θέλει να μείνει παθητικό» θεωρείται ξεπερασμένη από την πλειοψηφία των ειδικών. Το μόνο πρόβλημα είναι ότι, όπως είχε πει ο δικηγόρος με ειδίκευση στα media, John Enser το 1995, «η αμφίδρομη τηλεόραση μοιάζει με τη γέννηση ενός μωρού – είναι ευκολότερο να τη συλλάβεις παρά να τη φέρεις στον κόσμο»!
Παρ’ όλα αυτά, η αμφίδρομη τηλεόραση είναι ήδη εδώ –ή, για να ακριβολογούμε, λίγο πιο μακριά από ’δω, στη Μεγάλη Βρετανία. Παρά την πρόσφατη εμφάνισή της, έχει ήδη καταφέρει να κερδίσει τους συνήθως συντηρητικούς Βρετανούς, οι οποίοι, απαντώντας σε πρόσφατη έρευνα, δήλωσαν ότι προτιμούν την αμφίδρομη τηλεόραση σε ποσοστό 55%, ακόμα κι αν χρειαστεί να δαπανούν γι’ αυτή 15 λίρες κάθε μήνα.
Το μέλλον, λοιπόν, είναι ήδη εδώ και είναι ψηφιακό. Συντρέχουν όλες οι προϋποθέσεις για να κάνει σύντομα αισθητή την παρουσία του και στη χώρα μας. Ήδη, η δραστηριοποίηση ισχυρών τεχνολογικών ομίλων στον τηλεοπτικό τομέα προμηνύει την έναρξη της «ψηφιακής μάχης» και τη στιγμή που γράφονται αυτές οι γραμμές άλλος ένας αναλογικός τηλεοπτικός σταθμός, το Extra Channel, ανακοίνωσε ότι θα εκπέμπει και ελεύθερο ψηφιακό σήμα μέσω δορυφόρου. Αργά ή γρήγορα το τοπίο θα ξεκαθαρίσει και από το ανταγωνιστικό ψηφιακό πεδίο της νέας τηλεοπτικής εποχής ο κερδισμένος θα είναι ένας: ο Έλληνας τηλεθεατής, ο οποίος θα έχει πλέον πολύ περισσότερες επιλογές, καλύτερη ποιότητα σήματος, προγράμματα προσαρμοσμένα στις προτιμήσεις του και, επιπλέον, σύγχρονες αμφίδρομες υπηρεσίες. Και όλα αυτά στο χέρι του –ή, για την ακρίβεια, στο τηλεχειριστήριό του.
[http://www.papaki.panteion.gr/teuxos1/digital.htm]

01. Common terms and abbreviations


ATT: Analogue Terrestrial Television. Conventional television, limited to just 4 or 5 channels.

Bit: A '0' or a '1' - The on/off basis of digital transmission.

CAM: Conditional Access Module, a module which connects to a CI slot and allows access to encrypted channels.

CI: Common Interface, a standard interface which takes PCMCIA type cards.

DOG: Digital Originated Graphic. A logo which appears on the screen of most digital television channels and many analogue channels.

DTT: Digital Terrestrial Television, the means of receiving digital television using an aerial. In the UK the company responsible for DTT is Freeview, who are monitored by the ITC.

DVB: The Digital Video Broadcasting Project, an industry-led consortium of over 300 broadcasters, manufacturers, network operators, software developers, regulatory bodies and others in over 40 countries committed to designing global standards for the delivery of digital television and data services.

EPG: Electronic Program Guide. A guide showing programmes, which can be displayed on a conventional television (via a STB) or iDTV as the now and next programmes or the television schedule for a day or more at a time.

ERP: Effective Radiated Power. Refers to the power of a channel or mux from a transmitter in watts (W) or kilowatts (kW).

FEC: Forward Error Correction. Unlike the internet you cannot get the transmitter to resend information if you didn’t receive it. Forward error correction sends extra information with the transmission so that if a little of the information is lost the receiver can work out which bit is incorrect and what it should be.

FTA: Free To Air. An unencrypted television signal.

FTV: Free To View. An encrypted television signal which can be decoded using a FTV card (free of charge). No subscription charge is required to receive a FTV channel.

HDTV: High Definition Television. A high quality television standard which uses 1080 scan lines (instead of 625) to display a television picture (frame). Currently used in the USA and Australia but not in the UK.

iDTV: Integrated Digital Television. A television with a built in digital tuner which can receive DTT.

ITC: Independent Television Commission, the governing body of television broadcasters (except the BBC who are self-regulated).

MHEG: Multimedia and Hypermedia Experts Group. The MHEG standard defines an object-oriented model for the presentation of multimedia applications. Used for interactive services and digital teletext.

MPEG: Moving Picture Experts Group. Refers to the family of digital video compression standards and file formats developed by the group. Used as the standard to transmit DTT pictures.

MUX: short for multiplex, which holds more than one digital station on a single frequency. Normally achieved using TDM.

NICAM: Near Instantaneous Companded Audio Multiplex. The standard used to broadcast stereo sound in an analogue broadcast.

PAL: Phase Alternating Line. The standard of analogue television transmissions used in the UK, which uses 625 scan lines to display a television picture (frame).

PSB: Public Service Broadcaster. Namely the BBC, which is funded by the licence fee.

QAM: A digital transmission mode, standing for Quadrature Amplitude Modulation. QAM is a means of sending multiple bits using a single pulse of signal. In basic terms, this means that instead of sending a single bit in one go you can transmit many. More bits means more bandwidth and hence more channels.

RGB: Red, Green, Blue. A type of video signal output (usually via a SCART socket), giving a higher quality signal than a composite video signal.

RSL: Restricted Service Licence. A licence to broadcast a low power regional analogue television service.

SCART: Syndicat Francais des Constructeurs d'Appareils Radio et Television. A connector with 21 pins found on the back of most televisions, STBs, DVDs and video cassette recorders (VCRs).

SDN: S4C Digital Networks, the multiplex operator for mux A which carries Five, S4C and some shopping channels.

Stat MUX: A more advanced type of multiplexing where if the first channel is fast moving and the other 3 are slow moving, the first channel is allocated more timeslots than the other 3 channels.

STB: Set-top box

TDM: Time division multiplexing, the simplest form of multiplexing. For example, if 4 channels need to be sent on one multiplex, they are sent as (F=Frame, C=Channel)
1st F 1st C | 1st F 2nd C | 1st F 3rd C | 4th F 1st C | 2nd F 1st C | 2nd F 2nd C | and so on.

ΕΡΤ

19. Σε ποια συχνότητα (ΜΗΖ) εκπέμπεται το σήμα της ψηφιακής σε μεγακύκλους;
Το σήμα εκπέμπεται από τη συχνότητα των 690 ΜΗΖ.

20. Θα υπάρχει δυνατότητα εγγραφής σε βίντεο από την ψηφιακή τηλεόραση;
Βεβαίως, αν και υπάρχουν κάποιοι τεχνικοί περιορισμοί. Θα πρέπει, κατ’ αρχάς, ο αποκωδικοποιητής να είναι σωστά συντονισμένος και να έχει δύο εξόδους τύπου scart: μια έξοδο TV SCART και μία έξοδο VCR SCART. Έτσι θα μπορείτε να γράψετε κάποιο πρόγραμμα ενώ παρακολουθείτε κάποιο άλλο.

21. Χρειάζεται να εγκατασταθεί “πιάτο” προκειμένου να έχω πρόσβαση στα νέα ψηφιακά κανάλια;
Όχι. Μόνον η σύνδεση με αποκωδικοποιητή είναι απαραίτητη. Δεν χρειάζεται καμία άλλη εγκατάσταση.

22. Πόσα είναι τα νέα κανάλια της ψηφιακής τηλεόρασης και τι ακριβώς προτείνουν;
Η ψηφιακή τηλεόραση της ΕΡΤ ξεκινά με τρία νέα κανάλια: Το Πρίσμα+, που θα είναι πολυσυλλεκτικό κανάλι με προσβασιμότητα στα άτομα με αναπηρίες. Το Σινέ+, που θα περιλαμβάνει ταινίες, ντοκιμαντέρ και σίριαλ, και το Σπορ+, που θα μεταδίδει αθλητικές εκπομπές, μουσικάπρογράμματα, ειδήσεις και ενημερωτικές εκπομπές.

23. Θα προστεθούν κι άλλα κανάλια στην ψηφιακή τηλεόραση;
Αρχικά θα μεταδίδονται μόνο τα κανάλια Πρίσμα+, Σινέ+, Σπορ+ και το κυπριακό ΡΙΚ Sat.  

24. Μέχρι το 2008 θα φτάνει το σήμα της επίγειας ψηφιακής τηλεόρασης σ’ όλη την Ελλάδα;
Αμέσως μετά τον πομπό του Υμηττού θα εγκατασταθούν κι άλλοι στην Πάρνηθα, στην Αίγινα, στη Θεσσαλονίκη και στη Θεσσαλία. Στη συνέχεια υπάρχει προγραμματισμός για όλη την Ελλάδα, οπότε είναι πιθανό μέχρι τότε να έχει πρόσβαση ολόκληρη η επικράτεια στα νέα ψηφιακά κανάλια.

25. Όταν η πρόσβαση στα κανάλια της ΕΡΤ γίνεται μόνο μέσω δορυφόρου, υπάρχει δυνατότητα πρόσβασης μέσω του αποκωδικοποιητή στα νέα ψηφιακά κανάλια;
Όχι. Αφού, προς το παρόν, πρόκειται για επίγεια μετάδοση της ψηφιακής τηλεόρασης.

26. Πότε ξεκινάει η εκπομπή των νέων ψηφιακών καναλιών;
Η εκπομπή των προγραμμάτων θα γίνει σταδιακά. Τον Μάρτιο ξεκινά το Πρίσμα+, τον Απρίλιο το Σινέ+ και τον Μάιο το Σπορ+.27. Το Mundial θα μεταδοθεί από την ψηφιακή τηλεόραση;
Δεν υπάρχει ακόμα το ακριβές πρόγραμμα, αλλά το συγκεκριμένο γεγονός θα μεταδοθεί σίγουρα από την αναλογική τηλεόραση της ΕΡΤ, χωρίς να αποκλείεται η επιλογή μετάδοσης κάποιων αγώνων και από την ψηφιακή συχνότητα του Σπορ+.

28. Πόσα ντεσιμπέλ θα είναι ο ήχος των προγραμμάτων που θα προβάλλονται από την ψηφιακή τηλεόραση;
Τα ντεσιμπέλ του ήχου (db) εξαρτώνται από την τηλεοπτική συσκευή που διαθέτει ο καθένας. Πάντως, όσοι διαθέτουν συστήματα home cinema θα έχουν την ευχέρεια να απολαύσουν τον κρυστάλλινο ήχο της ψηφιακής συχνότητας και την αίσθηση ότι βρίσκονται σε κινηματογραφική αίθουσα.

29. Η ψηφιακή τηλεόραση θα εκπέμπει σε φόρμα 16:9 ή 4:3;
Θα εκπέμπει και με τους δύο τρόπους, ανάλογα με το πρόγραμμα.

30. Για να έχουμε πρόσβαση στα νέα ψηφιακά προγράμματα, χρειάζεται πρόσθετη κεραία;
Όχι, δεν χρειάζεται καμία άλλη εγκατάσταση. Ωστόσο, όσο καλύτερη κεραία διαθέτουμε τόσο ισχυρότερο θα είναι και το σήμα λήψης όλων των καναλιών.31. Πού θα δημοσιεύεται το πρόγραμμα της ψηφιακής τηλεόρασης;
Το βέβαιο είναι ότι θα δημοσιεύεται από το περιοδικό ΡΑΔΙΟΤΗΛΕΟΡΑΣΗ, χωρίς να αποκλείουμε τη δημοσίευση από όλες τις τηλεοπτικές στήλες των άλλων ΜΜΕ.

32. Σε ποιο κανάλι εκπέμπεται το σήμα της ψηφιακής τηλεόρασης;
Στην Αττική στο κανάλι 48 UHF και από τους πομπούς Υμηττού, Πάρνηθας και Αίγινας. Στη Θεσσαλονίκη στο κανάλι 56 UHF (Χορτιάτης) και στη Θεσσαλία στο κανάλι 53 UHF (Πήλιο).

33. Θα είναι ευάλωτη η ψηφιακή τηλεόραση στις κακές καιρικές συνθήκες;
Οι πομποί που εκπέμπουν το σήμα της ψηφιακής τηλεόρασης επηρεάζονται από τα καιρικά φαινόμενα μόνο σε περίπτωση ακραίων καταστάσεων. Το ίδιο άλλωστε συμβαίνει και με τα αναλογικά σήματα όλων των τηλεοπτικών σταθμών.

34. Ποιο θα είναι το όφελος για την ελληνική οικονομία, από την ψηφιακή τηλεόραση; Θα υπάρξουν νέες θέσεις εργασίας;
Ασφαλώς, αφού δημιουργείται μια νέα αγορά με σταδιακή επέκταση σε εμπορικές δραστηριότητες, ειδικά με την ανάπτυξη των διαδραστικών προγραμμάτων.Γενικότερα, στην Ευρωπαϊκή Ένωση η αύξηση των θέσεων εργασίας στην τηλεοπτική παραγωγή αυξάνεται με ρυθμό 45% ετησίως, τα τελευταία δέκα χρόνια, ενώ πολλά ευρωπαϊκά προγράμματα χρηματοδοτούν επενδύσεις που συνδέονται με τις νέες τεχνολογίες.

35. Θα σταματήσει η εκπομπή της αναλογικής τηλεόρασης;
Σύμφωνα με οδηγία της Ένωσης, όλες οι ευρωπαϊκές χώρες θα πρέπει να σταματήσουν την προβολή των αναλογικών προγραμμάτων μέχρι το τέλος του 2012.

tv.HDTV (TVHD)

name::
* McsEngl.tv.HDTV (TVHD)@cptIt,

What Is HDTV?
If you have read How Television Works, then you know all about what is now called analog TV. In analog TV, a 6 MHz analog signal carries intensity and color information for each scan line of the picture. An analog TV signal in the U.S. has 525 scan lines for the Shopping for an HDTV?

To truly experience HDTV programming, you need an HDTV tuner and a high-resolution monitor. Check out StuffGuide.com for more information. image, and each image is refreshed every 30th of a second (half of the scan lines are painted every sixtieth of a second in what is called an interlaced display). The horizontal resolution is something like 500 dots for a color set. This level of resolution was amazing 50 years ago, but today it is rather passe. The lowest resolution computer monitor that anyone uses today has 640x480 pixels, and most people use a resolution like 800x600 or 1024x768. We have grown comfortable with the great clarity and solidity of a computer display, and analog TV technology pales by comparison.
Many of the new satellite systems, as well as DVDs, use a digital encoding scheme that provides a much clearer picture. In these systems, the digital information is converted to the analog format to display it on your analog TV. The image looks great compared to a VHS tape, but it would be twice as good if the conversion to analog didn't happen.
There is now a big push underway to convert all TV sets from analog to digital, so that digital signals drive your TV set directly.
When you read and hear people talking about digital television (DTV), what they are talking about is the transmission of pure digital television signals, along with the reception and display of those signals on a digital TV set. The digital signals might be broadcast over the air or transmitted by a cable or satellite system to your home. In your home, a decoder receives the signal and uses it, in digital form, to directly drive your digital TV set.
There is a class of digital television that is getting a lot of press right now. It is called high-definition television, or HDTV. HDTV is high-resolution digital television (DTV) combined with Dolby Digital surround sound (AC-3). HDTV is the highest DTV resolution in the new set of standards. This combination creates a stunning image with stunning sound. HDTV requires new production and transmission equipment at the HDTV stations, as well as new equipment for reception by the consumer. The higher resolution picture is the main selling point for HDTV. Imagine 720 or 1080 lines of resolution compared to the 525 lines people are used to in the United States (or the 625 lines in Europe) -- it's a huge difference!
Of the 18 DTV formats, six are HDTV formats, five of which are based on progressive scanning and one on interlaced scanning. Of the remaining formats, eight are SDTV (four wide-screen formats with 16:9 aspect ratios, and four conventional formats with 4:3 aspect ratios), and the remaining four are video graphics array (VGA) formats. Stations are free to choose which formats to broadcast.
The formats used in HDTV are:
720p - 1280x720 pixels progressive
1080i - 1920x1080 pixels interlaced
1080p - 1920x1080 pixels progressive
"Interlaced" or "progressive" refers to the scanning system. In an interlaced format, the screen shows every odd line at one scan of the screen, and then follows that up with the even lines in a second scan. Since there are 30 frames shown per second, the screen shows one half of the frame every sixtieth of a second. For smaller screens, this is less noticeable. As screens get larger, the problem with interlacing is flicker.
Progressive scanning shows the whole picture, every line in one showing, every sixtieth of a second. This provides for a much smoother picture, but uses slightly more bandwidth.
[http://electronics.howstuffworks.com/hdtv1.htm] 2005-08-15

ΟΘΟΝΗ 1000 ΓΡΑΜΜΩΝ, 16/9 ΣΧΗΜΑ, ΣΤΕΡΕΟ ΗΧΟ.
ΟΘΟΝΗ 1200 ΓΡΑΜΜΩΝ. ΚΑΙΝΟΥΡΓΙΟΥΣ ΔΕΚΤΕΣ.

19/11/1992 ΤΟ ΣΥΜΒΟΥΛΙΟ ΤΩΝ ΥΠΟΥΡΓΩΝ ΤΗΛΕΠΙΚΟΙΝΩΝΙΩΝ ΔΕΝ ΕΝΕΚΡΙΝΕ ΤΟ ΠΡΟΓΡΑΜΑ ΔΡΑΣΗΣ ΚΑΙ ΑΝΟΙΓΕΤΑΙ Ο ΔΡΟΜΟΣ ΓΙΑ ΤΟ ΑΜΕΡΙΚΑΝΙΚΟ ΣΥΣΤΗΜΑ.
ΙΟΥΝ 1993: ΟΙ ΑΡΜΟΔΙΟΙ ΥΠΟΥΡΓΟΙ ΣΥΜΦΩΝΟΥΝ ΝΑ ΔΑΠΑΝΗΣΕΙ Η ΚΟΙΝΟΤΗΤΑ 228 ΕΚ ECU ΓΙΑ ΝΑ ΒΟΗΘΗΣΕΙ ΑΥΤΟΥΣ ΠΟΥ ΘΑ ΜΕΤΑΔΩΣΟΥΝ ΠΡΟΓΡΑΜΜΑΤΑ.
[ΝΕΑ, 18 ΙΟΥΝ 1993, 33]

tv.WEB

name::
* McsEngl.tv.WEB@cptIt,
* McsEngl.tvWeb@cptIt,
* McsEngl.webtv@cptIt,

_EMBEND_CODE:
<iframe frameborder="0" scrolling="no" width="720" height="406"
src="http://webtv.ert.gr/webtv/sharecontent/webshare.html" name="imgbox" id="webshare"></iframe>

_WEB.TV:
* ΕΡΤ1: http://webtv.ert.gr/webtv/ert/tv/ert1.html,
* Βουλή: http://parltv.live.grnet.gr/webtv/#light,

FvMcs.machine.VIDEOPHONE

NAME

name::
* McsEngl.conceptIt189,
* McsEngl.machine.VIDEOPHONE@cptIt,
* McsEngl.FvMcs.machine.VIDEOPHONE@cptIt,
* McsEngl.VIDEOPHONE@cptIt,
* McsEngl.videophone@cptIt189,
* McsElln.ΒΙΝΤΕΟΤΗΛΕΦΩΝΟ@cptIt189,
* McsElln.ΕΙΚΟΝΟΤΗΛΕΦΩΝΟ@cptIt,

DEFINITION

_DESCRIPTION:

GENERIC

_GENERIC:
* entity.economic.satisfierWorking.techInfo.machine#cptItsoft1.1#
communication technology#cptIt244#

Doing#cptCore475#

Communication#cptIt53#

SPECIFIC

Specific_concepts (level 3) =

AT&T: VIDEOPHONE 2500. $1500
MCI: $750 Begining of 1993

FvMcs.stmIt.COMPUTER-SYSTEM

NAME

name::
* McsEngl.conceptIt453,
* McsEngl.stmIt.COMPUTER-SYSTEM@cptIt,
* McsEngl.FvMcs.stmIt.COMPUTER-SYSTEM@cptIt,
* McsEngl.entity.whole.system.it.hard-soft@cptIt453, {2012-07-21}
* McsEngl.computer-structure@cptIt453, {2008-01-26}
* McsEngl.computer-system@cptIt, {1999-09-23}
* McsEngl.computer'system@cptIt453,
* McsEngl.computing-machine@cptIt453,
* McsEngl.hardsoft-system@cptIt453, {2012-04-26}
* McsEngl.hard-soft-system@cptIt453, {2011-09-06}
* McsEngl.hardware-software-system@cptIt453, {2011-09-06}
* McsEngl.information'machine'system@cptIt453,
* McsEngl.machine.computing@cptIt453, {2015-08-29}
* McsEngl.systemComputer@cptIt453, {2011-08-29}
* McsEngl.systemHardSoft@cptIt453, {2012-03-06}
* McsEngl.ims@cptIt453,
* McsEngl.sysCmp@cptIt453, {2011-08-29}
* McsEngl.sysHardSoft@cptIt453, {2012-04-26}
* McsEngl.sysHS@cptIt453, {2011-09-06}
* McsEngl.sysItHrdSft@cptIt453, {2012-05-05}
* McsEngl.sysItSftHrd@cptIt453, {2012-05-05}
* McsEngl.sysHrdSft@cptIt453, {2012-05-05}
* McsEngl.sysSftHrd@cptIt453, {2012-05-05}
====== lagoGreek:
* McsEngl.INFORMATION-MACHINE-SYSTEM@cptIt,
* McsElln.ΠΛΗΡΟΦΟΡΙΑΚΗΣ-ΜΗΧΑΝΗΣ-ΣΥΣΤΗΜΑ@cptIt,
* McsElln.υλικολογισμικο-συστημα@cptIt453,

COMPUTER_STRUCTURE:
I use this term, because as "computer_system" they call and a stand alone computer.
[KasNik, 2008-01-26]

* "The earliest computing machines had fixed programs".
[http://en.wikipedia.org/wiki/Von_Neumann_architecture] 2007-12-29

DEFINITION

INFORMATION-MACHINE SYSTEM ονομάζω ένα ITS χωρις τους ανθρωπους σαν εσωτερικο χαρακτηριστικό.

ΠΛΗΡΟΦΟΡΙΑΚΗΣ ΜΗΧΑΝΗΣ ΣΥΣΤΗΜΑ ονομάζω το ΣΥΣΤΗΜΑ υλικου-λογισμικου, κάποιου πληροφοριακών-τεχνολογιών-συστηματος, ΠΟΥ επεξεργάζεται πληροφορια.
[ΝΙΚΟΣ, 20 ΣΕΠΤ. 1994]

COMPUTER SYSTEM I call any 'computer#cptIt227.2#' (stand alone computer) or 'computer-network#cptIt21.2#'.
[nikkas {1999-09-23}]

stmCmr'WHOLE

_WHOLE:
* system.it_human#cptItsoft180#

stmCmr'PART

HARDWARE:
INFORMATION-MACHINE#cptIt456: attPar#

SOFTWARE:
DATA (are the data of its),
PROGRAM#cptIt59: attPar#

stmCmr'Architecture#cptIt417: attPar#

name::
* McsEngl.stmCmr'Architecture@cptIt,

stmCmr'Doing

name::
* McsEngl.stmCmr'Doing@cptIt,

stmCmr'Hardare

name::
* McsEngl.stmCmr'Hardare@cptIt,
* McsEngl.conceptIt456,
* McsEngl.hardware'of'computer'system@cptIt456,
* McsEngl.ims'hardware@cptIt456,
* McsEngl.information-machine@cptIt,
* McsEngl.information'machine@cptIt456,
* McsEngl.infomachine@cptIt456,
* McsElln.ΠΛΗΡΟΦΟΡΙΑΚΗ-ΜΗΧΑΝΗ@cptIt,

_DESCRIPTION:
INFORMATION MACHINE is the HARDWARE part of an INFORMATION-MACHINE-SYSTEM#cptIt453.1#.
[NIKOS, 24 SEP. 1994]

_PART:
ONE machine OR MANY connected. On this attribute we classify the information machine in NETWORK & STAND-ALONE.

stmCmr'Specification-formal

_CREATED: {2007-12-04}

name::
* McsEngl.stmCmr'Specification-formal@cptIt,

A formal specification is a mathematical description of software or hardware that may be used to develop an implementation. It describes what the system should do, not (necessarily) how the system should do it. Given such a specification, it is possible to use formal verification techniques to demonstrate that a candidate system design is correct with respect to the specification. This has the advantage that incorrect candidate system designs can be revised before a major investment has been made in actually implementing the design. An alternative approach is to use provably correct refinement steps to transform a specification into a design, and ultimately into an actual implementation, that is correct by construction.

It is important to note that a design (or implementation) cannot ever be declared “correct” in isolation, but only “correct with respect to a given specification”. Whether the formal specification correctly describes the problem to be solved is a separate issue. It is also a difficult issue to address, since it ultimately concerns the problem constructing abstracted formal representations of an informal concrete problem domain, and such an abstraction step is not amenable to formal proof. However, it is possible to validate a specification by proving “challenge” theorems concerning properties that the specification is expected to exhibit. If correct, these theorems reinforce the specifiers understanding of the specification and its relationship with the underlying problem domain. If not, the specification probably needs to be changed to better reflect the domain understanding of those involved with producing (and implementing) the specification.

The Z notation is an example of a leading formal specification language. Others include the Specification Language(VDM-SL) of the Vienna Development Method and the Abstract Machine Notation (AMN) of the B-Method.
[http://en.wikipedia.org/wiki/Formal_specification]

stmCmr'GENERIC

_GENERIC:
* entity.whole.system.it#cptItsoft277#

SPECIFIC

stcCmr.specific,

_SPECIFIC:
* computer_system.network#cptIt21#
* computer_system.networkNo#cptItsoft227#

cmrstm.FAULT-TOLERANT

_CREATED: {2017-10-07}

name::
* McsEngl.cmrstm.FAULT-TOLERANT@cptIt,
* McsEngl.fault-tolerant-computer-system@cptIt,

_DESCRIPTION:
Fault-tolerant computer systems are systems designed around the concepts of fault tolerance. In essence, they must be able to continue working to a level of satisfaction in the presence of faults.
Fault tolerance is not just a property of individual machines; it may also characterise the rules by which they interact. For example, the Transmission Control Protocol (TCP) is designed to allow reliable two-way communication in a packet-switched network, even in the presence of communications links which are imperfect or overloaded. It does this by requiring the endpoints of the communication to expect packet loss, duplication, reordering and corruption, so that these conditions do not damage data integrity, and only reduce throughput by a proportional amount.
Recovery from errors in fault-tolerant systems can be characterised as either 'roll-forward' or 'roll-back'. When the system detects that it has made an error, roll-forward recovery takes the system state at that time and corrects it, to be able to move forward. Roll-back recovery reverts the system state back to some earlier, correct version, for example using checkpointing, and moves forward from there. Roll-back recovery requires that the operations between the checkpoint and the detected erroneous state can be made idempotent. Some systems make use of both roll-forward and roll-back recovery for different errors or different parts of one error.
[https://en.wikipedia.org/wiki/Fault-tolerant_computer_system]

FvMcs.stmIt.NETWORK-(netIt)

_CREATED: {2013-12-30}

name::
* McsEngl.conceptIt451,
* McsEngl.stmIt.NETWORK-(netIt)@cptIt,
* McsEngl.FvMcs.stmIt.NETWORK-(netIt)@cptIt,
* McsEngl.techInfo.NETWORK@cptIt,
* McsEngl.telecommunications-network@cptIt451,
* McsEngl.communication-technology-system@cptIt,
* McsEngl.communications-system@cptIt,
* McsEngl.computer-system.network@cptIt, {2017-10-07}
* McsEngl.infotech-network@cptIt, {2015-08-14}
* McsEngl.it-network@cptIt, {2015-08-14}
* McsEngl.network.informatics@cptIt, {2015-08-14}
* McsEngl.network.information-technology@cptIt,
* McsEngl.network.infotech@cptIt,
* McsEngl.network.it@cptIt,
* McsEngl.techComm.SYSTEM@cptIt,
* McsEngl.netIt@cptIt451, {2014-01-23}
* McsEngl.nwkIt@cptIt, {2015-08-14}
* McsEngl.itnet@cptIt451, {2014-01-23}
* McsEngl.comtechsys@cptIt451,
* McsEngl.telecommunications-network@cptIt, {2015-08-14}
* McsEngl.communication-technology-system@cptIt, {2015-08-14}
* McsEngl.communications-system@cptIt, {2015-08-14}
* McsEngl.infotech-network@cptIt, {2015-08-14}
* McsEngl.it-network@cptIt, {2015-08-14}
* McsEngl.network.informatics@cptIt, {2015-08-14}
* McsEngl.network.information-technology@cptIt, {2015-08-14}
* McsEngl.network.infotech@cptIt, {2015-08-14}
* McsEngl.network.it@cptIt, {2015-08-14}
* McsEngl.techComm.SYSTEM@cptIt, {2015-08-14}
* McsEngl.netIt@cptIt, {2015-08-14}
* McsEngl.nwkIt@cptIt, {2015-08-14}
* McsEngl.itnet@cptIt, {2015-08-14}
* McsEngl.comtechsys@cptIt, {2015-08-14}
* McsElln.δίκτυο.τεχνολογίας-πληροφορίας@cptIt, {2015-08-14}
* McsElln.δίκτυο.πληροφορίας-τεχνολογίας@cptIt, {2015-08-14}
* McsElln.δίκτυο.πληροφορικής@cptIt, {2015-08-14}

DEFINITION

_DESCRIPTION:
A telecommunications network is a collection of terminal nodes, links and any intermediate nodes which are connected so as to enable telecommunication between the terminals.

The transmission links connect the nodes together. The nodes use circuit switching, message switching or packet switching to pass the signal through the correct links and nodes to reach the correct destination terminal.

Each terminal in the network usually has a unique address so messages or connections can be routed to the correct recipients. The collection of addresses in the network is called the address space.

Examples of telecommunications networks are:
computer networks
the Internet
the telephone network
the global Telex network
the aeronautical ACARS network
[http://en.wikipedia.org/wiki/Telecommunications_network]
===
In telecommunication, a communications system is a collection of individual communications networks, transmission systems, relay stations, tributary stations, and data terminal equipment (DTE) usually capable of interconnection and interoperation to form an integrated whole. The components of a communications system serve a common purpose, are technically compatible, use common procedures, respond to controls, and operate in union. Telecommunications is a method of communication (e.g., for sports broadcasting, mass media, journalism, etc.). A communications subsystem is a functional unit or operational assembly that is smaller than the larger assembly under consideration.
[http://en.wikipedia.org/wiki/Communications_system] 2013-12-30,
===

netIt'whole.SYSTEM-HUMAN

name::
* McsEngl.netIt'whole.SYSTEM-HUMAN@cptIt,
* McsEngl.conceptIt451.1,

_GENERIC:
* stmIth#cptItsoft180#

_DESCRIPTION:
The itnet plus the-humans interact with.
[hmnSngo.2015-08-22]

netIt'OTHER-VIEW#cptCore505#

name::
* McsEngl.netIt'OTHER-VIEW@cptIt,

_OTHER_VIEW:

COMMUNICATIONS-SYSTEM

_DESCRIPTION:
In telecommunication, a communications system is a collection of individual communications networks, transmission systems, relay stations, tributary stations, and data terminal equipment (DTE) usually capable of interconnection and interoperation to form an integrated whole. The components of a communications system serve a common purpose, are technically compatible, use common procedures, respond to controls, and operate in union. Telecommunications is a method of communication (e.g., for sports broadcasting, mass media, journalism, etc.). A communications subsystem is a functional unit or operational assembly that is smaller than the larger assembly under consideration.
[https://en.wikipedia.org/wiki/Communications_system]

netIt'PART

_PART:

netIt'part.SEGMENT

name::
* McsEngl.netIt'part.SEGMENT@cptIt,
* McsEngl.network-segment@cptIt,

_DESCRIPTION:
A network segment is a portion of a computer network. The nature and extent of a segment depends on the nature of the network and the device or devices used to interconnect end stations.[1]
[https://en.wikipedia.org/wiki/Network_segment]

netIt'address

NAME

name::
* McsEngl.netIt'address@cptIt,
* McsEngl.conceptIt35,
* McsEngl.network-account@cptIt,
* McsEngl.network-address@cptIt,
* McsEngl.network-id@cptIt,
* McsEngl.network-naming-system@cptIt,

DEFINITION

_DESCRIPTION:

A network address is an identifier for a node or network interface of a telecommunications network.

Network addresses are often designed to be unique across the network, although some networks allow for relative or local addresses that may not be unique.

More than one type of network address may be used in any one network.

In some cases terminal nodes may have more than one network address, for example, each link interface may be uniquely identified. In addition, non terminal nodes are often assigned network addresses.

Examples[edit]

Classful address
IP address
IPX Address
Network layer address,
X.25/X.21 address
MAC address
Host address
[http://en.wikipedia.org/wiki/Network_address]

netIt'channel

name::
* McsEngl.netIt'channel@cptIt,
* McsEngl.conceptIt168,

DEFINITION

One OR two way communication line.

ΤΑ ΜΕΣΑ ΜΕΤΑΔΟΣΗΣ ΑΠΟΤΕΛΟΥΝ ΤΟΝ ΦΥΣΙΚΟ ΔΡΟΜΟ ΜΕΤΑΞΥ ΤΟΥ ΕΚΠΟΜΠΟΥ ΚΑΙ ΤΟΥ ΔΕΚΤΗ ΣΕ ΕΝΑ ΟΠΟΙΔΗΠΟΤΕ ΣΥΣΤΗΜΑ ΕΠΙΚΟΙΝΩΝΙΑΣ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 25#cptResource223]

In telecommunications and computer networking, a communication channel, or channel, refers either to a physical transmission medium such as a wire, or to a logical connection over a multiplexed medium such as a radio channel. A channel is used to convey an information signal, for example a digital bit stream, from one or several senders (or transmitters) to one or several receivers. A channel has a certain capacity for transmitting information, often measured by its bandwidth in Hz or its data rate in bits per second.

Communicating data from one location to another requires some form of pathway or medium. These pathways, called communication channels, use two types of media: cable (twisted-pair wire, cable, and fiber-optic cable) and broadcast (microwave, satellite, radio, and infrared). Cable or wire line media use physical wires of cables to transmit data and information. Twisted-pair wire and coaxial cables are made of copper, and fiber-optic cable is made of glass.

In information theory, a channel refers to a theoretical channel model with certain error characteristics. In this more general view, a storage device is also a kind of channel, which can be sent to (written) and received from (read).
[http://en.wikipedia.org/wiki/Communication_channel] 2013-12-30,
In telecommunications and computer networking, a communication channel, or channel, refers either to a physical transmission medium such as a wire, or to a logical connection over a multiplexed medium such as a radio channel. A channel is used to convey an information signal, for example a digital bit stream, from one or several senders (or transmitters) to one or several receivers. A channel has a certain capacity for transmitting information, often measured by its bandwidth in Hz or its data rate in bits per second

In information theory, a channel refers to a theoretical channel model with certain error characteristics. In this more general view, a storage device is also a kind of channel, which can be sent to (written) and received from (read).
[http://en.wikipedia.org/wiki/Communication_channel]

cmnchl'GENERIC

_GENERIC:
CommTech HARDWARE#cptIt289#

cmnchl'WHOLE

_WHOLE:
* communication-system#cptIt451#
* NETWORK INFORMATION-MACHINE#cptIt262#
* network.computer#cptIt21#

cmnchl'bandwidth (hz)

name::
* McsEngl.cmnchl'bandwidth (hz)@cptIt,
* McsEngl.conceptIt69,
* McsEngl.bandwidth@cptIt69,
====== lagoGreek:
* McsElln.ΕΥΡΟΣ-ΖΩΝΗΣ@cptIt69,
* McsElln.ΕΥΡΟΣ-ΠΕΡΙΟΧΗΣ@cptIt,

DEFINITION

ΕΥΡΟΣ ΖΩΝΗΣ είναι το ΣΥΝΟΛΟ των συχνοτήτων που επιτρέπεται να περάσει μέσα απο ένα κανάλι επικοινωνίας και που εξαρτάται από αντικειμενικούς παράγοντες όπως είναι τα φυσικά χαρακτηριστικά του μέσου (πχ η διατομή και το μήκος του καλωδίου) ή από επιλογές των σχεδιαστών μιας συγκεκριμένης τεχνολογίας που έγιναν με κριτήρια κόστους-αποδοτικότητας.

Ευρος ζώνης έχουν και τα προς μετάδοση ΣΗΜΑΤΑ: πρόκειται για το ελάχιστο φάσμα συχνοτήτων που χρειάζεται για να μεταφερθούν όλες οι πληροφορίες που περιέχουν.
[ΠΗΓΗ: ΡΑΜ 1997ιουλ, 105]

BANDWIDTH is the RANGE of frequencies which are transmitted.

It says nothing about the frequency of transmission.

The quantity of information a channel can carry is proportional to its bandwidth.

Στην καθημερινή χρήση το εύρος ζώνης αναφέρεται στο άνω όριο της ταχύτητας με την οποία η πληροφορία μπορεί να μεταδοθεί μέσω ενός δικτύου.

WHOLE

_WHOLE:
FREQUENCY#cptCore1013#

SPECIFIC

Specific_concepts (level 3) =

cmnchl'evaluation#cptCore546.107#

name::
* McsEngl.cmnchl'evaluation@cptIt,

cmnchl'distance#cptCore978.4#

name::
* McsEngl.cmnchl'distance@cptIt,

cmnchl'frequency#cptCore1013: attPar#

name::
* McsEngl.cmnchl'frequency@cptIt,

cmnchl'medium

name::
* McsEngl.cmnchl'medium@cptIt,

cmnchl'node

name::
* McsEngl.cmnchl'node@cptIt,

cmnchl'price#cptEconomy541.44#

name::
* McsEngl.cmnchl'price@cptIt,

Η χρήση της γραμμής-επικοινωνίας γίνεται με κάποια ΧΡΕΩΣΗ.

cmnchl'security

name::
* McsEngl.cmnchl'security@cptIt,

cmnchl'signal

name::
* McsEngl.cmnchl'signal@cptIt,

_DESCRIPTION:
The information transmited.

cmnchl'speed (bps)

name::
* McsEngl.cmnchl'speed (bps)@cptIt,
* McsEngl.conceptIt498,
* McsEngl.cmnchl'transfer-rate@cptIt,
* McsEngl.TRANSFER-RATE@cptIt,
* McsEngl.transfer-rate@cptIt498,
* McsElln.ΔΙΑΜΕΤΑΓΩΓΗ@cptIt,
* McsElln.ΡΥΘΜΟΣ-ΜΕΤΑΔΟΣΗΣ@cptIt,

DEFINITION

TRANSFER RATE/ΔΙΑΜΕΤΑΓΩΓΗ
Transfer rate is the speed at which bits can be transfered from the disk to the computer.

SPECIFIC

name::
* McsEngl.cmnchl.specific@cptIt,
* McsEngl.comchl.specific@cptIt,

_SPECIFIC:
* analong-channel#ql:comchl.signal.analog#
* asynchronous-channel#cptIt93#
* ATM-channel#cptItsoft368.1#
* broadband-channel#cptIt116#
* circuit-switching-channel#ql:channel.circuit_switching#
* digital-channel#cptIt207#
* duplex-channel#cptIt63#
* frame-relay-channel#cptItsoft412.1#
* ISDN#cptIt103#
* packet-switching-channel#ql:channel.packet_switching#
* parallel-chanel#cptIt62#
* public-channel#cptIt37#
* serial-channel#cptIt60#
* simplex-channel##
* synchronous-channel#cptIt95#
* switching-channel#cptItsoft44.1#
* T-1#cptIt160#
* X.25#cptItsoft114.1#


* circuit-switching-channel#ql:channel.circuit_switching#
* packet-switching-channel#ql:channel.packet_switching#
 * ATM-channel#cptItsoft368.1#
 * frame-relay-channel#cptItsoft412.1#
 * X.25#cptItsoft114.1#


* permanet-channel#cptIt384#
* ΕΠΙΛΕΚΤΙΚΗ ΓΡΑΜΜΗ/ ΠΡΟΣΚΑΙΡΗ ΣΥΝΔΕΣΗ
 ISDN#cptIt103#
 X.25#cptItsoft114.1#
* switching-channel#cptItsoft44.1#
 * circuit-switching-channel#ql:channel.circuit_switching#
 * packet-switching-channel#ql:channel.packet_switching#
* leased-line

ΕΠΙΛΕΚΤΙΚΟ ΤΗΛΕΠΙΚΟΙΝΩΝΙΑΚΟ ΔΙΚΤΥΟ

VANs-Value Added Networks

Ομοαξονικά συστήματα καλωδιακης τηλεόρασης,

cmnchl.SPECIFIC-DIVISION.medium

name::
* McsEngl.cmnchl.SPECIFIC-DIVISION.medium@cptIt,

_SPECIFIC:
* wire-channel#cptItsoft17#
 xDSL#cptItsoft141#
 FDDI#cptItsoft109#
 SONET#cptIt134#
* wireless-channel#cptItsoft208#

cmnchl.SPECIFIC-DIVISION.mode-of-transfer

name::
* McsEngl.cmnchl.SPECIFIC-DIVISION.mode-of-transfer@cptIt,

_SPECIFIC:
ΡΟΗ BIT:
* parallel-chanel#cptIt62#
* serial-channel#cptIt60#
===
ΧΡΟΝΙΣΜΟΣ:
* asynchronous-channel#cptIt93#
* synchronous-channel#cptIt95#

cmnchl.SPECIFIC-DIVISION.signal

name::
* McsEngl.cmnchl.SPECIFIC-DIVISION.signal@cptIt,

_SPECIFIC:
* analong-channel#ql:comchl.signal.analog#
* digital-channel#cptIt207#
===
* data
* video
* voice
===
* ΑΝΑΛΟΓΙΚΑ ΔΕΔΟΜΕΝΑ - ΨΗΦΙΑΚΗ ΜΕΤΑΔΟΣΗ
* ΨΗΦΙΑΚΑ ΔΕΔΟΜΕΝΑ - ΨΗΦΙΑΚΗ ΜΕΤΑΔΟΣΗ

cmnchl.SPECIFIC-DIVISION.frequency

name::
* McsEngl.cmnchl.SPECIFIC-DIVISION.frequency@cptIt,

_SPECIFIC:
* broadband-channel#cptIt116#
* narrowband-channel
===
... "are classified into narrowband, voiceband, and broadband categories. The wider the bandwidth of a channel, the more data it can transmit in a given period of time."
[Sanders, 1988, p309#cptResource91]

cmnchl.SPECIFIC-DIVISION.access

name::
* McsEngl.cmnchl.SPECIFIC-DIVISION.access@cptIt,

_SPECIFIC:
* private-channel##
* public-channel#cptIt37#

cmnchl.SPECIFIC-DIVISION.rooting-scheme

name::
* McsEngl.cmnchl.SPECIFIC-DIVISION.rooting-scheme@cptIt,

_SPECIFIC:
* broadcast-channel (all)#cptItsoft50#
* unicast-channel (one)##
* multicast-channel (many)##
* anycast-channel##
* geocast-channel##

cmnchl.access.PUBLIC

name::
* McsEngl.cmnchl.access.PUBLIC@cptIt,
* McsEngl.conceptIt37,
* McsEngl.PUBLIC-DATA-COMM-NETWORK/CHANNEL@cptIt,
* McsEngl.public'data'CommChannel@cptIt37,
* McsElln.ΔΗΜΟΣΙΟ-ΔΙΚΤΥΟ-ΔΕΔΟΜΕΝΩΝ@cptIt,

DEFINITION

ΟΠΟΙΟΣΔΗΠΟΤΕ ΕΙΝΑΙ ΣΥΝΔΡΟΜΗΤΗΣ ΤΟΥ ΔΙΚΤΥΟΥ ΜΠΟΡΕΙ ΝΑ ΕΠΙΚΟΙΝΩΝΕΙ ΜΕ ΟΠΟΙΟΝ ΑΛΛΟ ΣΥΝΔΡΟΜΗΤΗ ΑΠΛΩΣ ΕΠΙΛΕΓΟΝΤΑΣ-ΤΟΝ.
ΤΑ ΔΗΜΟΣΙΑ ΔΙΚΤΥΑ ΜΕΤΑΓΩΓΗΣ ΠΑΚΕΤΩΝ, ΣΕ ΑΝΤΙΘΕΣΗ ΜΕ ΤΑ ΙΔΙΩΤΙΚΑ ΔΙΚΤΥΑ ΕΠΙΚΟΙΝΩΝΙΑΣ ΠΡΕΠΕΙ ΝΑ ΠΡΟΣΦΕΡΟΥΝ ΤΙΣ ΥΠΗΡΕΣΙΕΣ ΤΟΥΣ ΣΕ ΠΟΛΛΟΥΣ ΣΥΝΔΡΟΜΗΤΕΣ ΑΝΕΞΑΡΤΗΤΑ ΜΕ ΤΟΝ ΤΥΠΟ ΤΟΥ ΕΞΟΠΛΙΣΜΟΥ ΠΟΥ ΑΥΤΟΙ ΔΙΑΘΕΤΟΥΝ.

GENERIC

_GENERIC:
COMMUNICATION CHANNEL#cptIt168#

SPECIFIC

Specific_concepts (level 3) =

PACKET SWITCHING
 X.25#cptIt114: attSpe#

ΨΗΦΙΑΚΑ ΔΙΚΤΥΑ, ΠΑΡΕΧΟΥΝ ΥΠΗΡΕΣΙΕΣ ΦΟΡΕΑ
HELLASCOM#cptIt132: attSpe#

ΓΝΩΣΤΑ ΔΗΜΟΣΙΑ ΔΙΚΤΥΑ
ARPAC, ΑΡΓΕΝΤΙΝΗ
AUSTPAC, ΑΥΣΤΡΑΛΙΑ
DATANET, ΟΛΛΑΝΔΙΑ
DATAPAC, ΚΑΝΑΔΑΣ
DATEX-P, ΑΥΣΤΡΙΑ
DATEX-P, ΓΕΡΜΑΝΙΑ
DATEX-l, ΓΕΡΜΑΝΙΑ
DCS, ΒΕΛΓΙΟ
DDX-P, ΙΑΠΩΝΙΑ
EPSS, ΑΓΓΛΙΑ
FINNPAC, ΦΙΝΛΑΝΔΙΑ
HELLASPAC ΕΛΛΑΔΑ
IBERPAC, ΙΣΠΑΝΙΑ
SCT, ΜΕΞΙΚΟ
TELENET, HPA
TELEPAC, ΕΛΒΕΤΙΑ
TELEPAK, ΣΟΥΗΔΙΑ
TRANSPAC, ΓΑΛΛΙΑ
TYMNET, ΗΠΑ
UNINET, ΗΠΑ

cmnchl.access.PRIVATE

name::
* McsEngl.cmnchl.access.PRIVATE@cptIt,
* McsEngl.private-connection@cptIt,

cmnchl.speed.BROADBAND

name::
* McsEngl.cmnchl.speed.BROADBAND@cptIt,

cmnchl.DSL

name::
* McsEngl.cmnchl.DSL@cptIt,
* McsEngl.conceptIt141,
* McsEngl.DSL-digital-subsriber-line@cptIt,
* McsEngl.xDSL@cptIt141,
* McsEngl.digital-subscriber-line@cptIt,

DEFINITION

Με βάση τη θεωρία μπορεί να 10/20πλασιάσει την ταχύτητα σύνδεσης, αρκεί να χρησιμοποιειθούν ειδικά μόντεμ και στις δύο άκρες. Στηρίζεται στο γεγονός ότι το 90% των τηλεφώνων στις πόλεις είναι συνδεδεμένα με τα τηλεφωνικά κέντρα με μικρά μήκη κάτω των 5χλμ. Με δεδομένο ότι στο καλώδιο χαλκού το διαθέσιμο εύρος ζώνης εξαρτάται από το μήκος της γραμμής, το μικρό μήκος οδηγεί σε μεγαλύτερο εύρος ζώνης και άρα σε μεγαλύτερη ταχύτητα μέχρι και 6Mbps.

Οι πρώτες εγκαταστάσεις σε μικρή κλίμακα έχουν ξεκινήσει στην Αμερική αλλά είναι νωρίς για συμπεράσματα.
[RAM 1997jun, 26]

GENERIC

_GENERIC:
* wire-channel#cptItsoft17#

TRANSFER-RATE#cptIt498#

Ακόμα και πάνω από 50Mbps για σχετικά μικρές αποστάσεις.
[ΠΗΓΗ: ΡΑΜ 1997ιουλ, 108]

SPECIFIC

_SPECIFIC:
* ADSL (Asymmetrical DSL)
* SDSL (Symmetrical DSL)
* HDSL (High speed DSL)
* VDSL (Very high speed DSL)
* RADSL (Rate adaptive DSL / προσαρμοζόμενου ρυθμού)

OTE

CLEAR_LINE:
Broadband Connection > DSL Connection > Details
Line Attenuation (Up/Down) [dB]:  18,5 / 40,0  <60
SN Margin (Up/Down) [dB]:  11,0 / 18,0    >6

in.gr

name::
* McsEngl.in.gr@cptIt,

xDSL και Άλλες Tεχνολογίες
Υποενότητες xDSL και Άλλες Tεχνολογίες xDSL. CABLE MODEM. Ασύρματη Πρόσβαση. Συγκρίσεις και Συμπεράσματα.
xDSL. Μία από τις πιο ελπιδοφόρες τεχνολογίες για τη μετάδοση δεδομένων είναι η DSL (Digital Subscriber Line), αφού υπόσχεται μεταδόσεις φωνής και δεδομένων με μεγάλο εύρος ζώνης μέσω απλών τηλεφωνικών γραμμών (δισύρματα χάλκινα καλώδια). Ο όρος xDSL αναφέρεται στις πολλαπλές παραλλαγές αυτής της τεχνολογίας και καλύπτει όρους όπως ADSL, HDSL, RADSL κ.ο.κ. Οι τυπικές ταχύτητες που συνήθως προσφέρονται είναι της τάξης των 1,544Mbps έως και 6,1Mbps προς το συνδρομητή (downstream) και 0,128Mbps έως και 2,048Mbps από το συνδρομητή (upstream). Οι τιμές αυτές διαφέρουν ανάλογα με τη χρησιμοποιούμενη παραλλαγή του DSL και το φυσικό τρόπο σύνδεσης στο τηλεφωνικό δίκτυο.
Πώς λειτουργεί; Πίσω από αυτή την τεχνολογία υπάρχουν οι ανάλογες ψηφιακές μέθοδοι που περιορίζουν την επίδραση του θορύβου και έτσι είναι δυνατή η μετάδοση δεδομένων με μεγαλύτερο ρυθμό. Με απλά λόγια, χρησιμοποιούνται οι χάλκινες γραμμές που βρίσκονται σε κάθε σπίτι με τρόπο που μοιάζει, τουλάχιστον στις αρχές λειτουργίας του, με το γνωστό σε όλους μας ISDN. Βέβαια, αυτή η τεχνολογία έχει και του περιορισμούς της, αφού οι προσφερόμενοι ρυθμοί εξαρτώνται από το μήκος του χάλκινου καλωδίου και γενικότερα από τα φυσικά χαρακτηριστικά (ποιότητα) της τηλεφωνικής γραμμής. Όσο μεγαλύτερα μήκη καλωδίου έχουμε, τόσο μεγαλύτερη είναι η επίδραση του θορύβου και, κατά συνέπεια, τόσο μικρότερος είναι ο μέγιστος δυνατός ρυθμός μετάδοσης. Έτσι, η μέγιστη τυπική δυνατή απόσταση μέχρι το τηλεφωνικό κέντρο, χωρίς την παρεμβολή ενισχυτικών διατάξεων ή καλωδίων οπτικών ινών, είναι 5,5 χιλιόμετρα. Επίσης, πρέπει να τονιστεί το γεγονός ότι οι διάφορες παραλλαγές του xDSL μπορεί να έχουν διαφορές στο ρυθμό upstream και downstream, και σε μερικές περιπτώσεις ιδιαίτερα μικρό ρυθμό upstream. Αυτό δεν αποτελεί αναγκαστικά πρόβλημα, αν σκεφτούμε ότι σε μια τυπική χρήση του Internet για κάθε δέκα byte που λαμβάνουμε, εμείς στέλνουμε μόνο ένα!

Έτσι, περίπου, υλοποιούνται οι συνδέσεις XDSL τόσο για οικιακή όσο και για επαγγελματική χρήση. Διαφοροποιήσεις υπάρχουν και όσον αφορά στον απαιτούμενο εξοπλισμό. Κοινός τόπος όλων των παραλλαγών του DSL είναι η ύπαρξη ενός DSL μόντεμ το οποίο προσαρμόζει τα δεδομένα του υπολογιστή έτσι ώστε να μπορούν να μεταδοθούν μέσα από το δίκτυο. Επιπλέον, η σύνδεση xDSL μπορεί να ανήκει σε δύο γενικές κατηγορίες: τις συνδέσεις splitter-based και στις splitterless. Οι όροι αυτοί προέρχονται από τον splitter (διαχωριστή), ο οποίος διαχωρίζει με τη χρήση ειδικών φίλτρων τα σήματα δεδομένων από τα σήματα φωνής. Για την εγκατάστασή του απαιτείται η επίσκεψη των τεχνικών της τηλεφωνικής εταιρείας και γι' αυτόν το λόγο οι εταιρείες που ασχολούνται με το αντικείμενο προωθούν τις υλοποιήσεις splitterless (χωρίς διαχωριστή). Το κόστος σε αυτή την περίπτωση είναι μικρότερο για τον καταναλωτή, αφού ο διαχωρισμός γίνεται στο τηλεφωνικό κέντρο, αλλά ταυτόχρονα ο ρυθμός μετάδοσης περιορίζεται. Για την ιστορία αξίζει να αναφέρουμε ότι μία από τις πιο συμφέρουσες παραλλαγές splitterless του DSL, η G.Lite, που προβλέπεται να έχει μεγάλη εξάπλωση, έχει υποστηριχθεί σε μεγάλο βαθμό από τη Microsoft.
Όπως είπαμε παραπάνω, υπάρχουν διάφορα είδη συνδέσεων DSL (εξ ου και ο όρος xDSL). Αναφέρουμε τα πιο σημαντικά από αυτά:
* ADSL (Asymmetric Digital Subscriber Line): είναι η μορφή που πιθανώς θα γνωρίσει μεγάλη εξάπλωση, αφού είναι κατάλληλη για τα σπίτια και τις μικρές επιχειρήσεις. Πρόκειται για ασύμμετρο είδος, αφού δίνει μέχρι 6,1Mbps για downstream και 0,64Mbps για upstream.
* CDSL (Consumer DSL): είναι τεχνολογία που ανήκει αποκλειστικά στη Rockwell, η οποία έχει αναλάβει την προώθηση και την κατασκευή του απαραίτητου υλικού (hardware). Είναι splitterless, αλλά επιτρέπει μόνο 1Mbps downstream και πιθανώς λιγότερο upstream.
* G.Lite ή DSL Lite: είναι μια επίσημη μορφή του DSL η οποία προσφέρει 1,544Mbps με 6Mbps downstream και 128Kbps με 384Kbps upstream.Το G.Lite αναμένεται να παίξει καθοριστικό ρόλο τα επόμενα χρόνια.
* HDSL (High bit-rate DSL): είναι η πρώτη παραλλαγή που παρουσιάστηκε και είναι συμμετρική. Δίνει δηλαδή 2.320Kbps και στις δύο κατευθύνσεις και γι' αυτό έχει σχετικά χαμηλό ρυθμό μετάδοσης. Είναι ισοδύναμη με τις γραμμές T1 στη Βόρειο Αμερική και τις γραμμές E1 στην Ευρώπη.
* IDSL (ISDN DSL): πρόκειται για μάλλον αποτυχημένη προσπάθεια, αφού προσφέρει αμφίδρομα 128Kbps, δυνατότητα που ήδη δίνει το ISDN.
* RADSL (Rate-Adaptive DSL): είναι μια ασύμμετρη τεχνολογία της Westell που προσαρμόζει με λογισμικό το ρυθμό μετάδοσης ανάλογα με τη γραμμή και δίνει 640Kbps με 2,2Mbps downstream και 272Kbps με 1,088Mbps upstream.
* SDSL (Symmetric DSL): παρόμοιο με το HDSL, αλλά δίνει αμφίδρομα 1,544Mbps στην Αμερική ή 2,048Mbps στην Ευρώπη.
* VDSL (Very high data rate DSL): είναι τεχνολογία που ακόμα βρίσκεται στο στάδιο της προτυποποίησης, αλλά υπόσχεται ρυθμό της τάξης των 51 και 55Mbps σε γραμμές μήκους μέχρι 1,5 χιλιόμετρο. Ο τρόπος μετάδοσης (διαμόρφωση των σημάτων) είναι ακόμα αντικείμενο έρευνας.

cmnchl.ForthNet

name::
* McsEngl.cmnchl.ForthNet@cptIt,
* McsEngl.forthnet@cptIt2002,

_DESCRIPTION:
FORTHNET is greek COMM-CHANNEL that connects the Greece to Internet.
[NIKOS, JULY 1995]

BACKBONE-LINE

Ανακοινώθηκε ότι από 13 Αυγούστου ξεκίνησε η γραμμή 512Kbps με την MCI στις ΗΠΑ. Ετσι διπλασιάζεται από 512 σε 1024. Σχεδιάζει μέχρι τέλους του έτους να την κάνει 2048.
[ΚΟΜΠΙΟΥΤΕΡ ΓΟ, ΟΚΤ. 1996, 77]

Ο ΟΤΕ χορήγησε μια γραμμή 512Kbps σε αντικατάσταση αυτής των 128.
[RAM, JAN. 1996, 26]

Η γραμμή με το εξωτερικό (Ιταλία) τώρα είναι 128bps, μέσα στον νοέμβριο θα γίνει 512 και έχουν γίνει οι ενέργειες προς τον ΟΤΕ για 2Mbps.
[TELECOM, NOV. 1995, 13]

Doing

Το INTERNET δέν είναι η μοναδική παρεχόμενη υπηρεσία του δικτύου. Εχει κατασκευαστεί ώστε να υποστηρίζει τη χρήση πολλαπλών πρωτοκόλλων, παρέχοντας έτσι τη δυνατότητα σε οργανισμούς με ομοιογενείς αρχιτεκτονικές να μπορούν να διασυνδέονται χρησιμοποιώντας τον ίδιο επικοινωνιακό εξοπλισμό. Σήμερα, οι υποστηριζόμενες τεχνολογίες δικτύωσης είναι AppleTalk, Novell, SNA, DECnet.
[TELECOM, JUL-AUG 1995, 10]

GOAL#cptCore837#
Απο τον Προιστάμενο Π. ΤΖΩΡΤΖΑΚΗ ανακοινώθηκαν οι ακόλουθοι στόχοι:
* Γενική αναβάθμιση των παρεχόμενων υπηρεσιών.
* Εξέλιξή του σε Telecommunication Center για την Νοτιοανατολική Μεσόγειο και Ανατολική ευρώπη
* Λειτουργία κεντρικού ευρωπαικού hum στην ευρώπη
* Αναβάθμιση της γραμμής σύνδεσης με το Ebone (κεντρικο ευρωπαικό δικτυο-κορμου του internet) για το internet σε ταχύτητα 2Mbps.
[TELECOM, JUL-AUG 1995, 10]

MAIL-CONNECTION

Σας πληροφορούμε πως την Παρασκευή 6/6/97 ο mail server θα τεθεί εκτός λειτουργίας από τις 06:00-08:00 π.μ. Οι εργασίες που θα γίνουν αυτές τις δύο ώρες, αποτελούν την τελική φάση της μεταφοράς του mail server στο νέο σύστημα.
Από την πλευρά σας, χρειάζεται να κάνετε τις εξής αλλαγές, προκειμένου να μπορέσετε να δουλέψετε κανονικά χωρίς προβλήματα και μετά την μεταφορά: - Θα πρέπει να ρυθμίσετε τους mail agents που χρησιμοποιείτε έτσι ώστε
** να διαβάζετε (ΡΟΡ) τα mails σας από τον popper.forthnet.gr και
** να στέλνετε τα mails σας (SMTP) μέσω του mailgate.forthnet.gr
Για παράδειγμα, στη Eudora: POP account:  yourusername.pop.forthnet.gr@popper.forthnet.gr SMTP:    mailgate.forthnet.gr Οποιαδήποτε άλλη ρύθμιση, π.χ. info.forthnet.gr ή aglaia.forthnet.gr, δεν πρόκειται να δουλεύει σωστά.
- Οι χρήστες που χρησιμοποιούν Trumpet Winsock (Win3.1, Win3.11, Win95) θα πρέπει να ελέγξουν αν στο Network Configuration, υπάρχουν οι παρακάτω τιμές:
TCP RWIN:  2048
Packet vector:60
TCP MSS:  1460
TCP RTO MAX:  60
Demand Load Timeout(secs): 5-50
Αν παρατηρήσετε οποιοδήποτε πρόβλημα με το mail σας μετά τη μεταφορά της Παρασκευής, παρακαλούμε να επικοινωνήσετε με το Τμήμα Τεχνικής Υποστήριξης (τηλ. 7295100 (Αθήνα), 256171 (Θεσσαλονίκη), 229302 (Ηράκλειο), μέσω mail: dial-support@forthnet.gr)
   Τεχνικό Τμήμα FORTHnet

structure#cptCore515#

Σήμερα το forthnet είναι το μεγαλύτερο και πιο εξελιγμένο ΔΙΚΤΥΟ ΠΟΛΛΑΠΛΩΝ ΠΡΩΤΟΚΟΛΛΩΝ της χώρας μας και διαθέτει ψηφιακό δικτυακό κορμό υψηλής ταχύτητας (2Mbps) που διασυνδέει τα 4 μεγάλα αστικά κέντρα της Ελλάδας (Αθήνα, Θεσσαλονίκη, Πάτρα και Ηράκλειο). Εχει δηλαδη σημεία παρουσιας (POINTS OF PRESENSE) στις πόλεις αυτές, ενώ στο επόμενο δίμηνο θα λειτουργήσουν ακόμη 7 τέτοια σημεία και σε άλλες επαρχιακές πόλεις όπως Χανια, Ρόδο, Ιωάννινα, Καβάλλα, Βόλο, Λάρισα, Ξάνθη κα.
[TELECOM, JUL-AUG 1995, 10]

Ανήγγειλε τη λειτουργία των κόμβων στα Ιωάννινα και τις Σέρρες. 10ος και 11ος. Συνδέθηκαν με τον ψηφιακό κορμό των 2Mbps, με μη-ψηφιακή γραμμή υψηλής χωρητικότητας των 128Kbps.
Στα γιάνενα εκπρόσωπος είναι η εταιρία ONAR & D AE τηλ-79355.
[ΚΑΘΗΜΕΡΙΝΗ, 9 ΙΟΥΝ 1996, 59]

forthnet'support

name::
* McsEngl.forthnet'support@cptIt,

TECHNICAL_SUPPORT:
* 13831

_ADDRESS.WPG:
* http://www.forthnet.gr,

ΔΕΛΤΙΟ ΤΥΠΟΥ

Iωαννίνα 28-7-97
Η "ISP Network Ο.Ε., Τρύφων Παπαγεωργίου & Ιωάννης Σιώζος" έχει την τιμή να πληροφορήσει τους χρήστες ΙΝΤERNET των Ιωαννίνων ότι έχει αναλάβει την αποκλειστική αντιπροσώπευση της FORTHnet Α.Ε.
Η FORTHnet Α.Ε. διαθέτει δικτυακό κορμό (Backbone) βασισμένο σε ψηφιακές γραμμές ταχύτητας 2 Μbps, με τον οποίο διασυνδέει το 55,3% των Ελληνικών δικτυακών κόμβων και εξυπηρετεί το 88% των commercial-business διασυνδέσεων.
Η εταιρεία διαθέτει 35 σημεία παρουσίας-POP (κέντρα δικτυακής υποστήριξης) σε ολόκληρη την Ελληνική Επικράτεια.
Με 2 Μbps σύνδεση με Αμερική (ΜCI) και 512 Κbps με Γαλλία (EBONE) προσφέρει συνολικό bandwidth 2,5 Mbps, το μεγαλύτερο δηλαδή στη χώρα, και εδραιώνει την κυριαρχία της στην Ελληνική δικτυακή αγορά αφού είναι η πρώτη εταιρεία παροχής δικτυακών υπηρεσιών που σπάει το φράγμα των 2 Mbps.
Παράλληλα η ISP Network έχει την τιμή να ανακοινώσει την αναβάθμιση των Dynamic DialUp modem σε 33,6 Κbps, έτσι ώστε η πρόσβαση στο ΙΝΤERNET να γίνεται ακόμα ποιο γρήγορη.
Επιπλέον έχει μπει σε λειτουργία νέος αναβαθμισμένος server στον τοπικό κόμβο Ιωαννίνων ο οποίος παρέχει: www http://ioannina.forthnet.gr anonymous ftp ioannina.forthnet.gr proxy services ioannina.forthnet.gr port 8080
Φιλικά Τρύφων Παπαγεωργίου Εmail tpap@forthnet.gr ΙSP Network Ιωάννης Σιώζος gsio@forthnet.gr ΚΑ Φεβρουαρίου 188
Tηλ. 20262

cmnchl.ISDN

name::
* McsEngl.cmnchl.ISDN@cptIt,
* McsEngl.conceptIt103,
* McsEngl.ISDN@cptIt,
* McsEngl.isdn@cptIt103,
* McsEngl.INTEGRATED-SERVICES-DIGITAL-NETWORK@cptIt,

DEFINITION

ΕΙΝΑΙ ΜΙΑ ΠΡΟΣΠΑΘΕΙΑ ΕΝΙΑΙΑΣ ΑΝΤΙΜΕΤΩΠΙΣΗΣ ΟΛΩΝ ΤΩΝ ΕΞΕΙΔΙΚΕΥΜΕΝΩΝ ΔΙΚΤΥΩΝ
Ο στόχος του προγραματος είναι να συνδέσει ΚΑΘΕ υπολογιστη στο σπιτι και στο γραφείο με υψηλής ταχύτητας υπηρεσίες ψηφιακών δεδομένων μεταφερόμενες από χάλκινα τηλεφωνικά καλώδια.

Αυτή η κίνηση έχει τη δυνατότητα να επηρεάσει τον τρόπο με τον οποίο οι άνθρωποι στη Δυτική Ευρώπη, Ιαπωνία και Βόρεια Αμερική
εργάζονται,
μελετούν,
επικοινωνούν, και
συνεργάζονται εμπορικά.

ΘΑ ΑΠΟΤΕΛΕΣΕΙ ΤΟ ΚΥΡΙΑΡΧΟ ΤΗΛΕΠΙΚΟΙΝΩΝΙΑΚΟ ΔΙΚΤΥΟ ΤΟΥ ΜΕΛΛΟΝΤΟΣ.

GENERIC

_GENERIC:
COMMUNICATION CHANNEL#cptItsoft168#

PRICE#cptEconomy541.44#

Οπως και τα συμβατικά dialup services, οι χρεώσεις του ISDN έχουν τρία στοιχεία:
την αμοιβή αρχικής εγκατάστασης,
μια μηνιαία πάγια συνδρομή, και
τη χρέωση ανά λεπτό χρήσης.

measure#cptCore88#

ΤΟ ISDN ΣΤΕΝΗΣ ΖΩΝΗΣ ΕΧΕΙ ΤΕΘΕΙ ΗΔΗ ΠΙΛΟΤΙΚΑ ΣΕ ΕΜΠΟΡΙΚΗ ΕΚΜΕΤΑΛΕΥΣΗ (ΑΓΓΛΙΑ, ΓΕΡΜΑΝΙΑ)
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 303#cptResource223]

TRANSFER-RATE#cptIt498#

Η μέγιστη ταχύτητα μεταφοράς είναι 64Kbps ανά κανάλι, κάτι όχι αρκετά ελκυστικό με τα σημερινά δεδομένα.
Καλύτερο δείχνει το μέλλον του B-ISDN που υπόσχεται ταχύτητες μέχρι και 155Mbps σε ψηφιακά εικονικά κυκλώματα.
[SOURCE: RAM 1997jul, 108]

ΧΡΗΣΙΜΟΠΟΙΕΙ ΨΗΦΙΑΚΗ ΜΕΤΑΓΩΓΗ ΚΑΙ ΜΕΤΑΔΟΣΗ, ΜΕ ΡΥΘΜΟΥΣ ΜΕΤΑΔΟΣΗΣ ΠΟΥ ΦΘΑΝΟΥΝ ΤΑ 2 Mbps
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 303#cptResource223]

SPECIFIC

Specific_concepts (level 3) =

isdn.NARROWBAND ISDN

name::
* McsEngl.isdn.NARROWBAND ISDN@cptIt,

Εχει ταχύτητα μετάδοσης 64kbps.

isdn.BROADBAND

name::
* McsEngl.isdn.BROADBAND@cptIt,
* McsEngl.B-ISDN@cptIt,
* McsEngl.BISDN@cptIt2010,
* McsEngl.broadband-integrated-services-digital-network@cptIt,

_DESCRIPTION:
B-ISDN Σχεδιάζεται και αποροφά τεράστια ποσά στην έρευνα. Θά προσφέρει σε επίπεδο συνδρομητή ρυθμούς μετάδοσης μεχρι και 150 mbps.
===
Καταρχήν, θα πρεπει να διαλύσουμε μια σημαντική παρεξήγηση: οι περισσότεροι νομίζουν ότι το B-ISDN, που στο εξωτερικό φέρει το παρατσούκλι "υπερλεωφόρος των πληροφοριών", είναι ένα ΔΙΚΤΥΟ ΥΠΟΛΟΓΙΣΤΩΝ. Δεν είναι όμως τίποτε άλλο από την επερχόμενη γενιά ΤΗΛΕΦΩΝΙΚΩΝ ΔΙΚΤΥΩΝ που τοποθετείται στις προηγμένες χώρες του κόσμου, με προοπτική να καλύψει όλη την υφήλιο.
[COMPUTER GO, JAN. 1996, 169]

Doing

Οι ΥΠΗΡΕΣΙΕΣ του θα περιλαμβάνουν
- τελεξ
- φαξ
- τηλεφωνια
- βιντεοτηλεφωνια
- τηλεοραση υψηλης ευκρίνειας και φυσικά
- δίκτυα υπολογιστών.
[COMPUTER GO, JAN. 1996, 169]

isdn.EURO'ISDN

name::
* McsEngl.isdn.EURO'ISDN@cptIt,

ΠΙΛΟΤΙΚΗ ΕΦΑΡΜΟΓΗ ΚΑΙ ΣΤΗΝ ΕΛΛΑΔΑ, ΕΝΤΟΣ ΤΟΥ 1994, ΠΡΟΓΡΑΜΜΑΤΙΖΕΙ Ο ΟΤΕ.

ΕΦΑΡΜΟΓΕΣ ΤΟΥ euro-isdn ΠΑΡΟΥΣΙΑΣΤΗΚΑΝ ΠΡΙΝ ΛΙΓΕΣ ΜΕΡΕΣ.

ΣΥΜΜΕΤΕΧΟΥΝ 26 ΤΗΛΕΠΙΚΟΙΝΩΝΙΑΚΟΙ ΟΡΓΑΝΙΣΜΟΙ ΑΠΟ 20 ΕΥΡΩΠΑΙΚΕΣ ΧΩΡΕΣ.
[ΒΗΜΑ, 9 ΙΑΝΟ 1994, Δ40]

isdn.StatNet

name::
* McsEngl.isdn.StatNet@cptIt,
* McsEngl.statnet@cptIt2000,

_DESCRIPTION:
StatNet είναι το πρώτο τηλεματικο δίκτυο ISDN στη χώρα μας.
[TELECOM, JUL-AUG 1995, 6]

Doing

To StatNet προσφέρει τις παρακάτω προηγμένες τηλεματικές υπηρεσίες:
* Διασυνδέσεις τοπικών δικτύων σε υψηλές ΤΑΧΥΤΗΤΕΣ (nx64kbps)
* Multimedia EMAIL
* FILE TRANSFER
* pc desktop DOCUMENT-CONFERENCING
* pc desktop VIDEO CONFERENCING
* VOICE MAIL
* FAX group IV
* Δυνατότητες τηλεφωνίας ISDN.
[TELECOM, JUL-AUG 1995, 6]

Evoluting#cptCore546.171#

1995:
Κατασκευάζεται ύστερα από προσπάθεια 2 χρόνων.
[TELECOM, JUL-AUG 1995, 6]

OrgProducing

ΣΤΑΤ#cptItorg1687#
INFORMATION (Α. ΝΟΥΛΑ) 570.7311

PRICE#cptEconomy541.44#

BUDGET#cptEconomy540.16#
90 ΕΚ. ΔΡΧ.
[TELECOM, JUL-AUG 1995, 6]

STANDARD#cptIt139#

Folow the Euro-ISDN.
[TELECOM, JUL-AUG 1995, 6]

structure#cptCore515#

ΚΟΜΒΟΙ:
στην πρώτη φάση έχει 5: 2 αθήνα, θεσσαλονίκη, Ξάνθη, βόλο.
[TELECOM, JUL-AUG 1995, 6]

cmnchl.medium.ELECTRICITY-LINES

name::
* McsEngl.cmnchl.medium.ELECTRICITY-LINES@cptIt,

ΤΡΙΤΗ 14 ΟΚΤΩΒΡΙΟΥ 1997 Το Internet μπήκε στην... πρίζα!
Η εταιρία τηλεπικοινωνιών Nortel, σε συνεργασία με τη βρετανική United Utilities, ανακοίνωσε πως ανέπτυξε επιτυχώς μια τεχνολογία που επιτρέπει τη μεταφορά δεδομένων μέσω κοινών ηλεκτρικών καλωδίων, σε ταχύτητες, μάλιστα, πολλαπλάσιες του ISDN, που είναι σήμερα η ταχύτερη ευρύτατα διαδεδομένη μέθοδος μετάδοσης. Η πρωτοποριακή αυτή τεχνολογία, που αναπτύχθηκε και δοκιμάστηκε πειραματικά στην Αγγλία με απόλυτη επιτυχία, παρέχει την προοπτική να ανοίξει νέους ορίζοντες στη διάδοση του Δικτύου και θα προωθηθεί αρχικά στην Ευρώπη και την Άπω Ανατολή.
Επιτρέποντας στις εταιρίες ηλεκτρισμού τη μετατροπή των ηλεκτρικών τους δικτύων σε δίκτυα μετάδοσης πληροφοριών, λύνει τρία μεγάλα προβλήματα που σήμερα αντιμετωπίζει η διάδοση του Internet: Αποδοχή Αγοράς, Πρόσβαση στον Καταναλωτή και Κόστος Παροχής. Οι υποψήφιοι πελάτες μπορούν να έχουν πλέον μόνιμη, φθηνότερη, πρόσβαση μέσω των υπαρχόντων καλωδίων, που φέρνουν ηλεκτρισμό στο σπίτι τους. Τα δεδομένα μεταδίδονται σε ρυθμούς ενός magabit/δευτερόλεπτο, χρησιμοποιώντας πατενταρισμένη τεχνολογία που ταξινομεί τα δεδομένα μέσα στις υπάρχουσες γραμμές. Κατά συνέπεια, τα κόστη επένδυσης είναι σχεδόν μηδαμινά για της εταιρίες ηλεκτρισμού, σε σχέση τουλάχιστον με τα κόστη δημιουργίας ενός παρόμοιου συστήματος ευρείας μετάδοσης από το μηδέν. Λόγω της φύσης της, η τεχνολογία μπορεί να εφαρμοστεί σε ξεχωριστές, αντικειμενικές φάσεις. Οι εταιρίες ηλεκτρισμού, μπορούν ακόμα να παρέχουν και σε τρίτους το δικαίωμα εκμετάλευσης του δικτύου τους, με χρέωση. Οι τελικοί χρήστες θα χρειάζονται μια ειδική κάρτα, με κόστος αντίστοιχο ενός τερματικού προσαρμογέα ISDN, αλλά με 10 φορές ταχύτερη απόδοση bandwidth. Βέβαια, υπάρχει και η τεχνολογία ADSL που επιτρέπει την πολύ ταχύτερη μετάδοση δεδομένων μέσω ψηφιακών τηλεφωνικών γραμμών, αλλά είναι πολύ ακριβότερη και όχι τόσο ευρέως εφαρμόσιμη. Όπως είναι φυσικό, η μεγάλες ταχύτητες που προσφέρει η νέα τεχνολογία, θα βρουν μαζική εφαρμογή σε υπηρεσίες όπως η μετάδοση πολυμέσων, προγραμμάτων και μεγάλων όγκων δεδομένων, η τηλεφωνία και το ηλεκτρονικό εμπόριο μέσω του δικτύου, τομείς που σήμερα "κολλόυν" στην έλλειψη της απαραίτητης υποδομής. Η ιδέα της Nortel είναι: "Η υποδομή υπάρχει, σας δίνουμε την τεχνολογία αξιοποίησής της". Η Nortel συνεργαζόταν με την United Utilities την τελευταία τριετία, προκειμένου να καταλήξουν σε αυτή την ανακοίνωση, μετά από παρατεταμένη έρευνα, ενώ ήδη από το 1990 είχαν αρχίσει οι προεργασίες. Είναι θετικό το γεγονός πως η όλη ανάπτυξη έγινε στην Ευρώπη, κάτι που δε συνηθίζεται στις τεχνολογίες πληροφορικής. Από την άλλη, η ανακοίνωση έρχεται ταυτόχρονα με την απελευθέρωση των εναλλακτικών (πλην τηλεφωνίας δηλαδή) δικτύων στην Ευρώπη, που θα επιτρέψει σε πολλές ηλεκτρικές εταιρίες την αξιοποίηση των δικτύων τους και προς την κατεύθυνση της μεταφοράς δεδομένων. Οι εκπρόσωποι των δύο εταιριών τόνισαν πως θα συνεχίσουν τη συνεργασία, προκειμένου να εφαρμοστεί το σύστημα, αργότερα, και στις ΗΠΑ. ΣΧΕΤΙΚΟΙ ΚΟΜΒΟΙ:
Nortel

0 ΚΟΜΒΟΣ ΑΡΧΕΙΟ ΑΝΑΖΗΤΗΣΗ ΕΠΙΚΟΙΝΩΝΙΑ
Copyright ©1997, O KΟΜΒΟΣ™ ( kombos @ forthnet.gr ) - Με την επιφύλαξη παντός νομίμου δικαιώματος.

cmnChl.medium.WIRE

name::
* McsEngl.cmnChl.medium.WIRE@cptIt,
* McsEngl.conceptIt17,
* McsEngl.cable-communication-channel@cptIt,
* McsEngl.cable'CommunicationChannel@cptIt17,
* McsEngl.CommunicationChannel'cable@cptIt17,
* McsEngl.wire-comm-channel@cptIt,
* McsElln.ΚΑΛΩΔΙΑ@cptIt,
* McsElln.ΚΑΛΩΔΙΩΣΗ@cptIt,
* McsElln.ΕΝΣΥΡΜΑΤΑ-ΜΕΣΑ-ΜΕΤΑΔΟΣΗΣ@cptIt,

DEFINITION

Οι κάρτες δικτύου καθοριζουν το είδος της καλωδίωσης που θα χρειασθείτε για να συνδέσετε τους server, client.

Μεταφέρουν ηλεκτρικά σήματα μέσα από καλώδια χαλκού.

GENERIC

_GENERIC:
COMMUNICATION CHANNEL#cptItsoft168#

WHOLE

_WHOLE:
* netIt.WIRE##

EVALUATION#cptCore546.107#

Distance#cptCore978.4#

IMPORTANCE#cptCore781#

ΠΡΟΒΛΗΜΑΤΑ: Τα προβλήματα καλωδίωσης είναι η πιο συνηθισμένη αιτία κακής λειτουργιας των δικτύων και πολλες φορές δημιουργούν προβλήματα που δεν μπορούν να διαγνωσθούν εύκολα.

PRICE#cptEconomy541.44#

TRANSFER RATE#cptIt498#

SPECIFIC

Specific_concepts (level 3) =

pair-cable

name::
* McsEngl.cable.pair@cptIt,

ΕΙΝΑΙ ΔΥΟ ΣΥΡΜΑΤΑ ΜΟΝΩΜΕΝΑ ΜΕΤΑΞΥ ΤΟΥΣ.
ΕΙΝΑΙ Ο ΑΠΛΟΥΣΤΕΡΟΣ ΚΑΤΑΣΚΕΥΑΣΤΙΚΑ ΤΥΠΟΣ ΜΕΣΟΥ ΜΕΤΑΔΟΣΗΣ.
ΣΥΝΗΘΩΣ ΧΡΗΣΙΜΟΠΟΙΕΙΤΑΙ ΓΙΑ ΣΥΝΔΕΣΕΙΣ ΚΟΝΤΙΝΩΝ ΑΠΟΣΤΑΣΕΩΝ, ΚΑΙ ΥΠΟΛΟΓΙΣΤΩΝ ΚΑΙ ΠΕΡΙΦΕΡΕΙΑΚΩΝ.

coaxial-cable

name::
* McsEngl.cable.coaxial@cptIt,

ΟΜΟΑΞΟΝΙΚΑ ΚΑΛΩΔΙΑ

3. ομοαξονικο (Coaxial cable): Αποτελείται από ένα εσωτερικό χάλκινο αγωγό, που περιβάλεται από πλαστική μόνωση και αυτή με τη σειρά της από ένα χάλκινο πλέγμα, ή ενα μεταλικό φύλο προστασίας και ένα εξωτερικό πλαστικό καλυμα.

ΕΧΟΥΝ ΔΥΟ ΑΓΩΓΟΥΣ, Ο ΕΝΑΣ ΠΕΡΙΒΑΛΛΕΙ ΤΟΝ ΑΛΛΟ.

ΕΥΡΟΣ ΖΩΝΗΣ. ΤΟ ΧΡΗΣΙΜΟΠΟΙΟΥΜΕΝΟ ΦΘΑΝΕΙ ΤΑ 400 MHz.

ΧΡΗΣΕΙΣ. ΔΥΣΧΡΗΣΤΟ ΛΟΓΩ ΔΙΑΜΕΤΡΟΥ, ΔΥΣΚΑΜΨΙΑΣ, ΕΙΔΙΚΟΥΣ CONNECORS. ΧΡΗΣΙΜΟΠΟΙΕΙΤΑΙ ΣΤΗ ΚΑΛΩΔΙΑΚΗ ΤΗΛΕΟΡΑΣΗ, ΤΟΠΙΚΑ ΔΙΚΤΥΑ ΥΠΟΛΟΓΙΣΤΩΝ, ΥΠΕΡΑΣΤΙΚΕΣ ΣΥΝΔΕΣΕΙΣ ΤΗΛΕΦΩΝΩΝ.

ΑΣΦΑΛΕΙΑ. ΜΕΓΑΛΥΤΕΡΗ ΑΠΟ ΣΥΝΕΣΤΡΑΜΕΝΑ.
ομοαξονικο (Coaxial cable): Αποτελείται από ένα εσωτερικό χάλκινο αγωγό, που περιβάλεται από πλαστική μόνωση και αυτή με τη σειρά της από ένα χάλκινο πλέγμα, ή ενα μεταλικό φύλο προστασίας και ένα εξωτερικό πλαστικό καλυμα.

ΚΟΣΤΟΣ. ΕΙΝΑΙ 3 ΜΕ 5 ΦΟΡΕΣ ΑΚΡΙΒΟΤΕΡΟ ΑΠΟ ΤΑ ΣΥΝΕΣΤΡΑΜΕΝΑ ΚΑΛΩΔΙΑ.

ΤΟΠΙΚΑ ΔΙΚΤΥΑ. ΕΙΝΑΙ ΤΟ ΜΕΧΡΙ ΣΤΙΓΜΗΣ ΕΥΡΥΤΕΡΑ ΧΡΗΣΙΜΟΠΟΙΟΥΜΕΝΟ ΜΕΣΟ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 458#cptResource223]

ΟΠΤΙΚΕΣ ΙΝΕΣ#cptIt24#

name::
* McsElln.ΟΠΤΙΚΕΣ ΙΝΕΣ@cptIt,

twisted-pair-cable

name::
* McsEngl.twisted-pair-cable@cptIt,
* McsEngl.cable.twisted-pair@cptIt,

ΣΥΝΕΣΤΡΑΜΜΕΝΑ ΚΑΛΩΔΙΑ: (TWISTED PAIR).

ΕΙΝΑΙ ΧΑΛΚΙΝΑ.
ΜΟΝΩΜΕΝΟΙ ΑΓΩΓΟΙ ΕΙΝΑΙ ΣΥΝΕΛΙΓΜΕΝΟΙ ΜΕΤΑΞΥ ΤΟΥΣ, ΓΙΑΤΙ Η ΣΥΝΕΛΙΞΗ ΠΡΟΣΦΕΡΕΙ ΣΑΦΩΣ ΜΕΓΑΛΥΤΕΡΗ ΑΝΤΙΣΤΑΣΗ ΣΤΗΝ ΠΑΡΟΥΣΙΑ ΘΟΡΥΒΟΥ.

ΜΕ ΤΑ ΣΥΝΕΣΤΡΑΜΕΝΑ ΚΑΛΩΔΙΑ ΕΝΑ ΣΗΜΑ ΜΠΟΡΕΙ ΝΑ ΔΙΑΝΥΣΕΙ ΑΠΟΣΤΑΣΕΙΣ ΧΙΛΙΟΜΕΤΡΩΝ. ΑΥΤΟ ΗΤΑΝ ΤΟ ΠΡΩΤΟ ΜΕΣΟ ΣΤΑ ΤΗΛΕΦΩΝΙΚΑ ΔΙΚΤΥΑ.

data-grade (πρωστατευόμενο) twisted-pair

twisted-pair τηλεφωνικο καλώδιο, απροστάτευτο διπλου αγωγου. Σ'ένα δικτυο Token-Ring με τετιο καλώδιο δε μπορει να συνδέσουμε περισότερες από 96 συσκευές.

ΘΩΡΑΚΙΣΜΕΝΑ ΚΑΛΩΔΙΑ. (SHIELDED)
ΜΟΝΩΣΗ ΤΩΝ ΣΥΝΕΣΤΡΑΜΜΕΝΩΝ ΚΑΛΩΔΙΩΝ ΜΕ ΕΞΩΤΕΡΙΚΟ ΠΡΟΣΤΑΤΕΥΤΙΚΟ ΚΑΛΥΜΜΑ.
Η ΤΥΧΟΝ ΚΑΛΥΨΗ ΤΟΥ ΚΑΛΩΔΙΟΥ ΜΕ ΜΕΤΑΛΛΙΚΟ ΠΕΡΙΒΛΗΜΑ ΒΕΛΤΙΩΝΕΙ ΚΑΤΑ ΠΟΛΥ ΤΗΝ ΑΝΤΙΣΤΑΣΗ ΣΤΗΝ ΠΑΡΑΔΙΑΦΩΝΙΑ (CROSSTALK) ΠΡΑΓΜΑ ΣΗΜΑΝΤΙΚΟ ΣΤΑ ΤΟΠΙΚΑ ΔΙΚΤΥΑ.

ΤΗΛΕΦΩΝΙΚΕΣ-ΓΡΑΜΕΣ#cptIt125: attSpe#

name::
* McsElln.ΤΗΛΕΦΩΝΙΚΕΣ-ΓΡΑΜΕΣ@cptIt,

cmnCnl.medium.FDDI

name::
* McsEngl.cmnCnl.medium.FDDI@cptIt,
* McsEngl.conceptIt109,
* McsEngl.FDDI@cptIt,
* McsEngl.fddi@cptIt109,
* McsEngl.Fiber-Distributed-Data-Interface@cptIt,

DEFINITION

ΠΡΟΣΔΙΟΡΙΖΕΙ ΕΝΑ BACKBONE NETWORK ΜΕΤΑΓΩΓΗΣ ΠΑΚΕΤΩΝ ΠΟΥ ΔΙΑΣΥΝΔΕΕΙ LAN.
ΒΑΣΙΖΕΤΑΙ ΣΤΗΝ ΤΕΧΝΙΚΗ token passing ΚΑΙ ΧΡΗΣΙΜΟΠΟΙΕΙ ΔΥΟ ΖΕΥΓΗ ΟΠΤΙΚΩΝ ΙΝΩΝ ΣΤΗΝ ΤΑΧΥΤΗΤΑ ΤΩΝ 100Mbps ΚΑΙ ΔΗΜΙΟΥΡΓΕΙ ΕΝΑ ΔΙΚΤΥΟ ΔΙΠΛΟΥ ΔΑΚΤΥΛΙΟΥ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 482#cptResource223]

ΟΡΙΣΜΟΣ: Μια προδιαγραφή για δίκτυα οπτικών ινών που λειτουργούν στα 100 mbps.
Ορισμένοι οργανισμοί όπως AMD Advanced Micro Devices, προωθούν τη χρήση του FDDI για μεταφορά δεδομένων σε PC αντι να το περιορίζουν σε συνδέσεις μεταξύ δικτύων. Αν και το 1990 η κάρτα που χρειαζόταν για να συνδεθεί ένα PC στο FDDI κόστιζε $4.000, η AMD ελπίζει ότι θα πέσει αρκετά κάτω από τα $1.000 μεχρι τα μέσα της δεκαετίας.

GENERIC

_GENERIC:
* wire-channel#cptItsoft17#

EVALUATION#cptCore546.107#

ΜΕΙΟΝΕΚΤΗΜΑΤΑ: Δεν μπορεί να αποτελέσει λύση για τηλεπικοινωνίες σε εθνικό ή ευρωπαϊκό επίπεδο.

RS-232 serial cable

SYSTIMAX

ΣΥΣΤΗΜΑ ΔΟΜΗΜΕΝΗΣ ΚΑΛΩΔΙΩΣΗΣ της AT&T. H ANIXTER ειναι the european authorisez distributor of AT&T SCS.

UTP

name::
* McsEngl.conceptIt17.1,
* McsEngl.utp@cptIt17.1,

ΣΥΝΔΕΣΗ ΜΕ ΚΛΙΠ:
* απο δεξια προς αριστερά
* κλιπ κουμπώματος κάτω,
1- Ασπρο-Πορτοκαλί,
2- Πορτοκαλί,
3- Α-Πράσινο,
4- Μπλε,
5- Α-Μπλέ,
6- Πράσινο,
7- Α-καφέ,
8- Καφέ,

cmnChl.medium.wire.FIBER-OPTICS

name::
* McsEngl.cmnChl.medium.wire.FIBER-OPTICS@cptIt,
* McsEngl.conceptIt24,
* McsEngl.fiber-optics-channel@cptIt,
* McsEngl.fiferOptics'channel@cptIt24,
* McsElln.ΟΠΤΙΚΩΝ-ΙΝΩΝ-ΚΑΝΑΛΙ@cptIt,

DEFINITION

Η ΒΑΣΙΚΗ ΙΔΕΑ ΕΙΝΑΙ Η ΧΡΗΣΗ ΤΗΣ ΟΠΤΙΚΗΣ ΙΝΑΣ ΩΣ ΜΕΣΟΥ ΚΑΙ ΤΟΥ ΦΩΤΟΣ ΩΣ ΦΟΡΕΑ ΤΗΣ ΠΛΗΡΟΦΟΡΙΑΣ, ΑΝΤΙ ΤΟ ΡΕΥΜΑ ή ΤΗΝ ΤΑΣΗ ΠΟΥ ΧΡΗΣΙΜΟΠΟΙΟΥΜΕ ΣΤΑ ΕΝΣΥΡΜΑΤΑ ΜΕΣΑ.

ATTRIBUTE

ΤΡΟΠΟΙ ΜΕΤΑΔΟΣΗΣ
multimode
single mode (monomode)

ΤΥΠΟΠΟΙΗΣΕΙΣ
Cabling System Type 5, IBM

FDDI#cptIt109: attSpe# ANSI
PDS, AT&T

SONET#cptIt134: attSpe# Bellcore and ECSA
ΣΤΟΙΧΕΙΑ ΠΟΥ ΑΠΑΡΤΙΖΟΥΝ ΕΝΑ ΔΙΚΤΥΟ ΟΠΤΙΚΩΝ ΙΝΩΝ
ΠΟΜΠΟΙ
ΔΕΚΤΕΣ
ΣΥΝΔΕΣΜΟΙ (CONNECTORS)
ΜΟΝΙΜΟΙ ΣΥΝΔΕΣΜΟΙ (SPLICES)
ΔΙΑΚΛΑΔΩΤΕΣ (COUPLERS)
ΕΠΑΝΑΛΗΠΤΕΣ (REPEATERS)

EVALUATION#cptCore546.107#

- ΔΥΣΚΟΛΟΙ ΟΙ ΤΡΟΠΟΙ ΣΥΝΔΕΣΗΣ

Distance#cptCore978.4#

ΕΠΙΤΥΓΧΑΝΟΝΤΑΙ ΣΗΜΕΡΑ ΑΠΟΣΤΑΣΕΙΣ ΧΩΡΙΣ ΑΝΑΜΕΤΑΔΟΤΗ ΠΟΥ ΞΕΠΕΡΝΟΥΝ ΤΑ 300 ΧΙΛΙΟΜΕΤΡΑ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 83#cptResource223]

PRICE#cptEconomy541.44#

ΕΝΩ ΤΟ 1983 ΚΟΣΤΙΖΕ 1000 ΔΡΧ ΤΟ ΜΕΤΡΟ
ΤΟ 1991 ΚΟΣΤΙΖΕ 140 ΔΡΧ ΤΟ ΜΕΤΡΟ.
[COMPUTER GO, DEC 1992, 214]

TRANSFER RATE#cptIt498#

ΥΠΑΡΧΟΥΝ ΙΝΕΣ ΕΓΚΑΤΕΣΤΗΜΕΝΕΣ ΜΕ ΡΥΘΜΟΥΣ ΜΕΤΑΔΟΣΗΣ 1,7Gbps ΕΝΩ ΣΕ ΕΡΓΑΣΤΗΡΙΑΚΕΣ ΕΦΑΡΜΟΓΕΣ ΦΘΑΝΟΥΜΕ ΑΚΟΜΑ ΚΑΙ ΤΑ 6 Gbps
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 83#cptResource223]

cmnchl.medium.WIRELESS

name::
* McsEngl.cmnchl.medium.WIRELESS@cptIt,
* McsEngl.conceptIt208,
* McsEngl.CommChannel'wireless@cptIt208,
* McsEngl.wireless-communication@cptIt,
====== lagoGreek:
* McsElln.ΑΣΥΡΜΑΤΑ-ΜΕΣΑ-ΜΕΤΑΔΟΣΗΣ@cptIt,
* McsElln.ΑΣΥΡΜΑΤΗ-ΕΠΙΚΟΙΝΩΝΙΑ@cptIt,
* McsElln.ΑΣΥΡΜΑΤΕΣ-ΖΕΥΞΕΙΣ@cptIt,
* McsElln.ΑΣΥΡΜΑΤΟ-ΔΙΚΤΥΟ@cptIt,

DEFINITION

ΕΙΝΑΙ ΤΕΧΝΙΚΕΣ ΕΚΠΟΜΠΗΣ ΗΛΕΚΤΡΟΜΑΓΝΗΤΙΚΩΝ ΚΥΜΑΤΩΝ ΔΙΑΜΕΣΟΥ ΤΗΣ ΑΤΜΟΣΦΑΙΡΑΣ.
ΟΠΩΣ ΤΑ ΜΙΚΡΟΚΥΜΑΤΑ, ΟΙ ΥΠΕΡΥΘΡΕΣ ΚΑΙ ΤΑ LASER.

GENERIC

_GENERIC:
COMMUNICATION CHANNEL#cptItsoft168#

WHOLE

_WHOLE:
* net.wireless#cptItsoft575#

APPLICATION#cptIt97#

Distance#cptCore978.4#

EVALUATION#cptCore546.107#

ΜΕΙΟΝΕΚΤΗΜΑΤΑ:
- ΑΠΑΙΤΕΙΤΑΙ ΜΕΓΑΛΗ ΙΣΧΥ ΓΙΑ ΤΟΥΣ ΠΟΜΠΟΥΣ ΜΕΤΑΔΟΣΗΣ.
- ΥΠΑΡΧΕΙ ΕΥΑΙΣΘΗΣΙΑ ΣΕ ΠΑΡΕΜΒΟΛΕΣ ΘΟΡΥΒΟΥ.
- ΜΕΙΟΜΕΝΗ ΑΣΦΑΛΕΙΑ ΑΦΟΥ ΚΑΘΕΝΑΣ ΜΕ ΜΙΑ ΚΕΡΑΙΑ ΚΑΙ ΔΕΚΤΗ ΜΠΟΡΕΙ ΝΑ ΠΑΡΕΙ ΤΑ ΣΗΜΑΤΑ.

ΠΛΕΟΝΕΚΤΗΜΑΤΑ:
- ΤΟ ΒΑΣΙΚΟ ΠΛΕΟΝΕΚΤΗΜΑ-ΤΟΥΣ ΕΙΝΑΙ Η ΜΗ ΕΞΑΡΤΗΣΗ-ΤΟΥΣ ΑΠΟ ΤΑ ΥΛΙΚΑ ΜΕΣΑ.

FREQUENCY#cptCore1013: attPar#

ΤΑ ΜΙΚΡΟΚΥΜΑΤΑ ΧΡΗΣΙΜΟΠΟΙΟΥΝ ΣΥΧΝΟΤΗΤΕΣ ΑΠΟ 109 ΕΩΣ 1010 Hz.

ΟΙ ΥΠΕΡΥΘΡΕΣ ΑΠΟ 10^11 ΕΩΣ 10^14 Hz ΚΑΙ

ΤΑ LAZER ΑΠΟ 10^14 ΕΩΣ 10^15 Hz.

TRANSFER RATE#cptIt498#

ENVIRONMENT#cptCore756#

ENVIRONMENT: COAXIAL ROUTE:
A microwave route, however, carries much less traffic than the largest coaxial routes.

SPECIFIC

Specific_concepts (level 3) =

_SPECIFIC:
* MOBILE communication
* METEOR-BURST-CHANEL#cptIt30: attSpe#
* ΡΑΔΙΟΕΠΙΚΟΙΝΩΝΙΕΣ
* ΜΙΚΡΟΚΥΜΑΤΙΚΕΣ-ΕΠΙΓΕΙΕΣ#cptIt127: attSpe#
* ΔΟΡΥΦΟΡΙΚΕΣ-ΖΕΥΞΕΙΣ#cptIt126: attSpe#
* COAXIAL ROUTE

CDPD {CELLULAR DIGITAL PACKET DATA)

Η ΤΕΧΝΟΛΟΓΙΑ ΑΥΤΗ ΥΠΟΣΧΕΤΑΙ ΧΑΜΗΛΟΥ ΚΟΣΤΟΥΣ ΜΕΤΑΔΟΣΗ ΚΑΙ ΛΗΨΗ ΤΟΣΟ ΑΝΑΛΟΓΙΚΩΝ ΟΣΟ ΚΑΙ ΨΗΦΙΑΚΩΝ ΔΕΔΟΜΕΝΩΝ, ΧΡΗΣΙΜΟΠΟΙΩΝΤΑΣ ΤΗΝ ΚΙΝΗΤΗ ΤΗΛΕΦΩΝΙΑ.
ΘΑ ΕΦΑΡΜΟΣΤΕΙ ΣΤΑ ΜΕΣΑ 1993.

the technology wedges bursts of bits into minuscule pauses in the analog cellular-phone system.

RADIO-COMMUNICATION

_CREATED: {2015-07-09}

name::
* McsEngl.RADIO-COMMUNICATION@cptIt,
* McsEngl.wireless-communication.radio@cptIt,

_DESCRIPTION:
Radio is the radiation (wireless transmission) of electromagnetic energy through space.[n 1] The biggest use of radio waves is to carry information, such as sound, by systematically changing (modulating) some property of the radiated waves, such as their amplitude, frequency, phase, or pulse width. When radio waves strike an electrical conductor, the oscillating fields induce an alternating current in the conductor. The information in the waves can be extracted and transformed back into its original form.

Radio systems need a transmitter to modulate (change) some property of the energy produced to impress a signal on it, for example using amplitude modulation, angle modulation (which can be frequency modulation or phase modulation). Radio systems also need an antenna to convert electric currents into radio waves, and vice versa. An antenna can be used for both transmitting and receiving. The electrical resonance of tuned circuits in radios allow individual stations to be selected. The electromagnetic wave is intercepted by a tuned receiving antenna. A radio receiver receives its input from an antenna and converts it into a form usable for the consumer, such as sound, pictures, digital data, measurement values, navigational positions, etc.[2] Radio frequencies occupy the range from a 3 kHz to 300 GHz, although commercially important uses of radio use only a small part of this spectrum.[3]

A radio communication system sends signals by radio.[4] The radio equipment involved in communication systems includes a transmitter and a receiver, each having an antenna and appropriate terminal equipment such as a microphone at the transmitter and a loudspeaker at the receiver in the case of a voice-communication system.[5]
[https://en.wikipedia.org/wiki/Radio]

cmnchl.mode.PARALLEL

name::
* McsEngl.cmnchl.mode.PARALLEL@cptIt,
* McsEngl.conceptIt62,
* McsEngl.parallel-communication-channel@cptIt,
* McsEngl.parallel-transmission@cptIt,
* McsElln.ΠΑΡΑΛΛΗΛΗ-ΜΕΤΑΔΟΣΗ@cptIt,

DEFINITION

Many bits together, usally 8 with 8 cables.

cmnchl.mode.SERIAL

name::
* McsEngl.cmnchl.mode.SERIAL@cptIt,
* McsEngl.conceptIt60,
* McsEngl.serial-communication-channel@cptIt,
* McsEngl.serial'communicationChannel@cptIt60,
* McsElln.ΣΕΙΡΙΑΚΗ-ΜΕΤΑΔΟΣΗ@cptIt,

DEFINITION

ΕΙΝΑΙ Ο ΔΗΜΟΦΙΛΕΣΤΕΡΟΣ ΤΡΟΠΟΣ ΣΥΣΝΔΕΣΗΣ ΜΕΤΑΞΥ ΥΠΟΛΟΓΙΣΤΙΚΩΝ ΣΥΣΤΗΜΑΤΩΝ.
ΚΛΑΣΣΙΚΟ ΠΑΡΑΔΕΙΓΜΑ ΣΕΙΡΙΑΚΗΣ ΕΠΙΚΟΙΝΩΝΙΑΣ ΕΙΝΑΙ Η ΣΥΝΔΕΣΗ ΜΕΣΩ ΤΟΥ interface V.24 (RS-232).

GENERIC

_GENERIC:
COMMUNICATION CHANNEL#cptItsoft168#

SERIAL PORT

ΧΡΗΣΙΜΟΠΟΙΕΙΤΑΙ ΚΑΤ'ΑΠΟΚΛΕΙΣΤΙΚΟΤΗΤΑ ΣΤΙΣ ΣΥΝΔΕΣΕΙΣ ΜΕΓΑΛΩΝ ΑΠΟΣΤΑΣΕΩΝ ΜΕΣΩ MODEM, ΟΠΟΥ ΠΕΡΙΟΡΙΖΟΜΑΣΤΕ ΣΤΟ ΝΑ ΧΡΗΣΙΜΟΠΟΙΟΥΜΕ ΕΝΑ ΜΟΝΟ ΦΥΣΙΚΟ ΚΑΝΑΛΙ ΜΕΤΑΔΟΣΗΣ.

cmnchl.mode.SYNCHRONOUS

name::
* McsEngl.cmnchl.mode.SYNCHRONOUS@cptIt,
* McsEngl.conceptIt95,
* McsEngl.CommChannel'synchronous@cptIt95,
* McsEngl.synchronous-transfer-mode@cptIt,
* McsEngl.synchronous-communication-channel@cptIt,
* McsEngl.synchronous'CommChannel@cptIt95,
* McsElln.ΣΥΓΧΡΟΝΟΣ-ΤΡΟΠΟΣ-ΜΕΤΑΔΟΣΗΣ@cptIt,

DEFINITION

Χρησιμοποιεί ένα σήμα χρονισμού για τη ρύθμιση της ροής των δεδομένων. Η σύγχρονη επικοινωνία δεν απαιτεί αρχικό και τελικό μπιτ.
ΧΡΗΣΙΜΟΠΟΙΕΙΤΑΙ ΕΥΡΕΩΣ ΣΤΑ ΜΕΓΑΛΥΤΕΡΑ ΥΠΟΛΟΓΙΣΤΙΚΑ ΣΥΣΤΗΜΑΤΑ ΓΙΑ ΜΕΤΑΦΟΡΕΣ ΑΡΧΕΙΩΝ, ΑΛΛΑ ΚΑΙ ΣΕ ΠΕΡΙΒΑΛΛΟΝ ONLINE ΣΥΝΑΛΛΑΓΩΝ.

ΠΛΕΟΝΕΚΤΗΜΑΤΑ
ΔΙΑΘΕΤΕΙ ΑΠΟΔΟΤΙΚΟΤΕΡΟΥΣ ΜΗΧΑΝΙΣΜΟΥΣ ΕΛΕΓΧΟΥ ΣΦΑΛΜΑΤΩΝ ΑΠΟ ΤΗΝ ΑΠΛΗ ΜΕΘΟΔΟ PARITY ΠΟΥ ΣΥΝΑΝΤΑΜΕ ΣΤΗΝ ΑΣΥΓΧΡΟΝΗ.
Η ΑΠΟΔΟΣΗ-ΤΗΣ ΕΙΝΑΙ ΣΑΦΩΣ ΥΨΗΛΟΤΕΡΗ, ΕΠΕΙΔΗ ΧΡΗΣΙΜΟΠΟΙΕΙ ΛΙΓΟΥΣ ΠΡΟΣΘΕΤΟΥΣ ΧΑΡΑΚΤΗΡΕΣ.

cmnchl.mode.SYNCHRONOUS.ΝΟ

name::
* McsEngl.cmnchl.mode.SYNCHRONOUS.ΝΟ@cptIt,
* McsEngl.conceptIt93,
* McsEngl.cmnchl.asynchronous@cptIt,
* McsEngl.cmnchl.mode.ASYNCHRONOUS@cptIt,
* McsEngl.asynchronous-communication@cptIt,
* McsEngl.asynchronous-cmnchl@cptIt,
====== lagoGreek:
* McsElln.ΑΣΥΓΧΡΟΝΟΣ-ΤΡΟΠΟΣ-ΜΕΤΑΔΟΣΗΣ@cptIt,

DEFINITION

ΑΣΥΓΧΡΟΝΗ ΜΕΤΑΔΟΣΗ
Ειναι μια μέθοδος μετάδοσης στην οποία τα μπάιτς αποστέλλονται ανα ένα μπιτ καθε φορά. Κάθε μπάιτ μεταφέρεται με ένα μπιτ αρχής και ένα μπιτ τέλους που συγχρονίζουν τα σήματα στις συσκευές αποστολής και λήψης.
Ο ΑΡΙΘΜΟΣ ΤΩΝ ΜΠΙΤ ΑΝΑ ΧΑΡΑΚΤΗΡΑ ΕΙΝΑΙ ΠΡΟΣΥΜΦΩΝΗΜΕΝΟΣ ΜΕΤΑΞΥ ΠΟΜΠΟΥ ΚΑΙ ΔΕΚΤΗ.
ΟΙ ΠΡΟΣΩΠΙΚΟΙ ΥΠΟΛΟΓΙΣΤΕΣ ΤΗΝ ΕΧΟΥΝ ΥΙΟΘΕΤΗΣΕΙ ΣΑΝ ΚΥΡΙΑ ΜΕΘΟΔΟ ΕΠΙΚΟΙΝΩΝΙΑΣ.
ΧΡΗΣΙΜΟΠΟΙΕΙΤΑΙ ΣΕ ΣΥΝΔΕΣΕΙΣ ΑΠΛΩΝ ΤΕΡΜΑΤΙΚΩΝ ΜΕ ΥΠΟΛΟΓΙΣΤΕΣ, ΣΤΟ ΔΙΚΤΥΟ ΤΕΛΕΞ, ΣΤΗ ΣΕΙΡΙΑΚΗ ΣΥΝΔΕΣΗ ΥΠΟΛΟΓΙΣΤΩΝ ΜΕ ΕΚΤΥΠΩΤΕΣ, PLOTTER ΚΛΠ.

ΠΛΕΟΝΕΚΤΗΜΑΤΑ
-ΥΛΟΠΟΙΕΙΤΑΙ ΕΥΚΟΛΑ ΜΕ ΧΑΜΗΛΟΥ ΚΟΣΤΟΥΣ ΣΥΣΚΕΥΕΣ

GENERIC

_GENERIC:
COMMUNICATION CHANNEL#cptIt168#

cmnchl.node.POINT-TO-MULTIPOINT

name::
* McsEngl.cmnchl.node.POINT-TO-MULTIPOINT@cptIt,
* McsEngl.one-to-many-connection@cptIt,
* McsEngl.point-to-multipoint-connection@cptIt,

_DESCRIPTION:
In telecommunications, point-to-multipoint communication is communication which is accomplished via a distinct type of one-to-many connection, providing multiple paths from a single location to multiple locations.[1]

Point-to-multipoint is often abbreviated as P2MP, PTMP, or PMP.

Point-to-multipoint telecommunications is most typically (2003) used in wireless Internet and IP telephony via gigahertz radio frequencies. P2MP systems have been designed both as single and bi-directional systems. A central antenna or antenna array broadcasts to several receiving antennas and the system uses a form of time-division multiplexing to allow for the back-channel traffic.
[https://en.wikipedia.org/wiki/Point-to-multipoint_communication]

cmnchl.node.POINT-TO-POINT

name::
* McsEngl.cmnchl.node.POINT-TO-POINT@cptIt,
* McsEngl.point-to-point-connection@cptIt,

_DESCRIPTION:
In telecommunications, a point-to-point connection refers to a communications connection between two nodes or endpoints. An example is a telephone call, in which one telephone is connected with one other, and what is said by one caller can only be heard by the other. This is contrasted with a point-to-multipoint or broadcast communication topology, in which many nodes can receive information transmitted by one node. Other examples of point-to-point communications links are leased lines, microwave relay links, and two way radio. Examples of point-to-multipoint communications systems are radio and television broadcasting.

The term is also used in computer networking and computer architecture to refer to a wire or other connection that links only two computers or circuits, as opposed to other network topologies such as buses or crossbar switches which can connect many communications devices.

Point-to-point is sometimes abbreviated as P2P, Pt2Pt.[citation needed] This usage of P2P is distinct from P2P referring to peer-to-peer file sharing networks.
[https://en.wikipedia.org/wiki/Point-to-point_%28telecommunications%29]
===
ΚΑΘΕ ΤΕΡΜΑΤΙΚΟ ΣΕ ΜΙΑ ΘΥΡΑ ΥΠΟΛΟΓΙΣΤΗ.
ΕΙΝΑΙ ΣΑΦΩΣ Η ΑΠΟΔΟΤΙΚΟΤΕΡΗ ΣΥΝΔΕΣΗ ΑΝ ΕΞΑΙΡΕΣΟΥΜΕ ΤΟΝ ΠΑΡΑΓΟΝΤΑ ΚΟΣΤΟΣ.

SPECIFIC:
* duplex-channel#cptIt63#
* simplex-channel##

DUPLEX-CHANNELL

name::
* McsEngl.conceptIt63,
* McsEngl.CommChannel'duplex@cptIt63,
* McsEngl.duplex-communication-channel@cptIt,
* McsEngl.duplex'CommChannel@cptIt63,
====== lagoGreek:
* McsElln.ΚΥΚΛΩΜΑ-ΕΠΙΚΟΙΝΩΝΙΑΣ@cptIt,

SPECIFIC

Specific_concepts (level 3) =

HALF_DUPLEX
ΑΜΦΙΔΡΟΜΗ, ΜΗ ΤΑΥΤΟΧΡΟΝΗ.
ΕΙΝΑΙ ΕΥΡΥΤΑΤΑ ΔΙΑΔΕΔΟΜΕΝΗ ΣΗΜΕΡΑ ΣΤΟ ΧΩΡΟ ΤΩΝ ΕΠΙΚΟΙΝΩΝΙΩΝ ΔΕΔΟΜΕΝΩΝ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 51#cptResource223]

FULL_DUPLEX
ΤΑΥΤΟΧΡΟΝΑ ΑΜΦΙΔΡΟΜΗ.
ΣΥΝΗΘΩΣ ΑΠΑΙΤΟΥΝΤΑΙ ΤΕΤΡΑΣΥΡΜΑΤΕΣ ΓΡΑΜΜΕΣ, ΤΟ ΕΝΑ ΖΕΥΓΑΡΙ ΓΙΑ ΕΚΠΟΜΠΗ ΚΑΙ ΤΟ ΑΛΛΟ ΓΙΑ ΛΗΨΗ. ΜΕ ΝΕΕΣ ΤΕΧΝΙΚΕΣ ΠΟΥ ΑΝΑΠΤΥΧΘΗΚΑΝ ΥΠΑΡΧΕΙ Η ΔΥΝΑΤΟΤΗΤΑ ΣΕ ΔΙΣΥΡΜΑΤΕΣ ΓΡΑΜΜΕΣ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 51#cptResource223]

SIMPLEX

SIMPLEX:
ΜΟΝΗΣ ΚΑΤΕΥΘΥΝΣΗΣ.
ΠΑΡΑΔΕΙΓΜΑΤΑ ΕΙΝΑΙ Η ΑΠΟΣΤΟΛΗ ΔΕΔΟΜΕΝΩΝ ΑΠΟ ΥΠΟΛΟΓΙΣΤΗ ΣΕ ΕΚΤΥΠΩΤΗ, ΟΙ ΡΑΔΙΟΦΩΝΙΚΕΣ ΚΑΙ ΤΗΛΕΟΠΤΙΚΕΣ ΕΚΠΟΜΠΕΣ ΚΛΠ.

cmnchl.node.MULTIPOINT

name::
* McsEngl.cmnchl.node.MULTIPOINT@cptIt,

MULTIDROP. ΠΟΛΛΑ ΤΕΡΜΑΤΙΚΑ ΣΕ ΜΙΑ ΘΥΡΑ ΥΠΟΛΟΓΙΣΤΗ.
ΑΠΑΙΤΟΥΝΤΑΙ ΕΙΔΙΚΑ ΠΡΩΤΟΚΟΛΛΑ ΚΑΙ ΕΞΥΠΝΑ ΤΕΡΜΑΤΙΚΑ.
ΟΙ ΣΥΝΔΕΣΕΙΣ ΕΠΙΤΥΓΧΑΝΟΝΤΑΙ ΜΟΝΟ ΜΕΣΩ ΑΦΙΕΡΩΜΕΝΩΝ ΚΑΙ ΟΧΙ ΕΠΙΛΕΓΟΜΕΝΩΝ ΓΡΑΜΜΩΝ.

cmnchl.node.MULTIPLEXING

name::
* McsEngl.cmnchl.node.MULTIPLEXING@cptIt,

ΠΟΛΥΠΛΕΞΗ
ΠΙΟ ΠΟΛΛΑ ΤΕΡΜΑΤΙΚΑ, ΑΠΟ MULTIPOINT CONECTION, ΣΥΝΔΕΟΝΤΑΙ ΜΕ ΜΙΑ ΘΥΡΑ ΥΠΟΛΟΓΙΣΤΗ

cmnchl.PERMANENT

name::
* McsEngl.cmnchl.PERMANENT@cptIt,
* McsEngl.conceptIt384,
* McsEngl.permanent-communication-channel@cptIt,
* McsEngl.permanent-line@cptIt,
* McsElln.ΜΟΝΙΜΗ-ΣΥΝΔΕΣΗ@cptIt,

DEFINITION

Η σύνδεση θεωρείται ΜΟΝΙΜΗ όταν από τη στιγμή που αποκατασταθεί δεν χρειάζεται να γίνουν επιπλέον ενέργειες από τα δύο συνομιλούντα άκρα. Υπάρχουν πολλοί διαφορετικοί τρόποι να επιτευχθεί αυτό. Αν οι υπολογιστές βρίσκονται κοντά (στο ίδιο κτίριο πχ) ο ένας με τον άλλο αρκεί ένα καλώδιο που θα πηγαίνει από τον ένα στον άλλο. Αν δεν είναι τόσο κοντά μπορεί να χρησιμοποιηθεί μια μισθωμένη, εξωκείμενη, όπως λέγεται, τηλεφωνική γραμμή, μια κανονική τηλεφωνική γραμμή δηλαδή που δεν περνά μέσα από το επιλεκτικό κέντρο του ΟΤΕ. Αλλες μορφές μόνιμης σύνδεσης είναι οι ψηφιακές μισθωμένες γραμμές (HellasCom) τα εικονικά μόνιμα κυκλώματα X.25, η τεχνολογία Frame Relay κλπ.
[ΠΗΓΗ: ΡΑΜ 1997ιουλ, 106]

cmnchl.signal.ANALOG

name::
* McsEngl.cmnchl.signal.ANALOG@cptIt,

cmnchl.signal.DIGITAL

name::
* McsEngl.cmnchl.signal.DIGITAL@cptIt,
* McsEngl.conceptIt207,
* McsEngl.CommChannel'digital@cptIt207,
* McsEngl.digital-network@cptIt,
* McsEngl.digital-comm-channel@cptIt,
* McsEngl.digital'CommChannel@cptIt207,

DEFINITION

The key concept of a digital network is that it lays the foundations for creating a ubiquitous integrated network capable of handling all our communications requirements, from a simple telephone call to the broadcasting of high-definition television.

cmnchl.T-1

name::
* McsEngl.cmnchl.T-1@cptIt,
* McsEngl.conceptIt160,
* McsEngl.T@cptIt1-channel,

DEFINITION

It is a digital, two-way channel capable of handling multiple voice, data, or video transmissions simultaneously in real time. One T-1 circuit consists of 24 channels for voice, data, or video. A T-1 circuit can be divided into its 24 component channels with a multiplexer.

GENERIC

_GENERIC:
COMMUNICATION CHANNEL#cptIt168#

netIt'hardware

name::
* McsEngl.netIt'hardware@cptIt,
* McsEngl.nethardware@cptIt,

_SPECIFIC:
* bridge#cptIt82#

nethardware.BRIDGE

name::
* McsEngl.nethardware.BRIDGE@cptIt,
* McsEngl.conceptIt82,
* McsEngl.bridge@cptIt82,
* McsEngl.network-bridge@cptIt,
* McsEngl.network-bridge@cptIt,

* McsEngl.name.network-bridge@cptIt,
====== lagoGreek:
* McsElln.ΓΕΦΥΡΑ@cptIt,
* McsElln.γέφυρα-δικτύου@cptIt,

DEFINITION

Μια γέφυρα είναι ένας συνδυασμός hardware software που ενώνει ΔΥΟ(2) δίκτυα που χρησιμοποιούν παρόμοιες μεθόδους επικοινωνίας.

ΓΕΦΥΡΑ: Μία συσκευή για τη σύνδεση δύο τμημάτων ΕΝΟΣ τοπικού δικτύου.
[TELECOM (CGO), APR 1994, 50]
Οι γέφυρες συνδέουν ΔΥΟ δίκτυα ίδιου τύπου.
[TELECOM, APR 1994, 31]

ΜΕ ΤΙΣ ΓΕΦΥΡΕΣ ΣΥΝΔΕΟΝΤΑΙ ΔΥΟ ΤΟΠΙΚΑ ΔΙΚΤΥΑ ΜΕΤΑΞΥ-ΤΟΥΣ ΕΙΤΕ ΤΟΠΙΚΑ ΕΙΤΕ ΑΠΟΜΑΚΡΥΣΜΕΝΑ.

Οι εσωτερικές γέφυρες βρίσκονται μέσα στον διακομιστή αρχείων και δεν είναι τίποτα περισότερο απο μία καρτα διασύνδεσης.
Ενα δίκτυο NetWare μπορεί να συνδεθεί με 4 άλλα δίκτυα με 1 εσωτ. γέφυρα.

Οι εξωτερικές γέφυρες απαιτούν ένα σταθμό εργασίας και το ανάλογο σοφτγουερ. Εκτός απο τη βελτιωμένη απόδοση, οι εξωτερικές γέφυρες επιτρέπουν τη γεφύρωση ακόμα κι όταν ο διακομιστής αρχείων δέν έχει διαθέσιμες υποδοχές επέκτασης.

OSI LAYER

2 layer.

ENVIRONMENT: BRIDGE & ROUTER

Γενικα οι routers είναι αρκετά πιο "ευφυείς" απο τις bridges επιτρεποντας συζεύξεις διαφορετικών δικτύων
[TELECOM, OCT 1994, 27]

SPECIFIC

_SPECIFIC:
Οι γέφυρες χωρίζονται σε ΤΟΠΙΚΕΣ και ΑΠΟΜΑΚΡΥΣΜΕΝΕΣ. Χρειαζόμαστε μια τοπική γεφυρα αλλα δύο απομακρυσμενες για να συνδέσουμε ένα καλώδιο.

REMOTE BRIDGES

Οι γέφυρες μεγάλων αποστάσεων (remote bridges) χρησιμοποιούνται όταν είναι πρακτικώς αδύνατο να συνδεθούν φυσικά μεταξύ τους δύο δίκτυα. Τότε χρησιμοποιούνται τηλεφωνικές γραμμες ή δημόσια δίκτυα δεδομενων.

netIt'node

name::
* McsEngl.netIt'node@cptIt,
====== lagoGreek:
* McsElln.κόμβος-δικτύου-τεχνολογίας-πληροφορίας@cptIt,

_DESCRIPTION:
In communication networks, a node (Latin nodus, ‘knot’) is either a connection point, a redistribution point, or a communication endpoint (some terminal equipment). The definition of a node depends on the network and protocol layer referred to. A physical network node is an active electronic device that is attached to a network, and is capable of creating, receiving, or transmitting information over a communications channel.[1] A passive distribution point such as a distribution frame or patch panel is consequently not a node.
[https://en.wikipedia.org/wiki/Node_%28networking%29]

COMPUTER-NETWORK-NODE#ql:netcmr'node#

LOGICAL-NODE

PHYSICAL-NODE

netIt'terminal

name::
* McsEngl.netIt'terminal@cptIt,
* McsEngl.conceptIt33,
* McsEngl.device.TERMINAL@cptIt,
* McsEngl.terminal@cptIt,
* McsEngl.terminal-device@cptIt33,
* McsElln.ΤΕΡΜΑΤΙΚΟ@cptIt,

DEFINITION

_DESCRIPTION:
Terminal (telecommunication), a device communicating over a line.
Computer console, a text output device for system administration messages
Computer terminal, a hardware device for data entry and display in a computer system
[http://en.wikipedia.org/wiki/Terminal]

_DESCRIPTION:
In the context of telecommunications, a terminal is a device which ends a telecommunications link and is the point at which a signal enters and/or leaves a network. Examples of equipment containing network terminations are telephones, fax machines, computer terminals and network devices, printers and workstations.
[https://en.wikipedia.org/wiki/Terminal_%28telecommunication%29]

SPECIFIC

Specific_concepts (level 3) =

dummy terminals

ΑΠΛΑ ΤΕΡΜΑΤΙΚΑ

Η ΚΩΔΙΚΟΠΟΙΗΣΗ ΤΩΝ ΧΑΡΑΚΤΗΡΩΝ ΑΚΟΛΟΥΘΕΙ ΤΟΝ ΚΩΔΙΚΑ ASCII ΚΑΙ Η ΣΕΙΡΙΑΚΗ ΠΟΡΤΑ ΕΠΙΚΟΙΝΩΝΙΑΣ ΑΚΟΛΟΥΘΕΙ ΤΗΝ ΤΥΠΟΠΟΙΗΣΗ V.24

intelligent terminals

ΕΞΥΠΝΑ ΤΕΡΜΑΤΙΚΑ

ΕΙΝΑΙ ΣΥΝΗΘΩΣ ΣΧΕΔΙΑΣΜΕΝΑ ΚΑΤΑ ΠΕΡΙΠΤΩΣΗ.

netIt'noise

name::
* McsEngl.netIt'noise@cptIt,

netIt'protocol (cmnprl)

_CREATED: {2013-07-28} {2011-09-09}

name::
* McsEngl.netIt'protocol (cmnprl)@cptIt,

DEFINITION

_DESCRIPTION:
Comprotocol is THE-LANGUAGE an it-network uses to communicate information among its nodes.
[hmnSngo.2015-08-13]
===
Definition: A network protocol defines rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets.
Protocols exist at several levels in a telecommunication connection. For example, there are protocols for the data interchange at the hardware device level and protocols for data interchange at the application program level. In the standard model known as Open Systems Interconnection (OSI), there are one or more protocols at each layer in the telecommunication exchange that both ends of the exchange must recognize and observe. Protocols are often described in an industry or international standard.
[http://compnetworking.about.com/od/networkprotocols/g/protocols.htm]
===
A communications protocol is a system of digital message formats and rules for exchanging those messages in or between computing systems and in telecommunications. A protocol may have a formal description.

Protocols may include signaling, authentication and error detection and correction capabilities.

A protocol definition defines the syntax, semantics, and synchronization of communication; the specified behaviour is typically independent of how it is to be implemented. A protocol can therefore be implemented as hardware or software or both.
...
While there is no generally accepted formal definition of "protocol" in computer science,[citation needed] an informal definition, based on the previous, could be "a set of procedures to be followed when communicating". In computer science the word algorithm is a synonym for the word procedure so a protocol is to communications what an algorithm is to mathematics.
[http://en.wikipedia.org/wiki/Communications_protocol]

cmnprl'Implementation

_CREATED: {2015-08-15}

name::
* McsEngl.cmnprl'Implementation@cptIt,
* McsEngl.cmnprl'application@cptIt,

cmnprl'Relation-to-programming-language

name::
* McsEngl.cmnprl'Relation-to-programming-language@cptIt,

Protocols are to communications what algorithms or programming languages are to computations.[23][1]
[http://en.wikipedia.org/wiki/Communications_protocol]

cmnprl'resourceInfHmn#cptResource843#

name::
* McsEngl.cmnprl'resourceInfHmn@cptIt,

_SPECIFIC:
* http://en.wikipedia.org/wiki/List_of_network_protocols

cmnprl'doing

name::
* McsEngl.cmnprl'doing@cptIt,

Unlike physical mail, however, network protocols also provide some advanced capabilities like delivering a constant flow of messages to one destination (called streaming) and automatically making copies of a message and delivering it to multiple destinations at once (called broadcasting).
[http://compnetworking.about.com/od/basicnetworkingconcepts/a/how-computer-networks-work-introduction-to-protocols.htm]

cmnprl.doing.DESIGNING

name::
* McsEngl.cmnprl.doing.DESIGNING@cptIt,

cmnprl'GENERIC

_GENERIC:
* mapping-method#cptCore320#
* entity.model.information.method#cptCore181.67#

SPECIFIC

name::
* McsEngl.cmnprl.specific@cptIt,

_SPECIFIC:
* Addessing/ΔΙΕΥΘΥΝΣΙΟΔΟΤΗΣΗ ΜΗΝΥΜΑΤΩΝ
* BSC
* communication-standard#ql:communication_standard@cptIt139i#
* computer-network-protocol
* Connection Control/ΕΛΕΓΧΟΣ ΣΥΝΔΕΣΗΣ
* DCOM
* DDE
* Encapsulation/ΕΝΘΥΛΑΚΩΣΗ ΜΗΝΥΜΑΤΩΝ
* Error control/ΕΛΕΓΧΟΣ ΣΦΑΛΜΑΤΩΝ
* Error Correction Protocol
* File-transfer-protocol
* Flow control/ΕΛΕΓΧΟΣ ΡΟΗΣ
* Frame relay
* HTTP#cptItsoft457#
* IIOP
* Internet Protocol Suite
* MAC##
* Poll/select protocls
* SDLC
* Security/ΑΣΦΑΛΕΙΑ ΕΠΙΚΟΙΝΩΝΙΑΣ
* Segmentation protocols/ΚΑΤΑΚΕΡΜΑΤΙΣΜΟΣ ΜΗΝΥΜΑΤΩΝ
* Sequencing/ΤΑΞΙΝΟΜΗΣΗ ΜΗΝΥΜΑΤΩΝ
* Priority/ΠΡΟΤΕΡΑΙΟΤΗΤΑ
* Reassembly/ΕΠΑΝΑΣΥΓΚΟΛΗΣΗ ΜΗΝΥΜΑΤΩΝ
* RMI
* SOAP
* TCP/IP
* UDP##

List of network protocols
* http://en.wikipedia.org/wiki/List_of_network_protocols,
Protocol stack: List of network protocol stacks
Bluetooth protocol
Fibre Channel network protocols
Internet Protocol Suite or TCP/IP model or TCP/IP stack
OSI protocols family of information exchange standards developed jointly by the ISO and the ITU-T
Routing protocols
List of IP protocol numbers, protocol numbers used in the Protocol field of the IPv4 header and the Next Header field of IPv6 header
Yahoo! Messenger, underlying protocol used by the Yahoo messenger
RTPS protocol, an interoperability protocol
SSH Secure Shell
FTP File Transfer Protocol
SMTP Simple Mail Transfer Protocol
TCP Transmission Control Protocol
Telnet Telephone Network
HTTP Hyper Text Transfer Protocol
HTTPs Secure Hyper Text Transfer Protocol
HTCPCP Hyper Text Coffee Pot Control Protocol
MTP Media Transfer Protocol
SFTP Secure File Transfer Protocol
SSL Secure Socket Layer
TLS Transport Layer Security
POP post office protocol
E6 Ethernet globalization protocols
NTP Network time protocol
PPP Point to Point Protocol
NNTP Network News Transfer Protocol
IMAP Internet Message Access Protocol
Bitcoin Protocol Protocol to transfer value on the web

cmnprl.SPECIFIC-DIVISION.device

name::
* McsEngl.cmnprl.SPECIFIC-DIVISION.device@cptIt,

_SPECIFIC_DIVISION:
* computer-protocol##
* phone-protocol##
* router-protocol#ql:name.routing_protocol#

cmnprl.SPECIFIC-DIVISION.information

name::
* McsEngl.cmnprl.SPECIFIC-DIVISION.information@cptIt,

_SPECIFIC_DIVISION:
* data-protocol##
* video-protocol##
* voice-protocol##

cmnprl.SPECIFIC-DIVISION.doing

name::
* McsEngl.cmnprl.SPECIFIC-DIVISION.doing@cptIt,

_SPECIFIC_DIVISION:
* mail-protocol##

_SPECIFIC_DIVISION.FUNCTION:
* Addessing/ΔΙΕΥΘΥΝΣΙΟΔΟΤΗΣΗ ΜΗΝΥΜΑΤΩΝ
* BSC
* Connection Control/ΕΛΕΓΧΟΣ ΣΥΝΔΕΣΗΣ
* Encapsulation/ΕΝΘΥΛΑΚΩΣΗ ΜΗΝΥΜΑΤΩΝ
* Error control/ΕΛΕΓΧΟΣ ΣΦΑΛΜΑΤΩΝ
* Error Correction Protocol
* File-transfer-protocol
* Flow control/ΕΛΕΓΧΟΣ ΡΟΗΣ
* Frame relay
* Poll/select protocls
* SDLC
* Security/ΑΣΦΑΛΕΙΑ ΕΠΙΚΟΙΝΩΝΙΑΣ
* Segmentation protocols/ΚΑΤΑΚΕΡΜΑΤΙΣΜΟΣ ΜΗΝΥΜΑΤΩΝ
* Sequencing/ΤΑΞΙΝΟΜΗΣΗ ΜΗΝΥΜΑΤΩΝ
* Priority/ΠΡΟΤΕΡΑΙΟΤΗΤΑ
* Reassembly/ΕΠΑΝΑΣΥΓΚΟΛΗΣΗ ΜΗΝΥΜΑΤΩΝ

cmnprl.SPECIFIC-DIVISION.medium

name::
* McsEngl.cmnprl.SPECIFIC-DIVISION.medium@cptIt,

_SPECIFIC_DIVISION:
* wire-protocol##
* wireless-protocol##

cmnprl.BIT-ORIENTED

name::
* McsEngl.cmnprl.BIT-ORIENTED@cptIt,

_SPECIFIC:
* SDLC

cmnprl.Character-oriented (byte)

name::
* McsEngl.cmnprl.Character-oriented (byte)@cptIt,

_SPECIFIC:
* BSC
* HDLC
* SDLC

cmnprl.CRYPTOGRAPHIC#ql:protocol.cryptographic@cptIt#

name::
* McsEngl.cmnprl.CRYPTOGRAPHIC@cptIt,

cmnprl.device.COMPUTER

name::
* McsEngl.cmnprl.device.COMPUTER@cptIt,
* McsEngl.cmnprl.COMPUTER@cptIt,
* McsEngl.computer-network-protocol@cptIt,

_DESCRIPTION:
In order for computers to communicate with one another, standard methods of information transfer and processing have been devised. These are referred to as "protocols" and some of the more common ones such as TCP, IP, UDP, POP, SMTP, HTTP, and FTP are discussed here.
Introduction
When two humans converse, they may have to use the same language but they generally understand each other without having to adhere to rigid rules of grammar or formal language frameworks. Computers, on the other hand, have to have everything explicitly defined and structured. If computers wish to communicate with one another, they have to know in advance exactly how information is to be exchanged and precisely what the format will be. Therefore, standard methods of transmitting and processing various kinds of information are used and these methods are called "protocols". Protocols are established by international agreement and ensure that computers everywhere can talk to one another. There are a variety of protocols for different kinds of information and functions. This article will discuss some of the common protocols that the average PC user is likely to encounter.
[http://vlaurie.com/computers2/Articles/protocol.htm]

SPECIFIC

_SPECIFIC:
* TCP/IP##

cmnprl.doing.ERROR-CORRECTION

name::
* McsEngl.cmnprl.doing.ERROR-CORRECTION@cptIt,

ΓΙΑ ΝΑ ΕΠΙΤΕΥΧΘΕΙ ΜΙΑ ΕΠΙΚΟΙΝΩΝΙΑ ΧΩΡΙΣ ΣΦΑΛΜΑΤΑ ΘΑ ΠΡΕΠΕΙ ΤΑ MODEMS ΣΤΑ ΔΥΟ ΑΚΡΑ ΝΑ ΧΡΗΣΙΜΟΠΟΙΟΥΝ ΤΙΣ ΙΔΙΕΣ ΜΕΘΟΔΟΥΣ ΔΙΟΡΘΩΣΗΣ ΛΑΘΩΝ.

_SPECIFIC:
* ARQ
* CCITT v.42
* MNP#cptIt135#

cmnprl.doing.FILE-TRANSFER

name::
* McsEngl.cmnprl.doing.FILE-TRANSFER@cptIt,
* McsEngl.file-transfer-protocol@cptIt,

AFP: AppleTalk File Protocol.

FTP: File Transfer Protocol

IPX: Το πρωτόκολλο επικοινωνίας LAN of NetWare.

Kermit
Kermit is a protocol designed for transferring files between micro- computers and mainframe computers. It was developed by Frank DaCruz and Bill Catchings at Columbia University in New York and is widely accepted, especially in the academic world. Kermit was named after the fuzzy, green talking frog of Jim Henson's "The Muppet Show".
There are both public domain, and copyrighted Kermit programs that not only include the protocol but are complete programs in themselves offering the communication functions needed for the particular machine on which they are running.
Write for the complete Kermit protocol manual (more than 100 pgs.):
Kermit Distribution, (212) 854-3703 Columbia University Center for Computing Activities 612 West 115 Street, New York, NY 10025 NTP:
[SOURCE: PC-GLOSSARY 1993]

NFS: Network File System. Sun Microsystems.

RFS: Remote File Service. AT&T.

SLIP:

SMTP: Simple Mail Transfer Protocol

TCP/IP#cptIt2006: attSpe#Transmission Control Protocol/Internet Protocol.

TELNET: ένα προγραμμα προσομοίωσης τερματικών και επικοινωνιών.

XNS: Xerox Network Services. Πρωτόκολο κατανεμημένων συστηματων αρχείων.

XTI:

cmnprl.FTP

name::
* McsEngl.cmnprl.FTP@cptIt,
* McsEngl.FTP@cptIt,
* McsEngl.protocol.FTP@cptIt,

ftp'port

name::
* McsEngl.ftp'port@cptIt,

_DESCRIPTION:
FTP is a TCP based service exclusively. There is no UDP component to FTP. FTP is an unusual service in that it utilizes two ports, a 'data' port and a 'command' port (also known as the control port). Traditionally these are port 21 for the command port and port 20 for the data port. The confusion begins however, when we find that depending on the mode, the data port is not always on port 20.
[http://slacksite.com/other/ftp.html]

ftp.ACTIVE-PASSIVE

name::
* McsEngl.ftp.ACTIVE-PASSIVE@cptIt,
* McsEngl.ftp.passive-active@cptIt,

_ADDRESS.WPG:
* Active FTP vs. Passive FTP, a Definitive Explanation: http://slacksite.com/other/ftp.html,

_DESCRIPTION:
Summary

The following chart should help admins remember how each FTP mode works:
Active FTP :
command : client >1023 -> server 21
data : client >1023 <- server 20
Passive FTP :
command : client >1023 -> server 21
data : client >1024 -> server >1023
A quick summary of the pros and cons of active vs. passive FTP is also in order:
Active FTP is beneficial to the FTP server admin, but detrimental to the client side admin. The FTP server attempts to make connections to random high ports on the client, which would almost certainly be blocked by a firewall on the client side. Passive FTP is beneficial to the client, but detrimental to the FTP server admin. The client will make both connections to the server, but one of them will be to a random high port, which would almost certainly be blocked by a firewall on the server side.
Luckily, there is somewhat of a compromise. Since admins running FTP servers will need to make their servers accessible to the greatest number of clients, they will almost certainly need to support passive FTP. The exposure of high level ports on the server can be minimized by specifying a limited port range for the FTP server to use. Thus, everything except for this range of ports can be firewalled on the server side. While this doesn't eliminate all risk to the server, it decreases it tremendously.
[http://slacksite.com/other/ftp.html]
===
Passive Mode is way to specify how to talk to an FTP server. Some servers only allow Passive Mode, some don't and want you to turn it off. Basically, it's like this: imagine I'm chatting with a friend online through instant messaging. Passive Mode is like saying to my friend, "Hey, I'll call you on your phone right now." Turning off Passive Mode (aka Active Mode) is like saying to my friend, "Hey, you call me!" So, it ends up being the same result - us having a conversation or, for FTP, transferring a file. Passive Mode basically decides who does the calling.
[http://fireftp.net/help.html]

cmnprl.FTPS#ql:ftps@cptIt#

name::
* McsEngl.cmnprl.FTPS@cptIt,

cmnprl.doing.MAIL

name::
* McsEngl.cmnprl.doing.MAIL@cptIt,
* McsEngl.mail-protocol@cptIt,

_SPECIFIC:
* SMTP##
* POP3##

cmnprl.doing.NFS

_CREATED: {2013-08-26}

name::
* McsEngl.cmnprl.doing.NFS@cptIt,
* McsEngl.cmnprl.NFS@cptIt,
* McsEngl.NFS@cptIt,
* McsEngl.network-file-system@cptIt,

_DESCRIPTION:
Network File System (NFS) is a distributed file system protocol originally developed by Sun Microsystems in 1984,[1] allowing a user on a client computer to access files over a network in a manner similar to how local storage is accessed. NFS, like many other protocols, builds on the Open Network Computing Remote Procedure Call (ONC RPC) system. The Network File System is an open standard defined in RFCs, allowing anyone to implement the protocol.
[http://en.wikipedia.org/wiki/Network_File_System]

cmnprl.doing.ROUTING

name::
* McsEngl.cmnprl.doing.ROUTING@cptIt,
* McsEngl.cmnprl.routing@cptIt,
* McsEngl.protocol.routing@cptIt,
* McsEngl.routing-protocol@cptIt,

_DESCRIPTION:
Routing protocols are special-purpose protocols designed specifically for use by network routers on the Internet. Common routing protocols include EIGRP, OSPF and BGP.
[http://compnetworking.about.com/od/networkprotocols/g/protocols.htm]

cmnprl.IS-IS

name::
* McsEngl.cmnprl.IS-IS@cptIt,

_DESCRIPTION:
Intermediate System to Intermediate System (IS-IS) is a routing protocol designed to move information efficiently within a computer network, a group of physically connected computers or similar devices. It accomplishes this by determining the best route for datagrams through a packet-switched network.

The protocol was defined in ISO/IEC 10589:2002 as an international standard within the Open Systems Interconnection (OSI) reference design. Though originally an ISO standard, the IETF republished the protocol as an Internet Standard in RFC 1142.

IS-IS has been called "the de facto standard for large service provider network backbones."[1]
[https://en.wikipedia.org/wiki/IS-IS]

cmnprl.medium.WIRE

name::
* McsEngl.cmnprl.medium.WIRE@cptIt,

cmnprl.medium.WIRELESS

name::
* McsEngl.cmnprl.medium.WIRELESS@cptIt,
* McsEngl.cmnprl.wireless@cptIt,

_DESCRIPTION:
People sometimes refer to wireless networking as “Wi-Fi” even when the network uses a totally unrelated kind of wireless technology. While it might seem ideal that all of the world’s wireless devices should use one common network protocol such as Wi-Fi, today’s networks support a wide variety of different protocols instead. The reason: No one protocol in existence provides an optimal solution for all of the different wireless usages people want. Some are better optimized to conserve battery on mobile devices, while others offer higher speeds, or more reliable and longer-distance connections.
[http://compnetworking.about.com/od/networkprotocols/tp/guide-to-wireless-network-protocols.htm]
===
Wireless protocols; technologies including 802.11, WLAN, WPA, WEP, Wi-Fi and wireless broadband; and deployment issues such as access points, security and troubleshooting are discussed in this guide designed to provide a basic introduction to wireless protocols and technologies.
[http://searchnetworking.techtarget.com/tutorial/Wireless-protocols-learning-guide]

cmnprl.60GHZ

name::
* McsEngl.cmnprl.60GHZ@cptIt,

_DESCRIPTION:
• 60 GHz Protocols - WirelessHD and WiGig
One of the most popular activities on computer networks is streaming of video data, and several wireless protocols that run on 60 Gigahertz (GHz) frequencies have been built to better support this and other usages which require large amounts of network bandwidth. Two different industry standards called WirelessHD and WiGig were created in the 2000s both using 60 GHz technology to support high-bandwidth wireless connections: WiGig offers between 1 and 7 Gbps of bandwidth while WirelessHD supports between 10 and 28 Gbps.
Although basic video streaming can be done over Wi-Fi networks, best quality high-definition video streams demand the higher data rates these protocols offer. The very high signaling frequencies of WirelessHD and WiGig compared to Wi-Fi (60 GHz versus 2.4 or 5 GHz) greatly limit connection range, generally shorter than Bluetooth, and typically to within a single room (as 60 GHz signals do not penetrate walls effectively).
[http://compnetworking.about.com/od/networkprotocols/tp/guide-to-wireless-network-protocols.htm]

cmnprl.BLUETOOTH

name::
* McsEngl.cmnprl.BLUETOOTH@cptIt,
* McsEngl.bluetooth-protocol@cptIt,

_DESCRIPTION:
One of the oldest wireless protocols still broadly available, Bluetooth was created in the 1990s to synchronize data between phones and other battery-powered devices. Bluetooth requires a lower amount of power to operate than Wi-Fi and most other wireless protocols. In return, Bluetooth connections only function over relatively short distances, often 30 feet (10 m) or less and support relatively low data rates, usually 1-2 Mbps. Wi-Fi has replaced Bluetooth on some newer equipment, but many phones today still support both of these protocols.
[http://compnetworking.about.com/od/networkprotocols/tp/guide-to-wireless-network-protocols.htm]

cmnprl.LTE

name::
* McsEngl.cmnprl.LTE@cptIt,
* McsEngl.LTE-protocol@cptIt,

_DESCRIPTION:
LTE
Before newer smartphones adopted so-called fourth-generation (“4G”) wireless networking, phones utilized a dizzying variety of older generation cellular communication protocols with names such as HSDPA, GPRS, and EV-DO. Phone carriers and the industry have invested large sums of money to upgrade cell towers and other network equipment to support 4G, standardizing on a communication protocol called Long Term Evolution (LTE) that emerged as a popular service starting in 2010.

LTE technology was designed to significantly improve on the low data rates and roaming issues with older phone protocols. The protocol can carry more than 100 Mbps of data, although the network bandwidth is normally regulated to levels below 10 Mbps for individual users. Due to the significant cost of equipment, plus some government regulatory challenges, phone carriers have not yet deployed LTE in many locations. LTE is also not suitable for home and other local area networking, being designed to support a larger number of customers across much longer distances (and corresponding higher cost).
[http://compnetworking.about.com/od/networkprotocols/tp/guide-to-wireless-network-protocols.htm]

cmnprl.WIFI

name::
* McsEngl.cmnprl.WIFI@cptIt,
* McsEngl.wi-fi-protocol@cptIt,

_DESCRIPTION:
Wi-Fi is widely associated with wireless networking as it has become the de facto standard for home networks and public hotspot networks. Wi-Fi became popular starting in the late 1990s as the networking hardware required to enable PCs, printers and other consumer devices became widely affordable and the supported data rates were improved to acceptable levels (from 11 Mbps to 54 Mbps and above).

Although Wi-Fi can be made to run over longer-distances in carefully-controlled environments, the protocol is practically limited to work within single residential or commercial buildings and outdoor areas within short walking distances. Wi-Fi speeds are also lower than for some other wireless protocols. Mobile devices increasingly support both Wi-Fi and LTE (plus some older cellular protocols) to give users more flexibility in the kinds of networks they can use.

Wi-Fi Protected Access security protocols add network authentication and data encryption capabilities to Wi-Fi networks. Specifically, WPA2 is recommended for use on home networks to prevent unauthorized parties from logging into the network or intercepting personal data sent over the air.
[http://compnetworking.about.com/od/networkprotocols/tp/guide-to-wireless-network-protocols.htm]

cmnprl.WIRELESS-HOME-AUTOMATION

name::
* McsEngl.cmnprl.WIRELESS-HOME-AUTOMATION@cptIt,
* McsEngl.Wireless-home-automation-protocol@cptIt,

_DESCRIPTION:
Wireless Home Automation Protocols - Z-Wave and Zigbee
Various network protocols have been created to support home automation systems that allow remote control of lights, home appliances and consumer gadgets. Two prominent wireless protocols for home automation are Z-Wave and Zigbee. To achieve the extremely low energy consumption required in home automation environments, these protocols and their associated hardware support only low data rates - 0.25 Mbps for Zigbee and only about 0.01 Mbps for Z-Wave. While such data rates are obviously unsuitable for general-purpose networking, these technologies work well as interfaces to consumer gadgets which have simple and limited communication requirements
[http://compnetworking.about.com/od/networkprotocols/tp/guide-to-wireless-network-protocols.htm]

cmnprl.MODEL (architecture)

name::
* McsEngl.cmnprl.MODEL (architecture)@cptIt,
* McsEngl.conceptIt51,
* McsEngl.netCmr'architecture@cptIt,
* McsEngl.network-architecture@cptIt51,
* McsEngl.network-model@cptIt,

_DESCRIPTION:
Network architecture is the design of a communications network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in its operation.

In telecommunication, the specification of a network architecture may also include a detailed description of products and services delivered via a communications network, as well as detailed rate and billing structures under which services are compensated.

The network architecture of the Internet is predominantly expressed by its use of the Internet Protocol Suite, rather than a specific model for interconnecting networks or nodes in the network, or the usage of specific types of hardware links.
[https://en.wikipedia.org/wiki/Network_architecture]
===
Η ΟΡΓΑΝΩΣΗ ΤΗΣ ΟΛΗΣ ΕΠΙΚΟΙΝΩΝΙΑΣ, Η ΙΕΡΑΡΧΗΣΗ ΤΩΝ ΛΕΙΤΟΥΡΓΙΩΝ ΣΕ ΔΙΑΦΟΡΑ ΕΠΙΠΕΔΑ, Ο ΚΑΘΟΡΙΣΜΟΣ ΤΩΝ ΠΡΩΤΟΚΟΛΛΩΝ ΚΑΙ ΤΗΣ ΜΕΤΑΞΥ-ΤΟΥΣ ΣΧΕΣΗΣ ΟΝΟΜΑΖΕΤΑΙ ΑΡΧΙΤΕΚΤΟΝΙΚΗ ΕΠΙΚΟΙΝΩΝΙΑΣ ΥΠΟΛΟΓΙΣΤΩΝ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 317#cptResource223]

_SPECIFIC:
* OSI, open systems interconnection, ISO#cptItsoft2#
* SNA, Systems network architecture, IBM#cptItsoft175#
* DCA Distributed systesms network, Unisys
* DNA Digital Network Architecture, DEC
* DNA Distributed network architecture, NCR
* DSA Distributed system architectue, Bull
* DSN Distributed system network, HP

cmnprl.model.HIERARCHICAL-INTERNETWORKING

name::
* McsEngl.cmnprl.model.HIERARCHICAL-INTERNETWORKING@cptIt,

_DESCRIPTION:
The Hierarchical internetworking model, or three-layer model, is a network design model first proposed by Cisco. The three-layer model divides enterprise networks into three layers: core, distribution, and access layer. Each layer provides different services to end-stations and servers.
[https://en.wikipedia.org/wiki/Hierarchical_internetworking_model]

cmnprl.model.SOFTWARE-DEFINED-NETWORK

_CREATED: {2015-08-15}

name::
* McsEngl.cmnprl.model.SOFTWARE-DEFINED-NETWORK@cptIt,
* McsEngl.SDN@cptIt,
* McsEngl.software-defined-network-architecture@cptIt,

_DESCRIPTION:
Software defined networking, SDN is a telecommunications network architecture that provides the promise of significant improvements in the network performance.

Using software defined networking the is possible to make the network more dynamic, manageable, cost-effective, and adaptable.

The key behind software defined networking is that the SDN architectures decouple network control and forwarding functions. This enables the network control to become directly programmable. As a result the underlying network infrastructure can be abstracted from applications and network services.
[http://www.radio-electronics.com/info/telecommunications_networks/sdn-software-defined-networking/basics-tutorial.php]

control-plane

data-plane

OpenFlow-protocol

Open-Networking-Foundation

cmnprl.model.SYSTEMS-NETWORK-ARCHITECTURE (SNA)

name::
* McsEngl.cmnprl.model.SYSTEMS-NETWORK-ARCHITECTURE (SNA)@cptIt,
* McsEngl.conceptIt175,
* McsEngl.SNA@cptIt,
* McsEngl.sna@cptIt175,
* McsEngl.systems-network-architecture@cptIt,

DEFINITION

SNA {Systems Network Architecture} Tο network σύστημα της IBM. Η απάντηση της στο 'OSI#cptIt2#' μοντέλλο.

Είναι γνήσιο ιεραρχικό.

SUBSETS:
 APPC#cptIt176: attSpe#
 SAA
LINK PROTOCOLS:
 SDLC
 LLC2 in token ring environment,

cmnprl.model.OSI

name::
* McsEngl.conceptIt2,
* McsEngl.osi@cptIt2,
* McsEngl.osi-model@cptIt2,
* McsEngl.open systems interconnection,

osi'DEFINITION

The Open Systems Interconnection (OSI) protocols are a family of information exchange standards developed jointly by the ISO and the ITU-T starting in 1977. The OSI model describes seven layers of interconnection: the Physical Layer (Layer 1), Data Link Layer (Layer 2), Network Layer (Layer 3), Transport Layer (Layer 4), Session Layer (Layer 5), Presentation Layer (Layer 6), and the Application Layer (Layer 7).

Nowadays, this protocol/model is only a history. The theory may look good, but failed in the implementation. Both its model and the protocols are actually flawed. Some critics also said that the choice of seven layers was more political than technical, and two of the layers (session and presentation) are nearly empty, whereas two other ones (data link and network) are overfull.[1]

Most network protocols used in the market today are based on TCP/IP stacks.
[http://en.wikipedia.org/wiki/OSI_protocol_suite]

TO OSI ΘΕΩΡΕΙΤΑΙ ΩΣ Η ΒΑΣΗ ΓΙΑ ΤΗΝ ΕΠΙΚΟΙΝΩΝΙΑ ΣΥΣΤΗΜΑΤΩΝ ΥΠΟΛΟΓΙΣΤΩΝ ΤΑ ΕΠΟΜΕΝΑ ΧΡΟΝΙΑ. Ο ΣΤΟΧΟΣ ΤΟΥ ΠΡΟΤΥΠΟΥ ΑΥΤΟΥ ΕΙΝΑΙ Η ΔΗΜΙΟΥΡΓΙΑ ΤΥΠΟΠΟΙΗΣΗΣ ΩΣΤΕ ΝΑ ΕΙΝΑΙ ΔΥΝΑΤΗ Η ΕΠΙΚΟΙΝΩΝΙΑ ΜΕΤΑΞΥ ΥΠΟΛΟΓΙΣΤΩΝ ΔΙΑΦΟΡΕΤΙΚΩΝ ΚΑΤΑΣΚΕΥΑΣΤΩΝ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 317#cptResource223]

Στις αρχες τις δεκαετίας του 70, ο ISO#cptIt164# δημιούργησε το OSI.

osi'layer

name::
* McsEngl.osi'layer@cptIt,

_DESCRIPTION:
ΟΛΕΣ ΟΙ ΑΠΑΙΤΟΥΜΕΝΕΣ ΓΙΑ ΕΠΙΚΟΙΝΩΝΙΑ ΛΕΙΤΟΥΡΓΙΕΣ ΟΜΑΔΟΠΟΙΟΥΝΤΑΙ ΣΕ ΕΠΤΑ ΕΠΙΠΕΔΑ. ΟΙ ΛΕΙΤΟΥΡΓΙΕΣ ΑΥΤΕΣ ΕΙΝΑΙ ΑΝΕΞΑΡΤΗΤΕΣ ΜΕΤΑΞΥ-ΤΟΥΣ ΕΤΣΙ ΩΣΤΕ ΑΛΛΑΓΕΣ ΣΕ ΕΝΑ ΕΠΙΠΕΔΟ ΝΑ ΜΗΝ ΕΧΟΥΝ ΕΠΙΔΡΑΣΗ ΣΤΑ ΑΛΛΑ.
TA ΤΡΙΑ ΧΑΜΗΛΟΤΕΡΑ ΕΠΙΠΕΔΑ ΕΙΝΑΙ ΤΑ ΚΑΘΑΡΑ ΕΠΙΚΟΙΝΩΝΙΑΚΑ ΕΠΙΠΕΔΑ ΠΟΥ ΑΝΑΦΕΡΟΝΤΑΙ ΣΤΟΝ ΤΡΟΠΟ ΜΕΤΑΔΟΣΗΣ ΚΑΙ ΥΛΟΠΟΙΟΥΝΤΑΙ ΣΕ ΣΥΣΚΕΥΕΣ ΕΠΙΚΟΙΝΩΝΙΑΣ (ΤΗΛΕΠΙΚΟΙΝΩΝΙΑΚΟΙ ΚΟΜΒΟΙ, MODEM ΚΛΠ)
ΤΑ ΥΨΗΛΟΤΕΡΑ ΕΠΙΠΕΔΑ ΑΝΑΦΕΡΟΝΤΑΙ ΣΕ ΛΕΙΤΟΥΡΓΙΕΣ ΠΟΥ ΣΧΕΤΙΖΟΝΤΑΙ ΜΕ ΤΙΣ ΕΦΑΡΜΟΓΕΣ ΚΑΙ ΥΛΟΠΟΙΟΥΝΤΑΙ ΚΥΡΙΩΣ ΣΤΟΥΣ ΥΠΟΛΟΓΙΣΤΕΣ. ΟΙ ΤΥΠΟΠΟΙΗΣΕΙΣ ΓΙΑ ΤΑ ΕΠΙΠΕΔΑ ΑΥΤΑ ΠΟΥ ΗΤΑΝ ΑΝΥΠΑΡΚΤΕΣ, ΑΝΑΠΤΥΣΣΟΝΤΑΙ ΤΩΡΑ ΜΕ ΓΡΗΓΟΡΟΥΣ ΡΥΘΜΟΥΣ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 324#cptResource223]

osi'layer1.PHYSICAL

name::
* McsEngl.osi'layer1.PHYSICAL@cptIt,
* McsEngl.osi'physical-layer@cptIt,
====== lagoGreek:
* McsElln.ΦΥΣΙΚΟ-ΕΠΙΠΕΔΟ-ΤΟ@cptIt,

_DESCRIPTION:
Υλοποιεί τις ηλεκτρικές συνδέσεις.
ΟΙ ΥΠΗΡΕΣΙΕΣ ΠΟΥ ΠΡΟΣΦΕΡΕΙ ΠΕΡΑ ΑΠΟ ΤΗΝ ΕΝΕΡΓΟΠΟΙΗΣΗΣ ΚΑΙ ΑΠΕΝΕΡΓΟΠΟΙΗΣΗ ΤΗΣ ΦΥΣΙΚΗΣ ΣΥΝΔΕΣΗΣ ΕΙΝΑΙ Η ΜΕΤΑΦΟΡΑ ΤΩΝ ΔΕΔΟΜΕΝΩΝ ΣΕ ΜΟΡΦΗ ΜΠΙΤ ΣΥΓΧΡΟΝΑ ή ΑΣΥΓΧΡΟΝΑ ΚΑΙ Η ΕΠΙΣΗΜΑΝΣΗ ΣΦΑΛΜΑΤΩΝ ΜΕΤΑΔΟΣΗΣ.

ΠΡΩΤΟΚΟΛΛΑ:
CCITT: V.24/V.28, X.21, X.21 bis, X.20, X.20 bis, V.35
EIA : RS-232, RS-449, RS-485, RS-530, RS-422, RS-423
IEEE : 802 LAN, IEEE-488
ISO : 4903, 9314 FDDI.

osi'layer2.DATA-LINK

name::
* McsEngl.osi'layer2.DATA-LINK@cptIt,
* McsEngl.osi'data-link-layer@cptIt,
====== lagoGreek:
* McsElln.ΕΠΙΠΕΔΟ-ΔΙΑΣΥΝΔΕΣΗΣ-ΔΕΔΟΜΕΝΩΝ-ΤΟ@cptIt,

_DESCRIPTION:
Αυτό το επίπεδο βάζει χαρακτήρες στη γραμμή σχηματίζοντας μηνύματα και μετά ελέγχει πριν τα βαλλει στο δρόμο τους.
===
ΑΣΧΟΛΕΙΤΑΙ ΜΕ ΤΑ ΛΕΙΤΟΥΡΓΙΚΑ ΧΑΡΑΚΤΗΡΙΣΤΙΚΑ ΚΑΙ ΤΙΣ ΔΙΑΔΙΚΑΣΙΕΣ ΠΟΥ ΑΠΑΙΤΟΥΝΤΑΙ ΠΡΟΚΕΙΜΕΝΟΥ ΝΑ ΑΠΟΚΑΤΑΣΤΑΘΕΙ, ΝΑ ΥΠΟΣΤΗΡΙΧΘΕΙ ΚΑΙ ΤΕΛΟΣ ΝΑ ΤΕΡΜΑΤΙΣΘΕΙ ΜΙΑ ΣΥΝΔΕΣΗ.

ΠΡΩΤΟΚΟΛΛΑ ΠΟΥ ΧΡΗΣΙΜΟΠΟΙΟΥΝΤΑΙ:
CCITT: LAP-B, HDLC
ISO : 4335 (HDLC), 7776 (LAP/LAPB), 8802 LAN, R 1745 (BYTE ORIETED), 9314-2 FDDI.
ANSI : ADCCP
IEEE : 802.2 LOGICAL LINK CONTROL.

osi'layer3.NETWORK

name::
* McsEngl.osi'layer3.NETWORK@cptIt,
* McsEngl.osi'network-layer@cptIt,
====== lagoGreek:
* McsElln.ΕΠΙΠΕΔΟ-ΔΙΚΤΥΟΥ-ΤΟ@cptIt,

_DESCRIPTION:
Αποφασίζει πιο φυσικό δρόμο πρέπει να ακολουθήσουν τα δεδομένα.

ΠΡΩΤΟΚΟΛΛΑ:
CCITT: X.25#cptIt114: attSpe# X.75
EIA : RS-366-A (AUTOMATIC CALLING PROCEDURE)
ISO : 8473-IP
DOD : IP

osi'layer4.TRANSPORT

name::
* McsEngl.osi'layer4.TRANSPORT@cptIt,
* McsEngl.osi'transport-layer@cptIt,
====== lagoGreek:
* McsElln.ΕΠΙΠΕΔΟ-ΜΕΤΑΦΟΡΑΣ@cptIt,

_DESCRIPTION:
Κανει πολλες απο τις εργασίες του επιπέδου δικτύου, αλλά τις κάνει τοπικά. Ενα ειναι το TCP/IP. Software που εκτελει αυτες τις λειτουργιες σε PC δικτυα είναι τα NetBIOS, Named Pipes, IPX.
ΣΤΗΝ ΟΥΣΙΑ ΕΙΝΑΙ ΤΟ ΠΡΩΤΟ ΕΠΙΠΕΔΟ ΠΟΥ ΕΙΝΑΙ ΚΑΤΩ ΑΠΟ ΤΟΝ ΕΛΕΓΧΟ ΤΟΥ ΧΡΗΣΤΗ.

ΠΡΩΤΟΚΟΛΛΑ:
CCITT: X.224 TRANSPORT PROTOCOL
ECMA : ECMA-72
DOD : IP
ISO : 8073, 9574 ISDN/ΤΕΤΑΡΤΟ ΕΠΙΠΕΔΟ

osi'layer5.SESSION

name::
* McsEngl.osi'layer5.SESSION@cptIt,
* McsEngl.osi'session-layer@cptIt,
====== lagoGreek:
* McsElln.ΕΠΙΠΕΔΟ-ΣΥΝΟΔΟΥ-ΤΟ@cptIt,

_DESCRIPTION:
Επιτρέπει δύο εφαρμογες να επικοινωνούν διαμέσου του δικτύου.

ΠΡΩΤΟΚΟΛΛΑ:
CCITT: X.225
ISO: 8327
DOD: TCP (TRANSMISSION CONTROL PROTOCOL)

osi'layer6.PRESENTATION

name::
* McsEngl.osi'layer6.PRESENTATION@cptIt,
* McsEngl.osi'presentaion-layer@cptIt,
====== lagoGreek:
* McsElln.ΕΠΙΠΕΔΟ-ΠΑΡΟΥΣΙΑΣΗΣ-ΤΟ@cptIt,

_DESCRIPTION:
Το Windows είναι ένα προγραμμα που εκτελεί αυτες π.χ. τις λειτουργίες.

ΠΡΩΤΟΚΟΛΛΑ:
CCITT: X.226, X.400/410
ISO : 8823
VIRTUAL FILE PROTOCOL
JOB TRANSFER MANIPULATION PROTOCOL.

osi'layer7.APPLICATION

name::
* McsEngl.osi'layer7.APPLICATION@cptIt,
* McsEngl.osi'application-layer@cptIt,
====== lagoGreek:
* McsElln.ΕΠΙΠΕΔΟ-ΕΦΑΡΜΟΓΩΝ-ΤΟ@cptIt,

_DESCRIPTION:
Το σημαντικότερο για το χρήστη. Τά στάνταρς είναι νέα όπως πχ το SAA, X.400 Message Handing.
===
ΟΙ ΛΕΙΤΟΥΡΓΙΕΣ ΤΟΥ ΕΠΙΠΕΔΟΥ ΑΥΤΟΥ ΠΡΟΣΔΙΟΡΙΖΟΝΤΑΙ ΣΕ ΜΕΓΑΛΟ ΒΑΘΜΟ ΑΠΟ ΤΟ ΧΡΗΣΤΗ ΤΟΥ ΔΙΚΤΥΟΥ ΓΙ'ΑΥΤΟ ΚΑΙ ΟΙ ΤΥΠΟΠΟΙΗΣΕΙΣ-ΤΟΥ ΕΙΝΑΙ ΟΙ ΛΙΓΟΤΕΡΟ ΚΑΘΟΡΙΣΜΕΝΕΣ.

ΠΡΩΤΟΚΟΛΛΑ:
CCITT: X.500 DIRECTORY SYSTEM, X.520, T.411 (ODA), X.400 MASSAGE HANDLING SYSTEM,
ISO: 8831 TRANSFER AND MANIPULATION, 9040, 10026 TP DISTRIBUTED TRANSACTION PROCESSING, 8632 COMPUTER GRAPHICS METAFILE, 9595 NETWORK MANAGEMENT, 8571 FTAM FILE TRANSFER ACCESS MANAGEMENT,
VIRTUAL TERMINAL PROTOCOL,
FILE TRANSFER PROTOCOL.
ΕΜΠΟΡΙΚΑ ΠΡΩΤΟΚΟΛΛΑ:
GENERAL MOTORS: MAP MANUFACTURING AYTOMATIC PROTOCOL
BOEING : TOP TECNICAL AND OFFICE PROTOCOL
DOD : GOSIP GOVERNMENT OSI PROFILE
IBM : LU 6.2

osi'protocol

name::
* McsEngl.osi'protocol@cptIt,

osi'relation-to-IEEE.STANDARDS

name::
* McsEngl.osi'relation-to-IEEE.STANDARDS@cptIt,

Τα IEEE στάνταρς χρησιμοποιουνται μόνο στα ΔΥΟ κατώτατα επίπεδα του OSI μοντέλου.

osi'relation-to-TCPIP

name::
* McsEngl.osi'relation-to-TCPIP@cptIt,

cmnprl.INTERNET-PROTOCOL-FAMILY {1970s}

_CREATED: {2011-09-09}

name::
* McsEngl.cmnprl.INTERNET-PROTOCOL-FAMILY {1970s}@cptIt,
* McsEngl.conceptIt142,
* McsEngl.cmnprl.TCP-IP-Protocol-suit@cptIt,
* McsEngl.DOD-model@cptIt, [wikipedia]
* McsEngl.internet-model@cptIt, [wikipedia]
* McsEngl.internet-protocol-family@cptIt,
* McsEngl.internet-protocol-suite@cptIt142,
* McsEngl.ipf'TCP-IP@cptIt,
* McsEngl.TCP-IP@cptIt,
* McsEngl.TCP-IP-model@cptIt,
* McsEngl.TCP/IP@cptIt,
* McsEngl.TCP-IP@cptIt142, {2011-09-09}
* McsEngl.tcpip@cptIt142, {2011-09-09}
* McsEngl.Transmission-Control-Protocol/Internet-Protocol-suite@cptIt,
* McsEngl.tcp'ip'model@cptIt124i,

* McsEngl.ipf@cptIt,

DEFINITION

_DESCRIPTION:
The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP/IP, because its most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP), were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense.

TCP/IP provides end-to-end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. This functionality is organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link); the internet layer, connecting hosts across independent networks, thus establishing internetworking; the transport layer handling host-to-host communication; and the application layer, which provides process-to-process application data exchange.

The TCP/IP model and related protocol models are maintained by the Internet Engineering Task Force (IETF).
[https://en.wikipedia.org/wiki/Internet_protocol_suite]

The Internet Protocol family contains a set of related (and among the most widely used network protocols. Beside Internet Protocol (IP) itself, higher-level protocols like TCP, UDP, HTTP, and FTP all integrate with IP to provide additional capabilities. Similarly, lower-level Internet Protocols like ARP and ICMP also co-exist with IP. In general, higher level protocols in the IP family interact more closely with applications like Web browsers while lower-level protocols interact with network adapters and other computer hardware.
[http://compnetworking.about.com/od/networkprotocols/g/protocols.htm]

_DESCRIPTION:
The TCP/IP Internet protocols, a common example, consist of:
Transmission Control Protocol (TCP), which uses a set of rules to exchange messages with other Internet points at the information packet level
Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level
Additional protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each with defined sets of rules to use with corresponding programs elsewhere on the Internet
There are many other Internet protocols, such as the Border Gateway Protocol (BGP) and the Dynamic Host Configuration Protocol (DHCP).
[http://searchnetworking.techtarget.com/definition/protocol]

_DEFINITION:
TCP/IP is a for the ''.
[NIKOS, JUNE 1995]

** Transmission Control Protocol/Internet Protocol. TCP/IP
It is the "language" that all interconected networks in internet speek.

DATAGRAM:
Before data is sent across the Internet from one host to another using TCP/IP, it is split into packets of varying but finite size called datagrams. Datagrams range in size from a few dozen bytes to about 60,000 bytes.
[Harold Java Course 1997]

_DESCRIPTION:
The TCP/IP model or Internet reference model, sometimes called the DoD model (DoD, Department of Defense) ARPANET reference model, is a layered abstract description for communications and computer network protocol design. It was created in the 1970s by DARPA for use in developing the Internet's protocols, and the structure of the Internet is still closely reflected by the TCP/IP model.

The original TCP/IP reference model consists of 4 layers, but has according to some authors evolved into a 5-layer model, where the lowest layer (the network access layer) is split into a physical layer and a datalink layer. However, no IETF standards-track document has accepted a five-layer model, probably since physical layer and data link layer protocols are not standardized by IETF. IETF documents deprecate strict layering of all sorts. Given the lack of acceptance of the five-layer model by the body with technical responsibility for the protocol suite, it is not unreasonable to regard five-layer presentations as teaching aids, making it possible to talk about non-IETF protocols at the physical layer.

This model was developed before the OSI Reference Model, and the Internet Engineering Task Force (IETF), which is responsible for the model and protocols developed under it, has never felt obligated to be compliant with OSI. While the basic OSI model is widely used in teaching, OSI, as presented as a seven-layer model, does not reflect real-world protocol architecture (RFC 1122) as used in the dominant Internet environment.

An updated IETF architectural document [1] even contains a section entitled: "Layering Considered Harmful". Emphasizing layering as the key driver of architecture is not a feature of the TCP/IP model, but rather of OSI. Much confusion comes from attempts to force OSI-like layering onto an architecture that minimizes their use.
[http://en.wikipedia.org/wiki/TCP/IP_model]

_DESCRIPTION:
Internet (TCP/IP) protocol family
The TCP/IP family of protocols is widely used today.
Specifications of all of these protocols can be found in the RFC documents.
A simplified overview of the core TCP/IP protocols could look like this:
5-7    Application layer (HTTP, FTP, ...)
4    TCP (connections), UDP (connectionless)
3    Internet (IP, ICMP)
2    Link layer (ARP, PPP, Ethernet, ...)
[http://wiki.wireshark.org/InternetProtocolFamily]

prlIpf'GENERIC

_GENERIC:
* method-comm-network#ql:cmnprl@cptIt#

prlIpf'PART

The Internet Protocol is used in concert with other protocols within the Internet Protocol Suite. Prominent members of which include:

Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Internet Control Message Protocol (ICMP)
Hypertext Transfer Protocol (HTTP)
Post Office Protocol (POP3)
File Transfer Protocol (FTP)
Internet Message Access Protocol (IMAP)

Internet Protocol Suite
Application Layer
BGP · DHCP · DNS · FTP · HTTP · IMAP · IRC · LDAP · MGCP · NNTP · NTP · POP · RIP · RPC · RTP · SIP · SMTP · SNMP · SOCKS · SSH · Telnet · TLS/SSL · XMPP · (more)
Transport Layer
TCP · UDP · DCCP · SCTP · RSVP · ECN · (more)
Internet Layer
IP (IPv4, IPv6) · ICMP · ICMPv6 · IGMP · IPsec · (more)
Link Layer
ARP/InARP · NDP · OSPF · Tunnels (L2TP) · PPP · Media Access Control (Ethernet, DSL, ISDN, FDDI) · (more)
[http://en.wikipedia.org/wiki/Internet_Protocol]

prlIpf'Implementation

name::
* McsEngl.prlIpf'Implementation@cptIt,

_DESCRIPTION:
Most computer operating systems in use today, including all consumer-targeted systems, include a TCP/IP implementation.

Minimally acceptable implementation includes implementation for (from most essential to the less essential) IP, ARP, ICMP, UDP, TCP and sometimes IGMP. It is in principle possible to support only one of transport protocols (i.e. simple UDP), but it is rarely done, as it limits usage of the whole implementation. IPv6, beyond own version of ARP (NBP), and ICMP (ICMPv6), and IGMP (IGMPv6) have some additional required functionalities, and often is accompanied with integrated IPSec security layer. Other protocols could be easily added later (often they can be implemented entirely in the userspace), for example DNS for resolving domain names to IP addresses or DHCP client for automatic configuration of network interfaces.

Most of the IP implementations are accessible to the programmers using socket abstraction (usable also with other protocols) and proper API for most of the operations. This interface is known as BSD sockets and was used initially in C.

Unique implementations include Lightweight TCP/IP, an open source stack designed for embedded systems and KA9Q NOS, a stack and associated protocols for amateur packet radio systems and personal computers connected via serial lines.
[http://en.wikipedia.org/wiki/Internet_Protocol_Suite]

prlIpf'Layer

name::
* McsEngl.prlIpf'Layer@cptIt,

_DESCRIPTION:
The Internet Protocol Suite consists of four abstraction layers. From the lowest to the highest layer, these are the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.[1][2] The layers define the operational scope or reach of the protocols in each layer, reflected loosely in the layer names. Each layer has functionality that solves a set of problems relevant in its scope.
[http://en.wikipedia.org/wiki/Internet_Protocol_Suite]

The five-layer TCP/IP model
5. Application layer
DHCP · DNS · FTP · Gopher · HTTP · IMAP4 · IRC · NNTP · XMPP · POP3 · SIP · SMTP · SNMP · SSH · TELNET · RPC · RTCP · RTSP · TLS · SDP · SOAP · GTP · STUN · NTP · (more)
4. Transport layer
TCP · UDP · DCCP · SCTP · RTP · RSVP · IGMP · (more)
3. Network/Internet layer
IP (IPv4 · IPv6) · OSPF · IS-IS · BGP · IPsec · ARP · RARP · RIP · ICMP · ICMPv6 · (more)
2. Data link layer
802.11 (WLAN) · 802.16 · Wi-Fi · WiMAX · ATM · DTM · Token ring · Ethernet · FDDI · Frame Relay · GPRS · EVDO · HSPA · HDLC · PPP · PPTP · L2TP · ISDN · (more)
1. Physical layer
Ethernet physical layer · Modems · PLC · SONET/SDH · G.709 · Optical fiber · Coaxial cable · Twisted pair ·
[http://en.wikipedia.org/wiki/TCP/IP_model]

prlIpf'LayerLink (1; lowest)

name::
* McsEngl.prlIpf'LayerLink (1; lowest)@cptIt,

The Link Layer contains communication technologies for the local network the host is connected to directly, the link. It provides the basic connectivity functions interacting with the networking hardware of the computer and the associated management of interface-to-interface messaging.
[http://en.wikipedia.org/wiki/Internet_Protocol_Suite]

ipf'protocol.link_layer:
Link layer:
ARP: Address Resolution Protocol: Map IP to hardware (e.g. Ethernet) addresses
RARP: Reverse ARP: Map hardware (e.g. Ethernet) to IP addresses

Link layer (serial line):
CSLIP: Compressed Serial Line IP: Compressing TCP/IP Headers for Low-Speed Serial Links (RFC 1144), obsolete
PPP: The Point-to-Point Protocol
PPP-MP: The Point-to-Point Multilink Protocol
SLIP: Serial Line IP: Transmission of IP datagrams over serial lines (RFC 1055), obsolete
[http://wiki.wireshark.org/InternetProtocolFamily]

prlIpf'LayerInternet (2)

name::
* McsEngl.prlIpf'LayerInternet (2)@cptIt,

The Internet Layer provides communication methods between multiple links of a computer and facilitates the interconnection of networks. As such, this layer establishes the Internet. It contains primarily the Internet Protocol, which defines the fundamental addressing namespaces, Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6) used to identify and locate hosts on the network.
[http://en.wikipedia.org/wiki/Internet_Protocol_Suite]

prlIpf'LayerTransport (3)

name::
* McsEngl.prlIpf'LayerTransport (3)@cptIt,

Direct host-to-host communication tasks are handled in the Transport Layer, which provides a general framework to transmit data between hosts using protocols like the Transmission Control Protocol and the User Datagram Protocol (UDP).
[http://en.wikipedia.org/wiki/Internet_Protocol_Suite]

prlIpf'LayerApplication (4)

name::
* McsEngl.prlIpf'LayerApplication (4)@cptIt,

Finally, the highest-level Application Layer contains all protocols that are defined each specifically for the functioning of the vast array of data communications services. This layer handles application-based interaction on a process-to-process level between communicating Internet hosts.
[http://en.wikipedia.org/wiki/Internet_Protocol_Suite]

prlIpf'port

name::
* McsEngl.prlIpf'port@cptIt,

80: http.

443: https.

prlIpf'protocol

name::
* McsEngl.prlIpf'protocol@cptIt,

_SPECIFIC:
Internet protocol suite
Application layer
DHCP DHCPv6 DNS FTP HTTP IMAP IRC LDAP MGCP NNTP BGP NTP POP RPC RTP RTSP RIP SIP SMTP SNMP SOCKS SSH Telnet TLS/SSL XMPP (more)
Transport layer
TCP UDP DCCP SCTP RSVP (more)
Internet layer
IP IPv4 IPv6 ICMP ICMPv6 ECN IGMP IPsec (more)
Link layer
ARP/InARP NDP OSPF Tunnels L2TP PPP Media access control Ethernet DSL ISDN FDDI (more)
[http://en.wikipedia.org/wiki/Internet_Protocol_Suite] {2013-08-01}

prlIpf'protocol.Link-layer

name::
* McsEngl.prlIpf'protocol.Link-layer@cptIt,

ARP: Address Resolution Protocol: Map IP to hardware (e.g. Ethernet) addresses
RARP: Reverse ARP: Map hardware (e.g. Ethernet) to IP addresses

ipf'protocol.Link_layer.serial_line:

CSLIP: Compressed Serial Line IP: Compressing TCP/IP Headers for Low-Speed Serial Links (RFC 1144), obsolete
PPP: The Point-to-Point Protocol
PPP-MP: The Point-to-Point Multilink Protocol
SLIP: Serial Line IP: Transmission of IP datagrams over serial lines (RFC 1055), obsolete
[http://wiki.wireshark.org/InternetProtocolFamily]

prlIpf'protocol.Network-layer

name::
* McsEngl.prlIpf'protocol.Network-layer@cptIt,

IP: Internet Protocol (version 4): transfer IP packets from one host to another. One of the most common protocols today. This is what the Internet is built around.
IPv6: Internet Protocol (version 6): transfer IP packets from one host to another
ICMP: Internet Control Message Protocol (version 4): This is a protocol to report common errors and events in the IP, TCP and UDP protocols.
ICMPv6: Internet Control Message Protocol (version 6): This is a protocol to report common errors and events in the IPv6, TCP and UDP protocols.
IGMP: IP multicasting

ipf'protocol.Network_layer.routing:
BGP: Border Gateway Protocol
EGP: Exterior Gateway Protocol
GGP: Gateway to Gateway Protocol
IGRP: Interior Gateway Routing Protocol
ND: Neighbor Discovery
OSPF: Open Shortest Path First
RIP: Routing Information Protocol
RIPng: Routing Information Protocol next generation

ipf'protocol.Network_Layer.IPsec (InternetProtocol Security):
AH: Authentication Header
ESP: Encapsulating Security Payload
[http://wiki.wireshark.org/InternetProtocolFamily]

prlIpf'protocol.Transport-layer

name::
* McsEngl.prlIpf'protocol.Transport-layer@cptIt,

These protocols run atop IP:
DCCP: Datagram Congestion Control Protocol: stream based, reliable, connection oriented transfer of data
SCTP: datagram (packet) based, reliable, connection oriented transfer of data
UDP: User Datagram Protocol: datagram (packet) based, unreliable, connectionless transfer of data
UDP-Lite: Lightweight User Datagram Protocol: datagram (packet) based, unreliable, connectionless transfer of data
TCP: Transmission Control Protocol: stream based, reliable, connection oriented transfer of data
PortReference: TCP/UDP port numbers These protocols run atop UDP, and provide additional transport-layer services:
RTP: datagram (packet) based, unreliable, connection oriented transfer of time sensitive data
RTCP: RTP's control protocol
[http://wiki.wireshark.org/InternetProtocolFamily]

prlIpf'protocol.Session-layer

name::
* McsEngl.prlIpf'protocol.Session-layer@cptIt,

NetBIOS: an API and several protocols providing various networking services.
NetDump: a simple protocol for capturing crashed operating system memory cores over a network
ONC-RPC: Remote procedure calls using Sun's RPC mechanism
DCE/RPC: Remote procedure calls using the OSF's RPC mechanism
HTTP: Hyper Text Transfer Protocol: (and other files as well). Probably the best known protocol as it is used to allow users surfing on the Internet.
SMTP: Simple Mail Transfer Protocol: send mails to a mail server
[http://wiki.wireshark.org/InternetProtocolFamily]

prlIpf'protocol.Presentation-layer

name::
* McsEngl.prlIpf'protocol.Presentation-layer@cptIt,

MIME: content encoding (for HTTP, SMTP, ...) (RFC 2045-2049)
[http://wiki.wireshark.org/InternetProtocolFamily]

prlIpf'protocol.Application-layer

name::
* McsEngl.prlIpf'protocol.Application-layer@cptIt,

ANCP: Access Node Control Protocol: TCP based L2 control protocol used in service provider DSL and PON Networks.
BOOTP: BOOT Protocol: antecessor of DHCP, see bellow
DHCP: Dynamic Host Configuration Protocol: distribute IP, Gateway and DNS server addresses and alike
DNS: Domain Name System: translate human readable addresses (e.g. wiki.wireshark.org) into IP addresses
FTP: File Transfer Protocol: file transfer (unsecure)
IMAP: retrieve mails from a mail server
iWARP-DDP: Direct Data Placement (part of the iWARP protocol stack)
iWARP-MPA: Marker PDU Aligned Framing: adaptation layer between TCP and DDP (part of the iWARP protocol stack)
iWARP-RDMAP: Remote Direct Memory Access Protocol (part of the iWARP protocol stack)
NNTP: Network News Transfer Protocol: news transfer
NTP: Network Time Protocol: sychronize time between hosts
PANA: Protocol for Carrying Authentication for Network Access: user authentication for network access
POP: Post Office Protocol: receive mails from a mail server
RADIUS: remote user authentication and accounting
RLogin: remote login: remote shell access (unsecure)
RSH: Remote SHell: remote shell access (unsecure)
RSIP: Realm Specific IP (RFC 3102-3104)
SSH: Secure SHell: encrypted remote shell access
SNMP: Simple Network Management Protocol: network management (RFC 1157,1901-10,2271-75)
Telnet: remote shell access (unsecure) (RFC 854,855,1700)
TFTP: Trivial File Transfer
SASP: Server/Application State Protocol (RFC 4678)
[http://wiki.wireshark.org/InternetProtocolFamily]

prlIpf'protocol.POP3

name::
* McsEngl.prlIpf'protocol.POP3@cptIt,
* McsEngl.POP3-protocol@cptIt,
* McsEngl.name.POP3@cptIt,

prlIpf'protocol.Unsorted

name::
* McsEngl.prlIpf'protocol.Unsorted@cptIt,

_SPECIFIC:
URN: Uniform Resource Names (RFC 1737)
URL: Uniform Resource Locators (RFC 1738)
[http://wiki.wireshark.org/InternetProtocolFamily]

prlIpf'protocol.ARP

name::
* McsEngl.prlIpf'protocol.ARP@cptIt,
* McsEngl.address-resolution-protocol@cptIt,
* McsEngl.ARP@cptIt,
* McsEngl.cmnprl.ARP@cptIt,

_GENERIC:
* link-layer-protocol#ql:tcpip'protocol.link_layer#

Address Resolution Protocol (ARP) is a telecommunications protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks. ARP was defined by RFC 826 in 1982.[1] It is Internet Standard STD 37. It is also the name of the program for manipulating these addresses in most operating systems.

ARP is used to convert an IP address to a physical address such as an Ethernet address. ARP has been implemented with many combinations of network and data link layer technologies, such as IPv4, Chaosnet, DECnet and Xerox PARC Universal Packet (PUP) using IEEE 802 standards, FDDI, X.25, Frame Relay and Asynchronous Transfer Mode (ATM). IPv4 over IEEE 802.3 and IEEE 802.11 is the most common case.

In Internet Protocol Version 6 (IPv6) networks, the functionality of ARP is provided by the Neighbor Discovery Protocol (NDP).
[http://en.wikipedia.org/wiki/Address_Resolution_Protocol]

prlIpf'protocol.FTP

name::
* McsEngl.prlIpf'protocol.FTP@cptIt,

prlIpf'protocol.HTTP

name::
* McsEngl.prlIpf'protocol.HTTP@cptIt,
* McsEngl.conceptIt457,
* McsEngl.http@cptIt19.2,
* McsEngl.hypertext-transfer-protocol@cptIt,

_DESCRIPTION:
The Hypertext Transfer Protocol (HTTP) is a networking protocol for distributed, collaborative, hypermedia information systems.[1] HTTP is the foundation of data communication for the World Wide Web.
The standards development of HTTP has been coordinated by the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C), culminating in the publication of a series of Requests for Comments (RFCs), most notably RFC 2616 (June 1999), which defines HTTP/1.1, the version of HTTP in common use.
[http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol]
===
contrary to common belief: HTTP is not an application protocol, is a session (L5) protocol, uses MIME for presentation (L6), and, the application (L7) in this case is a wiki! (another example is HTTP/XML/SOAP). (On the other hand, if you click on a download link, you're using HTTP for file transfer, so, in that case, it's an application-layer protocol. Protocols can't necessarily always be assigned to one and only one layer of the 7-layer model. -Guy Harris)
[http://wiki.wireshark.org/InternetProtocolFamily]

_GENERIC:
* communication-protocol
* network STANDARD#ql:cmnprl@cptIt#

http'alternative

name::
* McsEngl.http'alternative@cptIt,

Historically, Gopher existed as a competitor to HTTP.
[http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol]

http'connection

name::
* McsEngl.http'connection@cptIt,

Encrypted connections[edit]

The most popular way of establishing an encrypted HTTP connection is HTTP Secure.

Two other methods for establishing an encrypted HTTP connection also exist, called Secure Hypertext Transfer Protocol and the HTTP/1.1 Upgrade header. Browser support, for these latter two, is, however, nearly non-existent,[citation needed] so HTTP Secure is the dominant method of establishing an encrypted HTTP connection.
[http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol]

http'header-field

name::
* McsEngl.http'header-field@cptIt,

_ADDRESS.WPG:
* http://en.wikipedia.org/wiki/List_of_HTTP_header_fields,

http'header.REQUEST

name::
* McsEngl.http'header.REQUEST@cptIt,

http'header.RESPONSE

name::
* McsEngl.http'header.RESPONSE@cptIt,

http'message.REQUEST

name::
* McsEngl.http'message.REQUEST@cptIt,
* McsEngl.http'request-message@cptIt,

_DESCRIPTION:
Request message[edit]

The request message consists of the following:

A request line, for example GET /images/logo.png HTTP/1.1, which requests a resource called /images/logo.png from the server.
Request Headers, such as Accept-Language: en
An empty line.
An optional message body.
The request line and headers must all end with <CR><LF> (that is, a carriage return character followed by a line feed character). The empty line must consist of only <CR><LF> and no other whitespace.[21] In the HTTP/1.1 protocol, all headers except Host are optional.

A request line containing only the path name is accepted by servers to maintain compatibility with HTTP clients before the HTTP/1.0 specification in RFC 1945.[22]
[http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol]

_CODE.HTTP:
GET /index.html HTTP/1.1
Host: www.example.com
===
The following HTTP request was received from IP address 87.203.118.148 (port 23785) by IP address 10.227.157.194 (port 80):

GET /dumprequest HTTP/1.1
Host: rve.org.uk
Connection: keep-alive
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36
Referer: https://www.google.com/
Accept-Language: en-US,en;q=0.8,el;q=0.6
[http://rve.org.uk/dumprequest]

http'request'Accept

name::
* McsEngl.http'request'Accept@cptIt,

_DESCRIPTION:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8

http'request'Accept-Language

name::
* McsEngl.http'request'Accept-Language@cptIt,

_DESCRIPTION:
Accept-Language: en-US,en;q=0.8,el;q=0.6

http'request'Connection

name::
* McsEngl.http'request'Connection@cptIt,

_DESCRIPTION:
Connection: keep-alive

http'request'Host

name::
* McsEngl.http'request'Host@cptIt,

_DESCRIPTION:
Host: rve.org.uk

http'request'method

name::
* McsEngl.http'request'method@cptIt,

_DESCRIPTION:
Request method:  GET
Data:  none
The request method is usually either "GET" or "POST". Basically if you fill in and submit a form on a web page it might generate a POST request (or it might be "GET"), whereas if you just click on a link, or activate one of your browser's "bookmarks" or "favourites", then the request method will always be "GET".

Therefore, if it's "POST", we can tell that a form was definitely submitted. The contents of the form would appear here, and there would also be some "Content-" headers describing the data.

Web browsers generate two kinds of "POST" data: either "multipart/form-data", which is used when uploading files to a web server, or the more common "application/x-www-form-urlencoded".
[http://rve.org.uk/dumprequest]

http'request'GET

name::
* McsEngl.http'request'GET@cptIt,

_DESCRIPTION:
GET /dumprequest HTTP/1.1

http'request'User-Agent

name::
* McsEngl.http'request'User-Agent@cptIt,

_DESCRIPTION:
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36

http'request'Via

name::
* McsEngl.http'request'Via@cptIt,

_DESCRIPTION:
On the other hand, there could be one or more proxy servers between your computer and the web server. If the HTTP request includes the header "Via", or "X-Forwarded-For", then that's a strong indication that there is at least one proxy server somewhere along the line.
[http://rve.org.uk/dumprequest]

http'message.RESPONSE

name::
* McsEngl.http'message.RESPONSE@cptIt,
* McsEngl.http'response-message@cptIt,

Response message[edit]

The response message consists of the following:

A Status-Line (for example HTTP/1.1 200 OK, which indicates that the client's request succeeded)
Response Headers, such as Content-Type: text/html
An empty line
An optional message body
The Status-Line and headers must all end with <CR><LF> (a carriage return followed by a line feed). The empty line must consist of only <CR><LF> and no other whitespace.[21]
[http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol]

_EXAMPLE:
HTTP/1.1 200 OK
Date: Mon, 23 May 2005 22:38:34 GMT
Server: Apache/1.3.3.7 (Unix) (Red-Hat/Linux)
Last-Modified: Wed, 08 Jan 2003 23:11:55 GMT
Etag: "3f80f-1b6-3e1cb03b"
Content-Type: text/html; charset=UTF-8
Content-Length: 131
Connection: close

<html>
<head>
<title>An Example Page</title>
</head>
<body>
Hello World, this is a very simple HTML document.
</body>
</html>
[http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol]

http'method

name::
* McsEngl.http'method@cptIt,
* McsEngl.http'verb@cptIt,

_DESCRIPTION:
HTTP, for example, has a very rich vocabulary in terms of verbs (or "methods"), URIs, Internet media types, request and response codes, etc. REST uses these existing features of the HTTP protocol, and thus allows existing layered proxy and gateway components to perform additional functions on the network such as HTTP caching and security enforcement.
[http://en.wikipedia.org/wiki/Representational_State_Transfer]

http'method.request

name::
* McsEngl.http'method.request@cptIt,
* McsEngl.http'request-method@cptIt,

HTTP defines methods (sometimes referred to as verbs) to indicate the desired action to be performed on the identified resource. What this resource represents, whether pre-existing data or data that is generated dynamically, depends on the implementation of the server. Often, the resource corresponds to a file or the output of an executable residing on the server.

The HTTP/1.0 specification[10]:section 8 defined the GET, POST and HEAD methods and the HTTP/1.1 specification[1]:section 9 added 5 new methods: OPTIONS, PUT, DELETE, TRACE and CONNECT. By being specified in these documents their semantics are well known and can be depended upon. Any client can use any method and the server can be configured to support any combination of methods. If a method is unknown to an intermediate it will be treated as an unsafe and non-idempotent method. There is no limit to the number of methods that can be defined and this allows for future methods to be specified without breaking existing infrastructure. For example WebDAV defined 7 new methods and RFC5789 specified the PATCH method.
[http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol]

http'method.SAFE

name::
* McsEngl.http'method.SAFE@cptIt,
* McsEngl.http'safe-method@cptIt,

Some methods (for example, HEAD, GET, OPTIONS and TRACE) are defined as safe, which means they are intended only for information retrieval and should not change the state of the server. In other words, they should not have side effects, beyond relatively harmless effects such as logging, caching, the serving of banner advertisements or incrementing a web counter. Making arbitrary GET requests without regard to the context of the application's state should therefore be considered safe.

By contrast, methods such as POST, PUT and DELETE are intended for actions that may cause side effects either on the server, or external side effects such as financial transactions or transmission of email. Such methods are therefore not usually used by conforming web robots or web crawlers; some that do not conform tend to make requests without regard to context or consequences.

Despite the prescribed safety of GET requests, in practice their handling by the server is not technically limited in any way. Therefore, careless or deliberate programming can cause non-trivial changes on the server. This is discouraged, because it can cause problems for Web caching, search engines and other automated agents, which can make unintended changes on the server.
[http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol]

http'PEP

name::
* McsEngl.http'PEP@cptIt,
* McsEngl.PEP@cptIt,
* McsEngl.protocol-extension-protocol@cptIt,

The Protocol Extension Protocol (PEP) is an extension mechanism designed to accommodate dynamic extension of HTTP applications by software components; and to address the tension between private agreement and public specification. The kind of extensions capable of being introduced by PEP range from:

extending a single protocol message;
introducing new encodings;
initiating HTTP-derived protocols for new applications; to...
switching to protocols which, once initiated, run independent of the original protocol stack.
This document defines the protocol extension mechanism referred to as "PEP". The PEP design is the result of analyzing a variety of extensions and extension mechanisms in HTTP and HTTP-like protocols, and the motivation behind them.

The specification also describes the interactions between PEP and HTTP/1.1[7] including scoping rules and cache semantics. PEP is intended to be compatible with HTTP/1.0[5] inasmuch as HTTP/1.1 is compatible with HTTP/1.0 (see section 1.4 and 10) and it is proposed that the PEP extension mechanism be included in future versions of HTTP.
[http://www.w3.org/TR/WD-http-pep.html]

http'port

name::
* McsEngl.http'port@cptIt,

HTTPS URLs begin with "https://" and use port 443 by default, whereas HTTP URLs begin with "http://" and use port 80 by default.
[https://en.wikipedia.org/wiki/HTTPS#Difference_from_HTTP]

http'resourceInfHmn#cptResource843#

name::
* McsEngl.http'resourceInfHmn@cptIt,

how WWW servers and clients communicate. They are available as RFC's:
RFC1945 HTTP/1.0 and HTTP/0.9 specification
RFC2068 HTTP/1.1 specification
You find them on many FTP servers , e.g. on ftp://ftp.uni-magdeburg.de/pub/doc/rfc/
[1997aug28]

http'security

name::
* McsEngl.http'security@cptIt,

HTTP is insecure and is subject to man-in-the-middle and eavesdropping attacks, which can let attackers gain access to website accounts and sensitive information. HTTPS is designed to withstand such attacks and is considered secure against such attacks (with the exception of older deprecated versions of SSL).
[https://en.wikipedia.org/wiki/HTTPS#Difference_from_HTTP]

http'session

name::
* McsEngl.http'session@cptIt,

_DESCRIPTION:
An HTTP session is a sequence of network request-response transactions. An HTTP client initiates a request by establishing a Transmission Control Protocol (TCP) connection to a particular port on a server (typically port 80; see List of TCP and UDP port numbers). An HTTP server listening on that port waits for a client's request message. Upon receiving the request, the server sends back a status line, such as "HTTP/1.1 200 OK", and a message of its own. The body of this message is typically the requested resource, although an error message or other information may also be returned.
[http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol]

http'specification

name::
* McsEngl.http'specification@cptIt,

_ADDRESS.WPG:
* http://tools.ietf.org/html/rfc2616, http.1.1.1999.06,
* http://www.w3.org/Protocols/rfc2616/rfc2616.html,

http'status-code

name::
* McsEngl.http'status-code@cptIt,

Status codes[edit]
See also: List of HTTP status codes
In HTTP/1.0 and since, the first line of the HTTP response is called the status line and includes a numeric status code (such as "404") and a textual reason phrase (such as "Not Found"). The way the user agent handles the response primarily depends on the code and secondarily on the response headers. Custom status codes can be used since, if the user agent encounters a code it does not recognize, it can use the first digit of the code to determine the general class of the response.[20]

Also, the standard reason phrases are only recommendations and can be replaced with "local equivalents" at the web developer's discretion. If the status code indicated a problem, the user agent might display the reason phrase to the user to provide further information about the nature of the problem. The standard also allows the user agent to attempt to interpret the reason phrase, though this might be unwise since the standard explicitly specifies that status codes are machine-readable and reason phrases are human-readable.
[http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol]

SPECIFIC
hsts

name::
* McsEngl.hsts@cptIt,

_ADDRESS.WPG:
* http://classically.me/blogs/how-clear-hsts-settings-major-browsers,

http2

HTTP/2, the first major change to HTTP in 16 years, has been finalized
Owen Williams by OWEN WILLIAMS Tweet — 18 Feb, 03:28am in INSIDER
Today, the next major version of HTTP took a big step toward becoming a reality; it’s been officially finalized and now moves towards being fully standardized.

According to a blog by Mark Nottingham, the chair of the IETF HTTP Working Group, the standard was completed today and is on its way to the RFC Editor to go through editorial processes before being published as a standard.

HTTP/2 is a huge deal; it’s the next big version of the Hypertext Transfer Protocol, marking the largest change since 1999 when HTTP 1.1 was adopted.

The new standard brings a number of benefits to one of the Web’s core technologies, such as faster page loads, longer-lived connections, more items arriving sooner and server push. HTTP/2 uses the same HTTP APIs that developers are familiar with, but offers a number of new features they can adopt.

One notable change is that HTTP requests will be ‘cheaper’ to make. The Web community has often told developers to avoid adding too many HTTP requests to their pages, which lead to optimization techniques like code inlining or concatenation to reduce the requests. With HTTP/2, a new multiplexing feature allows lots of requests to be delivered at the same time, so the page load isn’t blocked.

HTTP/2 also uses significantly fewer connections, hopefully resulting in lower load for servers and networks. Nottingham previously published a number of other improvements coming to the standard on his blog.

The new HTTP standard was based on Google’s SPDY protocol, which is used today by some technologies to manipulate traffic which helps improve latency and security, delivering faster page load times. Google announced just a few days ago that it plans to switch fully to HTTP/2 in Chrome.

Developers wishing to test HTTP/2 before it becomes official can already do so now in Firefox and Chrome, along with downloadable test servers to try improvements for themselves. More information is available in the HTTP/2 FAQ.

It should be a relatively short time before the standard is passed through the Request-For-Comments Editor and published for use in its final form.
[http://thenextweb.com/insider/2015/02/18/http2-first-major-update-http-sixteen-years-finalized/]

prlIpf'protocol.HTTPS

name::
* McsEngl.prlIpf'protocol.HTTPS@cptIt,
* McsEngl.HTTPS@cptIt,
* McsEngl.HTTP-secure@cptIt,
* McsEngl.web'HTTPS@cptIt,

_DESCRIPTION:
Hypertext Transfer Protocol Secure (HTTPS) is a communications protocol for secure communication over a computer network, with especially wide deployment on the Internet. Technically, it is not a protocol in and of itself; rather, it is the result of simply layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, thus adding the security capabilities of SSL/TLS to standard HTTP communications.

In its popular deployment on the internet, HTTPS provides authentication of the web site and associated web server that one is communicating with, which protects against man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with and/or forging the contents of the communication.[1] In practice, this provides a reasonable guarantee that one is communicating with precisely the web site that one intended to communicate with (as opposed to an imposter), as well as ensuring that the contents of communications between the user and site cannot be read or forged by any third party.

Historically, HTTPS connections were primarily used for payment transactions on the World Wide Web, e-mail and for sensitive transactions in corporate information systems. In the late 2000s and early 2010s, HTTPS began to see widespread use for protecting page authenticity on all types of websites, securing accounts and keeping user communications, identity and web browsing private.

A site must be completely hosted over HTTPS, without having some of its contents loaded over HTTP, or the user will be vulnerable to some attacks and surveillance. For example, having scripts etc. loaded insecurely on an HTTPS page makes the user vulnerable to attacks. Also having only a certain page that contains sensitive information (such as a log-in page) of a website loaded over HTTPS, while having the rest of the website loaded over plain HTTP will expose the user to attacks. On a site that has sensitive information somewhere on it, every time that site is accessed with HTTP instead of HTTPS, the user and the session will get exposed. Similarly, cookies on a site served through HTTPS have to have the secure attribute enabled.[2]
[https://en.wikipedia.org/wiki/HTTPS]

https'HTTPS-Everywere

name::
* McsEngl.https'HTTPS-Everywere@cptIt,
* McsEngl.HTTPS-Everywere@cptIt,

_DESCRIPTION:
HTTPS Everywhere is a Firefox and Chrome extension that encrypts your communications with many major websites, making your browsing more secure. Encrypt the web: Install HTTPS Everywhere today.
HTTPS Everywhere is produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by using a clever technology to rewrite requests to these sites to HTTPS.
[https://www.eff.org/https-everywhere]

Encrypting the Web

In 2009, EFF set out on a long-term mission to encrypt the Web. Our aim was to switch hypertext from insecure HTTP to secure HTTPS. That protection is essential in order to defend Internet users against surveillance of the content of their communications; cookie theft, account hijacking and other web security flaws; and some forms of Internet censorship.

We have made a lot of progress. We began by asking some of the largest sites on the Web, such as Google, Facebook, Twitter and Wikipedia, to start offering HTTPS versions of their sites. We then launched HTTPS Everywhere, a browser extension that would automatically use the secure form of those and other sites.

We know that the benefits of encryption are undermined if there are weaknesses and vulnerabilities in our encryption protocols. Our SSL Observatory and Sovereign Keys projects are intended to make sure that HTTPS and TLS/SSL actually deliver the kinds of security they promise.

As of 2012, HTTPS Everywhere covers thousands of websites, and there more than 2.5 million people using it. Large sites like Google have migrated towards HTTPS by default for most purposes. We've made a lot of progress, and protected hundreds of billions of web requests, but there is much more work to do. And we won't rest until it's done.
[https://www.eff.org/encrypt-the-web]

https'evoluting

name::
* McsEngl.https'evoluting@cptIt,

{time.1994}:
History
Netscape Communications created HTTPS in 1994 for its Netscape Navigator web browser.[25] Originally, HTTPS was used with SSL protocol. As SSL evolved into Transport Layer Security (TLS), the current version of HTTPS was formally specified by RFC 2818 in May 2000.
[https://en.wikipedia.org/wiki/HTTPS#History]

https'HSTS {2009}

name::
* McsEngl.https'HSTS {2009}@cptIt,
* McsEngl.HTTP-Strict-Transport-Security@cptIt,
* McsEngl.HSTS@cptIt,

_DESCRIPTION:
HTTP Strict Transport Security (HSTS) is a web security policy mechanism which helps to protect secure HTTPS websites against downgrade attacks and cookie hijacking. It allows web servers to declare that web browsers (or other complying user agents) should only interact with it using secure HTTPS connections,[1] and never via the insecure HTTP protocol. HSTS is an IETF standards track protocol and is specified in RFC 6797.
The HSTS Policy[2] is communicated by the server to the user agent via a HTTP response header field named "Strict-Transport-Security". HSTS Policy specifies a period of time during which the user agent shall access the server in a secure-only fashion.
[https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security]

Firefox 26: How to fix Error code: ssl_error_bad_cert_domain
If you see "I understand the risks", follow these instructions. Otherwise:
Close all tabs open with the site.
Clear your history.
In the address bar, type "about:permissions".
Search for and click on the site.
Click "Forget About This Site".

Chrome, Opera: Cannot connect to the real <domain name>.
In the address bar, type "chrome://net-internals/#hsts".
Type the domain name in the text field below "Delete domain".
Click the "Delete" button.
Type the domain name in the text field below "Query domain".
Click the "Query" button.
Your response should be "Not found".

https'port

name::
* McsEngl.https'port@cptIt,

HTTPS URLs begin with "https://" and use port 443 by default, whereas HTTP URLs begin with "http://" and use port 80 by default.
[https://en.wikipedia.org/wiki/HTTPS#Difference_from_HTTP]

https'resourceInfHmn#cptResource843#

name::
* McsEngl.https'resourceInfHmn@cptIt,

_ADDRESS.WPG:

_ADDRESS.WPG:
* {2018-01-20} https://medium.freecodecamp.org/how-to-get-https-working-on-your-local-development-environment-in-5-minutes-7af615770eec,
* http://diymacserver.com/installing-apache/configuring-https-with-virtual-hosts//

https'security

name::
* McsEngl.https'security@cptIt,

HTTP is insecure and is subject to man-in-the-middle and eavesdropping attacks, which can let attackers gain access to website accounts and sensitive information. HTTPS is designed to withstand such attacks and is considered secure against such attacks (with the exception of older deprecated versions of SSL).
[https://en.wikipedia.org/wiki/HTTPS#Difference_from_HTTP]

OCTOBER 25, 2011 | BY PETER ECKERSLEY
How secure is HTTPS today? How often is it attacked?

This is part 1 of a series on the security of HTTPS and TLS/SSL

HTTPS is a lot more secure than HTTP! If a site uses accounts, or publishes material that people might prefer to read in private, the site should be protected with HTTPS.

Unfortunately, is still feasible for some attackers to break HTTPS. Leaving aside cryptographic protocol vulnerabilities, there are structural ways for its authentication mechanism to be fooled for any domain, including mail.google.com, www.citibank.com, www.eff.org, addons.mozilla.org, or any other incredibly sensitive service:

Break into any Certificate Authority (or compromise the web applications that feed into it). As we learned from the SSL Observatory project, there are 600+ Certificate Authorities that your browser will trust; the attacker only needs to find one of those 600 that she is capable of breaking into. This has been happening with catastrophic results.
Compromise a router near any Certificate Authority, so that you can read the CA's outgoing email or alter incoming DNS packets, breaking domain validation. Or similarly, compromise a router near the victim site to read incoming email or outgoing DNS responses. Note that SMTPS email encryption does not help because STARTTLS is vulnerable to downgrade attacks.
Compromise a recursive DNS server that is used by a Certificate Authority, or forge a DNS entry for a victim domain (which has sometimes been quite easy). Again, this defeats domain validation.
Attack some other network protocol, such as TCP or BGP, in a way that grants access to emails to the victim domain.
A government could order a Certificate Authority to produce a malicious certificate for any domain. There is circumstantial evidence that this may happen. And because CAs are located in 52+ countries, there are lots of governments that can do this, including some deeply authoritarian ones. Also, governments could easily perform any of the above network attacks against CAs in other countries.
In short: there are a lot of ways to break HTTPS/TLS/SSL today, even when websites do everything right. As currently implemented, the Web's security protocols may be good enough to protect against attackers with limited time and motivation, but they are inadequate for a world in which geopolitical and business contests are increasingly being played out through attacks against the security of computer systems.
[https://www.eff.org/deeplinks/2011/10/how-secure-https-today]

S For Sometimes
Sadly, it seems that money and corporate embarrassment motivates protective measures far more often than privacy concerns. Some websites have started to implement a more rigorous enforcement of HTTPS connections called HTTP Strict Transport Security (HSTS). Paypal, whose users have long been victims of money-draining phishing attacks, was one of the first sites to use HSTS to prevent malicious sites from fooling browsers into switching to HTTP or spoofing pages. Like any good security measure, HSTS is transparent to the user. All you need is a browser that supports it (most do) and a website to require it (most don’t).

Improvements like HSTS should be encouraged. HTTPS is inarguably an important protection. However, the protocol has its share of weaknesses and determined attackers. Plus, HTTPS only protects against certain types of attacks; it has no bearing on cross-site scripting, SQL injection, or a myriad of other vulnerabilities. The security community is neither ignorant of these problems nor lacking in solutions. Yet the roll out of better protocols like DNSSEC has been glacial. Never the less, HTTPS helps as much today as it will tomorrow. The lock icon on your browser that indicates a site uses HTTPS may be minuscule, but the protection it affords is significant.
[http://mashable.com/2011/05/31/https-web-security/]

https'speed

name::
* McsEngl.https'speed@cptIt,

HTTPS is typically slower than HTTP. When large amounts of data are processing over a port, performance differences become evident[citation needed].
[https://en.wikipedia.org/wiki/HTTPS#Difference_from_HTTP]

prlIpf'protocol.ICMP

name::
* McsEngl.prlIpf'protocol.ICMP@cptIt,
* McsEngl.ICMP-protocol@cptIt,
* McsEngl.name.ICMP@cptIt,

prlIpf'protocol.IMAP

name::
* McsEngl.prlIpf'protocol.IMAP@cptIt,
* McsEngl.IMAP-protocol@cptIt,
* McsEngl.name.IMAP@cptIt,

prlIpf'protocol.IP

name::
* McsEngl.prlIpf'protocol.IP@cptIt,
* McsEngl.IP@cptIt142i,
* McsEngl.internet-protocol@cptIt142i, {2011-09-09}
* McsEngl.prlIp@cptIt,
* McsEngl.name.IP@cptIt,

_DESCRIPTION:
The Internet Protocol (IP) is the principal communications protocol used for relaying datagrams (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet.

IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on their addresses. For this purpose, IP defines addressing methods and structures for datagram encapsulation.

Historically, IP was the connectionless datagram service in the original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974, the other being the connection-oriented Transmission Control Protocol (TCP). The Internet Protocol Suite is therefore often referred to as TCP/IP.

The first major version of IP, now referred to as Internet Protocol Version 4 (IPv4) is the dominant protocol of the Internet, although the successor, Internet Protocol Version 6 (IPv6) is in active, growing deployment worldwide.
[http://en.wikipedia.org/wiki/Internet_Protocol]

prlIp'IP-address

name::
* McsEngl.prlIp'IP-address@cptIt,
* McsEngl.IP-address@cptIt142i,

_DESCRIPTION:
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.[1] An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."[2]

The designers of the Internet Protocol defined an IP address as a 32-bit number[1] and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995,[3] standardized as RFC 2460 in 1998,[4] and is being deployed worldwide since the mid-2000s.

IP addresses are binary numbers, but they are usually stored in text files and displayed in human-readable notations, such as 172.16.254.1 (for IPv4), and 2001:db8:0:1234:0:567:8:1 (for IPv6).

The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations globally and delegates five regional Internet registries (RIRs) to allocate IP address blocks to local Internet registries (Internet service providers) and other entities.
[http://en.wikipedia.org/wiki/IP_address]
===
What is my IP?

What is an IP address?

Just like a street address determines the recipient of a letter, an IP address (short for Internet Protocol address) is used to identify computers on the Internet. When your computer sends a request, such as a Google query, it tags the request with its IP address in order for the response to be sent back to your computer -- just like a return address on a letter.

What does an IP address look like?

IP addresses are sequences of numbers that are usually displayed in readable notations, such as 172.16.254.1 (for IPv4) and 2001:db8:0:1234:0:567:8:1 (for IPv6). Your IP address is usually assigned geographically, meaning that there is often a correlation between an IP address and a real-world location.

What is my IP address and how is it used?

When you type the query [ what is my ip ], Google will respond by showing you the IP address of the computer from which the query was received. In the simplest case, this IP address uniquely identifies your computer among all computers on the Internet. Your IP address may be used by Google to make an educated guess at your general location.

Is my IP address always the same?

There are several network configurations that may cause Google to receive an IP address that differs from the one assigned to your computer. For example, if you have a home network or a corporate network, devices are usually assigned "internal" IP addresses by a Network Address Translator (NAT) located within your router or modem. The NAT hides the internal IP addresses from websites, making the entire home network appear to outside computers to have a single, "external" IP address. In this case, we will show you the external IP address assigned to your home. Other network configurations, such as proxies, can also cause the IP address received by Google to differ from the actual IP address of your computer.
[https://support.google.com/websearch/answer/1696588]
===
What is an IP Address?
An IP address uniquely identifies your computer on the internet among all the other computers throughout the world or if your computer is not connected to the internet it uniquely identifies your computer among all the others on your local network.

IP addresses all have the same form: a series of numbers separated by a dot such as 117.25.44.244. IP addresses typically consist of 4 numbers. Each of the 4 numbers is between 0 and 255. The numbers are sometimes called octets because in binary form they are each represented by a series of 8 bits or 1 byte of data.

Most IP addresses today contain only 4 numbers. But we eventually discovered this wasn't going to be enough. One octect will allow you up to 255 different numbers. Two octects (255.255) will allow you to have 255^2 unique combinations, or 65,025. Three octects (255.255.255) allows you to have 255^3 or 16 million. And finally 4 octects allows more than 4 billion combinations. You would think that would be enough, but clearly if every person on Earth had a computer we'd run out of IP addresses. So, IPv6 is developing, an IP standard containing 6 octects or 275 trillion possible combinations. Maybe that will get us by for a while.

With the growth of the internet and the realization that in the not too distant future, your car, microwave, refrigerator, cell phone and VCR may each have their own IP address, we will quickly surpass 4 billion IPs and IPv6 will become ubiquitous.
[http://www.cambiaresearch.com/articles/3/what-is-an-ip-address]

ipadrs.PRIVATE

name::
* McsEngl.ipadrs.PRIVATE@cptIt,
* McsEngl.local-ip-address@cptIt,
* McsEngl.private-IP-address@cptIt,

_DESCRIPTION:
First things first, you should know there are two kinds of IP addresses: local and external/public. Your local IP address is what identifies your computer or device to the local network. Your external/public IP address is what the rest of the internet sees.
[http://lifehacker.com/5833108/how-to-find-your-local-and-external-ip-address]
===
In the Internet addressing architecture, a private network is a network that uses private IP address space, following the standards set by RFC 1918 and RFC 4193. These addresses are commonly used for home, office, and enterprise local area networks (LANs), when globally routable addresses are not mandatory, or are not available for the intended network applications. Private IP address spaces were originally defined in an effort to delay IPv4 address exhaustion, but they are also a feature of the next generation Internet Protocol, IPv6.
These addresses are characterized as private because they are not globally delegated, meaning they are not allocated to any specific organization, and IP packets addressed by them cannot be transmitted onto the public Internet. Anyone may use these addresses without approval from a regional Internet registry (RIR). If such a private network needs to connect to the Internet, it must use either a network address translator (NAT) gateway, or a proxy server.
[http://en.wikipedia.org/wiki/Private_network]

ipadrs.STATIC

name::
* McsEngl.ipadrs.STATIC@cptIt,

Static IP Addressing

If you feel the need to always know what your IP address is then you need a Static IP address, because it is constant. Static IP addresses are more reliable for Voice over Internet Protocol (VOIP), more reliable to host a gaming website or to play X-Box, Play Station, use Virtual Private Network for secure access to files from your company network computer, etc. Static IP addresses are also great if you use your computer as a server, as it should give your file server faster file uploads and downloads. Another plus with Static IP's, when hosting a website you are not sharing your IP with another company who sends out a lot of E-mail SPAM and not only has their website been shut down but in turn gets your IP address blacklisted.

In contrast a static IP address can become a security risk, because the address is always the same. Static IP's are easier to track for data mining companies. Static IP addressing is less cost effective than Dynamic IP Addressing.
[http://whatismyipaddress.com/dynamic-static]

prlIp'program

name::
* McsEngl.prlIp'program@cptIt,

Diagnostic tools
Computer operating systems provide various diagnostic tools to examine their network interface and address configuration. Windows provides the command-line interface tools ipconfig and netsh and users of Unix-like systems can use ifconfig, netstat, route, lanstat, ifstat, or iproute2 utilities to accomplish the task.
[http://en.wikipedia.org/wiki/IP_address]

prlIp.IPv6

name::
* McsEngl.prlIp.IPv6@cptIt,
* McsEngl.IPv6@cptIt142i,

_DESCRIPTION:
2^128 = 3.4028237e+38 = 340,282,366,920,938,463,463,374,607,431,768,211,456 = 340 1000^12 (tera = 1000^4)
===
The designers of the Internet Protocol defined an IP address as a 32-bit number[1] and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995,[3] standardized as RFC 2460 in 1998,[4] and is being deployed worldwide since the mid-2000s.
[http://en.wikipedia.org/wiki/IP_address]
===
Consequently, the design of IPv6 was an opportunistic way to improve the Internet, with new benefits such as:
Expanded addressing capabilities.
Server-less autoconfiguration ("plug-n-play") and reconfiguration.
More efficient and robust mobility mechanisms.
End-to-end security, with built-in, strong IP-layer encryption and authentication.
Streamlined header format and flow identification.
Enhanced support for multicast and QoS.
Extensibility: Improved support for options / extensions.
[http://wiki.wireshark.org/IPv6]

_ADDRESS.WPG:
* https://www.ietf.org/rfc/rfc2460.txt,

{time.2012}:
=== 2012-06-06: IPv6 DAY:
[Wikitech-l] Update on IPv6
Erik Moeller erik@wikimedia.org
2012-06-01 12:12 AM (8 hours ago)
to Wikimedia, Wikimedia
Hi all,

June 6, 2012 is IPv6 Day ( http://www.worldipv6day.org/ ). The goal of
this global event is to move more ISPs, equipment manufacturers and
web services to permanent adoption of IPv6.

We're planning to do limited production testing of IPv6 during the
Berlin Hackathon 2012 (June 2-3). Provided that the number of issues
we encounter are manageable, we may fully enable IPv6 on IPv6 day, and
keep it enabled.

MediaWiki has been used with IPv6 by third party wikis for some time.
Wikimedia uses a set of additional features (GlobalBlocking,
CheckUser, etc.) which weren't fully IPv6-ready until recently. In
addition, we're working to ensure that all of Wikimedia's various
services (mailing lists, blogs, etc.) are IPv6-ready.

== What's the user impact going to be? ==

At least in the June 2-3, 2012 time window, you may see a small number
of edits from IPv6 addresses, which are in the form
"2001:0db8:85a3:0000:0000:8a2e:0370:7334". See [[w:IPv6 address]].

These addresses should behave as any other IP adress would: You can
leave messages on their talk pages; you can track their contributions;
you can block them. CIDR notation is supported for rangeblocks.

An important note about blocking: A single user may have access to a
much larger number of addresses than in the IPv4 model. This means
that range blocks (e.g. address with "/64") have to be applied in more
cases to prevent abuse by more sophisticated users.

In the mid term, user scripts and tools that use simple regular
expressions to match IPv4 addresses will need to be adapted for IPv6
support to behave correctly. We suspect that IPv6 usage is going to be
very low initially, meaning that abuse should be manageable, and we
will assist in the monitoring of the situation.

User:Jasper Deng is maintaining a comprehensive analysis of the long
term implications of the IPv6 migration here:
https://en.wikipedia.org/wiki/User:Jasper_Deng/IPv6

We've set up a test wiki where you can see IPv6 IP addresses. This
works by assigning you a fake IPv6 address the moment you visit the
wiki, and allows you to see the behavior of various tools with the new
address format:
http://ipv6test.wmflabs.org/wiki/index.php/Main_Page

The best way to report issues is to register them in Bugzilla and to
ensure that they are marked as blockers for the IPv6 tracking bug:
https://bugzilla.wikimedia.org/show_bug.cgi?id=35540

We'll post updates to wikitech-l and elsewhere as appropriate.

All best,
Erik

prlIp.IPv4

name::
* McsEngl.prlIp.IPv4@cptIt,
* McsEngl.IPv4@cptIt142i,

_DESCRIPTION:
The designers of the Internet Protocol defined an IP address as a 32-bit number[1] and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995,[3] standardized as RFC 2460 in 1998,[4] and is being deployed worldwide since the mid-2000s.
[http://en.wikipedia.org/wiki/IP_address]

prlIp.IPng

name::
* McsEngl.prlIp.IPng@cptIt,

_DESCRIPTION:
IPng (IP next generation):
Το πρότεινε τον Ιούλιο 1994 η Internet engineering task με σκοπο τη μετάδοση οπτικοακουστικων πληροφοριών μέσα απο το δίκτυο
[TELECOM, OCT. 1994, 18]

prlIpf'protocol.RARP

name::
* McsEngl.prlIpf'protocol.RARP@cptIt,

_GENERIC:
* link-layer-protocol#ql:tcpip'protocol.link_layer#

Reverse Address Resolution Protocol (RARP)

This protocol does the exact opposite of ARP; given a MAC address, it tries to find the corresponding IP address.

History

In the early years of 1980 this protocol was used for address assignment for network hosts. Due to its limited capabilities it was eventually superseded by BOOTP.

Protocol dependencies

RARP is available for several link layers, some examples:

Ethernet: RARP can use Ethernet as its transport protocol. The Ethernet type for RARP traffic is 0x8035.
Other protocols in the LanProtocolFamily: RARP can use other LAN protocols as transport protocols as well, using SNAP encapsulation and the Ethernet type of 0x8035.
[http://wiki.wireshark.org/RARP]

prlIpf'protocol.TCP

name::
* McsEngl.prlIpf'protocol.TCP@cptIt,
* McsEngl.TCP@cptIt142i,

_DESCRIPTION:
Transmission Control Protocol (TCP)

The TCP protocol provides stream based connection oriented transfer of data of the InternetProtocolFamily.

It provides the described TCP port multiplexing and much more. It establishes a logical connection, which is reliable against the problems of PacketLoss, DuplicatePackets and such.

Sending a few bytes will transfer them to the remote host, without giving any additional faulty or missing bytes to the receiving application.

History

When Vint Cerf and Bob Kahn first wrote the specifications for the protocol in 1973, the Internet was prohibited from commercial use. In May, 1974, the Institute of Electrical and Electronic Engineers (IEEE) published a paper entitled "A Protocol for Packet Network Interconnection." As the paper's authors, Cerf and Kahn described an internetworking protocol for sharing resources using packet-switching among the nodes. A central control component of this model was the Transmission Control Program that incorporated both connection-oriented links and datagram services between hosts. The monolithic Transmission Control Program was later divided into a modular architecture consisting of the Transmission Control Protocol at the connection-oriented layer and the Internet Protocol at the internetworking (datagram) layer. The model became known informally as TCP/IP, although formally it was henceforth called the Internet Protocol Suite.

Protocol dependencies

IP: Typically, TCP uses IP as its underlying protocol. The assigned protocol number for TCP on IP is 6.
[http://wiki.wireshark.org/Transmission_Control_Protocol]
===
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol Suite. TCP is one of the two original components of the suite, complementing the Internet Protocol (IP), and therefore the entire suite is commonly referred to as TCP/IP. TCP provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. TCP is the protocol that major Internet applications such as the World Wide Web, email, remote administration and file transfer rely on. Other applications, which do not require reliable data stream service, may use the User Datagram Protocol (UDP), which provides a datagram service that emphasizes reduced latency over reliability.
[http://en.wikipedia.org/wiki/Transmission_Control_Protocol]

prlIpf'protocol.UDP

name::
* McsEngl.prlIpf'protocol.UDP@cptIt,
* McsEngl.UDP@cptIt142i,
* McsEngl.user-datagram-protocol@cptIt,

prlIpf'reference

name::
* McsEngl.prlIpf'reference@cptIt,

_ADDRESS.WPG:
* http://www.tcpipguide.com//
http://www.tcpipguide.com/free/t_toc.htm,

prlIpf'relation-to-OSI-MODEL

name::
* McsEngl.prlIpf'relation-to-OSI-MODEL@cptIt,

_DESCRIPTION:
Comparison with TCP/IP model

The design of protocols in the TCP/IP model of the Internet does not concern itself with strict hierarchical encapsulation and layering.[12] RFC 3439 contains a section entitled "Layering considered harmful".[13] TCP/IP does recognize four broad layers of functionality which are derived from the operating scope of their contained protocols: the scope of the software application; the end-to-end transport connection; the internetworking range; and the scope of the direct links to other nodes on the local network.[14]

Despite using a different concept for layering than the OSI model, these layers are nevertheless often compared with the OSI layering scheme in the following way:

The Internet application layer includes the OSI application layer, presentation layer, and most of the session layer.
Its end-to-end transport layer includes the graceful close function of the OSI session layer as well as the OSI transport layer.
The internetworking layer (Internet layer) is a subset of the OSI network layer.
The link layer includes the OSI data link layer and sometimes the physical layers, as well as some protocols of the OSI's network layer.

These comparisons are based on the original seven-layer protocol model as defined in ISO 7498, rather than refinements in such things as the internal organization of the network layer document.[citation needed]

The presumably strict layering of the OSI model as it is usually described does not present contradictions in TCP/IP, as it is permissible that protocol usage does not follow the hierarchy implied in a layered model. Such examples exist in some routing protocols (e.g., OSPF), or in the description of tunneling protocols, which provide a link layer for an application, although the tunnel host protocol might well be a transport or even an application-layer protocol in its own right.
[https://en.wikipedia.org/wiki/OSI_model]

prlIpf.EVOLUTING

name::
* McsEngl.prlIpf.EVOLUTING@cptIt,

{time.mid1980s}:
=== Το DARPA είδε την ανάγκη της διασύνδεσης ΔΙΑΦΟΡΕΤΙΚΩΝ ΥΠΟΛΟΓΙΣΤΩΝ σε όλη τη χώρα για την υποστήριξη ερευνητικών προσπαθειών.

{time.1983}:
=== το TCP/IP έγινε το υποχρεωτικό πρωτόκολλο, δίνοντας τη δυνατότητα σε καθε χρήστη να "βλεπει" με ομοιόμορφο τρόπο το δίκτυο, ανεξάρτητα από τον τρόπο σύνδεσης (σειριακή γραμμή, δορυφορική σύνδεση, ISDN,)
[computer go, sep. 1994, 82]

{time.1980}:
=== Το DARPA εγκατάστησε τα πρώτα τμήματα TCP/IP σε υπολογιστες στα δίκτυά του.
ΔΗΜΙΟΥΡΓΙΑ: Απο το Υπουργείο Αμυνας των ΗΠΑ.
ΛΕΙΤΟΥΡΓΙΕΣ: Παραδίδει δεδομένα σε μια στάνταρ μορφή ΚΑΙ τα διαθέτει σε υψηλότερου επιπέδου προγράμματα.
ARP: Address Resolution Protocol. Χρησιμοποιείται απο TCP/IP για χρήση σε Ethernet.

cmnprl.MAC

name::
* McsEngl.cmnprl.MAC@cptIt,
* McsEngl.MAC-layer@cptIt,
* McsEngl.MAC-protocol@cptIt,
* McsEngl.MAC-sublayer@cptIt,
* McsEngl.media-access-control-protocol@cptIt,

_DESCRIPTION:
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2).
The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network.
The hardware that implements the MAC is referred to as a media access controller.

The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer.
The MAC layer emulates a full-duplex logical communication channel in a multi-point network.
This channel may provide unicast, multicast or broadcast communication service.
[https://en.wikipedia.org/wiki/Media_access_control]

MAC-address

_DESCRIPTION:
What is MAC Address?
MAC address stands for Medium Access Control Address. MAC address is also referred as physical address or hardware address or ethernet address.
MAC address is unique to network device wanting to utilize TCPIP network or LAN or WLAN service. It is "burnt into" the device by manufacturer of the device or Card.
MAC address is composed of 48 bit or six hexadecimal digits,separated by colons or dashes.
Example - 00-14-2A-3F-47-D0
Remember Hexadecimal digits can be numbers from 0-9 and letters from A-F.

MAC address represent manifacturer of the card and device number. The first three pairs of digits represent manufacturer(called OUI-Organisationally Unique Identifier) and last three pairs of digits represent number specific to the device(called NIC-Network Interface Controller Specific). ARP,Address Resoultion Protocol is used to convert IP address to the MAC address. MAC address is very essential for the IP layer to work. MAC is the foundation for IP address to communicate packet from one system to the other. Similar to IP addresses, there are some MAC addresses defined for special purposes,For example FF:FF:FF:FF:FF:FF is reserved ror broadcast purpose.
Commands to know what mac address system has

arp -a
Above command lists out all the IP addresses and their physical addresses attached to the system where command is issued.
Similarly "rarp" command is used to convert physical address to the IP address.
"ipconfig/all" command is used to know physical address of the device.
[http://www.rfwireless-world.com/Terminology/what-is-mac-address.html]

NETWORK LOGICAL-CONNECTION

name::
* McsEngl.conceptIt173,
* McsEngl.Channel-access-method@cptIt,
* McsEngl.channel-access-method@cptIt,
* McsEngl.access-control-techniques@cptIt,
* McsEngl.data-link-protocol@cptIt,
* McsEngl.logical-topology@cptIt,
* McsEngl.MEDIA-ACCESS-CONTROL-(MAC)@cptIt,
* McsEngl.network-logical-connection@cptIt,
* McsEngl.topology'logical@cptIt173,
* McsElln.ΕΛΕΓΧΟΣ-ΠΡΟΣΠΕΛΑΣΗΣ-ΜΕΣΟΥ@cptIt,
* McsElln.ΕΛΕΓΧΟΣ-ΡΟΗΣ-ΤΗΣ-ΠΛΗΡΟΦΟΡΙΑΣ@cptIt,
* McsElln.ΛΟΓΙΚΗ-ΣΥΝΔΕΣΗ-ΔΙΚΤΥΟΥ@cptIt,
* McsElln.ΛΟΓΙΚΗ-ΤΟΠΟΛΟΓΙΑ@cptIt,
* McsElln.ΠΡΩΤΟΚΟΛΛΟ-ΔΙΑΣΥΝΔΕΣΗΣ-ΔΕΔΟΜΕΝΩΝ@cptIt,
* McsElln.ΠΡΩΤΟΚΟΛΛΟ-ΕΠΙΚΟΙΝΩΝΙΑΣ@cptIt,
* McsElln.ΤΕΧΝΙΚΕΣ-ΠΡΟΣΠΕΛΑΣΗΣ@cptIt,

DEFINITION

_DESCRIPTION:
In telecommunications and computer networks, a channel access method or multiple access method allows several terminals connected to the same multi-point transmission medium to transmit over it and to share its capacity. Examples of shared physical media are wireless networks, bus networks, ring networks and half-duplex point-to-point links.

A channel-access scheme is based on a multiplexing method, that allows several data streams or signals to share the same communication channel or physical medium. Multiplexing is in this context provided by the physical layer. Note that multiplexing also may be used in full-duplex point-to-point communication between nodes in a switched network, which should not be considered as multiple access.

A channel-access scheme is also based on a multiple access protocol and control mechanism, also known as media access control (MAC). This protocol deals with issues such as addressing, assigning multiplex channels to different users, and avoiding collisions. The MAC-layer is a sub-layer in Layer 2 (Data Link Layer) of the OSI model and a component of the Link Layer of the TCP/IP model.
[https://en.wikipedia.org/wiki/Channel_access_method]

ΕΙΝΑΙ ΕΝΑ ΑΠΟ ΤΑ ΣΗΜΑΝΤΙΚΟΤΕΡΑ ΘΕΜΑΤΑ ΣΤΑ ΔΙΚΤΥΑ ΑΚΡΟΑΣΗΣ (BROADCASTING NETWORKS)

Ο ΛΟΓΙΚΟΣ ΤΡΟΠΟΣ ΜΕ ΤΟΝ ΟΠΟΙΟ ΤΟ ΔΙΚΤΥΟ "ΒΛΕΠΕΙ" ΤΟΥΣ ΚΟΜΒΟΥΣ ΤΟΥ, ΕΙΝΑΙ ΕΝΑ ΠΡΩΤΟΚΟΛΛΟ ΕΠΙΚΟΙΝΩΝΙΑΣ
ΚΑΙ Η ΦΥΣΙΚΗ ΔΙΑΤΑΞΗ ΤΟΥΣ ΑΚΟΛΟΥΘΕΙ ΚΑΠΟΙΑ ΤΟΠΟΛΟΓΙΑ.
ΟΙ ΟΡΟΙ ΑΥΤΟΙ ΟΣΟ ΚΙΑΝ ΦΑΙΝΟΜΕΝΙΚΑ ΟΡΙΖΟΥΝ ΔΙΑΦΟΡΕΤΙΚΕΣ ΟΝΤΟΤΗΤΕΣ, ΧΡΗΣΙΜΟΠΟΙΟΥΝΤΑΙ ΣΤΗΝ ΠΡΑΞΗ ΜΕ ΚΑΠΟΙΑ ΕΛΕΥΘΕΡΙΑ ΕΠΕΙΔΗ ΟΙ ΠΕΡΙΣΣΟΤΕΡΕΣ ΤΟΠΟΛΟΓΙΕΣ ΕΧΟΥΝ ΣΥΝΔΕΣΕΙ ΤΗΝ ΥΠΑΡΞΗ ΤΟΥΣ ΜΕ ΚΑΠΟΙΟ ΠΡΩΤΟΚΟΛΛΟ, ΥΠΑΡΧΟΥΝ ΔΕ ΠΡΩΤΟΚΟΛΛΑ ΠΟΥ ΑΠΑΙΤΟΥΝ ΣΥΓΚΕΚΡΙΜΕΝΗ ΤΟΠΟΛΟΓΙΑ.
[RAM, ΜΑΡΤ 1993, ΕΝΘΕΤΟ 8]

ME ΤΟΝ ΟΡΟ ΑΥΤΟ {ACCESS CONTROL TECHNIQUES-ΤΕΧΝΙΚΕΣ ΕΛΕΓΧΟΥ ΠΡΟΣΠΕΛΑΣΗΣ ΤΟΥ ΚΑΝΑΛΙΟΥ} ΕΝΝΟΟΥΜΕ ΤΙΣ ΜΕΘΟΔΟΥΣ ΠΟΥ ΑΝΤΙΜΕΤΩΠΙΖΟΥΝ ΤΗΝ ΤΑΥΤΟΧΡΟΝΗ ΕΚΠΟΜΠΗ ΣΤΟ ΚΟΙΝΟ ΚΑΝΑΛΙ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 312#cptResource223]

SPECIFIC

Specific_concepts (level 3) =

ΤΑ PACKET RADIO ΔΙΚΤΥΑ ΧΡΗΣΙΜΟΠΟΙΟΥΝ ΤΙΣ ΤΕΧΝΙΚΕΣ ALOHA, CSMA.
ΤΑ ΔΟΡΥΦΟΡΙΚΑ ΔΙΚΤΥΑ ΧΡΗΣΙΜΟΠΟΙΟΥΝ ΤΗΝ ALOHA, ΤΗΝ ΣΥΓΚΕΝΤΡΩΤΙΚΗ RESERVATION ΚΑΙ ΤΗΝ ΚΑΤΑΝΕΜΗΜΕΝΗ RESERVATION.
ΤΑ ΤΟΠΙΚΑ ΔΙΚΤΥΑ ΤΙΣ CSMA/CD, TOKEN BUS, TOKEN RING.

ΣΥΓΚΕΝΤΡΩΤΙΚH: ΕΝΑΣ ΣΤΑΘΜΟΣ ΕΛΕΓΧΕΙ ΚΑΙ ΟΙ ΑΛΛΟΙ ΠΕΡΝΟΥΝ ΑΔΕΙΑ ΑΠ'ΑΥΤΟΝ
ΚΑΤΑΝΕΜΗΜΕΝH: ΕΙΔΙΚΕΣ ΤΕΧΝΙΚΕΣ ΩΣΤΕ ΝΑ ΑΠΟΦΑΣΙΖΕΤΑΙ ΠΟΙΟΙ ΣΤΑΘΜΟΙ ΚΑΙ ΜΕ ΠΟΙΑ ΣΕΙΡΑ ΜΠΟΡΟΥΝ ΝΑ ΕΚΠΕΜΠΟΥΝ.

ΣΥΓΧΡΟΝΕΣ#ql:([Group 173]..)##cptIt173: attSpe# ΤΕΧΝΙΚΕΣ:
 FDM
 TDM
ΑΣΥΓΧΡΟΝΕΣ ΤΕΧΝΙΚΕΣ:
 ROUND#ql:([Group 173]round.robin.h)##cptIt173: attSpe# ROBIN
   polling(ΣΥΓΚΕΝΤΡΩΤΙΚH)
   token bus/token ring(ΚΑΤΑΝΕΜΗΜΕΝH)
 RESERVATION#ql:([Group 173]reservation.h)##cptIt173: attSpe#
   ΣΥΓΚΕΝΤΡΩΤΙΚΗ
   ΚΑΤΑΝΕΜΗΜΕΝΗ
 CONTENTION#ql:([Group 173]contention.h)###cptIt173#: attSpe#
   ALOHA
   CSMA
   CSMA/CD

SPECIFIC

Specific_concepts (level 3) =

TYPES:
1. listen-before-transmitting. Ethernet#cptIt74## 74# Ονομάζεται CSMA/CD {Carrier sense multiple access} with Collision detection
2. sequential-station-number. ARCnet
3. token-passing#cptIt84: attSpe# μέθοδος μεταβίβασης συμβόλων. (token-ring#cptIt75: attSpe# token-bus/ARCnet)#cptIt76: attSpe#

ΣΥΓΧΡΟΝΕΣ.ΤΕΧΝΙΚΕΣ

name::
* McsElln.ΣΥΓΧΡΟΝΕΣ.ΤΕΧΝΙΚΕΣ@cptIt,

ΔΕΝ ΠΡΟΤΙΜΩΝΤΑΙ ΣΤΑ BROADCASTING ΔΙΚΤΥΑ ΚΑΘΟΣΟΝ ΟΙ ΑΝΑΓΚΕΣ ΜΕΤΑΔΟΣΗΣ ΤΟΥ ΚΑΘΕ ΣΤΑΘΜΟΥ ΑΥΤΩΝ ΤΩΝ ΔΙΚΤΥΩΝ ΕΙΝΑΙ ΕΝ ΓΕΝΕΙ ΑΠΡΟΒΛΕΠΤΕΣ. ΑΝΤΙΘΕΤΑ ΤΑΙΡΙΑΖΟΥΝ ΣΕ ΔΙΚΤΥΑ ΠΟΥ ΤΑ ΜΕΓΕΘΗ ΤΩΝ ΜΗΝΥΜΑΤΩΝ ΜΕΤΑΞΥ ΤΩΝ ΣΤΑΘΜΩΝ ΕΙΝΑΙ ΣΤΑΘΕΡΑ.

ROUND.ROBIN

name::
* McsEngl.ROUND.ROBIN@cptIt,

ΕΙΝΑΙ Η ΤΕΧΝΙΚΗ ΠΟΥ ΣΤΗΡΙΖΕΤΑΙ ΣΤΗΝ ΑΡΧΗ ΤΟΥ ΟΤΙ ΣΕ ΚΑΘΕ ΓΥΡΟ Ο ΚΑΘΕ ΣΤΑΘΜΟΣ ΕΧΕΙ ΜΙΑ ΕΥΚΑΡΙΑ ΝΑ ΕΚΠΕΜΨΕΙ.
Η ΤΕΧΝΙΚΗ ΑΥΤΗ ΠΡΟΤΙΜΑΤΑΙ ΟΤΑΝ ΠΟΛΛΟΙ ΣΤΑΘΜΟΙ ΤΟΥ ΔΙΚΤΥΟΥ ΕΚΠΕΜΠΟΥΝ ΠΟΛΛΕΣ ΦΟΡΕΣ ΚΑΙ ΓΙΑ ΣΥΝΤΟΜΟ ΧΡΟΝΙΚΟ ΔΙΑΣΤΗΜΑ.
POLLING:
TOKEN BUS: ΤΟΠΙΚΑ ΔΙΚΤΥΑ
TOKEN RING: ΤΟΠΙΚΑ ΔΙΚΤΥΑ

RESERVATION

ΕΙΝΑΙ Η ΤΕΧΝΙΚΗ ΠΟΥ ΧΡΗΣΙΜΟΠΟΙΕΙΤΑΙ ΚΥΡΙΩΣ ΣΕ ΕΚΤΕΝΕΙΣ ΕΠΙΚΟΙΝΩΝΙΕΣ ΚΑΙ ΣΧΕΔΟΝ ΣΥΝΕΧΕΙΣ. ΔΙΑΙΡΕΙ ΣΤΟ ΧΡΟΝΟ ΤΗ ΧΩΡΗΤΙΚΟΤΗΤΑ ΤΟΥ ΜΕΣΟΥ ΣΕ ΤΜΗΜΑΤΑ, ΚΑΘΕΝΑ ΑΠΟ ΤΑ ΟΠΟΙΑ ΕΚΜΕΤΑΛΛΕΥΕΤΑΙ Ο ΚΑΘΕ ΣΤΑΘΜΟΣ.
ΣΥΓΚΕΝΤΡΩΤΙΚΗ: ΔΟΡΥΦΟΡΙΚΑ ΔΙΚΤΥΑ
ΚΑΤΑΝΕΜΗΜΕΝΗ: ΔΟΡΥΦΟΡΙΚΑ ΔΙΚΤΥΑ

CONTENTION

ΕΙΝΑΙ Η ΤΕΧΝΙΚΗ ΠΟΥ ΧΡΗΣΙΜΟΠΟΙΕΙΤΑΙ ΣΥΝΗΘΩΣ ΣΕ ΣΠΟΡΑΔΙΚΕΣ ΚΑΙ ΣΥΝΤΟΜΕΣ ΕΠΙΚΟΙΝΩΝΙΕΣ.
ΔΕΝ ΥΠΑΡΧΕΙ ΣΕΙΡΑ ΠΟΥ ΕΚΠΕΜΠΟΥΝ ΟΙ ΣΤΑΘΜΟΙ, ΑΛΛΑ ΟΠΟΙΟΣ ΕΠΙΘΥΜΕΙ ΜΠΟΡΕΙ ΝΑ ΕΚΠΕΜΨΕΙ.
ΧΡΗΣΙΜΟΠΟΙΟΥΝΤΑΙ ΚΥΡΙΩΣ ΣΕ ΚΑΤΑΝΕΜΗΜΕΝΑ ΔΙΚΤΥΑ ΑΚΡΟΑΣΗΣ.
ALOHA: PACKET RADIO NETWORKS, ΔΟΡΥΦΟΡΙΚΑ ΔΙΚΤΥΑ
CSMA: PACKET RADIO NETWORKS
CSMA/CD: ΤΟΠΙΚΑ ΔΙΚΤΥΑ

TOKEN-PASSING

name::
* McsEngl.conceptIt84,
* McsEngl.token-passing@cptIt,
* McsEngl.token'passing@cptIt84,

_DESCRIPTION:
In telecommunication, token passing is a channel access method where a signal called a token is passed between nodes that authorizes the node to communicate. The most well-known examples are token ring and ARCNET.

Token passing schemes provide round-robin scheduling, and if the packets are equally sized, the scheduling is max-min fair. The advantage over contention based channel access is that collisions are eliminated, and that the channel bandwidth can be fully utilized without idle time when demand is heavy. The disadvantage is that even when demand is light, a station wishing to transmit must wait for the token, increasing latency.

Some types of token passing schemes do not need to explicitly send a token between systems because the process of "passing the token" is implicit. An example is the channel access method used during "Contention Free Time Slots" in the ITU-T G.hn standard for high-speed local area networking using existing home wires (power lines, phone lines and coaxial cable).
[https://en.wikipedia.org/wiki/Token_passing]
===
Τα δίκτυα με αυτή τη μεθοδο μεταβίβασης είναι πιο αργα αλλά συμεριφέρονται πιο σωστα. Οι επιδόσεις τους χειροτερεύουν όσο μεγαλώνει ο αριθμός των χρηστών.
===
The most well-known examples are token ring and ARCNET.
[https://en.wikipedia.org/wiki/Token_passing]

cmnprl.MNP {1983}

name::
* McsEngl.cmnprl.MNP {1983}@cptIt,
* McsEngl.conceptIt135,
* McsEngl.MNP@cptIt,
* McsEngl.mnp@cptIt135,
* McsEngl.microcom-networking-protocol@cptIt,

DEFINITION

TO MICROCOM NETWORKING PROTOCOL ΑΝΑΚΟΙΝΩΘΗΚΕ ΑΠΟ ΤΗΝ ΕΤΑΙΡΙΑ MICROCOM ΤΟ 1983 ΚΑΙ ΕΧΕΙ ΓΙΝΕΙ ΕΜΠΟΡΙΚΟ ΣΤΑΝΤΑΡΝΤ ΓΙΑ ΜΕΤΑΔΟΣΕΙΣ ΑΣΥΓΡΟΝΩΝ ΔΕΔΟΜΕΝΩΝ ΜΕΣΩ DIAL UP MODEM ΤΥΠΟΥ V.21, V.22 bis, V.23, V32, V32 bis.

TO MNP ΦΡΟΝΤΙΖΕΙ ΓΙΑ ΤΗ ΧΩΡΙΣ ΣΦΑΛΜΑΤΑ ΜΕΤΑΔΟΣΗ ΔΕΔΟΜΕΝΩΝ ΜΕΣΩ ΤΗΛΕΦΩΝΙΚΟΥ ΔΙΚΤΥΟΥ. Η ΧΩΡΙΣ ΛΑΘΗ ΜΕΤΑΔΟΣΗ ΕΞΑΣΦΑΛΙΖΕΤΑΙ ΜΕ ΕΠΑΝΕΚΠΟΜΠΗ ΤΩΝ ΔΕΔΟΜΕΝΩΝ ΠΟΥ ΕΛΗΦΘΗΣΑΝ ΛΑΘΟΣ. Ο ΕΛΕΓΧΟΣ ΡΟΗΣ ΚΑΙ ΣΥΜΠΙΕΣΗ ΔΕΔΟΜΕΝΩΝ ΕΙΝΑΙ ΕΠΙΣΗΣ ΑΞΙΟΣΗΜΕΙΩΤΑ ΣΗΜΕΙΑ ΤΟΥ ΠΡΩΤΟΚΟΛΛΟΥ.

ΧΡΗΣΙΜΟΠΟΙΕΙ ΚΥΡΙΩΣ ΤΟ 2ο ΕΠΙΠΕΔΟ ΤΟΥ ΜΟΝΤΕΛΟΥ OSI ΑΛΛΑ ΕΠΕΚΤΕΙΝΕΤΑΙ ΚΑΙ ΣΤΑ ΕΠΙΠΕΔΑ 1 ΚΑΙ 5.

cmnprl.NTP

name::
* McsEngl.cmnprl.NTP@cptIt,
* McsEngl.ntp-protocol@cptIt,
* McsEngl.ntp@cptIt,

_DESCRIPTION:
Network Time Protocol (NTP) definition
Posted by: Margaret Rouse
Network Time Protocol (NTP) is a protocol that is used to synchronize computer clock times in a network of computers.

NTP uses Coordinated Universal Time (UTC) to synchronize computer clock times to a millisecond, and sometimes to a fraction of a millisecond. UTC time is obtained using several different methods, including radio and satellite systems. Specialized receivers are available for high-level services such as the Global Positioning System (GPS) and the governments of some nations. However, it is not practical or cost-effective to equip every computer with one of these receivers. Instead, computers designated as primary time servers are outfitted with the receivers and they use protocols such as NTP to synchronize the clock times of networked computers. Degrees of separation from the UTC source are defined as strata. A radio clock (which receives true time from a dedicated transmitter or satellite navigation system) is stratum-0; a computer that is directly linked to the radio clock is stratum-1; a computer that receives its time from a stratum-1 computer is stratum-2, and so on.

Accurate time across a network is important for many reasons; even small fractions of a second can cause problems. For example, distributed procedures depend on coordinated times to ensure that proper sequences are followed. Security mechanisms depend on coordinated times across the network. File system updates carried out by a number of computers also depend on synchronized clock times. Air traffic control systems provide a graphic illustration of the need for coordinated times, since flight paths require very precise timing (imagine the situation if air traffic controller computer clock times were not synchronized).

The term NTP applies to both the protocol and the client/server programs that run on computers. The programs are compiled by the user as an NTP client, NTP server, or both. In basic terms, the NTP client initiates a time request exchange with the time server. As a result of this exchange, the client is able to calculate the link delay and its local offset, and adjust its local clock to match the clock at the server's computer. As a rule, six exchanges over a period of about five to 10 minutes are required to initially set the clock. Once synchronized, the client updates the clock about once every 10 minutes, usually requiring only a single message exchange. In addition to client/server synchronization, NTP also supports broadcast synchronization of peer computer clocks. Unfortunately, the NTP protocol can be exploited and used for denial of service (DoS) attacks because it will reply to a packet with a spoofed source IP address and because at least one of its built-in commands will send a long reply to a short request.

NTP, which was developed by David Mills at the University of Delaware, is designed to be highly fault-tolerant and scalable.
[http://searchnetworking.techtarget.com/definition/Network-Time-Protocol]

cmnprl.P2P

name::
* McsEngl.cmnprl.P2P@cptIt,
* McsEngl.p2p-protocol@cptIt,
* McsEngl.p2p-message-protocol@cptIt,
* McsEngl.p2pp@cptIt,
* McsEngl.p2pprl@cptIt,

_DESCRIPTION:
Peer-to-Peer Protocol is an application layer peer-to-peer networking protocol that can be used to form and maintain an overlay network among participant nodes. It was defined in an Internet Draft submitted to the IETF by the P2PSIP Working Group. It provides mechanisms for nodes to join, leave, publish, or search for a resource-object in the overlay. It maintains information about nodes in a routing table. Because of potentially large content, a node's routing table only contains a subset of these nodes. If a node can't accomplish the request, it searches for one which can, by performing a nextHop() operation to a destination from the routing table (recursive-routing).
[https://en.wikipedia.org/wiki/Peer-to-Peer_Protocol_%28P2PP%29]

_GENERIC:
* P2PP is a request–response protocol,
* network-protocol#ql:netit'protocol#

p2pp'message

name::
* McsEngl.p2pp'message@cptIt,

_DESCRIPTION:
A message is a P2PP protocol message that performs a certain function. It begins with a header followed by a sequence of type-length-value (TLV) objects. It can be either a request or a response. The response header contains a response code (see codes). They can not be combined in one message if an unreliable transport is used, due to limitations of UDP MTU.
[https://en.wikipedia.org/wiki/Peer-to-Peer_Protocol_%28P2PP%29]

p2pp'network#ql:netcmr.p2p#

name::
* McsEngl.p2pp'network@cptIt,

p2pp.BitTorrent

name::
* McsEngl.p2pp.BitTorrent@cptIt,
* McsEngl.BitTorrent-protocol@cptIt,

_DESCRIPTION:
a peer-to-peer file transfer protocol for sharing large amounts of data over the Internet, in which each part of a file downloaded by a user is transferred to other users.
[google dict]

p2pp.FastTrack

name::
* McsEngl.p2pp.FastTrack@cptIt,
* McsEngl.FastTrack-protocol@cptIt,

_DESCRIPTION:
FastTrack is a peer-to-peer (P2P) protocol that was used by the Kazaa, Grokster, iMesh, and Morpheus file sharing programs. FastTrack was the most popular file sharing network in 2003, and used mainly for the exchange of music mp3 files. The network had approximately 2.4 million concurrent users in 2003. It is estimated that the total number of users was greater than that of Napster at its peak.
[https://en.wikipedia.org/wiki/FastTrack]

p2pp.OpenFT

name::
* McsEngl.p2pp.OpenFT@cptIt,
* McsEngl.OpenFT-protocol@cptIt,

_DESCRIPTION:
giFT's sibling project is OpenFT, a peer-to-peer file sharing network protocol that has a structure in which nodes are divided into 'search' nodes and 'index' supernodes in addition to common nodes. Since both projects are related very closely, when one says 'OpenFT', one can mean either one of two different things: the OpenFT protocol, or the implementation in the form of a plugin for giFT.
The name "OpenFT" stands for "Open FastTrack". Despite this, the OpenFT protocol is an entirely new protocol design: only a few ideas in the OpenFT protocol are drawn from what little was known about the FastTrack protocol at the time OpenFT was designed.
[https://en.wikipedia.org/wiki/GiFT#OpenFT_protocol]

cmnprl.PPP

name::
* McsEngl.cmnprl.PPP@cptIt,
* McsEngl.ppp@cptIt124i,

_DEFINITION:
In networking, the Point-to-Point Protocol, or PPP, is a data link protocol commonly used to establish a direct connection between two nodes over serial cable, phone line, trunk line, cellular telephone, specialized radio links, or fiber optic links. Most Internet service providers use PPP for customers' dial-up access to the Internet. Two common encapsulated forms of PPP, Point-to-Point Protocol over Ethernet (PPPoE) or Point-to-Point Protocol over ATM (PPPoA), are used in a similar role with Digital Subscriber Line (DSL) Internet service.

PPP is commonly used to act as a data link layer protocol for connection over synchronous and asynchronous circuits, where it has largely superseded the older, non-standard Serial Line Internet Protocol (SLIP), and telephone company mandated standards (such as Link Access Protocol, Balanced (LAPB) in the X.25 protocol suite). PPP was designed to work with numerous network layer protocols, including Internet Protocol (IP), Novell's Internetwork Packet Exchange (IPX), NBF and AppleTalk.
[http://en.wikipedia.org/wiki/Point-to-Point_Protocol]

cmnprl.STANDARD

name::
* McsEngl.cmnprl.STANDARD@cptIt,
* McsEngl.conceptIt124,
* McsEngl.aggrement@cptIt,
* McsEngl.communication-standard@cptIt139i,
* McsEngl.methodCommNet@cptIt124,
* McsEngl.network-method@cptIt124,
* McsEngl.network-protocol@cptIt124,
* McsEngl.protocol.network@cptIt124,
* McsEngl.cmnprl@cptIt262, {2013-07-23}
====== lagoGreek:
* McsElln.ΣΤΑΝΤΑΡΝΤ-ΕΠΙΚΟΙΝΩΝΙΑΣ@cptIt,

_GENERIC:
* standard.it#cptItsoft139#
* method-communication#ql:communication_protocol@cptIt#

_WHOLE:
* network.computer#cptIt21#

_DEFINITION:
Within computer science, a communications protocol is a system of digital rules for message exchange within or between computers.
Communicating systems use well-defined formats for exchanging messages. Each message has an exact meaning intended to provoke a particular response of the receiver. Thus, a protocol must define the syntax, semantics, and synchronization of communication; the specified behavior is typically independent of how it is to be implemented. A protocol can therefore be implemented as hardware, software, or both. Communications protocols have to be agreed upon by the parties involved.[1] To reach agreement a protocol may be developed into a technical standard. A programming language describes the same for computations, so there is a close analogy between protocols and programming languages: protocols are to communications as programming languages are to computations.[2]
[http://en.wikipedia.org/wiki/Protocol_(computing)] 2013-07-26
===
In the field of telecommunications, a communications protocol is the set of standard rules for data representation, signalling, authentication and error detection required to send information over a communications channel. An example of a simple communications protocol adapted to voice communication is the case of a radio dispatcher talking to mobile stations. The communication protocols for digital computer network communication have many features intended to ensure reliable interchange of data over an imperfect communication channel. Communication protocol is basically following certain rules so that the system works properly.
[http://en.wikipedia.org/wiki/Communication_protocol]
===
ΟΡΙΖΟΥΜΕ ΔΕ ΣΑΝ ΠΡΩΤΟΚΟΛΟ ΕΝΑ ΣΥΝΟΛΟ ΑΠΟ ΚΑΝΟΝΕΣ ΓΙΑ ΤΗ ΔΙΕΚΠΕΡΑΙΩΣΗ ΤΗΣ ΕΠΙΚΟΙΝΩΝΙΑΣ ΜΕΤΑΞΥ ΕΝΟΤΗΤΩΝ ΜΙΑΣ ΑΡΧΙΤΕΚΤΟΝΙΚΗΣ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 317#cptResource223]#

cmnprl.STATEFUL

name::
* McsEngl.cmnprl.STATEFUL@cptIt,
* McsEngl.stateful-protocol@cptIt,

_DESCRIPTION:
In computer science and automata theory, the state of a digital logic circuit or computer program is a technical term for all the stored information, at a given instant in time, to which the circuit or program has access.[1] The output of a digital circuit or computer program at any time is completely determined by its current inputs and its state.
[http://en.wikipedia.org/wiki/Stateful]

cmnprl.STATELESS

name::
* McsEngl.cmnprl.STATELESS@cptIt,
* McsEngl.stateless-protocol@cptIt,

_DESCRIPTION:
In computing, a stateless protocol is a communications protocol that treats each request as an independent transaction that is unrelated to any previous request so that the communication consists of independent pairs of requests and responses. A stateless protocol does not require the server to retain session information or status about each communications partner for the duration of multiple requests. In contrast, a protocol which requires keeping of the internal state on the server is known as a stateful protocol.
Examples of stateless protocols include the Internet Protocol (IP) which is the foundation for the Internet, and the Hypertext Transfer Protocol (HTTP) which is the foundation of data communication for the World Wide Web.
[http://en.wikipedia.org/wiki/Stateless_protocol]

cmnprl.Transport-layer-security

name::
* McsEngl.cmnprl.Transport-layer-security@cptIt,
* McsEngl.conceptIt124.2,

cmnprl.TUNNELING-PROTOCOL

name::
* McsEngl.cmnprl.TUNNELING-PROTOCOL@cptIt,
* McsEngl.tunneling-protocol@cptIt,

_DESCRIPTION:
Computer networks use a tunneling protocol when one network protocol (the delivery protocol) encapsulates a different payload protocol. By using tunneling one can (for example) carry a payload over an incompatible delivery-network, or provide a secure path through an untrusted network.

Tunneling typically contrasts with a layered protocol model such as those of OSI or TCP/IP. The delivery protocol usually (but not always) operates at a higher level in the model than does the payload protocol, or at the same level.

To understand a particular protocol stack, network engineers must understand both the payload and delivery protocol sets.

As an example of network layer over network layer, Generic Routing Encapsulation (GRE), a protocol running over IP (IP Protocol Number 47), often serves to carry IP packets, with RFC 1918 private addresses, over the Internet using delivery packets with public IP addresses. In this case, the delivery and payload protocols are compatible, but the payload addresses are incompatible with those of the delivery network.

In contrast, an IP payload might believe it sees a data link layer delivery when it is carried inside the Layer 2 Tunneling Protocol (L2TP), which appears to the payload mechanism as a protocol of the data link layer. L2TP, however, actually runs over the transport layer using User Datagram Protocol (UDP) over IP. The IP in the delivery protocol could run over any data-link protocol from IEEE 802.2 over IEEE 802.3 (i.e., standards-based Ethernet) to the Point-to-Point Protocol (PPP) over a dialup modem link.

Tunneling protocols may use data encryption to transport insecure payload protocols over a public network (such as the Internet), thereby providing VPN functionality. IPsec has an end-to-end Transport Mode, but can also operate in a tunneling mode through a trusted security gateway.
[http://en.wikipedia.org/wiki/Tunneling_protocol]

cmnprl.UDP

name::
* McsEngl.cmnprl.UDP@cptIt,
* McsEngl.conceptIt2012,
* McsEngl.UDP@cptIt,
* McsEngl.UDP-2012@cptIt,
* McsEngl.User-Datagram-Protocol@cptIt,

UDP is a protocol (used in internet) that sends independent packets of data, called datagrams from one computer to another with no guarantees about arrival. UDP is not connection-based like TCP.
[Java Tutorial]

UDP
The User Datagram Protocol, UDP for short, provides unguaranteed, connectionless transmission of data across an IP network. By contrast, TCP, provides reliable, connection-oriented transmission of data.
Both TCP and UDP split data into packets called datagrams. However TCP includes extra headers in the datagram to enable retransmission of lost packets and reassembly of packets into the correct order if they arrive out of order. UDP does not provide this. If a UDP packet is lost, it's lost. It will not be retransmitted. Similarly, packets appear in the receiving program in the order they were received, not necessarily in the order they were sent.
Given these disadvantages you may well wonder why anyone would prefer UDP to TCP. The answer is speed. UDP can be up to three times faster than TCP; and there are many applications for which reliable transmission of data is not nearly as important as speed. For example lost or out of order packets may appear as static in an audio or video feed, but the overall picture or sound could still be intelligible.
Telephone vs. snail mail analogy.
Protocols that use UDP include NFS, FSP, and TFTP.
[April 18, 1997 Copyright 1997 Elliotte Rusty Harold elharo@sunsite.unc.edu]

cmnprl.WebDAV

_CREATED: {2013-08-26}

name::
* McsEngl.cmnprl.WebDAV@cptIt,
* McsEngl.WebDAV@cptIt,
* McsEngl.web-distributing-authoring-and-versioning@cptIt,

_DESCRIPTION:
Web Distributed Authoring and Versioning (WebDAV) is an extension of the Hypertext Transfer Protocol (HTTP) that facilitates collaboration between users in editing and managing documents and files stored on World Wide Web servers. A working group of the Internet Engineering Task Force (IETF) defined WebDAV in RFC 4918.

The WebDAV protocol makes the Web a readable and writable medium.[1] It provides a framework for users to create, change and move documents on a server; typically a web server or web share. The most important features of the WebDAV protocol include the maintenance of properties about an author or modification date, namespace management, collections, and overwrite protection. Maintenance of properties includes such things as the creation, removal, and querying of file information. Namespace management deals with the ability to copy and move web pages within a server’s namespace. Collections deals with the creation, removal, and listing of various resources. Lastly, overwrite protection handles aspects related to locking of files.

The WebDAV working group concluded its work in March 2007, after the Internet Engineering Steering Group (IESG) accepted an incremental update to RFC 2518. Other extensions left unfinished at that time, such as the BIND method, have been finished by their individual authors, independent of the formal working group.

As of 2013, many modern operating systems provide built-in client-side support for WebDAV.
[http://en.wikipedia.org/wiki/WebDAV]

netIt'receiver

name::
* McsEngl.netIt'receiver@cptIt,

netIt'speed

name::
* McsEngl.netIt'speed@cptIt,

netIt'signal

name::
* McsEngl.netIt'signal@cptIt,
* McsEngl.net'information@cptIt,
* McsEngl.net'signal@cptIt,
* McsEngl.netIt'information@cptIt,

netIt'technology#cptIt244#

name::
* McsEngl.netIt'technology@cptIt,

netIt'transmitter

name::
* McsEngl.netIt'transmitter@cptIt,

netIt'GENERIC

_GENERIC:
* information-network#cptCore624.4#

SPECIFIC

* netIt.specific,

_SPECIFIC:
* broadcasting-network#cptItsoft50#
* mobilephone-network#cptItsoft292#
* network.computer#cptIt21#
* satelite-network#cptItsoft126#
* telephone-network#cptItsoft125#
* visible-light-system##

_SPECIFIC:
* A network
* access network
* access switching network
* active network
* active optical network
* active two-terminal network
* all-pass network
* ambassadorial radio network
* analog telephone network
* asynchronous network
* automatic network
* B network
* backbone network
* balancing network
* bluetooth network
* branching network
* bridge network
* broadband cable network
* broadband distribution network
* broadband network
* broadcasting network
* Brune network
* building-out network
* bus network
* C network
* cable distribution network
* campus area network
* cascade network
* cellular network
* cellular radio network
* central computer network
* circuit switched data network
* circuit switched network
* circuit switching network
* city data network
* closed user network
* code network
* common carrier network
* communication lines network
* communication network
* communications network
* compensating network
* compromise network
* computer network
* connection network
* core network
* corporate network
* correcting network
* corrective network
* coupling network
* crossover network
* customer network
* D network
* data communication network
* data network
* data packet-switched network
* data transmission network
* datex network
* decision-making network
* decode network
* decoder network
* dedicated network
* dedicated radio network
* delta network
* democratic network
* despotic network
* destination network
* dialing network
* differentiating network
* diffusion network
* digital local exchange network
* digital network
* digital switching network
* direct-call network
* distributed network
* distribution network
* district network
* dual two-terminal network
* E network
* Early equivalent network
* electric network
* enterprise network
* equalizing network
* equivalent network
* equivalent T-network
* equivalent thermal network
* exchange access network
* external plant network
* factory network
* feedback network
* fixed network
* fixed-lines network
* four-pole network
* four-port network
* four-terminal network
* fourpole network
* function network
* glass fiber network
* global area network
* grid network
* GSM network
* heterogeneous network
* hierarchical network
* high speed local area network
* high speed network
* home network
* homogeneous network
* Hoyt balancing network
* hybrid network
* in-house network
* information network
* integrated digital network
* integrating network
* intelligent network
* interactive network
* intercapital network
* interlocked network
* intermeshed network
* interstage network
* ladder network
* LC network
* leased-circuit data network
* line network
* line-balancing network
* line-type network
* linear network
* linear two-terminal network
* local area network
* local communication network
* local exchange network
* local network
* logical network
* long distance network
* long-distance network
* long-haul network
* long-range network
* loss-free network
* manual network
* meshed network
* mesochronous network
* metropolitan area network
* metropolitan network
* microwave network
* microwave radio network
* military network
* minimum-phase network
* mixed network
* mobile telephony network
* mop-up network
* multi-cell network
* multi-domain network
* multidomain network
* multifunction network
* multipoint network
* multipurpose network
* multisection RC network
* multiservice network
* national network
* negative feedback network
* neural network
* neutralization network
* non-hierarchical network
* official network
* open network
* optical access network
* optical distribution network
* optical network
* optical transport network
* outside plant network
* overlay network
* packet radio network
* packet switched data network
* packet-switched network
* pager network
* parity network
* participative network
* passive network
* passive optical network
* passive two-terminal network
* path control network
* PC network
* peer to peer network
* photonic network
* pi network
* plesiochronous network
* powerline network
* private branch network
* private network
* PTT network
* public data network
* public network
* public switched network
* pulse-forming network
* radial network
* radio access network
* radio communications network
* radio network
* radio relay network
* radiolink network
* RC network
* reactive four-terminal network
* reactive two-terminal network
* reciprocal network
* recurrent network
* resistance network
* ring network
* ring-structure network
* ring-type network
* RL network
* RLC network
* RLCM network
* sales network
* SDH network
* segmented network
* self-healing network
* signal network
* simulation network
* sine-function network
* single frequency network
* single-cell network
* single-channel radio network
* single-service network
* single-stage switching network
* special balancing network
* special data network
* special services radio network
* star network
* star-shaped network
* star-type network
* storage area network
* store-and-forward network
* subscriber network
* switched data network
* switched network
* switched telephone network
* switching network
* synchronous network
* synchronous optical network
* T network
* telecom network
* telecommunications network
* telecontrol network
* telephone network
* teleprinter network
* telesupervision network
* television network
* telex network
* terminal network
* Tetra network
* text and data network
* text network
* three-phase network
* three-pole network
* time switching network
* toll network
* toll transmission network
* transit network
* transmitter feeding network
* transport network
* transputer network
* tree-shaped network
* trunk network
* trunking network
* TV network
* twin-T network
* two-port network
* two-terminal network
* two-terminal pair network
* UMTS network
* universal network
* user network
* UUCP network
* value added network
* virtual network
* virtual private network
* wide area network
* wide-area network
* wideband cable network
* wideband network
* wireless network
* wireline network
* wye network
* Y network
[http://rimas.woxikon.es/en/distributive%20network]

netIt.SPECIFIC-DIVISION.node-connection

name::
* McsEngl.netIt.SPECIFIC-DIVISION.node-connection@cptIt,

_SPECIFIC:
* many-to-many-network##
* one-to-one-network##
* one-to-many-network##

netIt.SPECIFIC-DIVISION.node-type

name::
* McsEngl.netIt.SPECIFIC-DIVISION.node-type@cptIt,

_SPECIFIC:
* computer-network#cptIt21#
* mobilephone-network#cptItsoft292#
* satelite-network#cptItsoft126#
* telephone-network#cptItsoft125#

netIt.SPECIFIC-DIVISION.speed

name::
* McsEngl.netIt.SPECIFIC-DIVISION.speed@cptIt,

_SPECIFIC:
* high-performance-network##

netIt.rooting.BROADCASTING

NAME

name::
* McsEngl.netIt.rooting.BROADCASTING@cptIt,
* McsEngl.conceptIt50,
* McsEngl.broadcasting-network/comm-channel@cptIt,
* McsEngl.broadcasting'network@cptIt50,
* McsElln.ΔΙΚΤΥΟ-ΑΚΡΟΑΣΗΣ@cptIt,

DEFINITION

ΤΟ ΤΗΛΕΟΠΤΙΚΟ ΔΙΚΤΥΟ ΕΙΝΑΙ ΠΑΡΑΔΕΙΓΜΑ ΤΕΤΟΙΟΥ ΔΙΚΤΥΟΥ ΟΠΟΥ ΟΙ ΤΕΡΜΑΤΙΚΟΙ ΣΤΑΘΜΟΙ, ΔΗΛΑΔΗ ΟΙ ΤΗΛΕΟΡΑΣΕΙΣ ΜΑΣ ΛΑΜΒΑΝΟΥΝ ΟΛΕΣ ΤΟ ΙΔΙΟ ΣΗΜΑ. ΚΥΡΙΑ ΧΑΡΑΚΤΗΡΙΣΤΙΚΑ ΤΩΝ ΔΙΚΤΥΩΝ ΑΚΡΟΑΣΗΣ ΕΙΝΑΙ:
-ΔΕΝ ΥΠΑΡΧΟΥΝ ΚΟΜΒΟΙ ΜΕΤΑΓΩΓΗΣ (SWITCHING)
-ΜΗΝΥΜΑ ΠΟΥ ΕΚΠΕΜΠΕΙ ΕΝΑΣ ΣΤΑΘΜΟΣ ΛΑΜΒΑΝΕΤΑΙ ΣΥΝΗΘΩΣ ΑΠΟ ΟΛΟΥΣ.
-ΥΠΑΡΞΗ ΕΙΔΙΚΩΝ ΤΕΧΝΙΚΩΝ ΕΛΕΓΧΟΥ ΠΡΟΣΠΕΛΑΣΗΣ ΤΩΝ ΜΗΝΥΜΑΤΩΝ ΚΑΘΩΣ ΟΛΟΙ ΟΙ ΣΤΑΘΜΟΙ ΜΟΙΡΑΖΟΝΤΑΙ ΤΟ ΜΕΣΟ ΕΠΙΚΟΙΝΩΝΙΑΣ.

GENERIC

_GENERIC:
* network.computer#cptIt21#
* network.information#cptCore624.4#

channel

name::
* McsEngl.conceptCore50.1,

_GENERIC:
* comm-channel#cptItsoft168#

SPECIFIC

Specific_concepts (level 3) =

_SPECIFIC:
* PACKET-RADIO#cptIt310#
* ΔΟΡΥΦΟΡΙΚΑ#cptIt126#
* ΤΟΠΙΚΑ#cptItsoft1004#

netIt.channel's-medium.LiFi (lifi)

_CREATED: {2013-12-30}

name::
* McsEngl.netIt.channel's-medium.LiFi (lifi)@cptIt,
* McsEngl.LiFi@cptIt,
* McsEngl.light-fidelity@cptIt,

_DESCRIPTION:
Li-Fi , or light fidelity, refers to 5G[1] visible light communication systems using light from light-emitting diodes as a medium to deliver networked, mobile, high-speed communication in a similar manner as Wi-Fi. Li-Fi can be used to off-load data from existing Wi-Fi networks to provide capacity for the greater downlink demand as complementary to the existing wireless or wired network infrastructure. Li-Fi could lead to everything electronic being connected to the internet with the lights on the electronics being used as internet access points.[2] The Li-Fi market is projected to be worth over $6 billion per year by 2018.[3]

Visible light communications (VLC) signals work by switching bulbs on and off incredibly quickly – too quickly to be noticed by the human eye. Although Li-Fi bulbs would have to be kept on to transmit data, the bulbs could be dimmed to the point that they were not visible to humans and yet still functional.[4] The light waves cannot penetrate walls which makes a much shorter range, though more secure from hacking, relative to Wi-Fi.[5][6] Direct line of sight isn't necessary for Li-Fi to transmit signal and light reflected off of the walls can achieve 70 Mbps.[7]

Li-Fi has the advantage of being able to be used in electromagnetic sensitive areas such as in aircraft cabins, hospitals and nuclear power plants[citation needed] without causing electromagnetic interference.[8][6] Both Wi-Fi and Li-Fi transmit data over the electromagnetic spectrum, but whereas Wi-Fi utilises radio waves, Li-Fi uses visible light. While the US Federal Communications Commission has warned of a potential spectrum crisis because Wi-Fi is close to full capacity, Li-Fi has almost no limitations on capacity.[9] The visible light spectrum is 10,000 times larger than the entire radio frequency spectrum.[10] Researchers have reached data rates of over 10 Gbps, which is more than 250 times faster than superfast broadband.[11][12] Li-Fi is expected to be ten times cheaper than Wi-Fi.[13] Short range, low reliability and high installation costs are the potential drawbacks.[14]

The first Li-Fi smartphone prototype will be presented at the Consumer Electronics Show in Las Vegas from January 7th-10th in 2014. The phone uses SunPartner's Wysips CONNECT, a technique that converts light waves into usable energy, making the phone capable of receiving and decoding signals without drawing on its battery.[15]
[http://en.wikipedia.org/wiki/Li-Fi]

lifi'Resource

name::
* McsEngl.lifi'Resource@cptIt,

_ADDRESS.WPG:
* http://www.nooz.gr/tech/li-fi-kai-blockchain-sti-mobile-world-congress,

netIt.channel's-medium.VISIBLE-LIGHT

_CREATED: {2013-12-30}

name::
* McsEngl.netIt.channel's-medium.VISIBLE-LIGHT@cptIt,
* McsEngl.vlc-system@cptIt,
* McsEngl.visible-light-communication-system@cptIt,

_DESCRIPTION:
Visible light communication (VLC) is a data communications medium using visible light between 400 and 800 THz (780–375 nm). Using visible light is less dangerous for high-power applications because humans can perceive it and act to protect their eyes from damage.

The technology uses fluorescent lamps (ordinary lamps, not special communications devices) to transmit signals at 10 kbit/s, or LEDs for up to 500 Mbit/s. Low rate[vague] data transmissions at 1 and 2 kilometres (0.6 and 1.2 mi) were demonstrated.[1][2] RONJA achieves full Ethernet speed (10 Mbit/s) over the same distance thanks to larger optics and more powerful LEDs.

Specially designed electronic devices generally containing a photodiode receive signals from such light sources,[1] although in some cases a cell phone camera or a digital camera will be sufficient.[3] The image sensor used in these devices is in fact an array of photodiodes (pixels) and in some applications its use may be preferred over a single photodiode. Such a sensor may provide either multi-channel communication (down to 1 pixel = 1 channel) or a spatial awareness of multiple light sources.[1]

VLC can be used as a communications medium for ubiquitous computing, because light-producing devices (such as indoor/outdoor lamps, TVs, traffic signs, commercial displays, car headlights/taillights, etc.[4]) are used everywhere.[3]
[http://en.wikipedia.org/wiki/Visible_light_communication]

netIt.channel's-medium.WIRE

name::
* McsEngl.netIt.channel's-medium.WIRE@cptIt,

netIt.channel's-medium.WIRELESS

_CREATED: {2008-09-10}

NAME

name::
* McsEngl.netIt.channel's-medium.WIRELESS@cptIt,
* McsEngl.conceptIt575,
* McsEngl.wireless-network@cptIt575,
* McsEngl.network.wireless@cptIt575,

DEFINITION

GENERIC

_GENERIC:
* network.computer#cptIt21#

channel#cptIt208#

SPECIFIC

_SPECIFIC:#ql:_GENERIC cptIt575#,
* NETWORK_CELLULAR#cptIt292#

RADIO TECHNOLOGY:
can reach through the walls, less security

MICROWAVES:
solve security, but its tricky mounting the tranceivers.

SPREAD SPECTRUM RADIO LANS:
interference.

IR, INFRARED NETWORKS:
a reliable mean to share data in a room.

WiMax

name::
* McsEngl.WiMax@cptIt575i,

Sprint started selling the new wireless broadband service called Xohm here last week. The service--based on WiMax, a standards-based technology that uses the 2.5GHz spectrum band--offers average download speeds between 2 megabits per second and 4 Mbps, a huge improvement over the 400 Kbps to 700 Kbps speeds offered using 3G cellular technology.
[http://news.cnet.com/8301-1035_3-10061520-94.html?tag=newsLeadStoriesArea.0] 2008-10-09

O3B-NETWORK

September 9, 2008 2:58 PM PDT
Google-backed project aims to give 3 billion more people Net access
Posted by Stephen Shankland

Google, Liberty Global, and HSBC are backing a start-up called O3b Networks named for its ambition to bring Internet access to the "other 3 billion" people who lack it today.

The effort has begun initial production of 16 low-cost satellites that collectively will provide an Internet backbone to places lacking high-speed networking cable, including emerging markets in Asia, Latin America, Africa, and the Middle East, O3b said. The satellites will link with ground stations such as cell towers or WiMax stations that actually reach the customers.

"The O3b Networks system will completely change the economics of telecommunications infrastructure in the world's fastest-growing markets for communications services," O3b said in a statement Tuesday.

The service should become active in 2010, the company said, and more satellites are a future option.

Google has aggressively pushed for more widespread Internet access, including municipal Wi-Fi and other wireless networking, which the company believes will increase its user base and its engagement with online services. That of course also could help sustain growth in Google's ad business.

"O3B's model empowers local entrepreneurs and companies to deliver Internet and mobile services to those in currently under served or remote locations at speeds necessary to power rich web based applications," said Larry Alder, product manager for Google's Alternative Access Team, in a statement.

WiFi

name::
* McsEngl.Wifi@cptIt575i,

802.11n (300Mbps)

802.11n Wi-Fi standard finally approved
by Dong Ngo

Finally, the Draft will now be taken off this logo.

As predicted last month, the IEEE has finally approved the 802.11n high-throughput wireless LAN standard.

Finalization of the new wireless networking standard--which is capable of delivering throughput speeds up to 300 megabits per second (and even higher)--took exactly seven years from the day it was conceived, or six years from the first draft version. The standard has been through a dozen or so draft versions.

News of the ratification broke via a blog post displaying an e-mail sent by Bruce Kraemer, longtime chairman of the 802.11n Task Group, to task group members. There has been no public announcement yet. Update 5:49 p.m. PDT: A press release has been issued.

(The 802.11n Task Group is part of the 802.11 Working Group, which oversees WLAN (wireless local-area network) standards. Task group members include the majority of Wi-Fi chipmakers, software developers, and equipment OEM vendors. Meru Networks, one of the members, posted the blog that broke the news.)

It's likely, however, that final approval of the standard will be publicly announced by September 15, the date when Meru Networks puts on a public Webcast to provide answers about the ratification.

According to the Wi-Fi Alliance, the group that tests and certifies wireless products to ensure their interoperability, all existing Wi-Fi Certified Draft N wireless products will still work with the final standard.

802.11n offers much higher speeds than the previous, already-ratified 802.11g, which caps at only 54Mbps. Due to the compelling higher speed, most wireless vendors haven been offering 802.11n-based (also known as Wireless-N) products during the past six years and calling them Draft N products. Now the Draft is no more.

According to the Wi-Fi Alliance, most, if not all, of the existing equipment can be upgraded to the final specification via a firmware update. Finally, all future wireless networking products will be compatible with today's products that have been Wi-Fi-certified.
[http://news.cnet.com/8301-1035_3-10351215-94.html?tag=newsEditorsPicksArea.0] 2009-09-12

802.11g (54Mbps)

name::
* McsEngl.802.11g (54Mbps)@cptIt,

passive-wifi

_DESCRIPTION:
Passive Wi-fi. A team of computer scientists and electrical engineers at the University of Washington has developed a way to generate Wi-fi transmissions that use 10,000 times less power than the current battery-draining standard. While this isn’t technically an increase in computing power, it is an exponential increase in connectivity, which will enable other types of advances. Dubbed one of the 10 breakthrough technologies of 2016 by MIT Technology Review, Passive Wi-fiwill not only save battery life, but enable a minimal-power Internet of Things, allow previously power-hungry devices to connect via Wi-fi for the first time, and potentially create entirely new modes of communication.
[https://www.weforum.org/agenda/2016/09/7-innovations-that-could-shape-the-future-of-computing]

netIt.hardware.BRIDGED

_CREATED: {2015-08-14}

name::
* McsEngl.netIt.hardware.BRIDGED@cptIt,
* McsEngl.bridged-network@cptIt,
* McsEngl.netIt.bridged@cptIt,
* McsEngl.network.bridged@cptIt,

_DESCRIPTION:
Network bridging is the action taken by network equipment to create an aggregate network from either two or more communication networks, or two or more network segments.[1] If one or more segments of the bridged network are wireless, it is known as wireless bridging. Bridging is distinct from routing, which allows multiple different networks to communicate independently while remaining separate.[2]

A network bridge is a network device that connects multiple network segments. In the OSI model, bridging is performed in the first two layers, below the network layer.[3]

There are four types of network bridging technologies: simple bridging, multiport bridging, learning or transparent bridging, and source route bridging.[4][5]
[https://en.wikipedia.org/wiki/Bridging_%28networking%29]

network-bridge#ql:network-bridge@cptIt#

netIt.node.MOBILEPHONE

NAME

name::
* McsEngl.netIt.node.MOBILEPHONE@cptIt,
* McsEngl.conceptIt292,
* McsEngl.cellular-phone-network@cptIt,
* McsEngl.cellular-network@cptIt292,
* McsEngl.cellularPhone'network@cptIt292,
* McsEngl.mobile-network@cptIt292,
* McsEngl.netIt.cellularphone@cptIt,

* McsEngl.netMbl@cptIt, {2016-03-01}
====== lagoGreek:
* McsElln.ΚΙΝΗΤΗ'ΤΗΛΕΦΩΝΙΑ@cptIt292,
* McsElln.ΦΟΡΗΤΗ-ΤΗΛΕΦΩΝΙΑ@cptIt,
* McsElln.ΚΙΝΗΤΗ-ΤΗΛΕΦΩΝΙΑ@cptIt,

DEFINITION

A cellular network is a radio network made up of a number of radio cells (or just cells) each served by at least one fixed-location transceiver known as a cell site or base station. These cells cover different land areas to provide radio coverage over a wider area than the area of one cell, so that a variable number of portable transceivers can be used in any one cell and moved through more than one cell during transmission.

Cellular networks offer a number of advantages over alternative solutions:
* increased capacity
* reduced power usage
* larger coverage area
* reduced interference from other signals

An example of a simple non-telephone cellular system is an old taxi driver's radio system where the taxi company has several transmitters based around a city that can communicate directly with each taxi.
[http://en.wikipedia.org/wiki/Mobile_network] 2009-04-23

netMbl'SERVICES

name::
* McsEngl.netMbl'SERVICES@cptIt,

- προώθηση κλήσεων
- φραγή κλήσεων,
- πληροφόρηση κόστους στην οθόνη κινητού.
- δυνατότητα συνδιάσκεψης
- ειδοποίηση εισερχόμενης κλήσης, ενώ μιλάει
- ενημέρωση του αριθμού του καλούντος συνδρομητη.
- μετάδοση και λήψη φαξ.
- μετάδοση και λήψη ψηφιακών δεδομένων.
- Voice mail. Ο καλών αφήνει μήνυμα που λαμβάνεται όταν είναι ελεύθερος ο καλούμενος.
[ΔΙΑΒΟΛΙΤΗΣ, Χ. "Κινητή Τηλεφωνία" TELECOM (Ιουν. 1994): 49]

netMbl'speed

name::
* McsEngl.netMbl'speed@cptIt,

netMbl'STANDARD#cptIt139#

name::
* McsEngl.netMbl'STANDARD@cptIt,

GSM {Global System Mobile}:

name::
* McsEngl.gsm@cptIt292i,

ευρωπαϊκο πρότυπο που διαδόθηκε παγκόσμια.

75 χώρες μέχρι τώρα είναι έτοιμες να θέσουν σε λειτουργία δίκτυο GSM.
[ΔΙΑΒΟΛΙΤΗΣ, Χ. "Κινητή Τηλεφωνία" TELECOM (Ιουν. 1994): 45]

ΕΝΙΑΙΑ ΚΑΛΥΨΗ:
Θα προσφέρεται πολύ σύντομα σε
- πολλές ευρωπαϊκές πόλεις,
- αυστραλία
- χονγκ κονγκ
- σιγκαπούρη
- Ν. Ζηλανδία
- αραβικά εμιράτα
- ινδία
- κορέα
- χώρες αφρικής
- χώρες Ν. αμερικής.
[ΔΙΑΒΟΛΙΤΗΣ, Χ. "Κινητή Τηλεφωνία" TELECOM (Ιουν. 1994): 45]

ΚΑΡΤΑ SIM {SUBSCRIBER IDENTIFICATION MODULE}:
Περιέχει όλα τα στοιχεία που απαιτούνται για τη σύνδεση ενός συνδρομητή με το δίκτυο, το βασικότερο απο τα οποία είναι ο αριθμός κλίσης του.
- Αποθηκεύει 100 τηλέφωνα.
- Μπορεί να τοποθετηθεί σε οποιαδήποτε συσκευή, δύνοντας δυνατότητα αλλαγής συσκευής χωρίς γραφειοκρατία. Χρήση συσκευής άλλου και χρέωσης δική του.
- χρήση PIN για ασφάλεια χρήσης της κάρτας του.
[ΔΙΑΒΟΛΙΤΗΣ, Χ. "Κινητή Τηλεφωνία" TELECOM (Ιουν. 1994): 45]

ΑΣΦΑΛΕΙΑ:
πλήρη διασφάλιση του απορρήτου καθώς η ομιλία μεταδίδεται κωδικοποιημένη, που ο κωδικός αλλάζει συνέχεια.
[ΔΙΑΒΟΛΙΤΗΣ, Χ. "Κινητή Τηλεφωνία" TELECOM (Ιουν. 1994): 45]

netMbl'ΕΠΙΤΥΧΙΕΣ

name::
* McsEngl.netMbl'ΕΠΙΤΥΧΙΕΣ@cptIt,

ΓΙΑ ΤΗΝ ΩΡΑ ΤΟΥΛΑΧΙΣΤΟΝ ΦΑΙΝΕΤΑΙ ΟΤΙ ΠΕΤΥΧΕ ΜΟΝΟΝ ΣΕ ΔΥΟ ΠΟΛΕΙΣ ΟΠΟΥ ΣΦΥΖΕΙ ΤΟ ΕΜΠΟΡΙΟ: ΧΟΝΓΚ ΚΟΝΓΚ ΚΑΙ ΣΙΓΚΑΠΟΥΡΗ.
[ΒΗΜΑ, 23 ΜΑΙΟ 1993, Δ41]

netMbl'ΣΤΑΘΜΟΙ ΑΝΑΜΕΤΑΔΟΣΗΣ

name::
* McsEngl.netMbl'ΣΤΑΘΜΟΙ ΑΝΑΜΕΤΑΔΟΣΗΣ@cptIt,

ΕΧΟΥΝ ΠΕΡΙΟΡΙΣΜΕΝΕΣ ΔΥΝΑΤΟΤΗΤΕΣ. 200 ΜΕΤΡΑ ΒΕΛΗΝΕΚΕΣ ΚΑΙ 6 ΚΛΗΣΕΙΣ ΤΑΥΤΟΧΡΟΝΩΣ.
[ΒΗΜΑ, 23 ΜΑΙΟ 1993, Δ41]

SPECIFIC

_SPECIFIC (space):

netMbl.ΕΛΛΑΔΑ: GSM system

name::
* McsEngl.netMbl.ΕΛΛΑΔΑ: GSM system@cptIt,

Αδειες πήραν 2 εταιρίες προς 29 δισ. δρχ. η μια.
Panafon S.A.
Stet Hellas Α.Ε.Β.Ε.
Προτάσεις για άδεια είχαν υποβάλει 30 εταιρίες.
[ΔΙΑΒΟΛΙΤΗΣ, Χ. "Κινητή Τηλεφωνία" TELECOM (Ιουν. 1994): 45]

ΣΥΣΚΕΥΕΣ:
μπορούν να χρησιμοποιηθούν και στα δύο δίκτυα της ελλάδας.
[ΔΙΑΒΟΛΙΤΗΣ, Χ. "Κινητή Τηλεφωνία" TELECOM (Ιουν. 1994): 45]

ΤΥΠΟΙ: 1) αυτοκινήτου 8W, 2) transportable (μεγεθος κασετοφώνου αυτοκινήτου 8W, 3) handheld 2W.
[ΔΙΑΒΟΛΙΤΗΣ, Χ. "Κινητή Τηλεφωνία" TELECOM (Ιουν. 1994): 46]

ΤΡΟΦΟΔΟΣΙΑ: επαναφορτιζόμενες μπαταρίες.

ΤΙΜΕΣ: GRD.125000-GRD.340000.
[ΔΙΑΒΟΛΙΤΗΣ, Χ. "Κινητή Τηλεφωνία" TELECOM (Ιουν. 1994): 47]

ΣΥΝΔΕΣΗ ΜΕ ΔΙΚΤΥΟ:
Stet: 126 Αττικη, 093-333333 πανελαδικά.
Panafon: 189 Αττική, 01-6643337 πανελαδικά
[ΔΙΑΒΟΛΙΤΗΣ, Χ. "Κινητή Τηλεφωνία" TELECOM (Ιουν. 1994): 47]

ΧΡΕΩΣΗ:
25000 εφάπαξ, 10000 στάνταρντ μηνιαίο τέλος και 47 δρχ 30 δευτ. σε ωρες αιχμής(7:00-22:00) και 47 τα 43 δευτ. ΣΥΝ 18% ΦΠΑ.
ΙΔΙΑ ΧΡΕΩΣΗ παντού μέσα στην ελλάδα.
ΔΙΕΘΝΩΣ: όσο ΟΤΕ σύν 33δρχ/30 δευτ, 24/30 μη αιχμή.
[ΔΙΑΒΟΛΙΤΗΣ, Χ. "Κινητή Τηλεφωνία" TELECOM (Ιουν. 1994): 48]

netMbl.ΛΟΝΔΙΝΟ

name::
* McsEngl.netMbl.ΛΟΝΔΙΝΟ@cptIt,

ΡΑΜΠΙΤ. ΠΟΥΛΗΣΕ 10.000 ΣΕ ΤΡΕΙΣ ΜΗΝΕΣ.
[ΒΗΜΑ, 23 ΜΑΙΟ 1993, Δ41]

netMbl.ΟΛΛΑΝΔΙΑ

name::
* McsEngl.netMbl.ΟΛΛΑΝΔΙΑ@cptIt,

ΑΝΑΛΟΓΟ ΣΥΣΤΗΜΑ ΛΕΙΤΟΥΡΓΕΙ ΕΔΩ ΚΑΙ ΕΞΙ ΜΗΝΕΣ, ΑΛΛΑ ΔΕΝ ΤΟ ΧΡΗΣΙΜΟΠΟΙΟΥΝ ΟΥΤΕ 10.000 ΣΥΝΔΡΟΜΗΤΕΣ.
[ΒΗΜΑ, 23 ΜΑΙΟ 1993, Δ41]

netMbl.ΠΑΡΙΣΙ

name::
* McsEngl.netMbl.ΠΑΡΙΣΙ@cptIt,

COMPANY: FRANCE TELECOM. ΠΙΣΤΕΥΟΥΝ ΟΤΙ ΜΕΧΡΙ ΤΕΛΗ 1994 ΘΑ ΠΟΥΛΗΘΟΥΝ 150.000 ΣΥΣΚΕΥΕΣ. ΘΕΩΡΗΤΙΚΑ ΧΡΕΙΑΖΟΝΤΑΙ 3000 ΑΝΑΜΕΤΑΔΟΤΕΣ, 2000 ΛΕΝΕ ΟΙ ΤΕΧΝΙΚΟΙ. ΤΟ ΚΟΣΤΟΣ ΕΦΤΑΣΕ 250 ΕΚΑΤ. ΦΡΑΓΚΑ.
[ΒΗΜΑ, 23 ΜΑΙΟ 1993, Δ41]

netMbl.5G

name::
* McsEngl.netMbl.5G@cptIt,
* McsEngl.5G@cptIt,

_DESCRIPTION:
5G (5th generation mobile networks or 5th generation wireless systems) denotes the next major phase of mobile telecommunications standards beyond the current 4G/IMT-Advanced standards. 5G has speeds beyond what the current 4G can offer.
The Next Generation Mobile Networks Alliance defines the following requirements for 5G networks:
Data rates of several tens of megabits per second should be supported for tens of thousands of users
1 gigabit per second to be offered simultaneously to many workers on the same office floor
Several hundreds of thousands of simultaneous connections to be supported for massive sensor deployments
Spectral efficiency should be significantly enhanced compared to 4G
Coverage should be improved
Signalling efficiency should be enhanced
Latency should be reduced significantly compared to LTE.[1]
The Next Generation Mobile Networks Alliance feels that 5G should be rolled out by 2020 to meet business and consumer demands.[2] In addition to providing simply faster speeds, they predict that 5G networks also will need to meet the needs of new use cases, such as the Internet of Things (network equipment in buildings or vehicles for web access) as well as broadcast-like services and lifeline communication in times of natural disaster.
Although updated standards that define capabilities beyond those defined in the current 4G standards are under consideration, those new capabilities have been grouped under the current ITU-T 4G standards.
[https://en.wikipedia.org/wiki/5G] {2016-03-01}

net5G'resource

name::
* McsEngl.net5G'resource@cptIt,

_ADDRESS.WPG:
* http://www.weforum.org/agenda/2016/02/are-you-ready-for-5g-internet,

netMbl.4G

name::
* McsEngl.netMbl.4G@cptIt,
* McsEngl.4G@cptIt,

_DESCRIPTION:
4G, short for fourth generation, is the fourth generation of mobile telecommunications technology, succeeding 3G. A 4G system must provide capabilities defined by ITU in IMT Advanced. Potential and current applications include amended mobile web access, IP telephony, gaming services, high-definition mobile TV, video conferencing, 3D television, and cloud computing.[citation needed]
Two 4G candidate systems are commercially deployed: the Mobile WiMAX standard (first used in South Korea in 2007), and the first-release Long Term Evolution (LTE) standard (in Oslo, Norway, and Stockholm, Sweden since 2009). It has however been debated if these first-release versions should be considered to be 4G or not, as discussed in the technical definition section below.[citation needed]
In the United States, Sprint (previously Clearwire) has deployed Mobile WiMAX networks since 2008, while MetroPCS became the first operator to offer LTE service in 2010. USB wireless modems were among the first devices able to access these networks, with WiMAX smartphones becoming available during 2010, and LTE smartphones arriving in 2011. 3G and 4G equipment made for other continents are not always compatible because of different frequency bands. Mobile WiMAX is not available for the European market as of April 2012.[citation needed]
[https://en.wikipedia.org/wiki/3G]

netMbl.3G

name::
* McsEngl.netMbl.3G@cptIt,
* McsEngl.3G@cptIt,

_DESCRIPTION:
3G, short form of third generation, is the third generation of mobile telecommunications technology.[1] This is based on a set of standards used for mobile devices and mobile telecommunications use services and networks that comply with the International Mobile Telecommunications-2000 (IMT-2000) specifications by the International Telecommunication Union.[2] 3G finds application in wireless voice telephony, mobile Internet access, fixed wireless Internet access, video calls and mobile TV.
3G telecommunication networks support services that provide an information transfer rate of at least 200 kbit/s. Later 3G releases, often denoted 3.5G and 3.75G, also provide mobile broadband access of several Mbit/s to smartphones and mobile modems in laptop computers. This ensures it can be applied to wireless voice telephony, mobile Internet access, fixed wireless Internet access, video calls and mobile TV technologies.
A new generation of cellular standards has appeared approximately every tenth year since 1G systems were introduced in 1981/1982. Each generation is characterized by new frequency bands, higher data rates and non–backward-compatible transmission technology. The first 3G networks were introduced in 1998 and fourth generation "4G" networks in 2008.
[https://en.wikipedia.org/wiki/3G]

netMbl.2G

name::
* McsEngl.netMbl.2G@cptIt,
* McsEngl.2G@cptIt,

_DESCRIPTION:
2G (or 2-G) is short for second-generation wireless telephone technology. Second generation 2G cellular telecom networks were commercially launched on the GSM standard in Finland by Radiolinja (now part of Elisa Oyj) in 1991.[1] Three primary benefits of 2G networks over their predecessors were that phone conversations were digitally encrypted; 2G systems were significantly more efficient on the spectrum allowing for far greater mobile phone penetration levels; and 2G introduced data services for mobile, starting with SMS text messages. 2G technologies enabled the various mobile phone networks to provide the services such as text messages, picture messages and MMS (multi media messages). All text messages sent over 2G are digitally encrypted, allowing for the transfer of data in such a way that only the intended receiver can receive and read it.
After 2G was launched, the previous mobile telephone systems were retroactively dubbed 1G. While radio signals on 1G networks are analog, radio signals on 2G networks are digital. Both systems use digital signaling to connect the radio towers (which listen to the handsets) to the rest of the telephone system.
2G has been superseded by newer technologies such as 2.5G, 2.75G, 3G, and 4G; however, 2G networks are still used in many parts of the world.
[https://en.wikipedia.org/wiki/2G]

netMbl.1G

name::
* McsEngl.netMbl.1G@cptIt,
* McsEngl.1G@cptIt,

_DESCRIPTION:
1G (or 1-G) refers to the first generation of wireless telephone technology (mobile telecommunications). These are the analog telecommunications standards that were introduced in the 1980s and continued until being replaced by 2G digital telecommunications. The main difference between the two mobile telephone systems (1G and 2G), is that the radio signals used by 1G networks are analog, while 2G networks are digital.
Although both systems use digital signaling to connect the radio towers (which listen to the handsets) to the rest of the telephone system, the voice itself during a call is encoded to digital signals in 2G whereas 1G is only modulated to higher frequency, typically 150 MHz and up. The inherent advantages of digital technology over that of analog meant that 2G networks eventually replaced them almost everywhere.
One such standard is NMT (Nordic Mobile Telephone), used in Nordic countries, Switzerland, the Netherlands, Eastern Europe and Russia. Others include AMPS (Advanced Mobile Phone System) used in North America and Australia,[1] TACS (Total Access Communications System) in the United Kingdom, C-450 in West Germany, Portugal and South Africa, Radiocom 2000[2] in France, TMA in Spain, and RTMI in Italy. In Japan there were multiple systems. Three standards, TZ-801, TZ-802, and TZ-803 were developed by NTT (Nippon Telegraph and Telephone Corporation[3]), while a competing system operated by DDI (Daini Denden Planning, Inc.[3]) used the JTACS (Japan Total Access Communications System) standard.
The antecedent to 1G technology is the mobile radio telephone, or 0G.
[https://en.wikipedia.org/wiki/1G]

netMbl.EVOLUTING#cptCore546.171#

name::
* McsEngl.netMbl.EVOLUTING@cptIt,

{time.1993, 1η Ιουλίου}:
=== ΕΛΛΑΔΑ:
Εναρξη λειτουργίας κινητής τηλεφωνίας.

netIt.node.SATELLITE

NAME

name::
* McsEngl.netIt.node.SATELLITE@cptIt,
* McsEngl.conceptIt126,
* McsEngl.netIt.satellite@cptIt,
* McsEngl.network.satellite@cptIt126,
* McsEngl.satellite-network@cptIt126,
====== lagoGreek:
* McsElln.ΔΟΡΥΦΟΡΙΚΗ-ΖΕΥΞΗ@cptIt,
* McsElln.ΔΟΡΥΦΟΡΙΚΟ-ΔΙΚΤΥΟ@cptIt,
* McsElln.ΔΙΚΤΥΟ.ΔΟΡΥΦΟΡΙΚΟ@cptIt126,

DEFINITION

_DESCRIPTION:
Satellite-network is a-network that connects satellites.
[hmnSngo.2015-08-14]

ΔΟΡΥΦΟΡΙΚΟΙ.ΣΤΑΘΜΟΙ.ΕΔΑΦΟΥΣ
* ΕΛΛΗΝΙΚΗ ΝΟΜΟΘΕΣΙΑ
"ΟΙ ΙΔΙΩΤΕΣ ΘΑ ΜΠΟΡΟΥΝ ΣΕ ΛΙΓΟ ΚΑΙΡΟ ΝΑ ΕΓΚΑΘΙΣΤΟΥΝ ΚΑΙ ΝΑ ΘΕΤΟΥΝ ΣΕ ΛΕΙΤΟΥΡΓΙΑ ΔΟΡΥΦΟΡΙΚΟΥΣ ΣΤΑΘΜΟΥΣ ΕΔΑΦΟΥΣ, ΜΕΣΩ ΤΩΝ ΟΠΟΙΩΝ ΘΑ ΜΠΟΡΟΥΝ ΝΑ ΑΝΑΜΕΤΑΔΙΔΟΥΝ ΤΗΛΕΟΠΤΙΚΑ ΠΡΟΓΡΑΜΑΤΑ ή ΝΑ ΔΙΕΥΚΟΛΥΝΟΥΝ ΤΗΝ ΠΡΑΓΜΑΤΟΠΟΙΗΣΗ ΔΙΕΘΝΩΝ ΤΗΛΕΠΙΚΟΙΝΩΝΙΩΝ"
[ΕΛΕΥΘΕΡΟΤΥΠΙΑ, 18 ΜΑΙΟ 1993, 22]
* ΣΤΑΘΜΟΥΣ ΟΤΕ
ΕΧΕΙ ΣΤΙΣ ΘΕΡΜΟΠΥΛΕΣ ΚΑΙ ΣΤΗ ΝΕΜΕΑ.
[ΕΛΕΥΘΕΡΟΤΥΠΙΑ, 18 ΜΑΙΟ 1993, 22]

GENERIC

_GENERIC:
* network.information#cptCore624.4#
* broadcasting network#cptItsoft50#

ΕΤΑΙΡΙΕΣ

Alascom, AT&T, Comsat, Contel ASC, GTE Spacenet Corp.

ΣΥΧΝΟΤΗΤΕΣ

ΟΙ ΣΗΜΕΡΙΝΟΙ ΔΟΡΥΦΟΡΟΙ ΧΡΗΣΙΜΟΠΟΙΟΥΝ ΤΙΣ ΜΠΑΝΤΕΣ ΤΩΝ 4 ΚΑΙ 6 GHz (C band) ΓΙΑ ΤΑ ΚΑΤΕΡΧΟΜΕΝΑ ΚΑΙ ΑΝΕΡΧΟΜΕΝΑ ΣΗΜΑΤΑ ΑΝΤΙΣΤΟΙΧΑ.
ΧΡΗΣΙΜΟΠΟΙΟΥΝ ΕΠΙΣΗΣ ΤΙΣ ΣΥΧΝΟΤΗΤΕΣ Ku-band 11/14 GHz,
K-band 30/20 GHz

ΤΑΧΥΤΗΤΕΣ

Απο 19,2 kbps μέχρι πολλαπλάσιες του Τ1.

ΤΡΟΧΙΑ

Οι δορυφόροι είναι σε ΓΕΩΣΥΓΧΡΟΝΗ ΤΡΟΧΙΑ οπότε απο το έδαφος φαίνονται ακίνητοι. Υψος 35.810 χλμ ή 23.300 μιλια.
EXOYN TAXYTHTA 11040 ΧΛΜ/ΩΡΑ.
ΚΑΘΕ ΔΟΡΥΦΟΡΟΣ ΚΑΛΥΠΤΕΙ ΓΩΝΙΑ 120° ΕΤΣΙ ΜΕ 3 ΤΕΤΟΙΟΥΣ ΔΟΡΥΦΟΡΟΥΣ ΜΠΟΡΕΙ ΝΑ ΚΑΛΥΦΤΕΙ ΟΛΗ Η ΓΗ.

ΠΛΕΟΝΕΚΤΗΜΑΤΑ

1. Κάλυψη ευρείας περιοχής.
2. Σε αποστάσεις πάνω απο 500 μίλια, 800 χιλιόμετρα, είναι ανταγωνιστικές των μισθωμένων γραμμών.
3. Ευκολία εγκατάστασης.

ΜΕΙΟΝΕΚΤΗΜΑΤΑ

1. Σχετικα μικρή ταχύτητα
2. Satellite delay

SPECIFIC

GLOBALSTAR

ICO GLOBAL

INMARSAT

Ο τρίτος δορυφόρος της σειράς Inmarsat 3 εκτοξεύτηκε επιτυχώς από το ακρωτήριο Canaveral στη Φλόριδα και επιτρέπει πλέον στην Inmarsat να παρέχει δορυφορικές υπηρεσίες σε ποσοστό μεγαλύτερο από 95% της γήινης μάζας . Αυτό σημαίνει ότι οι φορητές συσκευές μετάδοσης φωνής και μεταφοράς δεδομένων είναι πλέον διαθέσιμες στο μεγαλύτερο μέρος του παγκόσμιου πληθυσμού.
Οι δοκιμές του νέου δορυφόρου θα διαρκέσουν μέχρι τις 25 Ιανουαρίου, οπότε και θα είναι έτοιμος να παρέχει τις υπηρεσίες του. Η εταιρεία Inmarsat πρόκειται να εκτοξεύσει άλλους δύο δορυφόρους μέσα στη χρονιά χρησιμοποιώντας σας φορείς τους Ευρωπαϊκούς πυραύλους Ariane IV.
[http://www.hol.gr/cgi-bin/handle/news/read.phtml?number=3646&subcat=ΤΗΛΕΠΙΚΟΙΝΩΝΙΕΣ&show=week&cur=1, 1997jan03]

INTELSAT

Ariane rocket launches new series INTELSAT satellite
KOUROU, French Guiana (Feb 28, 1997 9:37 p.m. EST) - Western Europe's 94th Ariane rocket blasted off from equatorial French Guiana on Friday and placed into orbit the first of a new series of satellites for INTELSAT.

IRIDIUM (Motorola)

EU says clears creation of Motorola's Iridium system

Copyright © 1996 Nando.net
Copyright © 1996 Reuter Information Service
BRUSSELS (Dec 19, 1996 10:24 a.m. EST) - The European Commission said Thursday it cleared the creation of Motorola Inc.'s Iridium satellite communications system.

The company, whose participants also include Italy's Stet and Germany's Vebacom, will provide from the last quarter of 1998 global digital wireless communications services that will include mobile telephone, paging and basic data services via portable hand-held terminals.

The Commission said it cleared the deal because Iridium would not restrict competition in Europe and that it took into consideration the fact that the system's members would have been unable to carry the investment separately.

"Indeed, none of the strategic investors could be reasonably expected to separately assume the very high level of investment required and the very high risk of technical and commercial failure associated with such a new system," the Commission said in a statement.

It estimated the investment at nearly $5 billion.

The Commission said, however, that given the "very strong position of Stet in Italy as regards the provision of satellite services," it had insisted that the Iridium system not prevent companies from having fair access to Stet's other telecommunications networks.

The Commission also reserved the right to reopen the case if Iridium obtained a dominant position in the market for satellite personal communications services.

It agreed that Iridium could suggest policies for charges for services provided by the participants to each other, but stressed that the members should be free to set their own tariffs to the end user.

The entire constellation of 66 satellites, plus six spares, is scheduled to be in place by April 1998, with Iridium service slated to begin in September 1998.

Then, there's the complex matter of controlling the satellites so they hand off calls as users move out of one satellite range and into another.

For that task, 13 million lines of software code will serve as a traffic cop in the sky. "That is an extremely large amount of code," Jost said.

And the software is just one side of the Iridium equation. Hardware costs, such as ground stations, satellites and computers, are expected to drive the total cost of Iridium to $5 billion by the time the first Iridium call is made.
[http://www2.nando.net/newsroom/ntn/info/010597/info6_9544.html, 1997jan05]

Οι πρώτοι δορυφόροι εκτοξεύονται το 1997, ενώ ήδη από φέτος το μάιο βρίσκονται σε τροχιά όλοι οι προβλεπόμενοι δορυφόροι.
[RAM, 1998dec, 63]

SKYBRIDGE

80 δορυφόροι χαμηλής τροχιάς, έναρξη το 2002.
[RAM, 1998dec, 63]

TELEDISK

www.teledisk.com. Craig McCaw of McCaw Cellular and Bill Gates of Microsoft.
Η έναρξη λειτουργίας εκτιμάται ότι θα γίνει περίπου το 2001.
[ΒΗΜΑ 1997ιουν29]

288 δορυφόροι χαμηλής τροχιάς, έναρξη το 2003.
[RAM, 1998dec, 63]

netIt.node.TELEPHONE

NAME

name::
* McsEngl.netIt.node.TELEPHONE@cptIt,
* McsEngl.conceptIt125,
* McsEngl.netIt.phone@cptIt,
* McsEngl.netIt.telephone@cptIt,
* McsEngl.network.telephone@cptIt125,
* McsEngl.telephone-network@cptIt125,
====== lagoGreek:
* McsElln.δίκτυο.τηλεφωνικό@cptIt125,
* McsElln.ΤΗΛΕΦΩΝΙΚΟ-ΔΙΚΤΥΟ@cptIt,
* McsElln.ΤΗΛΕΦΩΝΙΚΗ-ΓΡΑΜΜΗ@cptIt,

DEFINITION

_DESCRIPTION:
A telephone network is a telecommunications network used for telephone calls between two or more parties.

There are a number of different types of telephone network:

A landline network where the telephones must be directly wired into a single telephone exchange. This is known as the public switched telephone network or PSTN.
A wireless network where the telephones are mobile and can move around anywhere within the coverage area.
A private network where a closed group of telephones are connected primarily to each other and use a gateway to reach the outside world. This is usually used inside companies and call centres and is called a private branch exchange (PBX).

Public telephone operators (PTOs) own and build networks of the first two types and provide services to the public under license from the national government. Virtual Network Operators (VNOs) lease capacity wholesale from the PTOs and sell on telephony service to the public directly.
[https://en.wikipedia.org/wiki/Telephone_network]

GENERIC

_GENERIC:
* network.information#cptCore624.4#

ATTRIBUTE

_ATTRIBUTE:
MODEM#cptIt66#

ΧΑΡΑΚΤΗΡΗΣΤΙΚΑ:
ΩΜΙΚΗ ΑΝΤΙΣΤΑΣΗ
ΕΠΑΓΩΓΙΚΗ ΚΑΙ ΧΩΡΗΤΙΚΗ ΑΝΤΙΣΤΑΣΗ (REACTANCE)
ΣΥΝΘΕΤΗ ΑΝΤΙΣΤΑΣΗ (IMPEDANCE)
ΠΡΟΣΑΡΜΟΓΗ ΣΥΝΘΕΤΗΣ ΑΝΤΙΣΤΑΣΗΣ

ΠΑΡΑΜΕΤΡΟΙ ΤΗΛΕΦΩΝΙΚΩΝ ΓΡΑΜΜΩΝ:
ΕΞΑΣΘΕΝΗΣΗ
ΠΑΡΑΜΟΡΦΩΣΗ ΠΛΑΤΟΥΣ
ΠΑΡΑΜΟΡΦΩΣΗ ΦΑΣΗΣ (group DELAY)
ΛΟΓΟΣ ΣΗΜΑΤΟΣ ΠΡΟΣ ΘΟΡΥΒΟ
ΑΡΜΟΝΙΚΕΣ ΠΑΡΑΜΟΡΦΩΣΕΙΣ
ΑΣΤΑΘΕΙΑ ΦΑΣΗΣ (PHASE JITTER)
ΟΛΙΣΘΗΣΗ ΣΥΧΝΟΤΗΤΑΣ
ΚΡΟΥΣΤΙΚΕΣ ΠΑΡΑΜΟΡΦΩΣΕΙΣ

ΔΙΟΡΘΩΤΙΚΕΣ ΤΕΧΝΙΚΕΣ:
ΕΝΙΣΧΥΤΕΣ
ΠΡΟΣΑΡΜΟΣΤΕΣ
ΦΙΛΤΡΑ
ΙΣΟΣΤΑΘΜΙΣΤΕΣ (EQUALIZER)
ΣΥΣΚΕΥΕΣ ΑΠΑΛΟΙΦΗΣ ΗΧΟΥΣ


ΧΡΗΣΕΙΣ

SPECIFIC

Specific_concepts (level 3) =

ΕΠΙΛΕΓΟΜΕΝΕΣ ΓΡΑΜΜΕΣ (dial-up),
 ΠΑΛΜΙΚΗ ΕΠΙΛΟΓΗ
 ΠΟΛΥΣΥΧΝΙΚΗ ΕΠΙΛΟΓΗ/DTMF

ΜΙΣΘΩΜΕΝΕΣ ΓΡΑΜΜΕΣ (leased line),
 BASEBAND
 VOICEBAND
 ΤΥΠΟΠΟΙΗΣΕΙΣ CCITT
   M.1020
   M.1025
   M.1030
   M.1040

AGGREGATE#cptCore88#

"Η ΣΗΜΑΝΤΙΚΟΤΕΡΗ ΚΑΙ ΠΛΕΟΝ ΕΚΤΕΤΑΜΕΝΗ ΤΗΛΕΠΙΚΟΙΝΩΝΙΑΚΗ ΥΠΟΔΟΜΗ ΣΗΜΕΡΑ ΕΙΝΑΙ ΤΟ ΤΗΛΕΦΩΝΙΚΟ ΔΙΚΤΥΟ"
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 94#cptResource223]

channel.INTERNET

name::
* McsEngl.channel.INTERNET@cptIt,

channel.LANDLINE

name::
* McsEngl.channel.LANDLINE@cptIt,
====== lagoGreek:
* McsElln.δίκτυο-σταθερών-τηλεφώνων@cptIt,

_DESCRIPTION:
A landline telephone (also known as land line, land-line, main line, home phone, landline, fixed-line, and wireline) refers to a phone that uses a metal wire telephone line for transmission as distinguished from a mobile cellular line, which uses radio waves for transmission.
In 2003, the CIA reported approximately 1.263 billion main telephone lines worldwide. China had more than any other country at 350 million and the United States was second with 268 million. The United Kingdom has 23.7 million residential fixed homephones.[1][unreliable source?] The 2013 statistics show that the total number of fixed-telephone subscribers in the world was about 1.16 billion, which is an all time low.[2] The number of landline subscribers continuously decreases due to upgrades in digital technology and the conveniences that come with switching to wireless (cellular) or Internet-based alternatives.
[https://en.wikipedia.org/wiki/Landline]

channel.MOBILE#cptIt292#

name::
* McsEngl.channel.MOBILE@cptIt,

channel.SATELLITE-PHONE-NETWORK

name::
* McsEngl.channel.SATELLITE-PHONE-NETWORK@cptIt,

ΕΠΙΛΕΓΟΜΕΝΕΣ ΓΡΑΜΜΕΣ

PSTN {PUBLIC SWITCHED TELEPHONE NETWORK}
ΕΙΝΑΙ ΔΙΣΥΡΜΑΤΕΣ ΓΡΑΜΜΕΣ ΠΟΥ ΣΕ ΚΑΤΑΣΤΑΣΗ ΗΡΕΜΙΑΣ ΕΧΟΥΝ ΤΑΣΗ -48 ή -60 V ΑΝΑΛΟΓΑ ΜΕ ΤΑ ΤΗΛΕΦΩΝΙΚΑ ΚΕΝΤΡΑ ΤΟΥ ΟΤΕ. ΣΕ ΚΑΤΑΣΤΑΣΗ ΛΕΙΤΟΥΡΓΙΑΣ ΜΕΤΑΦΕΡΟΥΝ ΕΝΑ ΡΕΥΜΑ ΒΡΟΧΟΥ ΤΗΣ ΤΑΞΗΣ ΤΩΝ 25 mA ΓΙΑ ΤΗ ΜΕΤΑΦΟΡΑ ΤΗΣ ΣΗΜΑΤΟΔΟΤΗΣΗΣ.

ΜΙΣΘΩΜΕΝΕΣ ΓΡΑΜΜΕΣ

ΑΦΙΕΡΩΜΕΝΕΣ ΓΡΑΜΜΕΣ, LEASED LINES, DEDICATED LINES.
ΟΙ ΑΦΙΕΡΩΜΕΝΕΣ ΓΡΑΜΜΕΣ ΠΡΟΣΦΕΡΟΝΤΑΙ ΑΠΟ ΤΟ ΤΗΛΕΦΩΝΙΚΟ ΔΙΚΤΥΟ ΚΥΡΙΩΣ ΓΙΑ ΕΠΙΚΟΙΝΩΝΙΕΣ DATA.

Η ΧΡΕΩΣΗ ΤΩΝ ΓΡΑΜΜΩΝ ΑΥΤΩΝ ΣΤΗ ΧΩΡΑ ΜΑΣ ΓΙΝΕΤΑΙ ΜΕ ΣΤΑΘΕΡΟ ΜΗΝΙΑΙΟ ΜΙΣΘΩΜΑ ΠΟΥ ΕΞΑΡΤΑΤΑΙ ΑΠΟ ΤΗΝ ΑΠΟΣΤΑΣΗ ΤΩΝ ΔΥΟ ΣΥΝΔΕΔΕΜΕΝΩΝ ΣΗΜΕΙΩΝ, ΕΝΩ ΕΙΝΑΙ ΑΝΕΞΑΡΤΗΤΗ ΑΠΟ ΤΗΝ ΤΑΧΥΤΗΤΑ ΚΑΙ ΤΟΝ ΟΓΚΟ ΤΩΝ ΜΗΝΥΜΑΤΩΝ.

ΟΜΟΑΞΟΝΙΚΑ ΚΑΛΩΔΙΑ, ΔΙΣΥΡΜΑΤΑ ΣΥΝΕΣΤΡΑΜΜΕΝΑ ΚΑΛΩΔΙΑ, ΜΙΚΡΟΚΥΜΑΤΙΚΕΣ ΖΕΥΞΕΙΣ, ΟΠΤΙΚΕΣ ΙΝΕΣ ΚΛΠ ΣΥΝΘΕΤΟΥΝ ΜΙΑ ΑΦΙΕΡΩΜΕΝΗ ΓΡΑΜΜΗ.

ΟΤΕ ΔΙΚΤΥΟ

Το τηλεφωνικό δίκτυο του ΟΤΕ είναι αναλογικό σε όλη του την έκταση. Οταν μιλάει κανείς για ψηφιακή τηλεφωνική γραμμή αναφέρεται στο πως γίνεται η επιλογή των αριθμών κλήσης και όχι στο πως μεταβιβάζονται τα ηχητικά δεδομένα.
[ΠΗΓΗ: ΡΑΜ 1997ιουλ, 105]

netIt.space.GLOBAL

name::
* McsEngl.netIt.space.GLOBAL@cptIt,
* McsEngl.global-netIt@cptIt,
* McsEngl.netIt.global@cptIt,

_DESCRIPTION:
A global network is any communication network which spans the entire Earth. The term, as used in this article refers in a more restricted way to bidirectional communication networks, and to technology-based networks. Early networks such as international mail and unidirectional communication networks, such as radio and television, are described elsewhere.

The first global network was established using electrical telegraphy and global span was achieved in 1899. The telephony network was the second to achieve global status, in the 1950s. More recently, interconnected IP networks (principally the Internet, with estimated 2.5 billion users worldwide in 2014 [1]), and the GSM mobile communication network (with over 6 billion worldwide users in 2014) form the largest global networks of all.

Setting up global networks requires immense, costly and lengthy efforts lasting for decades. Elaborate interconnections, switching and routing devices, laying out physical carriers of information, such as land and submarine cables and earth stations must be set in operation. In addition, international communication protocols, legislation and agreements are involved.
[https://en.wikipedia.org/wiki/Global_network]

netIt.speed.BROADBAND

NAME

name::
* McsEngl.netIt.speed.BROADBAND@cptIt,
* McsEngl.conceptIt116,
* McsEngl.broadband-network@cptIt,
* McsEngl.broadband'network@cptIt116,
* McsEngl.network.broadbad@cptIt116,

DEFINITION

Ακόμα και οι ίδιοι οι ερευνητες που ασχολούνται, αναφέρονται σε αυτά με την έννοια του μελλοντικου.

speed#cptIt498#

150 Mbps or higher.

netIt.SWITCHING

NAME

name::
* McsEngl.netIt.SWITCHING@cptIt,
* McsEngl.conceptIt44,
* McsEngl.switching-network@cptIt,
* McsEngl.switching'network@cptIt44,
====== lagoGreek:
* McsElln.ΔΙΚΤΥΟ-ΜΕΤΑΓΩΓΗΣ@cptIt,

DEFINITION

ΚΥΡΙΟ ΧΑΡΑΚΤΗΡΙΣΤΙΚΟ ΤΩΝ ΔΙΚΤΥΩΝ ΑΥΤΩΝ ΕΙΝΑΙ Η ΔΥΝΑΤΟΤΗΤΑ ΤΟΥ ΚΑΘΕ ΣΥΝΔΡΟΜΗΤΗ ΝΑ ΚΑΛΕΙ ΕΠΙΛΟΓΙΚΑ ΤΟΝ ΑΝΤΑΠΟΚΡΙΤΗ-ΤΟΥ.
ΣΥΝΗΘΩΣ ΠΡΟΣΦΕΡΟΝΤΑΙ ΑΠΟ ΤΟΥΣ ΟΡΓΑΝΙΣΜΟΥΣ ΤΗΛΕΠΙΚΟΙΝΩΝΙΩΝ.

GENERIC

_GENERIC:
* netIt#cptIt451#

channel

name::
* McsEngl.conceptIt44.1,

A SWITCHING-CHANNEL is a COMMUNICATION-CHANNEL#cptIt168#.
[NIKOS, 1997jul]

SPECIFIC

SPECIFIC:
* circuit-switching##
* message-switching##
* packet-switching##

netIt.switching.CIRCUIT

name::
* McsEngl.netIt.switching.CIRCUIT@cptIt,
* McsEngl.circuit-switching-network@cptIt,
* McsEngl.netIt.circuit-switching@cptIt,

_DESCRIPTION:
Circuit switching is a methodology of implementing a telecommunications network in which two network nodes establish a dedicated communications channel (circuit) through the network before the nodes may communicate. The circuit guarantees the full bandwidth of the channel and remains connected for the duration of the communication session. The circuit functions as if the nodes were physically connected as with an electrical circuit.

The defining example of a circuit-switched network is the early analog telephone network. When a call is made from one telephone to another, switches within the telephone exchanges create a continuous wire circuit between the two telephones, for as long as the call lasts.

Circuit switching contrasts with packet switching which divides the data to be transmitted into packets transmitted through the network independently. In packet switching, instead of being dedicated to one communication session at a time, network links are shared by packets from multiple competing communication sessions, resulting in the loss of the quality of service guarantees that are provided by circuit switching.

In circuit switching, the bit delay is constant during a connection, as opposed to packet switching, where packet queues may cause varying and potentially indefinitely long packet transfer delays. No circuit can be degraded by competing users because it is protected from use by other callers until the circuit is released and a new connection is set up. Even if no actual communication is taking place, the channel remains reserved and protected from competing users.

Virtual circuit switching is a packet switching technology that emulates circuit switching, in the sense that the connection is established before any packets are transferred, and packets are delivered in order.

While circuit switching is commonly used for connecting voice circuits, the concept of a dedicated path persisting between two communicating parties or nodes can be extended to signal content other than voice. Its advantage is that it provides for continuous transfer without the overhead associated with packets making maximal use of available bandwidth for that communication. Its disadvantage is that it can be relatively inefficient because unused capacity guaranteed to a connection cannot be used by other connections on the same network.
[https://en.wikipedia.org/wiki/Circuit_switching]
===
Definitions: Packet-switched networks move data in separate, small blocks -- packets -- based on the destination address in each packet. When received, packets are reassembled in the proper sequence to make up the message. Circuit-switched networks require dedicated point-to-point connections during calls.
Computerworld's Best Places to Work in IT 2015: Company Listings
The complete listings: Computerworld's 100 Best Places to Work in IT for 2015

A compact list of the 56 large, 18 midsize and 26 small organizations that ranked as Computerworld's
Read Now

Circuit-switched networks and packet-switched networks have traditionally occupied different spaces within corporations. Circuit-switched networks were used for phone calls and packet-switched networks handled data. But because of the reach of phone lines and the efficiency and low cost of data networks, the two technologies have shared chores for years.

Designed in 1878, circuit-switched networks reserve a dedicated channel for the entire communication.

The primary hardware for a circuit-switched network is the private branch exchange (PBX) system. Computer servers power packet-switched networks.
[ Don't miss: 8 tech buzzwords that you need to know ]

In modern circuit-switched networks, electronic signals pass through several switches before a connection is established. And during a call, no other network traffic can use those switches.

In packet-based networks, however, the message gets broken into small data packets that seek out the most efficient route as circuits become available. Each packet may go a different route; its header address tells it where to go and describes the sequence for reassembly at the destination computer, says Joel Maloff, president of consultancy Maloff Group International Inc. in Ann Arbor, Mich.

Technologies Converge

Formerly, packet-switched digital networks would connect to circuit-switched ports to gain access to computer networks in different locations. But nowadays, remote dial-up access to corporate computers is usually over the Internet, using global Internet service providers (ISP), says Ron Westfall, an analyst at Current Analysis Inc. in Sterling, Va.

"For a large organization, the payoff is self-evident," says Westfall. "If you can go from paying for one long-distance call from a hotel in Singapore to (paying for) one local call to an ISP in Singapore and another call to the ISP near your headquarters in New York, you're only paying for two local-access charges."

With the expanded use of the Internet for voice and video, analysts predict a gradual shift away from circuit-switched networks.

"A circuit-switched network is good for certain kinds of applications with limited points to go to. If you're doing voice applications solely, it's great," says Maloff. "But if you have multiple locations to get to and large amounts of data to transmit, it's better to break it down into packets."

Voice-over-IP vendors point out that IP-based calls are cheaper than circuit-based ones, but analysts say it will be a long time before corporations abandon proven PBX systems and use packet-based networks for data, voice and video. The biggest impediment to voice-over-IP is poor voice quality and call latency, says analyst Michael Arellano at Degas Communications Group Inc. in Westport, Conn. "With packet-switched networks, what happens if the packets containing voice signals arrive at different times or in a different order? (A congested network) can also drop packets."

"Currently, there's a PBX side of the house and an IT side of the house," Westfall says. "But if you survey IT managers, they're not hopping up and down to put voice on data networks. They have enough challenges maintaining the data network."

"PBX is a proven technology. Although it's proprietary, it's efficient at delivering voice traffic and offering features like voice mail," Westfall says.

"Packet switching is more efficient," Maloff agrees. "But we'll have hybrid systems for the next several years."
[http://www.computerworld.com/article/2593382/networking/networking-packet-switched-vs-circuit-switched-networks.html]

channel

name::
* McsEngl.channel.circuit-switching@cptIt,

PBX

name::
* McsEngl.conceptIt112,
* McsEngl.PBX@cptIt,
* McsEngl.pbx@cptIt112,
* McsEngl.PRIVATE-BRANCH-EXCHANGE@cptIt,

DEFINITION

Ενα ΤΗΛΕΦΩΝΙΚΟ ΣΥΣΤΗΜΑ που εξυπηρετει μια συγκεκριμένη τοποθεσία. Πολλά συστήματα μπορούν να μεταφέρουν δεδομένα υπολογιστών χωρις τη χρήση modems.

netIt.switching.MESSAGE

name::
* McsEngl.netIt.switching.MESSAGE@cptIt,

_DESCRIPTION:
As explained above message switching takes more time compare to packet switching as entire message will be stored at each of the hop points till it is completely received.
[http://www.rfwireless-world.com/Terminology/packet-switching-vs-message-switching.html]

netIt.switching.MPLS

name::
* McsEngl.netIt.switching.MPLS@cptIt,
* McsEngl.MPLS@cptIt,
* McsEngl.multiprotocol-label-switching-network@cptIt,
* McsEngl.netIt.MPLS@cptIt,
* McsEngl.network.MPLS@cptIt,

_DESCRIPTION:
Multiprotocol Label Switching (MPLS) is a mechanism in high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table. The labels identify virtual links (paths) between distant nodes rather than endpoints. MPLS can encapsulate packets of various network protocols. MPLS supports a range of access technologies, including T1/E1, ATM, Frame Relay, and DSL.
[https://en.wikipedia.org/wiki/Multiprotocol_Label_Switching]

netIt.switching.PACKET

name::
* McsEngl.netIt.switching.PACKET@cptIt,
* McsEngl.net.packet-switching@cptIt,
* McsEngl.netIt.packet-switching@cptIt,
* McsEngl.network.packet-switching@cptIt,
* McsEngl.packet-switching-network@cptIt,
====== lagoGreek:
* McsElln.δίκτυο.μεταγωγής-πακέτων@cptIt,

_DESCRIPTION:
Packet switching is a digital networking communications method that groups all transmitted data into suitably sized blocks, called packets, that are transmitted via a medium that may be shared by multiple simultaneous communication sessions. Packet switching increases network efficiency, robustness and enables technological convergence of many applications operating on the same network.

Packets are composed of a header and payload. Information in the header is used by networking hardware to direct the packet to its destination where the payload is extracted and used by application software.

Starting in the late 1950s, American computer scientist Paul Baran developed the concept Distributed Adaptive Message Block Switching with the goal to provide a fault-tolerant, efficient routing method for telecommunication messages as part of a research program at the RAND Corporation, funded by the US Department of Defense.[1] This concept contrasted and contradicted the heretofore established principles of pre-allocation of network bandwidth, largely fortified by the development of telecommunications in the Bell System. The new concept found little resonance among network implementers until the independent work of Donald Davies at the National Physical Laboratory (United Kingdom) (NPL) in the late 1960s. Davies is credited with coining the modern name packet switching and inspiring numerous packet switching networks in Europe in the decade following, including the incorporation of the concept in the early ARPANET in the United States.[2]
[https://en.wikipedia.org/wiki/Packet_switching]

doing

Packet switched networks are mainly used for data and voice applications requiring non-real time scenarios.
[http://www.rfwireless-world.com/Terminology/circuit-switching-vs-packet-switching.html]

channel

name::
* McsEngl.channel.packet-switching@cptIt,

SPECIFIC

_SPECIFIC:
* ARPANET {1969}#ql:arpanet@cptIt#
* ΑΤΜ#cptIt368#
* FRAME RELAY
* X.25#cptIt114#

netIt.ATM

name::
* McsEngl.netIt.ATM@cptIt,
* McsEngl.conceptIt368,
* McsEngl.ATM-communication-channel@cptIt,
* McsEngl.atm'channel@cptIt368,
* McsEngl.asynchronous-transfer-mode@cptIt,
* McsEngl.asynchronous-communication@cptIt,
* McsElln.ΑΣΥΓΧΡΟΝΟΣ-ΤΡΟΠΟΣ-ΜΕΤΑΔΟΣΗΣ@cptIt,

DEFINITION

Τελευταίο μέλος στην οικογένεια ΜΕΤΑΓΩΓΗΣ ΠΑΚΕΤΩΝ είναι το ATM. Αντίθετα από το Χ.25 και το frame-relay που χρησιμοποιούν πακέτα μεταβλητού μήκους, τα πακέτα στο ATM, που ονομάζονται και cell, έχουν σταθερό μήκος 48 bytes συν άλλα 5 ελεγκτικά, δηλαδή συνολικά 53 bytes. Ετσι παρακάμπτεται η ανάγκη για περίπλοκα πρωτόκαλλα συγχρονισμού και ελέγχυ της ροής των δεδομένων. Το μικρό τους μέγεθος επιτρέπει την ταχύτατη μεταβίβασή τους σε ρυθμούς 1,5Mbps μέχρι 1,2Gbps. Η τεχνολογία ονομάζεται και cell relay σε αναλογία του frame relay.
Οι συνδέσει μπορεί να είναι μόνιμες αλλά εικονικές ή επιλεγόμενες εικονικές (switched virtual cirtuits). Ο ΟΤΕ **δεν** προσφέρει επί του παρόντος υπηρεσίες ATM αλλά αυτό αναμένεται να αλλάξει ίσως και σύντομα.
[ΠΗΓΗ: ΡΑΜ 1997ιουλ, 108]

channel

name::
* McsEngl.conceptIt368.1,
* McsEngl.cell-relay-channel@cptIt,

GENERIC

_GENERIC:
SWITCHING NETWORK#cptIt44#

netIt.FRAME-RELAY

name::
* McsEngl.netIt.FRAME-RELAY@cptIt,
* McsEngl.conceptIt412,
* McsEngl.frame-relay-communication-channel@cptIt,
* McsEngl.frame'relay@cptIt412,

DEFINITION

Πιο πρόσφατη τεχνολογία μεταγωγής πακέτων [από Χ.25] είναι η Frame Relay (μεταβίβαση 'πλαισίων'). Αντικατοπτρίζοντας τις βελτιώσεις στην τηλεφωνία κατα τα τελευταία 20 χρόνια, χρησιμοποιείται για τη γρήγορη και σχετικώς φτηνή επικοινωνία δεδομένων χωρίς να παρεμβάλλει ιδιαίτερα απαιτητικά πρωτόκολλα για τη διόρθωση των λαθών. Με άλλα λόγια θεωρείται ότι η γραμμή έχει ένα ανεκτό επίπεδο.
Είναι κάτι σαν εικονική μισθωμένη γραμμή. Οι δύο υπολογιστές που επικοινωνούν συνδέονται σε μια "πόρτα" της υπηρεσίας frame-relay του τηλεπικοινωνιακού οργανισμού, και μεταξύ τους δημιουργείται ένα μόνιμο αλλά εικονικό κύκλωμα, τα δεδομένα ανταλλάσσονται σε 'πλαίσια' δηλαδή 'πακέτα' μεγέθους μέχρι 1600byte.
[SOURCE: RAM 1997jul, 108]

channel

name::
* McsEngl.conceptIt412.1,

TRANSFER-RATE#cptIt498#

Σύμφωνα με την ορολογία που χρησιμοποιεί ο ΟΤΕ, η μέγιστη ταχύτητα επικοινωνίας ονομάζεται ΤΑΧΥΤΗΤΑ ΠΡΟΣΒΑΣΗΣ (φτάνει μέχρι τα 2Mbps) ενώ ο προσυμφωνημένος μέσος όρος ονομάζεται ΔΙΕΚΠΕΡΑΙΩΤΙΚΗ ΙΚΑΝΟΤΗΤΑ (μέχρι 256Kbps).
[SOURCE: RAM 1997jul, 108]

netIt.X.25

name::
* McsEngl.conceptIt114,
* McsEngl.X.25-network@cptIt114,

DEFINITION

X.25: Μία διεθνής προδιαγραφή που ορίζει πρωτόκολλα επικοινωνίας μεταλλαγής πακέτων για δημόσια ή ιδιωτικά δικτυα. Η σύσταση έχει από την CCITT. Ορίζει τα πρωτόκολλα των επιπέδων φυσικού, διασύνδεσης δεδομένων και δικτύου που απαιτούνται για την προσαρμογή σε Χ.25 δίκτυα. Η σύσταση Χ.25 υποστηρίζεται από τους περισσότερους κατασκευαστες υλικών Χ.25, αλλά κάθε 4 χρόνια εκδίδεται μια νέα σύσταση.
ΤΟ ΠΛΕΟΝ ΕΝΤΥΠΩΣΙΑΚΟ ΧΑΡΑΚΤΗΡΙΣΤΙΚΟ ΤΟΥ Χ.25 ΕΙΝΑΙ Η ΔΥΝΑΤΟΤΗΤΑ ΓΙΑ ΔΙΕΘΝΕΙΣ ΕΠΙΚΟΙΝΩΝΙΕΣ ΠΟΥ ΠΡΟΣΦΕΡΕΙ ΣΤΟΥΣ ΧΡΗΣΤΕΣ ΤΟΥ. ΕΝΑ DTE ΣΥΝΔΕΔΕΜΕΝΟ ΜΕ ΕΝΑ X.25 ΔΙΚΤΥΟ ΜΕΤΑΓΩΓΗΣ ΜΑΚΕΤΩΝ ΜΠΟΡΕΙ ΝΑ ΕΠΙΚΟΙΝΩΝΗΣΕΙ ΜΕ ΕΝΑ ΑΛΛΟ DTE ΟΠΟΥΔΗΠΟΤΕ ΣΤΟΝ ΚΟΣΜΟ.

GENERIC

_GENERIC:
* SWITCHING NETWORK#cptItsoft44#

channel#conceptIt114.1#

X.25 is a SWITCHING-CHANNEL#cptIt44#.
[NIKOS, 1997jul]

SPECIFIC

Specific_concepts (level 3) =

HELLASPAC

name::
* McsEngl.hellaspac,

Δικτυο του ΟΤΕ για μεταδοση δεδομενων μεταξυ Η/Υ. τηλ.6118194
Η αρχικη υποδομη παρεχει τη δυνατοτητα 2.400 χρηστων. Ηδη εχουν συνδεθει 1200 χρηστες
[βημα 12 Ιουλ, 1992]


ΑΡΧΗ ΛΕΙΤΟΥΡΓΙΑΣ:
1989

ΧΡΕΩΣΗ:
ΜΙΑ ΩΡΑ ΣΥΝΔΕΣΗΣ ΜΕ ΤΗΝ ΑΜΕΡΙΚΗ ΚΑΙ ΜΕ ΦΥΣΙΟΛΟΓΙΚΗ ΜΕΤΑΦΟΡΑ ΔΕΔΟΜΕΝΩΝ ΚΟΣΤΙΖΕΙ ΠΕΡΙΠΟΥ 1500 ΔΡΑΧΜΕΣ.

ΠΟΡΤΕΣ:
3500

ΤΑΧΥΤΗΤΑ:
64kbps

HELLASPAC II:
Υπο αποπερατωση
7000 πορτες
256kbps speed.
[TELECOM, OKT 1994, 17]

FvMcs.netIt.COMPUTER_NETWORK-(netCmr)

name::
* McsEngl.conceptIt21,
* McsEngl.computer-network@cptIt,
* McsEngl.computer-system.stand-aloneNo@cptIt,
* McsEngl.data network@cptIt,
* McsEngl.net.computer@cptIt21,
* McsEngl.net-computer@cptIt21, {2011-09-07}
* McsEngl.NETWORK@cptIt,
* McsEngl.networkComputer@cptIt21,
* McsEngl.network.computer@cptIt21,
* McsEngl.system.computers@cptIt21, {2012-05-20}
* McsEngl.netCmr@cptIt21, {2015-08-13}
* McsEngl.cmrntk@cptIt21, {2013-08-08}
* McsEngl.cmrnet@cptIt21, {2013-07-23}
* McsEngl.sysCmps@cptIt21, {2012-05-20}
* McsEngl.netComp@cptIt21, {2012-04-12}
* McsElln.ΔΙΚΤΥΟ@cptIt21,
* McsElln.ΔΙΚΤΥΟ-ΠΛΗΡΟΦΟΡΙΚΗΣ@cptIt,
* McsElln.ΔΙΚΤΥΟ ΤΗΛΕΜΑΤΙΚΗΣ@cptIt,
* McsElln.ΔΙΚΤΥΟ-ΤΗΛΕΠΛΗΡΟΦΟΡΙΚΗΣ@cptIt,

netCmr'DEFINITION

πρακτικα COMPUTER NETWORK είναι ένα hard-soft system ΧΩΡΙΣ τους ανθρωπους που το χειρίζονται/επιβλεπουν, αποτελούμενο απο ανεξάρτητα συστήματα που η ΒΑΣΙΚΗ ΛΕΙΤΟΥΡΓΙΑ που κάνουν σαν συστημα είναι η επεξεργασία πληροφορίας.
[NIKOS, 20 SEP. 1994]

NETWORK:
A group of computers on a single cabling system (identified by a unique network address) that can communicate with each other, share peripherals and access remote hosts or other networks.
[NETWARE 2.2 CONCEPTS, 1991, 96]

Many computers are part of networks in which determining precisely where one computer ends and another begins becomes difficult.

ΔΙΚΤΥΟ ΥΠΟΛΟΓΙΣΤΩΝ ΜΠΟΡΕΙ ΝΑ ΘΕΩΡΗΘΕΙ ΚΑΘΕ ΣΥΝΔΕΔΕΜΕΝΗ ΟΜΑΔΑ ΥΠΟΛΟΓΙΣΤΩΝ, ΤΑ ΜΕΛΗ ΤΗΣ ΟΠΟΙΑΣ ΕΧΟΥΝ ΤΗ ΔΥΝΑΤΟΤΗΤΑ ΝΑ ΑΝΤΑΛΛΑΣΟΥΝ ΔΕΔΟΜΕΝΑ ΚΑΙ ΝΑ ΧΡΗΣΙΜΟΠΟΙΟΥΝ ΑΠΟ ΚΟΙΝΟΥ ΤΟΥΣ ΠΟΡΟΥΣ ΠΟΥ ΕΛΕΓΧΟΝΤΑΙ ΑΠΟ ΚΑΘΕ ΜΕΛΟΣ.

ΔΙΚΤΥΟ ΤΗΛΕΠΛΗΡΟΦΟΡΙΚΗΣ ΕΙΝΑΙ ΕΝΑ ΣΥΣΤΗΜΑ ΕΠΙΚΟΙΝΩΝΙΩΝ ΤΟ ΟΠΟΙΟ ΑΠΟΤΕΛΕΙΤΑΙ ΑΠΟ ΤΕΡΜΑΤΙΚΕΣ ΣΥΣΚΕΥΕΣ, ΟΠΩΣ ΕΙΝΑΙ ΟΙ ΥΠΟΛΟΓΙΣΤΕΣ ΚΑΙ ΤΑ ΤΕΡΜΑΤΙΚΑ ΚΑΘΕ ΕΙΔΟΥΣ ΚΑΙ ΜΕ ΔΟΜΗ ΤΕΤΟΙΑ ΩΣΤΕ ΝΑ ΕΠΙΤΥΓΧΑΝΕΤΑΙ Η ΟΠΟΙΑ ΕΠΙΘΥΜΗΤΗ ΜΕΤΑΞΥ-ΤΟΥΣ ΕΠΙΚΟΙΝΩΝΙΑ. ΕΠΙΣΗΣ ΔΙΑΘΕΤΕΙ ΣΥΣΚΕΥΕΣ ΤΗΛΕΠΙΚΟΙΝΩΝΙΩΝ, ΤΗΛΕΠΙΚΟΙΝΩΝΙΑΚΟΥΣ ΚΟΜΒΟΥΣ, ΚΑΘΩΣ ΚΑΙ ΤΑ ΦΥΣΙΚΑ ΜΕΣΑ ΔΙΕΛΕΥΣΗΣ ΤΗΣ ΠΛΗΡΟΦΟΡΙΑΣ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 289#cptResource223]

ΔΙΚΤΥΟ ΕΧΟΥΜΕ ΚΑΘΕ ΦΟΡΑ ΠΟΥ ΥΠΑΡΧΕΙ ΣΥΝΔΕΣΗ ΠΑΝΩ ΑΠΟ ΔΥΟ ΤΕΡΜΑΤΙΚΩΝ(DTE). Η ΣΥΝΔΕΣΗ ΜΠΟΡΕΙ ΝΑ ΕΙΝΑΙ ΜΟΝΙΚΗ ή ΔΙΑΡΚΗΣ. Η ΔΙΑΧΕΙΡΙΣΗ ΠΟΡΩΝ ΚΕΝΤΡΙΚΗ ή ΟΧΙ. ΟΙ ΜΟΡΦΕΣ ΚΑΙ ΤΑ ΜΗΧΑΝΗΜΑΤΑ ΑΠΕΙΡΑ.
- ΜΕ ΑΥΤΟ ΤΟΝ ΟΡΙΣΜΟ ΤΟ ΑΝΤΙΘΕΤΟ ΕΙΝΑΙ ΤΑ ΜΕΜΟΝΟΜΕΝΑ ΣΥΣΤΗΜΑΤΑ ΠΟΥ ΣΕ ΜΙΑ ΣΥΓΚΕΚΡΙΜΕΝΗ ΣΤΙΓΜΗ ΔΟΥΛΕΥΕΙ ΜΟΝΟ ΕΝΑΣ ΧΡΗΣΤΗΣ.
- ΕΝΑ ΣΥΣΤΗΜΑ ΕΝΟΣ ΧΡΗΣΤΗ ΜΕ ΠΟΛΛΟΥΣ ΕΠΕΞΕΡΓΑΣΤΕΣ ΔΕΝ ΕΙΝΑΙ ΔΙΚΤΥΟ.
[ΝΙΚΟΣ, ΙΟΥΝΙΟΣ 1993]

COMPUTER NETWORK is a "system" of COMPUTERS#cptIt227.1#.
[Nikos, oct 1993]

ΕΡΩΤΗΜΑΤΙΚΑ

- ΣΑΦΩΣ ΥΠΑΡΧΕΙ ΣΥΓΧΙΣΗ ΣΤΟΥΣ ΟΡΙΣΜΟΥΣ ΔΙΚΤΥΩΝ ΚΑΙ ΠΟΛΥΧΡΗΣΤΙΚΩΝ ΣΥΣΤΗΜΑΤΩΜ.
- ΟΤΑΝ ΕΝΑ ΣΥΣΤΗΜΑ ΣΥΝΔΕΕΤΑΙ ΜΕ ΕΝΑ ΑΛΛΟ ΚΑΙ ΑΠΛΩΣ ΜΕΤΑΦΕΡΕΙ ΑΡΧΕΙΑ ΜΟΝΟΔΡΟΜΙΚΑ, ΤΟΤΕ ΕΧΟΥΜΕ ΔΙΚΤΥΟ;
- ΟΙ ΜΟΝΙΜΕΣ ΣΥΝΔΕΣΕΙΣ ΚΑΝΟΥΝ ΤΑ ΔΙΚΤΥΑ;

netCmr'WHOLE

_WHOLE:
* stmIthNetCmp##
* system.it_human#cptItsoft180#
Ενα δίκτυο υπολογιστών είναι χαρακτηριστικό κάποιου πληροφοριακού συστήματος.

Κάθε δίκτυο υπολογιστών είναι μια τεχνολογία που επεξεργάζεται πληροφορία αρα και μια τεχνολογία επικοινωνίας.

netCmr'whole.NET-HUMAN-SYSTEM

_CREATED: {2011-09-08}

name::
* McsEngl.netCmr'whole.NET-HUMAN-SYSTEM@cptIt,
* McsEngl.conceptIt21.4,
* McsEngl.sysDataNet@cptIt21.4, {2011-09-08}
* McsEngl.sysNet@cptIt21.4,
* McsEngl.systemTechDataNetwork@cptIt21.4,
* McsEngl.sysItNetCmp@cptIt21.4, {2012-05-05}

_GENERIC:
* this.whole,
* entity.whole.system.it_human#cptItsoft180#

_DESCRIPTION:
It is the hardSoftNet plus the humans which interact with it.
[hmnSngo.2011-09-08]

_SPECIFIC:
* synNet-online#cptItsoft372#

netCmr'ENVIRONMENT#cptCore756#

name::
* McsEngl.netCmr'ENVIRONMENT@cptIt,

NETWORK; ITS; STAND ALONE SYSTEM#cptIt180@cptIt227#

name::
* McsEngl.NETWORK@cptIt, ITS; STAND ALONE SYSTEM,

To ITS είναι υπερσύστημα ενός δικτύου,
ΔΙΚΤΥΟ ονομάζω το σύστημα πολών κομπιούτερ ή πολλών χρηστων. Είναι υπερσύστημα του κομπιουτερ σύστημα.
ΚΟΜΠΙΟΥΤΕΡ ΣΥΣΤΗΜΑ ονομάζω το μηχάνημα, τα προγράματα και το χρήστη.
[ΝΙΚΟΣ, ΣΕΠΤ. 1994]

netCmr'ognCompany#cptEconomy7#

name::
* McsEngl.netCmr'ognCompany@cptIt,

netCmr'PEOPLE

name::
* McsEngl.netCmr'PEOPLE@cptIt,

REGULAR USERS

OPERATORS:
file server console operators,
print queue operators,
print server operators,

MANAGERS:
workgroup managers,
user account managers,

SUPERVISORS#cptIt94: attPar#

netCmr'PART

_PART:
* architecture##
* COMMUNICATION-CHANNEL#cptIt168#
* HARDWARE(information machine)#cptIt262#
* SOFTWARE#cptIt350#
* NETWORK RESOURCES:
 Hard disks,
 Printers,
 Applications,
 Data
* NETWORK SERVICES:
 Access to a Mainframe.

netCmr'part.BACKBONE

name::
* McsEngl.netCmr'part.BACKBONE@cptIt,
* McsEngl.conceptIt393,
* McsEngl.BACKBONE@cptIt393,
* McsEngl.backbone-network@cptIt,
* McsEngl.backbone-of-a-network@cptIt,
* McsEngl.network-backbone@cptIt393,

_DESCRIPTION:
A backbone network or network backbone is a part of computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks.[1] A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. Normally, the backbone's capacity is greater than the networks connected to it.[2]
A large corporation that has many locations may have a backbone network that ties all of the locations together, for example, if a server cluster needs to be accessed by different departments of a company that are located at different geographical locations. The pieces of the network connections (for example: ethernet, wireless) that bring these departments together is often mentioned as network backbone. Network congestion is often taken into consideration while designing backbones.[3][4]
One example of a backbone network is the Internet backbone.[5]
[https://en.wikipedia.org/wiki/Backbone_network]
===
NETWORK BACKBONE:
A CABLING-SYSTEM to which only file-servers and routers are attached.
[NETWARE 2.2 CONCEPTS, 1991, 101]
===
The backbone is the part of the communications network which carries the heaviest traffic. The backbone is also that part of a network which joins LANs together -- either inside a buillping or across a city or the country.
LANs are connected to the backbone via bridges and/or routers and the backbone serves as a communications highway for LAN-to-LAN traffic. The backbone is one basis for design of the overall network service. The backbone may be the more permanent part of the network.

netCmr'part.HARDWARE

name::
* McsEngl.netCmr'part.HARDWARE@cptIt,
* McsEngl.conceptIt262,
* McsEngl.conceptIt21.5,
* McsEngl.hardware.network@cptIt21.5,
* McsEngl.network-hardware@cptIt,
* McsEngl.net-hardware@cptIt21.5,

_GENERIC:
* entity.economic.satisfierWorking.techInfo.hardware#cptItsoft1#

_DESCRIPTION:
NETWORK HARDWARE is the HARDWARE of a NETWORK#cptIt21.1#.
[SOURCE: NIKOS 1997jul]

SPECIFIC

_SPECIFIC:
* COMMUNICATION-CHANNEL#cptIt168#
* Bridges/ΓΕΦΥΡΕΣ#cptIt82#
* Gateways/ΕΞΩΤΕΡΙΚΗ-ΓΕΦΥΡΩΣΗ#cptIt83#
* Router/ΔΡΟΜΟΛΟΓΗΤΗΣ#cptIt152#
* switch#cptItsoft167#
* Client#cptIt78#
* HUB#cptIt153#
* REPEATER#cptIt100#
* Server#cptIt77#
* Καλώδια/Καλωδίωση#cptIt17#
* KAΡΤΕΣ'ΕΠΕΚΤΑΣΗΣ#cptIt79#
* Μοdem#cptIt66#
* PBX#cptIt112#

netCmr'CARD

name::
* McsEngl.netCmr'CARD@cptIt,
* McsEngl.conceptIt79,
* McsEngl.network-card@cptIt,
* McsEngl.network'card@cptIt79,

_SPECIFIC:
Το 1987 μια τυπική κάρτα δικτύου κόστιζε $600.

Infoquest: Pocket adapter for LAN

Reflexion EtherPort Executive, fax 1-510-767-4901
Xircom: pocket LAN adapter, 109.000 δρχ.

ARNET 4, 8 ports
AST 4 ports
DIGICHANNEL PC 8 ports
HOSTESS 4, 8 ports
IBM ασύγχρονες
Intelligent Technology Concepts 8, 16 ports

netCmr'HOST-COMPUTER

name::
* McsEngl.netCmr'HOST-COMPUTER@cptIt,

Host Computer -- In the context of networks, a computer that directly provides service to a user. In contrast to a network SERVER, which provides services to a user through an intermediary host computer.

netCmr'PROCESSOR/CPU

name::
* McsEngl.netCmr'PROCESSOR/CPU@cptIt,

Οι επεξεργαστες που υπάρχουν στο δίκτυο.

netCmr'part.NODE (device)

name::
* McsEngl.netCmr'part.NODE (device)@cptIt,
* McsEngl.netCmr'node@cptIt,

_DESCRIPTION:
In data communication, a physical network node may either be a data communication equipment (DCE) such as a modem, hub, bridge or switch; or a data terminal equipment (DTE) such as a digital telephone handset, a printer or a host computer, for example a router, a workstation or a server.
[https://en.wikipedia.org/wiki/Node_%28networking%29]

netCmr'node.GATEWAY

name::
* McsEngl.netCmr'node.GATEWAY@cptIt,
* McsEngl.conceptIt83,
* McsEngl.gateway@cptIt83,
* McsEngl.network'gateway@cptIt83,
====== lagoGreek:
* McsElln.ΠΥΛΗ-ΕΠΙΚΟΙΝΩΝΙΑΣ@cptIt,
* McsElln.ΠΥΛΗ-ΣΥΖΕΥΞΗΣ@cptIt,
* McsElln.ΣΥΣΚΕΥΕΣ-ΕΞΩΤΕΡΙΚΗΣ-ΓΕΦΥΡΩΣΗΣ@cptIt,

DEFINITION

A network gateway is an internetworking system capable of joining together two networks that use different base protocols. A network gateway can be implemented completely in software, completely in hardware, or as a combination of both. Depending on the types of protocols they support, network gateways can operate at any level of the OSI model.
Because a network gateway, by definition, appears at the edge of a network, related capabilities like firewalls tend to be integrated with it.
On home networks, a broadband router typically serves as the network gateway although ordinary computers can also be configured to perform equivalent functions.
[http://compnetworking.about.com/od/networkdesign/g/network-gateway.htm]

Οι ΠΥΛΕΣ ΔΙΚΤΥΩΝ είναι οι "διερμηνείς" που προσαρμόζουν τα μηνύματα στα διάφορα πρωτόκολλα των δικτύων. Ελέγχουν την επίτευξη σύνδεσης και τη "συνδιάλεξη".
[TELECOM, APR 1994, 31]

Ειναι ένας συνδυασμός hardware and software. Συνδέουν ανόμοια δίκτυα μεταξύ τους ή με mainframes or minicomputers. (σε αντίθεση, οι γέφυρες συνδεουν παρόμοια δύκτυα.)

Οι πύλες επικοινωνίας λειτουργουν στο επάνω άκρο του μοντέλου OSI.

Τα προγράμματα πυλών επικοινωνίας συχνα αλλάζουν τη μορφή του μηνύματος για να το κάνουν συμβατο με το πρόγραμα εφαρμογής στο λαμβάνουν άκρο.

ME ΤΙΣ ΠΥΛΕΣ ΕΝΑ ΤΟΠΙΚΟ ΔΙΚΤΥΟ ΣΥΝΔΕΕΤΑΙ ΜΕ ΕΝΑΝ ή ΠΟΛΛΟΥΣ ΚΕΝΤΡΙΚΟΥΣ ΥΠΟΛΟΓΙΣΤΕΣ, ή ΜΕ ΕΝΑ ΔΙΚΤΥΟ WAN.

A gateway is what it sounds like. It's an entrance and exit into a communications network. Gateways exist at the point where AT&T Communications ends and Comsat begins -- for taking the call overseas.

Gateways also exist between data networks. In data communications, they're typically referred to as a node on a network that connects two otherwise incompatible networks. For example, PC users on a local area network may need a gateway to gain access to a mainframe computer since the mainframe does not speak the same language (protocols) as the PC.Thus, gateways on data networks often perform code and protocol conversion processes as well.

Gateways also eliminate duplicate wiring by giving all users on the network access to the mainframe without having a direct, hard-wired connection.
Gateways also connect compatible networks owned by different entities, such as X.25 networks linked by X.75 gateways.
Gateways are commonly used to connect people on one network, say a token ring network, with those on a long distance network. According to the OSI model, a gateway is a device that provides mapping at all seven layers of the model. For example, a gateway may be used to interface between two incompatible electronic mail systems or for transferring data files from one system to another.

Gateways are application specific such as
- NetWare to SNA,
- Appletalk to DECnet, and
- NetWARE to Banyan's VINES.

relation-to-ROUTER#cptIt152#

A gateway ΜΠΟΡΕΙ ΝΑ ΘΕΩΡΗΘΕΙ ΣΑΝ ΕΞΕΙΔΙΚΕΥΜΕΝΗ ΜΟΡΦΗ ROUTER.

netCmr'node.NETWORK-STATION

name::
* McsEngl.netCmr'node.NETWORK-STATION@cptIt,
* McsEngl.conceptIt21.2,
* McsEngl.network-station@cptIt,

_DESCRIPTION:
NETWORK STATION:
Any PERSONAL COMPUTE (or other device) connected to a network by means of network board and a communication medium. A network station can be a server, a workstation, or a router.
[NETWARE 2.2 CONCEPTS, 1991, 102]

netCmr'node.ROUTER

name::
* McsEngl.netCmr'node.ROUTER@cptIt,
* McsEngl.conceptIt152,
* McsEngl.netCmr'router@cptIt,
* McsEngl.network-router@cptIt,
* McsEngl.network's'router@cptIt152,
* McsEngl.router@cptIt152,
* McsEngl.rtr@cptIt152,
====== lagoGreek:
* McsElln.ΔΡΟΜΟΛΟΓΗΤΗΣ@cptIt,
* McsElln.ΔΡΟΜΟΛΗΓΗΤΗΣ@cptIt152,

DEFINITION

A router[a] is a networking device that forwards data packets between computer networks. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node.[1]

A router is connected to two or more data lines from different networks (as opposed to a network switch, which connects data lines from one single network). When a data packet comes in on one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. This creates an overlay internetwork.

The most familiar type of routers are home and small office routers that simply pass data, such as web pages, email, IM, and videos between the home computers and the Internet. An example of a router would be the owner's cable or DSL router, which connects to the Internet through an ISP. More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone. Though routers are typically dedicated hardware devices, use of software-based routers has grown increasingly common.
[https://en.wikipedia.org/wiki/Router_%28computing%29]
===
ROUTERS/ΔΡΟΜΟΛΟΓΗΤΕΣ συμπληρώνουν τις bridges#cptIt82# και τις gateways#cptIt83#, πραγματοποιώντας μια ιδιαίτερη σημαντική και πρακτικά αναγκαία εργασία: τη δρομολόγηση πακέτων δεδομένων σε δίκτυα με διαφορετικά πρωτόκολλα, γεγονός που τους κάνει απαραίτητους στην ουσιαστική διασύνδεση δικτύων.
Με τη χρήση τους πολλά διαφορετικά δίκτυα μπορούν να ομογενοποιηθούν, και ένας χρήστης να τα βλέπει σαν ένα δίκτυο.
[TELECOM, APR 1994, 31]

ΣΥΣΚΕΥΕΣ ΠΟΥ ΧΡΗΣΙΜΟΠΟΙΟΥΝΤΑΙ ΟΠΩΣ ΚΑΙ ΟΙ ΓΕΦΥΡΕΣ ΓΙΑ ΤΗ ΔΙΑΣΥΝΔΕΣΗ ΔΙΑΦΟΡΕΤΙΚΩΝ LAN, ΟΠΟΥ ΤΑ ΠΑΚΕΤΑ ΔΕΔΟΜΕΝΩΝ ΔΡΟΜΟΛΟΓΟΥΝΤΑΙ ΑΠΟ ΤΟ ΕΝΑ ΔΙΚΤΥΟ ΣΤΟ ΑΛΛΟ ΧΡΗΣΙΜΟΠΟΙΩΝΤΑΣ ΠΛΗΡΟΦΟΡΙΕΣ 3ου ΕΠΙΠΕΔΟΥ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 481#cptResource223]

ΣΥΣΚΕΥΗ (ΑΥΤΟΝΟΜΗ ή ΚΟΙΝΟΣ ΥΠΟΛΟΓΙΣΤΗΣ ΠΟΥ ΤΡΕΧΕΙ ΚΑΠΟΙΟ ΠΡΟΓΡΑΜΜΑ) ΠΟΥ ΣΥΝΔΕΕΙ ΔΥΟ ΔΙΚΤΥΑ ΜΕ ΔΙΑΦΟΡΕΤΙΚΑ ΠΡΩΤΟΚΟΛΛΑ ΕΠΙΚΟΙΝΩΝΙΑΣ.
[RAM, ΜΑΡΤ 1993, ΕΝΘΕΤΟ 14]

INTERNET:
Ο δρομολογητής είναι εξειδικευμένο μηχάνημα που μεσολαβεί μεταξύ της ιντερνετικής γραμμής και του hub, του 'τηλεφωνικού κέντρου' του δικτύου σας από το οποίο ξεκινούν καλώδια προς κάποια από τα άλλα μηχανήματα ή προς άλλα hub.
[SOURCE: RAM 1997jul, 118]

router'GENERIC

_GENERIC:
NETWORK INFORMATION-MACHINE#cptIt262#

router'DDNS

name::
* McsEngl.router'DDNS@cptIt,
* McsEngl.dynamic-DNS@cptIt,

_DESCRIPTION:
The Dynamic DNS service allows you to alias a dynamic IP
address to a static hostname in any of the domains. This function
allows your HG520 to be more easily accessible from various
locations of the Internet.
Before you proceed, please visit one of these two website to
apply your own Dynamic DNS service: www.dnadns.org or
www.tzo.com.
[http://www.basis-net.ru/images/img/device/huawei/smartax/pdf/hg520.pdf]

router'MER

name::
* McsEngl.router'MER@cptIt,
* McsEngl.MAC-Encapsulation-Routing@cptIt,
* McsEngl.MER@cptIt,

router'NAT

name::
* McsEngl.router'NAT@cptIt,
* McsEngl.NAT@cptIt,

_DESCRIPTION:
In computer networking, Network Address Translation (NAT) is the process of modifying IP address information in IPv4 headers while in transit across a traffic routing device.

The simplest type of NAT provides a one-to-one translation of IP addresses. RFC 2663 refers to this type of NAT as basic NAT, which is often also called a one-to-one NAT. In this type of NAT only the IP addresses, IP header checksum and any higher level checksums that include the IP address are changed. The rest of the packet is left untouched (at least for basic TCP/UDP functionality; some higher level protocols may need further translation). Basic NATs can be used to interconnect two IP networks that have incompatible addressing.

However, it is common to hide an entire IP address space, usually consisting of private IP addresses, behind a single IP address (or in some cases a small group of IP addresses) in another (usually public) address space. To avoid ambiguity in the handling of returned packets, a one-to-many NAT must alter higher level information such as TCP/UDP ports in outgoing communications and must maintain a translation table so that return packets can be correctly translated back. RFC 2663 uses the term NAPT (network address and port translation) for this type of NAT. Other names include PAT (port address translation), IP masquerading, NAT Overload and many-to-one NAT. Since this is the most common type of NAT it is often referred to simply as NAT.

As described, the method enables communication through the router only when the conversation originates in the masqueraded network, since this establishes the translation tables. For example, a web browser in the masqueraded network can browse a website outside, but a web browser outside could not browse a web site in the masqueraded network. However, most NAT devices today allow the network administrator to configure translation table entries for permanent use. This feature is often referred to as "static NAT" or port forwarding and allows traffic originating in the "outside" network to reach designated hosts in the masqueraded network.

In the mid-1990s NAT became a popular tool for alleviating the consequences of IPv4 address exhaustion.[1] It has become a common, indispensable feature in routers for home and small-office Internet connections. Most systems using NAT do so in order to enable multiple hosts on a private network to access the Internet using a single public IP address.

Network address translation has serious drawbacks in terms of the quality of Internet connectivity and requires careful attention to the details of its implementation. In particular, all types of NAT break the originally envisioned model of IP end-to-end connectivity across the Internet and NAPT makes it difficult for systems behind a NAT to accept incoming communications. As a result, NAT traversal methods have been devised to alleviate the issues encountered.
[http://en.wikipedia.org/wiki/Network_address_translation]
===
There are several network configurations that may cause Google to receive an IP address that differs from the one assigned to your computer. For example, if you have a home network or a corporate network, devices are usually assigned "internal" IP addresses by a Network Address Translator (NAT) located within your router or modem. The NAT hides the internal IP addresses from websites, making the entire home network appear to outside computers to have a single, "external" IP address. In this case, we will show you the external IP address assigned to your home. Other network configurations, such as proxies, can also cause the IP address received by Google to differ from the actual IP address of your computer.
[https://support.google.com/websearch/answer/1696588]

router'OSI-LAYER

name::
* McsEngl.router'OSI-LAYER@cptIt,

Λειτουργουν στο 3 επιπεδο, NETWORK LAYER.

router'port-mapping

name::
* McsEngl.router'port-mapping@cptIt,

router'PPPoA

name::
* McsEngl.router'PPPoA@cptIt,,
* McsEngl.PPP-over-ATM@cptIt,
* McsEngl.PPPoA@cptIt,

router'program

name::
* McsEngl.router'program@cptIt,

Routing software
Many software implementations exist for most of the common routing protocols. Examples of open-source applications are Bird Internet routing daemon, Quagga, GNU Zebra, OpenBGPD, OpenOSPFD, and XORP.
[https://en.wikipedia.org/wiki/Routing_protocol]

router'protocol

name::
* McsEngl.router'protocol@cptIt,
* McsEngl.routing-algorithm@cptIt,
* McsEngl.routing-protocol@cptIt,

* McsEngl.name.router-protocol@cptIt,
* McsEngl.name.routing-protocol@cptIt,

_GENERIC:
* protocol#cptItsoft262#

_DESCRIPTION:
A routing protocol specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network. Routing algorithms determine the specific choice of route. Each router has a priori knowledge only of networks attached to it directly. A routing protocol shares this information first among immediate neighbors, and then throughout the network. This way, routers gain knowledge of the topology of the network.

Although there are many types of routing protocols, three major classes are in widespread use on IP networks:

Interior gateway protocols type 1, link-state routing protocols, such as OSPF and IS-IS
Interior gateway protocols type 2, distance-vector routing protocols, such as Routing Information Protocol, RIPv2, IGRP.
Exterior gateway protocols are routing protocols used on the Internet for exchanging routing information between Autonomous Systems, such as Border Gateway Protocol (BGP), Path Vector Routing Protocol.

Please notice that the term "Exterior gateway protocol" has two meanings. It could mean a category of protocols used to exchange routing information between autonomous systems (see: exterior gateway protocol). It could also mean a specific RFC-described protocol (see: Exterior Gateway Protocol).

Many routing protocols are defined in documents called RFCs.[1][2][3][4]

Some versions of the Open System Interconnection (OSI) networking model distinguish routing protocols in a special sublayer of the Network Layer (Layer 3).

The specific characteristics of routing protocols include the manner in which they avoid routing loops, the manner in which they select preferred routes, using information about hop costs, the time they require to reach routing convergence, their scalability, and other factors.
[https://en.wikipedia.org/wiki/Routing_protocol]

router'PVC

name::
* McsEngl.router'PVC@cptIt,
* McsEngl.Permanent-Virtual-Circuit@cptIt,
* McsEngl.PVC@cptIt,

router'QoS

name::
* McsEngl.router'QoS@cptIt,
* McsEngl.quality-of-service@cptIt,

router'RIP

name::
* McsEngl.router'RIP@cptIt,
* McsEngl.rooting-information-protocol@cptIt,

_DESCRIPTION:
The Routing Information Protocol (RIP) is designed for
exchanging routing information within a small to medium-size network.
[http://www.basis-net.ru/images/img/device/huawei/smartax/pdf/hg520.pdf]

router'time-schedule

name::
* McsEngl.router'time-schedule@cptIt,
* McsEngl.parental-control.rooter@cptIt,
* McsEngl.router'parental-control@cptIt,

_ADDRESS.WPG:
* http://www.komando.com/kids/tip.aspx?id=3294,

SPECIFIC

* router.specific,
* rtr.specific,

_SPECIFIC:

router.HUAWEI

name::
* McsEngl.router.HUAWEI@cptIt,

EchoLife HG520c

router.NETGEAR

name::
* McsEngl.router.NETGEAR@cptIt,

Q: Which NETGEAR router and gateway products support Live Parental Controls?
A: AC1450
D6200
D6300
DGN1000
DGN2000
DGN2200
DGN2200M
DGN2200v3
DGN3500
DGND3300
DGND3700
DGND3700v2
DGND4000
JNR1010
JNR3000
JNR3210
R4500
R6200
R6250
R6300
WGR614v10
WNR1000v2
WNR1000v3
WNR2000v1
WNR2000v2
WNR2000v3
WNR2000v4
WNR2200
WNDR3300
WNDR3300v2
WNDR3400
WNDR3400v2
WNDR3400v3
WNR3500v2
WNR3500L
WNR3500Lv2
WNDR3700
WNDR3700v2
WNDR3700v3
WNDR3700v4
WNDR3800
MBRN3000
WNDR4000
WNDR4300
WNDR4500
WNDR4500v2
WNXR2000
WNDRMAC
WNDRMACv2
Please upgrade your router firmware to the latest. To download the latest firmware, please go to http://support.netgear.com and enter the product name, eg, WNR2000. To update the firmware, please connect to the router and enter http://www.routerlogin.net , click on "Router Update", and select the firmware you just downloaded. Live Parental Controls can be installed by running the Management Utility, downloadable at www.netgear.com/lpc
[http://www.netgear.com/lpc#five]

router.PIR {PROTOCOL INDEPENDENT ROUTING}

name::
* McsEngl.router.PIR {PROTOCOL INDEPENDENT ROUTING}@cptIt,

Επαναστατική μέθοδος δρομολόγησης. Οι δρομολογητές PIR χαρακτηρίζονται από την υψηλή απόδοση και την ευκολία εγκατάστασής τους στο περιβάλλον της ΙΒΜ.
[ΚΑΤΣΟΓΙΑΝΝΗΣ, Μ. "Η Ζούγκλα των Πρωτοκόλλων" TELECOM (Ιούν. 1994): 36]

netCmr'node.SWITCH

name::
* McsEngl.netCmr'node.SWITCH@cptIt,
* McsEngl.conceptIt167,
* McsEngl.data-switch@cptIt167,
* McsEngl.netCmr'switch@cptIt,
* McsEngl.network-switch@cptIt167,
* McsEngl.switch@cptIt167,
====== lagoGreek:
* McsElln.ΜΕΤΑΛΑΓΕΑΣ-ΔΕΔΟΜΕΝΩΝ@cptIt, (!)

DEFINITION

A network switch (also called switching hub, bridging hub, officially MAC bridge[1]) is a computer networking device that connects devices together on a computer network, by using packet switching to receive, process and forward data to the destination device. Unlike less advanced network hubs, a network switch forwards data only to one or multiple devices that need to receive it, rather than broadcasting the same data out of each of its ports.[2]
A network switch is a multiport network bridge that uses hardware addresses to process and forward data at the data link layer (layer 2) of the OSI model. Switches can also process data at the network layer (layer 3) by additionally incorporating routing functionality that most commonly uses IP addresses to perform packet forwarding; such switches are commonly known as layer-3 switches or multilayer switches.[3] Beside most commonly used Ethernet switches, they exist for various types of networks, including Fibre Channel, Asynchronous Transfer Mode, and InfiniBand. The first Ethernet switch was introduced by Kalpana in 1990.[4]
[https://en.wikipedia.org/wiki/Network_switch]

Η άλλη εναλλακτική λύση για ταυτόχρονη χρήση εκτυπωτών, μεταφορά αρχείων και ηλεκτρονικό ταχυδρομείο (απο Zero-slot LAN) είναι ένα data switch.
===
Είναι μία μικρή συσκευή περίπου το μέγεθος και το βάρος τηλεφώνου που μπορεί να δεχθεί συνδέσεις από πολλούς υπολογιστές, εκτυπωτές και μοντεμς.

switch'GENERIC

_GENERIC:
* net-hardware#cptItsoft21.5#

switch'Speed

name::
* McsEngl.switch'Speed@cptIt,

Οι περισσότεροι μεταλλαγείς δεδομένων περιορίζονται στην ταχύτητα των 19.200 bps.

SPECIFIC

(PER.612309) TP-LINK TL-SG1008D 8-PORT UNMANAGED GIGABIT DESKTOP SWITCH
* http://www.e-shop.gr/show_per.phtml?id=PER.612309,

netCmr'part.PROGRAM#cptIt350#

name::
* McsEngl.netCmr'part.PROGRAM@cptIt,

netCmr'architecture

name::
* McsEngl.netCmr'architecture@cptIt,

_DESCRIPTION:
Definition - What does Network Architecture mean?
Network Architecture is the complete framework of an organization's computer network. The diagram of the network architecture provides a full picture of the established network with detailed view of all the resources accessible. It includes hardware components used for communication, cabling and device types, network layout and topologies, physical and wireless connections, implemented areas and future plans. In addition, the software rules and protocols also constitute to the network architecture. This architecture is always designed by a network manager/administrator with coordination of network engineers and other design engineers.
Techopedia explains Network Architecture
Network Architecture provides the detail overview of a network. It is used to classify all the network layers step-by-step in logical form by describing each step in detail. It is also based on the complete working definitions of the protocols. The architecture is emphaiszed in a distributed computing environment and its complexity can not be understood without a framework. Therefore there is a need to develop applications or methods to layout an overview of a network.
[https://www.techopedia.com/definition/8549/network-architecture]

netCmr'architecture.SDN

name::
* McsEngl.netCmr'architecture.SDN@cptIt,
* McsEngl.SDN@cptIt,
* McsEngl.software-defined-network@cptIt,

_DESCRIPTION:
SDN represents a new architecture that separates the network
control plane from the forwarding hardware, allowing a centralized
controller (or set of controllers) to define forwarding behavior
through high-level policy.
[file:///D:/DATA1/data.INFO/NETWORK/SDN-HP.pdf]
===
The shift toward software-defined
networking has created a growing
ecosystem poised to deliver
exceptional network agility, scalability
and manageability.
[http://i.dell.com/sites/doccontent/business/solutions/power/en/Documents/ps3q14-20140427-seckler.pdf]

netCmr'Cause

name::
* McsEngl.netCmr'Cause@cptIt,

Ερευνες μεταξύ των αναγνωστων του PC Magazine, έδειξαν ότι το ηλεκτρονικό ταχυδρομείο θα είναι σύντομα το ίδιο σημαντικό με την κοινή χρήση εκτυπωτών σαν κριτήριο για την εγκατάσταση δικτύων.

Τα δικτυα γεννήθηκαν απο την ανάγκη οι υπολογιστες, που ήταν αρχικά πανάκριβοι, να χρησιποποιούνται από πολλους ανθρώπους.

netCmr'channel

name::
* McsEngl.netCmr'channel@cptIt,
* McsEngl.netCmr'connection@cptIt,

_SPECIFIC:
* LOGICAL_CONNECTIONS#cptIt173: attPar#
* PHYSICAL_CONNECTIONS#cptIt309: attPar#

netCmr'cloud-computing

name::
* McsEngl.netCmr'cloud-computing@cptIt,
* McsEngl.cloud-computing@cptIt421.1, {2012-06-11}
* McsEngl.cloud-computing-model@cptIt,
* McsEngl.cloud-network@cptIt421.1, {2012-11-19}
* McsEngl.computing-as-a-service@cptIt,

* McsEngl.cdc@cptIt,

_GENERIC:
* network-service##

_DESCRIPTION:
What is cloud computing?
Computing as a service over the Internet
Cloud computing, often referred to as simply “the cloud,” is the delivery of on-demand computing resources—everything from applications to data centers—over the Internet on a pay-for-use basis.
[http://www.ibm.com/cloud-computing/what-is-cloud-computing.html]
===
Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet).
[http://en.wikipedia.org/wiki/Cloud_computing]
===
Gartner defines cloud computing as a style of computing in which scalable and elastic IT-enabled capabilities are delivered as a service using Internet technologies.
[http://www.gartner.com/it-glossary/cloud-computing]
===
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation.

There are many types of public cloud computing:[1]
Infrastructure as a service (IaaS)
Platform as a service (PaaS)
Software as a service (SaaS)
Storage as a service (STaaS)
Security as a service (SECaaS)
Data as a service (DaaS)
Database as a service (DBaaS)
Test environment as a service (TEaaS)
Desktop virtualization
API as a service (APIaaS)
Backend as a service (BaaS)
In the business model using software as a service users also rent application software and databases. The cloud providers manage the infrastructure and platforms on which the applications run.

End users access cloud-based applications through a web browser or a light-weight desktop or mobile app while the business software and user's data are stored on servers at a remote location. Proponents claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and enables IT to more rapidly adjust resources to meet fluctuating and unpredictable business demand.[2][3]

Cloud computing relies on sharing of resources to achieve coherence and economies of scale similar to a utility (like the electricity grid) over a network.[4] At the foundation of cloud computing is the broader concept of converged infrastructure and shared services.
[http://en.wikipedia.org/wiki/Cloud_networking] 2012-11-19,
===
Gartner defines cloud computing as "a style of computing in which massively scalable IT-related capabilities are provided 'as a service' using Internet technologies to multiple external customers." Beyond the Gartner definition, clouds are marked by self-service interfaces that let customers acquire resources at any time and get rid of them the instant they are no longer needed.
The cloud is not really a technology by itself. Rather, it is an approach to building IT services that harnesses the rapidly increasing horsepower of servers as well as virtualization technologies that combine many servers into large computing pools and divide single servers into multiple virtual machines that can be spun up and powered down at will.
[http://www.networkworld.com/supp/2009/ndc3/051809-cloud-faq.html]

cdc'provider

name::
* McsEngl.cdc'provider@cptIt,

_SPECIFIC:
* HOL##

cdc'provider.Hol

name::
* McsEngl.cdc'provider.Hol@cptIt,

HOL: Η επόμενη μέρα στις τηλεπικοινωνίες
ΑΘΗΝΑ 11/06/2012

Η hellas online, ο ισχυρός ελληνικός πάροχος ευρυζωνικών υπηρεσιών, συνεπής στην προσπάθεια παροχής καινοτόμων και οικονομικών λύσεων που στηρίζουν τις ελληνικές επιχειρήσεις, ξεκινά πρώτος την εμπορική διάθεση ολοκληρωμένων υπηρεσιών cloud.

Το hol cloud είναι μια νέα, πρωτοποριακή «ομπρέλα» υπηρεσιών που βασίζεται στη σύζευξη της πληροφορικής με τις τηλεπικοινωνίες με στόχο να αποτελέσει τη βάση για μια πιο αποτελεσματική επιχείρηση.

Με το hol cloud, οι επιχειρήσεις αποκτούν τη δυνατότητα να μισθώνουν πόρους υποδομής και υπολογιστικής ισχύος για να εξυπηρετούν τις ΙΤ ανάγκες τους, πληρώνοντας μόνο για τις υπηρεσίες που πραγματικά χρειάζονται και χρησιμοποιούν.

Ταυτόχρονα, οι επιχειρήσεις διασφαλίζουν τη συνολική τους κάλυψη, τόσο για τις υπηρεσίες πληροφορικής όσο και για τα τηλεπικοινωνιακά τους κυκλώματα πρόσβασης, από έναν και μόνον πάροχο με μία ενιαία σύμβαση υποστήριξης (end-to-end SLΑ) η οποία τους διασφαλίζει τη μέγιστη ποιότητα υπηρεσιών.

Το hol cloud χρησιμοποιεί τεχνολογίες αιχμής και έχει σχεδιαστεί βάσει διεθνώς αναγνωρισμένων προτύπων αρχιτεκτονικής με έμφαση

1. στην ενισχυμένη ασφάλεια
2. στην διασφάλιση της ταχύτητας των υπηρεσιών
3. στην παροχή ενιαίας διαχειριστικής πλατφόρμας (hol cloud management platform) που εξασφαλίζει πλήρη έλεγχο και δυνατότητα παραμετροποίησης των επιλεγμένων υπηρεσιών και
4. στην επεκτασιμότητα υποδομών.

Η αρχιτεκτονική των υπηρεσιών βασίζεται στις υποδομές κορυφαίων παγκοσμίως συνεργατών, όπως η Cisco, η VMware και η NetApp και η πρόσβαση στις hol cloud υπηρεσίες γίνεται μέσω του σύγχρονου, ιδιόκτητου δικτύου οπτικών ινών της hellas online.

Πιο συγκεκριμένα, η hol cloud υποδομή είναι σχεδιασμένη βάσει των κανονισμών της Αρχής Διασφάλισης του Απόρρητου των Επικοινωνιών (ΑΔΑΕ) και Αρχή Προστασίας Δεδομένων Προσωπικού Χαρακτήρα (ΑΠΔΠΧ) , με γνώμονα τη συμμόρφωση στο Ελληνικό Δίκαιο και με εφαρμογή όλων των διαδικαστικών και τεχνικών δικλείδων ασφαλείας που προτείνονται από την ENISA (European Network and Information Security Agency) και το CSA (Cloud Security Alliance).

Παράλληλα, πραγματοποιείται συνεχής έλεγχος και διαπίστευση δικλείδων ασφαλείας από την Encode SA, πρωτοπόρο εταιρία στον τομέα της ασφάλειας πληροφοριών.

Με τις υπηρεσίες hol cloud, οι επιχειρήσεις επιτυγχάνουν την απόλυτη ασφάλεια των δεδομένων τους τόσο σε επίπεδο φυσικής πρόσβασης όσο και σε επίπεδο δικτύου, λογισμικού και αποθήκευσης (πιστοποίηση ISO27001), δεδομένου ότι η φύλαξη όλων των εταιρικών δεδομένων γίνεται στο σύγχρονο και τεχνολογικά άρτιο, ιδιόκτητο Data Center που βρίσκεται στην Ελλάδα.

Τα οφέλη που αποκομίζουν οι επιχειρήσεις, με το hol cloud σε μια εποχή που απαιτεί την επίτευξη ανάπτυξης αλλά με ιδιαίτερα προσεκτική διαχείριση κόστους είναι:

Οικονομία: μηδενικό κόστος για αγορά και αναβάθμιση ΙΤ υποδομής και εξοπλισμού, απόλυτος έλεγχος του κόστους χρήσης των μισθωμένων πόρων υποδομής και υπολογιστικής ισχύος, ανταγωνιστικές χρεώσεις

Ευελιξία/ταχύτητα: δυνατότητα πλήρους προσαρμογής και διαμόρφωσης των υπηρεσιών βάσει των αναγκών της επιχείρησης, γρήγορη και εύκολη πρόσβαση σε ΙΤ πόρους για άμεση χρήση

Παραγωγικότητα και αποτελεσματικότητα: Πιο εύρυθμη διαχείριση της IT υποδομής της επιχείρησης από την καθημερινή λειτουργία της ΙΤ υποδομής, πρόσβαση στις υπηρεσίες cloud από οπουδήποτε και οποτεδήποτε και εύκολη διαχείριση των IT πόρων μέσω μίας ενιαίας διαχειριστικής εφαρμογής (hol management platform)

H hellas online αρχικά προσφέρει τρεις (3) βασικές υπηρεσίες cloud, οι οποίες εντάσσονται στο μοντέλο infrastructure as a Service (IaaS) και προσφέρουν πρόσβαση σε υπολογιστική ισχύ, αποθηκευτικό χώρο και IT υποδομή, ανάλογα με τις ανάγκες της εκάστοτε επιχείρησης.

Η hellas online είναι η μόνη που παρέχει υπηρεσίες cloud σε συνδυασμό με τις αξιόπιστες λύσεις διασύνδεσης, μέσω του εκτεταμένου ιδιόκτητου δικτύου οπτικών ινών (Internet/MPLS-VPN), διασφαλίζοντας έτσι εγγυημένο end-to-end service level agreement (SLA) για τη λύση συνολικά. Οι τρείς αρχικές υπηρεσίες hol cloud που καλύπτονται με end-2-end SLA είναι:

1. hol virtual cloud server (VCS): δυνατότητα παραμετροποίησης από ένα virtual cloud server έως και ολόκληρες «φάρμες» μεVCSs, μέσα στις οποίες τα μηχανήματα επικοινωνούν όπως στο εσωτερικό δίκτυο LAN μιας επιχείρησης.

2. hol cloud storage: επεκτάσιμη και οικονομική λύση για την ασφαλή αποθήκευση και την online διαχείριση των αρχείων της επιχείρησης από οπουδήποτε κι αν βρίσκεστε, με δυνατότητες collaboration και sharing.

3. hol cloud backup: που βασίζεται σε παγκοσμίου εμβέλειας disk to disk backup πλατφόρμα η οποία αποτελεί την ιδανική εταιρική backup λύση στο σύννεφο.
[http://www.nooz.gr/tech/hol-i-epomeni-mera-stis-tilepikoinonies]

cdc'security

name::
* McsEngl.cdc'security@cptIt,

Abuse
As with privately purchased hardware, crackers posing as legitimate customers can purchase the services of cloud computing for nefarious purposes. This includes password cracking and as a means of launching attacks.[81] In 2009, a banking trojan illegally used the popular Amazon service as a command and control channel that issued software updates and malicious instructions to PCs that were infected by the malware.[82]
[http://en.wikipedia.org/wiki/Cloud_computing]

cdc'service

name::
* McsEngl.cdc'service@cptIt,

What types of services are available via the cloud computing model?
Public cloud services are breaking down into three broad categories:
- software-as-a-service,
- infrastructure-as-a-service, and
- platform-as-a-service.
SaaS is well known and consists of software applications delivered over the Web. Infrastructure-as-a-service refers to remotely accessible server and storage capacity, while platform-as-a-service is a compute-and-software platform that lets developers build and deploy Web applications on a hosted infrastructure.
[http://www.networkworld.com/supp/2009/ndc3/051809-cloud-faq.html?page=2]

cdc'service.INFRASTRACTURE-AS-A-SERVICE

name::
* McsEngl.cdc'service.INFRASTRACTURE-AS-A-SERVICE@cptIt,
* McsEngl.IaaS@cptIt,

_DESCRIPTION:
Infrastructure as a service (IaaS)
Infrastructure as a service provides companies with computing resources including servers, networking, storage and data center space on a pay-per-use basis.
THE BENEFITS OF IAAS
* No need to invest in your own hardware
* Infrastructure scales on demand to support dynamic workloads
* Flexible, innovative services available on demand
[http://www.ibm.com/cloud-computing/what-is-cloud-computing.html]

cdc'service.PLATFORME-AS-A-SERVICE

name::
* McsEngl.cdc'service.PLATFORME-AS-A-SERVICE@cptIt,
* McsEngl.PaaS@cptIt,

_DESCRIPTION:
Platform as a service (PaaS)
Platform as a service provides a cloud-based environment with everything required to support the complete lifecycle of building and delivering web-based (cloud) applications—without the cost and complexity of buying and managing the underlying hardware, software, provisioning and hosting.
THE BENEFITS OF PAAS
Develop applications and get to market faster
Deploy new web applications to the cloud in minutes
Reduce complexity with middleware as a service
[http://www.ibm.com/cloud-computing/what-is-cloud-computing.html]

cdc'service.SOFTWARE-AS-A-SERVICE

name::
* McsEngl.cdc'service.SOFTWARE-AS-A-SERVICE@cptIt,
* McsEngl.Cloud-based-application@cptIt,
* McsEngl.SaaS@cptIt,
* McsEngl.software-as-a-service@cptIt,

_DESCRIPTION:
"Gartner, a leading research and advisory company, defines “software as a service” (SaaS) as “software that is owned, delivered and managed remotely by a third party. The provider delivers software based on one set of common code and data definitions that is consumed in a one-to-many model by all contracted customers at anytime on a pay-for-use basis or as a subscription based on use metrics.” (3)

The key takeaway: Companies don’t need to create their own software to deal with processes that can be managed with outsourced online tools, and they can rent or borrow these tools instead of creating them and maintaining them. SaaS has become one of the greatest innovations of the last 20–30 years and it significantly reduces the demands on internal IT staff at businesses looking to leverage these tools.

Some use cases of SaaS are (4):

Example#1: instead of acquiring a copy of Microsoft Word for $300, Microsoft’s cloud platform “rents” this software to you through the Internet at something like $15/month
Example#2: your small business would not spend thousands of dollars on a sales database. Instead, you “rent” access to a sophisticated online sales database like Salesforce.
Example#3: you decide to start a gym in your hometown, and need computer tools for your receptionist, financial controller, salespeople, and personal trainers. Instead you “rent or pay” for online tools that streamline business processes such as scheduling, timesheet tracking, and accounting.
The great benefits of SaaS are:

It is cheaper than purchasing the full software
You save storage space and maintenance costs because the software does not need to be installed locally on your computer
You can access your SaaS applications from different locations and devices"
[https://medium.com/ardor/redefining-blockchain-as-a-service-beyond-buzzwords-d5fdcdd057f9]
===
Software as a service (SaaS)
Cloud-based applications—or software as a service—run on distant computers “in the cloud” that are owned and operated by others and that connect to users’ computers via the Internet and, usually, a web browser
THE BENEFITS OF SAAS
- You can sign up and rapidly start using innovative business apps
- Apps and data are accessible from any connected computer
- No data is lost if your computer breaks, as data is in the cloud
- The service is able to dynamically scale to usage needs
[http://www.ibm.com/cloud-computing/what-is-cloud-computing.html]

cdc.EVOLUTION#cptCore546.171#

name::
* McsEngl.cdc.EVOLUTION@cptIt,

{time.2012-11-19}:
Cisco buys cloud network company for $1.2bn
The network equipment provide pays $1.2bn to boost its internet-cloud networking capabilities with the acquisition of Meraki, a six-year-old San Francisco-based company
http://link.ft.com/r/A1TNOO/OFR79C/LQJMTQ/MSZD5R/GY9QFA/82/h?a1=2012&a2=11&a3=19

netCmr'distance-of-stations#cptCore978.4#

name::
* McsEngl.netCmr'distance-of-stations@cptIt,

Οι τιμές που παίρνει αυτό το χαρακτηριστικό, καθορίζουν άν το δίκτυο είναι LAN, MAN, WAN.

netCmr'doing

name::
* McsEngl.netCmr'doing@cptIt,
* McsEngl.netCmr'application@cptIt,
* McsEngl.netCmr'function@cptIt,
* McsEngl.netCmr'usage@cptIt,
* McsEngl.netCmr'service@cptIt,

_GENERIC:
* information-processing-function#cptItsoft444#

ΠΡΟΣΟΧΗ: οι μερικότερες λειτουργίες ενός δικτύου, είναι αυτές του ΛΕΙΤΟΥΡΓΙΚΟΥ ΣΥΣΤΗΜΑΤΟΣ ΤΟΥ ΔΙΚΤΥΟΥ. Πρέπει δε να έχουμε υπόψη ότι κάποιος ΑΝΘΡΩΠΟΣ έξω απο το network-ims δίνει ΕΝΤΟΛΗ να εκτελεστουν. Αυτος είναι ο λόγος που οι λειτουργίες του συστηματος λέγονται και εντολές.
[ΝΙΚΟΣ, 25 ΣΕΠΤ. 1994]

Οι βασικές λειτουργιες ενός δικτύου είναι
1. ανταλλαγή αρχείων
2. κοινή χρήση εκτυπωτών
3. κοινή χρήση δεδομένων.

CONFERENCE#cptIt385: attPar#

netCmr'doing.Management

name::
* McsEngl.netCmr'doing.Management@cptIt,

CENTRAL or NOT

netCmr'doing.TRANSACTION

_CREATED: {2015-06-10}.

name::
* McsEngl.netCmr'doing.TRANSACTION@cptIt,
* McsEngl.online-transaction@cptIt,
====== lagoGreek:
* McsElln.ηλεκτρονική-συναλλαγή@cptIt,

authenticity (αυθεντικότητα)

_DESCRIPTION:
Επιπλέον, σε μία τέτοια συναλλαγή, είναι απαραίτητο ο παραλήπτης να είναι σίγουρος για την ταυτότητα του αποστολέα (αυθεντικότητα). Δηλαδή, να γνωρίζει με σιγουριά ότι το μήνυμα που λαμβάνει και φαίνεται να το υπογράφει ο κ. Χ, είναι όντως από τον κ. Χ και όχι από κάποιον που παριστάνει τον Χ.
...
3. Τι είναι η ψηφιακή υπογραφή
Οι ψηφιακές υπογραφές χρησιμοποιούν την κρυπτογραφία δημοσίου κλειδιού. Ο χρήστης διαθέτει δύο κλειδιά (το δημόσιο και το ιδιωτικό) τα οποία έχουν κάποιο μαθηματικό συσχετισμό. Η σχέση των κλειδιών είναι τέτοια όπου αν κάποιος γνωρίζει το ένα κλειδί να είναι πρακτικά αδύνατον να υπολογίσει το άλλο. Το ένα κλειδί χρησιμοποιείται για τη δημιουργία της υπογραφής και το άλλο για την επαλήθευσή της. Η διαφοροποίηση από την κρυπτογράφηση, έγκειται στο ότι για τη δημιουργία της ηλεκτρονικής υπογραφής ο αποστολέας χρησιμοποιεί το ιδιωτικό του κλειδί και για την επαλήθευσή της ο παραλήπτης χρησιμοποιεί το δημόσιο κλειδί του αποστολέα.

Στη διαδικασία της δημιουργίας και επαλήθευσης της υπογραφής εμπλέκεται και η έννοια της συνάρτησης κατακερματισμού (ή κατατεμαχισμού -one way hash). Με την εφαρμογή της συνάρτησης κατακερματισμού, από ένα μήνυμα ανεξαρτήτου του μεγέθους του, παράγεται η «σύνοψή του», η οποία είναι μία σειρά από bits συγκεκριμένου μεγέθους (π.χ. 128 ή 160 bits). Η σύνοψη του μηνύματος (fingerprint ή message digest) είναι μία ψηφιακή αναπαράσταση του μηνύματος, είναι μοναδική για το μήνυμα και το αντιπροσωπεύει.

Η συνάρτηση κατακερματισμού είναι μονόδρομη διότι από την σύνοψη που δημιουργεί, είναι υπολογιστικά αδύνατον κάποιος να εξάγει το αρχικό μήνυμα. Η πιθανότητα δύο μηνύματα να έχουν την ίδια σύνοψη είναι εξαιρετικά μικρή. Αυτό σημαίνει ότι αν το μήνυμα του αποστολέα έχει κάποια συγκεκριμένη σύνοψη και το μήνυμα που λάβει ο παραλήπτης (χρησιμοποιώντας την ίδια συνάρτηση κατακερματισμού) παράγει διαφορετική σύνοψη, τότε το μήνυμα κατά την μετάδοσή του έχει αλλοιωθεί (μη ακεραιότητα). Οποιαδήποτε αλλαγή σε ένα μήνυμα συνεπάγεται και τη δημιουργία διαφορετικής σύνοψης.

Η ηλεκτρονική υπογραφή, στην ουσία είναι η κρυπτογραφημένη με το ιδιωτικό κλειδί του αποστολέα σύνοψη. Δηλαδή, η ψηφιακή υπογραφή (σε αντίθεση με την ιδιόχειρη υπογραφή) είναι διαφορετική για κάθε μήνυμα!!

Θεωρώντας ότι ο αποστολέας έχει ένα συγκεκριμένο ζευγάρι κλειδιών και το ιδιωτικό του κλειδί είναι στην πλήρη κατοχή του, τότε το γεγονός ότι ο αποστολέας χρησιμοποιεί το ιδιωτικό του κλειδί για να κρυπτογραφήσει το μήνυμα, πιστοποιεί στον παραλήπτη που το αποκρυπτογραφεί με το αντίστοιχο δημόσιο κλειδί (του αποστολέα) την ταυτότητα του αποστολέα (αυθεντικότητα). Η ψηφιακή υπογραφή είναι ένας τρόπος αυθεντικοποίησης του αποστολέα του μηνύματος.

Μία ψηφιακή υπογραφή μπορεί να πλαστογραφηθεί εάν ο δικαιούχος του ιδιωτικού κλειδιού δεν το έχει υπό τον πλήρη έλεγχό του (π.χ. χάσει το μέσο στο οποίο έχει αποθηκευτεί το ιδιωτικό κλειδί).
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]

digital-signature#cptIt56.2#

data

name::
* McsEngl.message@cptIt,

confidentiality (εμπιστευτικότητα)

_DESCRIPTION:
Ο χρήστης που συναλλάσσεται ηλεκτρονικά απαιτεί τα δεδομένα (π.χ. ένα μήνυμα ή ένα κείμενο) που στέλνει να μην μπορούν να αποκαλυφθούν ή να διατεθούν σε μη εξουσιοδοτημένα γι αυτό άτομα (εμπιστευτικότητα).
...
2. Κρυπτογραφία
Η ανάγκη για εμπιστευτικότητα στην ηλεκτρονική συναλλαγή ικανοποιείται με την κρυπτογραφία. Ο αποστολέας χρησιμοποιώντας κάποια μαθηματική συνάρτηση μετατρέπει το αρχικό κείμενο σε μορφή μη κατανοητή για οποιονδήποτε τρίτο (κρυπτογραφημένο κείμενο). Ο παραλήπτης έχοντας γνώση του τρόπου κρυπτογράφησης, αποκρυπτογραφεί το κείμενο στην αρχική του μορφή. Το μήνυμα παραμένει εμπιστευτικό, μέχρι να αποκρυπτογραφηθεί.

Τα σύγχρονα κρυπτοσυστήματα χρησιμοποιούν αλγόριθμους και κλειδιά (σειρά από bits συγκεκριμένου μήκους) για να διατηρήσουν την πληροφορία ασφαλή.

Μία παραδοσιακή μέθοδος κρυπτογράφησης είναι η συμμετρική κρυπτογραφία η οποία χρησιμοποιεί το ίδιο κλειδί για την κρυπτογράφηση και την αποκρυπτογράφηση. Ο αποστολέας κρυπτογραφεί και ο παραλήπτης αποκρυπτογραφεί με το ίδιο κλειδί. Το κλειδί θα πρέπει να παραμένει μυστικό και να είναι γνωστό μόνο στους συναλλασσόμενους. Η μέθοδος αυτή παρουσιάζει μειονεκτήματα όσον αφορά την εφαρμογή της σε ανοιχτά δίκτυα με πολλούς χρήστες και τις αυξημένες απαιτήσεις της για την ασφάλεια (π.χ. αποθήκευση των κλειδιών κ.λπ).

Η ασύμμετρη κρυπτογραφία (ή κρυπτογραφία δημοσίου κλειδιού- public key cryptography) χρησιμοποιεί δύο διαφορετικά κλειδιά για την κρυπτογράφηση και την αποκρυπτογράφηση. Κάθε χρήστης έχει στη διάθεσή του δύο κλειδιά. Το δημόσιο κλειδί είναι αυτό που ο χρήστης μπορεί να το γνωστοποιήσει σε τρίτους ενώ το ιδιωτικό είναι εκείνο που το φυλάσσει με ασφάλεια και μόνο αυτός θα πρέπει να το γνωρίζει και κατέχει. Για να επιτευχθεί η εμπιστευτικότητα, ο αποστολέας κρυπτογραφεί το μήνυμα με το δημόσιο κλειδί του παραλήπτη. Έτσι, το μήνυμα μπορεί να αποκρυπτογραφηθεί μονάχα από τον παραλήπτη (που είναι ο κάτοχος του αντίστοιχου ιδιωτικού κλειδιού εκτός και αν η μυστικότητα του ιδιωτικού κλειδιού έχει παραβιαστεί).
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]

cryptography#ql:cryptography@cptIt56#
integrity (ακεραιότητα)

Τα δεδομένα, δεν θα πρέπει να είναι δυνατόν να αλλοιωθούν κατά την μετάδοσή τους. Ο παραλήπτης θα πρέπει να τα λάβει όπως ακριβώς ο αποστολέας τα έστειλε και να είναι σίγουρος ότι τα δεδομένα που λαμβάνει είναι αυτά που ο αποστολέας έχει στείλει (ακεραιότητα).
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]

non-disclaimer (μη αποποίηση ευθύνης)

name::
* McsEngl.non-disclaimer (μη αποποίηση ευθύνης)@cptIt,

Τέλος, συμμετέχοντας σε μία ηλεκτρονική συναλλαγή (π.χ. ηλεκτρονικό εμπόριο) θα πρέπει να μην είναι δυνατόν τα εμπλεκόμενα μέρη να αρνηθούν εκ των υστέρων την συμμετοχή τους στη συναλλαγή αυτή (μη αποποίηση ευθύνης).
...
5. Ψηφιακά πιστοποιητικά
Με την λήψη ενός μηνύματος με ηλεκτρονική υπογραφή, ο παραλήπτης επαληθεύοντας την ηλεκτρονική υπογραφή βεβαιώνεται ότι το μήνυμα είναι ακέραιο. Ο παραλήπτης για την επαλήθευση της ηλεκτρονικής υπογραφής, χρησιμοποιεί το δημόσιο κλειδί του αποστολέα. Αυτό όμως που δεν μπορεί να γνωρίζει ο παραλήπτης με βεβαιότητα, είναι αν ο αποστολέας του μηνύματος είναι όντως αυτός που ισχυρίζεται ότι είναι. Θεωρώντας ότι ο κάτοχος του ιδιωτικού κλειδιού είναι πράγματι αυτός που ισχυρίζεται ότι είναι (και η μυστικότητα του ιδιωτικού κλειδιού δεν έχει παραβιαστεί) ο αποστολέας του μηνύματος που υπέγραψε, δεν μπορεί να αρνηθεί το περιεχόμενο του μηνύματος που έστειλε (μη αποποίηση).

Κατά συνέπεια, απαιτείται να διασφαλιστεί ότι ο δικαιούχος του ιδιωτικού κλειδιού, και μόνον αυτός, δημιούργησε την ηλεκτρονική υπογραφή και ότι το δημόσιο κλειδί του αποστολέα που χρησιμοποιεί ο παραλήπτης για την επαλήθευση της υπογραφής είναι όντως του αποστολέα. Απαιτείται δηλαδή, η ύπαρξη ενός μηχανισμού τέτοιου, ώστε ο παραλήπτης να μπορεί να είναι σίγουρος για την ταυτότητα του προσώπου με το δημόσιο κλειδί. Ο μηχανισμός αυτός θα πρέπει να υλοποιείται από μία οντότητα που εμπνέει εμπιστοσύνη και που εγγυάται ότι σε ένα συγκεκριμένο πρόσωπο αντιστοιχεί το συγκεκριμένο δημόσιο κλειδί.

Ο Πάροχος Υπηρεσιών Πιστοποίησης είναι η οντότητα που παρέχει την υπηρεσία εκείνη με την οποία πιστοποιείται η σχέση ενός προσώπου με το δημόσιο κλειδί του. Ο τρόπος με τον οποίο γίνεται αυτό, είναι με την έκδοση ενός πιστοποιητικού (ένα ηλεκτρονικό αρχείο) στο οποίο ο Πάροχος Υπηρεσιών Πιστοποίησης πιστοποιεί την ταυτότητα του προσώπου και το δημόσιο κλειδί του.

Από τους σημαντικότερους τύπους ψηφιακών πιστοποιητικών είναι το πιστοποιητικό δημοσίου κλειδιού ( public key certificate). Ο στόχος του πιστοποιητικού δημοσίου κλειδιού είναι η δημιουργία μιας σχέσης ταυτοποίησης μεταξύ του δημοσίου κλειδιού και του δικαιούχου του. Το πιστοποιητικό αναφέρει το δημόσιο κλειδί (το οποίο και είναι το αντικείμενο του πιστοποιητικού) και επιβεβαιώνει ότι το συγκεκριμένο πρόσωπο που αναφέρεται στο πιστοποιητικό είναι ο δικαιούχος του αντίστοιχου ιδιωτικού κλειδιού. Έτσι ο παραλήπτης που λαμβάνει ένα μήνυμα με ψηφιακή υπογραφή, μπορεί να είναι σίγουρος ότι το μήνυμα έχει σταλεί από το πρόσωπο που το υπογράφει.

Το ψηφιακό πιστοποιητικό, είναι στον ηλεκτρονικό κόσμο ότι είναι το διαβατήριο στο φυσικό κόσμο. Η συσχέτιση ενός δημοσίου κλειδιού με τον δικαιούχο του γίνεται με χρήση της ψηφιακής υπογραφής του Παρόχου Υπηρεσιών Πιστοποίησης, όπου ο Πάροχος με την ψηφιακή του υπογραφή, υπογράφει το πιστοποιητικό του δικαιούχου. Αν ένας χρήστης εμπιστεύεται έναν Πάροχο Υπηρεσιών Πιστοποίησης, εμπιστεύεται και το πιστοποιητικό που ο Πάροχος εκδίδει.

Ένας Πάροχος Υπηρεσιών Πιστοποίησης μπορεί να έχει πιστοποιήσει ή να έχει πιστοποιηθεί από έναν άλλον, στα πλαίσια μίας σχέσης εμπιστοσύνης. Αν ο χρήστης δεν γνωρίζει έναν Πάροχο και δεν ξέρει αν πρέπει να εμπιστευθεί ένα πιστοποιητικό που αυτός έχει εκδώσει, και ο Πάροχος αυτός έχει δημιουργήσει μία σχέση εμπιστοσύνης με έναν άλλο Πάροχο που ο χρήστης εμπιστεύεται, τότε ο χρήστης μπορεί να εμπιστευθεί τον πρώτο Πάροχο. Ο χρήστης, μπορεί να επαληθεύσει τη ψηφιακή υπογραφή του Παρόχου Υπηρεσιών Πιστοποίησης που έχει εκδώσει ένα ψηφιακό πιστοποιητικό, χρησιμοποιώντας το δημόσιο κλειδί του Παρόχου, για το οποίο (δημόσιο κλειδί) ένας άλλος Πάροχος Υπηρεσιών Πιστοποίησης μπορεί να έχει εκδώσει πιστοποιητικό κ.λπ.
[http://www.eett.gr/opencms/opencms/EETT/Electronic_Communications/DigitalSignatures/IntroEsign.html]

digital-certificate#ql:digital-certificate@cptIt#

recipient

sender

SPECIFIC

_SPECIFIC:
* economic-transaction#linkL#

WIDE AREA INFORMATION SERVICE {WAIS}

name::
* McsEngl.conceptIt394,
* McsEngl.internet-WAIS; pronounce'ways'@cptIt,
* McsEngl.internet'wais@cptIt394,
* McsEngl.wide-area-information-service@cptIt,

DEFINITION

Wide-area information services (WAISes) are a new type of information retrieval system that combine a structured user interface with underlying data-retrieval protocols to automatically collect, collate and integrate information from a variety of sources.
WAIS capabilities are likely to be added to existing on-line services in the future and will use a computer-to-computer approach to reduce the need for user interaction.
Any user with a machine running WAIS interface software will be able to present information to a server and exchange information with other users.
A WAIS directory is a server that supports a directory-services function; the local workstation maintains a directory entry that includes headers, ranks, subscription information and comments.
The WAIS protocol is an extension of the National Information Standards Organization (NISO) Z39-50 specification for defining an interface to remote information-retrieval services and library protocols.
Critical issues include controlling the extent of search expansion and developing retrieval technologies that are powerful enough to dispatch WAIS queries in a reasonable amount of time.
WAIS is a project of four groups:
Thinking Machines, the instigator, as a follow-on to its work with Dow Jones that created a text server for DowQuest (see Release 1.0, 1-88);
Dow Jones News Retrieval, a content supplier;
Apple Computer, focused on the interface; and
KPMG, a highly involved user.
The project leader is Brewster Kahle, a co-founder of Thinking Machine.

WAIS αποτελεί ένα πειραματικό σύστημα για να ανακαλεί πλήρη κείμενα απο διάφορες πηγές είτε τοπικα είτε μεσω servers σε άλλα δίκτυα.
[TELECOM (CGO), APR 1994, 47]

netCmr'human

name::
* McsEngl.netCmr'human@cptIt,

netCmr'human.SUPERVISOR

name::
* McsEngl.netCmr'human.SUPERVISOR@cptIt,
* McsEngl.conceptIt94,
* McsEngl.network-supervisor@cptIt,
* McsEngl.network'supervisor@cptIt94,
* McsElln.ΕΠΟΠΤΗΣ-ΔΙΚΤΥΟΥ@cptIt,

DEFINITION

SUPERVISOR. Το άτομο που έχει ευθύνη για τη συντήρηση του δικτύου. Ο επόπτης έχει δικαιώματα υψηλού επιπίδου.

netCmr'Implementation

name::
* McsEngl.netCmr'Implementation@cptIt,
* McsEngl.conceptIt96,
* McsEngl.network-implementation/installation@cptIt,
* McsEngl.network'implementation@cptIt96,
* McsElln.ΕΓΚΑΤΑΣΤΑΣΗ-ΔΙΚΤΥΟΥ@cptIt,
* McsElln.ΥΛΟΠΟΙΗΣΗ-ΔΙΚΤΥΟΥ@cptIt,

_DESCRIPTION:
Η καλύτερη προσέγγιση στην εγκατάσταση του δικτύου είναι να ξεκινήσεται με ένα μικρό δίκτυο και να το ελέγξετε και να το επεκτείνετε με μικρά βήματα.

netCmr'Importance#cptCore781#

name::
* McsEngl.netCmr'Importance@cptIt,

The electrification of society set the stage for the 20th century. Now, with the buillping of planetarywide computer networks, the stage is being set for the 21st century.
[Martin, 1990, xv#cptResource134]

netCmr'NIC

name::
* McsEngl.netCmr'NIC@cptIt,

NIC (Network Information Center) -- A NIC provides administrative support, user support, and information services for a network.

netCmr'operating-system ::this.part#cptIt119#

name::
* McsEngl.netCmr'operating-system ::this.part@cptIt,

netCmr'port

NAME

name::
* McsEngl.netCmr'port@cptIt,
* McsEngl.conceptItsoft1057,
* McsEngl.network-port@cptIt,
* McsEngl.network'port@cptItsoft1057,

DEFINITION

Ports
As a general (but far from absolute) rule each computer only has one Internet address. However, computers often need to communicate with more than one host at a time. For example, there may be multiple ftp sessions, a few web connections, and a chat program all running at the same time.

To make this possible the computer's network interface is logically subdivided into 65,536 different ports. This is an abstraction. A port does not represent anything physical like a serial or parallel port. However as data traverses the Internet in packets, each packet carries not only the address of the host but also the port on that host to which it's aimed. The host is responsible for reading the port number from each packet it receives to decide which program should receive that chunk of data.

If you like. you can think of the packets as letters sent via snail mail, the IP address like the street address. Then the port is the apartment or suite number. The routers that move packets from one location to another only worry about the street address. They don't have to read the port. Only the final destination has to do that.

On Unix systems you must be root to listen for connections on ports between 1 and 1023. Anyone can listen for connections on ports of 1025 to 65,535 as long as the port is not already occupied. (No more than one program can listen on a given TCP port at the same time.) However on Windows NT, Windows 95, and the Mac any user can listen to any port. No special privileges are required.

Any remote host can connect to a server that's listening on a port below 1024. Furthermore, multiple simultaneous connections may be made to a remote host on a remote port. for example, a high volume web server listening on port 80 may be processing several dozen connections at the same time, all connected to port 80.

In short, no more than one process on the local host can use a port at one time. However many remot hosts may connect to the same remote port.

Many services run on well-known ports. This means that the protocol specifies that the service should or must use a particular port. For example http servers generally listen on port 80. SMTP servers listen for connections on port 25. Echo servers listen on port 7. Discard servers listen on port 9. Not all services have a well-known port. For example, NFS allows the ports to be discovered at runtime.
Last Modified April 17, 1997 Copyright 1997 Elliotte Rusty Harold elharo@sunsite.unc.edu

netCmr'protocol#ql:cmnprl.device.computer#

name::
* McsEngl.netCmr'protocol@cptIt,

netCmr'resource

name::
* McsEngl.netCmr'resource@cptIt,

_ADDRESS.WPG:
* High-Performance Browser Networking
Ilya Grigorik
Copyright © 2013 Ilya Grigorik
http://chimera.labs.oreilly.com/books/1230000000545/index.html,

netCmr'socket

NAME

name::
* McsEngl.netCmr'socket@cptIt,
* McsEngl.conceptItsoft1029,
* McsEngl.network-socket@cptIt,
* McsEngl.socket@cptIt,
* McsEngl.socket.network@cptItsoft1029,

DEFINITION

A network socket is an endpoint of an inter-process communication flow across a computer network. Today, most communication between computers is based on the Internet Protocol; therefore most network sockets are Internet sockets.
A socket API is an application programming interface (API), usually provided by the operating system, that allows application programs to control and use network sockets. Internet socket APIs are usually based on the Berkeley sockets standard.
A socket address is the combination of an IP address and a port number, much like one end of a telephone connection is the combination of a phone number and a particular extension. Based on this address, internet sockets deliver incoming data packets to the appropriate application process or thread.
[http://en.wikipedia.org/wiki/Network_socket]

A socket is one end-point of a two-way communication link between two programs running on the network.
[Java Tutorial]

Sockets
Before data is sent across the Internet from one host to another using TCP/IP, it is split into packets of varying but finite size called datagrams. Datagrams range in size from a few dozen bytes to about 60,000 bytes. Anything larger than this, and often things smaller than this, needs to be spilt into smaller pieces before it can be transmitted. The advanatge is that if one packet is lost, it can be retransmitted without requireng redelivery of all other packets. Furthermore if packets arrive out of order they can be reordered at the receiving end of the connection.
However this is all transparent to the Java programmer. The host's native networking software transparently handles the splitting of data into packets on the sending end of a connection, and the reassembly of packets on the receiving end. Instead,the Java programmer is presented witha higher level abstraction called a socket. The socket represents a reliable connection for the transmission of data between two hosts. It isolates you from the details of packet encodings, lost and retransmitted packets, and packets that arrive out of order.
There are four fundamental operations a socket performs. These are:
 1.Connect to a remote machine
 2.Send data
 3.Receive data
 4.Close the connection
A socket may not be connected to more than one host at a time.
[April 17, 1997 Copyright 1997 Elliotte Rusty Harold elharo@sunsite.unc.edu ]

netCmr'security#cptIt288#

name::
* McsEngl.netCmr'security@cptIt,

netCmr'speed

name::
* McsEngl.netCmr'speed@cptIt,

ADSL:
* 2 Mbps, otenet, 2011.

{time.2006}:
* 10.000 Mbps ενσύρματα.
* 100 Mbps ασύρματα μέσω 802.11g και 802.11n
* 20 Mbps από τις πριζες της ΔΕΗ
[RAM 205, 2006.09, 75]

Η ΤΑΧΥΤΗΤΑ-ΜΕΤΑΦΟΡΑΣ με την οποία τα δεδομένα μεταφέρονται μέσω του δικτύου καθορίζονται απο
- την ταχύτητα της κάρτας NIC
- την ταχύτητα του διακομιστη αρχείων.
- την ταχύτητα των σταθμών εργασίας,
- την ταχύτητα των σκληρών δίσκων,
- τον αριθμό τωνν χρηστών.
και μετριέται σε bits/sec. From 0.5-20Mbits/sec.

netCmr'standard#ql:cmnprl@cptIt#

name::
* McsEngl.netCmr'standard@cptIt,

netCmr'topology

name::
* McsEngl.netCmr'topology@cptIt,
* McsEngl.conceptIt309,
* McsEngl.network-topology@cptIt,
* McsEngl.network'topology@cptIt309,
====== lagoGreek:
* McsElln.ΤΟΠΟΛΟΓΙΑ-ΔΙΚΤΥΟΥ@cptIt,
* McsElln.ΦΥΣΙΚΗ-ΣΥΝΔΕΣΗ-ΔΙΚΤΥΟΥ@cptIt,

ΑΚΤΙΝΩΤΑ ΔΙΚΤΥΑ

ΟΛΕΣ ΟΙ ΠΕΡΙΦΕΡΙΑΚΕΣ ΤΕΡΜΑΤΙΚΕΣ ΣΥΣΚΕΥΕΣ ΣΥΝΔΕΟΝΤΑΙ ΜΕ ΤΟΝ ΚΕΝΤΡΙΚΟ ΥΠΟΛΟΓΙΣΤΗ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 294#cptResource223]

ΔΙΚΤΥΑ ΒΡΟΧΟΥ/MESH

Ο ΚΑΘΕ ΣΤΑΘΜΟΣ ΕΙΝΑΙ ΣΥΝΔΕΔΕΜΕΝΟΣ ΜΕ ΤΟΥΣ ΑΛΛΟΥΣ ΜΕ ΔΥΟ ΤΟΥΛΑΧΙΣΤΟΝ ΔΡΟΜΟΥΣ ΚΑΙ ΜΕ ΤΕΤΟΙ ΤΡΟΠΟ ΠΟΥ ΝΑ ΚΛΕΙΝΟΥΝ ΒΡΟΧΟΥΣ.
ΧΡΗΣΕΙΣ:  ΣΥΝΔΕΣΗ ΤΗΛΕΠΙΚΟΙΝΩΝΙΑΚΩΝ ΚΟΜΒΩΝ ΜΕΤΑΞΥ ΤΟΥΣ.
ΑΞΙΟΛΟΓΗΣΗ:  ΔΙΝΟΥΝ ΤΗ ΔΥΝΑΤΟΤΗΤΑ ΕΠΙΛΟΓΩΝ ΕΝΑΛΛΑΚΤΙΚΗΣ ΔΡΟΜΟΛΟΓΗΣΗΣ, ΕΧΕΙ ΓΕΝΙΚΑ ΜΕΓΑΛΥΤΕΡΟ ΚΟΣΤΟΣ.

ΚΟΜΒΙΚΑ ΔΙΚΤΥΑ/NODAL/ΙΕΡΑΡΧΙΚΑ

ΕΙΝΑΙ Η ΣΥΝΔΕΣΗ ΠΟΛΛΩΝ ΑΚΤΙΝΩΤΩΝ ΣΕ ΕΝΑ ΔΙΚΤΥΟ ΣΠΟΝΔΥΛΙΚΗ ΣΤΗΛΗ, ΜΕ ΚΟΜΒΟΥΣ ΚΑΤΑΛΛΗΛΟΥΣ ΓΙΑ ΤΗ ΔΡΟΜΟΛΟΓΗΣΗ ΜΗΝΥΜΑΤΩΝ.
ΑΞΙΟΛΟΓΗΣΗ: ΜΕΙΩΝΟΥΝ ΤΟ ΚΟΣΤΟΣ ΤΩΝ ΝΟΙΚΙΑΣΜΕΝΩΝ ΓΡΑΜΜΩΝ ΚΑΤΑ ΠΟΛΥ ΟΠΩΣ ΦΑΙΝΕΤΑΙ ΚΑΙ ΑΠΟ ΤΗ ΜΕΧΡΙ ΣΗΜΕΡΑ ΠΡΑΚΤΙΚΗ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 296#cptResource223]

LAN TOPOLOGY

ΤΟΠΟΛΟΓΙΕΣ ΤΟΠΙΚΩΝ ΔΙΚΤΥΩΝ
 bus/ΚΟΙΝΟΥ ΔΡΟΜΟΥ
 daisy-chain, bus topology
 Linear bus/ ΓΡΑΜΜΙΚΟΣ ΔΙΑΥΛΟΣ
 Ring/ΔΑΚΤΥΛΙΟΣ
 star/ΑΣΤΕΡΑΣ, ΑΚΤΙΝΩΤΗ
 tree/ΔΕΝΔΡΟΕΙΔΗΣ
 ΚΑΤΑΝΕΜΗΜΕΝΟΣ ΑΣΤΕΡΑΣ

ΜΕ ΤΟΝ ΟΡΟ ΤΟΠΟΛΟΓΙΑ ΑΝΑΦΕΡΟΜΑΣΤΕ ΣΤΟΝ ΤΡΟΠΟ ΜΕ ΤΟΝ ΟΠΟΙΟ ΟΙ ΔΙΑΦΟΡΟΙ ΤΕΡΜΑΤΙΚΟΙ ΣΤΑΘΜΟΙ ΣΥΝΔΕΟΝΤΑΙ ΜΕΤΑΞΥ ΤΟΥΣ.

Υπάρχουν 3 βασικες τοπολογίες:
1. Διαύλου, bus
2. Αστεριού, star
3. Δακτυλίου, ring
Γενικά τα δίκτυα με τοπολογία διαύλου ή αστεριού μπορούν να καλύψουν μεγαλυτερες αποστάσεις.

netCmr'GENERIC

_GENERIC:
* netIt#cptItsoft451#
* network.information#cptCore624.4#
* systemItComputer#cptItsoft453#
(processing-tech#cptIt245#)

SPECIFIC

name::
* McsEngl.netCmr.specific@cptIt,

_SPECIFIC: netCmr.ALPHABETICALLY:
* Accunet
* ARPANET
* BIONET
* BITNET#cptItsoft209#
* central-management--network#cptItsoft301#
* centralized-CPU--net#cptItsoft259#
* centralizedNo-CPU--net#cptItsoft307#
* CREN#cptItsoft389#
* CYBERNET
* CYCLADES
* DepNet,
* EduNet#cptItsoft257#
* European-Information-Superhighway#cptItsoft5#
* Greek-Information-Superhighway#cptItsoft495#
* GUNET##
* HEALTHLINE##
* INTERNET#cptItsoft67#
* intranet##
* LAN#cptItsoft113# - Local Area Network
* MAN#cptItsoft110# - Metropolitan Area Network
* MILNET
* mixed-management--network
* NetWare-network
* non-central-management--network
* NREN#cptItsoft211# National research and education network
* NSFNET
* Telenet
* TUCC {TRIANGLE UNIVERSITIES COMPUTATION CENTER}
* trade-network##
* USA-information-superghiway#cptItsoft258#
* USSR-network##
* WAN#cptItsoft73# - Wide Area Network
* Windows-NT--network
* wire-network
* wireless-network#cptItsoft575#

netCmr.SPECIFIC-DIVISION.distance

name::
* McsEngl.netCmr.SPECIFIC-DIVISION.distance@cptIt,

_SPECIFIC:
* LAN#cptItsoft113# - Local Area Network
* MAN#cptItsoft110# - Metropolitan Area Network
* WAN#cptItsoft73# - Wide Area Network

netCmr.SPECIFIC-DIVISION.Cable

name::
* McsEngl.netCmr.SPECIFIC-DIVISION.Cable@cptIt,

_SPECIFIC:
* wire-network
* wireless-network#cptItsoft575#

netCmr.SPECIFIC-DIVISION.OS

name::
* McsEngl.netCmr.SPECIFIC-DIVISION.OS@cptIt,

_SPECIFIC:
* NetWare-network
* Windows-NT--network.

netCmr.SPECIFIC-DIVISION.CPU

name::
* McsEngl.netCmr.SPECIFIC-DIVISION.CPU@cptIt,

_SPECIFIC:
* centralized#cptItsoft259#
* decentralized#cptItsoft307#

netCmr.SPECIFIC-DIVISION.Management

name::
* McsEngl.netCmr.SPECIFIC-DIVISION.Management@cptIt,

_SPECIFIC:
* central-management--network#cptItsoft301#
* non-central-management--network
* mixed-management--network

netCmr.AGGREGATE#cptCore88#

name::
* McsEngl.netCmr.AGGREGATE@cptIt,

{time.1994}:
ΑΠΟ ΤΑ ΜΕΧΡΙ ΤΩΡΑ ΣΤΟΙΧΕΙΑ ΠΡΟΚΥΠΤΟΥΝ ΟΤΙ ΠΕΡΙΣΣΟΤΕΡΟ ΑΠΟ ΤΟ 50% ΤΩΝ ΣΥΣΤΗΜΑΤΩΝ ΠΑΓΚΟΣΜΙΩΣ ΘΑ ΣΥΝΔΕΟΝΤΑΙ ΣΕ ΔΙΚΤΥΑ ΕΩΣ ΤΟ ΤΕΛΟΣ ΤΟΥ ΧΡΟΝΟΥ.
[COMPUTER GO, JAN 1994, 66 LOTUS]

{time.1993}:
According to analyst Wood at the Business Research Group, 51% of all personal computers are networked, and 49% percent of all networks are interconnected to another network.
[BYTE, JUN 1993, 128]

{time.1975}:
ΥΠΗΡΧΑΝ ΠΕΡΙΣΣΟΤΕΡΑ ΑΠΟ 250 ΔΙΚΤΥΑ ΥΠΟΛΟΓΙΣΤΩΝ Σ'ΟΛΟ ΤΟΝ ΚΟΣΜΟ ΠΟΥ ΣΥΝΔΕΟΥΝ ΔΕΚΑΔΕΣ ή ΕΚΑΤΟΝΤΑΔΕΣ ΥΠΟΛΟΓΙΣΤΩΝ.
[ΔΗΜΗΤΡΙΟΥ 5, 1986, 221#cptResource168]

netCmr.access.PRIVATE (publicNo)

_CREATED: {2013-08-27}

name::
* McsEngl.netCmr.private,
* McsEngl.private-network,

_DESCRIPTION:
In the Internet addressing architecture, a private network is a network that uses private IP address space, following the standards set by RFC 1918 for IPv4 and RFC 4193 for IPv6. These addresses are commonly used for home, office, and enterprise local area networks (LANs), when globally routable addresses are not mandatory, or are not available for the intended network applications. Under Internet Protocol IPv4, private IP address spaces were originally defined in an effort to delay IPv4 address exhaustion, but they are also a feature of the next generation Internet Protocol, IPv6.

These addresses are characterized as private because they are not globally delegated, meaning they are not allocated to any specific organization, and IP packets addressed by them cannot be transmitted onto the public Internet. Anyone may use these addresses without approval from a regional Internet registry (RIR). If such a private network needs to connect to the Internet, it must use either a network address translator (NAT) gateway, or a proxy server.
[http://en.wikipedia.org/wiki/Private_network]

netCmr.access.PUBLIC (online)

_CREATED: {2015-08-16} {1994}

name::
* McsEngl.conceptIt372,
* McsEngl.netCmr.public,
* McsEngl.public-network,
* McsEngl.its.online, cptIt372
* McsEngl.network-online@cptIt372,
* McsEngl.OLISS,
* McsEngl.online information services ITS,
* McsEngl.online network,
* McsEngl.online-service@cptIt372,
* McsEngl.online-system@cptIt372,
* McsEngl.sysDataNetOnline@cptIt372, {2011-09-09}
* McsEngl.sysNetOnline@cptIt372, {2011-09-09}
* McsEngl.sysOnline@cptIt372, {2011-09-09}
* McsEngl.online ΠΛΗΡΟΦΟΡΗΣΗΣ ΣΥΣΤΗΜΑ,
* McsElln.ΟΝΛΑΙΝ ΣΠΤ,

netPbc'DEFINITION

Online Information Services System είναι ITS στο οποίο έχει πρόσβαση, με πληρωμή ή όχι, ο οποιοσδήποτε που θέλει να έχει κάποια 'πληροφοριακή υπηρεσία'.
[ΝΙΚΟΣ, ΙΟΥΝ 1994]

The terms "online" and "offline" have specific meanings in regard to computer technology and telecommunications. In general, "online" indicates a state of connectivity, while "offline" indicates a disconnected state. In common usage, "online" often refers to the Internet or the World Wide Web.

The concepts have however been extended from their computing and telecommunication meanings into the area of human interaction and conversation, such that even offline can be used in contrast to the common usage of online. For example, discussions taking place during a business meeting are "online" while issues that do not concern all participants of the meeting should be "taken offline" - continued outside of the meeting.
[http://en.wikipedia.org/wiki/Online]

netPbc'WHOLE

_WHOLE:
* sysData-network#cptItsoft21.4#

netPbc'Access-phone

name::
* McsEngl.netPbc'Access-phone@cptIt,

netPbc'Account|userID

name::
* McsEngl.netPbc'Account|userID@cptIt,
* McsEngl.online-system-account@cptIt,
* McsEngl.user-id@cptIt,
* McsElln.λογαριασμος@cptIt,

Είναι κωδικός χρήσης του συστήματος και είναι ξεχωριστός για καθέναν που επιθυμεί να συνδεθει με το δίκτυο.

Διευθύνσεις χρηστών στο σύστημα ή υπολογιστών.

netPbc'Budget#cptEconomy540.16#

name::
* McsEngl.netPbc'Budget@cptIt,

Ποσο κόστισε η κατασκευή του.

netPbc'Charge

name::
* McsEngl.netPbc'Charge@cptIt,

Οι internet providers συνήθως χρωώνουν 15 δολάρια (μέσος όρος παγκοσμίως) το μήνα, χωρίς έξτρα χρέωση για connect time.
[TELECOM, MAR. 1995, 30]

netPbc'ognCompany#cptEconomy7#

name::
* McsEngl.netPbc'ognCompany@cptIt,

QUERY#ql:([Level CONCEPT:rl?][Level level4:cptIt246-1 cptIt246])##viewItorg: function = online#

MAKER/PRODUCER

Ποιος κατασκεύασε το σύστημα.

VENDOR

Ποια εταιρία παρέχει τις υπηρεσίες.

netPbc'Conference#cptIt149#

name::
* McsEngl.netPbc'Conference@cptIt,

netPbc'Ccountry

name::
* McsEngl.netPbc'Ccountry@cptIt,

Χώρα στην οποία λειτουργεί.

netPbc'EVOLUTION#cptCore546.171#

name::
* McsEngl.netPbc'EVOLUTION@cptIt,

netPbc'Doing#cptCore475#

name::
* McsEngl.netPbc'Doing@cptIt,

online function#cptIt246-1#

e-mail:
μεταφορά μηνυμάτων.

file transfer
(μεταφορά κάθε είδους αρχείου)

information retrieval
(αναζήτηση πληροφοριών)

remote login:
(προσβαση σε άλλα συστήματα)

e-CONFERENCES:

CHAT ONLINE:

GAMES ONLINE

NEWSPAPER ONLINE

VIDEO ONLINE

netPbc'Host-speed

name::
* McsEngl.netPbc'Host-speed@cptIt,

2.400 bps to 14.000 bps.

netPbc'Management

name::
* McsEngl.netPbc'Management@cptIt,

netPbc'Node

name::
* McsEngl.netPbc'Node@cptIt,

Πόσεις συνδεσεις συστημάτων (δίκτυα, υπολογιστές) υπάρχουν στο δίκτυο.

netPbc'Protocol

name::
* McsEngl.netPbc'Protocol@cptIt,

netPbc'User

name::
* McsEngl.netPbc'User@cptIt,

Ποσοι χρησιμοποιούν το σύστημα.

SPECIFIC

name::
* McsEngl.netPbc.specific@cptIt,
* McsEngl.sysOnline.specific@cptIt,

_SPECIFIC: netPbc.Alphabetically:
* BBS#cptItsoft371#
* dialup##
* internet#cptItsoft67#
* real-time-services##
* text_based##
* video##
* videotex##

_SPECIFIC: netPbc.SPECIFIC_DIVISION.Technology:
* BBS#cptItsoft371#
* text_based##
* videotex##

_SPECIFIC: netPbc.SPECIFIC_DIVISION.Time_connected:
* dialup##
* real-time-services##

netPbc.ΒΕΠ-ΣΥΣΤΗΜΑ: GREECE

name::
* McsEngl.netPbc.ΒΕΠ-ΣΥΣΤΗΜΑ: GREECE@cptIt,

(ΒΙΟΤΕΧΝΙΚΟ ΕΠΙΜΕΛΗΤΗΡΙΟ ΠΕΙΡΑΙΑ)

netPbc.ΚΑΠΑ-ΤΕΛ: GREECE

name::
* McsEngl.netPbc.ΚΑΠΑ-ΤΕΛ: GREECE@cptIt,

videotex Access to databanks (MINITEL), Τηλ. 6898.405-6..

netPbc.ΜΝΗΜΗ-ΑΠΕ: GREECE

name::
* McsEngl.netPbc.ΜΝΗΜΗ-ΑΠΕ: GREECE@cptIt,

ΑΘΗΝΑΙΚΟ ΠΡΑΚΤΟΡΕΙΟ ΕΙΔΗΣΕΩΝ, ΧΡΟΝΟΧΡΕΩΣΗ ΚΑΙ ΜΗΝΙΑΙΑ ΣΥΝΔΡΟΜΗ, ΤΗΛ.3639815-8.. 100 ΔΡΧ ΑΝΑ ΛΕΠΤΟ ΑΝΑΖΗΤΗΣΗΣ, 100 ΔΡΧ ΓΙΑ ΚΑΘΕ ΣΕΛΙΔΑ ΕΚΤΥΠΩΣΗΣ, 10000 ΔΡΧ ΤΟ ΛΙΓΟΤΕΡΟ ΤΟ ΜΗΝΑ. ΠΟΛΙΤΙΚΗ, ΠΟΔΟΣΦΑΙΡΟ.

netPbc.ΣΕΓΜ-ΣΥΣΤΗΜΑ: GREECE

name::
* McsEngl.netPbc.ΣΕΓΜ-ΣΥΣΤΗΜΑ: GREECE@cptIt,

Συλλογος Ελληνικών Γραφείων μελετων. Το έφτιαξε η Compulink, έχει full text databases και χρησιμοποιεί το πρόγραμα "ΑΡΧΕΙΟΝ" για αναζητήσεις.

netPbc.ΤΕΕ-ΣΥΣΤΗΜΑ: GREECE

name::
* McsEngl.netPbc.ΤΕΕ-ΣΥΣΤΗΜΑ: GREECE@cptIt,

_DEFINITION: Η μεγαλύτερη τράπεζα πληροφοριών στον χώρο των επιστημών. Πληροφόρηση για την επαγγελματική νομοθεσία των μηχανικών, τις αμοιβές του κλάδου, την κοινοτική νομοθεσία, τη γενική πολεοδομική νομοθεσία, την τοπική πολεοδομική νομοθεσία, τη γενική τεχνική νομοθεσία, τα σχέδια πόλεων, τη φοροτεχνική νομοθεσία για μηχανικούς.
[ΒΗΜΑ, 3 ΙΟΥΛ. 1994, Δ15]
CHARGE:
VENDOR: ΤΕΕ, Τεχνικο επιμελητήριο ελλάδας.
USERS:
HISTORY:
BUDGET: 270 εκ. δρχ.
PRODUCER: Intrasoft, databank

netPbc.ΤΟΥΡΙΣΜΟΣ: GREECE

name::
* McsEngl.netPbc.ΤΟΥΡΙΣΜΟΣ: GREECE@cptIt,

Αυτοματοποιηση της διαθεσης του ΕΛΛΗΝΙΚΟΥ ΤΟΥΡΙΣΤΙΚΟΥ ΠΡΟΙΟΝΤΟΣ.
Θα συνδεσει τις κυριοτερες ελλ. τουριστικες επιχειρησεις ΜΕ ενα ευρυτατο δικτυο τουριστικων πρακτορων στο εξωτερικο και στην ελλαδα. Χρηματοδοτηθηκε απο το κοινοτικο προγραμμα STAR. Το ανελαβε η databank.
[βημα 3 Ιουλ 92]

netPbc.AMERICA-ONLINE: USA

name::
* McsEngl.netPbc.AMERICA-ONLINE: USA@cptIt,

(PC WORLD ONLINE)

netPbc.BBS

name::
* McsEngl.netPbc.BBS@cptIt,
* McsEngl.conceptIt371,
* McsEngl.BBS@cptIt371,
* McsEngl.Bulletin-Board-System@cptIt,
* McsEngl.sysNetOnline.BBS@cptIt,

DEFINITION

BBS is an ONLINE-SYSTEM#cptIt372.1# with few functions.
[NIKOS, MAR. 1995]

GENERIC

_GENERIC:
* synNet-online#cptIt372#

SOFTWARE that they use


SOCRATES
TOTAL COMMUNICATIONS SYSTEM
OPUS
THE BREAD BOARD SYSTEM
WILDCAT
RYBBS BULLETIN BOARD
PCBOARD
REMOTE ACCESS
SPITFIRE
GT POWER
QUICKBBS
FIDO
MAXIMUS
TAG BBS
IMAGE BBS
SIMPLEX
TELEGARD
REMOTE BULLETIN BOARD SYSTEM
AUNTIE
GALACTICOM
SUPER BBS
FEATHER
ULTRA BBS
CUSTOM OR UNKNOWN
RED RYDER

measure#cptCore88#

ΑΝΑ ΤΟΝ ΚΟΣΜΟ ΥΠΑΡΧΟΥΝ ΠΑΝΩ ΑΠΟ 15.000 ΗΛΕΚΤΡΟΝΙΚΑ BULLETIN BOARDS, ΣΤΗΝ ΕΛΛΑΔΑ ΥΠΑΡΧΟΥΝ ΠΕΡΙΠΟΥ 250.

SPECIFIC(greek)

 ACROBASE, 8231753

 AMAZING REMOTE, 8136778

 BIG BBS,

 DOORS BBS

 DRAGON BBS

 FORUM ON-LINE, 6450569 DEMO, 150 ΔΡΧ ΤΗΝ ΩΡΑ.

 GOLDEN BBS, Remote access v1.11, free

 LIGHT SPEED BBS, Remote access, FrontDoor

 MICRO-BBS, majorBBS v5.20

 NECTAR BBS, ultraBBS v2.08,

 ΟΝΝΕΔ BBS

 SILVERNET

 THE EAST BORDER BBS

 WARGAMES BBS

SPECIFIC(SUBJECT)

GENERAL INFORMATION,

MEDICAL INFORMATION,

netPbc.BIX: USA

name::
* McsEngl.netPbc.BIX: USA@cptIt,
* McsEngl.BIX@cptIt,

_DEFINITION: the system of the periodical BYTE.

CHARGE: $13 per month.

SERVICES: FREE access to INTERNET.

netPbc.BRS-INFORMATION-TECHNOLOGIES

name::
* McsEngl.netPbc.BRS-INFORMATION-TECHNOLOGIES@cptIt,

(INFOPRO TECHNOLOGIES 800.456.7248 703.442.0900)

netPbc.CIS (CHEMICAL INFORMATION SYSTEMS)

name::
* McsEngl.netPbc.CIS (CHEMICAL INFORMATION SYSTEMS)@cptIt,

800.CIS.USER 410.321.8440

netPbc.COMPULINK#cptIt58: attSpe# GREECE

name::
* McsEngl.netPbc.COMPULINK@cptIt,
* McsEngl.COMPULINK-online-its@cptIt,
* McsEngl.compulink@cptIt58,
* McsEngl.sysNetOnline.COMPULINK@cptIt,

DEFINITION

online information services. Πληρ. 924.1714
ΚΛΑΔΟΣ της COMPUPRESS AE.
ΜΕΛΟΣ του ΟΜΙΛΟΥ ΕΥΡΩΠΑΙΚΩΝ ΕΠΙΧΕΙΡΗΣΕΩΝ.
ADDRESS: Λ. Συγγρού 44, 11742 Αθήνα, Τηλ 924.1715 923.8672/5 φαξ 924.2219

HOST COMPUTER: COMPAQ SYSTEMPRO 486 32RAM
OPERATING SYSTEM: SCO UNIX
CONFERENCE SYSTEM: CoSy
RDBMS: ORACLE
MODEMS: 2400 & 9600 bps

GENERIC

_GENERIC:
* synNet-online#cptIt372#

ATTRIBUTES

COMPANY'INFORMATION#ql:[Group compulink]:IT-COMP.NFO# illp#
\clink\names:MEMBERS,
ΕΓΓΡΑΦΗ: ΡΑΠΤΗ 922.5520
ΓΡΑΜΜΕΣ
ΧΡΕΩΣΗ: 5.000 ΕΦΑΠΑΞ, 3.000 ΔΡΧ BASIC PACK, 2.000 INFOPACK, 2.000 GAMES, 6000 DRX FULL PACK. AYTA ΓΙΑ 2 ΩΡΕΣ ΤΗΝ ΗΜΕΡΑ. ΠΡΟΣΘΕΤΕΣ ΩΡΕΣ ΕΧΤΡΑ.
ΚΛΑΔΟΣ

Doing#cptCore475#


SERVICES:
 MAIN#cptIt378: attPar#    prompt= main:
 CONFERENCES#cptIt377: attPar#  prompt= read:
 EDITING#cptIt379: attPar#
 FILE'MANAGEMENT#cptIt380: attPar#
 MAIL#cptIt381: attPar#    prompt= mail:

GREEK STOCK MARKET

Πληροφορίες για το κλείσιμο των μετοχών ΧΑ, μισή ώρα μετά το κλείσιμο, Με προοπτική την online σύνδεση.
Πωλείται με το πακέτο InfoPack, 3000 δρχ το μήνα.
[ΚΑΘΗΜΕΡΙΝΗ, 14 ΜΑΙΟΥ 1995, 63]

WORLD NEWS

Η υπηρεσία αυτή είναι συνεργασία με το ηλεκτρονικό δίκτυο Clarinet, παρέχοντας σε συνεχή βάση πληροφορίες για χιλιάδες θέματα, ταξινομημένα ανά κατηγορία και ήπειρο. Βασίζεται στα Πρακτορεία Associated press, Reuters και ανανεώνεται κάθε μία ώρα.
Υπάρχει όμως και το NEWSBYTES πρακτορείο ειδικευμένο στην πληροφορική.
Πωλείται με το πακέτο InfoPack, 3000 δρχ το μήνα.
[ΚΑΘΗΜΕΡΙΝΗ, 14 ΜΑΙΟΥ 1995, 63]

ΗΛΕΚΤΡΟΝΙΚΗ ΒΙΒΛΙΟΘΗΚΗ

ΠΛΗΡΟΦΟΡΙΚΗ (computer για όλους, pixel, pc master, CAD/CAM & Graphics)
ΑΥΤΟΚΙΝΗΤΟ (4Τροχοι)
ΤΟΥΡΙΣΜΟΣ (Τουριστικη αγορα)
MANAGEMENT & ΟΙΚΟΝΟΜΙΑ ( Information)
OFFICE AYTOMATION (Συγχρονη Επιχειρηση)
ΒΙΒΛΙΟ (Βιβλιο & Media)

ON-LINE DATABASES

COMPUBANK:
ΤOURISMBANK: a database σε ORACLE.

ΓΡΑΜΜΕΣ

2.400 MNP5:
924.2218, 924.1478, 924.1518, 922.7606, 922.7625, 922.9128

9.600 MNP5:
924.2220, 924.2247, 924.2227, 924.1747

14.400 V.32bis MNP5:
924.4301-5

2.400 V.42bis MNP5:
924.4306-10

ΑΝΤΙ ΓΙΑ CLINK, DEMO.

ΧΡΕΩΣΗ

9.000 εφ'άπαξ, χρονοχρέωση.

netPbc.COMPUSERVE; USA

name::
* McsEngl.netPbc.COMPUSERVE; USA@cptIt,
* McsEngl.Compuserve@cptIt,

Αγόρασε το δικαίωμα χρήσης του Windows NT για περισότερα απο 100 συστήματα servers για 1,8 εκ. χρήστες σε όλο τον κοσμο.
[COMPUTER GO, MAY 1994, 27]

$8 per month, 1-614-457-0802, 614-457-082, 1-800-848-8199.

netPbc.DATASTAR

name::
* McsEngl.netPbc.DATASTAR@cptIt,

(800.221.7754 215.687.6777)

netPbc.DELPHI USA#attSpe#

name::
* McsEngl.netPbc.DELPHI USA@cptIt,
* McsEngl.conceptIt369,
* McsEngl.DELPHI@cptIt,
* McsEngl.delphi@cptIt369,
* McsEngl.sysNetOnline.DELPHI@cptIt,

DEFINITION

it is a GENERAL PURPOSE ONLINE INFORMATION SERVICES SYSTEM.
[ONLINE ACCESS, SEP 1993, 6]

GENERIC

_GENERIC:
* synNet-online#cptIt372#

CHARGE/ΧΡΕΩΣΗ:
- $10 per month for 4 hours, and $4 per additional hour.
- $20 per month for 20 hours, and $1.80 per additional hour.
- internet access: $3 per month.

COMPANY: GENERAL VIDEOTEX CORPORATION. CAMBRIDGE MASSACHUSSETS.

SERVICES:
 INTERNET CONNECTIVITY (1993)
 MODEM TO MODEM GAMING (1993)
 REALTIME CONFERENCING
 BULLETIN BOARD MESSAGING
 ELECTRONIC MAIL,
 SPECIAL INTEREST GROUPS.
 ONLINE SHOPPING,
 ENTERTAINMENT FEATURES
 REFERENCE DATABASES
 NEWS/WHETHER/SPORTS

USERS: 100.000.

MANAGEMENT

GENERAL MANAGER: Russel Williams.

netPbc.DIALOG: USA

name::
* McsEngl.netPbc.DIALOG: USA@cptIt,

netPbc.Dialup

name::
* McsEngl.netPbc.Dialup@cptIt,
* McsEngl.HISTORICAL-INFORMATION-SYSTEM@cptIt,

Συνήθως χρησιμοποιούν dialup συνδέσεις που χρησιμοποιούνται όταν αυτό απαιτείται.
Λειτουργούν σα βιβλιοθήκες.

netPbc.DOW-JONES-NEWS/RETRIEVAL

name::
* McsEngl.netPbc.DOW-JONES-NEWS/RETRIEVAL@cptIt,

netPbc.GEnie

name::
* McsEngl.netPbc.GEnie@cptIt,

Μεγάλο αμερικάνικο online σύστημα.

netPbc.HELLAS-ON-LINE {1994} GREECE (COMPUTER&SOFTWARE)#attSpe#

name::
* McsEngl.netPbc.HELLAS_ON-LINE {1994} GREECE (COMPUTER&SOFTWARE)@cptIt,
* McsEngl.conceptIt407,
* McsEngl.HELLAS-ON-LINE@cptIt,
* McsEngl.hellas'online@cptIt407,
* McsEngl.hol@cptIt407,
* McsEngl.hol@cptIt,
* McsEngl.sysNetOnline.HOL@cptIt,

DEFINITION

ΞΕΚΙΝΗΣΕ ΤΗ ΛΕΙΤΟΥΡΓΙΑ ΤΗΣ ΤΗΝ ΑΡΧΗ ΤΟΥ 1994.

GENERIC

_GENERIC:
* synNet-online#cptItsoft372#

doing

SERVICES:
 INTERNET in future.
 JOURNALS ON LINE:
   CHIP
   COMPUTER & SOFTWARE
   ΧΡΗΜΑ
 SOFTWARE DOWNLOANDIS (9 CD)

MEMBERS,

ΧΡΕΩΣΗ: 9.900 ΤΡΙΜΗΝΟ

ΓΡΑΜΜΕΣ

ΤΗΛΕΦΩΝΑ: 620.6001 620.6604. 620.1974-5ΦΩΝΗ.

ΔΙΑΘΕΤΕΙ 32 ΓΡΑΜΜΕΣ ΠΟΥ ΒΡΙΣΚΟΝΤΑΙ ΣΕ ΣΥΝΟΠΤΙΚΗ ΣΥΝΔΕΣΗ ΑΠΑΛΛΑΣΟΝΤΑΣ ΤΟΝ ΧΡΗΣΤΗ ΑΠΟ ΠΕΡΙΤΤΕΣ ΚΛΗΣΕΙΣ ΣΕ ΚΑΤΗΛΛΕΙΜΕΝΑ ΝΟΥΜΕΡΑ.
- ΣΕ ΚΑΘΕ ΓΡΑΜΜΗ ΑΠΑΝΤΑΕΙ ΕΝΑ ΜΟΝΤΕΜ 14.400bps.

netPbc.HELLASTEL videotex#attSpe#

name::
* McsEngl.netPbc.HELLASTEL videotex@cptIt,
* McsEngl.conceptIt150,
* McsEngl.HELLASTEL@cptIt,
* McsEngl.hellastel@cptIt150,
* McsEngl.sysNetOnline.HELLASTEL@cptIt,

_GENERIC:
* synNet-online#cptIt372#

EVOLUTION#cptCore546.171#

Εκτιμάται ότι λόγω της εμβέλειας του συστήματος, της ευκολίας προσπέλασης με ένα απλο τηλεφώνημα οπουδήποτε και άν βρίσκεται ο χρήστης, καθώς και των ελκυστικών τιμολογίων του, άλλα συστηματα που προσφέρουν την υπηρεσια VIDEOTEX στην Ελλάδα είτε θα παραμείνουν περιορισμένα σε τοπικό επίπεδο είτε θα ενταχθούν στο HELLASTEL.
[TELECOM, OCT 1994, 17]

Doing#cptCore475#

* παροχή οικονομικών πληροφοριών
* εμπορικες πληροφορίες
* αγροτικές πληροφορίες
* νομικές πληροφορίες
* electronic mail
* πληροφορίες καταλόγου
* καιρός
* δρομολόγια
* ψυχαγωγία
* προσωπική τραπεζα πληροφοριών

Θέλει να μιάσει του γαλικού MINITEL

netPbc.HRIN

name::
* McsEngl.netPbc.HRIN@cptIt,

netPbc.IBM-GLOBAL-NETWORK

name::
* McsEngl.netPbc.IBM-GLOBAL-NETWORK@cptIt,
* McsEngl.ibm-global-network@cptIt,
* McsEngl.ibm'globalNetwork@cptIt2004,
* McsEngl.IGN; since 1994@cptIt,
* McsEngl.IIN; IBM information network; the first name@cptIt,

_DESCRIPTION:
IBM GLOBAL NETWORK είναι ένα πλανητικών διαστάσεων επικοινωνιακό δίκτυο υπηρεσιών προστιθέμενης αξίας, με κόμβους σύνδεσης σε περισσότερες από 90 χώρες του κόσμου και η Ελλάδα.
[COMPUTER GO, FEB. 1995, 94]

doing

* FILE EXCHANGE

* HOST CONNECTIVITY:
σύνδεση μέσω του δικτύου και όχι με dialup γραμμές.

* INFORMATION PROVIDERS:
Database access.

* MAIL EXCHANGE:

* VALUE ADDED SERVICES:
EDI/information exchange application

* Πρόσβαση στο Internet.

STRUCTURE#cptCore518#

ΚΟΜΒΟΙ:
* 1996 ΦΕΒ: 700 πόλεις, 90 χώρες. ΑΘΗΝΑ, ΘΕΣΣΑΛΟΝΙΚΗ, ΚΥΠΡΟ.
[ΚΑΘΗΜΕΡΙΝΗ, 4 ΦΕΒ. 1996, 51]

* τέλη 1995: 450 σε 40 χώρες.
* ΜΑΙΟΣ 1995: 177 σε 21 χώρες,
[COMPUTER GO, MAY 1995, 123]

TRANSFER RATE#cptIt498#

2Mbps ο ευρωπαϊκός δακτύλιος.
256Kbps η σύνδεση της ελλάδας.
[ΚΑΘΗΜΕΡΙΝΗ, 4 ΦΕΒ. 1996, 51]

netPbc.INFOPRO-TECHNOLOGIES

name::
* McsEngl.netPbc.INFOPRO-TECHNOLOGIES@cptIt,

netPbc.INTERNET#cptIt67: attSpe# USA

netPbc.KNOWLEDGE-EXPRESS

name::
* McsEngl.netPbc.KNOWLEDGE-EXPRESS@cptIt,

netPbc.MEAD-NEXIS

name::
* McsEngl.netPbc.MEAD-NEXIS@cptIt,

netPbc.MICROSOFT-NETWORK

name::
* McsEngl.netPbc.MICROSOFT-NETWORK@cptIt,
* McsEngl.conceptIt496,
* McsEngl.marvel@cptIt,
* McsEngl.microsoft-network@cptIt,
* McsEngl.microsoft'network@cptIt496,

Marvel είναι παλαιότερο όνομά του.
[TELECOM, MAR. 1995, 30]

DEFINITION

MICROSOFT NETWORK είναι ΟΝΛΑΙΝ-ΣΥΣΤΗΜΑ#cptIt372.1# της Microsoft.

GENERIC

_GENERIC:
* synNet-online#cptIt372#

EVOLUTION#cptCore546.171#

ΘΑ είναι διαθέσιμο σε 35 χώρες και προσαρμοσμένο σε 20 γλώσσες, μέχρι το ΜΑΙΟ του 1995.
[TELECOM, MAR. 1995, 30]

netPbc.MINITEL videotex FRANCE#attSpe#

name::
* McsEngl.netPbc.MINITEL videotex FRANCE@cptIt,
* McsEngl.conceptIt197,
* McsEngl.MINITEL@cptIt,
* McsEngl.minitel@cptIt197,

_GENERIC:
* synNet-online#cptIt372#

SERVICE

ΣΗΜΕΡΑ (1992) ΥΠΑΡΧΟΥΝ ΠΑΝΩ ΑΠΟ 10.000 ΔΙΑΦΟΡΕΤΙΚΕΣ on line ΥΠΗΡΕΣΙΕΣ ΠΛΗΡΟΦΟΡΗΣΗΣ, ΠΟΥ ΛΕΙΤΟΥΡΓΟΥΝ ΣΕ ΙΔΙΩΤΙΚΑ ΣΥΣΤΗΜΑΤΑ ΚΕΝΤΡΙΚΩΝ ΥΠΟΛΟΓΙΣΤΩΝ ΚΑΙ ΕΙΝΑΙ ΔΙΑΘΕΣΙΜΕΣ ΜΕΣΩ ΤΟΥ minitel ΣΤΟΥΣ ΣΥΝΔΡΟΜΗΤΕΣ ΤΟΥ.

USER

ΧΡΗΣΙΜΟΠΟΙΕΙΤΑΙ ΑΠΟ ΠΕΡΙΣΣΟΤΕΡΟΥΣ ΑΠΟ 25 ΕΚ. ΑΝΘΡΩΠΟΥΣ (1992)..

netPbc.NATIONAL-LIBRARY-OF-MEDICINE (NLM): USA

name::
* McsEngl.netPbc.NATIONAL-LIBRARY-OF-MEDICINE (NLM): USA@cptIt,

800-638-8480

netPbc.NATIONAL-TECHNICAL-INFORMATION-SERVICE (NTIS)

name::
* McsEngl.netPbc.NATIONAL-TECHNICAL-INFORMATION-SERVICE (NTIS)@cptIt,

703.487.4650)

netPbc.NEWSNET

name::
* McsEngl.netPbc.NEWSNET@cptIt,

(800.345.1301, 215.527.8030)

netPbc.NEXUS

name::
* McsEngl.netPbc.NEXUS@cptIt,

netPbc.NVN {National Videotex Network}; USA

name::
* McsEngl.netPbc.NVN {National Videotex Network}; USA@cptIt,

AT&T $6 per month.

netPbc.ON-LINE-ACTION: GREECE

name::
* McsEngl.netPbc.ON-LINE-ACTION: GREECE@cptIt,

7500+ΦΠΑ ΕΤΗΣΙΑ, ΓΕΝΙΚΕΣ ΠΛΗΡΟΦΟΡΙΕΣ, 6444108.  ΙΔΡΥΘΗΚΕ 1988, 16000 ΜΕΛΗ,

netPbc.ORBIT

name::
* McsEngl.netPbc.ORBIT@cptIt,

netPbc.PEOPLE: JAPAN

name::
* McsEngl.netPbc.PEOPLE: JAPAN@cptIt,

SERVICES: Θελει να αναδειχτει 3 δικτυο στην ιαπωνια, μετα το PC-VAN of NEC and Nifty-serve of Fujitsu.
Θα προσφερει ειδησεις της εφημεριδας Asahi, the periodical Hanako, and internet access.
CHARGE:
VENDOR: IBM JAPAN SERVICES.

USERS: υπολογιζει να αποκτησει 100.000 μεχρι τελους του 1994.

HISTORY: JULY 1994

PRODUCER: IBM JAPAN.

netPbc.PRODIGY: USA

name::
* McsEngl.netPbc.PRODIGY: USA@cptIt,

netPbc.REAL-TIME

name::
* McsEngl.netPbc.REAL-TIME@cptIt,
* McsEngl.real-time-services-system@cptIt,
* McsEngl.real-time-online-system@cptIt372i,

For instance, a chess program designed to play in a tournament with a clock will need to decide on a move before a certain deadline or lose the game, and is therefore a real-time computation, but a chess program that is allowed to run indefinitely before moving is not.
[http://en.wikipedia.org/wiki/Real-time_system]

Για τη σύνδεση με τον host υπολογιστή χρησιμοποιούνται αρκετά δαπανηρές μισθωμένες γραμμές.

netPbc.Resource-ONE: GREECE

name::
* McsEngl.netPbc.Resource-ONE: GREECE@cptIt,

netPbc.TEXT-BASED

name::
* McsEngl.netPbc.TEXT-BASED@cptIt,

Οι περισσότερες επιστημονικές υπηρεσίες online πληροφόρησης παρέχουν τις πληροφορίες σε text based services μορφή, όπου ο συνδρομητής παίρνει τις πληροφορίες με τη φορφή ASCII κειμένου.

netPbc.VIDEO

name::
* McsEngl.netPbc.VIDEO@cptIt,

MARVEL:
MICROSOFT. ανακοίνωσε το νοέμβριο 1994 ότι θα δημιουργησει αυτο το δίκτυο.
[ΚΑΘΗΜΕΡΙΝΗ, ΔΕΚ. 1994, 63]

ORACLE:
ανακοίνωσε ότι θα δημιουργήσει αυτο το δίκτυο το δεκέμβριο 1994
[ΚΑΘΗΜΕΡΙΝΗ, ΔΕΚ. 1994, 63]

netPbc.VIDEOTEX

name::
* McsEngl.netPbc.VIDEOTEX@cptIt,

Τα videotex συστήματα παρέχουν τις πληροφορίες με τη μορφή προκατασκευασμένων σελίδων. Online access to databases with GRAPHICS USER INTERFACE.
ΟΙ ΣΕΛΙΔΕΣ ΛΑΜΒΑΝΟΝΤΑΙ ΑΠΟ ΤΟ ΧΡΗΣΤΗ ΜΕ ΤΗ ΒΟΗΘΕΙΑ ΕΙΔΙΚΟΥ ΤΕΡΜΑΤΙΚΟΥ.
ΤΟ ΕΛΛΗΝΙΚΟ TERMINAL 258/GRT ΕΙΝΑΙ ΑΠΟΤΕΛΕΣΜΑ ΤΗΣ ΣΥΝΕΡΓΑΣΙΑΣ ΤΟΥ ΓΑΛΛΙΚΟΥ ΟΜΙΛΟΥ ALCATEL ΜΕ ΤΗΝ ΕΛΛΗΝΙΚΗ ΗΛΕΚΤΡΟΝΙΚΗ ΒΙΟΜΗΧΑΝΙΑ ΑΝΚΟ ΑΕ.

ΑΞΙΟΛΟΓΗΣΗ: οι υπηρεσίες αυτές ενώ είναι αρκετά εύχρηστες και φιλικές, είναι ελάχιστα ευέλικτες και αρκετά ενοχλητικές για τον έμπηρο χρήστη που πρέπει να προχωρεί σελίδα-σελίδα για να βρει τις επιθυμητές πληροφορίες.
Χειρίζονται όμως καλύτερα πληροφορίες πολύ συγκεκριμένης δομής.
[TELECOM (CGO), APR 1994, 11]

netPbc.WESTLAW: USA

name::
* McsEngl.netPbc.WESTLAW: USA@cptIt,

(800.328.9352)

netCmr.chanel.OPTICAL

name::
* McsEngl.netCmr.chanel.OPTICAL@cptIt,

netCmr.SONET

name::
* McsEngl.netCmr.SONET@cptIt,
* McsEngl.conceptIt134,
* McsEngl.SONET@cptIt,
* McsEngl.sonet@cptIt134,
* McsEngl.synchronous-optical-network@cptIt,
* McsEngl.SDH@cptIt,

DEFINITION

SONET=SYNCHRONOUS OPTICAL NETWORK
* May form the basis of B-ISDN technology.
* First proposed by Bellcore in 1984, the STANDARD is currently under development by ANSI as SONET and by Europe's CCITT as SDH (Synchronous Digital Hierarchy).
* SPEED= 2,4 gbps, for MAN, WAN.

ADVANTAGES:
1. Rapid recovery from failure
2. Ability to combine and separate signals at many different bit rates.

IMPEMENTATIONS:
1. The first public SONET circuit was installed this year (1992) in a 5.5 mile loop around downtown Cincinati, Ohio.

protocol

Synchronous Optical Networking (SONET) and Synchronous Digital Hierarchy (SDH) are standardized protocols that transfer multiple digital bit streams synchronously over optical fiber using lasers or highly coherent light from light-emitting diodes (LEDs). At low transmission rates data can also be transferred via an electrical interface. The method was developed to replace the Plesiochronous Digital Hierarchy (PDH) system for transporting large amounts of telephone calls and data traffic over the same fiber without synchronization problems. SONET generic criteria are detailed in Telcordia Technologies Generic Requirements document GR-253-CORE.[1] Generic criteria applicable to SONET and other transmission systems (e.g., asynchronous fiber optic systems or digital radio systems) are found in Telcordia GR-499-CORE.[2]

SONET and SDH, which are essentially the same, were originally designed to transport circuit mode communications (e.g., DS1, DS3) from a variety of different sources, but they were primarily designed to support real-time, uncompressed, circuit-switched voice encoded in PCM format.[3] The primary difficulty in doing this prior to SONET/SDH was that the synchronization sources of these various circuits were different. This meant that each circuit was actually operating at a slightly different rate and with different phase. SONET/SDH allowed for the simultaneous transport of many different circuits of differing origin within a single framing protocol. SONET/SDH is not a communications protocol in itself, but a transport protocol.

Due to SONET/SDH's essential protocol neutrality and transport-oriented features, SONET/SDH was the obvious choice for transporting the fixed length Asynchronous Transfer Mode (ATM) frames also known as cells. It quickly evolved mapping structures and concatenated payload containers to transport ATM connections. In other words, for ATM (and eventually other protocols such as Ethernet), the internal complex structure previously used to transport circuit-oriented connections was removed and replaced with a large and concatenated frame (such as STS-3c) into which ATM cells, IP packets, or Ethernet frames are placed.
Racks of Alcatel STM-16 SDH add-drop multiplexers

Both SDH and SONET are widely used today: SONET in the United States and Canada, and SDH in the rest of the world. Although the SONET standards were developed before SDH, it is considered a variation of SDH because of SDH's greater worldwide market penetration. SONET is subdivided into four sublayer with some factor such as the path, line, section and physical layer.

The SDH standard was originally defined by the European Telecommunications Standards Institute (ETSI), and is formalized as International Telecommunication Union (ITU) standards G.707,[4] G.783,[5] G.784,[6] and G.803.[7][8] The SONET standard was defined by Telcordia[1] and American National Standards Institute (ANSI) standard T1.105.[8][9]
[https://en.wikipedia.org/wiki/Synchronous_optical_networking]

netCmr.CLIENT_SERVER

name::
* McsEngl.conceptIt261,
* McsEngl.CLIENT-SERVER-SYSTEM,
* McsEngl.client server architecture,
* McsEngl.client server computing,
* McsEngl.client server network,
* McsEngl.client server technology,
* McsEngl.network.ClientServer@cptIt261,
* McsEngl.DEDICATED SERVER NETWORK,
* McsEngl.SERVER BASED NETWORK,
* McsEngl.netCsr,

netCsr'DEFINITION

A client-server network is a central computer, also known as a server, which hosts data and other forms of resources. Clients such as laptops and desktop computers contact the server and request to use data or share its other resources with it.
What Is a Client-Server Network?
A client-server network is designed for end-users called clients to access resources (such as files, songs, video collections or some other service) from a central computer called a server. A server's sole purpose is to do what its name implies - serve its clients! You may have been using this configuration and not even have known it. Have you ever played Xbox Live or used the PlayStation Network? Your Xbox One is the client, and when it logs into the network, it contacts the Xbox Live servers to retrieve gaming resources like updates, video and game demos.
How Does It Work?
Imagine a customer sitting at a restaurant. The customer is waiting for the server to come by and take his or her order. The same rules apply in a client-server network - the client, which can be a laptop, desktop, a smart phone, or pretty much any computerized device, can request an order from the server.
The client uses the network as a way to connect with and speak to the server. Just as the customer speaks to the server to take his or her order, the client uses the network to send and receive communications about its order, or request. The server will take the request and will make sure that the request is valid. If everything checks out okay, then the server will fetch the request and serve the client.
Not all the time must the client request data from the server; the server can request an order from the client as well. If the server wants to check up on the status of the client, it will do so. The server may ask if it has received any security patches or if the client still needs resources from the server. If not, the server will tear down the connection in order to free up network traffic.
Can you imagine being a server sitting next to a customer who just stares at the menu without ordering anything? After 15 minutes of just sitting there, it would be a good idea for the server to leave to check on other customers. In this case, the server tears down its connection with the client and then moves on to serve other clients as needed.
[http://study.com/academy/lesson/what-is-a-client-server-network-definition-advantages-disadvantages.html]

netCsr'GENERIC

_GENERIC:
* sysHardSoft-net#cptIt21#


SUBSETS:
 CLIENT#cptIt78: attPar#
 SERVER#cptIt77: attPar#

MOSES#cptIt346: attPar#

client'server.SOFTWARE#cptIt345: attSpe#

netCsr'ADVANTAGES

name::
* McsEngl.netCsr'ADVANTAGES@cptIt,

If one machine goes down, your business stays up.

The system provides the power to get things done without monopolizing resources. End users are empowered to work locally.

By giving you more power for less money, the system offers you the flexibility to make other purchases or to increase your profits.

You can pick and choose hardware, software, and services from various vendors.

It's easy to modernize your system as your needs change.
[BYTE, JUN 1993, 100]

netCsr'DISADVATAGES

name::
* McsEngl.netCsr'DISADVATAGES@cptIt,

What Are the Drawbacks to the Client-Server Model?
The major drawback to the client-server model is that since all the resources are located on one server, this creates a single point of failure (SPF). An SPF means that if anything should happen to the server - such as a fried computer chip, a crashed hard drive that is not recoverable, or a major power outage that destroys the motherboard - then all the resources that were once hosted on that server will no longer be available.
[http://study.com/academy/lesson/what-is-a-client-server-network-definition-advantages-disadvantages.html]

Parts don't always work together. There are several possible culprits when something goes wrong.

with the client/server architecture, you locate or buillp SUPPORT TOOLS yourself.

Retraining required. The software development philosophy for the Mac or Windows is different from that for COBOL or C.
[BYTE, JUN 1993, 100]

netCsr'node.CLIENT

name::
* McsEngl.netCsr'node.CLIENT@cptIt,
* McsEngl.conceptIt78,
* McsEngl.network-client@cptIt,
* McsEngl.network'client@cptIt78,
====== lagoGreek:
* McsElln.πελάτης-δικτύου@cptIt,

DEFINITION

CLIENT: A computer or workstation attached to a network that you use to access network resources.
[BYTE, JUN 1993, 97]

Κάθε σταθμός στο δίκτυο είναι ένας συνιθισμένος προσ. υπολογιστης με το δικό του λειτουργικό σύστημα.

Καθε σταθμός περιέχει μια κάρτα διασύνδεσης.

Επιπλέον κάθε σταθμός τρέχει ένα ειδικό προγραμα, network shell, που του επιτρέπει να χρησιμοποιεί τα προγραμματα και τα αρχεία του διακομιστή σα να ήταν αποθηκευμένα στο δικό του δίσκο.
Το κέλυφος απλά προσθέτει λίγες ακόμη συναρτήσεις και λειτουργιες στο τοπικό λειτουργικό σύστημα.

netCsr.node.SERVER

name::
* McsEngl.netCsr.node.SERVER@cptIt,
* McsEngl.conceptIt77,
* McsEngl.computer.server@cptIt,
* McsEngl.SERVER-COMPUTER-SYSTEM@cptIt,
* McsEngl.network-server@cptIt,
* McsEngl.network'server@cptIt77,
====== lagoGreek:
* McsElln.ΔΙΑΚΟΜΙΣΤΗΣ@cptIt,
* McsElln.ΕΞΥΠΗΡΕΤΗΤΗΣ@cptIt,
* McsElln.ΣΕΡΒΙΤΟΡΟΣ@cptIt77,

DEFINITION

ΣΕΡΒΕΡ, ΕΙΝΑΙ ΚΑΘΕ ΜΗΧΑΝΗΜΑ ΠΟΥ ΕΧΕΙ ΚΑΠΟΙΟ ΠΡΟΓΡΑΜΜΑ ΠΟΥ ΠΑΡΕΧΕΙ ΠΛΗΡΟΦΟΡΙΕΣ.

SERVER: a machine that furnishes clients with such things as huge disk drives, databases, or connections to a network. Servers can be mainframes, minicomputers, large workstations, or LAN devices. More than one server can supply services to clients.
[BYTE, JUN 1993, 97]

Tρέχει το λειτουργικό σύστημα και διαχειρίζεται τη ροή των δεδομένων.
Οι σταθμοί εργασίας και τα κοινά περιφερειακά είναι συνδεδεμένα μαζί του.
Τα τρία σημαντικότερα πράγματα σε ένα σέρβερ είναι η ταχύτητα δίσκου, η ταχύτητα δίσκου, και η ταχύτητα δίσκου.

room

To περιβάλλον του φάιλ σέρβερ είναι εξαιρετικά σημαντικό. Η θερμοκρασία του δωματίου πρέπει να κυμαίνεται από 18 μέχρι 27 βαθμούς κελσίου και να υπαρχει άνετη κυκλοφορία του αέρα γύρω από το τροφοδοτικό.

SPECIFIC

_SPECIFIC:
* COMMUNICATION SERVER
* FILE SERVER

netCmr.cpu.CENTRALIZED

NAME

name::
* McsEngl.netCmr.cpu.CENTRALIZED@cptIt,
* McsEngl.conceptIt259,
* McsEngl.CENTRALIZED-NETWORK@cptIt,
* McsEngl.centralized-cpu-network@cptIt259, {2011-09-07}
* McsEngl.network.centralized@cptIt259,
* McsEngl.MULTIUSER-SYSTEM@cptIt,
====== lagoGreek:
* McsElln.ΣΥΓΚΕΝΤΡΩΤΙΚΟ-ΔΙΚΤΥΟ@cptIt,

DEFINITION

ΤΟΣΟ ΤΑ ΔΙΚΤΥΑ ΥΠΟΛΟΓΙΣΤΩΝ, ΟΣΟ ΚΑΙ ΤΑ ΠΟΛΥΧΡΗΣΤΙΚΑ ΣΥΣΤΗΜΑΤΑ ΚΑΝΟΥΝ ΚΑΤΑ ΒΑΣΙΝ ΤΑ ΙΔΙΑ ΠΡΑΓΜΑΤΑ. ΔΙΑΦΕΡΕΙ, ΟΜΩΣ, ΡΙΖΙΚΑ Ο ΤΡΟΠΟΣ ΜΕ ΤΟΝ ΟΠΟΙΟ ΕΚΤΕΛΟΥΝΤΑΙ ΟΙ ΔΙΑΦΟΡΕΣ ΕΡΓΑΣΙΕΣ...

ΑΥΤΗ ΕΙΝΑΙ Η ΠΡΩΤΟΕΜΦΑΝΙΖΟΜΕΝΗ ΙΣΤΟΡΙΚΑ ΠΡΑΚΤΙΚΗ ΟΠΟΥ Η ΒΑΣΙΚΗ ΕΠΕΞΕΡΓΑΣΙΑ, ΟΙ ΒΑΣΕΙΣ ΔΕΔΟΜΕΝΩΝ ΚΑΙ Η ΑΝΑΠΤΥΞΗ ΤΩΝ ΕΦΑΡΜΟΓΩΝ ΓΙΝΕΤΑΙ ΣΕ ΚΕΝΤΡΙΚΟ ΥΠΟΛΟΓΙΣΤΗ ΚΑΙ ΤΑ ΤΕΡΜΑΤΙΚΑ ΓΙΑ ΤΙΣ ΟΠΟΙΕΣ ΕΡΓΑΣΙΕΣ ΤΟΥΣ ΠΡΕΠΕΙ ΝΑ ΣΥΝΔΕΟΝΤΑΙ ΜΕ ΑΥΤΟΝ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 291#cptResource223]

GENERIC

_GENERIC:
* network.computer#cptIt21#

SPECIFIC

_SPECIFIC:
* LTSP#ql:ltsp-*#

measure#cptCore88#

H ΠΛΕΙΟΨΗΦΙΑ ΤΩΝ ΜΕΓΑΛΩΝ ΔΙΚΤΥΩΝ ΣΗΜΕΡΑ ΕΙΝΑΙ ΑΥΤΗΣ ΤΗΣ ΜΟΡΦΗΣ ΚΑΙ ΣΤΗ ΧΩΡΑ ΜΑΣ ΚΑΛΥΠΤΟΥΝ ΤΟ 99% ΤΩΝ ΜΕΓΑΛΩΝ ΕΦΑΡΜΟΓΩΝ ΜΕ ΕΚΤΕΤΑΜΕΝΑ ΔΙΚΤΥΑ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 292#cptResource223]

ADVANTAGE

ΕΝΔΕΙΚΝΥΝΤΑΙ ΓΙΑ ΕΡΓΑΣΙΕΣ ΠΟΥ ΕΧΟΥΝ ΝΑ ΚΑΝΟΥΝ ΤΗ ΔΙΑΧΕΙΡΙΣΗ (ΑΛΛΑ ΟΧΙ ΤΗ ΔΙΑΚΙΝΗΣΗ) ΜΕΓΑΛΟΥ ΟΓΚΟΥ ΠΛΗΡΟΦΟΡΙΩΝ, ΕΙΝΑΙ ΔΗΛΑΔΗ ΙΔΑΝΙΚΑ ΓΙΑ ΜΕΓΑΛΕΣ ΒΑΣΕΙΣ ΔΕΔΟΜΕΝΩΝ.
[RAM, ΜΑΡΤ 1993, ΕΝΘΕΤΟ 4]

ΤΑ ΣΥΓΚΕΝΤΡΩΤΙΚΑ ΔΙΚΤΥΑ ΔΙΑΤΗΡΟΥΝ ΑΚΟΜΑ ΤΗΝ ΑΙΓΛΗ-ΤΟΥΣ ΚΑΘΩΣ ΤΙΣ ΠΕΡΙΣΣΟΤΕΡΕΣ ΦΟΡΕΣ ΤΟ ΚΟΣΤΟΣ ΕΙΝΑΙ ΜΙΚΡΟΤΕΡΟ, ΕΧΟΥΝ ΣΥΓΚΕΝΤΡΩΜΕΝΟ ΤΟ ΕΞΕΙΔΙΚΕΥΜΕΝΟ ΠΡΟΣΩΠΙΚΟ, ΕΝΩ Η ΔΙΑΧΕΙΡΗΣΗ ΩΣ ΣΥΓΚΕΝΤΡΩΤΙΚΗ ΕΙΝΑΙ ΕΥΚΟΛΟΤΕΡΗ, ΦΘΗΝΟΤΕΡΗ ΚΑΙ ΑΠΟΔΟΤΙΚΟΤΕΡΗ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 293#cptResource223]

Relation-to-Decentrilzed

ΤΑ ΔΙΚΤΥΑ ΕΙΝΑΙ ΠΡΟΤΙΜΗΤΕΑ ΓΙΑ ΕΠΕΞΕΡΓΑΣΙΑ ΚΕΙΜΕΝΟΥ, ΚΑΤΑΡΤΙΣΗ ΦΥΛΛΩΝ ΕΡΓΑΣΙΑΣ.
* ΜΗ ΔΙΣΤΑΣΕΤΕ ΝΑ ΚΑΝΕΤΕ ΕΝΑ ΣΥΝΔΥΑΣΜΟ ΔΙΚΤΥΟΥ ΚΑΙ ΠΟΛΥΧΡΗΣΤΙΚΟΥ ΣΥΣΤΗΜΑΤΟΣ.
[RAM, ΜΑΡΤ 1993, ΕΝΘΕΤΟ 4]

netCmr.cpu.CENTRALIZED.NO

NAME

name::
* McsEngl.netCmr.cpu.CENTRALIZED.NO@cptIt,
* McsEngl.conceptIt307,
* McsEngl.distributed-network@cptIt,
* McsEngl.distributed-cpu-network@cptIt307,
* McsEngl.network.distributed@cptIt307,
* McsEngl.decentralized-network@cptIt,
* McsEngl.network.decentralized@cptIt308,
====== lagoGreek:
* McsElln.αποκεντρωμένο-δίκτυο@cptIt,
* McsElln.ΑΠΟΚΕΝΤΡΩΤΙΚΟ-ΔΙΚΤΥΟ@cptIt,
* McsElln.αποκεντρωτικό-δίκτυο@cptIt,
* McsElln.ΚΑΤΑΝΕΜΗΜΕΝΟ-ΔΙΚΤΥΟ@cptIt,

DEFINITION

ΤΟ ΚΑΤΑΝΕΜΗΜΕΝΟ ΔΙΚΤΥΟ ΑΠΟΤΕΛΕΙΤΑΙ ΑΠΟ ΠΟΛΛΕΣ ΥΠΟΛΟΓΙΣΤΙΚΕΣ ΜΟΝΑΔΕΣ ΜΕ ΤΑ ΠΕΡΙΦΕΡΕΙΑΚΑ ΤΟΥΣ ΓΕΩΓΡΑΦΙΚΑ ΣΥΓΚΕΝΤΡΩΜΕΝΑ ΣΕ ΕΝΑ ΣΗΜΕΙΟ.
Η ΚΑΘΕ ΥΠΟΛΟΓΙΣΤΙΚΗ ΜΟΝΑΔΑ ΑΝΑΛΑΜΒΑΝΕΙ ΜΕΡΟΣ ΤΟΥ ΟΛΟΥ ΦΟΡΤΟΥ ΓΙΑ ΤΑΧΥΤΕΡΗ ΚΑΙ ΑΠΟΔΟΤΙΚΟΤΕΡΗ ΕΠΕΞΕΡΓΑΣΙΑ. ΠΟΛΛΕΣ ΦΟΡΕΣ ΔΗΜΙΟΥΡΓΕΙΤΑΙ ΣΥΓΧΙΣΗ ΜΕΤΑΞΥ ΤΩΝ ΕΝΝΟΙΩΝ ΚΑΤΑΝΕΜΗΜΕΝΟ ΚΑΙ ΑΠΟΚΕΝΤΡΩΤΙΚΟ ΔΙΚΤΥΟ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 292#cptResource223]

ΑΠΟΤΕΛΕΙΤΑΙ ΑΠΟ ΥΠΟΛΟΓΙΣΤΙΚΕΣ ΜΟΝΑΔΕΣ ΓΕΩΓΡΑΦΙΚΑ ΔΙΕΣΠΑΡΜΕΝΕΣ ΚΑΘΩΣ ΚΑΙ ΑΠΟ ΤΕΡΜΑΤΙΚΕΣ ΜΟΝΑΔΕΣ ΓΥΡΩ ΑΠΟ ΤΟΥΣ ΥΠΟΛΟΓΙΣΤΕΣ.

Resource

_ADDRESS.WPG:
* {time.1997-12-19} Alessandro Panconesi. Lecture Notes in Theoretical Distributed Computing
[http://www.nada.kth.se/kurser/kth/2D5340/wwwbook/wwwbook.html]
* https://en.wikipedia.org/wiki/Quantum_Byzantine_agreement,
* https://en.wikipedia.org/wiki/Byzantine_fault_tolerance,

GENERIC

_GENERIC:
* network.computer#cptIt21#

SPECIFIC

Specific_concepts (level 3) =

1. LOOSLY COUPLED, ΧΑΛΑΡΗΣ ΣΥΖΕΥΞΗΣ, ΟΙ ΥΠΟΛΟΓΙΣΤΕΣ ΣΥΝΔΕΟΝΤΑΙ ΣΑΝ ΝΑ ΒΡΙΣΚΟΝΤΑΙ ΜΑΚΡΙΑ Ο ΕΝΑΣ ΑΠΟ ΤΟΝ ΑΛΛΟΝ.

2. TIGHTLY COUPLED, ΣΦΙΧΤΗΣ ΣΥΞΕΥΞΗΣ

Evaluation#cptCore546.107#

Advantage:
- ΑΥΞΗΜΕΝΗ ΕΦΕΔΡΙΚΟΤΗΤΑ

ΔΕΝ ΥΠΑΡΧΕΙ ΣΥΝΤΑΓΗ ΓΑΙ ΤΟ ΤΙ ΔΙΚΤΥΟ ΠΡΕΠΕΙ ΝΑ ΑΠΟΦΑΣΙΣΕΙ ΚΑΝΕΙΣ ΝΑ ΣΧΕΔΙΑΣΕΙ. ΟΙ ΣΥΓΚΕΚΡΙΜΕΝΕΣ ΑΠΑΙΤΗΣΕΙΣ ΕΙΝΑΙ ΑΥΤΕΣ ΠΟΥ ΘΑ ΜΑΣ ΚΑΘΟΔΗΓΗΣΟΥΝ ΣΤΗΝ ΕΠΙΛΟΓΗ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 293#cptResource223]

Disadvantage:
- ΔΥΣΚΟΛΙΑ ΔΙΑΧΕΙΡΙΣΗΣ ΤΟΥ ΟΛΟΥ ΣΥΣΤΗΜΑΤΟΣ, ΚΑΘΩΣ ΑΠΑΙΤΟΥΝΤΑΙ ΠΡΟΣ ΤΟΥΤΟ ΙΔΙΑΙΤΕΡΑ ΠΟΛΥΠΛΟΚΕΣ ΜΕΘΟΔΟΙ, ΜΗ ΤΥΠΟΠΟΙΗΜΕΝΕΣ ΜΕΧΡΙ ΣΤΙΓΜΗΣ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 292#cptResource223]

netCmr.CREN {1989-2003}

NAME

name::
* McsEngl.netCmr.CREN {1989-2003}@cptIt,
* McsEngl.conceptIt389,
* McsEngl.CREN@cptIt,
* McsEngl.cren@cptIt389,
* McsEngl.computer-research-and-education-network@cptIt,

DEFINITION

CREN -- Computer Research and Education Network is the new name for the merged computer networks, BITNET and Computer Science Network (CSNET). It supports electronic mail and file transfer.

The Corporation for Research and Educational Networking better known as CREN was a non-profit corporation originally composed of the higher education and research organizations participating in BITNET and CSNET. Its corporate name was adopted at the time of the merging of these two networks in 1989. CREN corporation had existed prior to that as a purely Bitnet body, and this would continue to be its dominant identity. (It discontinued CSNET services in 1991.) CREN supported the email-based services and applications that are a prominent feature of BITNET, and latterly a Public Key Infrastructure for Higher Education. In 2003, active CREN services were transitioned to other organizations and the corporation dissolved itself.
[http://en.wikipedia.org/wiki/Corporation_for_Research_and_Educational_Networking] 2011-09-07

GENERIC

_GENERIC:
* network.computer#cptIt21#

netCmr.BITNET

_CREATED: {1981-1989|2003}

name::
* McsEngl.netCmr.BITNET@cptIt,
* McsEngl.conceptIt209,
* McsEngl.BITNET@cptIt,
* McsEngl.bitnet@cptIt209,
* McsEngl.Because-It's-Time-NETwork@cptIt,

DEFINITION

BITNET was a cooperative USA university network founded in 1981 by Ira Fuchs at the City University of New York (CUNY) and Greydon Freeman at Yale University. The first network link was between CUNY and Yale.
[http://en.wikipedia.org/wiki/BITNET] {2011-09-07}

BITNET is a cooperative nework of over 2000 computers at over 300 institutions of higher education and research centers around the world. The constituents of this network are:
BITNET in the USA and Mexico,
EARN in Europe, and
AsiaNet in the Far-East.
Gateways connect BITNET to other networks such as
ARPANET,
CSNET,
JANET,
MAILNET,
UUCP.
[BITNET users guide, GWU SUMMER 1989]

It began as a single leased telephone line between the computer centers of the City University of New York and Yale University. It has developed into an international network of computer systems at over 800 institutions worldwide.

GENERIC

_GENERIC:
* network.computer#cptIt21#

FILE MANAGEMENT
INTERACTIVE MESSAGES,

VM'CMS#cptIt384: attSpe#

DEFINITION

_DESCRIPTION:
Ενα ΣΥΣΤΗΜΑ ΕΠΙΚΟΙΝΩΝΙΑΣ ΥΠΟΛΟΓΙΣΤΩΝ περιορισμενο σε όχι περισσότερο απο μερικά μίλια ΠΟΥ χρησιμοποιεί συνδέσεις υψηλής ταχύτητας 2/100 mbps.

netLan'GENERIC

_GENERIC:
* networkBroadcasting#cptItsoft50#

netLan'Doing#cptCore475#

name::
* McsEngl.netLan'Doing@cptIt,

1. Κοινή χρήση εκτυπωτών
2. Σύνδεση με mainframes
3. e-Mail

netLan'Hardware-connection

name::
* McsEngl.netLan'Hardware-connection@cptIt,

ΤΑ ΤΟΠΙΚΑ ΔΙΚΤΥΑ ΧΡΗΣΙΜΟΠΟΙΟΥΝ ΩΣ ΜΕΣΑ ΜΕΤΑΔΟΣΗΣ ΤΩΝ ΔΕΔΟΜΕΝΩΝ, ΤΑ ΚΟΙΝΑ ΜΕΣΑ ΤΕΤΑΔΟΣΗΣ ΤΩΝ ΤΗΛΕΠΙΚΟΙΝΩΝΙΑΚΩΝ ΣΗΜΑΤΩΝ, ΔΗΛΑΔΗ
- ΤΑ ΣΥΝΕΣΤΡΑΜΜΕΝΑ ΚΑΛΩΔΙΑ,
- ΤΑ ΟΜΟΑΞΟΝΙΚΑ ΚΑΛΩΔΙΑ,
- ΤΙΣ ΟΠΤΙΚΕΣ ΙΝΕΣ ΚΑΙ
- ΕΛΑΧΙΣΤΑ ΤΙΣ ΑΣΥΡΜΑΤΕΣ ΕΠΙΚΟΙΝΩΝΙΕΣ.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 457#cptResource223]
===
 Bridges#cptIt82: attPar#
 Routers#cptIt152: attPar#
 Gateways#cptIt83: attPar#
 FDDI#cptIt109: attPar#

netLan'measure#cptCore88#

name::
* McsEngl.netLan'measure@cptIt,

{time.1992}:
Υπάρχουν σήμερα περίπου 4.000.000 LANs εγκαταστημένα σ'όλο τον κόσμο.

netLan'Relation-to-WAN

name::
* McsEngl.netLan'Relation-to-WAN@cptIt,

Ο ΔΙΑΧΩΡΙΣΜΟΣ ΜΕΤΑΞΥ ΤΩΝ ΤΟΠΙΚΩΝ ΔΙΚΤΥΩΝ ΠΟΥ ΣΥΝΗΘΩΣ ΕΙΝΑΙ ΥΨΗΛΗΣ ΤΑΧΥΤΗΤΑΣ ΚΑΙ ΤΩΝ ΔΙΚΤΥΩΝ ΕΥΡΕΙΑΣ ΠΕΡΙΟΧΗΣ ΟΦΕΙΛΕΤΑΙ ΣΤΟ ΟΤΙ ΧΡΗΣΙΜΟΠΟΙΟΥΝ ΕΝΤΕΛΩΣ ΔΙΑΦΟΡΕΤΙΚΕΣ ΤΕΧΝΙΚΕΣ ΛΕΙΤΟΥΡΓΙΑΣ. ΧΡΗΣΙΜΟΠΟΙΟΥΝΤΑΙ
- ΔΙΑΦΟΡΕΤΙΚΟΙ ΤΡΟΠΟΙ ΠΡΟΣΠΕΛΑΣΗΣ ΤΗΣ ΠΛΗΡΟΦΟΡΙΑΣ,
- ΔΙΑΦΟΡΕΤΙΚΑ ΠΡΩΤΟΚΟΛΛΑ ΕΠΙΚΟΙΝΩΝΙΑΣ,
- ΔΙΑΦΟΡΕΤΙΚΟΙ ΤΥΠΟΙ ΔΙΑΣΥΝΔΕΣΕΩΝ,
- ΔΙΑΦΟΡΕΤΙΚΕΣ ΤΑΧΥΤΗΤΕΣ.

netLan'Standard

name::
* McsEngl.netLan'Standard@cptIt,


ΤΥΠΟΠΟΙΗΣΕΙΣ ΤΟΠΙΚΩΝ ΔΙΚΤΥΩΝ

ΔΙΑΔΙΚΑΣΙΕΣ ΕΛΕΓΧΟΥ ΟΡΘΟΤΗΤΑΣ ΜΕΤΑΔΟΣΗΣ ΠΛΗΡΟΦΟΡΙΑΣ


IEEE ΤΥΠΟΠΟΙΗΣΕΙΣ
   802.1
   802.2
   802.3
   802.4
   802.5
   802.6
   802.7
   802.8
   802.9
   10base5

netLan'Topology

name::
* McsEngl.netLan'Topology@cptIt,

BUS/ΔΙΑΥΛΟΣ

STAR/ΑΣΤΕΡΑ

netLan'Transfer-rate#cptIt498#

name::
* McsEngl.netLan'Transfer-rate@cptIt,

IBM: 16 Mbps, Token-ring

SPECIFIC

netLan.specific,

_SPECIFIC:
Client-Server lan##
Peer-to-Peer##
Zero-slot#cptIt260#
Apple-LAN#cptIt108#
ARCnet#cptIt76#
Ethernet#cptIt74#
Token-Ring#cptIt75#

netLan.APPLE

name::
* McsEngl.netLan.APPLE@cptIt,
* McsEngl.conceptIt108,
* McsEngl.APPLE-LAN@cptIt,
* McsEngl.APPLETALK@cptIt,
* McsEngl.LOCALTALK@cptIt,
* McsEngl.lan.apple@cptIt108,

DEFINITION

Ενα ΣΥΣΤΗΜΑ ΔΙΚΤΥΩΣΗΣ της Apple το οποιο μπορει να μεταφέρει δεδομένα σε ταχύτητα 230 kbps μέσω προστατευμένου twisted-pair καλωδίου. Υπερκαλύπτεται από τον όρο LocalTalk.

APPLETALK: ΤΟ ΛΟΓΙΣΜΙΚΟ ΤΗΣ APPLE ΠΟΥ ΧΡΗΣΙΜΟΠΟΙΕΙ ΤΟ HARDWARE LOCALTALK ΓΙΑ ΤΗΝ ΔΙΚΤΥΩΣΗ ΤΩΝ ΥΠΟΛΟΓΙΣΤΩΝ ΤΗΣ.

GENERIC

_GENERIC:
* lan#cptItsoft1004#

netLan.ARCnet

name::
* McsEngl.netLan.ARCnet@cptIt,
* McsEngl.conceptIt76,
* McsEngl.ARCnet@cptIt,
* McsEngl.arcnet@cptIt76,
* McsEngl.lan.arcnet@cptIt76,

DEFINITION

ΠΡΩΤΟΚΟΛΛΟ ΕΠΙΚΟΙΝΩΝΙΑΣ token-bus. ΕΠΙΣΗΜΟ ΠΡΩΤΥΠΟ ΤΟ IEEE 802.4, ΑΛΛΑ ΣΤΗΝ ΠΡΑΞΗ ΧΡΗΣΙΜΟΠΟΙΕΙΤΑΙ ΤΟ ARCnet.
Το στάνταρ αυτο ΔΕΝ είναι ένα ΙΕΕΕ στάνταρ, αλλά ένα αποδεκτό από τη βιομηχανία. Υπάρχουν πολλές εταιρείες που διαθέτουν υλικά συμβατά με τις προδιαγραφές του ARCnet που δημιουργήθηκαν από την Datapoint Corp., ώστε θα έχετε συνεχή υποστήριξη και αλληλοσυνεργασία.

GENERIC

_GENERIC:
* lan#cptItsoft1004#

distance

ΜΕ ΚΟΙΝΟ ΚΑΛΩΔΙΟ, ΠΡΟΒΛΕΠΟΝΤΑΙ ΜΕΓΙΣΤΕΣ ΑΠΟΣΤΑΣΕΙΣ ΤΗΣ ΤΑΞΗΣ ΤΩΝ 2.000 ΜΕΤΡΩΝ ΜΕ ΤΗ ΧΡΗΣΙΜΟΠΟΙΗΣΗ "ΕΝΕΡΓΩΝ ΟΜΦΑΛΩΝ" (ΟΜΦΑΛΩΝ ΜΕ ΕΝΙΣΧΥΤΕΣ) ΚΑΙ 100 ΜΕΤΡΩΝ ΜΕ ΑΠΛΟΥΣ ΟΜΦΑΛΟΥΣ.

evaluation

ΜΕΙΟΝΕΚΤΗΜΑΤΑ:
ΕΙΝΑΙ ΠΟΛΥ ΑΚΡΙΒΟΤΕΡΟ.
[ΣΕΜΙΝΑΡΙΟ ΓΕΝΑΡΗΣ 1994]
* ΤΟ ΠΙΟ ΣΗΜΑΝΤΙΚΟ ΕΙΝΑΙ ΟΤΙ ΔΥΣΛΕΙΤΟΥΡΓΟΥΝΤΕΣ ΚΟΜΒΟΙ ΜΠΟΡΟΥΝ ΝΑ ΑΝΑΣΤΑΤΩΣΟΥΝ ΤΟ ΔΙΚΤΥΟ.
* ΤΑΧΥΤΗΤΑ ΜΟΛΙΣ 2,5 Mbps.

ΠΛΕΟΝΕΚΤΗΜΑΤΑ:
1. Λογου της μικρής του ταχύτητας δέν είναι ευέσθητο σε εξωτερική ηλεκτρομαγνητική ακτινοβολία.
2. σχετικά φθηνο.

ΕΙΝΑΙ ΠΟΛΥ ΚΑΛΟ ΟΤΑΝ ΘΕΛΟΥΜΕ ΟΙ ΣΤΑΘΜΟΙ ΕΡΓΑΣΙΑΣ ΝΑ ΧΡΗΣΙΜΟΠΟΙΟΥΝ ΙΣΟΠΟΣΑ ΤΟ ΧΡΟΝΟ, ΚΑΙ Η ΑΠΟΚΡΗΣΗ ΝΑ ΕΙΝΑΙ ΚΑΤΩ ΑΠΟ ΔΟΣΜΕΝΟ ΧΡΟΝΟ.

netLan.ETHERNET

name::
* McsEngl.netLan.ETHERNET@cptIt,
* McsEngl.conceptIt74,
* McsEngl.ETHERNET-LAN@cptIt,
* McsEngl.lan.ethernet@cptIt74,

DEFINITION

ΕΙΝΑΙ ΑΠΟ ΤΑ ΠΡΩΤΑ ΤΟΠΙΚΑ ΔΙΚΤΥΑ, ΑΠΟΤΕΛΕΣΜΑ ΕΡΕΥΝΩΝ ΤΗΣ XEROX. ΠΡΟΣΦΕΡΕΙ ΥΨΗΛΟΥΣ ΡΥΘΜΟΥΣ ΜΕΤΑΔΟΣΗΣ 10Mbps, ΣΕ ΤΟΠΟΛΟΓΙΕΣ BUS ΜΕΣΩ ΟΜΟΑΞΟΝΙΚΟΥ ΚΑΛΩΔΙΟΥ, ΟΠΤΙΚΩΝ ΙΝΩΝ ΚΑΙ ΣΥΝΕΣΤΡΑΜΜΕΝΩΝ ΚΑΛΩΔΙΩΝ. Η ΤΕΧΝΙΚΗ ΠΡΟΣΠΕΛΑΣΗΣ ΕΙΝΑΙ CSMA/CD.

Η ΙΕΕΕ 802.3 περιγράφει ένα στάνταρ το οποίο χρωστα πολλά στο παλιότερο Ethernet σύστημα.

Το Ethernet ήταν μία από τις πρώτες αρχιτεκτονικές LAN. Αυτό το σχήμα καλωδίωσης και ανταλλαγής σημάτων δικτύων εμφανίσθηκε στην αγορά στα τέλη της δεκαετίας του 70 και είναι ακόμη ένα αξιοσέβαστο στανταρ.

GENERIC

_GENERIC:
* lan#cptItsoft1004#

ATTRIBUTE

ΕΞΩΠΛΙΣΜΟΣ
 CONTROLLER (CARD)
 TERMINATOR 50Ω (ΣΤΑ ΑΚΡΑ BUS)
 TRANCEIVER (CONNECTOR)
 ΚΑΛΩΔΙΟ ΠΟΥ ΕΝΩΝΕΙ CONTROLLER/TRANCEIVER
 ΟΜΟΑΞΩΝΙΚΑ ΚΑΛΩΔΙΑ 50Ω
ΚΑΛΩΔΙΩΣΗ
ΠΛΕΟΝΕΚΤΗΜΑΤΑ
ΤΟΠΟΛΟΓΙΑ

measure#cptCore88#

ΣΗΜΕΡΑ ΤΟ ΔΙΚΤΥΟ ΜΕ ΤΙΣ ΠΕΡΙΣΣΟΤΕΡΕΣ ΕΓΚΑΤΑΣΤΑΣΕΙΣ ΑΝΕΞΑΡΤΗΤΩΣ ΤΟΥ ΧΡΗΣΙΜΟΠΟΙΟΥΜΕΝΟΥ ΣΟΦΤΓΟΥΕΡ ΕΙΝΑΙ ΤΟ ETHERNET...ΑΠΟΤΕΛΩΝΤΑΣ ΕΥΚΟΛΗ ΚΑΙ ΟΙΚΟΝΟΜΙΚΗ ΕΠΙΛΟΓΗ.
[CHIP, JAN 1994, 116]

EVALUATION#cptCore546.107#

ΠΛΕΟΝΕΚΤΗΜΑΤΑ:
1. ΤΑΧΥΤΗΤΑ. Φθανει τα 10 megabits per second.

TRANSFER-RATE#cptIt498#

Το Ethernet θα αγγίξει το 1 Gigabit
Το Ethernet είναι το ευρύτερα χρησιμοποιούμενο πρωτόκολλο μεταφοράς δεδομένων σε τοπικά δίκτυα με ποσοστό μεγαλύτερο από 70%. Στην αρχική του υλοποίηση το πρωτόκολλο Ethernet υποστηρίζει ταχύτητα μεταφοράς δεδομένων 10 Mbps. Μία νεότερη υλοποίηση του πρωτοκόλλου, με την ονομασία Fast Ethernet, επέτρεψε τον δεκαπλασιασμό της ταχύτητας στα 100 Mbps. Πρόσφατα ανακοινώθηκε η τελευταία υλοποίηση του Ethernet, η οποία έχει ως στόχο ένα δεύτερο δεκαπλασιασμό της ταχύτητας.
[http://www.hol.gr/cgi-bin/handle/news/display.phtml?show=day&screen=all, 18 OKT. 1996]

ΑΠΟΣΤΑΣΗ ΣΤΑΘΜΩΝ

Σε ένα ethernet δίκτυο, ένα σήμα τυπικά ταξιδεύει μεχρι 1000 πόδια (333 μ).

H ΜΕΓΙΣΤΗ ΑΠΟΣΤΑΣΗ ΕΝΟΣ ΤΜΗΜΑΤΟΣ ΕΙΝΑΙ 500 ΜΕΤΡΑ.
Η ΑΠΟΣΤΑΣΗ ΚΑΘΕ ΣΤΑΘΜΟΥ ΑΠΟ ΤΟΝ TRANSCEIVER (ΣΥΝΔΕΣΗ ΜΕ ΤΟ BUS) 50 ΜΕΤΡΑ.

ΜΕΣΑ ΜΕΤΑΔΟΣΗΣ - ΚΑΛΩΔΙΩΣΗ

ΚΑΛΩΔΙΩΣΗ: Ομοαξονικό, διπλου αγωγου, οπτικές ίνες.

ΤΟΠΟΛΟΓΙΑ

ΤΟΠΟΛΟΓΙΑ: Δίαυλος, αστερα.

SPECIFIC

FAST ETHERNET

Ξεκίνησε η κίνηση το 1993. Η ταχύτητα μεταφοράς είναι 100Mbps.

10baseT

twisted pair ethernet. ΜΙΑ ΝΕΑ ΠΑΡΑΛΛΑΓΗ ΤΟΥ ETHERNET. ΧΡΗΣΙΜΟΠΟΙΕΙ ΓΙΑ ΜΕΣΟΝ ΔΙΣΥΡΜΑΤΑ ΚΑΛΩΔΙΑ ΚΑΙ ΕΧΕΙ ΔΥΝΑΤΟΤΗΤΕΣ ΕΠΙΣΗΣ 10Mbps.

10base2

thin wire ethernet. ΜΙΑ ΑΛΛΗ ΠΑΡΑΛΛΑΓΗ ΜΕ ΧΑΜΗΛΟΤΕΡΟΥ ΚΟΣΤΟΥΣ ΟΜΟΑΞΟΝΙΚΑ ΚΑΛΩΔΙΑ. ΜΕΓΙΣΤΟ ΜΗΚΟΣ ΓΙΑ ΚΑΘΕ ΤΜΗΜΑ 180 ΜΕΤΡΑ.

netLan.PEER-TO-PEER

name::
* McsEngl.netLan.PEER-TO-PEER@cptIt,
* McsEngl.conceptIt194,
* McsEngl.lan.PeerToPeer@cptIt194,
* McsEngl.network.peertopeer@cptIt194,
* McsEngl.peer-to-peer-lan@cptIt,
====== lagoGreek:
* McsElln.ΟΜΟΤΙΜΟ-ΔΙΚΤΥΟ@cptIt,

_GENERIC:
* p2p-network#ql:peer_to_peer_network@cptIt#

COST

ΜΙΑ ΛΥΣΗ ΧΑΜΗΛΟΥ ΚΟΣΤΟΥΣ ΑΝ ΠΡΟΚΕΙΤΑΙ ΓΙΑ 3/4 ΣΤΑΘΜΟΥΣ ΕΡΓΑΣΙΑΣ.

DISADVANTAGE

* ΜΙΑ ΣΥΧΝΗ ΠΡΟΣΒΑΣΗ ΣΕ ΜΙΑ ΒΑΣΗ ΔΕΔΟΜΕΝΩΝ, ΘΑ ΚΑΘΥΣΤΕΡΕΙ ΠΟΛΥ ΤΟ ΧΡΗΣΤΗ ΣΤΟ ΣΤΑΘΜΟ ΤΟΥ ΟΠΟΙΟΥ ΥΠΑΡΧΕΙ Η ΒΑΣΗ.

SUCCESS

ΤΟ NOVELL NETWARE LITE ΕΙΧΕ ΜΕΓΑΛΗ ΕΠΙΤΥΧΙΑ..

WINDOWS'NT:
ΤΟ ΛΕΙΤΟΥΡΓΙΚΟ ΑΥΤΟ ΣΥΣΤΗΜΑ ΑΠΕΥΘΥΝΕΤΑΙ, ΚΥΡΙΩΣ, ΣΕ ΟΜΟΤΙΜΑ ΔΙΚΤΥΑ ΠΕΡΙΟΡΙΣΜΕΝΟΥ ΕΥΡΟΥΣ ΚΑΙ ΔΕΝ ΜΠΟΡΕΙ ΝΑ ΑΝΤΑΓΩΝΙΣΤΕΙ ΤΑ ΜΕΓΑΛΑ ΔΙΚΤΥΑ
[COMPUTER ΓΙΑ ΟΛΟΥΣ, ΦΕΒ 1993 (DIRECTOR OF SMC)]

ZERO'SLOT'NETWORK

name::
* McsEngl.ZERO'SLOT'NETWORK@cptIt,

* ΤΑ ΟΜΟΤΙΜΑ ΔΙΚΤΥΑ EXOYN ΑΡΚΕΤΑ ΥΨΗΛΟΤΕΡΟΥΣ ΡΥΘΜΟΥΣ ΔΙΑΜΕΤΑΓΩΓΗΣ.

netLan.TOKEN-RING

name::
* McsEngl.netLan.TOKEN-RING@cptIt,
* McsEngl.conceptIt75,
* McsEngl.lan.TokenRing@cptIt75,
* McsEngl.token-ring-lan@cptIt,

DEFINITION

ΕΙΝΑΙ ΕΝΑ ΙΣΧΥΡΟ ΤΟΠΙΚΟ ΔΙΚΤΥΟ ΤΗΣ IBM ΤΑΧΥ ΚΑΙ ΜΕ ΜΕΓΑΛΕΣ ΔΥΝΑΤΟΤΗΤΕΣ ΕΠΕΚΤΑΣΗΣ. ΑΝΗΚΕΙ ΣΤΗΝ ΤΟΠΟΛΟΓΙΑ ΔΑΚΤΥΛΙΟΥ. Η ΜΕΘΟΔΟΣ ΠΡΟΣΠΕΛΑΣΗΣ ΕΙΝΑΙ token passing ΟΠΩΣ ΠΡΟΣΔΙΟΡΙΖΕΤΑΙ ΑΠΟ ΤΗΝ ΤΥΠΟΠΟΙΗΣΗ 802.5 ΤΗΣ IEEE.
[ΑΛΕΞΟΠΟΥΛΟΣ-ΚΑ, 1992, 478#cptResource223]
===
ΕΙΝΑΙ ΕΝΑ ΠΡΩΤΟΚΟΛΛΟ ΕΠΙΚΟΙΝΩΝΙΑΣ.
To καλύπτει η προδιαγραφή ΙΕΕΕ 802.5.
ΣΗΜΑΙΝΕΙ...IBM.

GENERIC

_GENERIC:
* lan#cptItsoft1004#

ATTRIBUTE#cptCore780#

ΑΠΟΣΤΑΣΗ
ΕΞΟΠΛΙΣΜΟΣ
adapter card (για καθε σταθμο)
MAU {Multistation Access unit}
ΜΕΙΟΝΕΚΤΗΜΑΤΑ
ΠΛΕΟΝΕΚΤΗΜΑΤΑ
ΣΤΑΘΜΟΙ
ΤΑΧΥΤΗΤΑ

ΑΠΟΣΤΑΣΗ:
Σε ένα Token-Ring σύστημα ένα σήμα ταξιδεύει μεχρι περίπου 600 πόδια (200 μ).
- Η ΜΕΓΙΣΤΗ ΑΠΟΣΤΑΣΗ MAU ΚΑΙ ΣΤΑΘΜΟΥ ΕΙΝΑΙ 100 ΜΕΤΡΑ.

ΜΕΙΟΝΕΚΤΗΜΑΤΑ:
* Σε σχέση με το ARCnet, είναι ακριβό.

ΠΛΕΟΝΕΚΤΗΜΑΤΑ:
* ΣΕ ΔΙΚΤΥΑ ΠΟΥ ΔΙΑΚΙΝΟΥΝ ΜΕΓΑΛΟΥΣ ΟΓΚΟΥΣ ΔΕΔΟΜΕΝΩΝ.

ΣΤΑΘΜΟΙ

ΣΥΝΔΕΕΙ 72 ΣΤΑΘΜΟΥΣ ΟΤΑΝ ΧΡΗΣΙΜΟΠΟΙΟΥΜΕ ΔΙΣΥΡΜΑΤΑ ΚΟΙΝΑ ΤΗΛΕΦΩΝΙΚΑ ΚΑΛΩΔΙΑ ΚΑΙ 260 ΣΤΑΘΜΟΥΣ ΜΕ ΘΩΡΑΚΙΣΜΕΝΑ ΤΗΛΕΦΩΝΙΚΑ ΚΑΛΩΔΙΑ.
ΣΕ ΚΑΘΕ MAU ΣΥΝΔΕΟΝΤΑΙ 8 ΣΤΑΘΜΟΙ.

ΤΑΧΥΤΗΤΑ: 4 ή 16 mbps.

netLan.ZERO-SLOT

name::
* McsEngl.netLan.ZERO-SLOT@cptIt,
* McsEngl.conceptIt260,
* McsEngl.lan.ZeroSlot@cptIt260,
* McsEngl.zero-slot-lan/network@cptIt,
* McsEngl.zero'slot'lan@cptIt260,
* McsElln.ΔΙΚΤΥΑ-ΜΗΔΕΝΙΚΗΣ-ΘΥΡΑΣ-ΕΠΕΚΤΑΣΕΩΣ@cptIt,

DEFINITION

Zero-slot or RS-232 LAN
A Local Area Network utilizing the communication ports of the workstations (COM1, COM2, etc.) and RS-232 cabling is referred to as a zero-slot or RS-232 LAN.
The term zero-slot derives from the fact that the LAN set-up does not depend on network interface cards, which take up an expansion slot in the PC workstation.
These type of LANs allow for the transfer of files several hundred feet and to share expensive peripherals but will always perform slower than LANs with network interface cards.
Examples of RS-232 LANs:
EasyLAN, LANlink, IDEAshare, ManyLink
[SOURCE: PC-GLOSSARY 1993]

ΔΙΚΤΥΑ ΜΗΔΕΝΙΚΗΣ ΘΥΡΑΣ ΕΠΕΚΤΑΣΗΣ ΟΝΟΜΑΖΟΥΝ ΚΑΤ' ΕΥΦΗΜΙΣΜΟΝ ΤΗ ΣΥΝΔΕΣΗ ΔΥΟ ΥΠΟΛΟΓΙΣΤΩΝ ΜΕΣΩ ΤΗΣ ΘΥΡΑΣ ΣΕΙΡΑΣ ή ΠΑΡΑΛΛΗΛΙΑΣ ΚΑΙ ΕΠΙΤΡΕΠΕΙ ΤΗ ΜΕΤΑΦΟΡΑ ΑΡΧΕΙΩΝ.
[RAM, ΜΑΡΤ 1993, ΕΝΘΕΤΟ 14]

GENERIC

_GENERIC:
* lan#cptItsoft1004#

netLan.ΕΜΠ

name::
* McsEngl.netLan.ΕΜΠ@cptIt,

Ενα από τα 500 καλύτερα του κόσμου.
[ΝΕΑ, 25 ΙΟΥΝ. 1994, 11]

ΔΗΜΙΟΥΡΓΙΑ: 1994.
[ΝΕΑ, 25 ΙΟΥΝ. 1994, 11]

ΚΟΣΤΟΣ: 400 ΕΚ. ΔΡ., 84 από ΓΓΕΤ και 316 απο την Επιτροπή Ερευνών του ΕΜΠ.
[ΝΕΑ, 25 ΙΟΥΝ. 1994, 11]

ΣΥΝΔΕΣΕΙΣ: Αριάνδη (δημόκριτου), Πανεπιστήμιο Κρήτης, Internet, Silicon graphics system,
[ΝΕΑ, 25 ΙΟΥΝ. 1994, 11]

netCmr.distance.MAN (metropolitan-area)

NAME

name::
* McsEngl.netCmr.distance.MAN (metropolitan-area)@cptIt,
* McsEngl.conceptIt110,
* McsEngl.MAN@cptIt,
* McsEngl.man-network@cptIt110,
* McsEngl.Metropolitan-Area-Network@cptIt,
* McsEngl.network.man@cptIt110,
====== lagoGreek:
* McsElln.ΑΣΤΙΚΟ-ΔΙΚΤΥΟ@cptIt,
* McsElln.δίκτυο.αστικό@cptIt,
* McsElln.δίκτυο.μητροπολιτικό@cptIt,

DEFINITION

Ενα δημόσιο υψηλης ταχύτητας δίκτυο 100 ή μεγαλύτερο mbps με δυνατότητα επικοινωνιών φωνης και δεδομένων σε ακτίνα 40/80 χιλιομέτρων.
ΠΡΩΤΟΕΜΦΑΝΙΣΤΗΚΑΝ ΤΟ 1990, ΚΑΙ ΔΕΝ ΞΕΠΕΡΝΟΥΝ ΤΑ ΣΥΝΟΡΑ ΜΙΑΣ ΠΟΛΗΣ. ΤΑ ΔΙΚΤΥ ΑΥΤΑ ΑΝΑΠΤΥΣΣΟΝΤΑΙ ΞΕΠΕΡΝΩΝΤΑΣ ΤΟΥΣ ΠΕΡΙΟΡΙΣΜΟΥΣ ΣΕ ΤΑΧΥΤΗΤΑ ΚΑΙ ΑΠΟΣΤΑΣΗ ΤΩΝ ΤΟΠΙΚΩΝ ΔΙΚΤΥΩΝ.

GENERIC

_GENERIC:
* network.computer#cptIt21#

netCmr.distance.WAN (wide-area)

NAME

name::
* McsEngl.netCmr.distance.WAN (wide-area)@cptIt,
* McsEngl.conceptIt73,
* McsEngl.network.wan@cptIt73,
* McsEngl.WAN@cptIt,
* McsEngl.wan@cptIt73,
* McsEngl.WIDE-AREA-NETWORK@cptIt,
====== lagoGreek:
* McsElln.δίκτυο.ευρυζωνικό@cptIt,
* McsElln.ευρυζωνικό-δίκτυο@cptIt,
* McsElln.ΔΙΚΤΥΟ-ΕΥΡΕΙΑΣ-ΠΕΡΙΟΧΗΣ@cptIt,
* McsElln.ΔΙΚΤΥΟ-ΕΥΡΕΙΑΣ-ΖΩΝΗΣ@cptIt,

DEFINITION

ΕΚΤΕΙΝΟΝΤΑΙ ΣΕ ΕΥΡΕΙΑ ΓΕΩΓΡΑΦΙΚΗ ΠΕΡΙΟΧΗ ΑΣΤΙΚΗ ΚΑΙ ΥΠΕΡΑΣΤΙΚΗ, ΦΕΥΓΟΝΤΑΣ ΑΠΟ ΤΑ ΣΤΕΝΑ ΠΛΑΙΣΙΑ ΕΝΟΣ ΣΥΓΚΕΚΡΙΜΕΝΟΥ ΧΩΡΟΥ.
ΠΑΡΑΔΕΙΓΜΑΤΑ ΤΕΤΟΙΩΝ ΔΙΚΤΥΩΝ ΕΙΝΑΙ ΤΑ ΔΙΑΦΟΡΑ ΤΡΑΠΕΖΙΚΑ ΔΙΚΤΥΑ ΠΟΥ ΕΚΤΕΙΝΟΝΤΑΙ ΣΕ ΟΛΗ ΤΗΝ ΕΛΛΑΔΑ ΚΑΙ ΔΙΕΘΝΩΣ, ΤΑ ΤΩΝ ΑΕΡΟΠΟΡΙΚΩΝ ΕΤΑΙΡΙΩΝ, ΤΑ ΔΗΜΟΣΙΑ ΔΙΚΤΥΑ ΔΕΔΟΜΕΝΩΝ ΚΛΠ.

ΤΑ ΠΕΡΙΣΣΟΤΕΡΑ ΕΛΛΗΝΙΚΑ ΔΙΚΤΥΑ ΕΙΝΑΙ ΣΥΓΚΕΝΤΡΩΤΙΚΑ, ΔΗΛΑΔΗ ΔΙΑΣΥΝΔΕΟΥΝ ΑΠΟΜΑΚΡΥΣΜΕΝΕΣ ΤΕΡΜΑΤΙΚΕΣ ΘΕΣΕΙΣ ΕΡΓΑΣΙΑΣ ΜΕ ΕΝΑΝ ΚΕΝΤΡΙΚΟ ΥΠΟΛΟΓΙΣΤΗ (MAINFRAME-HOST) ΠΟΥ ΥΠΑΡΧΕΙ ΣΤΟ ΜΗΧΑΝΟΓΡΑΦΙΚΟ ΚΕΝΤΡΟ ΤΗΣ ΕΤΑΙΡΙΑΣ.

GENERIC

_GENERIC:
* network.computer#cptIt21#

KEY ISSUES

BANDWIDTH, PROTOCOLS, MANAGEMENT, CULTURES.

ΔΙΑΧΕΙΡΙΣΗ

NMS {Network Management System} ΕΙΝΑΙ ΤΟ ΚΛΕΙΔΙ ΓΙΑ ΤΗΝ ΕΠΙΤΥΧΗ ΔΙΑΧΕΙΡΙΣΗ ΤΟΥ ΔΙΚΤΥΟΥ. ΑΠΑΡΑΙΤΗΤΗ ΕΙΝΑΙ Η ΚΕΝΤΡΙΚΗ ΔΙΑΧΕΙΡΙΣΗ ΤΟΥ ΔΙΚΤΥΟΥ. ΤΟ NMS ΕΞΥΠΗΡΕΤΕΙΤΑΙ ΑΠΟ ΕΝΑΝ ΑΝΕΞΑΡΤΗΤΟ ΥΠΟΛΟΓΙΣΤΗ ΠΟΥ ΜΠΟΡΕΙ ΝΑ ΕΙΝΑΙ ΕΝΑ ΓΡΗΓΟΡΟ PC or MINI.

ΔΙΑΧΕΙΡΙΣΗ ΤΗΛΕΦΩΝΙΚΩΝ ΓΡΑΜΜΩΝ.

ΔΙΑΧΕΙΡΙΣΗ ΕΠΙΚΟΙΝΩΝΙΑΚΩΝ ΚΟΜΒΩΝ. ΠΡΕΠΕΙ ΝΑ ΜΠΟΡΟΥΝ ΝΑ ΠΡΟΓΡΑΜΜΑΤΙΖΟΝΤΑΙ ΚΕΝΤΡΙΚΑ.

ΕΞΑΠΛΩΣΗ

ΔΕΝ ΕΚΤΙΜΑΤΑΙ ΟΤΙ Η ΕΛΛΗΝΙΚΗ ΑΓΟΡΑ ΘΑ ΕΙΝΑΙ ΤΟΥΛΑΧΙΣΤΟΝ ΓΙΑΥΤΟ ΤΟ ΧΡΟΝΟ ΣΗΜΑΝΤΙΚΗ. ΤΑ ΔΙΚΤΥΑ ΠΟΛΛΑΠΛΩΝ SERVER, KAI ΓΕΝΙΚΟΤΕΡΑ ΕΥΡΕΙΑΣ ΖΩΝΗΣ, ΕΙΝΑΙ ΠΑΡΑ ΠΟΛΥ ΛΙΓΑ ΣΤΗΝ ΕΛΛΑΔΑ.

ΚΟΜΒΟΙ

ΑΠΟΜΑΚΡΥΣΜΕΝΟΙ ΣΥΓΚΕΝΤΡΩΤΕΣ (REMOTE CONCENTRATORS): ΕΙΝΑΙ ΣΥΜΒΑΤΟΙ ΜΟΝΟ ΜΕ ΕΞΟΠΛΙΣΜΟ ΤΟΥ ΚΑΤΑΣΚΕΥΑΣΤΟΥ ΤΟΥ MAINFRAME.

ΚΟΜΒΟΙ ΣΤΑΤΙΣΤΙΚΗΣ ΠΟΛΥΠΛΕΞΗΣ: ΣΥΝΑΝΤΩΝΤΑΙ ΣΗΜΕΡΑ ΣΤΙΣ ΠΕΡΙΣΣΟΤΕΡΕΣ ΕΦΑΡΜΟΓΕΣ.
[ΛΑΓΟΓΙΑΝΝΗΣ, 1992, 223#cptResource228]

Χ.25, ΤΕΛΕΥΤΑΙΑ ΧΡΗΣΙΜΟΠΟΙΟΝΤΑΙ

ΜΕΛΛΟΝ: ΚΑΘΩΣ ΟΙ ΚΟΜΒΟΙ Χ.25 ΕΙΝΑΙ ΣΗΜΑΝΤΙΚΑ ΦΘΗΝΟΤΕΡΟΙ ΑΝΑΜΕΝΕΤΑΙ ΝΑ ΑΝΤΙΚΑΤΑΣΤΗΣΟΥΝ ΤΟΥΣ ΑΛΛΟΥΣ.
[ΛΑΓΟΓΙΑΝΝΗΣ, 1992, 224#cptResource228]

ΜΕΣΑ.ΜΕΤΑΔΟΣΗΣ

name::
* McsElln.ΜΕΣΑ.ΜΕΤΑΔΟΣΗΣ@cptIt,

ΧΡΗΣΙΜΟΠΟΙΟΥΝ ΣΗΜΕΡΑ ΣΧΕΔΟΝ ΑΠΟΚΛΕΙΣΤΙΚΑ ΜΙΣΘΩΜΕΝΑ ΤΗΛΕΦΩΝΙΚΑ ΚΥΚΛΩΜΑΤΑ ΤΟΥ ΟΤΕ. 4-ΣΥΡΜΑΤΕΣ ΓΡΑΜΜΕΣ. M1020 of CCITT.
[ΛΑΓΟΓΙΑΝΝΗΣ, 1992, 222#cptResource228]

ΚΟΣΤΟΣ ΓΡΑΜΜΩΝ: ΑΡΚΕΤΑ ΥΨΗΛΟ. ΠΧ ΑΘΗΝΑ/ΘΕΣΣΑΛΟΝΙΚΗ 2.500.000 ΔΡΧ/ΕΤΟΣ.
[ΛΑΓΟΓΙΑΝΝΗΣ, 1992, 222#cptResource228]

ΜΕΛΛΟΝ: ΟΙ ΑΝΑΛΟΓΙΚΕΣ ΓΡΑΜΜΕΣ ΘΑ ΑΝΤΙΚΑΤΑΣΤΑΘΟΥΝ ΜΕ ΨΗΦΙΑΚΑ ΚΥΚΛΩΜΑΤΑ ΥΨΗΛΟΤΕΡΗΣ ΤΑΧΥΤΗΤΑΣ (64-128kbps) ΠΟΥ ΘΑ ΠΡΟΣΦΕΡΕΙ ΤΟ ΥΠΟ ΕΓΚΑΤΑΣΤΑΣΗ ΝΕΟ ΨΗΦΙΑΚΟ ΔΙΚΤΥΟ ΤΟΥ ΟΤΕ (HELLASCOM).
[ΛΑΓΟΓΙΑΝΝΗΣ, 1992, 224#cptResource228]

ΠΡΩΤΟΚΟΛΛΑ

BSC 2780
BSC 3270
Burroughs Poll-Select
Honeywell-Bull VIP 7700-7800
NCR Polled Asynchronous
UNISCOPE 100/200/400
SNA/SDLC, IBM
X.25

ΜΕΛΛΟΝ: Η ΧΡΗΣΗ ΤΟΥ X.25, ΠΟΥ ΕΧΕΙ ΚΑΛΥΤΕΡΟΥΣ ΧΡΟΝΟΥΣ ΑΠΟΚΡΙΣΗΣ, ΚΑΙ ΥΠΟΣΤΗΡΙΖΕΤΑΙ ΑΠΟ ΤΑ ΤΟΠΙΚΑ ΔΙΚΤΥΑ ΠΟΥ ΘΑ ΑΝΤΙΚΑΤΑΣΤΗΣΟΥΝ ΤΟΥΣ ΣΥΓΚΕΝΤΡΩΤΕΣ ΤΕΡΜΑΤΙΚΩΝ (CLUSTER CONTROLLERS)

ΤΑΧΥΤΗΤΑ

ΤΥΠΙΚΕΣ ΤΙΜΕ ΣΕ WAN EINAI 9600 bps, ΕΝΩ ΣΕ LAN EINAI 10 Mbps.
Μπορείτε να αγοράσετε υπηρεσίες σε οποιαδήποτε ταχύτητα, αλλά ταχύτητες των 56000 και 64000 bps ειναι οικονομικές.

ΧΡΗΣΗ

Συνήθως συνδέουν πόλεις.

IMPORTANCE#cptCore781#

Τα δίκτυα ευρείας ζώνης αποτελούν βασική συνιστώσα της τηλεπικοινωνιακής υποδομής του μέλλοντος.
[1994]

"Companies that succed in the 1990s will be the ones that bring their staff, suppliers, customers, and business partners into direct contact. Massively distributed information systems can eliminate many levels of cumbersome bureaucracy an let the gbusiness respond quickly and flexibly to emerging opportunities"
[BYTE, Dec 1993, 78 J.Tibbetts B.Bernstein]

MODEMS

MODEMS:
V.26     2.400 bps
V.27     4.800
V.29     9.600
V.32     9.600 2σύρματη
V.32bis  14.400 2σύρματη
V.33    14.400

SPECIFIC

Specific_concepts (level 3) =

WIRELESS WAN

netCmr.distance.WORLD

name::
* McsEngl.netCmr.distance.WORLD@cptIt,
* McsEngl.global-netCmr@cptIt,
* McsEngl.netCmr.global@cptIt,

netCmr.NCS

name::
* McsEngl.netCmr.NCS@cptIt,
* McsEngl.ncs@cptIt2007,
* McsEngl.netware-connect-services@cptIt,

_DESCRIPTION:
NCS είναι ένα ΠΑΓΚΟΣΜΙΟ ΔΙΚΤΥΟ που θα συνδέσει 1 δισ. χρήστες την επομενη δεκαετία που θέλει να χτίσει η Novell με την AT&T.
[COMPUTER GO, APRIL 1995, 99]

Doing

Εχουν στόχο τη δημιουργία της υποδομής που θα επιτρέψει τη σύνδεση οποιασδήποτε συσκευής λειτουργεί με υπολογιστή στο δίκτυό τους. Θέλουν οι πελάτες τους να βασίζονται σε αυτό όπως βασίζονται σήμερα στο τηλεφωνικό δίκτυο. Η τηλεόραση και τα τηλεφωνήματα θα γίνονται μέσα από το δίκτυο.
[COMPUTER GO, APRIL 1995, 99]

orgProducing

Novell, AT&T.

netCmr.doing.NaaS

name::
* McsEngl.netCmr.doing.NaaS@cptIt,
* McsEngl.NaaS@cptIt,
* McsEngl.network-as-a-service@cptIt,

_DESCRIPTION:
Network as a service (NaaS) describes services for network transport connectivity.[1] NaaS involves the optimization of resource allocations by considering network and computing resources as a unified whole.[2]

Contents

1 Description
2 Providers
3 References
4 See also

Description

The term "Network as a service" (NaaS) is often used along with other marketing terms like cloud computing, along with acronyms such as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and Connectivity-as-a-Service (CaaS).[1][3]

NaaS sometimes includes the provision of a virtual network service by the owners of the network infrastructure to a third party.[4] Often this includes network virtualization using a protocol such as OpenFlow.[5]

Some service models are:[1][5]

Virtual Private Network (VPN): Extends a private network and the resources contained in the network across networks like the public Internet. It enables a host computer to send and receive data across shared or public networks as if it were a private network with the functionality and policies of the private network.[6]

Bandwidth on demand (BoD): Technique by which network capacity is assigned based on requirements between different nodes or users. Under this model link rates can be dynamically adapted to the traffic demands of the nodes connected to the link.[7][8]

Mobile network virtualization: Model in which a telecommunications manufacturer or independent network operator builds and operates a network (wireless, or transport connectivity) and sells its communication access capabilities to third parties (commonly mobile phone operators) charging by capacity utilization.[9] A mobile virtual network operator (MVNO), is a mobile communications services provider that does not own the radio spectrum or wireless network infrastructure over which it provides services. Commonly a MVNO offers its communication services using the network infrastructure of an established mobile network operator.[10]

Fujitsu used the term in 2007 for a product named FENICS.[11]
[https://en.wikipedia.org/wiki/Network_as_a_service]

netCmr.doing.TRADE

name::
* McsEngl.netCmr.doing.TRADE@cptIt,

_SPECIFIC:
* INTERACTIVE-TRADENET-SYSTEM#cptIt494#

netCmr.Interactive-TradeNet-System

name::
* McsEngl.netCmr.Interactive-TradeNet-System@cptIt,
* McsEngl.conceptIt494,
* McsEngl.interactive'tradenet'system@cptIt494,
* McsEngl.interactive-tradenet-system@cptIt,

ognCompany#cptEconomy7#

Το συμβούλιο εμπορικής ανάπτυξης της ΣΥΓΚΑΠΟΥΡΗΣ.

FUNCTION

electronic trade. Κάθε διαδικασία που αφορά εισαγωγές και εξαγωγές, κάθε εμπορική πράξη θα εισάγεται σᾳυτό το δίκτυο, στο οποίο θα είναι συνδεδεμένοι όχι μόνον οι εμπορικοί οίκοι της χώρας, αλλά και οι κυβερνητικές υπηρεσίες, τα λιμάνια, τα αεροδρόμια, τα τελωνεία, οι τράπεζες και οι κάθε λογής χρηματοπιστωτικοί οργανισμοι, με στόχο κάθε διαδικασία να ολοκληρώνεται το πολύ μέσα σε 2-3 λεπτά.
[ΚΑΘΗΜΕΡΙΝΗ, 8 ΙΑΝ. 1995, 40]

IMPLEMENTATION#cptIt96#

Αναμένεται να αρχίσει τη λειτουργία του στο τέλος του χρόνου.

netCmr.EduNet

_CREATED: {2002-01-14}

NAME

name::
* McsEngl.netCmr.EduNet@cptIt,
* McsEngl.conceptIt257,
* McsEngl.edunet@cptIt257,
* McsElln.ΠΑΝΕΛΛΗΝΙΟ-ΔΙΚΤΥΟ-ΓΙΑ-ΤΗΝ-ΕΚΠΑΙΔΕΥΣΗ@cptIt,

DEFINITION

GENERIC

_GENERIC:
* network.computer#cptIt21#

ARCHITECUTE

Στηρίζεται στην οικογένεια δικτυακών προτοκόλλων TCP/IP. Ο σχεδιασμός του προβλέπει την υλοποίηση ιεραρχικής δομής που αποτελείται από:
- δίκτυο κορμού
- δίκτυο διανομής
- δίκτυο πρόσβασης.

ognCompany#cptEconomy7#

ΦΟΡΕΑΣ ΕΚΤΕΛΕΣΗΣ:
ΕΚΠΑ Εθνικό και Καποδιστριακό Πανεπιστήμιο Αθηνών.

ΣΥΝΕΡΓΑΖΟΜΕΝΟΙ ΦΟΡΕΙΣ ΥΛΟΠΟΙΗΣΗΣ:
- Δ/νση Σπουδών Δ/μιας Εκπ ΥΠΕΠΘ
- ΙΤΥ
- ΕΠΙΣΕΥ Ερευνητικό Πανεπιστημιακό Ινστιτούτο Συστημάτων Επικ.-Υπολογιστών
- ΑΕΙ και ΤΕΙ του GUnet.

SPECIFIC

EVOLUTION#cptCore546.171#

*2006:
Να ολοκληρωθεί το Intranet της Εκπαίδευσης.

2000-2006:
Στο πλαίσιο του Γ' ΚΠΣ καλείται να πραγματώσει τους στόχους της ΚΟΙΝΩΝΙΑΣ ΤΗΣ ΠΛΗΡΟΦΟΡΙΑΣ στον χώρο της εκπαίδευσης.

1999.05:
Ξεκίνησε το έργο. Αποτέλεσε οριζόντια δράση του ΕΠΕΑΕΚ Α' σχετικά με την υλοποίηση και λειτουργία της δικτυακής υποδομής και των υπηρεσιών τηλεματικής για την κάλυψη των αναγκών των εκπαιδευτικών και των διοικητικών μονάδων του.

netCmr.GUNet

_CREATED: {1998-03-02}

name::
* McsEngl.netCmr.GUNet@cptIt,
* McsEngl.conceptIt2034,
* McsEngl.gunet@cptIt2034,
* McsEngl.greek-university-network@cptIt,

_DESCRIPTION:
Πώς τα 18 ΑΕΙ και τα 14 ΤΕΙ της χώρας οργανώνουν το «ηλεκτρονικό αρχείο» τους και βαδίζουν μαζί στη λεωφόρο της Κοινωνίας των Πληροφοριών Το πανεπιστημιακό διαδίκτυο «τρέχει» Ποια πειραματικά προγράμματα είναι στα σκαριά


Κ. ΧΑΛΒΑΤΖΑΚΗΣ ΠΛΟΥΣΙΟΤΕΡΟ κατά 366.300.000 σελίδες έγινε τη νύχτα της περασμένης Τρίτης το «ηλεκτρονικό αρχείο» των ελληνικών πανεπιστημίων, το οποίο «καθοδηγείται» από το Κέντρο Διαχείρισης Δικτύων του Εθνικού Μετσόβιου Πολυτεχνείου. Φυσικά δεν πρόκειται για τα συνηθισμένα βιβλία αλλά για τις πληροφορίες από διάφορους πανεπιστημιακούς ή άλλους φορείς που «συλλέγονται» στο κέντρο πληροφορικής και είναι πλέον στη διάθεση των καθηγητών και φοιτητών. Αυτό που συνέβη την περασμένη Τρίτη γίνεται πλέον σε καθημερινή βάση. Στοιχεία και πληροφορίες «εισάγονται» και «εξάγονται», η ανθρώπινη γνώση τακτοποιείται αρχειακά και συστηματοποιείται. Οι ταχύτητες στις «λεωφόρους της επικοινωνίας» αυξάνονται συνεχώς και όλοι πλέον τρέχουν να προλάβουν. Το Internet και τα άλλα παγκόσμια δίκτυα πληροφορικής εκμηδενίζουν αποστάσεις και απλοποιούν τα πάντα.
Δεν είναι όμως μόνον η πρόσβαση στις «λεωφόρους των πληροφοριών», η επικοινωνία μεταξύ των διαφόρων συντελεστών της παγκόσμιας ακαδημαϊκής κοινότητας τείνει να αλλάξει. Και αυτό γιατί οι τεχνολογικές εξελίξεις επιτρέπουν πλέον πειραματισμούς σε άλλες μορφές επικοινωνίας, με χρησιμοποίηση των ηλεκτρονικών μέσων. Ετσι, στα «σκαριά» βρίσκεται αυτόν τον καιρό ένα πειραματικό πρόγραμμα, μεταξύ του ΕΜΠ, του Πανεπιστημίου Αθηνών και της ΑΣΟΕΕ. Οροι όπως η «τηλεκπαίδευση» και το «εικονικό μάθημα» δεν θα ξενίζουν κανέναν σε μερικά χρόνια. Ηδη στο Κέντρο Διαχείρισης Δικτύων του ΕΜΠ αλλά και στο Πανεπιστήμιο Αθηνών και στην ΑΣΟΕΕ οι αίθουσες έχουν επιλεγεί, η τεχνολογική υποδομή στήνεται και πλέον όλα είναι θέμα χρόνου. Οι καθηγητές που θα συμμετέχουν σε αυτό το πειραματικό πρόγραμμα θα διδάσκουν από ένα σημείο και οι συνάδελφοί τους και οι φοιτητές θα παρακολουθούν μέσα από οθόνες τα μεταπτυχιακά σεμινάρια, που θα εφαρμοσθούν σε πρώτη φάση. Το σύστημα επιτρέπει την αμφίδρομη επικοινωνία. «Θα είναι κάτι που μοιάζει με τα παράθυρα των τηλεοπτικών δελτίων, χωρίς... επαγγελματίες σκηνοθέτες» σημείωναν χαριτολογώντας δύο από τους βασικούς εμπνευστές του εγχειρήματος, ο καθηγητής του ΕΜΠ κ. Βασ. Μαγκλάρης και ο υπεύθυνος του Κέντρου Δικτύωσης του ΕΜΠ κ. Θεοδ. Καρούνος.
Φυσικά τα πράγματα δεν είναι καθόλου απλά. Πρόκειται για ένα πολύπλοκο πειραματικό εγχείρημα, αρχικού κόστους 400 εκατομμυρίων δραχμών. Το πρόγραμμα αναμένεται να λειτουργήσει τον Σεπτέμβριο, θα «αρχειοθετείται» και ο κάθε ακαδημαϊκός χρήστης θα μπορεί να παρακολουθήσει το «εικονικό μάθημα» αργότερα ­ μέσω του κομπιούτερ του. Δηλαδή, όπως θα λέγαμε με... τρέχοντες τηλεοπτικούς όρους, θα έχει χρησιμότητα και ως «κονσέρβα». Για τους απλούς πολίτες, με τους προσωπικούς υπολογιστές, το θέμα παραπέμπεται στο μέλλον, αφού οι συμβατικές ταχύτητες του δικτύου του ΟΤΕ καθιστούν προς το παρόν αδύνατη τη σύνδεση με υψηλό βαθμό ευκρίνειας της εικόνας. Μέσα από το «δίκτυο υψηλών ταχυτήτων» έρχονται πλέον και οι άλλες υπηρεσίες του μέλλοντος, όπως είναι η «τηλεϊατρική», η οποία είναι ήδη στα σχέδια υλοποίησής της, μέσω του διαπανεπιστημιακού δικτύου ΑΤΜ.
Πέρα από δυσνόητους τεχνικούς όρους, αυτά τα εγχειρήματα βασίζονται σε μια πολύ ισχυρή βάση, που επιτρέπει περαιτέρω «άλματα» προς το μέλλον. Η σύνδεση των τοπικών δικτύων των πανεπιστημίων απετέλεσε πολύ σημαντικό βήμα προς τις «λεωφόρους της επικοινωνίας». Πλήρη τοπικά δίκτυα διαθέτουν ήδη αρκετά ακαδημαϊκά ιδρύματα της χώρας, όπως το ΕΜΠ, το Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης, τα Πανεπιστήμια Κρήτης, Αιγαίου κλπ. Ενώ μεγάλα δίκτυα (πέραν των ήδη υπαρχόντων υποδομών) κατασκευάζονται στα Πανεπιστήμια της Αθήνας, τησ Πάτρας, των Ιωαννίνων, στο Πάντειο και αλλού. Συνολικά, τα 18 ΑΕΙ και τα 14 ΤΕΙ της χώρας «χτίζουν μαζί τη λεωφόρο στην Κοινωνία των Πληροφοριών, το πανεπιστημιακό διαδίκτυο GUNET (Greek University Network)», όπως τονίζουν οι ειδικοί. Τα μεγέθη είναι πολύ μεγάλα και φυσικά το πρόγραμμα έχει κοινοτική χρηματοδότηση. Οπως σημείωνε ο καθηγητής κ. Μαγκλάρης «το τέλος του 1999 το αναπτυγμένο αυτό δίκτυο τηλεματικής θα αφορά 170.000 ακαδημαϊκούς χρήστες», δηλαδή καθηγητές, φοιτητές, ερευνητές και διοικητικούς υπαλλήλους των εκπαιδευτικών ιδρυμάτων.
Και διεθνής πρόσβαση
(Εικόνα μεγέθους : 44763 bytes)
ΤΟ ΟΛΟ «παζλ» δένει με την πρόσβαση στις διεθνείς «λεωφόρους επικοινωνίας». Ηδη το δίκτυο που έχει εγκαταστήσει το ΕΜΠ (σε συνεργασία με τη Γενική Γραμματεία Ερευνας και Τεχνολογίας) επιτρέπει τη σύνδεση με τα πανεπιστήμια της Ευρώπης και της Αμερικής. Οι απαιτήσεις αυξάνονται όμως με ραγδαίους ρυθμούς. Οι «υψηλές ταχύτητες» απαιτούν νέα υποδομή, νέες «θυσίες». Οι Ευρωπαίοι προσπαθούν να αντεπεξέλθουν στις σύγχρονες απαιτήσεις με το πρόγραμμα ΤΕΝ-34. Είναι η απάντηση της Ευρώπης στις προηγμένες δικτυακές υποδομές της Αμερικής και της Ιαπωνίας. Η «ραχοκοκαλιά» υπάρχει, χρειάζεται ο «κορμός», που επιτρέπει την πρόσβαση σε προηγμένες δικτυακές υπηρεσίες, όπως των πολυμέσων, της τηλεδιάσκεψης κ.ο.κ. Το όνομα του προγράμματος δόθηκε από την επιτρεπόμενη ταχύτητα των 34 Mbps ενώ σήμερα η ταχύτητα του διαπανεπιστημιακού δικτύου μας φθάνει σε 10 Mbps (αυτοί οι αριθμοί για τους περισσότερο μυημένους).
Στο ΤΕΝ-34 λαμβάνουν μέρος όλα τα πανεπιστήμια της Ευρωπαϊκής Ενωσης, καθώς και της Δημοκρατίας της Τσεχίας, της Ουγγαρίας και της Σλοβενίας. Μέσα από το διαδίκτυο θα διακινούνται πληροφορίες για βιβλιογραφία, ηλεκτρονικό ταχυδρομείο (το οποίο γνωρίζει ιδιαίτερη άνθηση και μεταξύ της ελληνικής ακαδημαϊκής κοινότητας), αρχειακή δράση κλπ. Ευρύτερος στόχος όμως των ελληνικών αρχών είναι η χώρα μας να αποτελέσει «κόμβο» τηλεματικής στον ευρύτερο χώρο των Βαλκανίων και της Νοτιοανατολικής Μεσογείου, ένα όραμα» που ­ όπως λένε οι ειδικοί ­ αντιμετωπίζεται με «καλό μάτι» και από τους ευρωπαίους ιθύνοντες.

ΤΟ ΒΗΜΑ, 01-03-1998 Κωδικός άρθρου: B12470A581

netCmr.HealthLine

_CREATED: {1997-10-19}

name::
* McsEngl.netCmr.HealthLine@cptIt,
* McsEngl.conceptIt2022,
* McsEngl.healthline@cptIt2022,

_DESCRIPTION:
ΠΕΜΠΤΗ 16 ΟΚΤΩΒΡΙΟΥ 1997 1,6 εκατ. ECU για Διευρωπαϊκό Ιατρικό Δίκτυο
H ATKOSoft AE ανακοίνωσε ότι, επι κεφαλής ενός διεθνούς Consortium εταιρειών, υπογράφει τις επόμενες ημέρες σύμβαση με την Ευρωπαική Ενωση γιά την εκπόνηση του διευρωπαικού εργου HealthLine, συνολικού προυπολογισμού 1,6 εκ. ECU (περίπου 500 εκ Δρχ.)
Συγκεκριμμένα, το έργο HealthLine αφορά στην δημιουργία ενός διευρωπαικού Δικτύου παροχέων υπηρεσιών Πληροφόρησης και τηλε-Εκπαίδευσης που θα λειτουργεί με προδιαγεγραμμένο και ομοιογενή τρόπο σε όλες τις χώρες της Ευρωπαικής Ενωσης, βάσει ενός κοινά αποδεκτού συνόλου υπηρεσιών και δεδομένων, που θα επιτρέπει την ανταλλαγή δεδομένων, πληροφοριών και παροχή υποστήριξης, με την χρήση του HealthLine Intranet που θα αναπτυχθεί. Οι υπηρεσίες που θα παρέχει το δίκτυο αφορούν επαγγελματίες που έχουν σχέση με την Ιατρική και Περίθαλψη (ιατρούς, νοσηλευτές, ιατρικό και παραιατρικό προσωπικό νοσηλευτικών μονάδων κλπ), αλλά και προς το ευρύ κοινό των χωρών της Ενωσης, μέσω του INTERNET, τηλεφωνίας (Help Desk) καθώς και μέσω των δικτύων που τα έργα NIVEMES και RISE έχουν εγκαταστήσει σε διάφορες ευρωπαικές χώρες. Σημειώνεται εδώ ότι τόσο το εργο NIVEMES (Παροχή τηλειατρικών υπηρεσιών σε πλοία και απομακρυσμένες περιοχές) όσο και το έργο RISE (τηλειατρική κάλυψη και τηλευποστήριξη ατόμων τρίτης ηλικίας) προυπολογισμού αντίστοιχα 3 εκ ECU (περίπου 1 δις Δρχ) και 5 εκ. ECU (περίπου 1,6 δις Δρχ), βρίσκονται στο στάδιο της ολοκλήρωσης από διεθνή Consortia με επικεφαλής την ATKOSoft AE. Σύμφωνα με το Διευθύνωντα Σύμβουλο της εταιρείας, κύριο Τάσο Πικούνη, "η ανάθεση ενός τόσο πολύπλοκου έργου στην ATKOSoft ΑΕ επιβεβαιώνει την εμπιστοσύνη της Ευρωπαικής Ενωσης προς την εταιρεία όσον αφορά την υλοποίηση και διαχείρηση διευρωπαικών έργων Ιατρικής Πληροφορικής, η οποία άλλωστε είχε εκδηλωθεί και με την βράβευση του ιατρικού Λογισμικού a_med Line® της εταιρείας". Η ATKOSoft AE επικεντρώνεται σε ανάπτυξη εφαρμογών Λογισμικού ειδικών απαιτήσεων, εφαρμογών Ιατρικής Πληροφορικής και Τηλειατρικής, καθώς και στην διαχείριση διευρωπαικών έργων Ιατρικής Πληροφορικής και Τηλειατρικής. Επι κεφαλής σήμερα εργων Ιατρικής Πληροφορικής συνολικού προυπολογισμού μεγαλύτερου των 15 εκ ECU, η ATKOSoft AE συγκαταλέγεται μεταξύ των πλέον σημαντικών εταιρειών στην Ευρώπη στους τομείς Ιατρικής Πληροφορικής και Τηλειατρικής. Η σειρά προγραμμάτων Ιατρικών Εφαρμογών της ATKOSoft a_med Line®, ένα σύνολο εξειδικευμένων προγραμμάτων (modules), στενά συνδεδεμένων και συνεργαζομένων μεταξύ τους, γιά την συνολική κάλυψη των ιατρικών απαιτήσεων ενός Οργανισμού παροχής ιατρικής περίθαλψης, έχουν εγκατασταθεί και λειτουργούν στην Ιρλανδία, Σουηδία και Πορτογαλία. Τον Νοέμβριο του 1996 η σειρά Ιατρικών Εφαρμογών a_med Line® της ATKOSoft βραβεύθηκε απο την Ευρωπαική Ενωση με το Ευρωπαικό Βραβείο Τεχνολογιών Πληροφορικής - The European Information Technology Prize, "ITEA '96 ". ΣXETIKA ΑΡΘΡΑ:
Ελληνικό λογισμικό για τους Ιρλανδούς Ιατρούς 9.7.97 ΣΧΕΤΙΚΟΙ ΚΟΜΒΟΙ:
ATKOSoft

0 ΚΟΜΒΟΣ ΑΡΧΕΙΟ ΑΝΑΖΗΤΗΣΗ ΕΠΙΚΟΙΝΩΝΙΑ
Copyright ©1997, O KΟΜΒΟΣ™ ( kombos @ forthnet.gr ) - Με την επιφύλαξη παντός νομίμου δικαιώματος.

netCmr.Intranet

name::
* McsEngl.conceptIt2016,
* McsEngl.intranet,
* McsEngl.intranet@cptIt2016,
* McsEngl.internal internet,

_DESCRIPTION:
Οταν λέμε Intranet να ξέρουμε ότι προέρχεται από τις λέξεις Internal Internet, δηλαδή είναι ένα εσωτερικό διαδίκτυο υπολογιστικών μηχανημάτων, σε ιδιωτική επιχείριση, με όλη την τεχνολογία και τα χαρίσματα του Internet.
[ΒΗΜΑ, 1997ιαν26, Το άλλο βήμα 30]

netCmr.management.CENTRAL

name::
* McsEngl.conceptIt301,
* McsEngl.CENTRAL MANAGEMENT network,
* McsEngl.network.centralmanagement@cptIt301,
* McsEngl.netCentral,
* McsElln.ΔΙΚΤΥΑ ΚΕΝΤΡΙΚΗΣ ΔΙΑΧΕΙΡΙΣΗΣ,

DEFINITION

ΤΕΤΟΙΑ ΕΙΝΑΙ ΤΑ CLIENT/SERVER ΠΧ ΔΙΚΤΥΑ ΟΠΟΥ ΓΙΝΕΤΑΙ ΚΕΝΤΡΙΚΑ Η ΔΙΑΧΕΙΡΙΣΗ ΤΩΝ ΣΤΟΙΧΕΙΩΝ ΤΟΥ ΔΙΚΤΥΟΥ, ΧΡΗΣΤΩΝ ΜΗΧΑΝΗΜΑΤΩΝ ΠΡΟΓΡΑΜΜΑΤΩΝ.

ΠΑΡΑΔΕΙΓΜΑ ΔΙΚΤΥΟΥ ΜΗ ΚΕΝΤΡΙΚΗΣ ΔΙΑΧΕΙΡΙΣΗΣ ΕΙΝΑΙ Η ΕΝΩΣΗ ΔΥΟ ΥΠΟΛΟΓΙΣΤΩΝ ΜΕ MODEM ΚΑΙ Η ΔΥΝΑΤΟΤΗΤΑ ΑΠΛΗΣ ΜΕΤΑΦΟΡΑΣ ΑΡΧΕΙΩΝ.

GENERIC

_GENERIC:
* network.computer#cptIt21#

netCmr.management.CENTRAL.NO (netP2p)

_CREATED: {2015-09-07} {2015-08-13}

name::
* McsEngl.conceptIt21.6,
* McsEngl.netP2p,
* McsEngl.p2pnet,
* McsEngl.peer-to-peer-network,
* McsEngl.conceptIt1003,
* McsEngl.decentralized-cmputer-network@cptIt21.6,
* McsEngl.decentralized-netCmr@cptIt21.6,
* McsEngl.distributed-netCmr@cptIt21.6,
* McsEngl.netCmr.decentralized@cptIt21.6,
* McsEngl.netCmr.distributed@cptIt21.6,
* McsEngl.netCmr.P2P,
* McsEngl.network.p2p,
* McsEngl.non-central-management-network,
* McsEngl.p2p-network,
* McsEngl.p2p-networking,
* McsEngl.p2p-system,
* McsEngl.p2p-technology,
* McsEngl.peer-to-peer-network,
* McsEngl.netCentralNo,
* McsEngl.netP2p,
* McsElln.μή-κεντρικά-ελεγχόμενο-δίκτυο, {2015-09-07}
* McsElln.ομότιμο-δίκτυο@cptIt,

netP2p'DEFINITION

_DESCRIPTION:
Peer to peer networking
Unlike the Client Server model peer-to-peer networks consist of networks of computers connected to one another directly without sending requests to any server.
All computers taking part in the network are considered to be ‘peers’ and have equal standing within the network as one another.
Peer to Peer networks generally rely on the peers being altruistic and sharing at least as many resources as they take from the network
[https://dappsforbeginners.wordpress.com/tutorials/introduction-to-development-on-ethereum/]
===
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or work loads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes.

Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts.[1] Peers are both suppliers and consumers of resources, in contrast to the traditional client-server model in which the consumption and supply of resources is divided. Emerging collaborative P2P systems are going beyond the era of peers doing similar things while sharing resources, and are looking for diverse peers that can bring in unique resources and capabilities to a virtual community thereby empowering it to engage in greater tasks beyond those that can be accomplished by individual peers, yet that are beneficial to all the peers.[2]

While P2P systems had previously been used in many application domains,[3] the architecture was popularized by the file sharing system Napster, originally released in 1999. The concept has inspired new structures and philosophies in many areas of human interaction. In such social contexts, peer-to-peer as a meme refers to the egalitarian social networking that has emerged throughout society, enabled by Internet technologies in general.
[https://en.wikipedia.org/wiki/Peer-to-peer]
===
Σε ένα ομότιμο δίκτυο, όπως υπονοείται και από την ονομασία του, όλοι οι υπολογιστές θεωρούνται ίσοι (ομότιμοι) μεταξύ τους, ή με άλλα λόγια δεν υπάρχει κάποια συγκεκριμένη ιεραρχία μεταξύ τους. Δεν υπάρχουν ούτε αποκλειστικοί διακομιστές (dedicated servers), ούτε κάποιοι άλλοι κεντρικοί κόμβοι που να είναι υπεύθυνοι για τον έλεγχο ή για την παροχή υπηρεσιών στους άλλους υπολογιστές του δικτύου.
[http://conta.uom.gr/conta/ekpaideysh/metaptyxiaka/technologies_diktywn/teaching_m/PracticalNetworkDesign-Web/Chapter1111.html]

netP2p'law

name::
* McsEngl.netP2p'law@cptIt,

netP2p'node (peer)

name::
* McsEngl.netP2p'node (peer)@cptIt,
* McsEngl.netP2p'peer@cptIt,

_DESCRIPTION:
Unlike traditional client-server networks, where servers only provide content, and clients only consume content, in P2P networks, each peer is both a client and a server.
[http://medianetlab.ee.ucla.edu/papers/chapter_P2P_hpark.pdf]

netP2p'supernode

name::
* McsEngl.netP2p'supernode@cptIt,

_DESCRIPTION:
In peer-to-peer networking, a supernode is any node that also serves as one of that network's relayers and proxy servers, handling data flow and connections for other users. This semi-distributed architecture allows data to be decentralized without requiring excessive overhead at every node. However, the increased workload of supernodes generally requires additional network bandwidth and central processing unit (CPU) time.
Some peer-to-peer designs allow for the user to control whether their node is a supernode; others do not. For example, Skype by default is configured as a supernode, an issue that has caused controversy.[citation needed] Despite criticism, Skype has contended that supernodes on their network act only to maintain information about who is online at a given time, and are not used to route calls between users. Beginning with version 3.0, Skype allows a user to avoid becoming a supernode by modifying the Windows Registry.
[https://en.wikipedia.org/wiki/Supernode_%28networking%29]

netP2p'Human

name::
* McsEngl.netP2p'Human@cptIt,
* McsEngl.netP2p'user@cptIt,

netP2p'program

name::
* McsEngl.netP2p'program@cptIt,
* McsEngl.netP2p'software@cptIt,

netP2p'protocol#ql:cmnprl.p2p#

name::
* McsEngl.netP2p'protocol@cptIt,

netP2p'Reputation-management

name::
* McsEngl.netP2p'Reputation-management@cptIt,

netP2p'Eigentrust

name::
* McsEngl.netP2p'Eigentrust@cptIt,
* McsEngl.Eigen-trust-algorithm@cptIt,

_DESCRIPTION:
Eigentrust
The EigenTrust algorithm is a reputation management algorithm for peer-to-peer networks, developed by Sep Kamvar, Mario Schlosser, and Hιctor Garcνa Molina The algorithm provides each peer in the network a unique global trust value based on the peer's history of uploads and thus aims to reduce the amount of inauthentic data in a network.
Overview
Peer-to-peer systems available today are open, often anonymous and lack accountability. Hence a user with malicious intent can introduce into the peer-to-peer network resources that may be inauthentic, corrupted or malicious. This reflects poorly on the credibility of current peer-to-peer systems. A research team from Stanford provides a reputation management system, where each peer in the system has a unique global trust value based on the peer's history of uploads. Any peer requesting resources will be able to access the trust value of a peer and avoid downloading files from untrusted peers.
[http://wiki.nem.io/index.php/Eigentrust]

netP2p'Resources

name::
* McsEngl.netP2p'Resources@cptIt,

_SPECIFIC:
* The Meaning of Decentralization https://medium.com/@VitalikButerin/the-meaning-of-decentralization-a0c92b76a274#.2m5cb3z2i,
* content##
* processing##
* storage##

netP2p'Security

name::
* McsEngl.netP2p'Security@cptIt,

_DESCRIPTION:
Peer-to-peer systems pose unique challenges from a computer security perspective.

Like any other form of software, P2P applications can contain vulnerabilities. What makes this particularly dangerous for P2P software, however, is that peer-to-peer applications act as servers as well as clients, meaning that they can be more vulnerable to remote exploits.[30]
[https://en.wikipedia.org/wiki/Peer-to-peer]

netP2p'doing

name::
* McsEngl.netP2p'doing@cptIt,
* McsEngl.netP2p'application@cptIt,
* McsEngl.netP2p'function@cptIt,
* McsEngl.netP2p'usage@cptIt,
* McsEngl.netP2p'service@cptIt,

_SPECIFIC:
* content-sharing##
* cooperation##
* file-sharing##
* media-delivery##
* resource-sharing##
* streaming-service##

netP2p'GENERIC

_GENERIC:
* decentralized-network##
* overlay-network##

SPECIFIC

name::
* McsEngl.netP2p.specific@cptIt,

_SPECIFIC:
* bitcoin-network#cptItsoft51.17#
* blockchain-network#ql:blockchain_network@cptIt#

netP2p.ANONYMOUS

name::
* McsEngl.netP2p.ANONYMOUS@cptIt,

_DESCRIPTION:
An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.
Interest in anonymous P2P systems has increased in recent years for many reasons, ranging from the desire to share files without revealing one's network identity and risking litigation[1] to distrust in governments, concerns over mass surveillance and data retention, and lawsuits against bloggers.[2]
[https://en.wikipedia.org/wiki/Anonymous_P2P]

netP2p.protocol.BitTorrent

name::
* McsEngl.netP2p.protocol.BitTorrent@cptIt,
* McsEngl.BitTorrent-network@cptIt,
* McsEngl.BitTorrent-system@cptIt,

protocol#ql:bittorrent-protocol#

netP2p.SEMANTIC

name::
* McsEngl.netP2p.SEMANTIC@cptIt,

_DESCRIPTION:
Semantic P2P networks are a new type of P2P network. It combines the advantages of unstructured P2P networks and structural P2P networks, and avoids their disadvantages.

In Semantic P2P networks, nodes are classified as DNS-like domain names with semantic meanings such as Alice @Brittney.popular.music. Semantic P2P networks contains prerequisite virtual tree topology and net-like topology formed by cached nodes. Semantic P2P networks keep the semantic meanings of nodes and their contents. The nodes within semantic P2P networks can communicate each other by various languages. Semantic P2P network can execute complicated queries by SQL-like language.

There are similarities between semantic P2P systems and software agents. P2P means that entities exchange information directly without an mediator. Semantic is a concept to add meaning to information. Peer are usually autonomous systems as well as agents. Agents follow a goal, though. Such goal attainment requires a knowledge base and rules and strategies. That's the major difference between software agents and semantic peers. The later lacks that kind of intelligence.
[https://en.wikipedia.org/wiki/Semantic_P2P_networks]

netP2p.STRUCTURED

name::
* McsEngl.netP2p.STRUCTURED@cptIt,

_DESCRIPTION:
In structured peer-to-peer networks the overlay is organized into a specific topology, and the protocol ensures that any node can efficiently[17] search the network for a file/resource, even if the resource is extremely rare.

The most common type of structured P2P networks implement a distributed hash table (DHT),[18][19] in which a variant of consistent hashing is used to assign ownership of each file to a particular peer.[20][21] This enables peers to search for resources on the network using a hash table: that is, (key, value) pairs are stored in the DHT, and any participating node can efficiently retrieve the value associated with a given key.[22][23]
Distributed hash tables

However, in order to route traffic efficiently through the network, nodes in a structured overlay must maintain lists of neighbors that satisfy specific criteria. This makes them less robust in networks with a high rate of churn (i.e. with large numbers of nodes frequently joining and leaving the network).[15][24] More recent evaluation of P2P resource discovery solutions under real workloads have pointed out several issues in DHT-based solutions such as high cost of advertising/discovering resources and static and dynamic load imbalance.[25]

Notable distributed networks that use DHTs include BitTorrent's distributed tracker, the Kad network, the Storm botnet, YaCy, and the Coral Content Distribution Network. Some prominent research projects include the Chord project, Kademlia, PAST storage utility, P-Grid, a self-organized and emerging overlay network, and CoopNet content distribution system.[citation needed] DHT-based networks have also been widely utilized for accomplishing efficient resource discovery[26][27] for grid computing systems, as it aids in resource management and scheduling of applications.
[https://en.wikipedia.org/wiki/Peer-to-peer]

netP2p.STRUCTURED.NO

name::
* McsEngl.netP2p.STRUCTURED.NO@cptIt,
* McsEngl.netP2p.unstructured@cptIt,

_DESCRIPTION:
Unstructured networks
Overlay network diagram for an unstructured P2P network, illustrating the ad hoc nature of the connections between nodes

Unstructured peer-to-peer networks do not impose a particular structure on the overlay network by design, but rather are formed by nodes that randomly form connections to each other.[11] (Gnutella, Gossip, and Kazaa are examples of unstructured P2P protocols).[12]

Because there is no structure globally imposed upon them, unstructured networks are easy to build and allow for localized optimizations to different regions of the overlay.[13] Also, because the role of all peers in the network is the same, unstructured networks are highly robust in the face of high rates of "churn"—that is, when large numbers of peers are frequently joining and leaving the network.[14][15]

However the primary limitations of unstructured networks also arise from this lack of structure. In particular, when a peer wants to find a desired piece of data in the network, the search query must be flooded through the network to find as many peers as possible that share the data. Flooding causes a very high amount of signaling traffic in the network, uses more CPU/memory (by requiring every peer to process all search queries), and does not ensure that search queries will always be resolved. Furthermore, since there is no correlation between a peer and the content managed by it, there is no guarantee that flooding will find a peer that has the desired data. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing. But if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that search will be successful.[16]
[https://en.wikipedia.org/wiki/Peer-to-peer]

netP2p.STRUCTURED.YESNO

name::
* McsEngl.netP2p.STRUCTURED.YESNO@cptIt,
* McsEngl.netP2p.hybrid-structured@cptIt,

_DESCRIPTION:
Hybrid models are a combination of peer-to-peer and client-server models.[28] A common hybrid model is to have a central server that helps peers find each other. Spotify is an example of a hybrid model. There are a variety of hybrid models, all of which make trade-offs between the centralized functionality provided by a structured server/client network and the node equality afforded by the pure peer-to-peer unstructured networks. Currently, hybrid models have better performance than either pure unstructured networks or pure structured networks because certain functions, such as searching, do require a centralized functionality but benefit from the decentralized aggregation of nodes provided by unstructured networks.[29]
[https://en.wikipedia.org/wiki/Peer-to-peer]

netP2p.EVOLUTING

name::
* McsEngl.netP2p.EVOLUTING@cptIt,

{time.2009}:
=== BITCOIN INTRODUCTION:

{time.1999}:
=== CONCEPT POPULARIZATION:
While P2P systems had previously been used in many application domains,[3] the concept was popularized by file sharing systems such as the music-sharing application Napster (originally released in 1999).
In May 1999, with millions more people on the Internet, Shawn Fanning introduced the music and file-sharing application called Napster.[7]
Napster was the beginning of peer-to-peer networks, as we know them today, where "participating users establish a virtual network, entirely independent from the physical network, without having to obey any administrative authorities or restrictions."[7]
[https://en.wikipedia.org/wiki/Peer-to-peer]

netCmr.NREN

NAME

name::
* McsEngl.netCmr.NREN@cptIt,
* McsEngl.conceptIt211,
* McsEngl.NREN@cptIt,
* McsEngl.nren@cptIt211,
* McsEngl.National-research-and-education-network@cptIt,
* McsEngl.network.nren@cptIt211,

DEFINITION

NREN -- The National Research and Education Network is a proposed national computer network to be built upon the foundation of the NSF backbone network, NSFnet. NREN would provide high speed interconnection between other national and regional networks. SB 1067 is the legislative bill proposing NREN.

The US government proposes to expand Internet into NREN, That could extend a high-speed computer links into schools and communities across the country.

GENERIC

_GENERIC:
* network.computer#cptIt21#

netCmr.OVERLAY

_CREATED: {2015-08-13}

name::
* McsEngl.netCmr.OVERLAY@cptIt,
* McsEngl.overlay-network@cptIt,
* McsEngl.netOvl@cptIt, {2015-08-15}

_DESCRIPTION:
An overlay network is a computer network that is built on top of another network. Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. For example, distributed systems such as peer-to-peer networks and client-server applications are overlay networks because their nodes run on top of the Internet. The Internet was originally built as an overlay upon the telephone network, while today (through the advent of VoIP), the telephone network is increasingly turning into an overlay network built on top of the Internet.
[https://en.wikipedia.org/wiki/Overlay_network]
===
With overlay networks, engineers run a virtual network layer above the physical. Learn the ins and outs of overlay networks and how companies are employing the technology today.
[http://searchsdn.techtarget.com/essentialguide/Overlay-networks-Understanding-the-basics-making-it-a-reality]

netOvl'protocol

name::
* McsEngl.netOvl'protocol@cptIt,

_DESCRIPTION:
Overlay network protocols based on TCP/IP include:
Distributed hash tables (DHTs), such as KAD and other protocols based on the Kademlia algorithm, for example.
JXTA
XMPP: the routing of messages based on an endpoint Jabber ID (Example: nodeId_or_userId@domainId\resourceId) instead of by an IP Address
Many peer-to-peer protocols including Gnutella, Gnutella2, Freenet, I2P and Tor.
PUCC
Solipsis: a France Telecom system for massively shared virtual world
HyParView: a highly robust unstructured overlay for gossip broadcast

Overlay network protocols based on UDP/IP include:
Real Time Media Flow Protocol - Adobe Flash
[https://en.wikipedia.org/wiki/Overlay_network]

netOvl'underlying-network

name::
* McsEngl.netOvl'underlying-network@cptIt,

SPECIFIC

netOvl.RON

name::
* McsEngl.netOvl.RON@cptIt,
* McsEngl.resilient-overlay-network@cptIt,
* McsEngl.RON@cptIt,
* McsEngl.name.RON@cptIt,

_DESCRIPTION:
"Because, sometimes, the Internet doesn't quite work..."

The MIT RON (Resilient Overlay Networks) project is a DARPA-funded effort motivated by the desire to improve the robustness and availability of Internet paths between hosts by an order of magnitude over today's wide-area Internet routing infrastructure. The key design goal in RON is to develop techniques to allow end-hosts and applications to cooperatively gain improved reliability and performance from the Internet. At a glance, RON nodes examine the condition of the Internet between themselves and the other nodes, and, based upon how the network looks, decide if they should let packets flow directly to other nodes, or if they should send them indirectly via other RON nodes. For instance, the group of cooperating systems below can mutually provide a more available and better-performing routing service than what vanilla Internet routing can provide.

RON example

RON is an architecture that allows a small group of distributed Internet applications to detect and recover from path outages and periods of degraded performance within several seconds, improving over today's wide-area routing protocols that take at least several minutes to recover. A RON is an application-layer overlay on top of the existing Internet routing substrate. The RON nodes monitor the functioning and quality of the Internet paths among themselves, and use this information to decide whether to route packets directly over the Internet or by way of other RON nodes, optimizing application-specific routing metrics.

The RON project has several components, including:

Overlay configuration and maintenance.
Probing and outage detection
Routing around outages and performance failures
Application-controlled routing
Policy routing
Multi-path routing; QoS routing
Data forwarding
API and RON libraries
Applications (e.g., resilient VPN, resilient conferencing, etc.)
Data analysis and understanding wide-area routing and fault-tolerance behavior; BGP interactions
Simulations of RON behavior

RON is part of a larger research agenda on large-scale, robust, Internet-based distributed systems, which spans areas ranging from resilient routing (as in RON) to emerging peer-to-peer systems. Our work on peer-to-peer systems is based on Chord, a scalable p2p lookup service.

RON is also closely related to other current projects at LCS in the area of robust Internet infrastructures and uses some of the ideas from these projects: CM , the Inernet Congestion Manager; and Click-SMP , a modular PC-based router.
[http://nms.csail.mit.edu/ron/]

netOvl.undernet.INTERNET

name::
* McsEngl.netOvl.undernet.INTERNET@cptIt,

_DESCRIPTION:
Nowadays the Internet is the basis for more overlaid networks that can be constructed in order to permit routing of messages to destinations not specified by an IP address. For example, distributed hash tables can be used to route messages to a node having a specific logical address, whose IP address is not known in advance.

Overlay networks have also been proposed as a way to improve Internet routing, such as through quality of service guarantees to achieve higher-quality streaming media. Previous proposals such as IntServ, DiffServ, and IP multicast have not seen wide acceptance largely because they require modification of all routers in the network. On the other hand, an overlay network can be incrementally deployed on end-hosts running the overlay protocol software, without cooperation from ISPs. The overlay has no control over how packets are routed in the underlying network between two overlay nodes, but it can control, for example, the sequence of overlay nodes a message traverses before reaching its destination.

For example, Akamai Technologies manages an overlay network which provides reliable, efficient content delivery (a kind of multicast). Academic research includes End System Multicast and Overcast for multicast; RON (Resilient Overlay Network) for resilient routing; and OverQoS for quality of service guarantees, among others.
[https://en.wikipedia.org/wiki/Overlay_network]

netCmr.PACKET-RADIO

name::
* McsEngl.netCmr.PACKET-RADIO@cptIt,
* McsEngl.conceptIt310,
* McsEngl.network.packet'radio@cptIt310,
* McsEngl.packet-radio-network@cptIt,

DEFINITION

ΣΤΑ PACKET RADIO ΔΙΚΤΥΑ Ο ΚΑΘΕ ΣΤΑΘΜΟΣ ΧΡΗΣΙΜΟΠΟΙΕΙ ΚΕΡΑΙΕΣ ΕΚΠΟΜΠΗΣ-ΛΗΨΗΣ ΕΝΩ ΠΡΕΠΕΙ ΝΑ ΒΡΙΣΚΕΤΑΙ ΜΕΣΑ ΣΤΗΝ ΕΜΒΕΛΕΙΑ ΤΩΝ ΥΠΟΛΟΙΠΩΝ. Ο ΕΝΑΣ ΣΤΑΘΜΟΣ ΕΚΠΕΜΠΕΙ ΣΤΟΝ ΑΕΡΑ ΚΑΙ ΟΙ ΑΛΛΟΙ ΚΑΝΟΥΝ ΑΚΡΟΑΣΗ.

The Packet-Radio-Network

With Packet-Radio you can built a inexpensive but powerful data network.

Within a net, we talk about the users, who transmit and receive data and the nodes, which forward the data in direction to the receiver.

Nodes are intelligent systeme, which know the current strukture of the network and which manage to transport the data packets through the net in the most efficient way.

The users need just a simple Packet-Radio-Controller or a plug-in modem (30-200 $) to participate the amateur radio data network. As node controller, a more powerful computer or TNC3S with X-Net Software is required.

All nodes in a net have to exchange information about the link quality between the adjacent stations. A complex software can now calculate, which way from A to B would be the fastest and most efficient. It is important to re-evaluate the situation every now and then, as it may happen that a certain node station fails and the data traffic has to be routed on new ways to find alternative ways not using the failed node. Due to varying traffic load, some links may be congested and other (maybe slower) ways have to be used in parallel. A data net in general (especially the amateur net with its home-built and amateur-operated stations) is not a static thing but it changes from moment to moment.

Network node software has to decide, in which direction a given data packet is to be forwarded. The decision varies depending on the situation and load of the net. Poor software may cause oscillations by changeing traffic from congested links to other links and causing congestions there, which causes the routing algorithm to switch to and fro. With the X-Net software (available free on the internet) for TNC3 and PC, the radio amateurs have an excellent platform for very reliable, fast and inexpensive nodes.
[http://www.symek.com/g/pacnet.html]

GENERIC

_GENERIC:
* networkBroadcasting#cptItsoft50#

netCmr.protocol.TCP_IP

name::
* McsEngl.conceptIt21.3,
* McsEngl.internet-network@cptIt21.3,
* McsEngl.IP-net,
* McsEngl.netCmr.ip,
* McsEngl.netCmr.tcpip,
* McsEngl.net.internet-family@cptIt21.3,
* McsEngl.net.tcpip@cptIt21.3,
* McsEngl.network.internet@cptIt21.3,
* McsEngl.network.IP@cptIt21.3,
* McsEngl.tcp-ip-network@cptIt21.3,
* McsEngl.netIp@cptIt21.3,

netIp'DEFINITION

_DESCRIPTION:
Definition - What does IP Network mean?
An IP network is a communication network that uses Internet Protocol (IP) to send and receive messages between one or more computers. As one of the most commonly used global networks, an IP network is implemented in Internet networks, local area networks (LAN) and enterprise networks. An IP network requires that all hosts or network nodes be configured with the TCP/IP suite.
The Internet is the largest and best known IP network.

Techopedia explains IP Network
Each host is assigned a unique logical IP address, which distinguishes it from other nodes and helps initiate data communication with other hosts. IP network communication occurs when a host sends a data packet to another host by addressing its IP address. Similarly, the recipient identifies the sender by its IP address.
Moreover, an IP network requires that all connected devices - such as servers, switches, routers and other devices - be configured with the TCP/IP suite and have a valid IP address to perform any network communication.
[http://www.techopedia.com/definition/26128/ip-network]

ΡΥΘΜΙΣΕΙΣ:
* Η σημαντικότερη ρύθμιση για την ανάπτυξη ενός δικτύου TCP/IP είναι η εκχώρηση διευθύνσεων IP.
[RAM 205, 2006.09, 80]
* Δήλωση ομάδα εργασίας (Πίνακας Ελέγχου/Σύστημα/Ονομα Υπολογιστή)
* Δήλωση κοινόχρηστων φακέλων. (Εναρξη/Εκτέλεση/shrpubw)

ΕΚΧΩΡΗΣΗ ΔΙΕΥΘΥΝΣΕΩΝ IP:
* Φροντίζουμε όλα τα μηχανάκια να είναι στο ίδιο εύρος: 192.168.1.1-254.
* Κάθε router ή ένα access point έχουν δική τους διεύθυνση μέσα στο εύρος του τοπικου δικτύου. Έχουν τη δυνατότητα να αποδίδουν αυτόματα διευθύνσεις στους συνδεόμενους υπολογιστές.
* Η αυτόματη εκχώρηση διευθύνσεων γίνεται μέσα από το πρωτόκολο DHCP (Dynamic Host Configuration Protocol). O router πχ μπορεί να έχει DHCP server.
* Στις μή αυτόματες διευθύνσεις η Μάσκα είναι 255.255.255.0

netIp'protocol#cptIt142#

name::
* McsEngl.netIp'protocol@cptIt,

SPECIFIC

_SPECIFIC:
* Internet#cptItsoft67#

netCmr.Quantum

name::
* McsEngl.netCmr.Quantum@cptIt,
* McsEngl.quantum-network@cptIt,

First-ever quantum network uses two atoms and a photon
Posted on April 12, 2012 - 04:11 by Emma Woollacott

Physicists say that, for the first time, they've created an elementary quantum network based on interfaces between single atoms and photons.

The network consists of two nodes, each of which can send, receive and store information, communicating via a single photon traveling along a 60-meter fiberoptic cable.

"This approach to quantum networking is particularly promising because it provides a clear perspective for scalability," says professor Gerhard Rempe, director at the Max Planck Institute of Quantum Optics.
[http://www.tgdaily.com/trendwatch-features/62686-first-ever-quantum-network-uses-two-atoms-and-a-photon]

netQtm'Resource

name::
* McsEngl.netQtm'Resource@cptIt,

_ADDRESS.WPG:
* https://www.weforum.org/agenda/2017/08/why-china-is-leading-the-world-in-developing-quantum-communication-networks?,

netCmr.society.European-Information-Superhighway

NAME

name::
* McsEngl.netCmr.society.European-Information-Superhighway@cptIt,
* McsEngl.conceptIt5,
* McsEngl.european-information-highway/superhighway@cptIt,
* McsEngl.information'superhighway'eu@cptIt5,
* McsElln.ΕΥΡΩΠΑΙΚΕΣ-ΛΕΩΦΟΡΟΙ-ΠΛΗΡΟΦΟΡΙΚΗΣ@cptIt,
* McsElln.ΕΥΡΩΠΑΙΚΟ-ΝΕΥΡΙΚΟ-ΣΥΣΤΗΜΑ@cptIt,
* McsElln.ΠΑΝΕΥΡΩΠΑΙΚΟ-ΥΠΟΛΟΓΙΣΤΙΚΟ-ΔΙΚΤΥΟ@cptIt,
* McsElln.ΠΛΗΡΟΦΟΡΙΟΔΡΟΜΟΙ@cptIt,

DEFINITION

Η ΔΗΜΙΟΥΡΓΙΑ ΠΑΝΕΥΡΩΠΑΙΚΟΥ ΔΙΚΤΥΟΥ ΠΛΗΡΟΦΟΡΙΚΗΣ ΠΟΥ ΘΑ ΣΥΝΔΕΕΙ ΟΛΕΣ ΤΙΣ ΤΡΑΠΕΖΕΣ ΔΕΔΟΜΕΝΩΝ ΤΟΥ ΔΗΜΟΣΙΟΥ ΤΟΜΕΑ ΤΩΝ ΧΩΡΩΝ ΜΕΛΩΝ.
[ΒΗΜΑ 2 ΜΑΙΟ 1993, Ε2]

GENERIC

_GENERIC:
* network.computer#cptIt21#

IDA#cptIt233: attPar#

IMPORTANCE#cptCore781#

"Ο ΖΑΚ ΝΤΕΛΟΡ, ΟΜΩΣ, ΕΠΙΜΕΝΕΙ ΠΩΣ ΑΥΤΕΣ ΟΙ ΛΕΩΦΟΡΟΙ ΤΗΣ ΠΛΗΡΟΦΟΡΙΚΗΣ ΘΑ ΑΠΟΤΕΛΕΣΟΥΝ ΤΗΝ "ΠΡΑΓΜΑΤΙΚΗ ΑΡΤΗΡΙΑ ΤΗΣ ΟΙΚΟΝΟΜΙΑΣ ΤΟΥ ΜΕΛΛΟΝΤΟΣ".
[ΚΑΘΗΜΕΡΙΝΗ, 3 ΟΚΤΩ 1993]

EVOLUTION#cptCore546.171#

1992 JUN:
ΔΗΜΙΟΥΡΓΙΑ ΤΟΥ TEIS.

1993 MAR:
Η ΚΟΜΙΣΙΟΝ ΚΑΤΑΘΕΤΕΙ ΣΧΕΤΙΚΗ ΠΡΟΤΑΣΗ ΣΤΟ ΣΥΜΒΟΥΛΙΟ ΕΠΗΡΕΑΣΜΕΝΗ ΑΠΟ ΤΟ ΑΝΤΙΣΤΟΙΧΟ ΣΧΕΔΙΟ ΤΟΥ ΚΛΙΝΤΟΝ.

1993 ΔΕΚ:
Στη σύνοδο κορυφής στις βρυξέλες αποφασίστηκε η σύσταση επιτροπής προσωπικοτήτων απο όλη την Ευρώπη για σφαιρική μελέτη του θέματος.
[COMPUTER GO, Jun. 1994, 10]

TEIS

name::
* McsEngl.TEIS=TRANS EUROPEAN INFORMATION SYSTEMS@cptIt,

Οι 3 μεγαλες εταιρειες Olivetti, Siemens-Nixdorf, Group Bull σχηματισαν νεα εταιρια αναπτυξης ενος συστηματος δημοσιων υπηρεσιων.
Ειναι ενα ακομη βημα για την ολοκληρωση του πανευρωπαϊκου Υπολογιστικου δικτυου (European Nervous System).

netCmr.society.Greek-Information-Superhighway

NAME

name::
* McsEngl.netCmr.society.Greek-Information-Superhighway@cptIt,
* McsEngl.conceptIt495,
* McsEngl.greek-information-superhigway@cptIt,
* McsEngl.information'superhighway'greek@cptIt495,
* McsElln.ΕΛΛΗΝΙΚΟ-ΕΘΝΙΚΟ-ΔΙΚΤΥΟ-ΠΛΗΡΟΦΟΡΙΚΗΣ@cptIt,

DEFINITION

Ελληνικό εθνικό δίκτυο πληροφορικής είναι το ΔΙΚΤΥΟ#cptIt21.1# υποδομή για την ελληνική "Κοινωνία της Πληροφορίας".

EVOLUTION#cptCore546.171#

ΣΧΕΔΙΟ

Ο υπουργός Βιομηχανίας, Ενέργειας και Τεχνολογίας Κώστας Σημίτης στην Τελευταία διάσκεψη της ΚΥΒΕΡΝΗΤΙΚΗΣ ΕΠΙΤΡΟΠΗΣ αναφέρθηκε σε 9 σημεια γιαυτό.
1. Θα υπάρχει ένας βασικός κορμος.
2. Θα έχουν προσαση οι επιχειρήσεις, ο δημοσιος τομεας και οι πολιτες.
3. δημιουργία ανεξάρτητης ελεγκτικης αρχής για την πληροφορία που διακινείται.
4. Δημιουργια μόνιμης κοινοβουλετικής επιτροπής με σκοπό τον έλεγχο του συστηματος
5. Μια πρωτη εφαρμογή θα είναι ένα δίκτυο βιομηχανικών προμηθευτών
6. Ηλεκτρονική επικοινωνια πολιτών δημοσίου
7. Δημιουργία φόρουμ για τα μεσα μαζικής ενημέρωσης για να εισάγουν τη νέα τεχνολογία
8. Πιλοτικές εφαρμογές στην υγεία και την Παιδεία
9. Το βασικό όργανο που θα το υλοποιήσει θα είναι ένας αυτόνομος οργανισμος υποδομής πληροφορικής.
[ΒΗΜΑ, 26 ΦΕΒ. 1995, Δ12]

netCmr.society.SINGAPORE

name::
* McsEngl.netCmr.society.SINGAPORE@cptIt,

_DESCRIPTION:
Posted at 7:16 a.m. PDT Wednesday, June 3, 1998
Singapore sees big future for home network
SINGAPORE, June 3 (Reuters) - Up to half of Singapore's homes should be hooked up to a nationwide multi-media network within three years, Prime Minister Goh Chok Tong said on Wednesday.
Goh said that after a year-long pilot scheme involving 10,000 homes, Singapore ONE (One Network for Everyone) had now been launched commercially and he expected up to 50 percent of Singapore homes to be subscribers by the year 2001.
`Singapore ONE will be available not only to all homes and businesses in Singapore, but also to schools, libraries and community centres,'' Goh said at the opening of an Asia-Pacific Economic Cooperation (APEC) ministerial meeting on the telecommunications and information industries.
Singapore ONE is a project to make the country of 3.5 million people an ``intelligent island`, with each home wired by fibre optics into cutting-edge multi-media systems and interactive cable television.
It will allow users to do anything from grocery shopping to paying their annual taxes to studying for a degree from home.
They can expect to pay about Singapore $3,000 (US$1,800) to get started.
`For users, the increasing numbers and variety of applications that we expect to get on to Singapore ONE in the next few years will offer them a new world of advanced, interactive and multimedia experiences,'' National Computer Board (NCB) chief Stephen Yeo said.
He said the government would continue to provide strong support to Singapore ONE by being an ``anchor tenant`, delivering various applications and services via the system, and by helping businesses financially to join up.
The NCB said the government had committed S$150 million so far and would put up to S$150 million more into the system.
US$1 = S$1.68

©1997 - 1998 Mercury Center. The information you receive online from Mercury Center is protected by the copyright laws of the United States. The copyright laws prohibit any copying, redistributing, retransmitting, or repurposing of any copyright-protected material.

netCmr.society.USA-INFORMATION-SUPERHIGHWAY

NAME

name::
* McsEngl.netCmr.society.USA-INFORMATION-SUPERHIGHWAY@cptIt,
* McsEngl.conceptIt258,
* McsEngl.NII@cptIt,
* McsEngl.NATIONAL-INFORMATION-INFRASTRUCTURE@cptIt,
* McsEngl.National-information-superhighway@cptIt,
* McsEngl.information-infrastucture@cptIt,
* McsEngl.information'superhighway'usa@cptIt258,
* McsEngl.usa-data-highway@cptIt,
* McsElln.ΨΗΦΙΑΚΟΣ-ΑΥΤΟΚΙΝΗΤΟΔΡΟΜΟΣ@cptIt,

DEFINITION

** ΣΧΕΔΙΟ ΓΙΑ ΕΝΑ ΔΙΚΤΥΟ ΟΠΤΙΚΩΝ ΙΝΩΝ ΠΟΥ ΘΑ ΣΥΝΔΕΕΙ ΟΛΗ ΤΗΝ ΑΜΕΡΙΚΗ.
* Ο ΤΖΟΝ ΣΚΑΛΕΙ, Ο ΠΡΟΕΔΡΟΣ ΤΗΣ apple ΠΟΥ ΕΙΝΑΙ ΣΥΜΒΟΥΛΟΣ ΤΟΥ ΠΡΟΕΔΡΟΥ ΚΛΙΝΤΟΝ ΕΠΙΜΕΝΕΙ ΣΤΗΝ ΕΝΝΟΙΑ. "ΤΟΝ 19ο ΑΙΩΝΑ -ΥΠΕΝΘΥΜΙΖΕΙ- Ο ΣΙΔΗΡΟΔΡΟΜΟΣ ΕΝΩΣΕ ΤΗΝ ΑΜΕΡΙΚΗ. ΣΤΗ ΔΕΚΑΕΤΙΑ ΤΟΥ 50, Η ΚΥΒΕΡΝΗΣΗ ΕΝΙΣΧΥΣΕ ΤΙΣ ΣΥΓΚΟΙΝΩΝΙΕΣ ΜΕ ΕΝΑ ΤΕΡΑΣΤΙΟ ΔΙΚΤΥΟ ΑΥΤΟΚΙΝΗΤΟΔΡΟΜΩΝ ΚΑΙ ΔΕΥΤΕΡΕΥΟΝΤΩΝ ΔΡΟΜΩΝ. ΚΑΙ ΟΙ ΔΥΟ ΑΥΤΕΣ ΟΙ ΠΡΟΣΠΑΘΕΙΕΣ ΟΔΗΓΗΣΑΝ ΣΕ ΜΙΑ ΕΚΠΛΗΚΤΙΚΗ ΟΙΚΟΝΟΜΙΚΗ ΑΝΑΠΤΥΞΗ. ΤΟ 2000 Η ΑΜΕΡΙΚΗ ΘΑ ΠΡΕΠΕΙ ΝΑ ΔΗΜΙΟΥΡΓΗΣΕΙ ΕΝΑ ΔΙΚΤΥΟ ΟΠΤΙΚΩΝ ΙΝΩΝ ΠΟΥ ΘΑ ΠΡΟΚΑΛΕΣΕΙ ΕΝΑ ΤΕΡΑΣΤΙΟ ΠΟΛΙΤΙΣΤΙΚΟ ΑΛΜΑ, ΤΟ ΜΕΓΑΛΥΤΕΡΟ ΤΗΣ ΙΣΤΟΡΙΑΣ".
Ο ΜΙΤΣ ΚΑΠΟΥΡ, ΠΡΟΕΔΡΟΣ ΤΟΥ ΙΔΡΥΜΑΤΟΣ "ΗΛΕΚΤΡΟΝΙΚΩΝ ΣΥΝΟΡΩΝ" ΤΗ ΘΕΩΡΕΙ ΥΠΟΧΡΕΩΤΙΚΗ ΕΠΙΛΟΓΗ ΓΙΑ ΝΑ ΚΕΡΔΙΘΕΙ Η ΜΑΧΗ ΜΕ ΤΗΝ ΕΟΚ ΚΑΙ ΤΗΝ ΙΑΠΩΝΙΑ.
* Ο ΑΝΤΙΠΡΟΕΔΡΟΣ ΤΩΝ ΗΠΑ ΑΛ ΓΚΟΡ, ΠΟΥ ΜΕΛΕΤΑ ΤΟ ΣΧΕΔΙΟ ΕΔΩ ΚΑΙ ΔΕΚΑ ΧΡΟΝΙΑ, ΤΗΝ ΑΠΟΚΑΛΕΙ "ΗΛΕΚΤΡΟΝΙΚΟ ΣΙΔΗΡΟΔΡΟΜΟ" ή ΑΥΤΟΚΙΝΗΤΟΔΡΟΜΟ ΤΗΣ ΠΛΗΡΟΦΟΡΗΣΗΣ. ΑΝΑΜΦΙΒΟΛΑ ΕΙΝΑΙ ΤΟ ΠΙΟ ΑΚΡΙΒΟ ΚΑΙ ΦΙΛΟΔΟΞΟ ΣΧΕΔΙΟ ΤΗΣ ΙΣΤΟΡΙΑΣ ΕΙΠΕ, 200 ΔΙΣ ΔΟΛ.
* ΘΑ ΣΥΝΔΕΕΙ ΗΛΕΚΤΡΟΝΙΚΕΣ ΤΡΑΠΕΖΕΣ ΔΕΔΟΜΕΝΩΝ, ΘΑ ΕΧΕΙ ΠΡΟΣΒΑΣΗ ΚΑΘΕ ΑΠΛΟΣ ΑΝΘΡΩΠΟΣ.
[ΚΑΘΗΜΕΡΙΝΗ, 11 ΑΠΡΙ 1993, 40]

COST

ΘΑ ΚΟΣΤΙΣΕΙ ΣΥΝΟΛΙΚΑ 200 ΔΙΣ ΔΟΛΑΡΙΑ
[ΤΗΝ-"ΥΠΕΡΛΕΩΦΟΡΟ..., 1993, Δ39#cptResource132]

FINANCING

54 ΕΚ ΔΟΛΑΡΙΑ ΑΠΟ ΤΟΝ ΟΜΟΣΠΟΔΝΙΑΚΟ ΠΡΟΥΠΟΛΟΓΙΣΜΟ ΤΟΥ 1994
150 ΕΚ ΔΟΛ ΑΠ ΤΟΝ ΟΜΟΣΠ ΠΡΟΥΠΟΛΟΓΙΣΜΟ ΤΟΥ 1995
[ΤΗΝ-"ΥΠΕΡΛΕΩΦΟΡΟ..., 1993, Δ39#cptResource132]

IMPORTANCE#cptCore781#

Ο ΙΘΥΝΩΝ ΤΗΣ ΕΤΑΙΡΕΙΑΣ Apple Computer ΤΖΩΝ ΣΚΑΛΕΙ ΕΦΘΑΣΕ ΜΑΛΙΣΤΑ ΣΤΟ ΣΗΜΕΙΟ ΝΑ ΖΗΤΗΣΕΙ ΑΠΟ ΤΟΝ ΚΛΙΝΤΟΝ ΝΑ ΘΕΣΕΙ ΤΗΝ ΚΑΤΑΣΚΕΥΗ ΤΟΥ ΔΙΚΤΥΟΥ ΩΣ ΚΥΡΙΟ ΣΤΟΧΟ ΤΟΥ, ΚΑΤΑ ΤΟ ΠΡΟΤΥΠΟ ΤΟΥ ΣΤΟΧΟΥ ΠΟΥ ΕΙΧΕ ΘΕΣΕΙ Ο ΜΑΚΑΡΙΤΗΣ ΠΡΟΕΔΡΟΣ ΚΕΝΕΝΤΙ ΓΙΑ ΤΗΝ ΑΠΟΣΤΟΛΗ ΑΝΘΡΩΠΟΥ ΣΤΗ ΣΕΛΗΝΗ.
... Ο ΣΚΑΛΕΙ ΔΗΛΩΣΕ: "ΧΡΕΙΑΖΟΜΕΘΑ ΑΥΤΗ ΤΗΝ ΥΠΟΔΟΜΗ ΓΙΑ ΝΑ ΜΑΣ ΕΙΣΑΓΕΙ ΣΤΟΝ 21ο ΑΙΩΝΑ. ΕΙΜΑΣΤΕ ΣΤΟ 1993. ΑΛΛΑ ΠΡΕΠΕΙ ΝΑ ΑΡΧΙΣΟΥΜΕ ΝΑ ΔΗΜΙΟΥΡΓΟΥΜΕ ΤΟΝ ΝΕΟ ΑΙΩΝΑ ΑΠΟ ΣΗΜΕΡΑ."
[ΤΗΝ-"ΥΠΕΡΛΕΩΦΟΡΟ..., 1993, Δ39#cptResource132]

USES

ΟΤΑΝ ΠΡΑΓΜΑΤΟΠΟΙΗΘΕΙ, ΜΑΘΗΤΕΣ ΑΓΡΟΤΙΚΩΝ ΣΧΟΛΕΙΩΝ ΘΑ ΕΙΝΑΙ ΣΕ ΘΕΣΗ ΝΑ ΠΡΟΣΦΕΥΓΟΥΝ, ΜΕΣΩ ΥΠΟΛΟΓΙΣΤΩΝ, ΣΕ ΔΗΜΟΣΙΕΣ ΒΙΒΛΙΟΘΗΚΕΣ ΤΗΣ ΟΥΑΣΙΓΤΟΝ.

ΓΙΑΤΡΟΙ ΣΕ ΜΑΚΡΙΝΕΣ ΜΕΤΑΞΥ ΤΟΥΣ ΠΟΛΕΙΣ ΘΑ ΜΠΟΡΟΥΝ ΝΑ ΣΥΝΕΡΓΑΣΤΟΥΝ ΓΙΑ ΤΗΝ ΠΕΡΙΘΑΛΨΗ ΕΝΟΣ ΑΣΘΕΝΟΥΣ ΠΑΡΑΚΟΛΟΥΘΩΝΤΑΣ ΤΗΝ ΕΞΕΤΑΣΗ ΤΟΥ ΣΤΙΣ ΟΘΟΝΕΣ ΤΟΥΣ.

ΜΙΑ ΜΙΚΡΗ ΕΠΙΧΕΙΡΗΣΗ ΣΤΗ ΦΛΟΡΙΔΑ ΘΑ ΜΠΟΡΕΙ ΝΑ ΚΑΝΕΙ ΧΡΗΣΗ ΕΝΟΣ ΥΠΕΡΥΠΟΛΟΓΙΣΤΗ ΣΤΗ ΜΙΝΕΣΟΤΑ.
[ΤΗΝ-"ΥΠΕΡΛΕΩΦΟΡΟ..., 1993, Δ39#cptResource132]

ΕΚΠΑΙΔΕΥΣΗ: ΟΙ ΚΑΛΥΤΕΡΟΙ ΚΑΘΗΓΗΤΕΣ ΚΑΙ ΤΑ ΚΑΛΥΤΕΡΑ ΣΕΜΙΝΑΡΙΑ ΘΑ ΕΙΝΑΙ ΔΙΑΘΕΣΙΜΑ ΣΤΟΥΣ ΕΚΠΑΙΔΕΥΟΜΕΝΟΥΣ, ΑΝΕΞΑΡΤΗΤΩΣ ΤΗΣ ΓΕΩΓΡΑΦΙΚΗΣ ΤΟΥΣ ΘΕΣΗΣ ή ΤΗΣ ΤΥΧΟΝ ΑΝΑΠΗΡΙΑΣ ΤΟΥΣ.
[CHIP, JAN 1994, 138]

EVOLUTING

SEPT 1993:
Ο ΑΝΤΙΠΡΟΕΔΡΟΣ ΓΚΟΡ ΤΟ ΑΝΗΓΚΕΙΛΕ ΜΕΣΑ ΣΤΑ ΠΛΑΙΣΙΑ ΤΗΣ ΑΝΑΔΙΑΜΟΡΦΩΣΗΣ ΤΟΥ ΚΥΒΕΡΝΗΤΙΚΟΥ ΣΥΣΤΗΜΑΤΟΣ.
[CNN]

netCmr.society.USSR

name::
* McsEngl.netCmr.society.USSR@cptIt,
* McsEngl.netCmr.USSR@cptIt,

{time.1985}:
Συνδέθηκε σε ενιαίο δίκτυο ο έλεγχος της οικονομίας.
[ΔΗΜΗΤΡΙΟΥ-5, 1986, 101#cptResource168]

netCmr.TOR

name::
* McsEngl.netCmr.TOR@cptIt,
* McsEngl.Tor-network@cptIt,

_DESCRIPTION:
The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features.
[https://www.torproject.org/about/overview.html.en]

netCmr.VIRTUAL

_CREATED: {2015-08-14}

name::
* McsEngl.netCmr.VIRTUAL@cptIt,
* McsEngl.net.virtual@cptIt,
* McsEngl.network.virtual@cptIt,
* McsEngl.virtual-network@cptIt,

_DESCRIPTION:
In computing, network virtualization is the process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network. Network virtualization involves platform virtualization, often combined with resource virtualization.
[https://en.wikipedia.org/wiki/Network_virtualization]
===
What is a VPN and How Does It Work?
VPN connections are sometimes referred to as “tunneling.” Usually, you have some type of software installed on your computer, and you use that software to connect to the VPN service. This service can be within a corporate network, or you can connect to a private server that you use for Internet access. You must authenticate before accessing a VPN service, which means you need a user name and password to access the network. This protects your connection, so only you can access the service.
After authentication occurs, you then have a secure connection between your computer and the server’s network. The server’s administrator can limit access to services from the server’s end, but for the most part, you have similar access as if you are authenticated locally. All data is encrypted between your computer and the server, which is especially important when you access private networks over the Internet.
How VPN Connections Benefit You

Businesses big and small benefit from setting up VPN connections. VPN allows employees who are working from home to connect to a private network over the Internet. A VPN service gives protection to the business and the employee. The software is typically installed on the employee’s computer, and the employee uses the service to perform daily tasks as if the employee is logged in locally.

Internet users can also benefit from VPN service. If you want to improve anonymity on the Internet, VPN providers give you a way to access the Internet through a “tunnel” service. You connect to the VPN service, and then you connect to the Internet from the VPN service. This type of access masks your communication over the Internet because the data is encrypted. It also displays the VPN’s IP address when you connect to a website. This means that your private home IP address isn’t exposed when browsing different websites.

Internet marketing people sometimes need a foreign IP to check website search engine rank or use tools that are only available to certain countries. VPN services offer you a different IP address, so you can “spoof” the IP address in the country of your choice. For instance, if you want to connect to a website or service that only allows United States users, you can use a VPN service in the United States to access the service. When checking website search engine rank for a particular country, you can use the VPN to check statistical data from the target country.

Using a VPN service has several benefits, but the overall advantage is the privacy through data encryption between your computer and the target server. Using a VPN, you can improve the protection of your data, and stay anonymous on the Internet. If you need more help choosing, read one of our VPN reviews and find the best VPN provider for your needs.
[http://www.top10bestvpn.com/]

SPECIFIC

_SPECIFIC:
* Azure
* VLAN##
* VPN##

netVrl.AZURE (VNet)

name::
* McsEngl.netVrl.AZURE (VNet)@cptIt,

_DESCRIPTION:
An Azure virtual network (VNet) is a representation of your own network in the cloud. You can control your Azure network settings and define DHCP address blocks, DNS settings, security policies, and routing. You can also further segment your VNet into subnets and deploy Azure IaaS virtual machines (VMs) and PaaS role instances, in the same way you can deploy physical and virtual machines to your on-premises datacenter. In essence, you can expand your network to Azure, bringing your own IP address blocks.
[https://azure.microsoft.com/en-us/documentation/articles/virtual-networks-overview/]

netVrl.VLAN

name::
* McsEngl.netVrl.VLAN@cptIt,
* McsEngl.netCmr.vlan@cptIt,
* McsEngl.VLAN@cptIt,

_DESCRIPTION:
A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). LAN is an abbreviation of local area network.

To subdivide a network into virtual LANs, one configures a network switch or router. Simpler network devices can only partition per physical port (if at all), in which case each VLAN is connected with a dedicated network cable (and VLAN connectivity is limited by the number of hardware ports available). More sophisticated devices can mark packets through tagging, so that a single interconnect (trunk) may be used to transport data for multiple VLANs.

Grouping hosts with a common set of requirements regardless of their physical location by VLAN can greatly simplify network design. A VLAN has the same attributes as a physical local area network (LAN), but it allows for end stations to be grouped together more easily even if they are not on the same network switch. VLAN membership can be configured through software instead of physically relocating devices or connections. Most enterprise-level networks today use the concept of virtual LANs. Without VLANs, a switch considers all interfaces on the switch to be in the same broadcast domain.

To physically replicate the functions of a VLAN would require a separate, parallel collection of network cables and equipment separate from the primary network. However, unlike physically separate networks, VLANs share bandwidth, so VLAN trunks may require aggregated links and/or quality of service prioritization.
[https://en.wikipedia.org/wiki/Virtual_LAN]

netCmr.VPN

_CREATED: {2013-08-27}

name::
* McsEngl.netCmr.VPN@cptIt,
* McsEngl.vpn@cptIt,
* McsEngl.virtual-private-network@cptIt,
* McsEngl.VPN@cptIt,

* McsEngl.name.vpn@cptIt,
====== lagoGreek:
* McsElln.ιδεατό-ιδιωτικό-δίκτυο@cptIt,

_DESCRIPTION:
A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefitting from the functionality, security and management policies of the private network.[1] This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.

A VPN connection across the Internet is similar to a wide area network (WAN) link between the sites. From a user perspective, the extended network resources are accessed in the same way as resources available from the private network.[2]

VPNs allow employees to securely access their company's intranet while traveling outside the office. Similarly, VPNs securely and cost-effectively connect geographically disparate offices of an organization, creating one cohesive virtual network. VPN technology is also used by ordinary Internet users to connect to proxy servers for the purpose of protecting one's identity.
[http://en.wikipedia.org/wiki/VPN]

netVpn'protocol

name::
* McsEngl.netVpn'protocol@cptIt,
* McsEngl.tunneling-protocol@cptIt,

PPTP

name::
* McsEngl.name.PPTP@cptIt,

_DESCRIPTION:
Point-to-point tunneling protocol (PPTP) — Found built into most versions of the Windows operating system, this is one of the most popular protocols. The communications system it uses establishes a direct connection that enables streams of data to be exchanged. It guarantees that the data you transmit will be delivered and received in the same order that you sent it.
[http://www.top10bestvpn.com/what-are-vpn-tunneling-protocols-article]

L2TP

name::
* McsEngl.name.L2TP@cptIt,

_DESCRIPTION:
Layer 2 Tunneling Protocol (L2TP) — An extension of the point-to-point tunneling protocol, it marries the best aspects of two other tunneling protocols, Microsoft’s PTPP and L2F from Cisco Systems. Its two main components are a mechanism called an Access concentrator that terminates a call and the network server that ensures that your data reaches its destination securely. Because this protocol enables data packets to be processed at a location set apart from where the circuit is terminated, security is enhanced. You also never need to worry about paying long-distances charges with this protocol.
[http://www.top10bestvpn.com/what-are-vpn-tunneling-protocols-article]

IPsec

name::
* McsEngl.name.IPsec@cptIt,

_DESCRIPTION:
IP Security (IPsec) — This is actually a suite that incorporates the best of several tunneling protocols. When combined with Point-to-Point tunneling or layer2 tunneling protocols, it provides a secure transaction of data within a virtual private network tunnel. By verifying each packet of data you are sending and converting it into a secret code that can only be unlocked by the recipient, this protocol is excellent at protecting your valuable data. It can be used to promote communication between users, networks and even firewalls. Because it is placed deep in the network layer of the system, it is more flexible than many other protocols and does not require that your applications be specifically designed to use it. Only this protocol protects all application traffic over an IP network. It provides ways for data to be mutually authenticated by both parties at the start of a session, as well as ways to convert data into secret codes and to unencrypt it.
[http://www.top10bestvpn.com/what-are-vpn-tunneling-protocols-article]

SSTP

name::
* McsEngl.name.SSTP@cptIt,

_DESCRIPTION:
Secure Socket Tunneling Protocol (SSTP) — This protocol provides for secure passage of data between a network server and a remote terminal, bypassing any firewalls or web proxies it might contact along the way. To make this happen, it uses HTTPS protocol and is often the go-to choice if the other popular tunneling protocols fail to perform effectively.
[http://www.top10bestvpn.com/what-are-vpn-tunneling-protocols-article]

OpenVPN

name::
* McsEngl.name.OpenVPN@cptIt,

_DESCRIPTION:
OpenVPN — This protocol enables data to pass from one entity to another by establishing an encrypted UDP connection between the source and the destination. Whereas many other protocols are only compatible with certain operating systems, OpenVPN will work with any of them.

SSL-VPN

name::
* McsEngl.name.SSL-VPN@cptIt,

_DESCRIPTION:
Secure Sockets Layer Virtual Private Network (SSL VPN) —This protocol can be used with a standard web browser. Unlike IPsec, the end user does not need to install specialized software. This protocol gives remote users access to web applications, servers and internal networks. To utilize this, a person uses a web browser to connect to one or more VPN devices. The SSL protocol is used to encrypt the data as it travels to and fro in the tunnel.
[http://www.top10bestvpn.com/what-are-vpn-tunneling-protocols-article]

netVpn'resource

name::
* McsEngl.netVpn'resource@cptIt,

_ADDRESS.WPG:
* https://www.boxpn.com//
* https://www.youtube.com/watch?v=plvWpky92eU,

netVpn'security

name::
* McsEngl.netVpn'security@cptIt,

Benefits of VPN: Secure Your Communication on the Internet from Anywhere in the World
Virtual Private Networks (VPN) encrypt and protect your data connection over the Internet. What you transmit over the Internet is open for prying eyes, but you can protect that data using a VPN. A VPN secures data between you and your business, or you can obtain anonymity and protection for your personal information using a VPN provider service.
[http://www.top10bestvpn.com/]

AquaVPN

Keylogger διαδίδεται μέσω ψεύτικης υπηρεσίας VPN
ΑΘΗΝΑ 22/12/2013

Τα δίκτυα VPN (virtual private network) αποτελούν έναν πολύ καλό τρόπο για την προστασία των δεδομένων, με αποτέλεσμα όλο και περισσότεροι χρήστες να στρέφονται προς αυτά.

Ωστόσο, οι ειδικοί προειδοποιούν σχετικά με την ύπαρξη μη αξιόπιστων ιστοσελίδων, οι οποίες υπόσχονται λογισμικό για την δημιουργία ασφαλών συνδέσεων VPN.

Μια παρόμοια ιστοσελίδα, με την ονομασία AquaVPN, εντοπίστηκε από ερευνητές της Malwarebytes. Η ιστοσελίδα αυτή, υποτίθεται ότι έχει σχεδιαστεί για την παροχή υπηρεσιών VPN, στην πραγματικότητα όμως έχει συσταθεί από εγκληματίες του κυβερνοχώρου, με σκοπό τη διανομή κακόβουλου λογισμικού.

Προκειμένου να συνδεθούν μέσω του δικτύου της AquaVPN, οι χρήστες καλούνται να εκτελέσουν ένα Java Applet. Όταν το applet εκτελεστεί, δημιουργούνται δύο αρχεία στον σκληρό δίσκο του θύματος.

Το ένα αρχείο είναι ένα keylogger, το οποίο χρησιμοποιείται για την καταγραφή των πληκτρολογήσεων, ενώ το άλλο αρχείο χρησιμοποιείται για την αποθήκευση των κλεμμένων πληροφοριών.

Πρόσθετες τεχνικές λεπτομέρειες είναι διαθέσιμες στο blog της Malwarebyte

Πηγή: SecNews
[http://www.nooz.gr/tech/keylogger-diadidetai-meso-pseitikis-upiresias-vpn]

SPECIFIC

netVpn.ExpressVPN

name::
* McsEngl.netVpn.ExpressVPN@cptIt,

_ADDRESS.WPG:
* https://www.expressvpn.com//

netVpn.NeoRouter

name::
* McsEngl.netVpn.NeoRouter@cptIt,

_ADDRESS.WPG:
* http://www.neorouter.com/index.html,

_DESCRIPTION:
NeoRouter is a cross-platform zero-configuration VPN solution that securely connects Windows, Mac, Linux and FreeBSD computers at any locations into a virtual LAN and provides a networking platform for various applications like remote desktop, shared folders and printers, offsite backup, voice & video chat, etc.
[http://www.neorouter.com/products.html]

netVpn.OpenVpn

name::
* McsEngl.netVpn.OpenVpn@cptIt,
* McsEngl.OpenVpn@cptIt,

_DESCRIPTION:
OpenVPN is an open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocol[2] that utilizes SSL/TLS for key exchange. It is capable of traversing network address translators (NATs) and firewalls. It was written by James Yonan and is published under the GNU General Public License (GPL).[3]
OpenVPN allows peers to authenticate each other using a pre-shared secret key, certificates, or username/password. When used in a multiclient-server configuration, it allows the server to release an authentication certificate for every client, using signature and Certificate authority. It uses the OpenSSL encryption library extensively, as well as the SSLv3/TLSv1 protocol, and contains many security and control features.
[http://en.wikipedia.org/wiki/OpenVPN]

netCmr.ΕΔΕΤ

name::
* McsEngl.netCmr.ΕΔΕΤ@cptIt,
* McsElln.ΕΔΕΤ-2001@cptIt,
* McsElln.ΕΘΝΙΚΟ-ΔΙΚΤΥΟ-ΕΡΕΥΝΑΣ-ΚΑΙ-ΤΕΧΝΟΛΟΓΙΑΣ@cptIt,

_DESCRIPTION:
ΕΘΝΙΚΟ ΔΙΚΤΥΟ ΕΡΕΥΝΑΣ ΚΑΙ ΤΕΧΝΟΛΟΓΙΑΣ.
Θα συνδέσει πανεπιστήμια, ερευνητικά κέντρα και οργανισμούς εντός και εκτος ελλάδας.
- Εντάσσεται στο πρόγραμμα ΕΠΕΤ ΙΙ του Β ΚΠΣ
- Προυπολογισμός 1,5 δισ δρχ για τα επόμενα 3 χρόνια
- Η διεθνής σύνδεση θα αρχίσει από τα 2 Mbit/sec.
[ΚΑΘΗΜΕΡΙΝΗ, 25 ΙΟΥΝ. 1995, 59]

resourceInfHmn#cptResource843#

* http://www.grnet.gr//

ΤΕΤΑΡΤΗ 17 ΣΕΠΤΕΜΒΡΙΟΥ 1997
Στα 10 MBps το ΕΔΕΤ
<Picture>Πρόσφατα, και μέσα στα πλαίσια της κοινοπραξίας Διευρωπαϊκών Δικτύων Ακαδημαϊκών και Ερευνητικών Ιδρυμάτων ΤΕΝ-34 αναβαθμίστηκε η διεθνής διασύνδεση του ΕΔΕΤ μέσω νέας γραμμής με την Ιταλία. Η γραμμή αυτή που στηρίζεται στην τελευταίου τύπου τεχνολογία δικτύων τύπου ΑΤΜ (Asynchronous Transfer Mode) συνδέει τη χώρα μας, για πρώτη φορά με το ευρωπαϊκό τμήμα του Internet με την καταπληκτική για τα σημερινά δεδομένα ταχύτητα των 10Μbps. O συντονισμός της ελληνικής συμμετοχής στο ΤΕΝ-34 γίνεται από ΚΕΔ σε συνεργασία με το Εργαστήριο Βέλτιστου Σχεδιασμού και Διαχείρισης Δικτύων του Τμήματος Ηλεκτρολόγων Μηχανικών και Μηχανικών Ηλεκτρονικών Υπολογιστών του Ε.Μ.Π.. Το Εθνικό Δίκτυο Έρευνας και Τεχνολογίας (ΕΔΕΤ) δημιουργήθηκε για την προσφορά υψηλού επιπέδου διεθνούς δικτυακής διασύνδεσης των Ελληνικών Ακαδημαϊκών και Ερευνητικών Ιδρυμάτων με χρηματοδότηση από το Δεύτερο Κοινοτικό Πλαίσιο Στήριξης. Το ΕΔΕΤ συντονίζεται από την Γενική Γραμματεία Έρευνας και Τεχνολογίας (ΓΓΕΤ), ενώ την τεχνική διαχείριση του έργου έχει αναλάβει το Κέντρο Διαχείρισης Δικτύων (ΚΕΔ) του Ε.Μ.Π.
<Picture: To EΔΕΤ στο ΤΕΝ-34><Picture>Το ΕΔΕΤ είναι το Εθνικό Ερευνητικό Δίκτυο της χώρας (National Research Network - NRN) κατά τα πρότυπα των αντιστοίχων δικτύων των χωρών της Ευρωπαϊκής Ενωσης (π.χ. RENATER - Γαλλία, UKERNA - Μεγάλη Βρετανία, GARR - Ιταλία, DFN - Γερμανία). Συγχρηματοδοτήθηκε από το ΚΠΣ της ΓΓΕΤ (ΕΠΕΤ ΙΙ) με 1,5 δις. δρχ. και ήδη, κατά τη πρώτη φάση λειτουργίας του (1995 - 1997) αντικατέστησε τα δίκτυα ARIADNE-t και FORTHnet σαν ο βασικός φορέας παροχής υπηρεσιών Internet στη Ακαδημαϊκή και Ερευνητική Κοινότητα της χώρας, διακινώντας το 80% του συνολικού φορτίου των ΑΕΙ. Εξυπηρετεί 13 ΑΕΙ, 3 Ερευνητικά Κέντρα και τη ΓΓΕΤ, μέσω της δικτυακής υπηρεσίας του ΟΤΕ HELLASPAC II (Frame Relay) και μισθωμένων κυκλωμάτων. Παράλληλα, παρέχει δωρεάν την υπηρεσία εθνικής διασύνδεσης (peering) μέσω του κόμβου Athens Internet Exchange (AIX) στους βασικούς εμπορικούς φορείς παροχής υπηρεσίων Internet (ISP) της χώρας: OTEnet, FORTHnet, HOL, IGN. <Picture: Η τοπολογία του EΔΕΤ><Picture>Το ΕΔΕΤ έχει επιλεγεί από την κοινοπραξία ΑΕΙ/ΤΕΙ της χώρας (GUNET) σαν ο φορέας παροχής υπηρεσιών Internet, στην λογική της συμπληρωματικότητας του ΚΠΣ του Υπουργείου Παιδείας και της ΓΓΕΤ, και της προνομιακής μεταχείρισης που απολαμβάνουν τα αυτοδιαχειριζόμενα, μη εμπορικά Εθνικά Ερευνητικά Δίκτυα από πλευράς της Ευρωπαϊκής Ενωσης. Το ΕΔΕΤ έχει αναπτύξει σχέσεις στενής συνεργασίας με τους αντίστοιχους φορείς των κρατών μελών της Ευρωπαϊκής Ενωσης και την κοινοπραξία των δικτύων TERENA, και μετέχει ενεργά στο Διευρωπαϊκό Δίκτυο EUROPANET - DANTE και την συνέχειά του, το έργο TEN - 34. <Picture>Από την αρχή της λειτουργίας του, το ΕΔΕΤ ανέπτυξε ιδαίτερα αρμονικές σχέσεις με τον ΟΤΕ, ο οποίος παρέχει την βασική δικτυακή υποδομή και τους χώρους εγκατάστασης των κόμβων του ΕΔΕΤ (Αθήνα, Θεσσαλονίκη, Ηράκλειο Κρήτης). Ο εξοπλισμός ανήκει στην ΓΓΕΤ και οι χώροι εγκατάστασης παρέχονται από τον ΟΤΕ με συμφωνητικό ενοικίασης. Η πολιτική αυτή, διασφαλίζει την αδιάλειπτη λειτουργία των κόμβων υπό την επίβλεψη των τεχνικών του ΟΤΕ, επιτρέπει την οικονομικότερη διασύνδεση γραμμών του ΕΔΕΤ και διευκολύνει την αμφίδρομη ανταλλαγή εμπειριών μεταξύ της Ακαδημαϊκής κοινότητας και του Εθνικού Φορέα Τηλεπικοινωνιών. <Picture>Το ΕΔΕΤ σήμερα διαθέτει 3 κόμβους σε Αθήνα, Θεσσαλονίκη και Ηράκλειο και γραμμές Αθήνα - Θεσ/νίκη και Αθήνα - Ηράκλειο στα 2Mbps. Η διεθνής σύνδεση του ΕΔΕΤ πραγματοποιείται με μισθωμένο διεθνές κύκλωμα 2 Mbps μέσω του Διευρωπαϊκού Φορέα Διασύνδεσης Ερευνητικών - Ακαδημαϊκών δικτύων DANTE, ενώ υπάρχει εφεδρία στα 256 Kbps. <Picture>Το ΕΔΕΤ αναβαθμίζει τη διεθνή σύνδεσή του στα πλαίσια του έργου ΤΕΝ - 34, το οποίο χρηματοδοτείται από την Ευρωπαϊκή Επιτροπή και τα Εθνικά Ερευνητικά Δίκτυα των Κρατών - Μελών. Από πλευράς της χώρας μας εταίρος στο έργο είναι η ΓΓΕΤ (μέσω του ΕΔΕΤ), με επίκουρο εταίρο (associate partner) τον ΟΤΕ. Με το έργο αυτό, υλοποιήθηκε διεθνής σύνδεση στα 10 Mbps, μέσω του δημοσίου δικτύου ΑΤΜ της Telecom Italia και με χρήση δικτυακού εξοπλισμού πρόσβασης ΑΤΜ τον οποίο έχει προμηθευτεί το ΕΔΕΤ και έχει εγκατασταθεί στις εγκαταστάσεις που ενοικιάζονται από τον ΟΤΕ (Κωλέττη). Το φυσικό κύκλωμα αποτελείται από επίγειο φορέα των 34 Mbps, τον οποίο έχουν εγκαταστήσει και δοκιμάσει για το ΤΕΝ - 34 ο ΟΤΕ και η Telecom Italia (Αθήνα - Κέρκυρα - Οτράντο - Μιλάνο). Μετά την ολοκλήρωση των δοκιμαστικών μετρήσεων το κύκλωμα θα δοθεί στην παραγωγή, πραγματοποιώντας μια ιδιαίτερα σημαντική αναβάθμιση της ταχύτητας πρόσβασης των ΑΕΙ/ΤΕΙ και Ερευνητικών Κέντρων στο Internet. Η Ελληνική συμμετοχή στο ΤΕΝ - 34 θα ισχυροποιηθεί με την επικείμενη αποκατάσταση του δημοσίου δικτύου ΑΤΜ του ΟΤΕ. <Picture>Για το άμεσο μέλλον, και πάντως εντός του 1998, εκτός από τους κόμβους Αθήνας, Θεσσαλονίκης και Ηράκλειου θα αναπτυχθούν κόμβοι πρόσβασης στην Πάτρα, στα Ιωάννινα και στην Ξάνθη. Εχει ήδη ολοκληρωθεί ο διαγωνισμός για την προμήθεια του αναγκαίου εξοπλισμού επέκτασης του δικτύου, και οι σχετικές αιτήσεις για μίσθωση κυκλωμάτων και χώρων έχουν υποβληθεί στον ΟΤΕ σύμφωνα με την ισχύουσα πρακτική. <Picture>Ο βασικός άξονας Θεσσαλονίκη - Αθήνα - Ηράκλειο θα αναβαθμιστεί στα 34 Mbps με χρήση κόμβων πρόσβασης ATM και όταν αυτό καταστεί εφικτό, με χρήση του δημοσίου δικτύου ΑΤΜ του ΟΤΕ. Εχει ήδη αποσταλεί σχετική επιστολή του Γενικού Γραμματέα Ερευνας & Τεχνολογίας στον ΟΤΕ, όπου ζητούνται ειδικά τιμολόγια λόγω της Εκπαιδευτικής - Ερευνητικής φύσης του ΕΔΕΤ. <Picture>Tο ΕΔΕΤ συμμετέχει στην πρόταση QUANTUM η οποία έχει υποβληθεί στην Ευρωπαϊκή Επιτροπή σαν συνέχεια και αναβάθμιση του έργου ΤΕΝ - 34. Το έργο στοχεύει στην περαιτέρω αναβάθμιση των διεθνών συνδέσεων, μέχρι και 155 Mbps και στην ανάπτυξη προηγμένων εφαρμογών πολυμέσων. Ειδικά για την Ελλάδα, η διεθνής σύνδεση με την Ιταλία προβλέπεται να αναβαθμιστεί στα 34 Mbps με χρήση τεχνολογίας ΑΤΜ. <Picture>Το ΕΔΕΤ θα προχωρήσει σε δικτυακές συνδέσεις με τα Ερευνητικά - Ακαδημαϊκά δίκτυα γειτονικών χωρών (Βουλγαρία, Ρουμανία, Κύπρο) και, με παρότρυνση της Ευρωπαϊκής Επιτροπής, διερευνάται η δυνατότητα σύνδεσης του Ακαδημαϊκού - Ερευνητικού Δικτύου του Ισραήλ μέσω Κύπρου και ΕΔΕΤ προς το ΤΕΝ - 34. <Picture>Βρίσκεται στο στάδιο της ολοκλήρωσης η διαδικασία έκδοσης Προεδρικού Διατάγματος για τη σύσταση της ΕΔΕΤ Α.Ε. που θα αναλάβει τη διαχείριση του ΕΔΕΤ. Αποκλειστικοί μέτοχοι θα είναι η ΓΓΕΤ, τα 18 ΑΕΙ και τα Ερευνητικά Κέντρα της χώρας, τα οποία έχουν ήδη εκδηλώσει ενδιαφέρον. Μέχρι σήμερα η πολιτική ανάπτυξης του δικτύου καθορίζεται από Διαχειριστική Επιτροπή, η οποία θα αποτελέσει το 1ο Διοικητικό Συμβούλιο της ΕΔΕΤ Α.Ε., από εκπροσώπους της ΓΓΕΤ και των Ακαδημαϊκών - Ερευνητικών φορέων. Η ΕΔΕΤ Α.Ε. θα καθορίσει την τιμολογιακή πολιτική προς τους διασυνδεόμενους Ακαδημαϊκούς - Ερευνητικούς φορείς, η οποία θα αντανακλά αυστηρά το κόστος, λαμβανομένων υπ' όψη των κρατικών και κοινοτικών επιδοτήσεων, και θα είναι υπεύθυνη απέναντι στην Εθνική Επιτροπή Τηλεπικοινωνιών για την τήρηση της νομοθεσίας, τον περιορισμό του ΕΔΕΤ σε παροχή μη εμπορικών υπηρεσιών προς Ακαδημαϊκούς - Ερευνητικούς φορείς και τη διασφάλιση του ΟΤΕ και των άλλων τηλεπικοινωνιακών φορέων από τον αθέμητο ανταγωνισμό. <Picture>Την τεχνική διαχείριση του ΕΔΕΤ έχει αναλάβει μέχρι σήμερα το Κέντρο Διαχείρισης Δικτύων του Ε. Μ. Πολυτεχνείου, όπως και την τεχνική στήριξη της συμμετοχής της ΓΓΕΤ στο ΤΕΝ - 34, σε συνεργασία με το Οικονομικό Πανεπιστήμιο Αθηνών και τον ΟΤΕ. <Picture: Το σημερινό ΤΕΝ-10><Picture>Tο ξεκίνημα του ΤΕΝ-34 τον Μάιο του 1997 σημαδεύει την αρχή αλλά και το τέλος μιας εποχής στα ερευνητικά δίκτυα. Οι Ευρωπαίοι ερευνητές τα τελευταία επτά χρόνια έχουν διαπιστώσει την ύπαρξη υψηλής ποιότητας δικτυακών υπηρεσιών διεθνούς διασυνδεσιμότητας μέσω του ΕuropaNET. To EuropaNET δίνει τώρα τη θέση του στο ΤΕΝ-34, ένα δίκτυο πολύ μεγαλύτερων δυνατοτήτων. Το πρώτο πραγματικά πανευρωπαικό ερευνητικό δίκτυο ήταν το ΙΧΙ (International X.25 Interconnection), ένα Χ.25 δίκτυο στα 64kbit/s με σημεία διασύνδεσης σε 18 Ευρωπαικές χώρες. Δημιουργήθηκε μέσα στα πλαίσια του προγράμματος Eureka COSINE (Cooperation for Open Systems Interconnection Networking in Europe) και λειτούργησε από το 1987 έως το 1993. Με την ολοκλήρωση του ΙΧΙ η Ευρώπη είχε ήδη εμπλακεί στη διαδικασία διασύνδεσής της με το Internet. Το πρωτόκολλο ΤCP IP έγινε ο κανόνας και αντικατέστησε το Χ.25 To EuropaNET, στα 2Mbps, ξεκίνησε το 1992 και έγινε το πρώτο δίκτυο που υποστήριζε τόσο το Χ.25 όσο και το ΙΡ. Αυτό σημάδεψε το τέλος του "πολέμου των πρωτοκόλλων" στην Ευρώπη και οδήγησε σε μια περίοδο σταθερότητας στα ευρωπαικά ερευνητικά δίκτυα. Η πρώτη φάση του EuropaNET κράτησε μέχρι τον Οκτώβριο του 1995. Με την ολοκλήρωση του συμβολαίου για την παροχή δικτυακών υπηρεσιών με την ΡΤΤ Telecom NL, αργότερα Unisource Business Networks, έγινε προκύρηξη του έργου για τη συνέχιση του EuropaNET τον Δεκέμβριο του 1994. Η ΒΤ κέρδισε το σχετικό διαγωνισμό και το EuropaNET της ΒΤ ξεκίνησε την πρώτη Οκτωβρίου του 1995.
<Picture>Το 1986 o οργανισμός RARE (σήμερα ΤΕRΕΝΑ) ανέλαβε το συντονισμό μεταξύ των διαφόρων οργανισμών που είχαν εμπλακεί στην παροχή δικτυακών υπηρεσιών προς την ευρωπαική ερευνητική κοινότητα. Ο RARE λειτούγησε στην αρχή στην κατεύθυνση επίλυσης, μέσα από διάλογο, των προβλημάτων διασύνδεσης δικτύων που είχαν εμφανιστεί ανάμεσα στα διάφορα εθνικά ευρωπαικά δίκτυα. Λίγο μετά, ξεκίνησε το ευρωπαικό πρόγραμμα COSINE και ένας από τους βασικούς στόχους του RARE ήταν και ο συντονισμός του τεχνικού έργου που ήταν απαραίτητος για τη φάση προδιαγραφών του COSINE. Ενα από τα πιο σημαντικά αποτελέσματα του προγράμματος COSINE ήταν και η δημιουργία του DANTE το 1993. Ο οργανισμός αυτός δημιουργήθηκε προκειμένου να διαχειρίζεται τις πανευρωπαικές δικτυακές υπηρεσίες που προέκυψαν από το πρόγραμμα COSINE. <Picture>Το 1995 το DANTE παρέδωσε την πρότασή του προς την επιτροπή EuroCAIRN (European Cooperation for Academic and Industrial Research Networking) όσον αφορά τα ευρωπαικά ερευνητικά δίκτυα υψηλών ταχυτήτων, τον σχεδιασμό και τη διαχείρισή τους. Η πρότασή του αυτή αποτέλεσε τον πρόδρομο για τις μελλοντικές εξελίξεις στο χώρο της διασύνδεσης των ερευνητικών δικτύων στην Ευρώπη και ειδικά στο ΤΕΝ-34. Λίγο μετά την πρόταση αυτή δημιουργήθηκε το ΤΕN-34 Consortium, που αποτελείται από όλα τα εθνικά ερευνητικά δίκτυα της Δυτικής Ευρώπης, της Ουγγαρίας, της Τσεχικής Δημοκρατίας και της Σλοβενίας. Ο DANTE ορίστηκε συντονιστής σ' αυτό το Consortium και ένα από τα πρώτα θέματα που αντιμετώπισε ήταν οι τεχνικές προδιαγραφές για το ΤΕΝ-34. Τον Μάιο του 1996 το ΤΕN-34 Consortium μετά από σύμβαση που υπέγραψε με την Ευρωπαική Επιτροπή ανέλαβε την υλοποίηση του ΤΕΝ-34 και ο DANTE ανέλαβε τον τεχνικό σχεδιασμό, σε πλήρη συνεργασία με τους διαφόρους συμμετέχοντες στο ΤΕN-34 Consortium. Παράλληλα με την οργάνωση και διαχείριση των δικτυακών υπηρεσιών για τα δυτικοευρωπαικά ερευνητικά δίκτυα ο DANTE ανέλαβε και το συντονισμό της αναβάθμισης και επέκτασης τόσο των εθνικών όσο και των διεθνικών δικτυακών υπηρεσιών για τις χώρες της κεντρικής και ανατολικής ευρώπης, στα πλαίσια του προγράμματος Phare R&D Networking. Στο πρώτο πρόγραμμα Phare (1991-94) συμμετείχαν έξι χώρες και συγκεκριμένα η Βουλγαρία, η Τσεχική Δημοκρατία, η Ουγγαρία, η Πολωνία, η Ρουμανία και η Σλοβακία. Στο δεύτερο πρόγραμμα Phare (1993-94) συμμετείχαν πέντε επιπλέον χώρες και πιό συγκεκριμένα η Αλβανία, η Λετονία, η Εσθονία, η Λιθουανία και η Σλοβανία. Κατά τη διάρκεια των δύο τελευταίων ετών του το Phare έχει υποστηριχθεί από το πρόγραμμα INSIGHT το οποίο και εστιάστηκε στην ανάπτυξη μιας και μόνης εφαρμογής των δικτύων τύπου Internet: στον παγκόσμιο ιστό (WWW). Ολα αυτά τα προγράμματα θα ολοκληρωθούν το 1997 έχοντας συμβάλλει τα μέγιστα στην εισαγωγή και γρήγορη ανάπτυξη των υπηρεσιών Internet στην κεντρική και ανατολική Ευρώπη. <Picture>Η Ευρωπαική Επιτροπή έχει υποστηρίξει με τη μια ή την άλλη μορφή όλες τις βασικές πρωτοβουλίες στα ερευνητικά δίκτυα την τελευταία δεκαετία. Για παράδειγμα ανάμεσα σε άλλα προχώρησε στην αρχική χρηματοδότηση στον DANTE, χρηματοδότησε την διασύνδεση της Ευρώπης με τις Ηνωμένες Πολιτείες, τα προγράμματα Phare και INSIGHT με την Ανατολική Ευρώπη και τη μελέτη σκοπιμότητας για την απευθείας διασύνδεση μεταξύ της Ευρώπης και της Ασίας - Ειρηνικού (CAPE). Ακόμα συνχρηματοδοτεί το πρόγραμμα ΤΕΝ-34 μέσω του προγράμματος Telematics for Research/Esprit Programme. Η Ευρωπαική Επιτροπή έχει δηλαδή αποδείξει ότι παίζει σημαντικότατο ρόλο στην ανάπτυξη της διασυνδεσιμότητας μεταξύ των Εθνικών Ερευνητικών Δικτύων της Ευρώπης, ένα ρόλο που είναι βέβαιο ότι θα συνεχίζει να παίζει και στο μέλλον.
<Picture>Η πρώτη δεκαετία της ανάπτυξης των Ευρωπαικών ερευνητικών δικτύων οδήγησε στο ΤΕΝ-34, ένα δίκτυο που υποστηρίζει εφαρμογές πολυμέσων. Αμμεσος στόχος είναι η δημιουργία ενός δικτύου με δυνατότητες συγκρίσιμες με αυτές που διαθέτουν τα αντίστοιχα ερευνητικά δίκτυα στις Η.Π.Α. που σήμερα επιτρέπουν συνδέσεις με ταχύτητες έως και 622 Mbps, όταν η μέγιστη ταχύτητα σε Ευρωπαικό έδαφος είναι 45Mbps (αυτή του Γερμανικού ερευνητικού δικτύου). Ο κύριος στόχος είναι η υποστήριξη της ερευνητικής κοινότητας με υψηλού επιπέδου υπηρεσίες δικτύων αλλά και παράλληλα η υποστήριξη της έρευνας στα δίκτυα υψηλών ταχυτήτων. <Picture: Σχετικά με εμάς><Picture> ΣXETIKA ΑΡΘΡΑ: <Picture> <Picture: Άρθρο από το Αρχείο του Κόμβου>Internet 2: Εδώ, η συνέχεια είναι ακόμα καλύτερη <Picture>26.8.97 <Picture>ΣΧΕΤΙΚΟΙ ΚΟΜΒΟΙ: <Picture> <Picture: Σύνδεσμος προς ξένη σελίδα - Θα ανοίξει σε νέο παράθυρο>Εθνικό Δίκτυο Έρευνας και Τεχνολογίας <Picture: Σύνδεσμος προς ξένη σελίδα - Θα ανοίξει σε νέο παράθυρο>TEN-34: The Information Superhighway for European R&D 0 ΚΟΜΒΟΣΑΡΧΕΙΟΑΝΑΖΗΤΗΣΗΕΠΙΚΟΙΝΩΝΙΑ

Copyright ©1997, O KΟΜΒΟΣ™ ( kombos @ forthnet.gr ) - Με την επιφύλαξη παντός νομίμου δικα

netCmr.EVOLUTING#cptCore546.171#

name::
* McsEngl.netCmr.EVOLUTING@cptIt,

{time.1991-2000}:
=== MINITEL:
What Was the First Country to Get Online?
Beginning in the early 1980s, France's Minitel service allowed users to go online for banking, chatting, and shopping.

At its height in the mid-1990s, French citizens owned about 9 million
Minitel devices -- the first widely available screen-keyboard combination
in any country. Minitel allowed some 25 million users to regularly connect
to more than 23,000 services, including being able to make train
reservations, check stock prices, monitor bank balances, and chat with
other users.

Read More: http://www.wisegeek.com/what-was-the-first-country-to-get-online.htm?m {2016-10-03}

{time.1992}:
=== SONET:
The first public SONET circuit was installed this year (1992) in a 5.5 mile loop around downtown Cincinati, Ohio. It offers speed up to 2.4 Gbps.

=== LAN:
ΕΧΑΠΛΩΣΗ: Υπάρχουν σήμερα περίπου 4.000.000 LANs εγκαταστημένα σ'όλο τον κόσμο.

{time.1990}:
=== INTERNET:
Today it has become the intangible eighth wonder of the world, connecting 936 networks, at least 175,000 computers and countless users in 35 countries.

=== MAN:
ΠΡΩΤΟΕΜΦΑΝΙΖΟΝΤΑΙ ΞΕΠΕΡΝΩΝΤΑΣ ΤΑ ΤΟΠΙΚΑ ΔΙΚΤΥΑ ΣΕ ΤΑΧΥΤΗΤΑ ΚΑΙ ΑΠΟΣΤΑΣΗ.
[ΑΛΕΞΟΠΟΥΛΟΣ ΚΑ, 1992, 297#cptResource223]

{time.1988}:
=== LAN-Manager:
H 3Com παρουσίασε το πρώτο πακέτο παραγωγής LAN Manager Version 1.0 τον Οκτώβριο του 1988, ονομάζοντάς το 3+Open LAN Manager.

=== WORM:
3,000 UNIX computers were disabled with the worm program that duplicated itself from computer to computer. Worm remains the most notorius example of the damage that can occur when networking security is too permissive.

{time.1987}:
=== ΔΙΚΤΥΑ OSI:
Εταιρειες σαν την AT&T, DEC άρχισαν να ανακοινώνουν και να παράγουν προϊόντα σύμφωνα με τις προδιαγραφές του ISO για το OSI-Open systems interconnection.

=== LAN:
At the end of 1987 approximately 465,000 LANs were installed throughout the USA.

{time.1984}:
=== X.400:
Υιοθετείται για πρώτη φορά το Χ.400 της CCITT, που είναι πρωτόκολο για ΗΛΕΚΤΡΟΝΙΚΟ ΤΑΧΥΔΡΟΜΕΙΟ, βασισμενο για Χ.25 κυκλώματα.

{time.1983}:
=== E-MAIL:
ΜΙΑ ΕΡΕΥΝΑ ΣΤΙΣ ΗΠΑ ΕΔΕΙΞΕ ΟΤΙ 18% ΟΛΩΝ ΤΩΝ ΕΠΙΧΕΙΡΗΣΕΩΝ ΧΡΗΣΙΜΟΠΟΙΟΥΣΕ ΚΑΠΟΙΑ ΜΟΡΦΗ ΗΛΕΚΤΡΟΝΙΚΟΥ ΤΑΧΥΔΡΟΜΕΙΟΥ.

{time.1982}:
=== FDDI:
H ΕΠΙΤΡΟΠΗ X3T95 of ANSI ΕΙΣΗΓΑΓΕ ΑΥΤΗ ΤΗΝ ΤΥΠΟΠΟΙΗΣΗ ΓΙΑ ΕΠΙΚΟΙΝΩΝΙΑ ΔΕΔΟΜΕΝΩΝ ΥΨΗΛΗΣ ΤΑΧΥΤΗΤΑΣ. ΣΥΝΔΕΟΥΝ LAN ME ΟΠΤΙΚΕΣ ΙΝΕΣ.
[ΑΛΕΞΟΠΟΥΛΟΣ ΚΑ, 1992, 482#cptResource223]

{time.1980}:
=== ETHERNET:
Τον Μάιο του 1980, η Digital έκανε μια σημαντική ανακοίνωση. Μαζι με την Xerox and Intel, ανακοίνωσε τα σχέδια του ethernet στον κόσμο.

=== TCP/IP:
To DARPA εγκατάστησε τα πρώτα τμήματα TCP/IP στα δικτυά του.

{time.1977}:
=== ARCnet:
ΠΡΩΤΟΕΜΦΑΝΙΖΕΤΑΙ ΩΣ ΠΡΟΙΟΝ ΤΗΣ Datapoint. ΕΙΝΑΙ ΠΡΩΤΟΚΟΛΛΟ ΕΠΙΚΟΙΝΩΝΙΑΣ token-bus.

=== ISO:
Ο ISO δημιούργησε μια επιτροπή για να ορίσει τις προδιαγραφές για προϊόντα που χρησιμοποιούνται για τη σύνδεση ετερογενων υπολογιστών

{time.1976}:
=== X.25:
Υιοθετείται για πρώτη φορά σαν ένα διεθνές στανταρ η μέθοδος packet switching X.25

{time.1971-2000}:
=== IMPORTANCE:
The electrification of society set the stage for the 20th century. Now, with the building of planetarywide computer networks, the stage is being set for the 21st century.
[Martin, 1990, xv#cptResource134]

{time.1969}:
=== INTERNET:
It arose from the 4-node network instituted in 1969 by the US Department of Defense.

Τα πρώτα δίκτυα ήταν ΙΕΡΑΡΧΙΚΑ. Η υπολογιστική ικανότητα ήταν συγκεντρωμένη σ'ένα σημείο.
* ΤΑ ΠΡΩΤΑ ΔΙΚΤΥΑ ΥΠΟΛΟΓΙΣΤΩΝ ΓΕΝΝΗΘΗΚΑΝ ΠΟΛΥ ΠΡΙΝ ΑΠΟ ΤΗΝ ΕΜΦΑΝΙΣΗ ΤΩΝ PC.

FvMcs.netCmr.INTERNET-(netInt)

name::
* McsEngl.conceptIt67,
* McsEngl.netCmr.INTERNET-(netInt)@cptIt,
* McsEngl.FvMcs.netCmr.INTERNET-(netInt)@cptIt,
* McsEngl.Internet@cptIt,
* McsEngl.network.internet@cptIt67,
* McsEngl.online@cptIt67, {2015-09-05}
* McsEngl.netInt@cptIt67, {2015-08-16}
* McsEngl.inet@cptIt67, {2012-11-19}
* McsEngl.innt@cptIt67,
* McsElln.ΔΙΑΔΙΚΤΥΟ@cptIt,
* McsElln.Διαδίκτυο@cptIt,
* McsElln.ΔΙΕΘΝΕΣ-ΤΗΛΕΜΑΤΙΚΟ-ΔΙΚΤΥΟ-internet@cptIt,
* McsElln.ΙΝΤΕΡΝΕΤ-67@cptIt,

THE INFORMATION SUPERHIGHWAY:
ένας χαρακτηρισμός που έχει επικρατήσει και αντιπροσωπεύει απόλυτα το τεράστιο αυτό δίκτυο.
[TELECOM, IOYN. 1994, 12]

DEFINITION

The mostadvanced organization thus far, the Internet, opened the door for real-time information exchange at a worldwide scale, but it lacks the economic means for general-purpose coordination and global peer-production.
The Blockchain made this possible by providing areliable, open and programmable accounting system, consequently leading to the invention of the Decentralized Autonomous Organization (DAO).
[https://daostack.io/wp/DAOstack-White-Paper-en.pdf]

To internet είναι το ΜΕΓΑΛΥΤΕΡΟ "συλλογικό" ΔΙΚΤΥΟ υπολογιστών και διασυνδεδεμένων δικτύων στον πλανήτη μας.
[COMPUTER GO, SEP. 1994, 79]

TO INTERNET ΕΙΝΑΙ ΕΝΑ ΥΠΕΡΔΙΚΤΥΟ ΣΤΟ ΟΠΟΙΟ ΣΥΝΔΕΟΝΤΑΙ ΠΟΛΛΑ ΜΙΚΡΟΤΕΡΑ ΔΙΚΤΥΑ ΥΠΟΛΟΓΙΣΤΩΝ. ΔΗΜΙΟΥΡΓΗΘΗΚΕ ΤΟ 1973 ΚΑΙ ΕΙΝΑΙ ΜΕΤΕΞΕΛΙΞΗ ΤΟΥ ΔΙΚΤΥΟΥ ΤΟΥ ΠΕΝΤΑΓΩΝΟΥ, ARPANET.
ΤΗΛΕΦΩΝΟ ΓΙΑ ΠΛΗΡΟΦΟΡΙΕΣ ΤΟ 1-800-444-4345.
[ΚΑΘΗΜΕΡΙΝΗ, 3 ΟΚΤΩ 1993]

netInt'wholeNo-relation#cptCore546.15#

name::
* McsEngl.netInt'wholeNo-relation@cptIt,

netInt'Effect

name::
* McsEngl.netInt'Effect@cptIt,

_ADDRESS.WPG:
* Schmidt: The Web will dissolve national barriers
by Stephen Shankland March 5, 2012 11:33 AM PST
The Web isn't just making it easier for Americans to read German newspapers. It's laying the foundations for a global culture, Google's executive chairman says.
... "Loyalty is not just to a nation but to friends and interests," Schmidt said in a speech at the opening ceremony of the CeBIT technology show here today. "That will change everything for citizens, states, and society."
[Schmidt: The Web will dissolve national barriers]

netInt'ATTRIBUTE

name::
* McsEngl.netInt'ATTRIBUTE@cptIt,

The internet has been a powerful driver of collaboration for two reasons. Firstly, it allows people to communicate in a peer–to–peer way (indeed, this is a defining feature of the internet).

netInt'zmap

name::
* McsEngl.netInt'zmap@cptIt,
* McsEngl.zmap@cptIt,

ΖMap: «Σαρώνοντας» το Ίντερνετ σε λιγότερο από μία ώρα
Πέμπτη, 29 Αυγούστου 2013 11:26 UPD:11:27
Shutterstock
A- A A+
shortlink

Share on Google+

Δείτε ακόμα
XKeyscore: Παρακολουθώντας «όλα όσα κάνει ένας χρήστης στο Ίντερνετ»
31/07 18:48
Remy: Πρωτοποριακό λογισμικό τριπλασιάζει την ταχύτητα του Ίντερνετ
23/07 11:51
Μία πρωτοποριακή μέθοδο «σκαναρίσματος» του συνόλου του Ίντερνετ, σε χρονικό διάστημα που δεν ξεπερνά μία ώρα αναπτύσσουν επιστήμονες του Πανεπιστημίου του Μίτσιγκαν.
Πρόκειται για ένα open-source network scanner ονόματι ZMap, το οποίο είναι σχεδιασμένο για να διεξάγει πιο αποτελεσματικές και γρήγορες έρευνες, επιτρέποντας, για παράδειγμα, τη μελέτη της ταχύτητας με την οποία οι χρήστες καλύπτουν κενά ασφαλείας στα συστήματά τους, κάτι που με τη σειρά του «ανοίγει» δυνατότητες όπως τον εντοπισμό, λ.χ τρωτών σημείων σε δίκτυα, την ανάπτυξη αμυντικών μηχανισμών κ.α
Όπως το περιγράφουν οι ίδιοι οι δημιουργοί του, «το ZMap είναι ένα open-source network scanner που επιτρέπει στους ερευνητές να διεξάγουν εύκολα μεγάλης κλίμακας μελέτες δικτύων στο Ίντερνετ. Με ένα μηχάνημα και ένα καλό uplink δικτύου, το ZMap είναι ικανό να διεξάγει μία πλήρη σάρωση του χώρου των διευθύνσεων IPv4 σε διάστημα μικρότερο των 45 λεπτών».
Με σημερινές μεθόδους, όπως το Nmap, που χρησιμοποιείται επί της παρούσης για τέτοιου είδους εργασίες, μία τέτοια σάρωση μπορεί να διαρκέσει εβδομάδες ή ακόμη και μήνες. Το Νmap λειτουργεί στέλνοντας μεμονωμένα σήματα σε κάθε διεύθυνση και αναμένοντας απάντηση, ενώ παράλληλα συντάσσει λίστα αυτών με τις οποίες έχει έρθει σε επαφή. Σύμφωνα με σχετικό δημοσίευμα της Washington Post, η τήρηση αρχείων/λίστας για κάθε αίτημα επικοινωνίας επιβραδύνει ακόμη περισσότερο την όλη διαδικασία. Αυτό που κάνει το ZMap είναι να στέλνει επίσης τέτοια αιτήματα, αλλά παράλληλα κωδικοποιεί το κάθε εξερχόμενο σήμα με δεδομένα που επιτρέπουν την ταυτοποίησή του, έτσι ώστε όταν επιστρέφει πίσω στο ZMap, είναι δυνατή η πολύ ευκολότερη «αποκωδικοποίηση» των απαντήσεων, ενώ παράλληλα δεν απαιτείται η σύνταξη λίστας των αιτημάτων που βρίσκονται ακόμα σε εκκρεμότητα- στην ουσία το σύστημα «ξεχνάει» τα αιτήματα που αποστέλλει, καθώς είναι σε θέση να τα «αναγνωρίσει» κατά την «επιστροφή» τους. Το αποτέλεσμα είναι το ZMap να είναι ικανό να αποστέλλει «πακέτα» επικοινωνίας περίπου 1.000 φορές ταχύτερα από ό,τι το Nmap.
Όσον αφορά τις χρήσεις του, το ZMap έχει χρησιμοποιηθεί ήδη για την μελέτη των επιπτώσεων του τυφώνα «Σάντι» στους κατοίκους της ανατολικής ακτής των ΗΠΑ: καθώς ο τυφώνας έθεσε offline μεγάλο τμήματα των υπολογιστών της περιοχής, το ZMap (το οποίο «συνδέθηκε» με τις διευθύνσεις της συγκεκριμένης γεωγραφικής περιοχής) ήταν σε θέση να παρέχει μία καλή εικόνα του αριθμού των κατοίκων που επηρεάστηκαν, σαρώνοντας γρήγορα τη «στοχευμένη» ζώνη και παρέχοντας δεδομένα σε πραγματικό χρόνο. Οι δημιουργοί του επισημαίνουν πως σε καμία περίπτωση δεν πρέπει να τίθεται θέμα παραβίασης προσωπικών δεδομένων και εκμετάλλευσης τρωτών σημείων που εντοπίζονται, καθώς οι εκάστοτε χρήστες του συστήματος θα πρέπει να συμμορφώνονται με τα αρμόδια νομικά πλαίσια.
Οι ερευνητές παρουσίασαν το ZMap στη συνδιάσκεψη ασφαλείας Usenix στην Ουάσινγκτον.
[http://www.naftemporiki.gr/story/691301]

netInt'access#ql:netint'user#

name::
* McsEngl.netInt'access@cptIt,

netInt'address

NAME

name::
* McsEngl.netInt'address@cptIt,
* McsEngl.conceptIt375,
* McsEngl.address.email@cptIt375,
* McsEngl.email'address@cptIt375,
* McsEngl.internet-account/address@cptIt,
* McsEngl.internet'account@cptIt375,
* McsEngl.internet'address@cptIt375,
* McsEngl.internet-id@cptIt,
* McsEngl.internet-naming-system@cptIt,
* McsEngl.internet-ΔΙΕΥΘΥΝΣΗ@cptIt,
* McsEngl.telnet'address@cptIt375,

DEFINITION

Every computer on the Internet is identified by a unique, four-byte IP address. This is typically written in dotted quad format like 199.1.32.90 where each byte is an unsigned value between 0 and 255.
[Harold Course 1997]

Κάθε διεύθυνση χρήστη ή συστηματος.

iadd'WHOLE

_WHOLE:
internet#cptIt67#

iadd'DOMAINS

name::
* McsEngl.iadd'DOMAINS@cptIt,

The Internet NAMING SCHEME which consists of a hierarchical sequence of names, from the most specific to the most general (left to right), separated by dots, for example nic.ddn.mil.

The domain is most often one of the following:
- com Usually a company or other commercial institution or organization, like Convex Computers (`convex.com').
- edu An educational institution, e.g. New York University, named `nyu.edu'.
- gov A government site; for example, NASA is `nasa.gov'.
- mil A military site, like the Air Force (`af.mil').
- net Gateways and other administrative hosts for a network (it does not mean all of the hosts in a network).(1) One such gateway is `near.net'.
- org This is a domain reserved for private organizations, who don't comfortably fit in the other classes of domains. One example is the Electronic Frontier Foundation, named eff.org

The proper terminology for a site's domain name is it's FQDN (Fully Qualified Domain Name). It typically reflects the site's organization or sponsoring institution.

Internet Τα μυστικά των διευθύνσεων Τι κρύβουν οι τελείες και τα ονόματα των «τοποθεσιών» του Δικτύου ΑΛΚΗΣ ΓΑΛΔΑΔΑΣ
(Εικόνα μεγέθους : 19703 bytes)
Το Δίκτυο μεγάλωσε και τώρα οι κηδεμόνες του αντιμετωπίζουν τα προβλήματα της εφηβείας. Θα μείνει ο έλεγχος σε αμερικανικά χέρια ή θα αντιδράσουν επιτέλους και οι Ευρωπαίοι; Η πρώτη μάχη δίνεται αυτές τις ημέρες γύρω από τα ονόματα και τις... τελείες της κάθε καινούργιας διεύθυνσης που αγοράζουν οι διάφορες μεγάλες εταιρείες
Σαν ένας καλόβολος καταναλωτής τεχνολογίας που είμαι, ακολουθώ από κοντά τις τάσεις και τα ρεύματα. Οπως ένα ξύλο το ρεύμα του ποταμού. Αρπάζω σαν το ανυπόμονο ψάρι την κάθε καινούργια συσκευή που θα εμφανιστεί και περιμένω ανυπόμονα για την επόμενη. Από καιρό, και το Internet έχει γίνει κομμάτι μέσα στο εικοσιτετράωρό μου. Τρέμω μήπως έρθει κάποια στιγμή που θα μείνω χωρίς σύνδεση έστω και μερικές ώρες. Αλλά δεν είναι μόνο αυτό: όπου σταθώ ψάχνω για διευθύνσεις. Ρωτάω άλλους να μου πουν όταν συνδέονται στο Δίκτυο πού τους αρέσει να πηγαίνουν, καταπίνω άπειρες σελίδες με ηλεκτρονικές διευθύνσεις και έχω πλέον πάψει να μαζεύω τηλέφωνα. Το ευρετήριό μου τώρα γεμίζει με τις διευθύνσεις αυτές και όπου βρω σύνδεση με το Δίκτυο θέλω να το έχω παρέα. Αν και πολλές τις έχω πλέον αποστηθίσει. Εκεί φθάσαμε. Αντί για τους αριθμούς των φίλων μαθαίνουμε τώρα ό,τι είναι μεταξύ www. και com.
Τα καθοριστικά σημάδια
Για τη διακίνηση των μηνυμάτων και των όποιων άλλων δεδομένων στο μέγα Δίκτυο χρειάζονται αυστηροί κανόνες που είναι κωδικοποιημένοι στα γνωστά μας πρωτόκολλα TCP/ΙΡ. Το υλικό που διακινείται είναι κομμένο σε μικρά πακέτα που ακολουθούν διαφορετικούς δρόμους και ενώνονται ξανά στον προορισμό τους χωρίς εμείς να καταλάβουμε το παραμικρό. Για να βρουν τον προορισμό τους όμως πρέπει να είναι καθορισμένη μια διεύθυνση με αριθμούς γνωστή σ' εμάς με ευκολομνημόνευτες συνήθως λέξεις. Το DNS (Domain Name System), δηλαδή το Σύστημα Ονοματικών Πεδίων, φροντίζει να γίνεται η μετάφραση στις διευθύνσεις που απαιτούν τα πρωτόκολλα συνεργασίας TCP και ΙΡ.
Για να βρίσκονται όμως τα αριθμητικά αντίστοιχα των εκατομμυρίων αυτών διευθύνσεων σε χρόνο μηδέν χρειάζεται μια τεράστια οργάνωση που θυμίζει ένα δέντρο με τις ρίζες του ψηλά και τα κλαδιά προς τα κάτω, όπου για κάθε διεύθυνση στο τέλος εννοείται ότι υπάρχει μία ακόμη τελεία που αντιστοιχεί στη ρίζα του δέντρου. Ας μην ξεχνάμε με την ευκαιρία ότι το Internet δεν λειτουργεί έτσι εντελώς από μόνο του, χωρίς κάποιοι άνθρωποι να σκέφτονται καθημερινά για το πώς θα τα βγάλει πέρα.
Ολες οι πληροφορίες οι σχετικές με το DNS περιέχονται σε αμέτρητες χιλιάδες πακέτα που ονομάζονται Name Servers και είναι διασκορπισμένα σε αναρίθμητα επίσης μηχανήματα. Εκτός αυτών υπάρχουν και κάποια λίγα που αντιστοιχούν στις ρίζες εκεί απ' όπου ξεκινάει μια διεύθυνση και ονομάζονται Root Name Servers. Τις διάφορες διευθύνσεις δηλαδή καλύτερα να τις φανταζόμαστε ότι τις αποτελούν συναρμολογούμενα κομμάτια και η αντιστοίχηση των αριθμών στις λέξεις αρχίζει από τα δεξιά προς τα αριστερά.
Οταν ζητήσουμε να δούμε τι έχουν βάλει σαν υλικό στη διεύθυνση www.play.com το πακέτο browser του υπολογιστή μας θα ψάξει για την αριθμητική διεύθυνση που θέλει το πρωτόκολλο ΙΡ για να διακινήσει σωστά τα στοιχεία. Θα ξεκινήσει από κάποιον Root Server, θα πάει σε κάποιον server όπου φυλάσσονται διευθύνσεις της κατηγορίας com ή των άλλων κατηγοριών, όπως είναι οι net, org, φθάνοντας τελικά στη σωστή θέση για να διαβάσει τους αριθμούς που χρειάζεται. Το σωστό είναι τα στοιχεία της κάθε διεύθυνσης να φυλάσσονται σε δύο ή και περισσότερους διαφορετικούς Name Servers απομακρυσμένους και στον χώρο, έτσι ώστε, αν κάτι συμβεί με τις γραμμές μιας εταιρείας που παρέχει σύνδεση στο Internet, να μη χάνεται η πρόσβαση στη διεύθυνση αυτή. Οταν γράφεται κάποιος με καινούργια διεύθυνση στη χώρα του, η όλη ενημέρωση χρειάζεται περίπου 24 ώρες για να γίνει στους διαφόρους καταλόγους.
Οι μαγικές λέξεις
Νερό κάτω απ' τ' άχυρα είναι αυτό το θέμα με τις διευθύνσεις. Γράφουμε κάποιες... μαγικές λέξεις που τις χωρίζουν μερικές τελείες και ξαφνικά νομίζουμε ότι μεταφερόμαστε στην Ιαπωνία, στην Καλιφόρνια, σε βιβλιοθήκες πανεπιστημίων και ακούμε ραδιοφωνικούς σταθμούς. Στην πραγματικότητα αυτές οι λέξεις - απόγονοι του περιβόητου «Ανοιξε σουσάμι» είναι για να τις θυμόμαστε εμείς ευκολότερα και στην ουσία αντιστοιχούν σε κάποιους αριθμούς όχι και τόσο ευκολομνημόνευτους. Με τη βοήθειά τους εντοπίζεται το όποιο πρόγραμμα, φορτωμένο σε εκείνο τον μακρινό υπολογιστή που περιέχει καλά διατηρημένες τις προς επίδειξη σελίδες ενός άλλου. Αυτός ο άλλος μπορεί να είναι μια εταιρεία, το υπουργείο, το σχολείο, ένας πιτσιρικάς, μια κοπέλα που αυτοκινηματογραφείται μέσα στο σπίτι της και αφήνει τους εν Δικτύω συντρόφους της να την παρακολουθούν. Ολοι όσοι δηλαδή θέλουν να δείχνουν μέσα από τη γυάλινη οθόνη του κομπιούτερ ό,τι τους αρέσει, υποχρεωτικά πρέπει να έχουν κάνει αίτηση και να έχουν αποκτήσει διεύθυνση προτείνοντας εκείνοι την ακολουθία των λέξεων που προτιμούν.
Ενα αντίγραφο με το περιεχόμενο των σελίδων μεταφέρεται στον δικό μας κομπιούτερ με τη βοήθεια αναγκαστικά ενός μεγάλου πακέτου που έχουμε προηγουμένως εγκαταστήσει στο δικό μας μηχάνημα. Μπορεί να είναι ο Explorer της Microsoft, ο Navigator της Netscape ή κάτι άλλο πιο εύχρηστο. Είναι οι λεγόμενοι browsers, η κομπιουτερική υλοποίηση της ιδέας του μαγικού χαλιού με ένθετη την ψευδαίσθηση ότι κάθε φορά ταξιδεύουμε αρκετά χιλιόμετρα πιο μακριά από τον χώρο του δωματίου μας, ενώ όλα έχουν κουβαληθεί προς εμάς από την κατάλληλη διεύθυνση. Και όλα αυτά αρκεί να δώσουμε εκείνες τις δυο-τρεις μαγικές λεξούλες της διεύθυνσης.
Οπως όμως ο μικρός στην ταινία του Φελίνι αναρωτιόταν «Πού πάει η μουσική όταν δεν την ακούμε πια;», και ένας καινούργιος στα μαγειρέματα του Internet θα αναρωτιέται αντίθετα από πού μας έρχονται αυτές οι διευθύνσεις. Ποιος είναι που τις μοιράζει και γιατί όλες δεν μοιάζουν όπως οι αριθμοί κυκλοφορίας στα αυτοκίνητα;
Με τον καιρό και τα δημοσιεύματα του ξένου Τύπου δημιουργήθηκε ολόκληρη μυθολογία. Από τη μια οι κακοί σαν τον Μπιλ Γκέιτς που θέλουν να εμπορευθούν και να κερδοσκοπήσουν όσο γίνεται πιο πολύ στο φτιαγμένο για ελεύθερες υπάρξεις μέγα Δίκτυο. Από την άλλη οι ρομαντικοί, οι με χίπικη διάθεση υπερασπιστές της ελευθερίας που συσπειρώνονται γύρω από τον φιλελεύθερο Τζον Πόστελ στην έδρα της Πληροφορικής του Πανεπιστημίου της Νότιας Καλιφόρνιας, άντρο της ιντερνετικής γραφειοκρατίας. Ο Πόστελ με τη γενειάδα του και τα μαλλιά του να πετούν άτακτα προς κάθε διεύθυνση θυμίζει βιβλικό πατριάρχη που κρατάει τους κώδικες και τα μυστικά του Internet φυλακισμένα σε απόρρητα χειρόγραφα. Στην πραγματικότητα όμως εργάζεται για λογαριασμό του υπουργείου Εθνικής Αμυνας των Ηνωμένων Πολιτειών, αλλά είναι εκείνος και οι όποιοι συνεργάτες του που κανονίζουν τις διευθύνσεις. Το ποια σύνολα αριθμών θα αντιστοιχούν με μοναδικό τρόπο στο σύνολο των σελίδων όταν κάποιος θέλει να παρουσιάσει στο Internet.
Η μάχη για το «οικόπεδο»
Οπως ο αριθμός τηλεφώνου αντιστοιχεί σε μία γραμμή του τηλεφωνικού δικτύου και ο αριθμός ταυτότητας σε έναν μόνο άνθρωπο, έτσι και η διεύθυνση στο Internet πρέπει να είναι μοναδική, να δείχνει σε ένα μηχάνημα τοποθετημένο οπουδήποτε στην υδρόγειο σφαίρα και δικτυωμένο στο μέγα Δίκτυο. Αλλά εδώ αρχίζουν οι τσακωμοί.
Μια ευκαιρία που χάθηκε με τα τηλέφωνα δεν έπρεπε να χαθεί ξανά με τις ιντερνετικές διευθύνσεις. Θα μπορούσαν δηλαδή και τα τηλέφωνα των διαφόρων εταιρειών να αντιστοιχούν ίσως σε κάποιες λέξεις και όχι απλώς να είναι επτά αριθμητικά σύμβολα στη σειρά, έτσι, χωρίς κάποιο μνημοτεχνικό δέσιμο. Π.χ., για το τηλεφωνικό κέντρο της πιο γνωστής εδώ στην Ελλάδα γερμανικής εταιρείας τηλεπικοινωνιών θα ήταν χρήσιμο, αντί για τον σημερινό της αριθμό, να πρέπει να σχηματίσουμε μόνο τη λέξη siemens. Αυτό δεν έγινε και ταλαιπωρούμαστε χρόνια με τηλεφωνικούς καταλόγους, ατζέντες, πακέτα τσιγάρων, χαρτοπετσέτες και χαρτάκια στις τσέπες μας ή σημειώσεις στις τελευταίες σελίδες των βιβλίων.
Για τις διευθύνσεις του Internet οι μεγάλες εταιρείες προσπαθούν τώρα να κάνουν τα πράγματα απλά. Πέρα από το όνομα της φίρμας να μη χρειάζεσαι πολύ περισσότερα για να βρεις πού είναι εγκατεστημένο το πρόγραμμα των σελίδων της. Ετσι η ΙΒΜ εξασφάλισε γρήγορα ως διεύθυνση των όσων παρουσιάζει στο Internet τι άλλο από: www.ibm.com και δεν υπάρχει δυσκολία να το θυμάσαι για πάντα. Σε άλλες περιπτώσεις όμως υπήρχαν κάποιοι ιδιώτες ή κάποιες λιγότερο γνωστές εταιρείες που είχαν προλάβει είτε απόλυτα καλοπροαίρετα είτε πλήρεις δόλου να πάρουν τις πολυπόθητες ευκολομνημόνευτες διευθύνσεις. Ενας ιδιώτης, για παράδειγμα, που ονομάζεται Στέλιος Φωτιάδης του Κωνσταντίνου θα μπορούσε να είχε ζητήσει από νωρίς στη διεύθυνση που θέλει να αντιστοιχεί η ακολουθία γραμμάτων www.skf.com. Αποκλείοντας έτσι τη μεγάλη και γνωστή σουηδική εταιρεία SKF (Svenska Kullager - Fabrik) να πάρει μια ευκολομνημόνευτη διεύθυνση που θα της άξιζε.
Μπορεί τα οικόπεδα μέσα στη θάλασσα να μην έχουν αποδώσει ακόμη πολλά στους ιδιοκτήτες τους, αλλά τα οικόπεδα αυτά που περικλείονται από δύο ή τρεις λέξεις και βρίσκονται κάπου στο Δίκτυο έχουν ήδη δώσει κάποια εκατομμύρια. Ολο και περισσότεροι είναι οι πονηροί άνθρωποι που τώρα προσπαθούν να πλουτίσουν με αυτόν τον τρόπο. Κατοχυρώνουν ­ σε διευθύνσεις χωρίς ουσιαστικό περιεχόμενο, δεν έχει σημασία ­ όποιες λέξεις υποπτεύονται ότι κάποια στιγμή ένας μεγάλος θα τις ζητήσει, οπότε δεν έχουν αντίρρηση μετά να τις εκχωρήσουν, αρκεί να τις μοσχοπουλήσουν. Ετσι λέγεται ότι κάποιος εισέπραξε από τον Μπιλ Γκέιτς, μέσω τρίτων φυσικά για να μην ανεβούν οι απαιτήσεις του στα ύψη, περίπου 2,5 εκατ. δραχμές για να παραχωρήσει το όνομα slate στο ηλεκτρονικό περιοδικό της Microsoft και τώρα ο καθένας εύκολα χτυπάει στα πλήκτρα το κλασικό www.slate.com και, ωωωωπ, του έρχονται οι σελίδες του. Αντίθετα η ΑΤ&Τ που θέλησε να αγοράσει τον εύγλωττο τίτλο worldnet.net από κάποιους Γάλλους δεν το κατάφερε διότι της ζητήθηκαν 140 εκατ. δραχμές! Η ονομασία bisiness.com πουλήθηκε για 40 περίπου εκατ. δολάρια.
Πριν από λίγο καιρό ένα αγγλικό δικαστήριο απαγόρευσε σε ιδιώτες ­ και είναι εύκολο να καταλάβουμε το γιατί ­ να κατοχυρώσουν τις διευθύνσεις thetimes.co.uk, spice-girls.net και buckinghampalace.org.
Οι ελιγμοί του κ. Πόστελ
Στις 11 Μαρτίου καταχωρίστηκε από τη Network Solutions Inc. η με αύξοντα αριθμό 1.000.000 εταιρεία που ζήτησε να έχει διεύθυνση στο Δίκτυο. Το 1993, που ξεκίνησε, οι εγγεγραμμένοι δεν ήταν περισσότεροι από 4.000. Ο Πόστελ ως πρόεδρος της ΙΑΝΑ (Internet Assigned Numbers Authority) μαζί με τη National Science Foundation είχαν από την αρχή την ευλογία του αμερικανικού υπουργείου Εθνικής Αμυνας για το ποιος θα πάρει ποια διεύθυνση με τις αντίστοιχες λέξεις. Αυτό το δικαίωμα και τα οικονομικά οφέλη που είναι τεράστια, αφού προπληρώνεις κάπου 27.000 δραχμές για δύο χρόνια, τα παρέδωσαν στην ιδιωτική εταιρεία NSI. Τότε δεν διαμαρτυρήθηκαν πολλοί γιατί οι 4.000 δεν προϊδέαζαν ότι σε τέσσερα χρόνια θα είχαν φθάσει το εκατομμύριο και ότι τώρα πλέον κάθε εβδομάδα γράφονται περίπου 15.000 νέοι που θέλουν να δείξουν σελίδες στο Internet.
Το συμβόλαιο της NSI τελειώνει τώρα τον Μάρτιο και ο Πόστελ διακηρύσσει ότι πρέπει να υπάρξουν πολλοί αρχειοφύλακες και αρχειοθέτες διευθύνσεων, με το αζημίωτο φυσικά. Ηδη υποψήφιες εταιρείες έχουν βγει στην αγορά και εισπράττουν χρήματα για προεγγραφές κυρίως από όσους έχουν συμφέροντα για κάποιον καλό συνδυασμό λέξεων. Την ίδια στιγμή έχει προταθεί να γίνουν επτά καινούργιες κατηγορίες διευθύνσεων που θα τελειώνουν με τα χαρακτηριστικά firm, store, web, arts, rec, info, nom. Ανοίγοντας έτσι τον ορίζοντα που είχε περιοριστεί ή στις διευθύνσεις με τα χαρακτηριστικά δύο γράμματα για τα διάφορα κράτη στο τέλος ή στο περιζήτητο και μεγάλου κύρους com όπου έμπαιναν οι μεγάλοι αδιαφορώντας για το κράτος προέλευσής τους μαζί με όλους τους Αμερικανούς που απαξιούν να βάλουν το ζευγάρι των γραμμάτων us για τη χώρα τους πριν από το com. Γιατί στις Ηνωμένες Πολιτέιες θεωρούν το Internet σαν κάτι το αυτονόητα αμερικανικό, αν και ο παγκόσμιος ιστός «υφάνθηκε» από τον Τιμ Μπέρνερς Λι στη Γενεύη.
Και οι ίδιοι οι Αμερικανοί όμως έχουν αναστατωθεί από τις καινούργιες ιδέες του Πόστελ. Διότι θα μπορέσουν ίσως να γίνουν περισσότερες της μιας εγγραφές με το ίδιο όνομα, αρκεί να αλλάζει η κατάληξη, και έτσι οι βολεμένοι με τα καλά και εύχρηστα ονόματα θα δουν ίσως και άλλους συγκατοίκους, οπότε αναγκάζονται να κλείνουν και με τις καινούργιες εταιρείες διάφορες συμφωνίες πληρώνοντας αδρά. Η υπηρεσία που δημιούργησε ο Πόστελ, η IAHC, θα κάνει όλες τις διαπραγματεύσεις σπάζοντας τελικά το μονοπώλιο της NSI και ανοίγοντας την αγορά, όπως λέει ότι θέλει να γίνει ο πρόεδρος Κλίντον.
Ολα δηλαδή να είναι καλά και δημοκρατικά ακολουθώντας τους νόμους της ελεύθερης αγοράς, αρκεί να μη φύγει το τιμόνι από τα χέρια των Αμερικανών που δεν θέλουν να ακούσουν ότι η υπηρεσία για τις διευθύνσεις θα έχει έδρα στην Ευρώπη. Και οι πιο μεγάλοι αβανταδόροι σε αυτή τους την επιθυμία δεν είναι άλλοι από τους ευρωπαίους ηγέτες που δεν ενδιαφέρονται καν για το Internet, ενώ η Αϊρα Μαγκαζίνερ όντας σύμβουλος του Κλίντον ειδικά για το Internet (του έλληνα πρωθυπουργού ποια είναι;) τον οδήγησε πριν από έναν ακριβώς μήνα στο να αρνηθεί κατηγορηματικά με έγγραφό του να φύγει η έδρα του Δικτύου από το αμερικανικό έδαφος. Δεν είναι μόνο στο Ιράκ που δίνει τη μάχη του ο Πρόεδρος για το δίκιο, αλλά και στον κυβερνοχώρο. Δυστυχώς. Πάντως οι διευθύνσεις του Internet πρόκειται να σημαδέψουν τη ζωή μας τα επόμενα χρόνια και ίσως να είναι η αιτία που τα όρια των κρατών θα αρχίσουν να σβήνουν...

ΤΟ ΒΗΜΑ, 01-03-1998 Κωδικός άρθρου: B12470C222

iadd'EVOLUTION#cptCore546.171#

name::
* McsEngl.iadd'EVOLUTION@cptIt,

1996, Dec. 20:
Task force proposes new names for Internet
Web posted at: 7:30 p.m. EST
WASHINGTON (Reuter) -- An international task force working to resolve the simmering controversy over desirable addresses on the Internet released a draft plan Friday for a substantial expansion of the total number of destinations.
The International Ad Hoc Committee on domain names, formed by the Internet Society in October, recommended that seven new so-called top-level domains be added to the Internet.
Top-level domains are the three-letter designations most Internet sites end with, such as "com" in http://www.gm.com and other commercial sites, "gov" in government sites and "edu" for sites run by schools.
The committee recommended that an unlimited number of firms be authorized to register the new addresses, although the panel said it hoped to initially approve 20 to 30 new registration services.
Addresses for most sites are currently handed out by Network Solutions Inc. of Herndon, Virginia, which charges $100 for each registration.
At first, Network Solutions would continue to have a monopoly on the domain names it already controls, but the committee said its ultimate goal is to have all names handled by all qualifed firms.
"The IAHC members were faced with a formidable challenge," said Donald Heath, president of the Internet Society and chairman of the committee. "We accomplished our goal, in no small part, because we were able to bring people together from around the world, via the Internet."
The full text of the recommendations was posted on the Internet at http://www.iahc.org, Heath said. The proposal will be open for public comment until January 17 and a final report is expected by February 3.
New names and competing registration services should help quell disputes over popular or trademarked names.

Once new top-level domain names are available, 10 people or organizations could register similar names.
The new top-level domains will contain three to five letters but have not yet been selected.
Copyright 1996 Reuters Limited. All rights reserved.

iadd'ICAN#ql:icann@cptIt67i#

name::
* McsEngl.iadd'ICAN@cptIt,

SPECIFIC

iadd.specific,

USER ADDRESS: It has the format: user@node.

COMPUTER ADDRESS: 128.164.129.1

iadd.FTP#cptIt388: attSpe#

name::
* McsEngl.iadd.FTP@cptIt,

iadd.EMAIL

name::
* McsEngl.iadd.EMAIL@cptIt,
* McsEngl.address.email@cptIt,

FREE EMAIL:
www.hotmail.com
If you'd prefer a system that automatically deletes old mail so it can always accept new messages, look at Hotmail.

Forget what your old man told you about there being no such thing as a free lunch. Today, you really can get something without paying a dime: email. All you need is access to the Web; you don't even need your own computer. Interested? Check out the CNET comparison of 7 "freemail" services:
http://www.cnet.com/Content/Reviews/Compare/Freemail/?dd

RocketMail offers 33 percent more storage space and accepts attachments that are 50 percent larger. It also has better online help, a better spelling checker, and a mostly text interface that enables faster access. RocketMail accepts both MIME and UUencoded attachments, making it more universal than Hotmail. RocketMail lacks Hotmail's filtering, but a spokesperson says this feature is forthcoming.
Each account gets 3MB of storage space. Messages stay in the system until you read them, or, once you've saved them, for as long as you want. If your box starts to get full, RocketMail sends warning messages when you are within 30 percent and 10 percent of your limit. Should your box fill completely, incoming mail is returned to the sender.

If you're a power emailer, you may prefer Hotmail. It has the slickest interface, plus a few features RocketMail lacks. For instance, you can create up to 10 filters to send incoming mail to the folder of your choice (including the trash can for spam). Hotmail can check as many as four POP mail accounts, so you can consolidate all your email in a single place. Hotmail even offers free (though not toll-free) tech support, seven days a week.

If you don't have an Internet account and you just want free email, then Juno is not only your best choice, it's your sole choice. Juno comes complete with well-designed software that makes sending and receiving mail easy. And if the nearest of the service's 400 access numbers isn't a toll call, then Juno really is totally free. The service doesn't handle attachments, though, so you have to be happy with plain-text messages.

iadd.TELNET'ADDRESS

name::
* McsEngl.iadd.TELNET'ADDRESS@cptIt,

iadd.SUBSCRIPTION#cptIt530#

name::
* McsEngl.iadd.SUBSCRIPTION@cptIt,

iadd.IPv6

name::
* McsEngl.iadd.IPv6@cptIt,

_DESCRIPTION:
The most obvious improvement in IPv6 over IPv4 is that IP addresses are lengthened from 32 bits to 128 bits. This extension anticipates considerable future growth of the Internet and provides relief for what was perceived as an impending shortage of network addresses.
Supports source and destination addresses that are 128 bits (16 bytes) long.
[http://searchenterprisewan.techtarget.com/definition/IPv6]

netInt'address.WEB

NAME

name::
* McsEngl.netInt'address.WEB@cptIt,
* McsEngl.conceptIt414,
* McsEngl.webpage-address@cptIt414,
* McsEngl.address.web@cptIt414,
* McsEngl.http-address@cptIt414,
* McsEngl.http-address@cptIt,
* McsEngl.webaddress@cptIt,
* McsEngl.web-address@cptIt414,
* McsEngl.www-address@cptIt414,

* McsEngl.adsWeb@cptIt,
* McsEngl.httpadrs@cptIt, {2013-08-29}
* McsEngl.webads@cptIt,

adsWeb'GENERIC

_GENERIC:
INTERNET ADDRESS#cptItsoft375#

adsWeb'WHOLE

_WHOLE:
* webpage

SPECIFIC

name::
* McsEngl.adsWeb.specific@cptIt,

_SPECIFIC:
*#ql:_webpage*#
===
* webpage-address##
* website-address##
* who?
* users.forthnet.gr/ioa/nikas
* httpadrs.compulink.gr/users/nikas

adsWeb.CAMPAIGNING

name::
* McsEngl.adsWeb.CAMPAIGNING@cptIt,
* McsEngl.address.web.petition@cptIt,
* McsEngl.campain-site@cptIt,
* McsEngl.petition.webaddress@cptIt,
* McsEngl.webaddress.petition@cptIt,
====== lagoGreek:
* McsElln.συλλογή-υπογραφών@cptIt,
* McsElln.ψήφισμα@cptIt,

_AVAAZ:
* http://www.change.org//
* https://secure.avaaz.org/en/petition/TELOS_STO_FASISMO_TORA//

netInt'Anonymity

name::
* McsEngl.netInt'Anonymity@cptIt,

Το ίδρυμα ερευνών Electronic Frontier Foundation διέθεσε πρόσφατα στο κοινό ένα πολύ ενδιαφέρον έως σοκαριστικό εργαλείο, το οποίο δείχνει ότι η πλοήγηση στο Internet αφήνει ένα ψηφιακό αποτύπωμα που μπορεί να αξιοποιηθεί από τρίτους. Το εργαλείο του EFF βασίζεται στην παραδοχή ότι οι περισσότεροι χρήστες έχουν ρυθμίσεις στον browser που στη συντριπτική πλειονότητα των περιπτώσεων είναι μοναδικές (unique). Το εργαλείο βρίσκεται σε αυτή http://panopticlick.eff.org//
τη σελίδα και ο ενδιαφερόμενος καλείται να πατήσει το κουμπί Test Me για να ξεκινήσει ο έλεγχος του browser. Κάναμε αυτό το τεστ χρησιμοποιώντας Firefox 3.6.3 και ενημερωθήκαμε ότι το αποτύπωμα του browser είναι μοναδικό σε σύνολο 857.747 ελέγχων που έχουν διεξαχθεί μέχρι τώρα. Το εργαλείο ελέγχει τα HTTP_ACCEPT headers, τις λεπτομέρεις των plugins, τις ρυθμίσεις της οθόνης, τις γραμματοσειρές κλπ. Δοκιμάσαμε να ξανακάνουμε το τεστ έχοντας απενεργοποιήσει τη JavaScript και το αποτέλεσμα ήταν σαφώς πιο "ανώνυμο", καθώς το εργαλείο δεν κατάφερε να ανιχνεύσει unique configuration. Οι υπεύθυνοι του EFF λένε ότι δεν κρατάνε αρχείο με τους ελέγχους, ωστόσο αυτό δεν καθησυχάζει ιδιαίτερα το κοινό. Η μέθοδος αυτή δείχνει ουσιαστικά ότι οποιαδήποτε ιστοσελίδα μπορεί να δημιουργήσει μια βάση δεδομένων, προκειμένου να γνωρίζει ανά πάσα στιγμή ποιοι επισκέπτες βρίσκονται στο site.
[ DESM S.A. Newsletter 21/05/2010 Τεύχος 145.]

netInt'backup

name::
* McsEngl.netInt'backup@cptIt,

Does Anyone Keep Old Web Pages on File?
Since 1996, the Bibliotheca Alexandrina library in Egypt has kept a virtual record of every web page on the Internet.

If you've ever used the Wayback Machine online to find an old website, you
know old web pages are kept somewhere. But where? Alexandra, Egypt, famous
for being the site of one of the ancient world's greatest libraries, is now
home to the modern Bibliotheca Alexandrina. The Bibliotheca Alexandrina
(BA) stores copies of every web page that has been posted since 1996. The
Internet Archive, which started in San Francisco in 1996, signed an
agreement with the BA in 2002 to create backups for their archives, which
have the capacity to hold 3.7 petabytes of information. That's a lot of
data.

Read More: http://www.wisegeek.com/does-anyone-keep-old-web-pages-on-file.htm?m, {2016-03-03}

netInt'Charge

name::
* McsEngl.netInt'Charge@cptIt,

ΕΠΑΚ:
Σήμερα η χρέωση είναι:
- 0,352€ την ΩΡΑ από τις 8 το πρωί μέχρι τις 10 το βράδυ.
- 0,176€ την ΩΡΑ από τις 10 το βράδυ μέχρι τις 8 το πρωί.
Η ΑΣΤΙΚΗ-ΧΡΕΩΣΗ είναι 0,026 το λεπτό, 1,56€ την ΩΡΑ, όλο το 24ωρο.
[ΡΑΜ 2003.10, 16]

An account on a public-access Internet host costs anywhere from $1 to $4 per hour.

ΑΣΤΙΚΗ ΧΡΕΩΣΗ (χωρίς πάγιο)

HOL AnyTime:
* phone: 801 200 0 200
* username: mesa
* password: tora

Πανελλαδική πρόσβαση στο Internet με αστική κλήση από την Tellas
Για το Flash.gr, Τεχνολογία
Διεύθυνση του άρθρου: http://tech.flash.gr/news/greece/2003/11/5/10303id/

Η Tellas ΑΕ ανακοίνωσε ότι η υπηρεσία Free Internet, η νέα υπηρεσία πρόσβασης στο Internet χωρίς συνδρομή, θα παρέχεται πλέον σε όλη την Ελλάδα μέσω του νέου πανελλαδικού αριθμού πρόσβασης. Η σύνδεση στο Internet με την υπηρεσία Free Internet κοστίζει όσο οι αστικές κλήσεις από όποιο μέρος της Ελλάδας και αν καλεί ο χρήστης.
Χάρη στην υπηρεσία Free Internet, η πρόσβαση στο Internet γίνεται ευκολότερη από ποτέ, καθώς οι χρήστες μπορούν να συνδεθούν άμεσα και εύκολα, αρκεί να έχουν υπολογιστή με modem και μια τηλεφωνική γραμμή, χωρίς να απαιτείται καμία μορφή δέσμευσης όπως συμβόλαιο, αγορά κάρτας ή προπληρωμή μηνών. Ο χρήστης απλά καλεί τον πανελλαδικό αριθμό κλήσης 801-500-5000 και συνδέεται, χρησιμοποιώντας το όνομα ''tellas'' και το password ''free''.
Η διαδικασία είναι σύντομη και απλή:
Ο χρήστης δημιουργεί μια νέα σύνδεση dial-up στον υπολογιστή του (παράδειγμα για WinXP: Start -> Control Panel -> Network connections -> Create new connection -> Connect to the Internet -> Set up my connection manually -> Connect using a dial-up modem). Πληκτρολογεί: Username: tellas Password: free Πανελλαδικός Αριθμός Κλήσης: 801-500-5000 Και πατά Enter για να συνδεθεί.

netInt'Conference on internet

name::
* McsEngl.netInt'Conference on internet@cptIt,

MAY 1994:
INTERNET WORLD & DOCUMENT DELIVERY INTERNATIONAL (2o), of Mecklermedia company.

netInt'Country

name::
* McsEngl.netInt'Country@cptIt,

1990:
Today (1990) it has become the intangible eighth wonder of the world, connecting 936 networks, at least 175,000 computers and countless users in 35 countries.

1994:
- 33 χώρες [ΒΗΜΑ, 17 ΙΟΥΛ. 1994, Γ32]
- 80 χωρες [COMPUTER GO, SEP. 1994, 79]

netInt'doing.SERVICE

NAME

name::
* McsEngl.netInt'doing.SERVICE@cptIt,
* McsEngl.conceptIt421,
* McsEngl.inet'service@cptIt,
* McsEngl.Internet'service@cptIt,
* McsEngl.Internet-service@cptIt421,
* McsEngl.Internet'SERVICING@cptIt,
* McsEngl.inetsrvng@cptIt421, {2012-11-19}

DEFINITION

Κάθε λειτουργία που προσφέρει στους χρήστες του το δίκτυο.

inetsrvng'GENERIC

_GENERIC:
* servicing#cptEconomy541.103#

inetsrvng'WHOLE

_WHOLE:
* internet#cptIt67(internet)#

SPECIFIC

name::
* McsEngl.inetsrvng.specific@cptIt,

_SPECIFIC: inetsrvng.alphabetically:
* DATABASES#cptIt392#
* NEWSLETERS,
* ARCHIVES (20)
* IRC=Internet Relay Chat, Real time application
* MUD, A multiuser game
* TELNET#cptIt386#
* FTP#cptIt370# (FILE TRANSFER),
     DOCUMGENS, (Βιβλία, άρθρα, περιοδικά),
     ELECTRONIC JOURNALS,
     RESEARCH IN PROGRESS,
     SOFTWARE,
     SPECIALIZED SCIGENIFIC DATABASES,
 CWIS#cptIt391# {CAMPUS WIDE INFORMATION SYSTEMS}
 OPAC#cptIt72#, {ONLINE PUBLIC ACCESS CATALOG}/LIBRARY CATALOG,
 WAIS#cptIt394# {WIDE AREA INFO SYSTEM}
 BULLETIN BOARDS

inetsrvng.SPECIFIC-DIVISION.protocol:

name::
* McsEngl.inetsrvng.SPECIFIC-DIVISION.protocol:@cptIt,

_SPECIFIC:
* ftp (file-transfer)#cptItsoft370#
* http (web)#cptItsoft19#
* telnet

inetsrvng.INFO

name::
* McsEngl.inetsrvng.INFO@cptIt,
* McsEngl.reading-viewing-listening-information-on-internet@cptIt, {2012-11-19}

inetsrvng.info.DATABASE

name::
* McsEngl.inetsrvng.info.DATABASE@cptIt,
* McsEngl.conceptIt392,
* McsEngl.database.internet@cptIt392,
* McsEngl.database-on-internet@cptIt,
* McsEngl.internet'database@cptIt392,

SPECIALIZED INFORMATION DATABASES
The offerings of the Internet extend far beyond library catalogs. You can also reach various databases sponsored by other organizations, many with reference value. Many systems do not require a password, and for those that do, obtaining a password is often as simple as filling out an application.

It is difficult to categorize these databases since they are hybrids. They are often co-sponsored by government agencies and university departments, or funded by grants. Their content ranges from full text documents to statistics, and can include directories of researchers, bibliographies, schedules of research activities, or information on research in progress.

They are also more difficult to identify than library catalogs since they are not tied together with a common administrative structure or service goal. The Internet Resource Guide (see Section 3) and various network information centers are currently the best resources for finding out about these databases. Information may be posted to various listservers as they are discovered.

A few examples of these databases illustrate the variety of sources available. Most of the databases listed below can be found in the Internet Resource Guide.

PENpages

A database of agricultural and nutritional information produced by Pennsylvania State University with support from USDA,
the Pennsylvania Department of Agriculture, and Rutgers University.
Information ranges from statistics to the full text of newspapers
and documents. Includes a daily overview of national agricultural
news, plus the ability to do subject searching of keywords.

DARTMOUTH DANTE

Supported by a grant from the National Endowment
for the Humanities, this evolving database includes 32
commentaries--all in their original language--and the full text of
Dante's DIVINE COMEDY. The database uses BRS search software, and
offers a variety of search and display options.

OCEANIC

Includes reports on two major projects, the World Ocean Circulation Experiment (WOCE) and the Span Physics Analysis Network
(SPAN) plus such diverse entries as research ship schedules and
bibliographic references. This is a specialized database
maintained by the University of Delaware's College of Marine Studies.

GEOGRAPHIC NAME SERVER

Contains standard information such as population, latitude/longitude, and zipcode for over 150,000 cities
(mainly U.S.) and selected geographic locations (lakes, mountains,
etc.) This is not the most "user-friendly" system, but is helpful
for those with long lists to search. Information was obtained from
the U.S. Geodetic Survey and the U.S. Postal Service.

JOHNS HOPKINS GENETIC DATABASES

Several public databases, supported by the Howard Hughes Medical Institute in collaboration
with the Johns Hopkins School of Medicine, the National Library of
Medicine, and the Welch Medical Library, provide data related to
human genetics. The following databases are the best known, and
provide complementary information on gene mapping and genetic
diseases. Both have easy-to-use interfaces for generalists. Users
must apply for passwords.

Genome Data Base (GDB)

Devoted to human chromosome mapping. Designed to collect, organize, and disseminate data on gene mapping generated
by scientists.

Online Mendelian Inheritance In Man (OMIM)

Devoted to inherited disorders and traits. Contains continuously updated text of Dr. Victor McKusick's classic text, MENDELIAN INHERITANCE IN MAN.

inetsrvng.info.DICTIONARY

name::
* McsEngl.inetsrvng.info.DICTIONARY@cptIt,

inetsrvng.info.ENCYCLOPEDIA

name::
* McsEngl.inetsrvng.info.ENCYCLOPEDIA@cptIt,

inetsrvng.info.MAGAZINE

name::
* McsEngl.inetsrvng.info.MAGAZINE@cptIt,
* McsEngl.conceptIt404,
* McsEngl.INTERNET'JOURNAL@cptIt404,

Access

WITH FTP, GOPHER etc.

"gopher" * In which a pesky rodent becomes your best friend.

"veronica" * A gopher's best friend

"Usenet" * In which you will owe a debt to anarchists and anarchy.

"Listserv"* In which you will learn to drink from a firehose, and like it!

"FTP" * In which you will be regaled with techno-gibberish.

"archie" * FTP Space's best friend.

SPECIFIC


ASCII JOURNALS
SGML JOURNALS
TeX JOURNALS,

inetsrvng.info.NEWSPAPER

name::
* McsEngl.inetsrvng.info.NEWSPAPER@cptIt,

inetsrvng.BASIC

name::
* McsEngl.inetsrvng.BASIC@cptIt,


e-mail,
file transfer,
remote login,

inetsrvng.BLOGGING

_CREATED: {2012-11-19}

name::
* McsEngl.inetsrvng.BLOGGING@cptIt,
* McsEngl.blog@cptIt, {2012-11-19}

A blog (a portmanteau of the term web log)[1] is a discussion or informational site published on the World Wide Web and consisting of discrete entries ("posts") typically displayed in reverse chronological order (the most recent post appears first). Until 2009 blogs were usually the work of a single individual, occasionally of a small group, and often were themed on a single subject. More recently "multi-author blogs" (MABs) have developed, with posts written by large numbers of authors and professionally edited. MABs from newspapers, other media outlets, universities, think tanks, interest groups and similar institutions account for an increasing quantity of blog traffic. The rise of Twitter and other "microblogging" systems helps integrate MABs and single-author blogs into societal newstreams. Blog can also be used as a verb, meaning to maintain or add content to a blog.

The emergence and growth of blogs in the late 1990s coincided with the advent of web publishing tools that facilitated the posting of content by non-technical users. (Previously, a knowledge of such technologies as HTML and FTP had been required to publish content on the Web.)

Although not a requirement, most good quality blogs are interactive, allowing visitors to leave comments and even message each other via GUI widgets on the blogs, and it is this interactivity that distinguishes them from other static websites.[2] In that sense, blogging can be seen as a form of social networking. Indeed, bloggers do not only produce content to post on their blogs, but also build social relations with their readers and other bloggers.[3]

Many blogs provide commentary on a particular subject; others function as more personal online diaries; others function more as online brand advertising of a particular individual or company. A typical blog combines text, images, and links to other blogs, Web pages, and other media related to its topic. The ability of readers to leave comments in an interactive format is an important contribution to the popularity of many blogs. Most blogs are primarily textual, although some focus on art (art blogs), photographs (photoblogs), videos (video blogs or "vlogs"), music (MP3 blogs), and audio (podcasts). Microblogging is another type of blogging, featuring very short posts. In education, blogs can be used as instructional resources. These blogs are referred to as edublogs.

As of 16 February 2011, there were over 156 million public blogs in existence.[4] On October 13, 2012, there were around 77 million Tumblr[5] and 56.6 million WordPress[6] blogs in existence worldwide.
[http://en.wikipedia.org/wiki/Blog]

inetsrvng.BUSINESS

name::
* McsEngl.inetsrvng.BUSINESS@cptIt,

Ο ΕΠΙΧΕΙΡΗΜΑΤΙΚΟΣ ΧΩΡΟΣ ΤΟΥ 2000
"Σήμερα, η εκπληκτική διάδοση του Internet σε επίπεδο τελικών χρηστών το καθιστά ιδανικό και για επιχειρηματικές δραστηριότητες... Το Internet αντιπροσωπεύει, κατά την άποψή μας, ένα πρωτότυπο δημόσιο δίκτυο σε σφαιρική κλίμακα, το οποίο θα 'επαναστατικοποιήσει' τους τρόπους εμπορικών και επιχειρηματικών συναλλαγών και δραστηριοτήτων στα επόμενα δέκα χρόνια."
[ΛΥΓΕΡΑΚΗΣ, Γ. "INTERNET o Επιχειρηματικός Χώρος του 2000" TELECOM (ΙΟΥΝ. 1994): 8]

inetsrvng.CHAT

name::
* McsEngl.inetsrvng.CHAT@cptIt,

IRC/INTERNET RELAY CHAT#cptIt584: attSpe#

name::
* McsEngl.IRC/INTERNET RELAY CHAT@cptIt,

TALK

Αμεση επικοινωνια δύο χρηστών με την προϋπόθεση ότι και οι δύο χρησιμοποιούν το σύστημα.

inetsrvng.CLOUD-COMPUTING

name::
* McsEngl.inetsrvng.CLOUD-COMPUTING@cptIt,
* McsEngl.conceptIt421.1,

inetsrvng.CWIS

name::
* McsEngl.inetsrvng.CWIS@cptIt,
* McsEngl.conceptIt391,
* McsEngl.internet-CWIS@cptIt,
* McsEngl.internet'cwis@cptIt391,
* McsEngl.CAMPUS-WIDE-INFORMATION-SYSTEMS@cptIt,

DEFINITION

CAMPUS-WIDE INFORMATION SYSTEMS
In addition to over 100 online library catalogs, the Internet also provides access to a growing number of campus-wide information systems. A current list of such systems is provided at the end of each release of "Internet- Accessible Library Catalogs and Databases."
An electronic conference which discusses campus-wide information systems is maintained on the listserver
at CWIS-L@WUVMD.BITNET.

The types of information and search capabilities provided by these systems vary widely. Common components include - library hours;
- local campus news and information;
- activities and events calendars;
- directories of staff,
- services,
- organizations and computing facilities;
- course schedules and catalogs;
- employment and financial aid opportunities; and
- descriptions of the campus,
- academic programs and various policies.

Several online library catalogs have or are developing some of the components found in campus-wide information systems, so the two types of resources are not mutually exclusive.

SPECIFIC

Specific_concepts (level 3) =

Campus-wide information systems available on the Internet include
- Columbia,
- Cornell's CUINFO,
- MIT TECHINFO,
- New Mexico State University NMSU/INFO,
- NYU,
- PNN - Princeton News Network,
- University of New Mexico UNM_INFO, and
- University of North Carolina at Chapel Hill INFO.

inetsrvng.EMAIL

name::
* McsEngl.inetsrvng.EMAIL@cptIt,
* McsEngl.conceptIt387,
* McsEngl.email@cptIt387,
* McsEngl.email-service@cptIt387,
* McsEngl.emailservice@cptIt387,
* McsEngl.Internet'email@cptIt387,

DEFINITION

Το ηλεκτρονικό ταχυδρομείο είναι η εκ των ουκ άνευ υπηρεσία του δικτύου.
Οπως όλες οι υπηρεσίες του internet, το ταχυδρομείο είναι ένα σύστημα CLIENT-SERVER. Ο υπολογιστής του internet provider λειτουργεί σαν server, λαμβάνοντας μηνύματα απο άλλα internet sites και αποθηκεύοντάς τα για το χρήστη. Ο χρήστης χρησιμοποιεί ένα client προγραμμα για να εκτελέσει τις στοιχειώδης λειτουργίες ανάγνωσης, αποθήκευσης, αποστολής κλπ.
[COMPUTER GO, SEP. 1994, 85]

email'doc

name::
* McsEngl.email'doc@cptIt,

_QUANTITY:
Email is still the number one communication tool online - 2.3 million people are sending 150 billion emails every day.
[https://www.indiegogo.com/projects/lavaboom-secure-email-for-everyone] 2015-05-14

email'mailgroup#cptIt376: attPar#

name::
* McsEngl.email'mailgroup@cptIt,

email'USENET#cptIt405: attPar#

name::
* McsEngl.email'USENET@cptIt,

email'HOW-TO FIND SOMEONE'S ADDRESS

name::
* McsEngl.email'HOW-TO FIND SOMEONE'S ADDRESS@cptIt,

HOW DO I FIND OUT SOMEONE'S E-MAIL ADDRESS?
With so many <computer systems> and users in the world, it is impossible to keep a complete "white pages" of the Internet. The problem is compounded because people come and go from the net all the time.
(Students are notorious for this.) Storing and updating that much information would be an impossible, daunting task.

But, it's not impossible to find people on the net. Programs exist that, given some amount of information about your associate, can help you track down his or her e-mail address. These tools include
- Netfind,
- X.500,
- rtfm's usenet-addresses search, and
- WHOIS.
The more information you know about your associate - name, place of business or school, and so on - the better your chances are.

For a very complete answer to this question, read: "FAQ: How to find people's E-mail addresses", available from mail-server@rtfm.mit.edu by sending "send usenet/news.answers/finding-addresses". This document is posted regularly to the Usenet group "news.answers".

There is another long document specifically for finding college students' e-mail addresses. It is also posted to "news.answers". It's available by anonymous FTP on "a.gp.cs.cmu.edub" as:
/afs/cs.cmu.edu/user/mkant/Public/Email/college-email-1.text
/afs/cs.cmu.edu/user/mkant/Public/Email/college-email-2.text
/afs/cs.cmu.edu/user/mkant/Public/Email/college-email-3.text

email'HOW-to SEND email to OTHER NETWORKS

name::
* McsEngl.email'HOW-to SEND email to OTHER NETWORKS@cptIt,

HOW DO I SEND ELECTRONIC MAIL FROM THE INTERNET TO ANOTHER NETWORK?

In the best of worlds, our "global village" of electronic mail would be linked by one main street. Alas, it is actually composed of hundreds of small networks linked using "gateways." One main street is the Internet, but jutting off of it are dozens of side roads leading to other networks. It's always simplest to send mail to a recipient on the same <online service> as yourself - say, from your America Online account to another - but sometimes you may need to send mail to someone who doesn't have an account on the system you use. While it's usually possible to mail from one network to another, you need to know the right route to navigate. In order to send any mail, you need to know the online service your recipient uses, and her name (or username) on that service.

For a more complete listing of how to send mail from any random network to any other random network, read the "Inter-Network Mail Guide" edited by Scott Yanoff (formally edited by John J. Chew.) It also tells how to mail from networks other than the Internet - which is beyond the scope of this document. You can fetch this guide by anonymous FTP in either:
FTP.MsState.Edu:/pub/docs/internetwork-mail-guide
ariel.unm.edu:/library/network.guide

AMERICA ONLINE:

"user@aol.com" Use all lower case and remove spaces. For
example, "savetz@aol.com". Mail to America Online users can't be too
long - it is limited to 32Kb if the recipient is a Mac user, or 8Kb if
s/he is an IBM user. Funky characters are replaced with spaces: use
printable ASCII only.

APPLELINK:

"user@applelink.apple.com"

AT&T MAIL:

"user@attmail.com"

BITNET:

"user@host.BITNET" (Note that the bitnet hostname is not
necessarily the same as the Internet host name.) If this fails, try
directing your mail through a gateway such as "cunyvm.cuny.edu",
"pucc.princeton.edu", or "wuvmd.wustl.edu". The address would be as
follows: "user%domain.BITNET@pucc.princeton.edu" (or cunyvm or wuvmd).
This should help those with SMTP servers that are not quite up to date.

BIX:

"user@bix.com"

BMUG:

"First.Last@bmug.fidonet.org"

COMPUSERVE:

"userid@compuserve.com". Use the numeric CompuServe
identification number, but use a period instead of a comma to separate
the number sets. For example, to send mail to CompuServe user 17770,101
- mail to "177770.101@compuserve.com".

CONNECT:

"user@dcjcon.das.net"

DELPHI:

"user@delphi.com"

FIDONET

"firstname.lastname@point.node.net.zone.fidonet.org". To send
mail to a FidoNet user, you not only need the name, but the exact
FidoNet address s/he uses. FidoNet addresses are broken down into zones,
net, nodes, and points. To send to John Doe, who uses point 1 of node 2,
which is in net 3 of zone 4 - you would send your mail to
"john.doe@p1.f2.n3.z4.fidonet.org".

GENIE:

"user@genie.geis.com" where "user" is their mail address. If a
user tells you their mail address is "xyz12345" or something similar, it
isn't. It usually looks like "A.BEEBER42" where A is their first
initial, BEEBER is their last name, and 42 is a number distinguishing
them from all other A.BEEBER's. As of July 1, 1993, GEnie's fees for
sending and receiving Internet email to the Internet will be removed and
all customers will have access to the gateway without need to sign up
for it. Until July 1, only users who have requested Internet mail can
send and receive it.

INSTITUTE FOR GLOBAL COMMUNICATIONS (IGC; or "PEACENET"):

"user@igc.org"

INTERNET:

send mail to "user@domain", where user is the recipient's login name, and domain is the full name and location of the computer
where s/he receives e-mail. Examples are "savetz@rahul.net" and
"an017@cleveland.freenet.edu".

MCI MAIL:

send your mail to "user@mcimail.com". "User" can be a numeric identification, or first and last names separated with an underline.
(E.g. "10101@mcimail.com" or "john_doe@mcimail.com".)

WELL:

"user@well.sf.ca.us"

PANIX:

"user@panix.com"

PRODIGY:

Prodigy has been promising network mail for months, but hasn't delivered it yet. So currently, Prodigy users are cut off from mail to the outside world. Perhaps by the end of the year, Prodigy users will be able to send and receive mail to and from other networks. They do have a network server, prodigy.com, but it doesn't do anything useful.

ΕΝΑΣ ΤΥΠΟΠΟΙΗΜΕΝΟΣ ΤΡΟΠΟΣ

F= FROM NETWORK
T= TO NETWORK
R= TO ADDRESS
C= CONTACT ADDRESS IN CASE OF TROUBLE
I= HOW TO DO.

+F internet
+T aol
+R A User
+C postmaster@aol.com
+I send to auser@aol.com (all lower-case, remove spaces)
+I messages are truncated to 32K (8K for PCs), all characters except newline
+- and printable ASCII characters are mapped to spaces, users are limited to
+- 75 pieces of Internet mail in their mailbox at a time.

+F internet
+T applelink
+R user
+I send to 'user@applelink.apple.com'

+F internet
+T att
+R user
+I send to 'user@attmail.com'

+F internet
+T bitnet
+R user@site
+I send to 'user%site.bitnet@gateway' where 'gateway' is a gateway host that
+- is on both the internet and bitnet. Some examples of gateways are:
+- cunyvm.cuny.edu mitvma.mit.edu. Check first to see what local policies
+- are concerning inter-network forwarding.

+F internet
+T bix
+R user
+I send to 'user@dcibix.das.net'
+I reaches only paying users registered through the DASNet (commercial) gateway

+F internet
+T bmug
+R John Smith
+I send to 'John.Smith@bmug.fidonet.org'

+F internet
+T cgnet
+R user
+C intermail-request@intermail.isi.edu
+I send to 'user%CGNET@intermail.isi.edu'
+I this gateway will be discontinued 1992-09-30

+F internet
+T compuserve
+R 71234,567
+I send to '71234.567@compuserve.com'
+I Ordinary Compuserve account IDs are pairs of octal numbers

+F internet
+T compuserve
+R organization:department:user
+I send to 'user@department.organization.compuserve.com'
+I This syntax is for use with members of organizations which have a
+- private CompuServe mail area. 'department' may not always be present.

+F internet
+T connect
+R NAME
+I send to 'NAME@dcjcon.das.net'

+F internet
+T easynet
+R HOST::USER
+C admin@decwrl.dec.com
+I send to 'user@host.enet.dec.com'
+I or to 'user%host.enet@decwrl.dec.com'

+F internet
+T easynet
+R John Smith @ABC
+C admin@decwrl.dec.com
+I send to 'John.Smith@ABC.MTS.DEC.COM'
+I this syntax is for sending mail to All-In-1 users

+F internet
+T envoy
+R John Smith (ID=userid)
+I send to 'uunet.uu.net!att!attmail!mhs!envoy!userid'

+F internet
+T envoy
+R John Smith (ID=userid)
+C /C=CA/ADMD=TELECOM.CANADA/ID=ICS.TEST/S=TEST_GROUP/@nasamail.nasa.gov
+I send to '/C=CA/ADMD=TELECOM.CANADA/DD.ID=userid/PN=John_Smith/@Sprint.COM'

+F internet
+T fidonet
+R john smith at 1:2/3.4
+I send to 'john.smith@p4.f3.n2.z1.fidonet.org'

+F internet
+T geonet
+R user at host
+I send to 'user:host@map.das.net'
+I or to 'user@host.geomail.org' (known to work for geo2)
+I known hosts: geo1 (Europe), geo2 (UK), geo4 (USA)

+F internet
+T gold-400
+R (G:John, I:Q, S:Smith, OU: org_unit, O:organization, PRMD:prmd)
+I send to 'john.q.smith@org_unit.org.prmd.gold-400.gb'
+I or to '"/G=John/I=Q/S=Smith/OU=org_unit/O=org/PRMD=prmd/ADMD=gold 400/
+- C=GB/"@mhs-relay.ac.uk'

+F internet
+T greennet
+R user
+C support@gn.co.uk
+I user@gn.co.uk
+I valid as of 1991-04-04

+F internet
+T gsfcmail
+R user
+C help@nic.nsi.nasa.gov
+I send to 'user@gsfcmail.nasa.gov'
+I or to '/PN=user/ADMD=TELEMAIL/PRMD=GSFC/O=GSFCMAIL/C=US/
+- @x400.msfc.nasa.gov'

+F internet
+T ibm
+R user@vmnode.tertiary_domain (syntax?)
+C nic@vnet.ibm.com
+I send to 'user@vmnode.tertiary_domain.ibm.com'
+I To look up a user's mailbox name, mail to nic@vnet.ibm.com with
+- the line 'WHOIS name' in the message body.

+F internet
+T keylink
+R (G:John, I:Q, S:Smith, O:organization, C:au)
+C aarnet@aarnet.edu.au
+I send to '"/G=John/I=Q/S=Smith/O=organization/"@telememo.au'
+I Supported attributes are C=AU, A=ADMD=telememo, P=PRMD=private management
+- domain, O=organization, OU=organizational unit, G=given name, I=initials,
+- S=surname, PN=personal name (G.I.S), DD.UID (domain defined), DD.NODE
+- (domain defined), DD.UN (domain defined).

+F internet
+T mci
+R John Smith (123-4567)
+I send to '1234567@mcimail.com'
+I or to 'JSmith@mcimail.com' (if 'JSmith' is unique)
+I or to 'John_Smith@mcimail.com' (if 'John Smith' is unique - note the
+- underscore!)
+I or to 'John_Smith/1234567@mcimail.com' (if 'John Smith' is NOT unique)

+F internet
+T mfenet
+R user@mfenode
+I send to 'user%mfenode.mfenet@nmfecc.arpa'

+F internet
+T nasamail
+R user
+C help@nic.nsi.nasa.gov
+I send to 'user@nasamail.nasa.gov'
+I Help is available by phoning +1 205 544 1771 or +1 301 286 7251.

+F internet
+T nsi
+R host::user
+C help@nic.nsi.nasa.gov
+I send to 'user@host.dnet.nasa.gov'
+I or to 'user%host.dnet@ames.arc.nasa.gov'
+I or to 'user%host.dnet@east.gsfc.nasa.gov'
+I Help is also available by phoning +1 301 286 7251.

+F internet
+T omnet
+R user
+C help@nic.nsi.nasa.gov
+I send to 'user@omnet.nasa.gov'
+I or to 'user/omnet@omnet.nasa.gov' (?)
+I or to '/DD.UN=user/O=OMNET/ADMD=TELEMAIL/C=US/@Sprint.COM'
+I Help is available by phoning +1 301 286 7251 or +1 617 265 9230.

+F internet
+T peacenet
+R user
+C support@igc.org
+I send to 'user@cdp.igc.org'

+F internet
+T sinet
+R node::user or node1::node::user
+I send to 'user@node.SINet.SLB.COM'
+I or to 'user%node@node1.SINet.SLB.COM'

+F internet
+T sprintmail
+R John Smith at SomeOrganization
+C help@nic.nsi.nasa.gov
+I send to '/G=John/S=Smith/O=SomeOrganization/ADMD=TELEMAIL/C=US/@Sprint.COM'
+I Help is also available by phoning +1 301 286 7251.

+F internet
+T thenet
+R user@host
+I send to 'user%host.decnet@utadnx.cc.utexas.edu'

email'program#cptIt102#

name::
* McsEngl.email'program@cptIt,

email'protocol

name::
* McsEngl.email'protocol@cptIt,

HTTP
SMTP

Simple Mail Transfer Protocol. Είναι μέρος του TCP/IP.
Χρησιμοποιεί μόνο ASCII χαρακτήρες.
[COMPUTER GO, SEP. 1994, 85]

MIME

_DESCRIPTION:
MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transfer Protocol (SMTP). In 1991, Nathan Borenstein of Bellcore proposed to the Internet Engineering Task Force (IETF) that the format of email messages be extended so that email programs could recognize and handle kinds of data other than ASCII text. As a result, conventions for labeling and packaging such data were added to email as a supported type.
Servers insert the MIME header at the beginning of any Web transmission. Clients use this header to select an appropriate "player" application for the type of data the header indicates. Some of these players are built into the Web client or browser (for example, all browsers come with GIF and JPEG image players as well as the ability to handle HTML files); other players may need to be downloaded.
Multipurpose Internet Mail Extensions (MIME) is an Internet standard that extends the format of email to support:
Text in character sets other than ASCII
Non-text attachments
Message bodies with multiple parts
Header information in non-ASCII character sets
Although MIME was designed mainly for SMTP, its use today has grown beyond describing the content of email and now often includes descriptions of content type in general, including for the web (see Internet media type) and as a storage for rich content in some commercial products (e.g., IBM Lotus Domino and IBM Lotus Quickr).
Virtually all human-written Internet email and a fairly large proportion of automated email is transmitted via SMTP in MIME format. Internet email is so closely associated with the SMTP and MIME standards that it is sometimes called SMTP/MIME email.[1]
The content types defined by MIME standards are also of importance outside of email, such as in communication protocols like HTTP for the World Wide Web. HTTP requires that data be transmitted in the context of email-like messages, although the data most often is not actually email.
MIME is specified in six linked RFC memoranda: RFC 2045, RFC 2046, RFC 2047, RFC 4288, RFC 4289 and RFC 2049, which together define the specifications.
New MIME data types are registered with the Internet Assigned Numbers Authority (IANA).
MIME is specified in detail in Internet Request for Comments 1521 and 1522, which amend the original mail protocol specification, RFC 821 (the Simple Mail Transfer Protocol) and the ASCII messaging header, RFC 822.
[http://en.wikipedia.org/wiki/MIME]
===
Multipurpose Internet Mail Extensions. Είναι ένα ΝΕΟ πρωτόκολο που προσπαθεί να λύσει τους περιορισμούς του SMTP. Επιτρεπει την ενσωματωση οποιουδήποτε αρχείου, με την προϋπόθεση ο header του μηνύματος να περιέχει τις απαραίτητες πληροφορίες, ώστε το περιεχόμενο να είναι αναγνωρίσιμο απο τον mail client.
Το unix mail δεν διαθέτει ΜΙΜΕ δυνατότητες. Οι κλάιντς Elm, Pine διαθέτουν, αλλά δεν μπορείς να δείς εικόνες πχ, μπορείς όμως να τις αποθηκεύσεις και με άλλα προγράμματα να τις δεις.
[COMPUTER GO, SEP. 1994, 85]

email'resource

name::
* McsEngl.email'resource@cptIt,

INFORMATION on internet email
To learn the basics of e-mail on the Internet, FTP to:
ftp.sura.net: /pub/nic/network.service.guides/how.to.email.guide

"...sending electronic mail from one network to another." Monthly updates of this guide are available by Listserv at
LISTSERV@UNMVMA on Bitnet or listserv@unmvm.unm.edu on the Internet.
To fetch a copy, send a message to either address, with an empty subject and a message body consisting of the line 'GET NETWORK GUIDE'. [Courtesy of Art St. George]

email'security

name::
* McsEngl.email'security@cptIt,

_DESCRIPTION:
In 2013 Edward Snowden revealed the scope of the mass surveillance of the NSA and their partners in the UK, Canada, Australia and New Zealand. 90% of the data that NSA collects comes from coercive partnerships with Gmail, Hotmail, Yahoo and other US-based email services. American companies are forced by the US law to grant access to their servers and data - databases of users, their private communication and metadata- without having a way to oppose it! If you are a client of one of the biggest email providers, your privacy is compromised. The NSA can read your emails and investigate your online activity whenever they want.
[https://www.indiegogo.com/projects/lavaboom-secure-email-for-everyone]

SPECIFIC

email.LAVABOOM

name::
* McsEngl.email.LAVABOOM@cptIt,
* McsEngl.lavaboom@cptIt,

_DESCRIPTION:
Secure email for everyone.

We believe that tools which enable privacy should be accessible to everyone.

Lavaboom is a zero-knowledge email provider, the first of its kind. It is highly secure and incredibly easy to use. Lavaboom encrypts user data client-side and sends encrypted emails by default.

Work began on Lavaboom in 2013 and testing started in April 2014.

During testing we realised that for encryption to be accessible, it needs to be so easy to use that it’s invisible. So we rebuilt Lavaboom — from scratch.

Lavaboom’s codebase is now highly scaleable and lightning fast. It also just happens to be the most secure version we’ve ever shipped. Beta testing of Lavaboom will now resume. While waiting for an account you are encouraged to read our pre-launch technical white paper.

Lavaboom is based in Germany and is built with love by Felix, Bill, Andrei, Jonas, Felix and Aramis, with additional support from Galou.
[https://lavaboom.com/about]

CROWDFUNDING:
* https://www.indiegogo.com/projects/lavaboom-secure-email-for-everyone,

email.MOONMAIL

name::
* McsEngl.email.MOONMAIL@cptIt,
* McsEngl.moonmail@cptIt,

_DESCRIPTION:
Amazon SES email marketing
Deliver cloud email marketing campaigns
[https://moonmail.io/]

email.protocol.HTTP

name::
* McsEngl.email.protocol.HTTP@cptIt,
* McsEngl.webmail@cptIt,

email.protocol.SMTP

name::
* McsEngl.email.protocol.SMTP@cptIt,

inetsrvng.MAILGROUP

name::
* McsEngl.inetsrvng.MAILGROUP@cptIt,
* McsEngl.conceptIt376,
* McsEngl.inetsrvng.EMAIL-GROUP@cptIt,
* McsEngl.internet-discussion-group@cptIt,
* McsEngl.internet-discussion-list@cptIt,
* McsEngl.internet-email-forum@cptIt,
* McsEngl.internet-forum@cptIt,
* McsEngl.internet-conference@cptIt,
* McsEngl.internet-list@cptIt,
* McsEngl.internet-mailgroup@cptIt,
* McsEngl.internet'mailgroup@cptIt376,
* McsEngl.internet-mailing-list@cptIt,

GENERIC

_GENERIC:
ELECTRONIC-CONFERENCE#cptIt385#

SUBSCRIPTION/ΣΥΝΔΡΟΜΗΤΗΣ,
ΔΙΑΚΟΠΗ ΜΕΛΟΥΣ,

GET SUBSCRIBERS of a mailgroup

I send a message to the LISTSERVs that host key library lists (e.g., PACS-L) asking it to send me a list of subscribers. The LISTSERV command is REV (for review) and the list name. For example, to get the list of PACS-L subscribers, you would send the message REV PACS-L to LISTSERV@UHUPVM1.BITNET tell listserv@uhupvm1.bitnet REV PACS-L

SPECIFIC

Specific_concepts (level 3) =

\clink\internet\confs:L.INFOBASE.CONFS (1085'LISTS),

ADVANCED JAVA

I've found the eGroups archive to be the best way to search the Advanced Java history list:
http://www.egroups.com/info/top?rurl=/list/advanced-java/info.html
While I'm at it, if you want to search the comp.lang.java newsgroups, go to DejaNews, do a "Power Search", and enter "comp.lang.java.*" for the "Forum".
This will search all of the newsgroups. The URL is:
http://www.dejanews.com/
Jay
[{1999-04-06}]

HELLAS

DEFINITION:

SUBSCRIBITION:
tell listserv@brownvm.brown.edu SUBSCRIBE HELLAS Nikolaos Kasselouris

ΣΤΑΛΣΙΜΟ ΓΡΑΜΜΑΤΟΣ:
mail hellas@brownvm.brown.edu

reply sender (reply to hellas) .
reply sender text (brings and the old text).
reply (fs) go to sender only no hellas.

ΔΙΑΚΟΠΗ ΜΕΛΟΥΣ:
UNSUB HELLAS from filelist file.
SIGNOFF HELLAS.

TO STOP MAIL:
tell listerv@brownvm.brown.edu set hellas nomail (set hellas mail).

COMMANDS (ΣΤΕΛΝΟΝΤΑΙ ΣΤΟ listervr ΠΟΥ ΕΙΝΑΙ ΚΑΠΟΙΟΣ ΜΕΛΟΣ):
ΑΠΟ VM/SP CMS systems ΟΙ ΕΝΤΟΛΕΣ ΕΙΝΑΙ:
tell listerv@brownvm.brown.edu ...
ΑΠΟ VAX/VMS:
send listserv@nodeid ...

tell listserv... info gnr.
tell listserv... set hellas ack (acknowledgement)
tell listserv... set hellas msgack (interactive mail only).
tell listserv... set hellas noack.
tell listserv... info genintro.
tell listserv... help.

inetsrvng.FINANCIAL-SERVICES

name::
* McsEngl.inetsrvng.FINANCIAL-SERVICES@cptIt,

Αφορολόγητες καταθέσεις μέσα από το Internet Πώς θα επιλέξετε τράπεζα από το Διαδίκτυο και ποιους λόγους έχετε για να το κάνετε

(Εικόνα μεγέθους : 56614 bytes)
ΔΕΝ ΑΠΕΧΕΙ πολύ η εποχή όπου όλες τις συναλλαγές που σήμερα παραδοσιακά κάνουμε στα γκισέ των τραπεζών θα τις κάνουμε από την οθόνη του προσωπικού μας υπολογιστή μέσα από το δίκτυο Internet. Ηδη η δυνατότητα να έχει ο καταναλωτής την τράπεζα στο σπίτι του 24 ώρες το 24ωρο επί 365 ημέρες τον χρόνο είναι πραγματικότητα, τουλάχιστον όσον αφορά τα μεγαλύτερα τραπεζικά ιδρύματα ανά τον κόσμο.
Το μόνο που έχει να κάνει ο πελάτης μιας τράπεζας είναι να αποκτήσει έναν προσωπικό κωδικό, που θα του επιτρέπει την πρόσβαση στους λογαριασμούς του αλλά και στις υπηρεσίες της τράπεζας με την οποία συνεργάζεται μέσα από το Internet.
Οι ελληνικές τράπεζες αν και διαθέτουν παρουσία στο Διαδίκτυο, αυτή περιορίζεται προς το παρόν στην απλή αναφορά των υπηρεσιών που προσφέρουν και μόνο σε ορισμένες περιπτώσεις ο καταναλωτής έχει τη δυνατότητα να συμπληρώσει μιαν αίτηση για την έκδοση πιστωτικής κάρτας.
Πώς μπορεί ένας έλληνας πολίτης να γίνει πελάτης μιας τράπεζας μέσα από το Internet;
Αυτό μπορεί να γίνει και μάλιστα με σχετική ευκολία. Μέσα σε ελάχιστα λεπτά της ώρας ο ενδιαφερόμενος μπορεί να ανοίξει λογαριασμό καταθέσεων σε οποιοδήποτε από τα κυριότερα νομίσματα παγκοσμίως (δολάριο, μάρκο, στερλίνα, γεν), να προμηθευθεί πιστωτικές κάρτες ή μπλοκ επιταγών, ακόμη και να εξουσιοδοτήσει την τράπεζα να ζητήσει από την εταιρεία όπου εργάζεται να του καταθέτει τον μισθό του σε έναν από τους λογαριασμούς του. μΠαράλληλα ο ενδιαφερόμενος μπορεί να έχει άμεση πρόσβαση ανάλογα με τον τύπο λογαριασμού που θα επιλέξει στα χρήματά του μέσα από οποιαδήποτε ΑΤΜ σε ολόκληρο τον κόσμο και φυσικά στην Ελλάδα.
Βέβαια κάθε χώρα έχει τους δικούς της περιορισμούς όσον αφορά τις τραπεζικές συναλλαγές από αλλοδαπούς. Στην περίπτωση των τραπεζικών συναλλαγών μέσω του Internet οι περιορισμοί αυτοί ξεπεράστηκαν όμως με σχετική ευκολία, αφού οι σημαντικότερες τράπεζες του κόσμου προσφέρουν όλες τις τραπεζικές τους υπηρεσίες μέσω των θυγατρικών τους, που έχουν εγκαταστήσει σε περιοχές με ειδικό καθεστώς, τους γνωστούς «φορολογικούς παραδείσους».
Ετσι για παράδειγμα αν κάποιος Ελληνας επισκεφθεί μέσω του Δικτύου τις σελίδες της βρετανικής τράπεζας Barclays και ζητήσει να ανοίξει λογαριασμό καταθέσεων ή να εκδώσει πιστωτική κάρτα, θα μεταφερθεί αυτόματα στις σελίδες της Offshore Barclays, που έχει την έδρα της σε περιοχές όπως το νησί Τζέρσι ή Νήσος Μαν.
Στις περισσότερες των περιπτώσεων οι θυγατρικές των τραπεζικών ιδρυμάτων προσφέρουν ακριβώς τα ίδια τραπεζικά προϊόντα που προσφέρουν και οι μητρικές τράπεζες.
Γιατί όμως κάποιος Ελληνας να γίνει πελάτης μιας τράπεζας που παρέχει τις υπηρεσίες της μέσα από το Internet;
Πρώτα πρώτα οι καταθέσεις του είναι αφορολόγητες. Παράλληλα αποφεύγει μια σειρά από τεκμήρια διαβίωσης όπως αυτά των πιστωτικών καρτών, ενώ απολαμβάνει επιτόκια χορηγήσεων (πιστωτικών καρτών και δανείων), χαμηλότερα από αυτά που ισχύουν στην ελληνική αγορά.
Τέλος διατηρεί την ανωνυμία του αφού το καθεστώς που επικρατεί στις περιοχές όπου είναι εγκατεστημένες οι τράπεζες διασφαλίζει αυτή τη δυνατότητα.
Βέβαια το να έχει κάποιος Ελληνας καταθέσεις σε συνάλλαγμα σημαίνει ότι θα πρέπει να συμβιβαστεί σε επιτόκια καταθέσεων σαφώς χαμηλότερα από τα ισχύοντα δραχμικά, ενώ θα πρέπει να πληρώνει επιπλέον προμήθειες για τη μετατροπή των δραχμών σε συνάλλαγμα ώστε να μπορεί να τα καταθέτει στον λογαριασμό του στην αλλοδαπή τράπεζα με την οποία θα συνεργάζεται.
Ενα άλλο σημαντικό μειονέκτημα για πολλούς αποτελεί και το ενδεχόμενο της ελλιπούς ασφάλειας που παρέχει το Δίκτυο σε τέτοιου είδους συναλλαγές.
Βέβαια μερικές από τις τράπεζες παρέχουν επιπλέον ασφάλεια πέρα από τους μυστικούς κωδικούς, μια και για να πραγματοποιήσει κάποιος συναλλαγές μέσω του Internet θα πρέπει πρώτα να εγκαταστήσει στον υπολογιστή του ένα πρόγραμμα ασφαλείας που θα του το προμηθεύσει η ίδια η τράπεζα.
Κάποιες τράπεζες έχουν καθορίσει μια μηνιαία συνδρομή για τον χρήστη των υπηρεσιών της μέσω του Internet
Πάντως η αγορά των τραπεζικών προϊόντων μέσω του Internet γνωρίζει ήδη τεράστια ανάπτυξη. Ηδη στις ΗΠΑ, όπου σχεδόν όλες οι τράπεζες προσφέρουν τις υπηρεσίες τους μέσω Internet, σύμφωνα με τα στοιχεία της Ομοσπονδιακής Τράπεζας το 1997 διεκπεραιώθηκε μέσω του Internet το 6% των συνολικών τραπεζικών συναλλαγών. Αυτό το ποσοστό σύμφωνα με μελέτη της Ομοσπονδιακής Τράπεζας των ΗΠΑ θα φθάσει το 30% ως το 2000.
Ποια είναι τα κριτήρια
* Το πρώτο βήμα που πρέπει να κάνετε είναι να βρείτε την τράπεζα η οποία θα εξυπηρετεί καλύτερα τις ανάγκες σας.
* Στο Δίκτυο μπορείτε να βρείτε όλες τις τράπεζες που παρέχουν offshore υπηρεσίες (δηλαδή για πελάτες από όλον τον κόσμο ανεξαρτήτως εθνικότητας) στην ηλεκτρονική διεύθυνση www.escapeartist.com
* Για να κοιμάστε ήσυχοι, επιλέξτε μια διεθνώς αναγνωρισμένη τράπεζα μια και στο Δίκτυο θα βρείτε αρκετές διευθύνσεις τραπεζών οι οποίες δεν έχουν ούτε ένα υποκατάστημα και οι επωνυμίες τους είναι άγνωστες στον πολύ κόσμο.
* Διαβάστε προσεκτικά τους όρους, τα δικαιώματα και τις υποχρεώσεις που απορρέουν από την πελατειακή σχέση που θα έχετε με την τράπεζα προτού κάνετε οποιαδήποτε κίνηση.
* Οι περισσότερες τράπεζες σας δίνουν την επιλογή να διαβάσετε online τις περισσότερες υπηρεσίες που προσφέρουν αλλά η καλύτερη επιλογή είναι να ζητήσετε να σας αποστείλουν με το ταχυδρομείο όλο το έντυπο υλικό των υπηρεσιών τους καθώς και τις αιτήσεις που πρέπει να συμπληρώσετε σε περίπτωση που θα θελήσετε να γίνετε πελάτης τους. Μη διστάσετε να επισκεφτείτε μέσω του υπολογιστή σας όσο περισσότερες τράπεζες μπορείτε και να ζητήσετε να σας στείλουν το ενημερωτικό υλικό που διαθέτουν. Σε λίγες ημέρες θα βρίσκονται στο σπίτι σας οι πληροφορίες που ζητήσατε και έτσι θα μπορέσετε να συγκρίνετε με την ησυχία σας το επίπεδο των υπηρεσιών που προσφέρει η καθεμία ξεχωριστά.
* Μερικές τράπεζες, όπως για παράδειγμα η ελβετική UBS, βάζουν ένα κατώτατο όριο για να ανοίξει κάποιος λογαριασμό καταθέσεων ή να εκδώσει πιστωτική κάρτα. Αυτό το όριο κυμαίνεται από 1.000 ως 10.000 δολάρια.
* Από τη στιγμή που θα αποφασίσετε να συνεργαστείτε με μια τράπεζα μέσω του Internet, θα πρέπει να γνωρίζετε ότι μαζί με τη συμπληρωμένη αίτηση που θα αποστείλετε θα πρέπει να αποστείλετε και μια βεβαίωση για το γνήσιο της υπογραφής σας. Τη βεβαίωση αυτή μπορείτε να την εκδώσετε σχετικά εύκολα από την ελληνική τράπεζα όπου θα στέλνετε τα εμβάσματα στο εξωτερικό ή από τις προξενικές αρχές στην Ελλάδα της χώρας όπου εδρεύει η τράπεζα.
* Τέλος, επιλέξτε το τραπεζικό ίδρυμα στην Ελλάδα που έχει τις χαμηλότερες προμήθειες για την αποστολή συναλλάγματος στο εξωτερικό.

ΚΑΤΑΛΟΓΟΣ ΔΙΕΥΘΥΝΣΕΩΝ www.Offshorebarclays.com
www.roualbank.com
www.citicorp.com/singapore
www.scotiabankt.com
www.ska.comwww.sbs.ch
www.ubs.com
www.lloydsbank.co.uk


ΤΟ ΒΗΜΑ, 05-04-1998 Κωδικός άρθρου: B12475E111

inetsrvng.FTP

name::
* McsEngl.inetsrvng.FTP@cptIt,
* McsEngl.conceptIt370,
* McsEngl.internet-FTP@cptIt,
* McsEngl.internet'ftp@cptIt370,
* McsEngl.file-transfer-protocol-on-INTERNET-NETWORK@cptIt,
* McsEngl.ftp@cptIt370,
* McsEngl.ftp'service@cptIt370,

DEFINITION

FTP είναι ένα πρόγραμμα στο internet με το οποίο μπορείς να μεταφέρεις αρχεία.

File transfer protocol, it is a Real time application. There are about 3.000.000 files to trunsfer free if you know how to access.
ANONYMOUS FTP is a facility offered by many machines on the Internet. This permits you to log in with the ftp program with the user name 'anonymous' or the user name 'ftp'. When prompted for a password, type your e-mail address -- it's not necessary, but it's a courtesy for those sites that like to know who is making use of their facility. Be courteous. Most ftp sites do not like people getting files from them during their working hours since they usually have other load on their systems -- avoid 9am-5pm in their time-zone.
Also bear in mind that countries are often connected by relatively low-bandwidth links, so please check local archive sites before you connect to some distant country to fetch something. If you think the item you want is popular, ask your local archive site sysadmin, who may be willing to set up a copy on the local archive.

#cptIt421.2(internet services)=cptIt67.3(internet)#

ftp'SITES#cptIt388: attPar#

ftp'HOW TO START FTP SESSION

name::
* McsEngl.ftp'HOW TO START FTP SESSION@cptIt,


 ftp "node.address"
 id(user name): anonymous/ftp
 password: e-mail address, quest

ftp'COMMANDS in an ftp session

name::
* McsEngl.ftp'COMMANDS in an ftp session@cptIt,


 ls=      list the directories.
 cd "directory"=  goes to that directory.
 dir=      list the directories.
 get "file.name"=  get the file.
 quit/close/bye=  returns to e-mail account.
 pwd= reveals the full name of the current directory
 cd=      will move a directory up.
 man ftp=    gives the manuals for ftp.
 mget *.* =    retrieve all the files.

ftp'EXTENSIONS OF COMPRESSED FILES

name::
* McsEngl.ftp'EXTENSIONS OF COMPRESSED FILES@cptIt,


#  These are the common Unix file types:
  Suffix FTP Type
  .Z bin compress
  .arc bin ARChive
  .shar ascii SHell ARchive
  .tar bin Tape ARchive
  .uu ascii uuencode/uudecode
  .zoo bin Zoo

ftp'Program

name::
* McsEngl.ftp'Program@cptIt,

ftp'protocol

name::
* McsEngl.ftp'protocol@cptIt,

ftp'SEARCHING FOR FILES

name::
* McsEngl.ftp'SEARCHING FOR FILES@cptIt,


‘#ARCHIE#cptIt396#cptIt396: attPar#

ftp'site

name::
* McsEngl.ftp'site@cptIt,
* McsEngl.conceptIt388,
* McsEngl.internet-FTP-site@cptIt,
* McsEngl.internet'ftpsite@cptIt388,
* McsEngl.ftp-address@cptIt,
* McsEngl.ftp'address@cptIt388,

DEFINITION

Το σύνολο των internet ftp sites.


DEFINITION: the contents of the file we want to gent
FILE NAME: the name of file we want to get.
DIRECTORY: where the file is located.

AN EXAMPLE OF A PROCEDURE

CONTENTS: LIBRARY RESOURCES. (hypertext style). FILE: LIBINET.DOC.

- At your host system prompt, enter: ftp hydra.uwo.ca
- When you receive the Name prompt, enter: anonymous
- When you receive the password prompt, enter your Internet address: jdoe@anywhere.edu [for example]
- At the ftp> prompt, enter: cd libsoft
- Then enter: get LIBINET.DOC
- At the next ftp> prompt, enter: binary
- Then enter: get LIBINET.EXE
- After the transfer has occurred, enter: quit

SPECIFIC
alphabetically

access.usask.ca
DEFINITION: access the HYTELNET utility.
FILE NAME: HYTELN62.ZIP.
DIRECTORY: pub/hytelnet/pc subdirectory.

coombs.anu.edu.au
DEFINITION: document, on SOCIAL SCIENCES RESOURCES ON INTERNET,
FILE NAME:
DIRECTORY: can be acquired from a sub-directory coombspapers via anonymous FTP

csn.org:
Περιέχει παρουσιάσεις, κριτικές και σχόλια για διάφορα βιβλία, από παλαιές εκδόσεις μέχρι και πολύ πρόσφατες.
LOCATION: /pub/alt.books.reviews/*

ftp.rpi.edu:
DEFINITION: That document will point you to detailed information about each of these ALEX/ARCHIE /GOPHER/HYTELNET/NETFIND/PROSPERO /VERONICA/ WAIS/WHOIS/WWW/X.500?.
FILE NAME: internet-tools
DIRECTORY: /pub/communications/internet-tools

ftp.spies.com:
Περιλαμβάνονται άρθρα και στοιχεία για Cyberspace, Hachkers, MUDs, IRC.
LOCATION: /Library/Cyber/*

ftp.sura.net:
DEFINITION: To learn the basics of e-mail on the Internet.
FILE NAME: how.to.email.guide
DIRECTORY: /pub/nic/network.service.guides

ftp.univie.ac.at:
Παλαιότερα τεύχη του περιοδικού "AI Journal" at PC Format.
LOCATION: /pc/dos/aijournal/*

nigel.msen.com:
Περιέχει ερωτήσεις και απαντήσεις για τα BBSs του internet.
LOCATION: /pub/gopher/stuff/stuff.old/inet-bbs-faq.

CONTENTS DIMENSION

DOCUMENTS SITES,
ELECTRONIC JOURNALS,
ELECTRONIC#ql:([Group 388]electronic texts)##cptIt388: attSpe# TEXTS,
HYTELNET UTILITY,
INTERNET,
 E MAIL,
 TOOLS,

LΙBRARY#ql:([Group 388]library resources)##cptIt388: attSpe# RΕSOURCES SITES
OPAC {ONLINE PUBLIC ACCESS CATALOG}/LΙBRARY CATALOG,
RESEARCH IN PROGRESS,
SOCIAL SCIENCES RESΟURCES,
SOFTWARE,
SPECIALIZED SCIENTIFIC DATABASES,

SERVICE: Documents & Software Archive

ACCESS: via INTERNET
CHARGES: none
NAME:
ORGANISATION: Computer Services Center, Aust. National Univ.
LOCATION: Canberra, Australia
ANONYMOUS FTP ADDRESS: archive.anu.edu.au
SUB-DIRECTORY: pub
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 4/5
Freshness of inf.: 5/5
COMMENTS:
*sub-dir. /library contains LIBRARIES.TXT - a current
directory of telnet addresses of 250+ on-line library
catalogues; OPAC;
*sub-dir. /AARNet contains AARNET documents;
*sub-dir. /src contains DOS & MAC software;
LAST ACCESSED: Feb 1992

SERVICE: Documents & Software Archive

ACCESS: via INTERNET
CHARGES: none
NAME:
ORGANISATION: Australian Academic and Research (Computer) Network
LOCATION: Australia
ANONYMOUS FTP ADDRESS: aarnet.edu.au
SUB-DIRECTORY: pub
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 4/5
Freshness of inf.: 5/5
COMMENTS:
*sub-dir. /resource-guide contains inf. about Internet/Aarnet on-line resources
*sub-dir. /user-guide contains guidebooks and introductory material;
LAST ACCESSED: Mar 1992

SERVICE: Documents & Software Archive +++ new entry

ACCESS: via INTERNET
CHARGES: none
NAME:
ORGANISATION: the Institute for Global Communications, which hosts EcoNet,
PeaceNet, and ConflictNet.
LOCATION: USA
ANONYMOUS FTP ADDRESS: igc.org
SUB-DIRECTORY: pub
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 2/5
Quality/depth of inf.: ?/5
Freshness of inf.: 5/5
COMMENTS:
*sub-dir. /pub contains:
econet_brochure, peacenet_brochure
IGC-conf-list-complete list of all IGC public conferences
IGC-conf-list-medium same list but shorter descriptions
IGC-conf-list-short list of conference names only
*If there are some files which you think may be of interest to the IGC
community, then feel free to drop them into the Directory 'New-stuff'
and send a message to : support@igc.org
LAST ACCESSED: Apr 1992

SERVICE: Electronic Texts Archive

ACCESS: via INTERNET
CHARGES: none
NAME: ?
ORGANISATION: ?
LOCATION: Toronto, Canada
ANONYMOUS FTP ADDRESS: relay.cs.toronto.edu
SUB-DIRECTORY: doc/books
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: ?5/5
Freshness of inf.: n/a
COMMENTS:
* contains text files of individual chapters of the Holy Bible;
directory /doc/books/Bible
* contains text files of individual chapters of the Holy Koran (Quran);
directory /doc/books/Quran
* for WAIS servers with the texts see the entry on WAIS servers database
* for another FTP archive of these 2 texts see Univ. of Maryland Info. Archive
LAST ACCESSED: Mar 1992

SERVICE: Electronic Texts Archive

ACCESS: via INTERNET
CHARGES: none
NAME: ?
ORGANISATION: ?
LOCATION: Toronto, Canada
ANONYMOUS FTP ADDRESS: relay.cs.toronto.edu
SUB-DIRECTORY: doc/Dictionaries
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: ?5/5
Freshness of inf.: n/a
COMMENTS:
* contains compressed text files of the following foreing lang. dictionaries:
(numbers in brackets indicate file size in bytes eg 57749 = 57.7Kb)
Family-Names.Z (57749)
Given-Names.Z 31136
germanl.Z 137591
words.dutch.Z 779056
words.english.Z 217119
words.french.Z 536310
words.german.Z 761528
words.italian.Z 217241
words.norwegian.Z 258162
words.swedish.Z 96169
LAST ACCESSED: Mar 1992

SERVICE: Electronic Texts Archive

ACCESS: via INTERNET
CHARGES: none
NAME: Kauri Archive
ORGANISATION: Victoria University
LOCATION: New Zealand
ANONYMOUS FTP ADDRESS: kauri.vuw.ac.nz
SUB-DIRECTORY: etext/Literaure
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: ?/5
Quality/depth of inf.: 5/5
Freshness of inf.: ?/5
COMMENTS:
* a large collection of books and documents [in the
etext format] from the world heritage list. Strong on poets
and British Victorian fiction.
LAST ACCESSED: Jan 1992

SERVICE: Electronic Texts Archive

ACCESS: via INTERNET
CHARGES: none
NAME: Network Information Center
ORGANISATION: ?Univ.of Helsinki
LOCATION: Helsinki, Finland
ANONYMOUS FTP ADDRESS: nic.funet.fi
SUB-DIRECTORY: /pub/doc/Books
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 2/5
Freshness of inf.: ?/5
COMMENTS:
* contains files with publications lists by 230
individual Science Fiction authors (from D. Adams through
I. Calvino through S.Lem to A.vanVogt.)
LAST ACCESSED: Feb 1992

SERVICE: Electronic Texts Archive

ACCESS: via INTERNET
CHARGES: none
NAME: Oxford Text Archive
ORGANISATION: Univ. of Oxford
LOCATION: Oxford, UK
ANONYMOUS FTP ADDRESS: ox.ac.uk , if access is a problem use address: 129.67.1.165
SUB-DIRECTORY: ota
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 5/5
Quality/depth of inf.: 5/5
Freshness of inf.: n/a
COMMENTS:
*contains textarchive.sgml - a current
directory of several hundreds etexts (books & dictionaries) available
from the archive
* contains other info. documents
LAST ACCESSED: Apr 1992

SERVICE: Electronic Texts Archive

ACCESS: via INTERNET
CHARGES: none
NAME: Project Gutenberg
ORGANISATION: Project Gutenberg at ?
LOCATION: Urbana, Ill., USA
ANONYMOUS FTP ADDRESS: mrcnext.cso.uiuc.edu
SUB-DIRECTORY: etext
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: ?/5
Quality/depth of inf.: 5/5
Freshness of inf.: 5/5
COMMENTS:
* fast growing collection of books and documents [in the
etext format] from the world heritage list.The aim is to
provide 10,000 books in etext format by the year 2001.
*users are invited to deposit electronic versions of
non-copyrighted books with the Project.
*the archive contains a copy of the 1990 The CIA
World Factbook (world11.txt) -approx 2Mb of quality data
* for WAIS server with the texts see the entry on WAIS servers database
LAST ACCESSED: Jan 1992

SERVICE: Genealogy Documents & Software Archive

ACCESS: via INTERNET
CHARGES: none
NAME: ?
ORGANISATION: ?
LOCATION: ?North Dakota, USA
ANONYMOUS FTP ADDRESS: vm1.nodak.edu
SUB-DIRECTORY: ROOTS-L
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 4/5
Freshness of inf.: 5/5
COMMENTS:
* contains text files and docs relevant to modern
genealogical searches & studies.
* There also is a anonymous ftp site for genealogy
related files located at hallc1.cebaf.gov.That site is
primarily for the specialist software. However some text
files, particularly large ones may be found there
compressed into ZIP files.
LAST ACCESSED: Feb 1992

SERVICE: Geography Documents & Software Archive

ACCESS: via INTERNET
CHARGES: none
NAME: ?
ORGANISATION: ?
LOCATION: Toronto, Canada
ANONYMOUS FTP ADDRESS: relay.cs.toronto.edu
SUB-DIRECTORY: doc/geography/world
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 2/5
Quality/depth of inf.: 5/5
Freshness of inf.: 5/5
COMMENTS:
* contains text files about 249 individual countries covered
by the CIA WorldFactbook; directory /doc/geography/world
* contains maps of the countries and regions of the world provided
by the CIA ; directory/doc/geography/CIA_World_Map
LAST ACCESSED: Mar 1992

SERVICE: Jewish Studies Documents & Software Archive

ACCESS: via INTERNET
CHARGES: none
NAME:
ORGANISATION: ITEX
LOCATION: Jerusalem, Israel
ANONYMOUS FTP ADDRESS: itex.jct.ac.il
SUB-DIRECTORY: pub
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: ?/5
Freshness of inf.: ?/5
COMMENTS:
*contains software and docs relevant to jewish culture
& hebrew studies (eg. calendars software, fonts etc)
LAST ACCESSED: Dec 1991

SERVICE: History Documents Archive

ACCESS: via INTERNET
CHARGES: none
NAME: ?
ORGANISATION: Mississippi State University
LOCATION: USA
ANONYMOUS FTP ADDRESS: ra.msstate.edu
SUB-DIRECTORY: history, words-l
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 3/5
Quality/depth of inf.: 4/5
Freshness of inf.: 3/5
COMMENTS:
*contains inf. about data-bases and electronic
archives of use to the historians
*contains several docs and papers (eg. on Vietnam war)
*contains info about e-journals and e-text collections.
LAST ACCESSED: Jan 1992

SERVICE: Linguistics Documents & Software Archive

ACCESS: via INTERNET
CHARGES: none
NAME: ?
ORGANISATION: University of Michigan
LOCATION: USA
ANONYMOUS FTP ADDRESS: linguistics.archive.umich.edu
SUB-DIRECTORY: linguistics
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 2/5
Quality/depth of inf.: ?/5
Freshness of inf.: ?/5
COMMENTS:
* contains a number of sub-directories:
fonts various fonts (mac, dos, next) of interest to linguists
handouts classroom problems, exams, information sheets, etc.
linguist.list back issues of LINGUIST mailing list
software programs of interest to linguists
* about the mid Feb 92 there was a possibility of the archive being
closed down
LAST ACCESSED: Feb 1992

SERVICE: Networks Documents & Software Archive

ACCESS: via INTERNET
CHARGES: none
NAME: NSF Network Service Center
ORGANISATION: National Science Foundation Network
LOCATION: USA
ANONYMOUS FTP ADDRESS: nnsc.nsf.net
SUB-DIRECTORY: several sub-directories are relevant
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 5/5
Freshness of inf.: 4/5
COMMENTS:
*sub-dir. /resource-guide contains network info docs.
*sub-dir. /internet-tour contains network info docs.
*sub-dir. /nsfnet contains network info docs.
LAST ACCESSED: Dec 1991

SERVICE: Social Sciences Research Data Bank

ACCESS: via INTERNET
CHARGES: none
NAME: Coombspapers Data Bank
ORGANISATION: Research Schools of Pacific Studies and Social Science,
Aust. Nat. Univ.
LOCATION: Canberra, Australia
ANONYMOUS FTP ADDRESS: coombs.anu.edu.au
SUB-DIRECTORY: coombspapers
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 4/5
Quality/depth of inf.: 4/5
Freshness of inf.: 4/5
COMMENTS:
* Mainly materials from Australia & Pacific Ocean region
* In Apr 1992 there vere 190+ files totalling approx 9.7 Mb of data.
* users of the Coombspapers Data Bank are invited to
deposit in the 'inboundpapers' sub-directory of the
facility electronic copies of their research papers,
directories, abstracts of theses, and other high-grade
research documents.
*The data bank acts as an Australian repository of
Buddhist (mainly Zen & Tibetan) as well as Taoist studies materials.
LAST ACCESSED: Apr 1992

SERVICE: Soviet and East European Studies Data Library

ACCESS: via INTERNET (also accessible on-line via Telnet)
CHARGES: Internet $15/hour, CompuServe $25/hr (non-profit), $40/hr (corporate)
NAME: SOVSET
ORGANISATION: Center for Strategic & International Studies (CSIS)
LOCATION: Washinton, D.C., USA
FTP ADDRESS: sovset.org (it is NOT an anonymous FTP site, registered users only)
LOGIN NAME: - as agreed with the SOVSET administrators -
LOGIN PASSWORD: - as agreed with the SOVSET administrators-
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 4/5
Quality/depth of inf.: 5/5
Freshness of inf.: 5/5
GATEWAY FACILITIES: no
COMMENTS:
Established 1984, now links more than 500 leading specialists around the world,
offers 32 computer conferences, a wide variety of holdings including many materials
not available elsewhere:
* Daily Reports of Radio Free Euroope and Radio Liberty
* Express Khronika (in English)
* SOVSET News - an electronic journal
* Commentary - an electronic column of commentaries on Soviet Politics
* PlanEcon Report - weekly summaries on the latest Sov. & East Eur. economies
* Eastern Europe Newsletter - highlights from a London biweekly publication
* Perspective - reports on foreign policy and business published by
Center fo Foreign Policy development at Brown University.
* Phonebook - a phone and address direct. for Moscow and elsewhere
* e-mail enquiries to: SUPPORT@sovset.org
* correspondence to: Sarah C. Helmstadter, Executive Director, SOVSET,
CSIS, 1800 K St. NW, Suite 400, Washington, DC USA 20006,
Tel. (202) 775-3257, Fax (202) 775-3199
LAST ACCESSED: Mar 1992

SERVICE: University of Maryland Info. Data Base Archive

name::
* McsEngl.SERVICE: University of Maryland Info. Data Base Archive@cptIt,

ACCESS: via INTERNET
CHARGES: none
NAME:
ORGANISATION: University of Maryland
LOCATION: USA
ANONYMOUS FTP ADDRESS: info.umd.edu
SUB-DIRECTORY: a number of subdirectories are relevent here
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 3/5
Quality/depth of inf.: 3/5
Freshness of inf.: ?4/5
GATEWAY FACILITIES: no
COMMENTS:
* contents: economic data - US & Int'l; ethnomusicology newsletters;
text of the US Constitution; text of the Bible, Koran and the Book of Mormon;
1990 CIA World FactBook
* allinf. is also available as an online database (see the Database entry below)
LAST ACCESSED: Feb 1992

SERVICE: US Supreme Court Rulings Archive

ACCESS: via INTERNET
CHARGES: none
NAME: Project Hermes
ORGANISATION: Case Western Reserve University
LOCATION: Cleveland, Ohio, USA
ANONYMOUS FTP ADDRESS: ftp.cwru.edu
SUB-DIRECTORY: hermes
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 5/5
Freshness of inf.: 5/5
COMMENTS:
* contains text files of complete Supreme Court Rulings since 11 May 1990
*an experimental project, may not be continued past May 1992
LAST ACCESSED: Feb 1992

BULLETIN BOARDS

SERVICE: Bulletin Board

ACCESS: via INTERNET
CHARGES: none
NAME: APA: The Electronic Agora
ORGANISATION: American Philosophical Association
LOCATION: California, USA
TELNET ADDRESS: atl.calstate.edu
LOGIN PASSWORD: apa
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 4/5
Freshness of inf.: 4/5
GATEWAY FACILITIES: no
COMMENTS:
*The bulletin board contains a long list (50+ items) of
machine-readable texts (i.e. electronic files) of
significance to philosophical research (see main menu
item [7]: Directories and computer resources)
LAST ACCESSED: Apr 1992

SERVICE: Bulletin Board

ACCESS: via INTERNET
CHARGES: none
NAME: CARL
ORGANISATION: Colorado Alliance of Research Libraries
LOCATION: Colorado, USA
TELNET ADDRESS: pac.carl.org
LOGIN PASSWORD: not needed
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 4/5
Quality/depth of inf.: 4/5
Freshness of inf.: ?/5
GATEWAY FACILITIES: yes
link to: online Grolier Acad. Amer. Encycl. (password required)
link to: online Choice Book Reviews database
link to: online Internet Resource Guide database
COMMENTS:
none
LAST ACCESSED: Jan 1992

SERVICE: Bulletin Board

ACCESS: via INTERNET
CHARGES: none
NAME:
ORGANISATION: Case Western Reserve University
LOCATION: Cleveland, Ohio, USA
TELNET ADDRESS: freenet-in-a.cwru.edu
LOGIN PASSWORD: not needed
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 4/5
Quality/depth of inf.: 4/5
Freshness of inf.: 5/5
GATEWAY FACILITIES: ?
COMMENTS:
* A number of bulletin boards of various schools and depts. is
available via a well run menu
* Also offers USA Today Headline News
LAST ACCESSED: Feb 1992

SERVICE: Bulletin Board

NETWORK: via INTERNET
CHARGES: none
NAME: CERN
ORGANISATION: European Center for Nuclear Research
LOCATION: Geneva, Switzerland
TELNET ADDRESS: info.cern.ch
LOGIN PASSWORD: not needed
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5 [with ARCHIE services it is 5/5]
Quality/depth of inf.: 4/5
Freshness of inf.: 5/5
GATEWAY FACILITIES: yes
link to: Helsinki Tech. Univ. bulletin board (mostly in Finnish)
COMMENTS:
none
* also acts as an ARCHIE data base - option [17]
* also acts as an WAIS data baseof WAIS inf. sources - option [19]
LAST ACCESSED: Apr 1992

SERVICE: Bulletin Board

ACCESS: via INTERNET
CHARGES: none
NAME: Clemson Univ. Forestry & Argricultural Network
ORGANISATION: Clemson Univ.
LOCATION: USA
TELNET ADDRESS: eureca.clemson.edu
LOGIN PASSWORD: PUBLIC
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 2/5
Freshness of inf.: ?/5
GATEWAY FACILITIES: ? none
COMMENTS:
* requires the use of function keys (= not suitable for the Mac users)
* menu-driven , to return to a higher level menu use F3 key
* inf. provided on weather, economics, plants, animals (incl. pets),
food, home & environment, family and youth, human resources.
* Inf. primarely related to the needs of Southeastern US.
LAST ACCESSED: Feb 1992

SERVICE: Bulletin Board

ACCESS: via INTERNET
CHARGES: none
NAME: History News
ORGANISATION: History & Computing, Univ. of Glasgow
LOCATION: Glasgow, UK
TELNET ADDRESS: sun.nsf.ac.uk
LOGIN PASSWORD: janet THEN uk.ac.glasgow.history.news
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 3/5
Quality/depth of inf.: 5/5
Freshness of inf.: 3/5
GATEWAY FACILITIES: no
COMMENTS:
* also deals with archeology, art history
* good coverage of software suitable for hist. research
* extensive guide (314 items) to electronic historical
data sets
LAST ACCESSED: Feb 1992

SERVICE: Bulletin Board

ACCESS: via INTERNET
CHARGES: none
NAME: HUMBUL - Humanities Bulletin
ORGANISATION: Univ. of Oxford
LOCATION: Oxford, UK
TELNET ADDRESS: sun.nsf.ac.uk
LOGIN PASSWORD: janet THEN uk.ac.humbul
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 5/5
Quality/depth of inf.: 4/5
Freshness of inf.: 5/5
GATEWAY FACILITIES: no
COMMENTS:
* requires first time-user to register on-line with the
HUMBUL
LAST ACCESSED: Feb 1992

SERVICE: Bulletin Board

ACCESS: via INTERNET
CHARGES: none
NAME: Hytelnet Server
ORGANISATION: Univ. of Saskatchewan
LOCATION: Saskatchewan, Canada
TELNET ADDRESS: herald.usask.ca
LOGIN PASSWORD: hytelnet
then select "Other telnet-accessible sites "SITES2""
then select ""FUL000"Full-Text Databases and Bibliographies"
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 4/5
Quality/depth of inf.: 3/5
Freshness of inf.: 4/5
GATEWAY FACILITIES: no
COMMENTS:
* for navigation use the arrow keys
* good register of telnet addresses (29 items) of on-line
full-text databases and bibliographies
LAST ACCESSED: Feb 1992

SERVICE: Bulletin Board

ACCESS: via INTERNET
CHARGES: none
NAME: JANET NEWS SYSTEM
ORGANISATION: Joint Academic Network
LOCATION: ?, UK
TELNET ADDRESS: sun.nsf.ac.uk
LOGIN PASSWORD: janet THEN uk.ac.janet.news THEN news
RELEVANCE TO SOC. SCIENCES (at the time of the latest version of this doc.)
Range/variety of inf.: 4/5
Quality/depth of inf.: 3/5
Freshness of inf.: 4/5
GATEWAY FACILITIES: no
COMMENTS:
none
LAST ACCESSED: Nov 1991

SERVICE: Bulletin Board

ACCESS: via INTERNET
CHARGES: none
NAME: Network Information Service
ORGANISATION: Univ. of Leicester
LOCATION: Leicester, UK
TELNET ADDRESS: sun.nsf.ac.uk
LOGIN PASSWORD: janet THEN uk.ac.le.info
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 3/5
Quality/depth of inf.: 3/5
Freshness of inf.: 4/5
GATEWAY FACILITIES: no
COMMENTS:
none
LAST ACCESSED: Nov 1991

SERVICE: Bulletin Board

ACCESS: via INTERNET
CHARGES: none
NAME: NISS
ORGANISATION: National Inst. for Software & Services
LOCATION: Bath Univ, UK
TELNET ADDRESS: sun.nsf.ac.uk
LOGIN PASSWORD: janet THEN uk.ac.niss
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 3/5
Quality/depth of inf.: 3/5
Freshness of inf.: 4/5
GATEWAY FACILITIES: no ?
COMMENTS:
none
LAST ACCESSED: Nov 1991

SERVICE: Bulletin Board

ACCESS: via INTERNET
CHARGES: none
NAME: NISSPAC
ORGANISATION: National Inst. for Software & Services
LOCATION: UK
TELNET ADDRESS: sun.nsf.ac.uk
LOGIN PASSWORD: janet THEN uk.ac.niss.pac
at the "." prompt typeLOGON NISSCAT
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 3/5
Freshness of inf.: 1/5
GATEWAY FACILITIES: no ?
COMMENTS:
* has inf. on machine readible data sets - eg. results of the 1883-1905
demographical data of electors in Norway
LAST ACCESSED: Feb 1992

SERVICE: Bulletin Board

ACCESS: via INTERNET
CHARGES: none
NAME: PENPages
ORGANISATION: Agricultural College, Penn. State Univ. & Ruthers Univ.
LOCATION: USA
TELNET ADDRESS: psupen.psu.edu.
LOGIN PASSWORD: pnotpa
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: ?/5
Freshness of inf.: 5/5
GATEWAY FACILITIES: yes
link to: MAPP, INFAN and Argricultural & Market Databases
COMMENTS:
none
LAST ACCESSED: Dec 1991

DATA BASES

SERVICE: Alcoholism Research Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: CORK - Project CORK collection on alcoholism and
substance abuse
ORGANISATION: DartmouthCollege Library Online System
LOCATION: Dartmouth, New Hampshire, USA
TELNET ADDRESS: lib.dartmouth.edu
LOGIN PASSWORD: not needed
upon login type SELECT FILE CORK services
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 2/5
Quality/depth of inf.: ?/5
Freshness of inf.: ?/5
GATEWAY FACILITIES: yes
link to: On line Shakespeare Plays (33 plays)(command SELECT FILE
SHAKESPEARE PLAYS)
link to: On line Shakespeare Sonnets (all 154)(command SELECT FILE
SHAKESPEARE SONNETS)
link to: On line Dante Project Database (command CONNECT DANTE)
link to: Dartmouth College Library system
COMMENTS:
*Users need to spend some time working out peculiarities of
this and other Dartmouth databases.
LAST ACCESSED: Feb 1992

SERVICE: Agricultural Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: Agricultural & Market Data
ORGANISATION: Agricultural College, Penn. State Univ. & Ruthers Univ.
LOCATION: USA
TELNET ADDRESS: psupen.psu.edu.
LOGIN PASSWORD: pnotpa
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 2/5
Quality/depth of inf.: 4/5
Freshness of inf.: 5/5
COMMENTS:
*Access via the PENpages Bulletin Board. Mainly US
numeric farming data.
* daily updated information
LAST ACCESSED: Dec 1991

SERVICE: Arizona State University Data Bases

ACCESS: via INTERNET
CHARGES: none
NAME:
ORGANISATION: Arizona State University
LOCATION: Colorado, USA
TELNET ADDRESS: carl.lib.asu.edu
LOGIN PASSWORD: CARL
upon login choose the required option
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 2/5
Quality/depth of inf.: 3/5
Freshness of inf.: ?/5
GATEWAY FACILITIES: yes (see comments below)
COMMENTS:
*a number of data bases are available:
incl. Arizona and Soutwest Index, Arizona Statistics, ASU Newspaper Index,
World Maps Index, Solar Energy Index, Song Index (popular), National
Indian Education Clearinghouse Resource Center Directory, University
Library holdings
LAST ACCESSED: Feb 1992

SERVICE: Book Reviews Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: Choice Book Reviews
ORGANISATION: Colorado Alliance of Research Libraries
LOCATION: Colorado, USA
TELNET ADDRESS: pac.carl.org
LOGIN PASSWORD: not needed
upon login choose option#3 THEN choose option#60
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 5/5
Quality/depth of inf.: 4/5
Freshness of inf.: 4/5
GATEWAY FACILITIES: yes
link to: online Grolier Acad. Amer. Encycl. (paswd required)
link to:online Internet Resource Guide database
link to: CARL Bulletin Board
COMMENTS:
*Users can contribute book reviews to the continuously
growing database.
LAST ACCESSED: Mar 1992

SERVICE: Canadian & North American Data Bases

ACCESS: via INTERNET
CHARGES: none
NAME:
ORGANISATION: Univ. of Saskatchewan
LOCATION: Saskatchewan, Canada
TELNET ADDRESS: sklib.usask.ca
LOGIN PASSWORD: SONIA
upon login choose appropriate option (see comments below)
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 5/5
Quality/depth of inf.: 5/5
Freshness of inf.: ?/5
GATEWAY FACILITIES: yes (see comments below)
COMMENTS:
*a number of data bases are available:
1:U of S Government Publications (In Progress)
2:Special Collections - Canadiana Pamphlets
3:Special Collections - Theses
4:University Archives
5:CIHM - Early Canadiana
6:History of Photography
7:Landmarks of Science
8:American Periodical Series - 18th Century
9:CIJE plus RIE: 1983 to Present (Education)
10:Canadian Business and Current Affairs (CBCA) - 1982 to Present
11:U of S Online Catalogue (GEAC).
LAST ACCESSED: Feb 1992

SERVICE: Dante Poetry and Commentaries Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: Project Dante
ORGANISATION: DartmouthCollege Library Online System
LOCATION: Dartmouth, New Hampshire, USA
TELNET ADDRESS: library.dartmouth.edu
LOGIN PASSWORD: not needed
upon login type CONNECT DANTE
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 5/5
Freshness of inf.: ?/5
GATEWAY FACILITIES: yes
link to: On line Shakespeare Plays (33 plays)(command SELECT FILE
SHAKESPEARE PLAYS)
link to: On line Shakespeare Sonnets (all 154)(command SELECT FILE
SHAKESPEARE SONNETS)
link to: On line Project CORK alcoholism Database (command SELECT FILE CORK)
link to: Dartmouth College Library system
COMMENTS:

SERVICE: Dictionary & Thesaurus Data Bases

ACCESS: via INTERNET
CHARGES: none
NAME: Rutgers University Info. System
ORGANISATION: Rutgers University
LOCATION: USA
TELNET ADDRESS: info.rutgers.edu
LOGIN PASSWORD: not needed
upon login choose option REFERENCE
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 5/5
Freshness of inf.: 5/5
GATEWAY FACILITIES: yes
link to: 1990 CIA World Factbook
COMMENTS:
*Three very fast data bases are available:
1. 1991 Oxford Dictionary
2. Oxford Thesaurus
3. Oxford Dictionary of Familiar and Modern Quotations
* for WAIS server with 1911 Rogets thesaurus see the entry on WAIS
servers database
LAST ACCESSED: Apr 1992

SERVICE: Family Studies Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: MAPP - National Family Database
ORGANISATION: Agricultural College, Penn. State Univ. & Ruthers Univ.
LOCATION: USA
TELNET ADDRESS: psupen.psu.edu.
LOGIN PASSWORD: pnotpa
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 2/5
Quality/depth of inf.: 4/5
Freshness of inf.: 3/5
COMMENTS:
*Access via the PENpages Bulletin Board. Full text
database. Mainly US family sociological and health data.
*Users are invited to contribute articles to the
continuously growing database.
LAST ACCESSED: Dec 1991

SERVICE: Food & Nutrition Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: INFAN - International Food and Nutrition Database
ORGANISATION: Agricultural College, Penn. State Univ. & Ruthers Univ.
LOCATION: USA
TELNET ADDRESS: psupen.psu.edu.
LOGIN PASSWORD: pnotpa
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 2/5
Quality/depth of inf.: 4/5
Freshness of inf.: ?/5
COMMENTS:
*Access via the PENpages Bulletin Board. Full text
database. Mainly US nutrition, health and food data.
*Users are invited to contribute articles to the
continuously growing database.
LAST ACCESSED: Dec 1991

SERVICE: Geographical Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: Geographic Name Server
ORGANISATION: Univ. of Michigan
LOCATION: USA
TELNET ADDRESS: martini.eecs.umich.edu 3000
LOGIN PASSWORD: [on login - type 'help' ]
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 2/5
Freshness of inf.: n/a
COMMENTS:
*The server provides basic geographic data on world-
wide geographic locations [e.g. New York, Paris etc].
*Most complete coverage is for the USA locations.
LAST ACCESSED: Dec 1991

SERVICE: Hawaian Islands Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: Hawaii Data Book (1991)
ORGANISATION: Univ. of Hawaii
LOCATION: Honolulu, Hawaii, USA
TELNET ADDRESS: starmaster.uhcc.hawaii.edu
LOGIN PASSWORD: lib
upon login choose option#3 THEN choose option#34
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 2/5
Quality/depth of inf.: 4/5
Freshness of inf.: ?/5
GATEWAY FACILITIES: yes
link to: online catalogue of Univ of Hawaii Library
link to: UNCOVER journal articles data base
link to: Hawaian/Pacific UNCOVER journal articles data base
link to: Trust Territory of Pacific data base
COMMENTS:
* mainly numeric data
LAST ACCESSED: Dec 1991

SERVICE: Hawaian Periodicals Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: Hawaian/Pacific UNCOVER journal article access
ORGANISATION: Univ. of Hawaii
LOCATION: Honolulu, Hawaii, USA
TELNET ADDRESS: starmaster.uhcc.hawaii.edu
LOGIN PASSWORD: lib
upon login choose option#3 THEN choose option#34
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 5/5
Quality/depth of inf.: 2/5
Freshness of inf.: 5/5
GATEWAY FACILITIES: yes
link to: online catalogue of Univ of Hawaii Library
link to: UNCOVER journal articles data base
link to: Hawaii Data Book (1991) data base
link to: Trust Territory of Pacific data base
COMMENTS:
none
LAST ACCESSED: Dec 1991

SERVICE: Internet Anonymous FTP Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: ARCHIE
ORGANISATION: Deakin Univ., Geelong
LOCATION: Australia
TELNET ADDRESS: archie.au
LOGIN PASSWORD: archie [on login - type 'help' ]
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 5/5
Quality/depth of inf.: 1/5
Freshness of inf.: 5/5
COMMENTS:
*A world-wide database of contents of 1030+ftp
archive sites
*The Deakin site shadows the central archie archive at
McGill Univ, Montreal, Canada "quiche.cs.mcgill.ca"
*Information is available on sites, filenames and file
contents [commands: SITE "sitename", PROG "keyword",
WHATIS "filename", when lost type HELP]
* List of current Archies sites (as on 12/Feb/92):
archie.ans.net (USA [NY])
archie.rutgers.edu (USA [NJ])
archie.sura.net (USA [MD])
archie.unl.net (USA [NE]) - password : archie1
archie.mcgill.ca (Canada)
archie.funet.fi (Finland/Mainland Europe)
archie.doc.ic.ac.uk (UK/Ireland)
archie.au (Australia/New Zealand)
sc.huji.ac.il (Israel)
* NOTE since Feb 92 archie.au dbase contains LESS information
than archie.mcgill.ca (Canada) and attempts to notify archie.au
about the problem are consistently ignored.
* Archie services also available via the CERN Bulletin Board
LAST ACCESSED: Apr 1992

SERVICE: Internet Resource Guide Database

ACCESS: via INTERNET
CHARGES: none
NAME: CARL
ORGANISATION: Colorado Alliance of Research Libraries
LOCATION: Colorado, USA
TELNET ADDRESS: pac.carl.org
LOGIN PASSWORD: not needed
upon login choose option#3 THEN choose option#65
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 4/5
Quality/depth of inf.: 4/5
Freshness of inf.: 2/5
GATEWAY FACILITIES: yes
link to: online Grolier Acad. Amer. Encycl. (password required)
link to: online Choice Book Reviews database
link to: CARL Bulletin Board
COMMENTS:
* uses 1990 edition of the IRG document
* keyword search
LAST ACCESSED: Feb 1992

SERVICE: Periodicals Contents Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: Meeman Environmental Journalism Archive
ORGANISATION: University of Michigan
LOCATION: USA
TELNET ADDRESS: hermes.merit.edu
LOGIN PASSWORD: Host: MIRLYN, Terminal: VT100
upon login choose option MEEM
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 2/5
Freshness of inf.: ?2/5
GATEWAY FACILITIES: no
COMMENTS:
*Covers 1000 articles from US journals
*Covers inf. since late 1980s; new items kept being added
* Specialist collection on environmental matters
* Bibliographical data (located by title, authr, subject) only
LAST ACCESSED: Feb 1992

SERVICE: Periodicals Contents Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: UNCOVER - Journal Article Access
ORGANISATION: Univ. of Hawaii
LOCATION: Honolulu, Hawaii, USA
TELNET ADDRESS: starmaster.uhcc.hawaii.edu
LOGIN PASSWORD: lib
upon login choose option#6
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 5/5
Quality/depth of inf.: 3/5
Freshness of inf.: 5/5
GATEWAY FACILITIES: yes
link to: online catalogue of Univ of Hawaii Library
link to: Hawaian/Pacific UNCOVER journal articles data base
link to: Hawaii Data Book (1991) data base
COMMENTS:
*Covers over 2 million articles in 10,000 journals.
*Article contents delivery service (via fax) can be
paidfor with a credit card.
LAST ACCESSED: Apr 1992

SERVICE: Periodicals Contents Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: Wilson Periodical Database
ORGANISATION: Texas A&M University
LOCATION: Texas, USA
TELNET ADDRESS: venus.tamu.edu
LOGIN PASSWORD: vtam
upon login choose option NOTIS
then select any of the 3 library collections
then type WILSON
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 5/5
Quality/depth of inf.: 3/5
Freshness of inf.: 5/5
GATEWAY FACILITIES: yes
link to: online catalogues of Texas A&M University Library
COMMENTS:
*Covers articles printed until Dec 1991
* Very strong on humanities and social sciences
* User friendly
LAST ACCESSED: Feb 1992

SERVICE: Soviet and East European Studies Data Library

ACCESS: via INTERNET (also accessible via ftp)
CHARGES: Internet $15/hour, CompuServe $25/hr (non-profit), $40/hr (corporate)
NAME: SOVSET
ORGANISATION: Center for Strategic & International Studies (CSIS)
LOCATION: Washinton, D.C., USA
TELNET ADDRESS: sovset.org (registered users only)
LOGIN NAME: - as agreed with the SOVSET administrators -
LOGIN PASSWORD: - as agreed with the SOVSET administrators-
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 4/5
Quality/depth of inf.: 5/5
Freshness of inf.: 5/5
GATEWAY FACILITIES: no
COMMENTS:
Established 1984, now links more than 500 leading specialists around the world,
offers 32 computer conferences, a wide variety of holdings including many materials
not available elsewhere:
* Daily Reports of Radio Free Euroope and Radio Liberty
* Express Khronika (in English)
* SOVSET News - an electronic journal
* Commentary - an electronic column of commentaries on Soviet Politics
* PlanEcon Report - weekly summaries on the latest Sov. & East Eur. economies
* Eastern Europe Newsletter - highlights from a London biweekly publication
* Perspective - reports on foreign policy and business published by
Center fo Foreign Policy development at Brown University.
* Phonebook - a phone and address direct. for Moscow and elsewhere
* e-mail enquiries to SUPPORT@sovset.org
* correspondence to: Sarah C. Helmstadter, Executive Director, SOVSET,
CSIS, 1800 K St. NW, Suite 400, Washington, DC USA 20006,
Tel. (202) 775-3257, Fax (202) 775-3199
LAST ACCESSED: Mar 1992

SERVICE: University of Maryland Info. Data Base

name::
* McsEngl.SERVICE: University of Maryland Info. Data Base@cptIt,

ACCESS: via INTERNET
CHARGES: none
NAME:
ORGANISATION: University of Maryland
LOCATION: USA
TELNET ADDRESS: info.umd.edu
LOGIN PASSWORD: info
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 3/5
Quality/depth of inf.: 3/5
Freshness of inf.: ?4/5
GATEWAY FACILITIES: no
COMMENTS:
* very convenient screen & menu oriented interface
* contains EconData:several hundred thousand economic time series that
include various US national accounts, labor information, price indices, current
business indicators and industrial production, information over Maryland state
and regions, and intern'l data.
* also contains: ethnomusicology newsletters; text of the US Constitution; text
of the Bible, Koran and the Book of Mormon; 1990 CIA World FactBook
* all inf. is also available via anonymous FTP (see entry on Archives above)
LAST ACCESSED: Feb 1992

SERVICE: US Pacific Territories Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: Trust Territory of Pacific Database
ORGANISATION: Univ. of Hawaii
LOCATION: Honolulu, Hawaii, USA
TELNET ADDRESS: starmaster.uhcc.hawaii.edu
LOGIN PASSWORD: lib
upon login choose option#3 THEN choose option#36
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 3/5
Quality/depth of inf.: 3/5
Freshness of inf.: ?/5
GATEWAY FACILITIES: yes
link to: online catalogue of Univ of Hawaii Library
link to: UNCOVER journal articles data base
link to: Hawaian/Pacific UNCOVER journal articles data base
link to: Hawaii Data Book (1991) data base
COMMENTS:
*catalogue of archival materials on Micronesian US
Trust Territory
LAST ACCESSED: Dec 1991

SERVICE: WAIS Servers Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: directory-of-servers
ORGANISATION: TMC
LOCATION: USA
TELNET ADDRESS: n/a, access via a public domain WAIStation software
LOGIN PASSWORD: not needed
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 3/5
Quality/depth of inf.: 5/5
Freshness of inf.: 4/5
GATEWAY FACILITIES: n/a
COMMENTS:
* very fast data base with inf. about aprox 200+ WAIS servers (databases)
*The directory-of-servers serves source source structures.Search it to
find new sources which you can then download, save, and search from WAIStation!
* currently awailable only to Macintosh users
* the number of sources (servers) grows approx 2-3/week
* Limitation:single query generates no more than 45 items of information
* Servers uncovered via the directory-of-servers are searcheable through
keywords and they provide user with the a full-text document in which given
keyword is embeded.
LAST ACCESSED: Apr 1992

SERVICE: World Economics Data Base +++ new entry

ACCESS: via INTERNET
CHARGES: none - NOTE: access restricted to the staff and students of the ANU
NAME: STARS - Statistical Analysis and Retrieval System
ORGANISATION: Australian National University
LOCATION: Canberra, Australia
TELNET ADDRESS: iedbserver (for logins within the ANU network)
LOGIN PASSWORD: [available from the ANU CSC Help desk (ext 5678) on application]
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 2/5
Quality/depth of inf.: 5/5
Freshness of inf.: ?4/5
GATEWAY FACILITIES: no
COMMENTS:
* contains IMF data, GFS data on intl statistics of govt finance since 1970
* contains IMF data, IFS data on intl and domestic finance (147 countries)
* contains IMF data, BOP data on balance of payment (141 countries)
* contains World Bank World Tables for
1950, 55, 1960-1989 for approx 160 countries and aggregates
* contains UNIDO Industrial Statistics (approx 85 countries) since 1961
* contains UN International Trade data (approx 10 countries) since 1965
* contains FAO Data (approx 20 countries) about 900 commodities since 1961
* The inf. is also available from the data base via FTP (password required)
LAST ACCESSED: Apr 1992

SERVICE: World Factbook Data Base

ACCESS: via INTERNET
CHARGES: none
NAME: Rutgers University Info. System
ORGANISATION: Rutgers University
LOCATION: USA
TELNET ADDRESS: info.rutgers.edu
LOGIN PASSWORD: not needed
upon login choose option REFERENCE
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 3/5
Freshness of inf.: 4/5
GATEWAY FACILITIES: yes
link to: 1991 Oxford Dictionary
link to: Oxford Thesaurus
link to: Oxford Dictionary of Familiar and Modern Quotations
COMMENTS:

SERVICE: Online Library Catalogues

ACCESS: via INTERNET
CHARGES: none
NAME:
ORGANISATION: 300+ universities and colleges
LOCATION: Australia, NZ, USA, UK, Sweden, Germany
TELNET ADDRESS: currentdirectory of telnet addresses, LIBRARIES.TXT,
is available via anonymous ftp from:
* vaxb.acs.unt.edu [North American users] - Jan 92 edition
* nic.swich.ch [European users] -Jan 92 edition
(in database/library/UNT-library-guide area)
* coombs.anu.edu.au [Australian & NZ users] -Jan 92 edition
(in coombspapers/foreign/soc-science-tools area)
LOGIN PASSWORD: passwords are listed in the LIBRARIES.TXT document.
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 5/5
Quality/depth of inf.: 5/5
Freshness of inf.: 5/5
GATEWAY FACILITIES: in some cases: (eg. Univ of Hawaii)
COMMENTS:
* the list of on-line library catalogues accessible via
the INTERNET grows approx by 2-3 sites/week
* for WAIS servers with the Library information see the entry
on WAIS servers database
LAST ACCESSED: Feb 1992

SERVICE: Online Library Catalogues

ACCESS: via INTERNET
CHARGES: YES - see comments below
NAME: Australian Bibliographical Network
ORGANISATION: National Library of Australia
LOCATION: Canberra, Australia
TELNET ADDRESS: abn.nla.gov.au
LOGIN PASSWORD: You have to have a username, password and an account code
to access the catalogue, and you will be billed for usage
by ABN. Your local library typically has such an access
code.
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 5/5
Quality/depth of inf.: 5/5
Freshness of inf.: 5/5
GATEWAY FACILITIES: ?
COMMENTS:

SERVICE: Online Periodicals Library Catalogues

ACCESS: via INTERNET
CHARGES: none
COMMENTS:
*see UNCOVER & WILSON Periodicals Contents Data Base entries
in the Data Base section of this guide
* for WAIS servers with the Periodicals information see the entry
on WAIS servers database
LAST ACCESSED: Feb 1992

PERIODICALS

SERVICE: Electronic Journal/Newsletter

ACCESS: via INTERNET
CHARGES: none
NAME: REACH - Research & Educ. Appl of Computers in Humanities
ORGANISATION: Univ. of California
LOCATION: St. Barbara, USA
ANONYMOUS FTP ADDRESS:
* ucsbuxa.ucsb.edu [North American users]
* coombs.anu.edu.au [Australian & NZ users]
SUB-DIRECTORY:
* hcf [North American users]
* coombspapers/otherwork [Australian & NZ users]
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 5/5
Quality/depth of inf.: 4/5
Freshness of inf.: 5/5
COMMENTS:
*Between 6 and 4 issues a year, text format.
*Users are invited to contribute articles to the
Journal.
LAST ACCESSED: Apr 1992

SERVICE: Electronic Journal/Newsletter

ACCESS: via INTERNET
CHARGES: none
NAME: MeckJournal (ISSN 1058-692X)
ORGANISATION: Meckler Publishing Corporation
LOCATION: Westport, CT, USA
TELNET ADDRESS: nicol.jvnc.net
LOGIN PASSWORD: nicol
SUB-DIRECTORY: MC(2): Electronic Publication Service
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 1/5
Quality/depth of inf.: 4/5
Freshness of inf.: 5/5
COMMENTS:
*On-line publications dealing with virtual libraries, network services,
information broking, knowledge navigation, resources-sharing.
*MeckJournals (electronic monthly publication) as of Mar 92:
MeckJournal Volume I, Issue 1
MeckJournal Volume I, Issue 2
MeckJournal Volume I, Issue 3
MeckJournal Volume II, Issue 1 (Jan. 1992)
MeckJournal Volume II, Issue 2
(these issues are also available via anonymous ftp from "ftp.jvnc.net"
in the nicol/meckler subdirectory)
*Also available on-line:
Meckler Info. Tech. Pub.: Complete Catalog & order form
Table of Contents: Meckler Periodicals
CD-ROM Librarian Index: 1986 - 1990
Computers in Libraries Index: 1985 - 1990
LAST ACCESSED: Mar 1992

SERVICE: Electronic Journal/Newsletter

ACCESS: via INTERNET (accessible via telnet and ftp)
CHARGES: Internet $15/hour, CompuServe $25/hr (non-profit), $40/hr (corporate)
NAME: SOVSET News
ORGANISATION: Center for Strategic & International Studies (CSIS)
LOCATION: Washinton, D.C., USA
TELNET/FTP ADDRESS: sovset.org (registered users only)
LOGIN NAME: - as agreed with the SOVSET administrators -
LOGIN PASSWORD: - as agreed with the SOVSET administrators-
RELEVANCE TO SOC. SCIENCES (at the time of the latest access to this service)
Range/variety of inf.: 4/5
Quality/depth of inf.: 5/5
Freshness of inf.: 5/5
GATEWAY FACILITIES: no
COMMENTS:
for details see entries in the archives and/or databases sections above
* e-mail enquiries to SUPPORT@sovset.org
* correspondence to: Sarah C. Helmstadter, Executive Director, SOVSET,
CSIS, 1800 K St. NW, Suite 400, Washington, DC USA 20006,
Tel. (202) 775-3257, Fax (202) 775-3199
LAST ACCESSED: Mar 1992

ftp'TRANSFER of BINARY FILES

name::
* McsEngl.ftp'TRANSFER of BINARY FILES@cptIt,

When retrieving non-text files, you must use binary mode, otherwise the file gets messed up. To do this, use the 'binary' command. (It's safe to set this for text files if the other end is a Unix system, since Unix doesn't differentiate between text and binary file representation. If the site at the other end is non-Unix, you may need to use some other mode -- see the documents for that site and for ftp)

ftp'FTP-VIA-EMAIL

name::
* McsEngl.ftp'FTP-VIA-EMAIL@cptIt,

Those without FTP access should send e-mail to mail-server@rtfm.mit.edu
with "send usenet/news.answers/finding-sources" in the body to find out
how to do FTP by e-mail.

inetsrvng.HOSTING

_CREATED: {2014-02-16}

name::
* McsEngl.inetsrvng.HOSTING@cptIt,
* McsEngl.internet-hosting-service@cptIt, {2014-02-16}

_DESCRIPTION:
An Internet hosting service is a service that runs Internet servers, allowing organizations and individuals to serve content to the Internet. There are various levels of service and various kinds of services offered.
A common kind of hosting is web hosting. Most hosting providers offer a combination of services; e-mail hosting, for example. DNS hosting service is usually bundled with domain name registration.
Generic, yet rather powerful, kinds of Internet hosting provide a server where the clients can run anything they want (including web servers and other servers) and have Internet connections with good upstream bandwidth.
[http://en.wikipedia.org/wiki/Internet_hosting_service]

bandwidth.upstream

name::
* McsEngl.bandwidth.upstream@cptIt,

cost

SPECIFIC

_SPECIFIC:
* DNS-hosting##
* email-hosting##
* file-hosting##
* fell-featured
* game-server##
* web-hosting##
* wiki-farm##

DEDICATED-HOSTING-SERVICE

name::
* McsEngl.dedicated-hosting-service@cptIt,

_DESCRIPTION:
Dedicated hosting service, also called managed hosting service, where the hosting service provider owns and manages the machine, leasing full control to the client. Management of the server can include monitoring to ensure the server continues to work effectively, backup services, installation of security patches and various levels of technical support.
[http://en.wikipedia.org/wiki/Internet_hosting_service]

VPS

_CREATED: {2014-02-16}

name::
* McsEngl.virtual-private-server@cptIt,
* McsEngl.VPS@cptIt,

_DESCRIPTION:
A virtual private server (VPS) is a virtual machine sold as a service by an Internet hosting service.

A VPS runs its own copy of an operating system, and customers have superuser-level access to that operating system instance, so can install almost any software that runs on that OS. For many purposes they are functionally equivalent to a dedicated physical server, and being software defined are able to be much more easily created and configured. They are priced much lower than an equivalent physical server, but as they share the underlying physical hardware with other VPSs, the performance may be less, and may depend on the workload of other instances on the same hardware node.
[http://en.wikipedia.org/wiki/Virtual_private_server]

inetsrvng.HUMAN-COMMUNICATION

name::
* McsEngl.inetsrvng.HUMAN-COMMUNICATION@cptIt,

_DESCRIPTION:
The internet has been a powerful driver of collaboration for two reasons. Firstly, it allows people
to communicate in a peer–to–peer way (indeed, this is a defining feature of the internet).
[http://www.nesta.org.uk/sites/default/files/making_sense_of_the_uk_collaborative_economy_14.pdf]

_SPECIFIC:
* chat
* email##
* mailgroup##

inetsrvng'SOCIAL-NETWORKING

name::
* McsEngl.inetsrvng'SOCIAL-NETWORKING@cptIt,

DEFINITION

Internet Relay Chat (IRC) is a form of real-time Internet text messaging (chat) or synchronous conferencing.[1] It is mainly designed for group communication in discussion forums, called channels,[2] but also allows one-to-one communication via private message[3] as well as chat and data transfer,[4] including file sharing.[5]
IRC was created in 1988. Client software is now available for every major operating system that supports Internet access.[6] As of April 2011, the top 100 IRC networks served more than half a million users at a time,[7] with hundreds of thousands of channels[7] operating on a total of roughly 1,500 servers[7] out of roughly 3,200 servers worldwide.[8]
[http://en.wikipedia.org/wiki/IRC]

Αναπτύχθηκε το 1988 στη Φινλανδία.

Τα ΘΕΜΑΤΑ προς συζήτηση λέγονται channels.

ΕΝΤΟΛΗ ΚΛΙΣΗΣ:
IRC <nickname>
join <channel>

irc'Address

name::
* McsEngl.irc'Address@cptIt,

* http://www.irchelp.org/irchelp/irctutorial.html

irc'Channel

name::
* McsEngl.irc'Channel@cptIt,

The basic means of communicating to a group of users in an established IRC session is through a channel.[29] Channels on a network can be displayed using the IRC command LIST[30] that lists all currently available channels on that particular network.

Users can join to a channel using the JOIN command,[31] in most clients available as /join#channelname. Messages sent to the joined channels are then relayed to all other users.[29]

Channels that are available across an entire IRC network are prepended with a '#', while those local to a server use '&'.[32] Other non-standard and less common channel types include '+' channels—'modeless' channels without operators —[33] and '!' channels, a form of timestamped channel on normally non-timestamped networks.[34]
[http://en.wikipedia.org/wiki/IRC]

irc'Command

name::
* McsEngl.irc'Command@cptIt,

_ADDRESS.WPG:
* http://en.wikipedia.org/wiki/List_of_Internet_Relay_Chat_commands

_Freenode:
ACCEPT
ADMIN
AWAY
CHALLENGE
CMODE
CNOTICE
CPRIVMSG
CREDITS
ERROR
HELP
INDEX
INFO
INVITE
ISON
JOIN
KICK
KNOCK
LINKS
LIST
LUSERS
MAP
MOTD
NAMES
NICK
NOTICE
OPER
PART
PASS
PING
PONG
PRIVMSG
QUIT
STATS
TIME
TOPIC
TRACE
UMODE
USER
USERHOST
USERS
VERSION
WHO
WHOIS
WHOWAS

irc'JOIN:
/JOIN#channelname

Changes your current channel to the channel specified.  If the channel does not exist already, it will be created and you will be in charge of the new channel and be a channel operator or "op" - more on that later.

/JOIN#new2irc
*** YourNick (foo@hot.school.edu) has joined channel#new2irc
*** Topic for#new2irc: New users welcome! Questions answered with a smile! ;)) RC
*** Topic for#new2irc set by Otiose on Sun Aug 16 10:28:06 1998
*** Users on#new2irc: YourNick FunGuy @pixE @MsingLnk @^Chipster
[rest of list truncated]
When you join a channel, everything that everybody says is preceded by their nicknames so others can tell who is saying what. For some IRC programs, it doesn't show your own nickname, but don't worry, other people still see it!

You type:
hello world!
but everybody else sees:
<YourNick> hello world!
[http://www.irchelp.org/irchelp/irctutorial.html]

irc'LEAVE:
/LEAVE [#channel_name]
Leaves the specified channel, or if no channel is specified, leaves the current channel.
[http://www.irchelp.org/irchelp/irctutorial.html]

irc'Private-conversation

name::
* McsEngl.irc'Private-conversation@cptIt,

irc'MSG:
/MSG nickname message

Use the /MSG command to send someone a message that only that person can read. Say you are "YourNick" and you want to talk to your friend "buddy".
/MSG buddy hello, how are you?

On your screen, you would see:
-> *buddy* Hello, how are you?

On buddy's screen, if he is using ircII he sees:
*YourNick* Hello, how are you?

To answer such a message using ircII, buddy would type:
/MSG YourNick Fine, thanks!

If buddy is using mIRC, he will instead get a new "query" window dedicated to this private conversation with you. Everything you /MSG him goes to that window. As soon as he responds to you in that window, if you are also using mIRC you will likewise also get a "query" window.
[http://www.irchelp.org/irchelp/irctutorial.html]

irc.SPECIFIC

name::
* McsEngl.irc.SPECIFIC@cptIt,

_SPECIFIC:#ql:_GENERIC cptIt584#

freenode

_ADDRESS.WPG:
* http://freenode.net//
* http://webchat.freenode.net//

_DESCRIPTION:
You've reached freenode, a service of Peer-Directed Projects Center (PDPC). freenode provides discussion facilities for the Free and Open Source Software communities, for not-for-profit organizations and for related communities and organizations. In 1998, the network had about 200 users and less than 20 channels. Ten years down the line the network currently peaks at just over 70,000 users, freenode provides facilities to a variety of groups and organizations.
[http://freenode.net/]

/cs help:
to ChanServ help

/help,

/ms help:
to MemoServ available commands

/msg ChanServ help commands:
to list the commands

/msg ChanServ REGISTER#atheme:
to register the "atheme" channel

/nick:
to change your Nick name,

/ns help:
to NickServ

mIRC

_DESCRIPTION:
mIRC is an Internet Relay Chat (IRC) client for Microsoft Windows, created in 1995 and developed by Khaled Mardam-Bey. Although it is a fully functional chat utility, its integrated scripting language makes it extensible and versatile.

mIRC has been downloaded over 30 million times from CNET's Download.com service.[3] Nielsen/NetRatings also ranked mIRC among the top ten most popular Internet applications in 2003.[4]

It is unknown if the "m" in mIRC stands for anything (the author's personal FAQ explains that "it quite possibly stands for 'moo', or perhaps even MU").[2]
[http://en.wikipedia.org/wiki/MIRC]

inetsrvng.MCI-MAIL

name::
* McsEngl.inetsrvng.MCI-MAIL@cptIt,

Οι χρήστες του internet μπορούν να έχουν τώρα τις αυξημένες δυνατότητες διαχείρισης μηνυμάτων του MCI MAIL.
[TELECOM, IOYN. 1994, 4]

inetsrvng.OPAC

name::
* McsEngl.inetsrvng.OPAC@cptIt,
* McsEngl.conceptIt72,
* McsEngl.internet-OPAC@cptIt,
* McsEngl.internet'opac@cptIt72,
* McsEngl.internet-online-public-access-catalog@cptIt,

DEFINITION

Το 'σύνολο' των opac of internet.

OPAC -- Online Public Access Catalog, a term used to describe any type of computerized library catalog.

#cptIt421.2(internet services)=cptIt67.3(internet)#

ONLINE SYSTEMS that access opac

ΧΡΗΣΙΜΟΠΟΙΟΥΜΕΝΑ ΗΛΕΚΤΡΟΝΙΚΑ ΣΥΣΤΗΜΑΤΑ ΑΝΑΖΗΤΗΣΗΣ ΣΤΟΥΣ ΟΝΛΙΝΕ ΚΑΤΑΛΟΓΟΥΣ.
DRA {DATA RESEARCH ASSOCIATES}
DYNIX,
GEAC
INNOVATIVE INTERFACES,
NOTIS,
VTLS,
HOME GROWN SYSTEMS,

SUBSET

ΤΟ INTERNET ΕΧΕΙ 100 ΠΕΡΙΠΟΥ ΤΕΤΟΙΟΥΣ ΚΑΤΑΛΟΓΟΥΣ.
CARL, Colorando alliance research library.
DIALOG.
EPIC of OCLC.
MEDLINE.
MELVYL, universtity of california.
RLIN.

UK INTERNET OPAC

TELNET sun.nsf.ac.uk or 128.86.8.7

At the login prompt, enter janet.

Select desired catalog and enter line beginning UK.AC.

Aberdeen University UK.AC.ABERDEEN.LIBRARY
Aston University UK.AC.ASTON.GEAC
Bangor University UK.AC.BANGOR.LIBRARY
Bath University UK.AC.BATH.LIBRARY
Birmingham University UK.AC.BIRMINGHAM.LIBRARY
Bristol University UK.AC.BRISTOL.LIB
British Library UK.BL.BLAISE [subscription only]
Brunel University UK.AC.BRUNEL.LIBRARY
Cambridge UK.AC.CAMBRIDGE.UNIVERSITY-LIBRARY.
City of London PolyTech UK.AC.CITY-POLY.TOWER-VAX
Cranfield Institute UK.AC.CRANFIELD.LIBRARY
Dundee College of Tech UK.AC.DUNDEE-TECH.LIBRARY
Dundee University UK.AC.DUND.LIBB
Durham University UK.AC.DURHAM.LIBRARY
East Anglia UK.AC.EAST-ANGLIA.COMPUTING-CENTRE.INFO
Edinburgh University UK.AC.EDINBURGH.GEAC

Glasgow University UK.AC.GLASGOW.LIBRARY
Heriot-Watt Univ UK.AC.HERIOT-WATT.LIBRARY
Hull University UK.AC.HULL.LI.GEAC
Kent University UK.AC.UKC.IRIS
Lancaster University UK.AC.LANCASTER.LIBRARY
Leeds University UK.AC.LEEDS.LIB
Leeds (Medical) UK.AC.LEEDS.LIBCAT
Leicester Poly UK.AC.LEICESTER.LIBRARY
Liverpool University UK.AC.LIVERPOOL.LIBRARY
London Univ (Imperial) UK.AC.IMPERIAL.LIB
London Univ (Kings) UK.AC.KCL.LIB
London Univ (Q Mary) UK.AC.QMC.LIB
Loughborough Univ UK.AC.LOUGHBOROUGH.LIBRARY
Nottingham University UK.AC.NOTTINGHAM.LIBRARY
Queens Univ - Belfast UK.AC.QUEENS-BELFAST.LIBRARY
Rutherford Appleton Lab UK.AC.RUTHERFORD.IBM-B
St Andrews Univ UK.AC.ST-ANDREWS.LIB
Salford Univ UK.AC.SALFORD.SAISO
Sheffield Univ UK.AC.SHEFFIELD.LIBRARY
Stirling UK.AC.STIRLING.LIBRARY
Strathclyde Univ UK.AC.STRATHCLYDE.LIBRARY
Surrey UK.AC.SURREY.SYSI

inetsrvng.SEARCHING

name::
* McsEngl.inetsrvng.SEARCHING@cptIt,

_

_SPECIFIC:
ΑΝΑΖΗΤΗΣΕΙΣ ΠΛΗΡΟΦΟΡΙΩΝ
===
ARCHIE#cptIt396# (finds location of files),
FINGER#cptIt27# (finds register users)
GOPHER#cptIt403# (hypertext client/server quering system)
VERONICA#cptIt406# (information on gopher servers)
WWW#cptIt19# (hypermedia client/server quering system)

intsrvng.searching.SEARCH-ENGINE

name::
* McsEngl.intsrvng.searching.SEARCH-ENGINE@cptIt,
* McsEngl.search-engine@cptIt,

_ADDRESS.WPG:
* {2018-03-05} Christian-Stewart, I Stopped Using Google As My Search Engine, Here’s Why…
https://medium.com/searchencrypt/i-stopped-using-google-as-my-search-engine-heres-why-7a3a1b4fef81

inetsrvng.searching.ARCHIE

name::
* McsEngl.inetsrvng.searching.ARCHIE@cptIt,
* McsEngl.conceptIt396,
* McsEngl.internet-ARCHIE@cptIt,
* McsEngl.internet'archie@cptIt396,

DEFINITION

ARCHIE is a world-wide data-base with information about over 2 million FILES kept by 1000+ anonymous FTP sites. There are several Archie sites in the world, each mirroring the contents of its siblings (for details see the entry on the ARCHIE data-base)

O χρήστης ζητά απο σέρβερ υπηρεσία αρκι, με κλειδί όνομα αρχείου, και αυτός του δίνει μια λίστα απο μηχανήματα που το περιέχουν σε πιο κατάλογο και πότε ενημερώθηκε τελευταία.
[TELECOM (CGO), APR 1994, 47]

#cptIt421.2(internet services)=cptIt67.3(internet)#

ARCHIE ACCESS

To access archie interactively, telnet to one of the existing servers. They include:
 archie.ans.net (New York, USA)
 archie.rutgers.edu (New Jersey, USA)
 archie.sura.net (Maryland, USA)
 archie.unl.edu (Nebraska, USA)
 archie.mcgill.ca (the first Archie server, in Canada)
 archie.funet.fi (Finland)
 archie.au (Australia)
 archie.doc.ic.ac.uk (Great Britain)
COMMANDS:
 HELP
 PROG "file'name": gives the location of the file.


Using ARCHIE databases

To establish interactive connection with a given ARCHIE site (always try one which is nearest to you on the network) type command 'telnet' followed by the target computer's address:

telnet "archie's internet address" eg. telnet archie.au

Then as a log-in password provide the word 'archie'

To set display on your screen to one (1) page at a time - type command 'set pager'

To find information on a given topic, eg. environment type command 'prog' followed by the keyword
in question:
prog "keyword" eg. prog environment

As an outcome of this operation you will receive a list of all names of computer files,
together with anonymous ftp addresses of their host computers. This information will
enable to visit (via ftp procedure) any site of your interest and get a copy of a desired file.

To find information on a given ftp site, say an ftp archive in UK called 'src.doc.ic.ac.uk', type command 'site' followed by the keyword in question:
site "keyword" eg. site src.doc.ic.ac.uk

To find more about ARCHIE's abilities - type command 'help'

To quit running ARCHIE program and thus to return to your machine - type command 'bye'

ARCHIE

Σε αυτό το μήνυμα θα ασχοληθούμε με το πως να βρίσκουμε κάποιο αρχείο
το οποίο μας ενδιαφέρει. (Εννοείται οτι ξέρουμε περίπου τι ψάχνουμε).
Δηλαδή, υποθέτουμε οτι θέλουμε να βρούμε ενα αρχείο με το όνομα
SCANV109.ZIP. Θα πρέπει λοιπόν να χρησιμοποιήσουμε τον archie
(Database του δικτύου) για να βρούμε σε ποιό Host υπάρχει αυτό το
πρόγραμμα. Υπάρχουν πολλές μορφές αυτής της Database, και σε πολλά
επίπεδα. Δηλαδή: υποθέτουμε οτι υπάρχει μιά database στην ελλάδα η
οποία περιέχει πολλές πληροφορίες για αρχεία. Αυτό όμως δεν μας
εξυπηρετεί παρά μόνο όταν θέλουμε να βρούμε κάποιο αρχείο το οποίο
είναι δημοφιλές και πολύ εύκολο να βρεθεί, για τον απλούστατο λόγο
οτι η database αυτή δεν ενημερώνεται πολύ συχνά. (Οταν λέμε πολύ
συχνά εννοούμε ανα ώρα ή και σε ακόμα μικρότερο χρονικό διάστημα).
Γι αυτό λοιπόν θα πρέπει να ανατρέξουμε σε κάποια άλλη database του
εξωτερικού, και υψηλώτερου επιπέδου φυσικά, για να έχουμε σε πολύ
μεγαλύτερο βαθμό ακριβέστερες και όσο το δυνατό νεώτερες πληροφορίες.
Για να μπορέσουμε να συνδεθούμε λοιπόν με μια database του εξωτερικού
θα χρειαστούμε τη βοήθεια της εντολής telnet, για την οποία είχαμε
μιλήσει σε προηγούμενο μήνυμα. Δίνουμε απο το unix
telnet archie.funet.fi
και μόλις συνδεθούμε με το host αυτό, στο login δίνουμε για username
το όνομα archie.
Είμαστε τώρα συνδεδεμένοι με μια απο τις μεγαλύτερες databases.
Μπορούμε ανα πάσα στιγμή να δώσουμε την εντολή help για να δούμε τις
διαθέσιμες εντολές.
Η πιό χρήσιμη απο αυτές είναι η εντολή prog. Με αυτή την εντολή
μπορούμε να ψάξουμε για ένα αρχείο (όπως αυτός είναι ο πρωταρχικός
μας σκοπός).
Για να αρχίσει το ψάξιμο για το αρχείο που θέλουμε θα πρέπει να
δώσουμε prog SCANV109.ZIP και στη συνέχεια θα περιμένουμε λίγη ώρα
για να πάρουμε τα αποτελέσματα της έρευνάς μας. Αυτό είναι αναγκαίο
κακό, επειδή τα περιεχόμενα της database αυτής είναι τεράστια, καθώς
και για τον λόγο οτι δεν είμαστε οι μόνοι χρήστες που χρησιμοποιούν
την database. Στη συνέχεια, παίρνουμε τα αποτελέσματα της έρευνάς μας
σε μορφή η οποία παρουσιάζει: το όνομα του αρχείου, που βρίσκεται
(subdirectory) καθώς και το όνομα του host υπολογιστή που βρίσκεται
το αρχείο που μας ενδιαφέρει. Το όνομα του host εμφανίζεται, και στις
δύο μορφές του με νούμερα και με γράμματα.
Βέβαια υπάρχουν και πιό μεγάλες databases, αλλά ο σκοπός του
μηνύματος αυτού δεν είναι η παρουσίαση αυτών, αλλά το πώς θα μπορούμε
να ψάξουμε για κάποιο αρχείο σε αυτές. Περισσότερες πληροφορίες
για άλλες databases, θα υπάρξουν στο σχετικό topic (Hosts).
Αφού λοιπόν βρήκαμε που υπάρχει το αρχείο που μας ενδιαφέρει,
μπορούμε να πάμε να το μεταφέρουμε με την εντολή ftp δίνοντας το
όνομα του host.
Ενας άλλος τρόπος να συνδεθούμε σε κάποια database του
εξωτερικού είναι με τη βοήθεια του gopher, αλλά γι αυτόν θα μιλήσουμε
στη συνέχεια των μηνυμάτων. Keep Searching........Internet

Front

The archie Server (archie is always in lowercase)


A group of people at McGill University in Canada got together and created a
query system called archie. It was originally formed to be a
quick and easy way to scan the offerings of the many anonymous FTP
sites that are maintained around the world. As time progressed,
archie grew to include other valuable services as well.

The archie service is accessible through an interactive telnet
session, email queries, and command-line and X-window clients. The
email responses can be used along with FTPmail servers for those not
on the Internet. (FTP-by-Mail Servers, for info on using FTPmail
servers.)

Using archie Today

Currently, archie tracks the contents of over 800 anonymous FTP
archive sites containing over a million files stored across the
Internet. Collectively, these files represent well over 50 gigabytes
of information, with new entries being added daily.

The archie server automatically updates the listing information from
each site about once a month. This avoids constantly updating the
databases, which could waste network resources, yet ensures that the
information on each site's holdings is reasonably up to date.

To access archie interactively, telnet to one of the existing
servers. They include

archie.ans.net (New York, USA)
archie.rutgers.edu (New Jersey, USA)
archie.sura.net (Maryland, USA)
archie.unl.edu (Nebraska, USA)
archie.mcgill.ca (the first Archie server, in Canada)
archie.funet.fi (Finland)
archie.au (Australia)
archie.doc.ic.ac.uk (Great Britain)

At the login: prompt of one of the servers, enter archie to log in.
A greeting will be displayed, detailing information about ongoing
work in the archie project; the user will be left at a archie>
prompt, at which he may enter commands. Using help will yield
instructions on using the prog command to make queries, set to
control various aspects of the server's operation, et al. Type quit
at the prompt to leave archie. Typing the query prog vine.tar.Z will
yield a list of the systems that offer the source to the X-windows
program vine; a piece of the information returned looks like:

Host ftp.uu.net (137.39.1.9)
Last updated 10:30 7 Jan 1992

Location: /packages/X/contrib
FILE rw-r--r-- 15548 Oct 8 20:29 vine.tar.Z

Host nic.funet.fi (128.214.6.100)
Last updated 05:07 4 Jan 1992

Location: /pub/X11/contrib
FILE rw-rw-r-- 15548 Nov 8 03:25 vine.tar.Z

archie Clients

There are two main-stream archie clients, one called (naturally
enough) archie, the other xarchie (for X-Windows). They query the
archie databases and yield a list of systems that have the requested
file(s) available for anonymous FTP, without requiring an interactive
session to the server. For example, to find the same information you
tried with the server command prog, you could type

% archie vine.tar.Z
Host athene.uni-paderborn.de
Location: /local/X11/more_contrib
FILE -rw-r--r-- 18854 Nov 15 1990 vine.tar.Z

Host emx.utexas.edu
Location: /pub/mnt/source/games
FILE -rw-r--r-- 12019 May 7 1988 vine.tar.Z

Host export.lcs.mit.edu
Location: /contrib
FILE -rw-r--r-- 15548 Oct 9 00:29 vine.tar.Z

Note that your system administrator may not have installed the archie
clients yet; the source is available on each of the archie servers, in
the directory archie/clients.

Using the X-windows client is much more intuitive---if it's installed,
just read its man page and give it a whirl. It's essential for the
networked desktop.

Mailing archie

Users limited to email connectivity to the Internet should send a
message to the address archie@archie.mcgill.ca with the single word
help in the body of the message. An email message will be returned
explaining how to use the email archie server, along with the details
of using FTPmail. Most of the commands offered by the telnet
interface can be used with the mail server.

The whatis database

In addition to offering access to anonymous FTP listings, archie also
permits access to the whatis description database. It includes
the names and brief synopses for over 3,500 public domain software
packages, datasets and informational documents located on the
Internet.

Additional whatis databases are scheduled to be added in the
future. Planned offerings include listings for the names and locations
of online library catalog programs, the names of publicly accessible
electronic mailing lists, compilations of Frequently Asked Questions
lists, and archive sites for the most popular Usenet newsgroups.
Suggestions for additional descriptions or locations databases are
welcomed and should be sent to the archie developers at
archie-l@cs.mcgill.ca.

``Was f@"ur pl@"undern!''
(``What a place to plunder!'')
Gebhard Leberecht Bl@"ucher

inetsrvng.searching.FINGER

name::
* McsEngl.inetsrvng.searching.FINGER@cptIt,
* McsEngl.conceptIt27,
* McsEngl.finger@cptIt27,
* McsEngl.internet-finger@cptIt,
* McsEngl.internet'finger@cptIt27,

DEFINITION

Finger είναι ένα client/server πρόγραμμα που ΠΑΡΕΧΕΙ ΠΛΗΡΟΦΟΡΙΕΣ για κάποιο χρήστη ή για κάποιο host of internet.
[COMPUTER GO, SEP. 1994, 85]

Finger is a program that returns information about a registered user on a computer.
Typing "finger" alone will show the users logged into the system you are using.
"finger @host.domain.foo" will show you who's currently using some other computer.
Certain computers have variations on finger support, where "finger ron" will show info on ron at your
site, and "finger ron@hal.gnu.ai.mit.edu" will show you all the Rons with accounts on a certain computer at MIT. Note that some finger programs don't take argumeents, some will accept only a userid (the exact login name of a user,) and still others will search using a first or last name. If your system has manual pages installed, type "man finger"
for more information. If your system has Internet access but not finger, there are several freely distributable versions, including GNU finger and BSD finger.

#cptIt421.2(internet services)=cptIt67.3(internet)#

GENERIC

_GENERIC:
INTERNET SERVICE#cptItsoft421#

inetsrvng.searching.GOPHER

name::
* McsEngl.inetsrvng.searching.GOPHER@cptIt,
* McsEngl.conceptIt403,
* McsEngl.gopher@cptIt403,
* McsEngl.internet-GOPHER@cptIt,
* McsEngl.internet'gopher@cptIt403,

DEFINITION

Gopher: το όνομα αυτής της υπηρεσίας προέρχεται από τη μασκότ του πανεπιστημίου της Μινεσότα και πρόκειται για μια υπηρεσία hypertext, η οποία ξεκίνησε απο εσωτερική χρήση και στη συνέχεια εξαπλώθηκε σε πολλές άλλες τοποθεσίες.
[TELECOM (CGO), APR 1994, 47]

What is Gopher?
The Internet Gopher client/server provides a distributed information delivery system around which a world/campus-wide information system (CWIS) can readily be constructed. While providing a delivery vehicle for local information, Gopher facilitates access to other Gopher and information servers throughout the world.

#cptIt421.2(internet services)=cptIt67.3(internet)#

ACCESS

Q2: What do I need to access Gopher?

A2: You will need a gopher "client" program that runs on your local PC or workstation

There are clients for the following systems. The directory following the name is the location of the client on the anonymous "ftp" site boombox.micro.umn.edu (134.84.132.2) in the directory /pub/gopher.

Unix Curses & Emacs : /pub/gopher/Unix/gopher1.12.tar.Z
Xwindows (athena) : /pub/gopher/Unix/xgopher1.2.tar.Z
Xwindows (Motif) : /pub/gopher/Unix/moog
Macintosh Hypercard : /pub/gopher/Macintosh-TurboGopher/old-versions*
Macintosh Application : /pub/gopher/Macintosh-TurboGopher *
DOS w/Clarkson Driver : /pub/gopher/PC_client/
NeXTstep : /pub/gopher/NeXT/
VM/CMS : /pub/gopher/Rice_CMS/ or /pub/gopher/VieGOPHER/
VMS : /pub/gopher/VMS/
OS/2 2.0 : /pub/gopher/os2/
MVS/XA : /pub/gopher/mvs/

Many other clients and servers have been developed by others, the following is an attempt at a comprehensive list.

A Macintosh Application, "MacGopher".
ftp.cc.utah.edu:/pub/gopher/Macintosh *

Another Macintosh application, "GopherApp".
ftp.bio.indiana.edu:/util/gopher/gopherapp *

A port of the UNIX curses client for DOS with PC/TCP
oac.hsc.uth.tmc.edu:/public/dos/misc/dosgopher.exe

A port of the UNIX curses client for PC-NFS
bcm.tmc.edu:/nfs/gopher.exe

A beta version of the PC Gopher client for Novell's LAN Workplace for DOS
lennon.itn.med.umich.edu:/dos/gopher

A VMS DECwindows client for use with Wollongong or UCX
job.acs.ohio-state.edu:XGOPHER_CLIENT.SHARE


* Note: these Macintosh clients require MacTCP.

Most of the above clients can also be fetched via a gopher client itself. Put the following on a gopher server:

Type=1
Host=boombox.micro.umn.edu
Port=70
Path=
Name=Gopher Software Distribution.

Or point your gopher client at boombox.micro.umn.edu, port 70 and look in the gopher directory.

There are also a number of public telnet login sites available.
The University of Minnesota operates one on the machine
"consultant.micro.umn.edu" (134.84.132.4) See Q3 for more information about this. It is recommended that you run the client software instead of logging into the public telnet login sites. A client uses the custom features of the local machine (mouse, scroll bars, etc.) A local client is also faster.

SITES

Q3: Where are there publicly available logins for Gopher?

A3: Here is a short list, use the closest site to minimize network lag.

Non-tn3270 Public Logins:
Hostname IP# Login Area
------ -------------
consultant.micro.umn.edu 134.84.132.4 gopher North America
gopher.uiuc.edu 128.174.33.160 gopher North America
panda.uiowa.edu 128.255.40.201 panda North America
gopher.sunet.se 192.36.125.2 gopher Europe
info.anu.edu.au 150.203.84.20 info Australia
gopher.chalmers.se 129.16.221.40 gopher Sweden
tolten.puc.cl 146.155.1.16 gopher South America
ecnet.ec 157.100.45.2 gopher Ecuador

tn3270 Public Logins:
Hostname IP# Login Area
------ -------------
pubinfo.ais.umn.edu 128.101.109.1 -none- North America

It is recommended that you run the client software instead of logging into the public login sites. A client uses the custom features of the local machine (mouse, scroll bars, etc.) and gives faster response.

GOPHER & WWW

Q12: What is the relationship between Gopher and (WAIS, WWW, "ftp")?

A12: Gopher is intimately intertwined with these two other systems.
As shipped the Unix gopher server has the capability to:
- Search local WAIS indices.
- Query remote WAIS servers and funnel(διοχετεύσει) the results to gopher clients.
- Query remote "ftp" sites and funnel the results to gopher clients.
- Be queried by WWW (World Wide Web) clients (either using built in gopher querying or using native http querying.

inetsrvng.searching.HYTELNET

name::
* McsEngl.inetsrvng.searching.HYTELNET@cptIt,
* McsEngl.hytelnet@cptIt,

HYTELNET version 6.2, the utility which gives an IBM-PC user
instant-access to all Internet-accessible
- library catalogs,
- FREE-NETS,
- CWISs,
- BBSs,
- Gophers,
- WAIS, etc.
is now available. You can get it via anonymous ftp from:
access.usask.ca
in the pub/hytelnet/pc subdirectory. It is listed as HYTELN62.ZIP.

inetsrvng.searching.VERONICA

name::
* McsEngl.inetsrvng.searching.VERONICA@cptIt,
* McsEngl.conceptIt406,
* McsEngl.Internet'VERONICA@cptIt406,
* McsEngl.internet-veronica-utility@cptIt,

DEFINITION

About the veronica service

veronica: Very Easy Rodent-Oriented Net-wide Index to Computerized Archives.

veronica offers a keyword search of most gopher-server menus in the entire gopher web.
As archie is to ftp archives, veronica is to gopherspace. A veronica search produces a menu of gopher items, each of which is a direct pointer to a gopher data source.
Because veronica is accessed through a gopher client, it is easy to use,
and gives access to all types of data supported by the gopher
protocol.

veronica was designed as a response to the problem of
resource discovery in the rapidly-expanding gopher web.
Frustrated comments in the net news-groups have recently
reflected the need for such a service. Additional
motivation came from the comments of naive gopher users,
several of whom assumed that a simple-to-use service would
provide a means to find resources "without having to know
where they are."

The result of a veronica search is an automatically-
generated gopher menu, customized according to the user's
keyword specification. Items on this menu may be drawn from
many gopher servers. These are functional gopher items,
immediately accessible via the gopher client ... just
double-click to open directories, read files, or perform
other searches -- across hundreds of gopher servers. You
need never know which server is actually involved in filling
your request for information. Items that appear
particularly interesting can be saved in the user's bookmark
list.

Notice that these are NOT full-text searches of data at
gopher-server sites, just as archie does not index the
contents of ftp sites, but only the names of files at those
sites. veronica indexes the TITLES on all levels of the
menus, for most gopher sites in the Internet. 258 gophers
are indexed by veronica on Nov. 17, 1992; we have
discovered over 500 servers and will index the full set in
the near future. We hope that veronica will encourage
gopher administrators to use very descriptive titles on
their menus.

To try veronica, select it from the "Other gophers" menu on
Minnesota's gopher server, or point your gopher at:

Name=veronica (search menu items in most of gopherSpace)
Type=1
Port=70
Path=1/veronica
Host=veronica.scs.unr.edu

veronica is an experimental service, developed by Steve
Foster and Fred Barrie at University of Nevada. As we
expect that the load will soon outgrow our hardware, we will
distribute the veronica service across other sites in the
near future.

Currently, the veronica server is running at the Clearinghouse
for Networked Information Discovery and Retrieval (CNIDR) on a
Sun SPARCII and at the University of Nevada on a NeXT Cube.

Thanks to CNIDR for the use of their equipment.

Please address comments to: gophadm@futique.scs.unr.edu

March 3, 1993
Steve Foster
Fred Barrie

#cptIt421.2(internet services)=cptIt67.3(internet)#

inetsrvng.SHOPPING#ql:buying.international#

name::
* McsEngl.inetsrvng.SHOPPING@cptIt,

inetsrvng.STORING-INFO

name::
* McsEngl.inetsrvng.STORING-INFO@cptIt,

inetsrvng.SUBSCRIPTION

_CREATED: 1999jun17

name::
* McsEngl.inetsrvng.SUBSCRIPTION@cptIt,
* McsEngl.conceptIt530,
* McsEngl.internet-subscription@cptIt,
* McsEngl.internet'subscription@cptIt530,

DEFINITION

SPECIFIC

_SPECIFIC:#ql:_GENERIC cptIt530#

* = subscribed as nikkas@otenet.gr

+ = unsubscribed as nikas

++ = subscribed as nikkas

UNSUBSCRIBED AS NIKKAS@IOA.FORTHNET.GR
* advanced java
* xml-dev
* cnet digital dispatch

* ADVANCED-JAVA mailing list

Από: <advanced-java-help@xcf.berkeley.edu> Προς: <nikkas@otenet.gr> Θέμα: ezmlm response Ημερομηνία: Κυριακή, 16 Ιουλίου 2000 11:06 μμ
Hi! This is the ezmlm program. I'm managing the advanced-java@xcf.berkeley.edu mailing list.
Acknowledgment: I have added the address
nikkas@otenet.gr
to this mailing list.

--- Here are the ezmlm command addresses.
I can handle administrative requests automatically.Just send an empty note to any of these addresses:
<advanced-java-subscribe@xcf.berkeley.edu>: Receive future messages sent to the mailing list.
<advanced-java-unsubscribe@xcf.berkeley.edu>: Stop receiving messages.
<advanced-java-get.12345@xcf.berkeley.edu>: Retrieve a copy of message 12345 from the archive.
DO NOT SEND ADMINISTRATIVE REQUESTS TO THE MAILING LIST! If you do, I won't see them, and subscribers will yell at you.
To specify God@heaven.af.mil as your subscription address, send mail to <advanced-java-subscribe-God=heaven.af.mil@xcf.berkeley.edu>. I'll send a confirmation message to that address; when you receive that message, simply reply to it to complete your subscription.

--- Below this line is a copy of the request I received.
Return-Path: <nikkas@otenet.gr> Received: (qmail 49583 invoked from network); 16 Jul 2000 20:06:13 -0000 Received: from ns1.otenet.gr (195.170.0.2) by scam.xcf.berkeley.edu with SMTP; 16 Jul 2000 20:06:13 -0000 Received: from dummy.forthnet.gr (lefk364-a092.otenet.gr [195.167.107.156])  by ns1.otenet.gr (8.10.1/8.10.1) with SMTP id e6GK6KZ05228  for <advanced-java-sc.963777332.dfemglobfmklodjnbjbd-nikkas=otenet.gr@xcf.berkeley.edu>; Sun, 16 Jul 2000 23:06:23 +0300 (EET DST) Message-ID: <000f01bfef61$23643860$9c6ba7c3@forthnet.gr> From: "Kasselouris, Nikos" <nikkas@otenet.gr> To: <advanced-java-sc.963777332.dfemglobfmklodjnbjbd-nikkas=otenet.gr@xcf.berkeley.edu> Subject: Date: Sun, 16 Jul 2000 23:04:50 +0300 MIME-Version: 1.0 Content-Type: text/plain;  charset="iso-8859-7" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2417.2000 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300

++C/NET DIGITAL DISPATCH newsletter

SUBJECT: infotech.

Sun, 13 Jun 1999 13:32:25
Your subscription to the DISPATCH list (CNET Digital Dispatch) has been accepted.
Please save this message for future reference, especially if this is the first time you are subscribing to an electronic mailing list. If you ever need to leave the list, you will find the necessary instructions below.

Perhaps more importantly, saving a copy of this message (and of all future subscription notices from other mailing lists) in a special mail folder will give you instant access to the list of mailing lists that you are subscribed to. This may prove very useful the next time you go on vacation and need to leave the lists temporarily so as not to fill up your mailbox while you are away! You should also save the "welcome messages" from the list owners that you will occasionally receive after subscribing to a new list.


To send a message to all the people currently subscribed to the list, just send mail to DISPATCH@DISPATCH.CNET.COM. This is called "sending mail to the list," because you send mail to a single address and LISTSERV makes copies for all the people who have subscribed. This address (DISPATCH@DISPATCH.CNET.COM) is also called the "list address." You must never try to send any command to that address, as it would be distributed to all the people who have subscribed.

All commands must be sent to the "LISTSERV address," LISTSERV@DISPATCH.CNET.COM. It is very important to understand the difference between the two, but fortunately it is not complicated. The LISTSERV address is like a FAX number that connects you to a machine, whereas the list address is like a normal voice line connecting you to a person. If you make a mistake and dial the FAX number when you wanted to talk to someone on the phone, you will quickly realize that you used the wrong number and call again. No harm will have been done. If on the other hand you accidentally make your FAX call someone's voice line, the person receiving the call will be inconvenienced, especially if your FAX then re-dials every 5 minutes. The fact that most people will eventually connect the FAX machine to the voice line to allow the FAX to go through and make the calls stop does not mean that you should continue to send FAXes to the voice number. People would just get mad at you. It works pretty much the same way with mailing lists, with the difference that you are calling hundreds or thousands of people at the same time, and consequently you can expect a lot of people to get upset if you consistently send commands to the list address.

You may leave the list at any time by sending a "SIGNOFF DISPATCH" command to LISTSERV@DISPATCH.CNET.COM. You can also tell LISTSERV how you want it to confirm the receipt of messages you send to the list. If you do not trust the system, send a "SET DISPATCH REPRO" command and LISTSERV will send you a copy of your own messages, so that you can see that the message was distributed and did not get damaged on the way. After a while you may find that this is getting annoying, especially if your mail program does not tell you that the message is from you when it informs you that new mail has arrived from DISPATCH. If you send a "SET DISPATCH ACK NOREPRO" command, LISTSERV will mail you a short acknowledgement instead, which will look different in your mailbox directory. With most mail programs you will know immediately that this is an acknowledgement you can read later. Finally, you can turn off acknowledgements completely with "SET DISPATCH NOACK NOREPRO".


Following instructions from the list owner, your subscription options have been set to "NOPOST" rather than the usual LISTSERV defaults. For more information about subscription options, send a "QUERY DISPATCH" command to LISTSERV@DISPATCH.CNET.COM.

IMPORTANT: This list is confidential. You should not publicly mention its existence, or forward copies of information you have obtained from it to third parties.


More information on LISTSERV commands can be found in the LISTSERV reference card, which you can retrieve by sending an "INFO REFCARD" command to LISTSERV@DISPATCH.CNET.COM.

CNN QUICK NEWS

If you would like to unsubscribe, please go to:
http://cnn.com/QUICKNEWS/mail
Unsubscribed at 2003-03-03

+ECONOMIST newsletter

To cancel your subscription, send an e-mail with the message
"leave economist-business"
to newscaster@postbox.co.uk

FINANCIAL TIME

FOLIO-VIEWS newsletter

FREEMAIL

FREESTUFF newsletter

http://www.freestuff.gr/

GAMELAN-L

Wed, 5 Jan 2000 16:38:05
Your subscription to the GAMELAN-L list (The Gamelan Announcement List) has been accepted.
You may unsubscribe from the newsletter at any time by sending an e-mail message to LISTSERV@LISTSERV.EARTHWEB.COM and typing SIGNOFF GAMELAN-L in the body (not the subject line) of the message.

GOOEY

HotMail

+IBM ALPHAWORKS newletter

SUBJECT: java related
The IBM alphaWorks Flash is a monthly newsletter of new technologies and updates posted to alphaWorks at: http://www.alphaWorks.ibm.com

Using the web to subscribe or unsubscribe
To subscribe to or unsubscribe from this newsletter, go to http://www.alphaWorks.ibm.com/subscribe/ and follow the instructions.

Using e-mail to subscribe or unsubscribe
You can also subscribe to or unsubscribe from this newsletter by sending an e-mail to listserv@mail.software.ibm.com. In the first line of the body of your note, type:
subscribe ALPHAFLASH youruserid@yourdomain firstname lastname (e.g., subscribe ALPHAFLASH jane.dow@xyz.com jane dow)
signoff ALPHAFLASH (e.g., signoff ALPHAFLASH )
If your e-mail address changes, please remember to unsubscribe your previous userid after you subscribe your new userid.

IN.GR

name::
* McsEngl.IN.GR@cptIt,

INFOBASE newsletter

Infobase News Mail
is a new, free, email-based news service to the infobase community. Every month a new issue of Infobase News Mail is delivered to your email in-box with the latest-breaking infobase industry news. If you'd like to begin receiving Infobase News Mail, just send an email to newsmail@eurekapub.com with your name and email address. Eureka will add you to their list.
{1997-09-18}

++INFOWORLD ELECTRIC newsletter

SUBJECT: infotech

SUBSCRIBE To subscribe to The InfoWorld Scoop, tell your friends and colleagues to go to http://www.iwsubscribe.com.

There they can just register for InfoWorld Electric, or fill out an application for InfoWorld in print, which also registers them for Electric. By filling out either form,they'll get the newsletter each week and have full access to the Web site, including posting to Forums and Archives.
UNSUBSCRIBE If you want to unsubscribe from The InfoWorld Scoop, go to http://www.iwsubscribe.com/UnsubscribeNews.htm
CHANGE E-MAIL If you want to change the e-mail address where you are receiving the InfoWorld Scoop, go to http://www.iwsubscribe.com/emailaddresschange.htm

JAVA mailing list

SUBJECT: java

Java: 1998jan04
Send subscription requests to: listserv@yorku.ca
Send listmail to: java@yorku.ca
Maintainer: java-request@yorku.ca
Web Page: http://tile.net/listserv/java.html
General Java Discussion

JDC: java developers connection web source

JAVA WORLD newsletter

To stop receiving such messages, send email to jwunsub@emailch.com with a subject field of:
UNSUB javaworld nikas@ioa.forthnet.gr jw1633
Questions? Email javaworld@emailch.com
Distribution, database maintenance and response management by The Email Channel, Inc. For more information, send e-mail to info@emailch.com

+JAVA-XML-INTEREST mailing list

TO SEND MAIL: java-xml-interest@cybercom.net
To subscribe, send mail to majordomo@cybercom.net with subscribe java-xml-interest in the body.
To unsubscribe,
send mail to majordomo@cybercom.net
with unsubscribe java-xml-interest in the body.

jEdit devel

* To post a message to all the list members, send email to jedit-devel@lists.sourceforge.net.
Welcome to the jEdit-devel@lists.sourceforge.net mailing list! Please only post to this list from the exact same e-mail address that you subscribed from. Posts from unsubscribed addresses have to be approved manually by the list administrators, and having to do this makes them very unhappy.
If you are not already subscribed to jEdit-users, please do so; if you only subscribe to jEdit-devel, you will miss out on a lot of discussion.
To post to this list, send your email to:
jedit-devel@lists.sourceforge.net
General information about the mailing list is at:
https://lists.sourceforge.net/lists/listinfo/jedit-devel
If you ever want to unsubscribe or change your options (eg, switch to or from digest mode, change your password, etc.), visit your subscription page at:
https://lists.sourceforge.net/lists/options/jedit-devel/nikkas%40otenet.gr

You can also make such adjustments via email by sending a message to:
jEdit-devel-request@lists.sourceforge.net
with the word `help' in the subject or body (don't include the quotes), and you will get back a message with instructions.
You must know your password to change your options (including changing the password, itself) or to unsubscribe. It is:
nikkas
If you forget your password, don't worry, you will receive a monthly reminder telling you what all your lists.sourceforge.net mailing list passwords are, and how to unsubscribe or change your options. There is also a button on your options page that will email your current password to you.
You may also have your password mailed to you automatically off of the Web page noted above.

jedit users

Welcome to the jEdit-users@lists.sourceforge.net mailing list! Please only post to this list from the exact same e-mail address that you subscribed from. Posts from unsubscribed addresses have to be approved manually by the list administrators, and having to do this makes them very unhappy.
To post to this list, send your email to:
jedit-users@lists.sourceforge.net
General information about the mailing list is at:
https://lists.sourceforge.net/lists/listinfo/jedit-users
If you ever want to unsubscribe or change your options (eg, switch to or from digest mode, change your password, etc.), visit your subscription page at:
https://lists.sourceforge.net/lists/options/jedit-users/nikkas%40otenet.gr

You can also make such adjustments via email by sending a message to:
jEdit-users-request@lists.sourceforge.net
with the word `help' in the subject or body (don't include the quotes), and you will get back a message with instructions.
You must know your password to change your options (including changing the password, itself) or to unsubscribe. It is:
nikkas
If you forget your password, don't worry, you will receive a monthly reminder telling you what all your lists.sourceforge.net mailing list passwords are, and how to unsubscribe or change your options. There is also a button on your options page that will email your current password to you.
You may also have your password mailed to you automatically off of the Web page noted above.

jext listbot

http://lists.sourceforge.net/lists/listinfo/jext-devel
Welcome to the Jext-devel@lists.sourceforge.net mailing list!
To post to this list, send your email to:
jext-devel@lists.sourceforge.net
General information about the mailing list is at:
http://lists.sourceforge.net/lists/listinfo/jext-devel
If you ever want to unsubscribe or change your options (eg, switch to or from digest mode, change your password, etc.), visit your subscription page at:
http://lists.sourceforge.net/lists/options/jext-devel/nikkas%40otenet.gr

You can also make such adjustments via email by sending a message to:
Jext-devel-request@lists.sourceforge.net
with the word `help' in the subject or body (don't include the quotes), and you will get back a message with instructions.
You must know your password to change your options (including changing the password, itself) or to unsubscribe. It is:
nikkass
If you forget your password, don't worry, you will receive a monthly reminder telling you what all your lists.sourceforge.net mailing list passwords are, and how to unsubscribe or change your options. There is also a button on your options page that will email your current password to you.
You may also have your password mailed to you automatically off of the Web page noted above.

LTG-SOFTWARE mailing list

If you ever want to remove yourself from this mailing list, you can send mail to "Majordomo@lists.ed.ac.uk" with the following command in the body of your email message:
    unsubscribe ltg-software nikas@ioa.forthnet.gr
Here's the general information for the list you've subscribed to, in case you don't already have it:
[Last updated on: Thu Nov 13 11:43:17 1997]
We have set up a new mailing list
   ltg-software
under majordomo on lists.ed.ac.uk. Users can send messages to the list by mailing
   ltg-software@lists.ed.ac.uk
Purpose of mailing list -----------------------
The purpose of the ltg-software mailing list is to act as a discussion forum for users of software publically distributed by the Language Technology Group, Edinburgh University. Currently, this software consists of the following: LT NSL, LT XML, LT POS, LT PLEUK, LT CHUNK, LT THISTLE, LT BIBLIO, LT CHECK, LT TCR (see below for descriptions).
You have been added to this list because you have inquired about one or more of these pieces of software.
How to remove yourself from this mailing list ---------------------------------------------
Since we all get too much junk mail these days, if you are not interested in being on this list, then you can remove your email address by sending the following in the body (not the subject line) of an email message to  Majordomo@lists.ed.ac.uk:
unsubscribe ltg-software
This will unsubscribe the account from which you send the message. If you are subscribed with some other address, you'll have to send a command of the following form instead:
unsubscribe ltg-software other-address@your_site.your_net
If you don't know what address you are subscribed with, you can send the following command to see who else is on the list.
who ltg-software
How to send messages to this list ---------------------------------
Send email to ltg-software@lists.ed.ac.uk
LTG-SOFTWARE ------------
The purpose of the ltg-software mailing list is to act as a discussion forum for users of software publically distributed by the Language Technology Group. Currently, this software consists of the following:
LT NSL A library of normalised SGML tools and a developers         tool-kit, including a C-based API.
LT XML An integrated set of XML tools and a developers tool-kit, including a C-based API.
LT POS Part of speech tagger
LT PLEUK Grammar development shell
LT CHUNK A surface parser which identifies noun groups and verb groups
LT THISTLE Parameterizable display engine for linguistic diagrams
LT BIBLIO Software for processing bibliographical references (under construction)
LT CHECK Grammar and style checking software
LT TCR Text categorization and text retrieval software
For further details, see our webpage http://www.ltg.ed.ac.uk
[1998jan29]

METAMATA (javacc)

MITECS Abstracts

OTEnet

PalTalk

2002-04-29:
nikkas, pt1996

PATHFINDER.GR

name::
* McsEngl.PATHFINDER.GR@cptIt,

PC MAGAZINE newsletter

To unsubscribe or change your e-mail address, visit the Web at http://www.pcmag.com/alert.htm

PSYCHOLOGY PRESS

psychologypress.metapress.com

SCH.GR

name::
* McsEngl.SCH.GR@cptIt,

SCIENCE-DIRECT

Articles of many magazines

SOPHOCLEOUS

SourceForge.Net

name::
* McsEngl.SourceForge.Net@cptIt,

SUN WORKSHOP

TAXIS

+THE DEVELOPER.COM newsletter

Wed, 17 Sep 1997 12:22:37
Your subscription to the DEVELOPER-COM list (The DEVELOPER.COM Announcement List) has been accepted.
Welcome to the Developer.com mailing list!
You'll be receiving a weekly e-mail highlighting the latest from Developer.com and Gamelan, including some of the hottest new resources listed in our directory, special features from our editorial staff, new sections at our sites and more. Please let us know how we can use this list to serve you better.
Please save this message for future reference.
You may leave the list at any time by sending an E-mail message to LISTSERV@EARTHWEB.COM and typing SIGNOFF DEVELOPER-COM in the body of the message.

The New York Times

URL-minder reminder

has registered you for free monitoring of the following Web address (URL):
http://www.obsolete.com/people/cansdale/java/new.htm What's New
HOW TO CANCEL: -------------
If you would like to stop receiving notification, you may cancel at any time.
If your e-mail software supports it, you can cancel this registration by clicking on the following link: http://www.netmind.com/cgi-bin/uncgi/minder-cancel?required-email=nikas@ioa.forthnet.gr&code=13384772
If your e-mail software does not support clickable links, go to http://www.netmind.com/URL-minder/new/cancel.html and fill out the cancellation form. You will need to paste in the following code: 13384772 and the following e-mail address: nikas@ioa.forthnet.gr exactly as shown to complete cancellation. This insures that you, the person receiving this e-mail, have complete control over the registration (but you do NOT have to remember yet another user ID and password). This information will be sent to you each time you receive an e-mail from this service, so you do not have to worry about misplacing or forgetting it.
HOW TO CHANGE YOUR ADDRESS: ---------------------------
Click on the following link to change your e-mail address: http://www.netmind.com/cgi-bin/uncgi/minder-change-address?required-email=nikas@ioa.forthnet.gr&code=541765
or fill out the form at http://www.netmind.com/URL-minder/new/change-address.html
Your user number is: 541765

+xml-dev mailing list

majordomo@ic.ac.uk
Send subscription requests to: majordomo@ic.ac.uk
Send listmail to: xml-dev@ic.ac.uk
Maintainer: peter@ursus.demon.co.uk (Peter Murray-Rust)
Web Page: http://www.lists.ic.ac.uk/hypermail/xml-dev/ This list discusses the development of XML software: browsers, editors, parsers, etc.
To subscribe to the xml-dev mailing list just enter your email address and real name in the boxes below and click the subscribe button.
===================================
TO SUBSCRIBE:
- send mail to: majordomo@ic.ac.uk
- subject: blank
- body: subscribe xml-dev nikas@ioa.forthnet.gr (Nikos Kasselouris)

TO UNSUBSCRIBE:
- send mail to: majordomo@ic.ac.uk
- subject: blank
- body: unsubscribe xml-dev nikas@ioa.forthnet.gr (Nikos Kasselouris)

From: <Majordomo@ic.ac.uk> To: <nikkas@ioa.forthnet.gr> Subject: Welcome to xml-dev Date: Τετάρτη, 30 Ιουνίου 1999 11:47 μμ
--
Welcome to the xml-dev mailing list!
Please save this message for future reference. Thank you.
If you ever want to remove yourself from this mailing list, send the following command in email to <xml-dev-request@ic.ac.uk>:
unsubscribe
Or you can send mail to <Majordomo@ic.ac.uk> with the following command in the body of your email message:
unsubscribe xml-dev
or from another account, besides nikkas@ioa.forthnet.gr:
unsubscribe xml-dev nikkas@ioa.forthnet.gr
If you ever need to get in contact with the owner of the list, (if you have trouble unsubscribing, or have questions about the list itself) send email to <owner-xml-dev@ic.ac.uk> .This is the general rule for most mailing lists when you need to contact a human.
Here's the general information for the list you've subscribed to, in case you don't already have it:
[Last updated on: Thu Apr 8 11:40:01 1999]
Information for the XML-DEV List. PLEASE READ CAREFULLY
1. General Sources for XML Information:
The main W3C URLs for XML development and activity are, respectively:
http://www.w3.org/XML/ and http://www.w3.org/XML/Activity.html
The XML 1.0 Recommendation is located at: http://www.w3.org/TR/REC-xml
Additional XML-related mailing lists are available. See http://metalab.unc.edu/xml/mailinglists.html

2. Unsubscribing.
Please note that if you wish to unsubscribe from the list, you can do do immediately if you post to majordomo@ic.ac.uk the single line
unsubscribe xml-dev
PLEASE NOTE: You must do this from the SAME email account you used to subscribe in the first place. If you cannot do this, then unsubscribing will NOT be an automatic operation, and will require moderation. This might take up to 7 days! If you are about to change your email address, it would help us a great deal if you could unsubscribe from the list BEFORE your email becomes invalid. If you are not able to do this, then submit a message from your new email account as follows
unsubscribe xml-dev youroldemail@yourold address
(where the string youroldemail@yourold address is substituted for your real old email address etc). Please note that these requests require moderation, and may not be acted upon immediately.
Please DO NOT send unsubscribe messages to the list itself, but to majordomo@ic.ac.uk.

3. List Protocols.

3.1 Please do not send message attachments (particularly visiting cards etc).
3.2 Please observe the usual rules about flames and polemics.
3.3. Please do not quote entire messages in your reply. It only increases the network traffic, and in almost all cases, only a brief quote is needed.
4. Archives.
On-line indexed archives are available. How to access them is indicated in the signature file appended to the bottom of each message, along with a reminder of how to unsubscribe. A CD ROM containing the indexed archives is also available from Imperial College Press, as ISBN 981-02-3594-1.http://www.wspc.com.sg/books/chemistry/p157.html
Dr Henry Rzepa, Dept. Chemistry, Imperial College, LONDON SW7 2AY; mailto:rzepa@ic.ac.uk; Tel (44) 171 594 5774; Fax: (44) 171 594 5804.URL: http://www.ch.ic.ac.uk/rzepa/

+XML-APP

Hi! This is the ezmlm program. I'm managing the xml-app@sunsite.auc.dk mailing list.
Welcome to XML-APP mailing list!
SUBSCRIPTION INFO =================
You are now subscribed under the following e-mail address:
   nikas@ioa.forthnet.gr
Please save this message so that you know the address you are subscribed under, in case you later want to unsubscribe or change your subscription address.
If you wish to unsubscribe at anytime, send a blank message to:
mailto:xml-app-unsubscribe@sunsite.auc.dk

MAILING LIST INFO =================
XML-APP is an informal, unmoderated mailing list created to support those who are interested in developing XML applications.  This mailing list differs from XML-DEV in that it is intended to promote deployment of XML standards in real world applications.
Only the topics related to the application of XML technology are appropriate for this mailing list.  XML-APP represents the "dwarvish" aspect of the XML community, down in the dirt and slime, working feverishly to make things work, and hounded by over-hype and deadlines.  Throw the theories and elegant designs out the window, pull up your sleeves, and come join the discussions.
If you are new to XML, we recommend the XML-L mailing list (see below) as the place to come up to speed fast.  XML-APP is the place for practiciality but not naivety.

BEHIND THE SCENE =================
While this mailing list was started and is managed by Don Park of Docuverse (donpark@docuverse.com) and Jψrgen Nielsen of SunSITE Denmark (jbn@sunsite.auc.dk), its continued existance is made possible by the support of SunSITE Denmark and their sponsors.

LINKS =================
W3C XML Page - http://www.w3c.org/XML
OASIS XML Page - http://http://www.oasis-open.org/cover/xml.html
XML-DEV - the main XML development mailing list, maintained/organized by Peter Murray-Rust and Henry Rzepa.  To subscribe to the digest, mailed on Monday of each week, send email to majordomo@ic.ac.uk with the message line 'subscribe xml-dev-digest'.
XML-L - the mailing list for general discussion of XML.  The list owner is Peter Flynn, University College Cork. To subscribe to the list, send email to listserv@listserv.hea.ie with the command 'subscribe xml-l [your name]' in the body of the message. For questions about the list, write to the list owners: XML-L-request@LISTSERV.HEA.IE.
--- Here are the ezmlm command addresses.
I can handle administrative requests automatically.Just send an empty note to any of these addresses:
   <xml-app-subscribe@sunsite.auc.dk>:    Receive future messages sent to the xml-app mailing list.
   <xml-app-unsubscribe@sunsite.auc.dk>:    Stop receiving messages for the xml-app mailing list.
   <xml-app-get.12_45@sunsite.auc.dk>:    Retrieve a copy of messages 12 to 45 from the archive.   A maximum of 100 messages are returned per request.
   <xml-app-index.123_456@sunsite.auc.dk>:    Retrieve subjects of messages, including 123 though 456    from the archive. Subjects are returned in sets of 100.   A maximum of 2000 subjects are returned per request.
   <xml-app-thread.12345@sunsite.auc.dk>:    Retrieve a copy of all messages with the same subject    as message 12345.
DO NOT SEND ADMINISTRATIVE REQUESTS TO THE MAILING LIST!If you do, I won't see them, and subscribers will yell at you.
To specify God@heaven.af.mil as your subscription address, send mail to <xml-app-subscribe-God=heaven.af.mil@sunsite.auc.dk>.I'll send a confirmation message to that address; when you receive that message, simply reply to it to complete your subscription.

--- Enclosed is a copy of the request I received.
Return-Path: <nikas@ioa.forthnet.gr> Received: (qmail 23324 invoked from network); 18 Nov 1998 22:09:32 -0000 Received: from nefeli.forthnet.gr (193.92.150.20)   by sunsite.auc.dk with SMTP; 18 Nov 1998 22:09:32 -0000 Received: from dummy.forthnet.gr (ppp5.ioa.forthnet.gr [193.92.108.105]) by nefeli.forthnet.gr (8.8.5/8.8.5) with SMTP id AAA07309 for <xml-app-sc.911322924.oejecpgdapifbjmbdglf-nikas=ioa.forthnet.gr@sunsite.auc.dk>; Thu, 19 Nov 1998 00:08:57 +0200 (EET) From: "Kasselouris, Nikos" <nikas@ioa.forthnet.gr> To: <xml-app-sc.911322924.oejecpgdapifbjmbdglf-nikas=ioa.forthnet.gr@sunsite.auc.dk> Date: Thu, 19 Nov 1998 00:07:50 +0200 Message-ID: <01be133f$e1972900$696c5cc1@dummy.forthnet.gr> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-7" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 4.71.1712.3 X-MimeOLE: Produced By Microsoft MimeOLE V4.71.1712.3

--------------------------------------------------------------------------------------------------------
Hi! This is the ezmlm program. I'm managing the xml-app@sunsite.auc.dk mailing list.
To confirm that you would like
   nikas@ioa.forthnet.gr
added to the xml-app mailing list, please send an empty reply to this address:
   xml-app-sc.910821656.hoeekfkednlbaafnjolo-nikas=ioa.forthnet.gr@sunsite.auc.dk
Usually, this happens when you just hit the "reply" button.If this does not work, simply copy the address and paste it into the "To:" field of a new message.
This confirmation serves two purposes. First, it verifies that I am able to get mail through to you. Second, it protects you in case someone forges a subscription request in your name.

--- Here are the ezmlm command addresses.
I can handle administrative requests automatically.Just send an empty note to any of these addresses:
   <xml-app-subscribe@sunsite.auc.dk>:    Receive future messages sent to the xml-app mailing list.
   <xml-app-unsubscribe@sunsite.auc.dk>:    Stop receiving messages for the xml-app mailing list.
   <xml-app-get.12_45@sunsite.auc.dk>:    Retrieve a copy of messages 12 to 45 from the archive.   A maximum of 100 messages are returned per request.
   <xml-app-index.123_456@sunsite.auc.dk>:    Retrieve subjects of messages, including 123 though 456    from the archive. Subjects are returned in sets of 100.   A maximum of 2000 subjects are returned per request.
   <xml-app-thread.12345@sunsite.auc.dk>:    Retrieve a copy of all messages with the same subject    as message 12345.
DO NOT SEND ADMINISTRATIVE REQUESTS TO THE MAILING LIST!
If you do, I won't see them, and subscribers will yell at you.
To specify God@heaven.af.mil as your subscription address, send mail to <xml-app-subscribe-God=heaven.af.mil@sunsite.auc.dk>.
I'll send a confirmation message to that address; when you receive that message, simply reply to it to complete your subscription.

--- Enclosed is a copy of the request I received.
Return-Path: <nikas@ioa.forthnet.gr> Received: (qmail 7229 invoked from network); 11 Nov 1998 22:00:55 -0000 Received: from nefeli.forthnet.gr (193.92.150.20)   by sunsite.auc.dk with SMTP; 11 Nov 1998 22:00:55 -0000 Received: from dummy.forthnet.gr (ppp3.ioa.forthnet.gr [193.92.108.103]) by nefeli.forthnet.gr (8.8.5/8.8.5) with SMTP id AAA12806 for <xml-app-subscribe@sunsite.auc.dk>; Thu, 12 Nov 1998 00:00:14 +0200 (EET) From: "Kasselouris, Nikos" <nikas@ioa.forthnet.gr> To: <xml-app-subscribe@sunsite.auc.dk> Date: Wed, 11 Nov 1998 23:59:07 +0200 Message-ID: <01be0dbe$815aa020$676c5cc1@dummy.forthnet.gr> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-7" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 4.71.1712.3 X-MimeOLE: Produced By Microsoft MimeOLE V4.71.1712.3

Yahoo

++ΝΑΥΤΕΜΠΟΡΙΚΗ

Γίνεται αυτόματα στη σελίδα της.
naftemporiki@hol.gr.

inetsrvng.TELNET

name::
* McsEngl.inetsrvng.TELNET@cptIt,
* McsEngl.conceptIt386,
* McsEngl.internet-TELNET@cptIt,
* McsEngl.internet'telnet@cptIt386,

DEFINITION

Telnet is a program that allows you to login to another computer to run software there. Typically, you login either to access a "shell" command environment or some other utility, like a weather server or game.

Understanding Telnet
The one common element across the disparate environments of the Internet is the TCP/IP software protocol suite, the basis of communications.

Telnet, the terminal-handler portion of the TCP/IP protocol suite, is the cornerstone of this striking communications technology.
Telnet handles the remote login to another Internet host, so it is useful to know something about the way it works.

Telnet operates in a client/server environment in which one host (the computer you are using, running Client (User) Telnet) negotiates opening a session on another computer (the remote host, running Server Telnet). During the behind-the-scenes negotiation process, the two computers agree on the parameters governing the session. One of the first things they settle is the terminal type to be used -- in general, a line-by-line network virtual terminal, for simplicity's sake. Virtual terminal, in this context, refers to a set of terminal characteristics and sequences that both sides of a network connection agree to use to transmit data from terminals across the network, regardless of the terminal used.

ATTRIBUTES

#cptIt421.2(internet services)=cptIt67.3(internet)#

VERSION: TN3270

COMMANDS on telnet

Finding Telnet Commands
Try typing "help" or "?" at the Telnet prompt to get a list of the commands available in your Telnet software.

Using Local versus Remote Commands
Once you have established a remote session, all commands you type will be sent to the Server Telnet on the remote host for execution.

If you want a Telnet command issued in the remote environment to be acted on locally by your client Telnet, on most systems you would normally precede the command with an escape sequence (a predetermined character or combination of characters that signal your Telnet software to execute the command that follows locally). For example, in NCSA Telnet for pc-compatible microcomputers, the F10 key is the escape character that alerts Telnet to execute locally the next command you type (to turn local echo on or off, or to toggle capture on or off, etc.).

The Telnet escape sequence by itself followed by "cr" returns you temporarily to your local operating environment. On UNIX systems, the escape sequence is usually the control key (CNTL) and left bracket ([) pressed simultaneously.

Logging On

To telnet to a computer, you need to know it's name. This can either be in words, like "steer.sdsu.edu" or as a numeric address, like "130.191.1.11". Some services require you to connect to a specific "port" on the remote computer. Type the port number, if there is one, after the Internet address. (For example, "telnet nri.reston.va.us 185".)
For more information, anonymous FTP to ftp.sura.net:/pub/nic/network.service.guides
ftp.sura.net:/pub/nic/how.to.telnet.guide

TELNET "host"
or
TELNET "cr" followed by OPEN "host" at the prompt.

The basic command set is simple. You also need to know either the machine domain name or the machine Internet address (a series of numbers). The numbers will always work; the names will work if they are in a software table available to your version of Telnet.

IBM systems that use TN3270 may require you to type a carriage return, "DIAL VTAM," or just "VTAM" in response to the first prompt from the remote system.

Logging Off

LOGOFF or LOGOUT (also try QUIT, END, EXIT, STOP, etc.)

CLOSE, prefixed by the escape sequence.

ABORT, prefixed by the escape sequence--use as a last resort!

To exit the remote system, first try that system's logoff command. To determine what the appropriate logoff command is, check the menus, help, and welcome screens when you first log on.
Oftentimes, the logoff information is listed there but not always easy to retrieve later.

Logging off the remote system may return you to your primary operating environment (all the way out of Telnet), or you may be left in Telnet. If so, type "quit".

But some information systems have no graceful exit for remote users. In that case, you have two options --- CLOSE or ABORT.

CLOSE should be your next choice after LOGOFF. If you are unable to CLOSE the connection normally (e.g., if your remote session is hung), try the Telnet ABORT command to drop your connection locally.

ABORT will return control to you in your local environment, but it may not properly terminate your session on the remote machine.
Since this can leave the port on the remote machine busy for an indefinite period even though you are no longer using it, ABORT should be used only as a last resort.

In either case, you can also try escaping back to your local environment and then issuing the termination commands. If one method doesn't work, try the other.

Other commands may allow you to control your communications environment.
Investigate the help systems both in your local Telnet and on the remote system at the outset.

Using the BREAK Key

Don't be hasty with the Break key. Too many Breaks may cause your Telnet session to be dropped!

There is no standard BREAK key across versions of Telnet and in remote information systems. Telnet is based on the concept of a network virtual terminal, in which the control functions (breaks, etc.) are communicated with characters regardless of terminal type (rather than line conditions, used in the terminal server environment). Your local Telnet receives your break and sends out a character sequence which is reinterpreted on the other end, hopefully as the break you intended.

Your Break may not always be understood by the remote system, so you should try HELP or ? when you begin (at the Telnet prompt) to determine what your version of Telnet uses as BREAK.

Tips: In UNIX, CNTL-C may work for BREAK. In the Mac environment, BREAK may be a click down menu option or a character combination.
In NCSA Telnet (a popular PC version), BREAK is F10 followed by a lower case letter "b".

Using the Backspace Key

The backspace character may not be recognized by the remote system. Investigate in your local Telnet how to set an erasing backspace. Type ? at the Telnet prompt, or SET ? for a list of possibilities.

Adjusting the Settings to your Needs

Most Telnet programs have the ability to SET or TOGGLE many of these settings on and off. Erasable backspace, local echo, carriage return interpretation ("cr" or "cr""lf" -- i.e., carriage return or carriage return with line feed), and the escape character you use to return to the local environment are things that you can usually SET or TOGGLE at the Telnet prompt. Type ? and use Telnet's internal help system to change a setting.

Using Function Keys

Remember that special function keys are local implementations and have no significance in a remote session. Function keys such as INSERT, DELETE, ERASE END-OF-FIELD, PF, and PA keys may not be recognized in the remote environment. Even though function keys and control key combinations may have significance on the remote system, they may vary from those on your local system.

SITES to telnet


American Mathematical Society's e-MATH
American Philosopical Assoc
ASK: German Universities Online Information
ASSET: Asset Source for Software Engineering Technology
CHAT: Conversational Hypertext Access Technology
Cleveland Free Net
Constitutional Documents (USA)
Cyberspace Station
Dartmouth Dante Project
ERIC (Educational Resources Info Center) documents
E.T. Net at the National Library of Medicine
GENBANK (DNA sequences)
General Accounting Office Documents
Geographic Name Server
Hewlett-Packard Calculator Bulletin Board
HYTELNET (unix version)
IDS World Network (formerly IDS DataForum)
Internet Gopher at the University of Minnesota
Knowbot Information Service
Libsearch (One stop access to various library catalogs)
Lunar & Planetary Institute
Magazine Index (Maricopa Community Colleges)
Meckler's Electronic Publishing Service
Meeman Archive of Environmental Journalism
NASA Online
NASA Spacelink
National Freenet (Ottawa, Canada)
National Science Foundation
Network Information Center On-Line Aid System (NICOLAS)
NEWTON: Educational Electronic Bulletin Board System
NPTN/USA Today Headline News
Project Gutenberg
Project Hermes (Supreme Court Decisions)
Reader's Guide to Periodical Literature
Shakespeare's Plays and Sonnets
SpaceMet Internet (Dept of Physics & Astronomy - UM Amherst)
SUPERNET International
U.S. Naval Observatory
University of Colorado NETFIND server
Weather Underground (Univ of Michigan)
Webster's Dictionary
The Well
World Factbook
ZIB Electronic Library, Germany

SITES to telnet (alphabetically)

cybernet.cse.fau.edu:
login: bbs.
περιέχει πολλές ενδιαφέρουσες και ποικίλες πηγες που περιλαμβάνουν internet mail, limited usenet hytelnet, finger, talk, multiuser chat, file downloading etc.

ebb.stat.-usa.gov:
login: guest.
Economic bulletin board. Λειτουργεί κάτω από τη διεύθυνση του US department of commerce. Εχει 20 ξεχωριστές περιοχές αρχείων, οι οποίες περιέχουν τις σημερινές εμπορικές και οικονομικές τάσεις και αντίστοιχες πληροφορίες.

echo.lu:
login: echo.
Host της ευρωπαικής κοινότητας που περιέχει επιστημονικές, εμπορικές, ερευνητικές και άλλες ΒΑΣΕΙΣ ΔΕΔΟΜΕΝΩΝ σε οποιαδήποτε από τις οκτώ γλώσσες της κοινότητας.

envnet.gsfc.nasa.gov:
login: envnet.
password: henniker
Ενα menu-driven φιλικό σύστημα παροχής περιβαλλοντολογικών δεδομένων σε μορφή κειμένου, γραφικών ή πινάκων.

mb.com:
loging: mb.
MarketBase. Πρόκειται για έναν online κατάλογο με προϊόντα και υπηρεσίες, ο οποίος παρέχει μια υπηρεσία forum, όπου αγοραστές και πωλητές συναντιώνται για την ανταλλαγή πληροφοριών σχετικά με διάφορα προϊόντα.

ttnbbs.rtpnc.epa.gov:
AIR POLUTION BBS. Περιέχει και διανέμει συλλογή πληροφοριών σχετικά με τη μόλυνση της ατμόσφαιρας, καθώς και τον έλεγχό της στο μέλλον.

inetsrvng.TRAVELING

name::
* McsEngl.inetsrvng.TRAVELING@cptIt,

Travelnet το Internet
Με το Διαδίκτυο ο κόσμος των ταξιδιών μπαίνει στο σπίτι μας. Ιδού μερικές χρήσιμες διευθύνσεις
Πληροφορίες για τις αεροπορικές εταιρείες
Στο Internet θα βρείτε τις διευθύνσεις περισσότερων από 220 αεροπορικών εταιρειών, αλλά και πληροφορίες για τις υπηρεσίες που παρέχουν, τον εξοπλισμό που διαθέτουν τα αεροπλάνα, τους προορισμούς, τα ωράρια, τις τιμές. Σήμερα, ελάχιστες εταιρείες σάς επιτρέπουν να κλείνετε το εισιτήριό σας και να επιλέγετε τη θέση σας στο αεροπλάνο. Ομως το ηλεκτρονικό εμπόριο αναπτύσσεται ταχύτατα στο Internet, ιδιαίτερα στον τομέα των ταξιδιών. Ως το τέλος του χρόνου θα μπορείτε να κανονίζετε μόνοι σας την αναχώρησή σας, αν πετάτε με την British Airways. Η Air France ακολουθεί ταχύτατα. Προσέξτε όμως να μη δώσετε ποτέ τον αριθμό της πιστωτικής σας κάρτας μέσω του δικτύου. Η τηλεφωνική επικοινωνία είναι προτιμότερη.
http: //www.travel.com/aviation/airline/al.html
Το Δίκτυο αναζητεί ευκαιρίες για σας
Είκοσι τέσσερις ώρες το 24ωρο ημέρα μπορείτε να συγκρίνετε τιμές, να συμβουλεύεστε τις προσφορές για αεροπορικά εισιτήρια, ενοικιάσεις αυτοκινήτων ή κρατήσεις δωματίων σε ξενοδοχεία, χωρίς κανέναν μεσάζοντα. Ζητήστε τις καλύτερες προσφορές και θα τις βρείτε μία ημέρα αργότερα, στην ηλεκτρονική σας διεύθυνση. Αν δεν γνωρίζετε λεπτομέρειες για τον προορισμό των αεροπλάνων, μπορείτε να συμβουλευθείτε τις διαθέσιμες μειωμένες τιμές στο «Global Village Discount Air Fares Database System». Για να κάνετε κρατήσεις, αρκεί να συμπληρώσετε το έντυπο «on line booking form».
http://www.airdiscounter.com
Η βίλα που θα νοικιάσετε στην άλλη άκρη του κόσμου
Ονειρεύεστε μια βίλα στη Φλόριδα ή ένα σπίτι σε ένα μικρό νησάκι, κάπου στον ωκεανό; Η αμερικανική υπηρεσία CyberRentals προτείνει χίλιες ενοικιάσεις σε περισσότερες από είκοσι χώρες (ΗΠΑ, Αυστραλία, Μπαχάμες, Καραϊβική, Κόστα Ρίκα, Γαλλία, Ιταλία, Βρετανία, Σουηδία, Ελλάδα, Μεξικό, Ταϊλάνδη). Αρκεί να κάνετε «κλικ» στη σημαία ή το όνομα της χώρας που επιθυμείτε να επισκεφθείτε, για να δείτε τη λίστα των προσφορών. Κάντε «κλικ» στην Ιταλία, και στην οθόνη σας εμφανίζεται η κατοικία των ονείρων σας. Μια παλαιά βίλα του 18ου αιώνα με δύο δωμάτια, για δύο ή τέσσερα άτομα, στο νησί Γκουιντέκα, με μια τεράστια βεράντα που έχει θέα στο Σαν Μάρκο, και τιμή 875 δολάρια την εβδομάδα. Μια φωτογραφία από τη βεράντα του σπιτιού προβάλλει στην οθόνη, για να επιβεβαιώσει τη θέα στο Σαν Μάρκο.
Αναζητήστε περισσότερες πληροφορίες στο θέμα «How to post your Vacation Home», http://cyberrentals.com
Τι καιρό θα κάνει αύριο στη Νέα Υόρκη;
«Είκοσι τέσσερις μετεωρολόγοι αποκλείεται να κάνουν λάθος» βεβαιώνει η υπηρεσία The Weather Channel στην αρχή των σελίδων της. Σκέπτεσθε να περάσετε το Σαββατοκύριακό σας στη Λισαβόνα ή στη Νέα Υόρκη; Προτού να κλείσετε εισιτήριο, μάθετε τι καιρό θα κάνει εκεί, με ένα απλό «κλικ» στο θέμα «International City Forecast». Αφού επιλέξετε την πόλη που σας ενδιαφέρει, θα βρείτε λεπτομέρειες για τις θερμοκρασίες τις επόμενες ημέρες, αλλά και εικόνες των δορυφόρων που καταγράφουν τα καιρικά φαινόμενα.
http://www.weather.com
Τα συμπτώματα αλλαγής της ώρας θεραπεύονται
Μια υπηρεσία του δικτύου είναι αφιερωμένη στα συμπτώματα του περίφημου jet lag. Ολες οι καταστάσεις εξηγούνται με λεπτομέρεια, ενώ δίνονται συμβουλές ώστε να μειωθούν τα αποτελέσματα της αλλαγής ώρας. Υπάρχει, μάλιστα, η δυνατότητα να παραγγείλετε ένα ειδικό αμερικανικό φάρμακο ομοιοπαθητικής, εγκεκριμένο από την αμερικανικό Οργανισμό Τροφίμων και Φαρμάκων.
http://www.nojetlag.com
Οι ταξιδιώτες μιλούν με τους ταξιδιώτες
Η σελίδα Expedia που δημιουργήθηκε από τη Microsoft σάς δίνει την ευκαιρία να συνομιλήσετε με ειδικευμένους δημοσιογράφους, έμπειρους ταξιδιώτες ή ντόπιους. Κάντε «κλικ» στο θέμα «ExpediaForum» για να βρείτε τον κατάλογο των newsgroups, των ομάδων συνομιλίας για θέματα όπως η Αφρική, η Αλάσκα, η Ασία, οι κρουαζιέρες ή τα πάρκα. Από την άλλη άκρη του κόσμου, κάποιος σας δίνει τις πληροφορίες που ζητάτε, καθώς και χρήσιμες διευθύνσεις. Μπορείτε, ακόμη, να διαβάσετε συζητήσεις ή να συμμετάσχετε σε αυτές.
http://www.expedia.com
Ενας γιατρός επί τόπου
Η υπηρεσία των Centers For Disease Control, κέντρων ερευνών και πρόληψης, παρέχει πληροφορίες για ένα κεφάλαιο πολύ χρήσιμο, την υγεία. Φεύγετε για τη Νοτιοανατολική Ασία; Κάντε «κλικ» στο «Southeast Asia». Κίτρινος πυρετός, επιδημίες, όλες οι ασθένειες στις οποίες πρόκειται να εκτεθείτε σε κάθε χώρα περιγράφονται, με λεπτομέρειες για τα συμπτώματα, τους τρόπους μετάδοσης και τις προφυλάξεις που πρέπει να πάρετε. Ειδική αναφορά γίνεται, μάλιστα, στις εγκύους και στα παιδιά.
http: //www.cdc.gov./travel/travel.html
Αλλες χρήσιμες υπηρεσίες
http://www.yahoo.com: Σελίδες που προτείνουν διάφορες χρήσιμες τοποθεσίες στους ταξιδιώτες, σε όλον τον κόσμο
http://www.all-hotels.com: Εδώ μπορείτε να κλείσετε δωμάτιο σε όλα τα ξενοδοχεία του κόσμου που είναι στο δίκτυο, ιδιαίτερα σε εκείνα που ανήκουν σε αλυσίδες όπως τα Sheraton, τα Oberoi ή τα Ramada Inn.
Διευθύνσεις στην Ελλάδα
(Εικόνα μεγέθους : 18224 bytes)
Ο ΕΟΤ σας συμβουλεύει
Συμβουλές από τον ΕΟΤ για το «πόσο πάει η ταρίφα» στα ταξί, πότε, πού και πώς μπορεί κάποιος να προμηθευθεί άδεια για φωτογράφιση στους αρχαιολογικούς χώρους, ποια είναι τα κόμιστρα σε πλοία, δελφίνια, καταμαράν... Επιπλέον, στις συγκεκριμένες σελίδες μπορείτε να βρείτε ιστορικά στοιχεία για την κάθε περιοχή αλλά και λεπτομερείς πληροφορίες (με φωτογραφίες) για ξενοδοχεία, ταξιδιωτικά γραφεία, κλαμπ, ιατρικά κέντρα, οικοτουρισμό. Ακόμη και αγγελίες για εξοχικές κατοικίες θα συναντήσετε. Με ένα κλικ, θα έχετε μπροστά σας φωτογραφία της βίλας και πληροφορίες για το πώς μπορείτε να την αποκτήσετε.
http://www.vacation.forthnet.gr/
Φθηνά τουριστικά πακέτα
Ως και 25% φθηνότερα προσφέρονται τουριστικά πακέτα, αποκλειστικά και μόνο στους χρήστες του Internet που θα επισκεφθούν τη συγκεκριμένη διεύθυνση. Και μια και θα «σερφάρετε» στην περιοχή, ρίξτε και μια ματιά στα καταλύματα που προτείνει. Μπορείτε ακόμη να νοικιάσετε αυτοκίνητο ή απλώς να πάρετε τις πληροφορίες που χρειάζεστε για ένα ταξίδι στην Ελλάδα.
http://agn.hol.gr/
Ευκαιρίες και έξυπνες λύσεις
Ταξιδιωτικά νέα, πληροφορίες για ξενοδοχεία και κάμπινγκ σε όλη την Ελλάδα, για αεροπορικές και ακτοπλοϊκές εταιρείες, για εταιρείες τσάρτερ, για κρουαζιέρες, για ενοικιάσεις γιοτ και αυτοκινήτων.
http://www.travelling.gr/
Ο καιρός ανά τον κόσμο
Μπορεί η Εθνική Μετεωρολογική Υπηρεσία να μη διαθέτει ακόμη σελίδες στο Internet, φρόντισε όμως γι' αυτό το Εθνικό Μετσόβιο Πολυτεχνείο. Είναι μάλιστα μία από τις καλύτερες διευθύνσεις καιρού στο παγκόσμιο διαδίκτυο, στην οποία μπορείτε να ανατρέχετε καθημερινά και να ενημερώνεστε έγκυρα και ευχάριστα (από τις εντυπωσιακές εικόνες που στέλνουν οι δορυφόροι) για τον καιρό σε οποιοδήποτε σημείο του πλανήτη. Ετσι προτού ξεκινήσετε για το ταξίδι σας μπορείτε να συμβουλευθείτε απευθείας τους επιστήμονες του ΕΜΠ.
http://www.ntua.gr/weather/
Πληροφορίες για τον ταξιδιώτη
Χάρτες, ξενοδοχεία, επαρχιακά τουριστικά γραφεία και άλλες πληροφορίες που μπορεί να χρειαστείτε ταξιδεύοντας στην Ελλάδα.
http://www.he.net/~gradus/tg/intex.html

ΤΟ ΒΗΜΑ, 05-04-1998 Κωδικός άρθρου: B12475T161

inetsrvng.USENET

name::
* McsEngl.inetsrvng.USENET@cptIt,
* McsEngl.conceptIt405,
* McsEngl.internet-usenet@cptIt,
* McsEngl.internet'usenet@cptIt405,
* McsEngl.usenet@cptIt405,

DEFINITION

The Usenet is a 'global bulletin board', of sorts, in which millions of people exchange public information on every conceivable topic.

For more, FTP to:
rtfm.mit.edu:/pub/usenet/news.answers/what-is-usenet/part1.Z
The file is also posted regularly to the Usenet newsgroup
"news.answers.newusers".

For those who do not have local access to Usenet, UNC Chapel Hill offers a full system open to everyone. To access, telnet bbs.oit.unc.edu and log on as bbs. You are even allowed to register so that you may post to Usenet. Personally, I find it very informative. I hope many of you will try it out.

Extracted from Brendan Kehoe's ZEN AND THE ART OF THE INTERNET

name::
* McsEngl.Extracted from Brendan Kehoe's ZEN AND THE ART OF THE INTERNET@cptIt,

Usenet News

Original from: chip@count.tct.com (Chip Salzenberg)
[Most recent change: 19 May 1991 by spaf@cs.purdue.edu (Gene Spafford)]

What Usenet Is

Usenet is the set of machines that exchange articles tagged with one or more universally-recognized labels, called newsgroups (or ``groups'' for short). (Note that the term newsgroup is correct, while area, base, board, bboard, conference, round table, SIG, etc. are incorrect. If you want to be understood, be accurate.)

The Diversity of Usenet

If the above definition of Usenet sounds vague, that's because it is.
It is almost impossible to generalize over all Usenet sites in any non-trivial way. Usenet encompasses government agencies, large universities, high schools, businesses of all sizes, home computers of all descriptions, etc.

Every administrator controls his own site. No one has any real control over any site but his own. The administrator gets his power from the owner of the system he administers. As long as the owner is happy with the job the administrator is doing, he can do whatever he pleases, up to and including cutting off Usenet entirely. C'est la vie.
...

Hierarchies
Newsgroups are organized according to their specific areas of concentration. Since the groups are in a tree structure, the various areas are called hierarchies. There are seven major categories:

comp
Topics of interest to both computer professionals and
hobbyists, including topics in computer science, software sources, and information on hardware and software systems.

misc
Group addressing themes not easily classified into any of the other
headings or which incorporate themes from multiple categories.
Subjects include fitness, job-hunting, law, and investments.

sci
Discussions marked by special knowledge relating to research in or
application of the established sciences.

soc
Groups primarily addressing social issues and socializing. Included
are discussions related to many different world cultures.

talk
Groups largely debate-oriented and tending to feature long
discussions without resolution and without appreciable amounts of
generally useful information.

news
Groups concerned with the news network, group maintenance, and software.

rec
Groups oriented towards hobbies and recreational activities

These ``world'' newsgroups are (usually) circulated around the entire Usenet---this implies world-wide distribution. Not all groups actually enjoy such wide distribution, however. The European Usenet and Eunet sites take only a selected subset of the more ``technical'' groups, and controversial ``noise'' groups are often not carried by many sites in the U.S. and Canada (these groups are primarily under the talk and soc classifications). Many sites do not carry some or all of the comp.binaries groups because of the typically large size of the posts in them (being actual executable programs).

Also available are a number of ``alternative'' hierarchies:

alt
True anarchy; anything and everything can and does appear;
subjects include sex, the Simpsons, and privacy.

gnu
Groups concentrating on interests and software with the GNU
Project of the Free Software Foundation. For further info on what the
FSF is, FSF.

biz
Business-related groups.

...

How Usenet Works

The transmission of Usenet news is entirely cooperative. Feeds are generally provided out of good will and the desire to distribute news everywhere. There are places which provide feeds for a fee (e.g. UUNET), but for the large part no exchange of money is involved.

...

Further information on how Usenet works with relation to the various transports is available in the documentation for the Cnews and NNTP packages, as well as in RFC-1036, the Standard for Interchange of USENET Messages and RFC-977, Network News Transfer Protocol: A Proposed Standard for the Stream-Based Transmission of News. The RFCs do tend to be rather dry reading, particularly to the new user.


Mail Gateways

A natural progression is for Usenet news and electronic mailing lists to somehow become merged---which they have, in the form of news gateways. Many mailing lists are set up to ``reflect'' messages not only to the readership of the list, but also into a newsgroup.
Likewise, posts to a newsgroup can be sent to the moderator of the mailing list, or to the entire mailing list. Some examples of this in action are comp.risks (the Risks Digest) and comp.dcom.telecom (the Telecom Digest).

...

Frequently Asked Questions

A number of groups include Frequently Asked Question (FAQ) lists,
which give the answers to questions or points that have been raised
time and time again in a newsgroup. They're intended to help cut
down on the redundant traffic in a group. For example, in the
newsgroup alt.tv.simpsons, one recurring question is Did you notice
that there's a different blackboard opening at the beginning of every
Simpsons episode? As a result, it's part of the FAQ for that group.

Usually, FAQ lists are posted at the beginning of each month, and are
set to expire one month later (when, supposedly, the next FAQ will be
published). Nearly every FAQ is also crossposted to news.answers,
which is used as a Usenet repository for them.

The Pit-Manager Archive

MIT, with Jonathan Kamens, has graciously dedicated a machine to the archiving and storage of the various periodic postings that are peppered throughout the various Usenet groups. To access them, "FTP" to the system pit-manager.mit.edu and look in the directory
/pub/usenet.

``Be it true or false, so it be news.''
Ben Jonson, News from the New World

inetsrvng.VIDEOCONFRENCING

name::
* McsEngl.inetsrvng.VIDEOCONFRENCING@cptIt,

netInt'Domain-Name-System

name::
* McsEngl.netInt'Domain-Name-System@cptIt,
* McsEngl.DNS@cptIt67i,
* McsEngl.domain-name-system@cptIt67i,
* McsEngl.internet-domain-name@cptIt67i,

_DESCRIPTION:
The Internet uses the Domain Name System (DNS) to associate numeric computer IP addresses with human readable names.
[https://en.wikipedia.org/wiki/Alternative_DNS_root]
===
The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most importantly, it translates domain names meaningful to humans into the numerical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.

An often-used analogy to explain the Domain Name System is that it serves as the phone book for the Internet by translating human-friendly computer hostnames into IP addresses. For example, the domain name www.example.com translates to the addresses 192.0.32.10 (IPv4) and 2620:0:2d0:200::10 (IPv6).

The Domain Name System makes it possible to assign domain names to groups of Internet resources and users in a meaningful way, independent of each entity's physical location. Because of this, World Wide Web (WWW) hyperlinks and Internet contact information can remain consistent and constant even if the current Internet routing arrangements change or the participant uses a mobile device. Internet domain names are easier to remember than IP addresses such as 208.77.188.166 (IPv4) or 2001:db8:1f70::999:de8:7648:6e8 (IPv6). Users take advantage of this when they recite meaningful Uniform Resource Locators (URLs) and e-mail addresses without having to know how the computer actually locates them.

The Domain Name System distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name servers for each domain. Authoritative name servers are assigned to be responsible for their particular domains, and in turn can assign other authoritative name servers for their sub-domains. This mechanism has made the DNS distributed and fault tolerant and has helped avoid the need for a single central register to be continually consulted and updated.

In general, the Domain Name System also stores other types of information, such as the list of mail servers that accept email for a given Internet domain. By providing a worldwide, distributed keyword-based redirection service, the Domain Name System is an essential component of the functionality of the Internet.

Other identifiers such as RFID tags, UPCs, International characters in email addresses and host names, and a variety of other identifiers could all potentially use DNS.[1][2]

The Domain Name System also specifies the technical functionality of this database service. It defines the DNS protocol, a detailed specification of the data structures and communication exchanges used in DNS, as part of the Internet Protocol Suite.
[http://en.wikipedia.org/wiki/Domain_Name_System]
===
Q: What is DNS?
A: DNS stands for Domain Name System. Whether you realize it or not, you use the DNS every time you use the Internet.

Think of the DNS as the phonebook of the Internet. You know websites by their URL (ex: www.example.com). The Internet only knows websites by their numerical address (ex: 127.0.0.1). When you type a URL into your browser and hit the Enter button on your keyboard, your computer automatically uses the DNS to look up its numerical address and get you to the site you are trying to visit.
The Internet simply wouldn't work without the DNS. For most of us, remembering a numerical address for every website we visit would be hard. (Think about the challenge remembering a seven-digit phone number often presents if you don't write it down.) Because of the DNS, you don't have to remember the numerical address of websites.

Most Internet Service Providers (ISP) have their own DNS servers, so if you're not yet using OpenDNS, you probably get your DNS service from your ISP by default.
[http://www.netgear.com/lpc#five]

dns'domain-name-space

name::
* McsEngl.dns'domain-name-space@cptIt,
* McsEngl.dns'domain-name-hierarchy@cptIt,
* McsEngl.domain-name-hierarchy@cptIt,

_WHOLE:
* internet-namespace#ql:netInt'namespace#

dns'alternative-dns-root

name::
* McsEngl.dns'alternative-dns-root@cptIt,

_DESCRIPTION:
The Internet uses the Domain Name System (DNS) to associate numeric computer IP addresses with human readable names. The top level of the domain name hierarchy, the DNS root, contains the top-level domains that appear as the suffixes of all Internet domain names. The official DNS root is administered by the Internet Corporation for Assigned Names and Numbers (ICANN). In addition, several organizations operate alternative DNS roots, often referred to as alt roots. These alternative domain name systems operate their own root nameservers and administer their own specific name spaces consisting of custom top-level domains.
The Internet Architecture Board (IAB) has spoken out strongly against alternate roots in RFC 2826.[1]
[https://en.wikipedia.org/wiki/Alternative_DNS_root]

dns'domain-name

name::
* McsEngl.dns'domain-name@cptIt,
* McsEngl.dns'domain@cptIt,
* McsEngl.domain-name@cptIt67i,
* McsEngl.inet'domain-name@cptIt,

_DESCRIPTION:
"A name indicates what we seek. An address indicates where it is. A route indicates how to get there."[2]
[http://en.wikipedia.org/wiki/IP_address]
===
A domain name is an identification label that defines a realm of administrative autonomy, authority, or control in the Internet. Domain names are hostnames that identify Internet Protocol (IP) resources such as web sites. Domain names are formed by the rules and procedures of the Domain Name System (DNS).

Domain names are used in various networking contexts and application-specific naming and addressing purposes. They are organized in subordinate levels (subdomains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TLDs), including the generic top-level domains (gTLDs), such as the prominent domains com, net and org, and the country code top-level domains (ccTLDs). Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet, create other publicly accessible Internet resources or run web sites. The registration of these domain names is usually administered by domain name registrars who sell their services to the public.

Individual Internet host computers use domain names as host identifiers, or hostnames. Hostnames are the leaf labels in the domain name system usually without further subordinate domain name space. Hostnames appear as a component in Uniform Resource Locators (URLs) for Internet resources such as web sites (e.g., en.wikipedia.org).

Domain names are also used as simple identification labels to indicate ownership or control of a resource. Such examples are the realm identifiers used in the Session Initiation Protocol (SIP), the DomainKeys used to verify DNS domains in e-mail systems, and in many other Uniform Resource Identifiers (URIs).

An important purpose of domain names is to provide easily recognizable and memorizable names to numerically addressed Internet resources. This abstraction allows any resource (e.g., website) to be moved to a different physical location in the address topology of the network, globally or locally in an intranet. Such a move usually requires changing the IP address of a resource and the corresponding translation of this IP address to and from its domain name.

Domain names are often referred to simply as domains and domain name registrants are frequently referred to as domain owners, although domain name registration with a registrar does not confer any legal ownership of the domain name, only an exclusive right of use.

The Internet Corporation for Assigned Names and Numbers (ICANN) manages the top-level development and architecture of the Internet domain name space. It authorizes domain name registrars, through which domain names may be registered and reassigned. The use of domain names in commerce may subject strings in them to trademark law. In 2010, the number of active domains reached 196 million.[1]
[http://en.wikipedia.org/wiki/Domain_name]

Quantity

{time.2012}:
Αρχίζει την Πέμπτη [2012-01-12] η καταχώρηση διεθνώς σχεδόν οποιασδήποτε λέξης ως κατάληξης στις διευθύνσεις του διαδικτύου, γεγονός που αποτελεί τη μεγαλύτερη επανάσταση στο Ίντερνετ από τη δημιουργία του στη δεκαετία του ΄80.
...
Σήμερα επισήμως υπάρχουν 312 τέτοιες καταλήξεις (top-level domain names), από τις οποίες η πιο δημοφιλής είναι το .com με περίπου 100 εκατ. καταχωρημένα ονόματα.
[http://www.nooz.gr/tech/erxetai-i-epanastasi-stis-dieu8inseis-tou-internet, 2012-01-12]

{time.2011}:
more than 215.000.000.
[http://www.tanea.gr/kosmos/article/?aid=4655743, 2011-09-10]

dns'domain-registration

name::
* McsEngl.dns'domain-registration@cptIt,

Registering a Domain

Domains can be registered from domain name registration companies.

These companies provide interfaces to search for available domain names, and they offer a variety of domain name extensions that can be registered at the same time.
[http://www.w3schools.com/hosting/host_domains.asp]

dns'fully-qualified-domain-name

name::
* McsEngl.dns'fully-qualified-domain-name@cptIt,
* McsEngl.dns'absolute-domain-name@cptIt,

_DESCRIPTION:
A fully qualified domain name (FQDN), sometimes also referred to as an absolute domain name,[1] is a domain name that specifies its exact location in the tree hierarchy of the Domain Name System (DNS). It specifies all domain levels, including the top-level domain and the root zone.[2] A fully qualified domain name is distinguished by its lack of ambiguity: it can be interpreted only in one way.
The DNS root domain is unnamed, which is expressed by the empty label, resulting in a fully qualified domain name ending with the dot character.
In contrast to a domain name that is fully specified, a domain name that does not include the full path of labels up to the DNS root, is often called a partially qualified domain name.
[https://en.wikipedia.org/wiki/Fully_qualified_domain_name]

dns'partially-qualified-domain-name

name::
* McsEngl.dns'partially-qualified-domain-name@cptIt,
* McsEngl.dns'relative-domain-name@cptIt,

_DESCRIPTION:
A partially qualified domain name does not include all labels to the DNS root. Such a name is also known as a relative domain name,[1][5] Relative domain names are often simply hostnames, i.e. the left-most label in a fully qualified name.
The portion of a fully qualified domain name that completes a partially qualified domain name is sometimes referred to as a domain suffix.
[https://en.wikipedia.org/wiki/Fully_qualified_domain_name]

dns'root-zone

name::
* McsEngl.dns'root-zone@cptIt,
* McsEngl.dns'root@cptIt,

_DESCRIPTION:
The Internet uses the Domain Name System (DNS) to associate numeric computer IP addresses with human readable names. The top level of the domain name hierarchy, the DNS root, contains the top-level domains that appear as the suffixes of all Internet domain names.
[https://en.wikipedia.org/wiki/Alternative_DNS_root]

dns'sub-domain

name::
* McsEngl.dns'sub-domain@cptIt,

Sub Domains
Most people are unaware that they use sub domains daily. The famous "www" of the World Wide Web is an example of a sub domain. Sub domains can be created on a DNS server, and they don't need to be registered with a domain name registrar, of course, the original domain name needs to be registered before a sub domain could be created.

Examples of sub domains used on the internet are http://store.apple.com and http://support.microsoft.com.

Sub domains can be requested from your web hosting provider.
[http://www.w3schools.com/hosting/host_domains.asp]

dns'top-level-domain

name::
* McsEngl.dns'top-level-domain@cptIt,

_DESCRIPTION:
A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet.[1] The top-level domain names are installed in the root zone of the name space. For all domains in lower levels, it is the last part of the domain name, that is, the last label of a fully qualified domain name.
For example, in the domain name www.example.com, the top-level domain is com.
Responsibility for management of most top-level domains is delegated to specific organizations by the Internet Corporation for Assigned Names and Numbers (ICANN), which operates the Internet Assigned Numbers Authority (IANA), and is in charge of maintaining the DNS root zone.
[https://en.wikipedia.org/wiki/Top-level_domain]

dns'zone

name::
* McsEngl.dns'zone@cptIt,

_DESCRIPTION:
A DNS zone is any distinct, contiguous portion of the domain name space in the Domain Name System (DNS) for which administrative responsibility has been delegated to a single manager.
The domain name space of the Internet is organized into a hierarchical layout of subdomains below the DNS root domain. The individual domains of this tree may serve as delegation points for administrative authority and management. However, usually it is furthermore desirable to implement fine-grained boundaries of delegation, so that multiple sub-levels of a domain may be managed independently. Therefore the domain name space is partitioned into areas (zones) for this purpose. A zone starts at a domain and extends downward in the tree to the leaf nodes or to the top-level of subdomains where other zones start.[1]
A DNS zone is implemented in the configuration system of a domain name server. Historically, it is defined in the zone file, an operating system text file that starts with the special DNS record type Start of Authority (SOA) and contains all records for the resources described within the zone. This format was originally used by the Berkeley Internet Name Domain Server (BIND) software package, and is defined in RFC 1034 and RFC 1035.
[https://en.wikipedia.org/wiki/DNS_zone]

dns'local

name::
* McsEngl.dns'local@cptIt,

Here are some development tips and tricks which you might find useful when doing web development. It involves some dns tricks and how to work with multiple sites on the same development machine.

Edit Your DNS
When developing web sites it is convenient to use proper domain names. This is especially true if you develop multiple web sites at the same time. Normally, your web server (e.g. Apache) will listen on 127.0.0.1 so you can just type http://127.0.0.1/ in your browser. However, there is a way to create domain name mappings on your computer for free.

This is done by editing your hosts file. On Mac and Linux, it can be found at /etc/hosts, on Windows at \Program Files\System32\drivers\etc\hosts. This file contains hard-coded dns mappings that the computer should use before asking a DNS server. Add the following to the line containing 127.0.0.1:

127.0.0.1 localhost www.example.com

You can then point your browser to http://www.example.com and it will automatically go to 127.0.0.1

Use .localhost domain names
While convenient, it is often good not to use the .com (or real) domain name for your development site. A good practice is to use the .localhost domain, e.g. www.example.localhost. This makes it simple and easy to know which domain you are working with. It will also not lead to confusion as to whether you've overriden the real dns mapping or not, since .localhost is not a public top level domain.
[http://www.selfsignedcertificate.com/development_tips.php]

dns'reverse-lookup

name::
* McsEngl.dns'reverse-lookup@cptIt,

Reverse DNS lookup is used to determine the domain name that corresponds with an IP address.
[http://www.monstaip.com/]

dns'server

name::
* McsEngl.dns'server@cptIt,
* McsEngl.dns-server@cptIt,

_DESCRIPTION:
Computers use IP addresses and not names and it is the job of the DNS server to translate the name to an IP address. All network clients (browsers, email clients, etc.) do this translation automatically behind the scene by connecting to a DNS server.
[http://barracudadrive.com/MxTunnel.lsp]

dns'resource

name::
* McsEngl.dns'resource@cptIt,

_ADDRESS.WPG:
* https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/,

netInt'Firewall#cptIt104#

name::
* McsEngl.netInt'Firewall@cptIt,

netInt'human

name::
* McsEngl.netInt'human@cptIt,
* McsEngl.inet'human@cptIt,

Postel.Jonathan-Bruce

_CREATED: {1943-1998}

name::
* McsEngl.Postel.Jonathan-Bruce@cptIt,

Jonathan Bruce Postel ( /p?'st?l/; August 6, 1943 – October 16, 1998) was an American computer scientist who made many significant contributions to the development of the Internet, particularly with respect to standards. He is known principally for being the Editor of the Request for Comment (RFC) document series, and for administering the Internet Assigned Numbers Authority (IANA) until his death.
The Internet Society's Postel Award is named in his honor, as is the Postel Center at Information Sciences Institute. His obituary was written by Vint Cerf and published as RFC 2468 in remembrance of Postel and his work. In 2012, Postel was inducted into the Internet Hall of Fame by the Internet Society.[1]
[http://en.wikipedia.org/wiki/Jon_Postel]

netInt'User

name::
* McsEngl.netInt'User@cptIt,
* McsEngl.conceptIt67.1,
* McsEngl.inet'user@cptIt,
* McsEngl.netizen@cptIt67.1,
* McsEngl.user-of-internet@cptIt67.1,
* McsEngl.internet'access@cptIt,
* McsEngl.internet'accessibility@cptIt,
====== lagoGreek:
* McsElln.διεισδυση-ιντερνετ@cptIt67.1, {2012-05-29}

_ADDRESS.WPG:
* https://www.weforum.org/agenda/2016/05/4-billion-people-still-don-t-have-internet-access-here-s-how-to-connect-them??
* https://www.weforum.org/agenda/2016/04/only-20-of-africans-use-the-internet-we-must-fix-this-digital-poverty-now??
* https://www.weforum.org/agenda/2016/01/is-this-miracle-material-set-to-connect-everyone-to-the-internet// More than three billion people in the world still don’t have Internet access. What if providing it were as simple as sticking a thin panel on the back of a tablet?
===
* http://www.internetlivestats.com/internet-users//

_DESCRIPTION:
As netizens, a shared duty falls on us to explore, exploit, and implement new technologies that benefits creators, not oppressors.
[https://blog.ethereum.org/2014/08/18/building-decentralized-web/]
===
What’s behind the digital divide?
There are four main reasons that so many people are still offline, according to Forum’s Internet for All report.

Infrastructure: One reason many people aren't logging on is simply that a good, fast connection is not available – 31% of the global population do not have 3G coverage, while 15% have no electricity. In sub-Saharan Africa some 600 million people (almost two thirds of the region's population) do not have regular electricity, and this applies to nearly a quarter of people living in South Asia.

Affordability: The cost of devices and connectivity is another factor preventing many people from accessing the internet, especially the 13% of the world population living below the poverty line. Broadband is only affordable for 100% of the population in just 29 countries.

Skills, awareness and cultural acceptance: A key barrier for some is education – 15% of adults globally are considered illiterate. There are also cultural issues, with women up to 50% less likely to be using the internet than men.

Local adoption and use: The vast majority (80%) of online content is only available in 10 languages, which only about 3 billion people speak as their first language.
[https://www.weforum.org/agenda/2016/05/4-billion-people-still-don-t-have-internet-access-here-s-how-to-connect-them?]

{time.2018}:
=== How Many People around the World Can Go Online?
In 2018, the percentage of the global population that uses the Internet surpassed 50% for the first time.

The world will reach a significant milestone for Internet connectivity by
the end of 2018. For the first time, more than half of the global
population will have online access. According to ITU, the United Nations
agency dedicated to information and communications technologies, more than
3.9 billion people, or 51.2 percent of the world population, will have the
ability to log on to the Internet and take part in the digital world. A
decade ago, online participation was estimated to be only 20 percent. In
the developed world, Internet activation rates jumped from 51.3 percent in
2005 to 80.9 percent today. In developing countries, cyber access soared
from 7.7 percent to 45.3 percent.

Read More:
http://www.wisegeek.com/how-many-people-around-the-world-are-online.htm?m {2018-12-15}

{time.2016}:
=== UIT: Πόσοι άνθρωποι στον πλανήτη δεν χρησιμοποιούν το ίντερνετ και γιατί
22-11-2016 - 23:35μμ
Περισσότεροι από τους μισούς κατοίκους του πλανήτη δεν χρησιμοποιούν το Ίντερνετ, κυρίως λόγω του απαγορευτικού κόστους του, σύμφωνα με μια έκθεση του ΟΗΕ που δόθηκε σήμερα Τρίτη στη δημοσιότητα.

Σύμφωνα με τη Διεθνή Ένωση Τηλεπίκοινωνιών (UIT), που εδρεύει στη Γενεύη, 3,9 δισεκατομμύρια άνθρωποι, από τα 7,4 δισεκατομμύρια που αριθμεί ο πλανήτης, δεν έχουν πρόσβαση στο διαδίκτυο. Σε δυσχερέστερη θέση βρίσκονται «οι γυναίκες, οι ηλικιωμένοι, οι άνθρωποι χαμηλού μορφωτικού επιπέδου, οι πιο φτωχοί και οι κάτοικοι αγροτικών περιοχών».

Η UIT υπογραμμίζει ότι το κυριότερο πρόβλημα είναι το υψηλό κόστος της ευρυζωνικής σύνδεσης που, αν και μειώθηκε γενικά την τελευταία δεκαετία, παραμένει «σαφώς απαγορευτικό» για πολλές φτωχές χώρες.

Το 2008, η μέση τιμή μιας ευρυζωνικής σύνδεσης ήταν στα 80 δολάρια τον μήνα, ενώ πέρσι έπεσε στα 25 δολάρια, σύμφωνα πάντα με τη Διεθνή Ένωση. Όμως στις φτωχότερες χώρες, μια μηνιαία συνδρομή ενός γιγαμπάιτ στοιχίζει πάνω από το μισό ετήσιο, ατομικό εισόδημα.

Η πρόσβαση στο διαδίκτυο μέσω των κινητών τηλεφώνων μπορεί να παράσχει μια λύση, σημειώνει η UIT υπενθυμίζοντας ότι το 84% του παγκόσμιους πληθυσμού έχει την τεχνολογική δυνατότητα να συνδεθεί μέσω των δικτύων κινητής τηλεφωνίας. Για πολλούς ανθρώπους όμως η τιμή της συσκευής, και η μηνιαία συνδρομή, είναι το βασικό πρόβλημα.

Προκειμένου να βελτιωθεί η πρόσβαση για όλους, τα Ηνωμένα Έθνη χρειάζονται πιο συγκεκριμένα στατιστικά στοιχεία για τους πληθυσμούς που βρίσκονται στο περιθώριο του «συνδεδεμένου κόσμου». «Απαιτείται μια επανάσταση των δεδομένων για να κατανοήσουμε καλύτερα ποιοι χρησιμοποιούν το Ίντερνετ, πού και πώς» τονίζεται στην έκθεση.

Η UIT υπογραμμίζει ότι οι συνδρομές κινητών τηλεφώνων, που θεωρούνταν εδώ και καιρό ενδεικτικές της συνδεσιμότητας, δεν αντικατοπτρίζουν με αξιόπιστο τρόπο την πραγματική χρήση των κινητών τηλεφώνων. Ενώ οι συνδρομές είναι σχεδόν ίσες με τον αριθμό των κατοίκων του πλανήτη, υπολογίζεται ότι το 40% των ανθρώπων σε ορισμένες περιοχές δεν διαθέτει ή δεν χρησιμοποιεί κινητό τηλέφωνο, κάτι που σημαίνει ότι οι στατιστικές κάνουν λάθος.
[http://www.altsantiri.gr/texnologia/posi-anthropi-ston-planiti-den-chrisimopioun-internet-ke-giati/]

{time.2015}:
=== ΟΗΕ: Χωρίς πρόσβαση στο διαδίκτυο το 57% του παγκόσμιου πληθυσμού
Μελέτη της Επιτροπής Broadband των Ηνωμένων Εθνών
ΔΗΜΟΣΙΕΥΣΗ: 2015-09-21
Το 57% του παγκόσμιου πληθυσμού παραμένει εκτός Διαδικτύου, αποτέλεσμα όχι μόνο της έλλειψης υποδομών σε λιγότερο αναπτυγμένες χώρες, αλλά και της απουσίας περιεχομένου στις απαιτούμενες γλώσσες καθώς και στον ψηφιακό αναλφαβητισμό, επισημαίνει μελέτη της Επιτροπής Broadband της Διεθνούς Ένωσης Τηλεπικοινωνιών ITU και της UNESCO, για το 2015.

Τέσσερα δισεκατομμύρια διακόσια εκατομμύρια άνθρωποι στον πλανήτη δεν έχουν τακτική πρόσβαση στο Ίντερνετ, προνόμιο του 43% του παγκόσμιου πληθυσμού. Την ίδια στιγμή, ένας στους δύο χρήστες του Διαδικτύου μπαίνει στο Facebook τουλάχιστον μια φορά το μήνα. Η μεγαλύτερη υπηρεσία κοινωνικής δικτύωσης κλήθηκε να εξυπηρετήσει 1 δισεκατομμύριο ανθρώπους για πρώτη φορά τον Αύγουστο του 2015.

Ο ρυθμός εισόδου νέων χρηστών στο Ίντερνετ δείχνει ανησυχητικά σημάδια μείωσης, γεγονός που αποδίδεται στον κορεσμό των αναπτυγμένων περιοχών του πλανήτη και τις δυσκολίες της επέκτασης των δικτύων σε αραιοκατοικημένες περιοχές. Από την άλλη, η Broadband Commission επισημαίνει ότι το πρόβλημα δεν αφορά μόνο στις υποδομές, αλλά και στην απουσία περιεχομένου στην γλώσσα που μιλούν στις αποκομμένες από τα δίκτυα περιοχές της γης, στην έλλειψη των στοιχειωδών γνώσεων που απαιτούνται για τον χειρισμό των συσκευών και άλλους παράγοντες.

Από την άλλη, το Ίντερνετ αποικείται από «πράγματα», ο αριθμός των οποίων αναμένεται να φτάσει τα 26 δισεκατομμύρια μέσα στα επόμενα πέντε χρόνια.

Στο πεδίο της κινητής τηλεφωνίας, διαπιστώνεται ότι υπάρχουν αρκετοί συνδρομητές που έχουν δύο κάρτες SIM. O λόγος, να μειώσουν το κόστος διαφορετικών υπηρεσιών, να αυξήσουν την κάλυψη από τα δίκτυα ή η ανάγκη για συνδέσεις σε δύο συσκευές -π.χ. smartphone και tablet.

Μπορείτε να διαβάσετε την μελέτη με τίτλο The State of Broadband 2015
[http://www.tovima.gr/world/article/?aid=739585]
=== Almost 40% of the world’s population has access to the internet.
[https://agenda.weforum.org/2015/07/is-online-education-reaching-the-masses/]
=== Ίντερνετ για το μισό πληθυσμό της Γης
ΑΘΗΝΑ 26/05/2015
Περίπου 3,2 δισεκατομμύρια άνθρωποι, σχεδόν ο μισός πληθυσμός του πλανήτη μας (7,2 δισ.) θα χρησιμοποιούν το διαδίκτυο έως το τέλος του 2015.

Αυτό προβλέπει μια νέα έκθεση της Διεθνούς Ένωσης Τηλεπικοινωνιών (ITU), σύμφωνα με το BBC.

Το 2000 υπήρχαν μόνο 400 εκατομμύρια χρήστες του Ίντερνετ παγκοσμίως, μόλις το ένα όγδοο του σημερινού αριθμού τους.

Περίπου τα δύο δισεκατομμύρια των χρηστών θα βρίσκονται στον αναπτυσσόμενο κόσμο.

Εξάλλου, εκτιμάται ότι έως το τέλος του έτους θα υπάρχουν στη Γη πάνω από επτά δισεκατομμύρια συνδρομές κινητής τηλεφωνίας.

Οι 78 στους 100 ανθρώπους στην Ευρώπη και τις ΗΠΑ ήδη χρησιμοποιούν ευρυζωνική κινητή τηλεφωνία και το 69% χρησιμοποιούν δίκτυα τρίτης γενιάς (3G), όμως μόνο το 29% των επαρχιακών περιοχών καλύπτεται.

Έως το τέλος του 2015, το 80% των νοικοκυριών στις ανεπτυγμένες χώρες και το 34% στις αναπτυσσόμενες θα έχουν πρόσβαση στο διαδίκτυο με κάποια μορφή.
[http://www.nooz.gr/article/sxedon-o-misos-pli8usmos-tis-gis-8a-xrisimopoiei-to-internet-eos-to-telos-tou-2015]

{time.2012}:
The internet empowers each one of us to speak, create, learn and share. Today, more than two billion people are online — about a third of the planet.
[http://edition.cnn.com/2012/11/29/business/opinion-cerf-google-internet-freedom/index.html]

{time.2011}:
today there are 2 billion netizens,
[http://www.economist.com/node/18681576]

{time.2009}:
As of 2009, an estimated one-quarter of Earth's population uses the services of the Internet.
[http://en.wikipedia.org/wiki/Internet]

{time.2007}:
Nearly 80 percent of U.S. adults go online
Poll finds about 178 million adults go online, spending an average 11 hours a week on the Internet.
By Reuters
Published: November 5, 2007, 9:05 PM PST

Do you find yourself going online more and more? You're not alone.

Four out of five U.S. adults go online now, according to a new Harris Poll.

The survey, which polled 2,062 adults in July and October, found that 79 percent of adults--about 178 million--go online, spending an average 11 hours a week on the Internet.
[http://www.news.com/Nearly-80-percent-of-U.S.-adults-go-online/2100-1038_3-6217159.html?tag=nefd.top]

{time.1997}:
Israel is the world's fifth-best Internet-connected country, after Finland, Iceland, Norway and Australia, with 51,000 users per million people.
[CNN 1997oct]

{time.1994}:
- H αρχή του 1994 βρήκε το δίκτυο να αποτελείται απο 16.500 δικτυα υπολογιστών, περιλαμβάνοντας περισσότερους απο 2.5 εκατ. υπολογιστές και συνδέοντας περισσότερους απο 15.000.000 χρήστες.
[TELECOM (CGO), APR 1994, 43]
- συνδέει περισσότερους απο 25.000.000 χρήστες. Απο το 1988 παρουσιάζει μια ιλιγγιώδη αυξητική τάση άνω του 75%.
[COMPUTER GO, SEP. 1994, 82]

{time.1993}:
ΠΕΡΙΣΣΟΤΕΡΑ ΑΠΟ 10.000.000 ΧΡΗΣΤΕΣ ΕΙΝΑΙ ΣΗΜΕΡΑ ΣΥΝΔΕΔΕΜΕΝΟΙ Σ'ΑΥΤΟ ΤΟΝ ΤΕΡΑΣΤΙΟ, ΠΑΓΚΟΣΜΙΟ "ΙΣΤΟ" ΤΗΣ ΠΛΗΡΟΦΟΡΙΚΗΣ.
ΣΤΟ ΔΙΚΤΥΟ ΒΡΙΣΚΟΝΤΑΙ ΗΔΗ ΣΥΝΔΕΔΕΜΕΝΕΣ ΧΙΛΙΑΔΕΣ ΕΠΙΧΕΙΡΗΣΕΙΣ ΚΑΙ ΠΑΝΕΠΙΣΤΗΜΙΑΚΑ ΙΔΡΥΜΑΤΑ ΣΤΙΣ ΗΠΑ, ΕΡΕΥΝΗΤΙΚΑ ΚΕΝΤΡΑ ΚΑΙ ΙΝΣΤΙΤΟΥΤΑ, Η ΒΙΒΛΙΟΘΗΚΗ ΤΟΥ ΚΟΓΚΡΕΣΟΥ ΚΑΙ Η NASA, ΑΛΛΑ ΚΑΙ ΑΝΑΛΟΓΟΙ ΧΡΗΣΤΕΣ ΑΠΟ ΤΗ ΣΙΓΚΑΠΟΥΡΗ ΚΑΙ ΤΗΝ ΙΑΠΩΝΙΑ, ΜΕΧΡΙ ΤΗΝ ΤΣΕΧΙΑ ΚΑΙ ΤΗΝ ΠΟΛΩΝΙΑ.
[ΚΑΘΗΜΕΡΙΝΗ, 3 ΟΚΤΩ 1993]

netInt'user.EU

name::
* McsEngl.netInt'user.EU@cptIt,

Σήμερα, μόνον το 1% των Ευρωπαίων έχουν σύνδεση σε υψηλής ταχύτητας Ίντερνετ μέσω οπτικών ινών, έναντι 12% των Ιαπώνων και 15% των Νοτιοκορεατών.

Επίσης μολονότι οι μισοί από τα 500 εκατ. Ευρωπαίων χρησιμοποιούν καθημερινά το Ίντερνετ, το 30% των πολιτών της ΕΕ δεν έχει χρησιμοποιήσει ποτέ το διαδίκτυο. Στόχος της Κομισιόν είναι έως το 2015 να έχει μειωθεί στο 15% των πολιτών της ΕΕ το ποσοστό όσων δεν έχουν χρησιμοποιήσει το Ίντερνετ στη ζωή τους.
[http://www.enet.gr/?i=news.el.episthmh-texnologia&id=164132] 2010-05-20
[http://ec.europa.eu/news/science/100519_en.htm]

Greece

ΕΛΣΤΑΤ: Επτά στα 10 νοικοκυριά έχουν πρόσβαση στο διαδίκτυο
Τετάρτη, 11 Νοεμβρίου 2015 12:30
Πρόσβαση σε ηλεκτρονικό υπολογιστή έχουν επτά στα 10 νοικοκυριά (ποσοστό 68,6%) και πρόσβαση στο διαδίκτυο από την κατοικία τους (ποσοστό 68,1%). Μάλιστα, την τελευταία πενταετία (2010- 2015) καταγράφεται αύξηση 46,8% στην πρόσβαση στο διαδίκτυο από την κατοικία.

Τα στοιχεία αυτά προκύπτουν από την έρευνα χρήσης τεχνολογιών πληροφόρησης και επικοινωνίας για το 2015 της ΕΛΣΤΑΤ. Ειδικότερα, στα ποσοστά των νοικοκυριών της χώρας που έχουν πρόσβαση σε ηλεκτρονικό υπολογιστή και στο διαδίκτυο από την κατοικία, καταγράφεται σε σχέση µε το 2014 αύξηση 7,2% και 3,8%, αντίστοιχα.

Αύξηση, σε σχέση µε το 2014, καταγράφεται στη Βόρεια Ελλάδα και στην Αττική (10,4% και 5,5%, αντίστοιχα), ενώ µείωση στην Κεντρική Ελλάδα και στα Νησιά Αιγαίου- Κρήτη (3,7% και 2,6%, αντίστοιχα).

Ευρυζωνική σύνδεση χρησιµοποιεί το 67,1%, του συνόλου των νοικοκυριών µε ένα τουλάχιστον µέλος ηλικίας 16-74 ετών, παρουσιάζοντας αύξηση 3,7%.

Οι κυριότερο λόγοι µη πρόσβασης στο διαδίκτυο από την κατοικία είναι:

η έλλειψη ικανοτήτων (60,7%),
ότι οι πληροφορίες που υπάρχουν στο διαδίκτυο δεν είναι χρήσιµες, δεν ενδιαφέρουν (25,9%), και
ότι το κόστος του εξοπλισμού είναι πολύ υψηλό (21,7%).

Για την ηλικιακή οµάδα 16- 24 ετών καταγράφεται σταθερό ποσοστό πρόσβασης στο διαδίκτυο για τα έτη 2014 και 2015. Η µεγαλύτερη αύξηση στο ποσοστό πρόσβασης (12,4%) καταγράφηκε για την ηλικιακή οµάδα 45- 54 ετών.

Αντίστοιχα, για όσους δεν έχουν χρησιµοποιήσει ποτέ το διαδίκτυο, η µεγαλύτερη µείωση (45,2%), σε σχέση µε το 2014, καταγράφηκε για την ηλικιακή οµάδα 25- 34 ετών.

REUTERS
Διείσδυση διαδικτύου
Από όσους συνδέθηκαν στο διαδίκτυο εκτός της κατοικίας και του χώρου εργασίας τους, µε κινητή συσκευή, το 57,4% χρησιµοποίησε κινητό ή smart phone, το 34,9% φορητό ηλεκτρονικό υπολογιστή (π.χ. laptop, tablet) και το 2,4% άλλη συσκευή (π.χ. PDA, MP3 player, e-book reader, φορητή κονσόλα παιχνιδιών κ.λπ.). Το υψηλότερο ποσοστό εν κινήσει σύνδεσης στο διαδίκτυο καταγράφεται για την ηλικιακή οµάδα 16- 24 ετών.

Η online ανάγνωση ειδήσεων σε ιστοσελίδες, εφηµερίδες, περιοδικά παραµένει, όπως και το 2014, στην κορυφή της λίστας των δραστηριοτήτων που πραγµατοποιούνται µέσω διαδικτύου µε ποσοστό 85,4%, ενώ η αναζήτηση πληροφοριών και υπηρεσιών, είναι η δεύτερη περισσότερο πραγµατοποιούµενη δραστηριότητα, µε ποσοστό 80,4%.

Αναφορικά µε τις διαδικτυακές υπηρεσίες cloud, 3 στους 10 (26,3%) από όσους χρησιµοποίησαν το διαδίκτυο το α΄ τρίµηνο του 2015 χρησιµοποίησαν διαδικτυακούς αποθηκευτικούς χώρους για να αποθηκεύσουν ή και να µοιραστούν µε άλλους έγγραφα, εικόνες, µουσική, videos ή άλλα αρχεία. Καταγράφεται, σε σχέση µε το 2014, αύξηση 44,5%.

Αύξηση 2,9% καταγράφεται, σε σχέση με το 2014, στο ποσοστό του πληθυσµού που έκανε χρήση υπηρεσιών ηλεκτρονικής διακυβέρνησης.

Ειδικότερα για όσους δεν απέστειλαν συµπληρωµένα έντυπα (όπως π.χ. φορολογική δήλωση) µέσω διαδικτύου ενώ είχαν να υποβάλουν, το 82,2% αυτών ανέφερε ότι η υποβολή των συµπληρωµένων εντύπων, έγινε, για λογαριασµό τους, από άλλα πρόσωπα, όπως για παράδειγµα από φοροτεχνικό, µέλος της οικογένειας, φίλο, κ.λπ., το 9,5% ότι δεν είχαν τις γνώσεις για να χρησιµοποιήσουν την ιστοσελίδα που χρειαζόταν και το 2,9% επικαλέστηκαν ανησυχία σχετικά µε την προστασία και την ασφάλεια των προσωπικών δεδοµένων.

Πηγή: ΑΜΠΕ
[http://www.naftemporiki.gr/story/1029445/elstat-epta-sta-10-noikokuria-exoun-prosbasi-sto-diadiktuo]

Γρήγορο κινητό ευρυζωνικό Internet σε ακόμη περισσότερες περιοχές από την COSMOTΕ
Αποστολέας Yannis on 25/01/09 (407 αναγνώσεις)
ΕΛΛΑΔΑ

Την κάλυψη του δικτύου της επεκτείνει διαρκώς η COSMOTE, προσφέροντας γρήγορο ευρυζωνικό Internet μέσω κινητού τηλεφώνου με ακόμη πιο υψηλές ταχύτητες σε περισσότερες περιοχές της Ελλάδας. Η εταιρία προσφέρει πλέον ταχύτητες λήψης δεδομένων (HSDPA ) έως 7,2 Mbps και αποστολής δεδομένων (HSUPA ) έως 1,5 Mbps και στην Πάτρα, το Ηράκλειο, το Ρέθυμνο, τα Χανιά, τη Μύκονο και τη Χαλκίδα, ενώ σε εξέλιξη βρίσκεται η επέκταση της κάλυψης και σε άλλες περιοχές και πόλεις της Ελλάδας.

Με πληθυσμιακή κάλυψη 85%, το ευρυζωνικό δίκτυο HSPA της COSMOTE είναι το μεγαλύτερο στην Ελλάδα, ενώ η εταιρία επενδύει σταθερά στην περαιτέρω επέκταση και αναβάθμιση του δικτύου της. Στο πλαίσιο αυτό, το δίκτυο της COSMOTE είναι ήδη έτοιμο για την υλοποίηση μεγαλύτερων ευρυζωνικών ταχυτήτων HSDPA έως 14,4 Mbps και HSUPA έως 5,8 Mbps, ενώ, εντός του 2009, προγραμματίζεται η αναβάθμιση σε ακόμα υψηλότερες ταχύτητες για λήψη δεδομένων έως 21 Mbps.

Υπενθυμίζεται ότι πρώτη η COSMOTE εισήγαγε το Mobile Broadband στην Ελλάδα τον Ιούνιο του 2006. Επεκτείνοντας την ευρυζωνική κάλυψη με υψηλούς ρυθμούς, ήδη τον Απρίλιο του 2007 η COSMOTE προσέφερε στους πελάτες της ταχύτητες HSDPA έως 3,6 Mbps, ενώ, πάλι πρώτη, τον Απρίλιο του 2008 υλοποίησε την αναβάθμιση σε HSDPA έως 7,2 Mbps και HSUPA έως 1,5 Mbps στην Αθήνα και τη Θεσσαλονίκη.

Η εταιρία έχει βραβευθεί για την πρωτοπορία της στο Mobile Broadband στο πλαίσιο του 10ου Διεθνούς Συνεδρίου Τηλεπικοινωνιών Info-Com World, με κεντρικό θέμα «Broadband Everywhere!».
[http://www.technews.gr/modules/news/article.php?storyid=2992] 2009-01-26

{time.2014}:
7 στα 10 νοικοκυριά είχαν το 2014 πρόσβαση στο ίντερνετ

ΑΘΗΝΑ 09/11/2014


Περίπου 7 στα 10 νοικοκυριά της χώρας (ποσοστό 65,6%) είχαν το 2014 πρόσβαση στο διαδίκτυο από την κατοικία τους, αριθμός αυξημένος κατά 16,5% σε σχέση με το 2013. Η μεγαλύτερη αύξηση καταγράφεται στην Κεντρική Ελλάδα και στα νησιά Αιγαίου και την Κρήτη κατά 53,2% και 39,3%.

Τα στοιχεία αυτά προκύπτουν από την έρευνα χρήσης τεχνολογιών πληροφόρησης και επικοινωνίας της ΕΛΣΤΑΤ για τα νοικοκυριά το 2014, σύμφωνα, επίσης, με την οποία:

- Περίπου 7 στα 10 νοικοκυριά (64,7%) χρησιμοποιούν ευρυζωνική σύνδεση για το διαδίκτυο στην κατοικία τους, ενώ η συντριπτική πλειονότητα (98,6%) των νοικοκυριών που έχουν πρόσβαση στο διαδίκτυο από την κατοικία τους χρησιμοποιεί ευρυζωνική σύνδεση.

- Το 58,4% όσων χρησιμοποίησαν το διαδίκτυο το α΄ τρίµηνο του 2014 συνδέθηκαν στο διαδίκτυο, εκτός της κατοικίας και του χώρου εργασίας τους, µε χρήση κινητού τηλεφώνου ή smartphone, φορητού υπολογιστή (laptop, notebook, netbook ή tablet) ή άλλης φορητής συσκευής (PDA, MP3 player, e-book reader, φορητή κονσόλα παιχνιδιών κλπ), παρουσιάζοντας αύξηση 30,7%, σε σχέση µε το α' τρίµηνο του 2013.

- Η online ανάγνωση ειδήσεων σε ιστοσελίδες, εφημερίδες, περιοδικά είναι στην κορυφή της λίστας των διαδικτυακών δραστηριοτήτων και πραγματοποιείται από το 84,9% των χρηστών του διαδικτύου, καταγράφοντας αύξηση 10% σε σχέση µε το 2013. Η αναζήτηση πληροφοριών για προϊόντα και υπηρεσίες είναι η δεύτερη περισσότερο πραγματοποιούμενη δραστηριότητα από το 82,3% των χρηστών, καταγράφοντας μικρή μείωση 1% σε σχέση µε το 2013.

Ειδικότερα, τα ποσοστά που καταγράφηκαν το 2014 για δραστηριότητες που πραγματοποιούνται µέσω διαδικτύου, κατά φθίνουσα σειρά, είναι τα εξής:

- ?ιάβασµα online ειδήσεων σε ιστοσελίδες, εφηµερίδες, περιοδικά 84,9%.

- Αναζήτηση πληροφοριών για προϊόντα και υπηρεσίες 82,3%.

- Αποστολή ή λήψη ηλεκτρονικών μηνυµάτων 79,8%.

- Συμμετοχή σε ιστοσελίδες κοινωνικής δικτύωσης (facebook, twitter κλπ.) 64,3%.

- Παιχνίδια, εικόνες, ταινίες, μουσική 52%.

- Web ραδιόφωνο ή web τηλεόραση 51,6%.

- Πραγματοποίηση κλήσεων ή βιντεοκλήσεων, µε χρήση web κάμερας µέσω του διαδικτύου (Skype) 45%.

- «Ανέβασμα» σε ιστοσελίδα κειμένου, φωτογραφιών, μουσικής, videos, λογισμικού κλπ προκειμένου να τα μοιραστούν µε άλλους 34,3%.

- Χρήση υπηρεσιών για ταξίδια και καταλύματα 29,7%.

- Πραγματοποίηση τραπεζικών συναλλαγών 20,8%.

- ?ημιουργία ιστοσελίδας ή blog 6,7%.

- Πώληση αγαθών ή υπηρεσιών µέσω δημοπρασιών πχ µέσω e-Bay, 5,7%.

- Κλείσιμο ραντεβού µε γιατρό µέσω της ιστοσελίδας νοσοκομείου ή κέντρου υγείας 2,9%.

Τέλος, αύξηση 26,7% καταγράφεται στο ποσοστό του πληθυσμού που έκανε χρήση υπηρεσιών ηλεκτρονικής διακυβέρνησης (κάθε συναλλαγή των πολιτών µε δημόσιες υπηρεσίες µέσω του διαδικτύου, για προσωπική χρήση).
[http://www.nooz.gr/tech/7-sta-10-noikokuria-eixan-to-2014-prosvasi-internet]

{time.2012}:
Η πορεία του Internet στην Ελλάδα
ΑΘΗΝΑ 29/05/2012
Σταθερά ανοδική παρουσιάζεται η πορεία του διαδικτύου στην Ελλάδα και η εξοικείωση των Ελλήνων χρηστών του με τις συνήθειες, τα… ήθη και τα έθιμά του, σύμφωνα με έρευνα της Focus Bari.
Η διείσδυση του Ιnternet στη χώρα μας λοιπόν εντοπίζεται στο 68% την ώρα που πέρυσι ήταν 61% και το 2008 μόλις 43%.

Ιδιαίτερα εντυπωσιακά είναι τα ποσοστά στις ηλικίες 13-17 και 18-24 με 96% και 95% αντίστοιχα, στοιχείο που αποδεικνύει πως οι νέες γενιές έχουν άψογη σχέση με το διαδίκτυο και τις υπηρεσίες του.

Η διείσδυση των online αγορών έχει εκτοξευτεί στο 18% από το μόλις 2% που βρισκόταν το 2001 με το 94% των e-καταναλωτών να δηλώνει ικανοποιημένο από την εμπειρία του.

Η εκτίμηση είναι ότι ο τομέας e-business θα συνεχίσει να αναπτύσσεται εκθετικά τα επόμενα χρόνια.Ενθαρρυντική είναι και η πορεία των κοινωνικών δικτύων στην Ελλάδα με τη διείσδυση των Facebook και Twitter να βρίσκεται στο 46% και 7% αντίστοιχα.

Οι χρήστες των social media ξοδεύουν κατά μέσο όρο 67 λεπτά τη μέρα στις αγαπημένες τους υπηρεσίες ενώ παραμένουν συνδεδεμένοι έξι μέρες τη βδομάδα!

Σε αυτό συμβάλλει και το γεγονός πως ο ένας στους πέντε Έλληνες είναι κάτοχος smartphone, έστω κι αν η κοινωνική δικτύωση από πλευράς downloads εφαρμογών βρίσκεται πίσω από τα παιχνίδια, τις ψυχαγωγικού χαρακτήρα εφαρμογές, τη μουσική και το βίντεο και τα ενημερωτικά apps.

Πηγή: digitallife.gr
[http://www.nooz.gr/tech/i-poreia-tou-internet-stin-ellada]

{time.2001}:
news.in.gr 2001-12-12
Αθήνα: Για πρώτη φορά το ποσοστό χρηστών του Διαδικτύου στην Ελλάδα ξεπέρασε κατά το α' εξάμηνο του 2001 το 10% του πληθυσμού άνω των 15 ετών, ενώ αναμένεται να υπερβεί το 12% μέχρι το τέλος του έτους, σύμφωνα με τα αποτελέσματα σχετικής έρευνας του υπουργείου Ανάπτυξης.
Η Ελλάδα «κέρδισε» τρεις ποσοστιαίες μονάδες στην χρήση του Internet το α' εξάμηνο, λόγω της σημαντικής επιτάχυνσης του ετήσιου ρυθμού αύξησης των χρηστών, ο οποίος αναμένεται να υπερβεί το τρέχον έτος το 60%, έναντι 33% το 2000.
Εάν διατηρηθούν οι ίδιοι ρυθμοί αύξησης, τότε αναμένεται ότι ο ρυθμός διείσδυσης του Internet στην Ελλάδα θα φτάσει το 2004 το 50%, έναντι 66% του μέσου όρου της Ευρωπαϊκής Ένωσης, ή περισσότερο εάν προωθηθεί -όπως αναμένεται- κατά το διάστημα αυτό και η τρίτη γενιά κινητής τηλεφωνίας.
Πηγή: ΜΠΕ

netInt'user.TEENAGER

name::
* McsEngl.netInt'user.TEENAGER@cptIt,

Τι θέλουν οι ανήλικοι online;
ΑΘΗΝΑ 24/02/2013

Την «ΤΟP TEN» λίστα των δικαιωμάτων που επιθυμούν να απολαμβάνουν οι ανήλικοι online ανέδειξε κλειστό online ερωτηματολόγιο της Δράσης Saferinternet.gr του Ελληνικού Κέντρου Ασφαλούς Διαδικτύου.

Πρώτο στη λίστα των 10 κορυφαίων online δικαιωμάτων αναδεικνύεται η προστασία της ιδιωτικότητάς τους με 83,8%, ενώ ακολουθεί το δικαίωμα ελέγχου στα δεδομένα που αναρτούν (58,2%).

Τρίτο κατά σειρά είναι να μην παρενοχλούνται από επιτήδειους στο διαδίκτυο (57,8%), κάτι που συνδέεται με το ακριβώς επόμενο δικαίωμα στη λίστα, δηλαδή να μπορούν να αναφέρουν εύκολα ύποπτες ή ενοχλητικές συμπεριφορές στους διαχειριστές των εκάστοτε ιστοχώρων (52,8%). Στην 5η θέση βρίσκουμε το δικαίωμα να μαθαίνουν πώς να προστατεύονται στο Διαδίκτυο (50,1%).

Το δικαίωμα στο ποιοτικό περιεχόμενο στο διαδίκτυο και η αποφυγή επιβλαβούς ή ενοχλητικού περιεχομένου έρχεται στην 6η θέση (40%), ενώ το δικαίωμα των ανηλίκων να μπορούν να παίζουν και να συνομιλούν με τους φίλους τους καταλαμβάνει την 7η θέση (38,6%). Στην 8η και 9η θέση αντίστοιχα τοποθετούνται το δικαίωμα των ανηλίκων να βοηθούν τους φίλους τους να πλοηγούνται με ασφάλεια (25,9%), και να μπορούν να μιλούν σε κάποιον έμπιστο για το τι τους έχει ενοχλήσει στο διαδίκτυο (24%).

Τελευταίο στη λίστα με μόλις 15,5%, είναι το δικαίωμα των ανηλίκων να μπορούν να δημιουργούν περιεχόμενο στο διαδίκτυο, γεγονός που δείχνει πως οι νέοι είτε δε γνωρίζουν πώς να δημιουργούν ποιοτικό περιεχόμενο, είτε προτιμούν να ψυχαγωγούνται από τους ιστοχώρους στο διαδίκτυο, παρά να είναι οι ίδιοι ενεργοί δημιουργοί.

Η έρευνα μέσω διαδικτυακού ερωτηματολογίου πραγματοποιήθηκε την περίοδο 23/10/2012 έως 15/01/2013 με αποδέκτες παιδιά και εφήβους, γονείς, και εκπαιδευτικούς όλων των βαθμίδων εκπαίδευσης, στο πλαίσιο των δράσεων για τον εορτασμό της φετινής και επετειακής (δεκαετία) Ημέρας Ασφαλούς Διαδικτύου (Safer Internet Day), που εορτάστηκε φέτος την Τρίτη, 5 Φεβρουαρίου σε 100 χώρες σε όλο τον κόσμο, τελώντας υπό την αιγίδα της αντιπροέδρου για την ΕΕ και Επιτρόπου για την Ψηφιακή Ατζέντα, Neelie Kroes. H θεματική του φετινού εορτασμού ήταν «Τα Δικαιώματα και οι υποχρεώσεις μας online», με το σύνθημα: «Σύνδεση με σύνεση! (Connect with respect!)».

Είναι ενδιαφέρον το γεγονός, ότι μερικά από τα παραπάνω δικαιώματα τέθηκαν στην ίδια θέση από τους γονείς και τους εκπαιδευτικούς, αλλά για κάποια από τα δικαιώματα υπάρχει σημαντική διαφοροποίηση μεταξύ των τριών ομάδων «Ανήλικοι – Γονείς – Εκπαιδευτικοί».

H δρ. Βερόνικα Σαμαρά, συντονίστρια του Ελληνικού Κέντρου Ασφαλούς Διαδικτύου με βάση τα παραπάνω επισημαίνει ότι «είναι ενδιαφέρον το γεγονός ότι οι ανήλικοι ζητούν επιτακτικά να προστατεύεται η ιδιωτικότητά τους στο διαδίκτυο, όταν οι ίδιοι αναρτούν σχεδόν καθημερινά υλικό που καθιστά αυτή την ιδιωτικότητα απλά αδύνατη. Πώς είναι δυνατόν, όταν αναρτούν φωτογραφίες –πολλές φορές πολύ προσωπικές ή που τους στοχεύουν στον πραγματικό κόσμο– να αναμένουν μετά από το διαδίκτυο και τους παρόχους των υπηρεσιών του να τους προστατεύσουν; Ας το σκεφθούν αυτό, πριν δημοσιεύσουν οτιδήποτε online».
[http://www.nooz.gr/tech/ti-8eloun-oi-anilikoi-online]

netInt'user.EVOLUTING

name::
* McsEngl.netInt'user.EVOLUTING@cptIt,

{time.2015}:
=== 3.2 billion people online, 4.1 offline:
The world took yet another small step towards becoming fully connected in 2015. An estimated 3.2 billion people are now online, up from 3 billion in 2014, according to a new report published by Facebook. But this means that a further 4.1 billion people, over half of the world's population, are without any internet connection at all.
[http://www.weforum.org/agenda/2016/02/4-reasons-4-billion-people-are-still-offline?]

netInt'Impact-social

name::
* McsEngl.netInt'Impact-social@cptIt,
* McsEngl.internet'cause@cptIt,
* McsEngl.internet'impact@cptIt,

According to a new OECD study, the net already accounts of 13% of American business output, impacting every industry, from communications to cars, and restaurants to retail. Not since Johannes Gutenberg invented the printing press, or Alexander Graham Bell the telephone, has a human invention empowered so many and offered so much possibility for benefiting humankind.
[http://edition.cnn.com/2012/11/29/business/opinion-cerf-google-internet-freedom/index.html]

Although technology and the Internet have taken a beating in the past for potentially limiting people's social interaction, a new study from the Pew Research Center has found that the opposite might be true.
According to a Pew Internet Personal Networks and Community survey, which polled 2,512 adults, the dawn of new technology and the Internet has not caused people to withdraw from society. In fact, the study found that "the extent of social isolation has hardly changed since 1985, contrary to concerns that the prevalence of severe isolation has tripled since then." Pew said that 6 percent of the entire U.S. adult population currently has "no one with whom they can discuss important matters or who they consider to be 'especially significant' in their life."
By: Don Reisinger NOVEMBER 5, 2009
[http://news.cnet.com/8301-1023_3-10391416-93.html?tag=newsEditorsPicksArea.0] 2009-11-06

netInt'Internet-of-Things

_CREATED: {2014-05-28}

name::
* McsEngl.netInt'Internet-of-Things@cptIt,
* McsEngl.IoT@cptIt,
* McsEngl.internet-of-everything@cptIt,
* McsEngl.internet-of-things@cptIt,
* McsEngl.IoT@cptIt,
* McsEngl.IoE@cptIt,

_EVOLUTING-of-NAME: A chart published recently by zdnet.com shows how overblown the buzz about the IoT has become. The trend line for Google searches for the term “internet of things” remained essentially flat until the middle of 2013. It started to climb steadily last autumn and then went through the roof in January 2014. The crescendo seems to have reached a peak with Google’s $3.2 billion acquisition in January of Nest Labs, a Silicon Valley start-up that makes internet-savvy thermostats and smoke/carbon dioxide detectors for the home. The IoT company was Google’s biggest investment since buying DoubleClick for $3.1 billion in 2007.
[http://www.economist.com/blogs/babbage/2014/05/difference-engine-1]

_DESCRIPTION:
the much-hyped Internet of Things – the linking of machines and objects to digital networks.
[https://agenda.weforum.org/2015/08/what-is-the-internet-of-things-worth/]
===
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Typically, IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications.[1] The interconnection of these embedded devices (including smart objects), is expected to usher in automation in nearly all fields, while also enabling advanced applications like a Smart Grid.[2]
Things, in the IoT, can refer to a wide variety of devices such as heart monitoring implants, biochip transponders on farm animals, automobiles with built-in sensors, or field operation devices that assist fire-fighters in search and rescue.[3] Current market examples include smart thermostat systems and washer/dryers that utilize wifi for remote monitoring.
According to Gartner, there will be nearly 26 billion devices on the Internet of Things by 2020.[4] ABI Research estimates that more than 30 billion devices will be wirelessly connected to the Internet of Things (Internet of Everything) by 2020.[5] As per a recent survey and study done by Pew Research Internet Project, a large majority of the technology experts and engaged Internet users who responded—83 percent—agreed with the notion that the Internet/Cloud of Things, embedded and wearable computing (and the corresponding dynamic systems [6]) will have widespread and beneficial effects by 2025.[7] It is, as such, clear that the IoT will consist of a very large number of devices being connected to the Internet.[8]
Integration with the Internet implies that devices will utilize an IP address as a unique identifier. However, due to the limited address space of IPv4 (which allows for 4.3 billion unique addresses), objects in the IoT will have to use IPv6 to accommodate the extremely large address space required. [9] [10] [11] [12] [13] Objects in the IoT will not only be devices with sensory capabilities, but also provide actuation capabilities (e.g., bulbs or locks controlled over the Internet).[14] To a large extent, the future of the Internet of Things will not be possible without the support of IPv6; and consequently the global adoption of IPv6 in the coming years will be critical for the successful development of the IoT in the future. [10] [11] [12] [13]
The embedded computing nature of many IoT devices means that low-cost computing platforms are likely to be used.[15] In fact, to minimize the impact of such devices on the environment and energy consumption, low-power radios are likely to be used for connection to the Internet. Such low-power radios do not use WiFi, or well established Cellular Network technologies, and remain an actively developing research area.[16] However, the IoT will not be composed only of embedded devices, since higher order computing devices will be needed to perform heavier duty tasks (routing, switching, data processing, etc.).[15] Companies such as FreeWave Technologies have developed and manufactured low power wireless data radios (both embedded and standalone) for over 20 years to enable Machine-to-Machine applications for the industrial internet of things.[17]
Besides the plethora of new application areas for Internet connected automation to expand into, IoT is also expected to generate large amounts of data from diverse locations that is aggregated and very high-velocity, thereby increasing the need to better index, store and process such data.[18][19][20]
Diverse applications call for different deployment scenarios and requirement, which have usually been handled in a proprietary implementation. However, since the IoT is connected to the Internet, most of the devices comprising IoT services will need to operate utilizing standardized technologies. Prominent standardization bodies, such as the IETF, IPSO Alliance and ETSI, are working on developing protocols, systems, architectures and frameworks to enable the IoT.[21][22]
[http://en.wikipedia.org/wiki/Internet_of_Things] 2015-01-08,
===
As of 2014, research into the Internet of Things is still in its infancy.[citation needed] In consequence, we lack standard definitions for Internet of Things. With the potential for great mischief through hacking, security issues are pivotal to the success of systems-integration designs. A survey lists several IoT definitions as formulated by different researchers.[23]
[23] Charith Perera, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos (2013). "Context Aware Computing for The Internet of Things: A Survey". Communications Surveys Tutorials, IEEE. Early Access (n/a): 1–44. doi:10.1109/SURV.2013.042313.00197.
[http://en.wikipedia.org/wiki/Internet_of_Things]
===
If the Internet of Things (IoT) was a train, it would have sensors on every moving part - every piston, every element of rolling stock and coupling gear. Everything would be measured from levels of wear to play, judder, temperature and pressure. IDG Connect’s guest writer Jon Collins says that the very fact that our train systems don’t yet incorporate all such capabilities is indicative of just how much potential the Internet of Things offers. Read on to get a five-point plan for IoT - and to avoid missing this fast train.
[IDGConnect@idgconnect-resources.com 2015-04-14]
===
Definition - What does Internet of Everything (IoE) mean?

The Internet of Everything (IoE) is a broad term that refers to devices and consumer products connected to the Internet and outfitted with expanded digital features. It is a philosophy in which technology's future is comprised of many different types of appliances, devices and items connected to the global Internet.

The term is somewhat synonymous with the Internet of Things (IoT).
Techopedia explains Internet of Everything (IoE)

IoE is based on the idea that in the future, Internet connections will not be restricted to laptop or desktop computers and a handful of tablets, as in previous decades. Instead, machines will generally become smarter by having more access to data and expanded networking opportunities.

Actual IoE applications range from digital sensor tools/interfaces used for remote appliances to smarter and more well-connected mobile devices, industrial machine learning systems and other types of distributed hardware that have recently become more intelligent and automated.

IoE features fall under two main categories:

Input: Allows analog or external data to be put into a piece of hardware
Output: Allows a piece of hardware to be put back into the Internet
The IoE term is driving much discussion about IT's future. For example, organizations like Cisco use the term in its branding to refer to the potential of modern and future technology.
[https://www.techopedia.com/definition/30121/internet-of-everything-ioe]

iot'address-of-entity

name::
* McsEngl.iot'address-of-entity@cptIt,
* McsEngl.iot'identifier@cptIt,

_DESCRIPTION:
All of the sensors and machine-readable identifiers needed to make the Internet of Things a reality will have to use IPv6 to accommodate the extremely large address space required. Even if the supply of IPv4 addresses were not to be exhausted soon, the size of IPv4 itself is not large enough to support the Internet of Things. To a large extent, the Internet of Things may be the ultimate driver of global adoption of IPv6 in the coming years.
[http://en.wikipedia.org/wiki/Internet_of_Things]

iot'evaluation

name::
* McsEngl.iot'evaluation@cptIt,

iot'human

name::
* McsEngl.iot'human@cptIt,

_DESCRIPTION:

iot'resource

name::
* McsEngl.iot'resource@cptIt,
* McsEngl.internet-of-things'resource@cptIt,

_ADDRESS.WPG:
* http://www.nooz.gr/tech/to-diadiktuo-ton-pragmaton-allazei-to-epixeirein, {2016-12-25}
* https://www.weforum.org/agenda/2016/07/the-internet-of-things-explained//
* https://www.weforum.org/agenda/2016/06/nanosensors-and-the-internet-of-nano-things??
* https://www.weforum.org/agenda/2015/11/is-this-future-of-the-internet-of-things//
* https://agenda.weforum.org/2015/08/what-is-the-internet-of-things-worth/
* http://www.weforum.org/agenda/2015/04/how-the-internet-of-things-will-change-your-life//
* http://www.economist.com/blogs/babbage/2014/05/difference-engine-1,

_DESCRIPTION:
In a seminal 2009 article for the RFID Journal, "That 'Internet of Things' Thing", Ashton made the following assessment:
Today computers—and, therefore, the Internet—are almost wholly dependent on human beings for information. Nearly all of the roughly 50 petabytes (a petabyte is 1,024 terabytes) of data available on the Internet were first captured and created by human beings—by typing, pressing a record button, taking a digital picture, or scanning a bar code. Conventional diagrams of the Internet ... leave out the most numerous and important routers of all - people. The problem is, people have limited time, attention and accuracy—all of which means they are not very good at capturing data about things in the real world. And that's a big deal. We're physical, and so is our environment ... You can't eat bits, burn them to stay warm or put them in your gas tank. Ideas and information are important, but things matter much more. Yet today's information technology is so dependent on data originated by people that our computers know more about ideas than things. If we had computers that knew everything there was to know about things—using data they gathered without any help from us—we would be able to track and count everything, and greatly reduce waste, loss and cost. We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so.[22]
—Kevin Ashton, 'That 'Internet of Things' Thing', RFID Journal, July 22, 2009
[http://en.wikipedia.org/wiki/Internet_of_Things]

iot'security

name::
* McsEngl.iot'security@cptIt,

_DESCRIPTION:
A different criticism is that the Internet of Things is being developed rapidly without appropriate consideration of the profound security challenges involved and the regulatory changes that might be necessary.[60] In particular, as the Internet of Things spreads widely, cyber attacks are likely to become an increasingly physical (rather than simply virtual) threat.[61] In a January, 2014 article in Forbes, cybersecurity columnist, Joseph Steinberg, listed many Internet-connected appliances that can already “spy on people in their own homes” including televisions, kitchen appliances, cameras, and thermostats.[62]
[http://en.wikipedia.org/wiki/Internet_of_Things]

{time.2013}:
Last year, for instance, the United States Fair Trade Commission filed a complaint against TrendNet, a Californian marketer of home-security cameras that can be controlled over the internet, for failing to implement reasonable security measures. The company pitched its product under the trade-name “SecureView”, with the promise of helping to protect owners’ property from crime. Yet, hackers had no difficulty breaching TrendNet’s security, bypassing the login credentials of some 700 private users registered on the company’s website, and accessing their live video feeds. Some of the compromised feeds found their way onto the internet, displaying private areas of users’ homes and allowing unauthorised surveillance of infants sleeping, children playing, and adults going about their personal lives. That the exposure increased the chances of the victims being the targets of thieves, stalkers or paedophiles only fuelled public outrage.
More such incidents are bound to follow. When mechanical devices are controllable online there is always going to be a risk that control will fall into the wrong hands, notes Womble Carlyle, an American law firm with expertise in information technology. For instance, a refrigerator can be switched off remotely, causing food to spoil. A bath can be turned on and left running over a weekend, flooding the home and causing large utility bills. More seriously, an insulin pump can be sent into overdrive, or the brakes of a car disabled.
[http://www.economist.com/blogs/babbage/2014/05/difference-engine-1]

iot'thing (device)

name::
* McsEngl.iot'thing (device)@cptIt,

_SPECIFIC:
* iot'device,
* iot'thing,
* animal,
* computer
* device,
* everday-object,
* human
* sensor,
* thing,
===
* McsEngl.iotdvc@cptIt,
* iotdvc,

_DESCRIPTION:
A thing, in the Internet of Things, can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low -- or any other natural or man-made object that can be assigned an IP address and provided with the ability to transfer data over a network. So far, the Internet of Things has been most closely associated with machine-to-machine (M2M) communication in manufacturing and power, oil and gas utilities. Products built with M2M communication capabilities are often referred to as being smart. (See: smart label, smart meter, smart grid sensor)
[http://whatis.techtarget.com/definition/Internet-of-Things]
===
Note that some things in the Internet of Things will be sensors, and sensor location is usually important.
[http://en.wikipedia.org/wiki/Internet_of_Things]
===
a proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.
"if one thing can prevent the Internet of things from transforming the way we live and work, it will be a breakdown in security"
[google dict]

_DESCRIPTION:
Applications[edit]
Fields of applications include: waste management, urban planning, environmental sensing, social interaction gadgets, sustainable urban environment, continuous care, emergency response, intelligent shopping, smart product management, smart meters, home automation and smart events.[56][57]
For example, Songdo, South Korea, the first of its kind fully equipped and wired ubiquitous, or smart city is near completion. Nearly everything in this digital metropolis of smart homes is planned to be wired, connected and turned into a constant stream of data that would be monitored and analyzed by an array of computers with little, or no human intervention. Thus, Internet of Things, or embedded intelligence in things, with "smart systems that are able to take over complex human perceptive and cognitive functions and frequently act unnoticeably in the background"[58] is a close reality.
[http://en.wikipedia.org/wiki/Internet_of_Things]

_CONSUMER_IoT:
The same goes for the rest of the consumer IoT. At present, this comprises little more than a handful of different types of sensors that can be controlled by a smartphone app, and used by owners to adjust the heating, turn on the lights, monitor security cameras or unlock the front door remotely. That is a far cry from an internet of things, in which all manner of devices communicate with one another in a collaborative and meaningful manner.
[http://www.economist.com/blogs/babbage/2014/05/difference-engine-1]

iotdvc'doing.USAGE

name::
* McsEngl.iotdvc'doing.USAGE@cptIt,

_DESCRIPTION:
the OECD says that IoT devices can help governments make their operations more efficient, and transform transportation monitoring, eHealth, and energy.
[https://www.weforum.org/agenda/2016/03/which-countries-are-the-biggest-early-adopters-of-the-internet-of-things/]

iotdvc'space-of-entity

name::
* McsEngl.iotdvc'space-of-entity@cptIt,

_DESCRIPTION:
The GeoWeb and Digital Earth are promising applications that become possible when things can become organized and connected by location.
[http://en.wikipedia.org/wiki/Internet_of_Things]

iotdvc'time-of-entity

name::
* McsEngl.iotdvc'time-of-entity@cptIt,

iotdvc'quantity-of-entities

name::
* McsEngl.iotdvc'quantity-of-entities@cptIt,

_DESCRIPTION:
Cisco created a dynamic "connections counter" to track the estimated number of connected things from July 2013 until July 2020 (methodology included).[13]
[13] "Cisco Connections Counter:" dynamic, online widget displays the number of connections being made at any one moment in time. http://newsroom.cisco.com/feature-content?type=webcontent&articleId=1208342
[http://en.wikipedia.org/wiki/Internet_of_Things] 2014-05-28

{time.2015-2022}:
But recent research suggests IoT is a trend that is here to stay: there will be an estimated 4.9 billion connected devices by the end of the year – an increase of 30% from last year – and that figure could hit 25 billion by 2020. And while in 2013 the IoT market in manufacturing operations was already worth $42.4 billion, that will grow to $98.9 billion by 2018. As with mobile technology 15 to 20 years ago, the IoT revolution is just beginning, and over the next two decades it will have a profound impact on businesses, the economy and society.
[https://agenda.weforum.org/2015/08/is-data-the-new-currency/]

netInt'ISP

name::
* McsEngl.netInt'ISP@cptIt,
* McsEngl.conceptIt67.3,
* McsEngl.inet'conection@cptIt,
* McsEngl.ISP@cptIt,
* McsEngl.isp@cptIt67i,
* McsEngl.Internet-service-provider@cptIt,
* McsEngl.vendor@cptIt,

_DESCRIPTION:
An Internet service provider (ISP) is an organization that provides access to the Internet.
Internet service providers can be either community-owned and non-profit, or privately owned and for-profit.
Access ISPs directly connect clients to the Internet using copper wires, wireless or fiber-optic connections.[1] Hosting ISPs lease server space for smaller businesses and other people (colocation). Transit ISPs provide large amounts of bandwidth for connecting hosting ISPs to access ISPs.[2]
[http://en.wikipedia.org/wiki/Internet_service_provider]
===
Παλιότερα προσβαση στο δίκτυο παρείχαν πανεπιστημια. Σήμερα το δικαίωμα προσβασης παρεχουν, αντί αμοιβής, ΙΔΙΩΤΙΚΕΣ ΕΤΑΙΡΙΕΣ παροχής online υπηρεσιών.[79]

Ο provider παρεχει προσβαση του χρήστη με ένα ΚΟΜΒΟ του δικτυου. Ο κόμβος είναι ένα υπολογιστικο σύστημα που συγκεντρώνει και διαχειρίζεται τις συνδέσεις των επιτόπιων χρηστών και την επικοινωνία τους με το δίκτυο

Μπορεί το internet να είναι ένα, αλλά οι υπηρεσίες που παρεχει ο προμηθευτής διαφοροποιούνται σε αρκετά σημεία.
- αποθηκευτικο χώρο
- χρεωση
- τηλεφωνικες γραμες, ταχύτητα host modems που στέλνουν στο χρήστη δεδομένα, μισθωμένες γραμές που επικοινωνεί με το δίκτυο ο προμηθευτής
- user interface
- υποστήριξη στο χρήστη
[COMPUTER GO, SEP. 1994, 105]

{time.1990}:
The Internet started off as a closed network between government research laboratories and relevant parts of universities. As it became more popular, universities and colleges started giving more of their members access to it. As a result of its popularity, commercial Internet service providers sprang up to offer access to the Internet to anyone willing to pay for the service, mainly to those who missed their university accounts. In 1990, Brookline, Massachusetts-based The World became the first commercial ISP.[3]
[http://en.wikipedia.org/wiki/Internet_service_provider]

netInt'Shut-down

name::
* McsEngl.netInt'Shut-down@cptIt,
* McsEngl.internet'shut-down@cptIt,

What Drastic Measures Has Algeria Taken to Prevent Exam Fraud?
In June 2018, Algeria shut down the Internet for several hours each day to prevent students from cheating on exams.

In Algeria, cheating on national high school graduation exams appears to
have been rampant in recent years. In 2016, for example, more than 500,000
students were forced to retake the tests after it was determined that
questions and answers had popped up online before the start of each test
session. To combat this problem, in June 2018, the authorities pulled the
plug on the Internet for up to three hours a day, for an entire week -- and
in the process, significantly disrupted the daily lives and businesses of
millions of Algerian citizens.

Read More:
http://www.wisegeek.com/what-drastic-measures-has-algeria-taken-to-prevent-exam-fraud.htm?m {2018-10-09}

SPECIFIC

ARIADNE NETWORK

Είναι το δικτυο του Δημόκριτου που πρώτο εξασφάλισε πρόσβαση σε ιδιώτες χρήστες.

ΠΛΗΡΟΦΟΡΙΕΣ:
ΕΚΕΦΕ ΔΗΜΟΚΡΙΤΟΣ, 15310 ΑΓΙΑ ΠΑΡΑΣΚΕΥΗ, 6513392, 6536351.

ΧΡΕΩΣΗ:
11800 το τρίμηνο

COMPULINK

COMPUPRESS AE, 9238672-5

3000 το μήνα.

CYTA

_ADDRESS.WPG:
* http://cyta.gr//

ΖΗΝΩΝΟΣ ΕΙΡΗΝΗ:
2155605000

DIALUP

name::
* McsEngl.internet'dialup-conection@cptIt,

{time.2012}:
In 2012, AOL still made 1/3 of its revenue from dial-up Internet
subscribers.

In the United States, more than 114 million households used dial-up
Internet service from America Online (AOL) in 2012. Although the number of
dial-up users dropped by about 15% from the previous year, about 2.2% of
the US population was using dial-up Internet service in 2012. By
comparison, about 70% of American adults used high-speed broadband Internet
connections. A 2009 Pew Internet survey found that the main reasons people
still used dial-up were that it was more affordable than broadband or
because high-speed Internet wasn’t available where they lived. Those who
didn’t have any Internet service tended to cite a lack of interest as the
reason.
Read More: http://www.wisegeek.com/do-people-still-use-dial-up.htm?m, {2013-10-16}

HELLAS ON LINE

BBS, χρησιμοποιεί το Major BBS προγραμα και το DOS.

14400 το εξάμηνο.

Συνδέεται με dialup με το ΙΤΕ

τηλ. 620.3047

netInt'IPFS

_CREATED: {2016-04-02}

name::
* McsEngl.netInt'IPFS@cptIt,
* McsEngl.IPFS@cptIt,

_DESCRIPTION:
IPFS is an emerging standard for storing content addressable files. Content-addressable
storage is a mechanism for storing information that can be retrieved based on its content rather
than its location. Stated another way, all files stored using IPFS are given names derived from
the hash of their content.
What this means is that the same file will have the same name on every computer, and the
contents of that file can never change without also changing the name of the file. It also means
that when you download a file from a server you can verify that it is the exact file you requested
by recalculating the name based on the content provided by the server.
IPFS also provides a peer to peer (P2P) network layer that allows computers to discover and
share files based on their deterministic names. However, this P2P network layer does not
provide or guarantee storage, hosting, or bandwidth. As it is currently structured, the IPFS
network expects users to provide their own servers and related infrastructure.
[https://github.com/EOSIO/Documentation/blob/master/EOS.IO%20Storage.pdf]
===
IPFS (the InterPlanetary File System) is a new hypermedia distribution protocol, addressed by content and identities. IPFS enables the creation of completely distributed applications. It aims to make the web faster, safer, and more open.

IPFS is a distributed file system that seeks to connect all computing devices with the same system of files. In some ways, this is similar to the original aims of the Web, but IPFS is actually more similar to a single bittorrent swarm exchanging git objects. You can read more about its origins in the paper IPFS - Content Addressed, Versioned, P2P File System.

IPFS is becoming a new major subsystem of the internet. If built right, it could complement or replace HTTP. It could complement or replace even more. It sounds crazy. It is crazy.
[https://github.com/ipfs/ipfs#overview]

Ipfs'evaluation

name::
* McsEngl.Ipfs'evaluation@cptIt,

_DESCRIPTION:
However, there are a couple of issues with the whole IPFS approach:
* Website address is ugly and no one will ever remember it. We need a way to make it prettier like something.com or anything.org.
* Anytime you make a change to your website and upload it again on IPFS the hash of your content will change, meaning the address of the website will change too.
[https://medium.com/coinmonks/how-i-hosted-my-website-on-ipfs-431919d7440a]

Ipfs'resource

name::
* McsEngl.Ipfs'resource@cptIt,

_ADDRESS.WPG:
* https://github.com/ipfs/ipfs,
* https://ipfs.io//
* https://awesome.ipfs.io/,
* https://orion.siderus.io/#/ Orion is an easy to use IPFS Desktop client,
===
* https://filebase.com/blog/a-beginners-guide-to-ipfs-content-addressing/
* https://blog.ipfs.io/2021-01-21-how-we-put-ipfs-in-brave/,
* {2018-05-16} https://medium.com/coinmonks/how-i-hosted-my-website-on-ipfs-431919d7440a,
* {2018-09-26} https://medium.com/@rtradetechnologies/introduction-to-ipfs-the-new-improved-web-efc89f158e6f,
* https://blog.neocities.org/its-time-for-the-permanent-web.html,
* {2018-05-03} Kaspar Triebstok, How IPFS is Challenging the Web as We Know It, https://blog.rubiksdigital.com/how-ipfs-is-disrupting-the-web-e10857397822,
* https://macwright.org/2017/08/09/decentralize-ipfs.html,

netInt'Law

name::
* McsEngl.netInt'Law@cptIt,

_GENERIC:
* law#cptCore23#

GERMANY PASSES WORLD'S FIRST CYBERSPACE LAW
Germany on Friday (jul04) became the first country to pass a law regulating the free-wheeling global electronic space of the Internet. Chancellor Helmut Kohl's government says the so-called multimedia law creates legal clarity that will help boost commercialization of cyberspace and combats illegal uses of the Internet such as for pornography. The law gained final approval in the upper house of parliament six months after the government proposed it. It takes effect August 1.
[cnn 1997jul07]

netInt'LISTSERV

name::
* McsEngl.netInt'LISTSERV@cptIt,

LISTSERV=LIST SERVER.
(the revised) LISTSERV is a database program, written by Eric Thomas. It attemps to make possible for users to extract relevant information from list archives without having to retrieve a large "notebook" file and scan it locally.

COMMANDS:
tell listserv@nodeid
DATABASE LIST = gives a list of the listserver databases.
search rosemary in "database.name" = searches for the word rosemary.
sarrch ("in C" or "In C") and program in UTILITY =
*  LISTSERV:
Many e-journals are distributed by listserv software. Subscribing to a
listserv which distributes an e-journal means you will receive issues
of the e-journal as they come out. Most journals distributed by list-
servs include information on the journal's listserv e-mail address.

Listservs are computer programs which maintain lists of e-mail addresses.
When you join a listserv, your e-mail address is added to the list. When
a listserv subscriber sends a message to the list, that message is re-
distributed to all other list subscribers. E-journals distributed in this
manner are simply e-mail messages.

Subscribe to a listserv by sending a single line message to the listserv
address in the form of:

SUBSCRIBE LISTNAME your_name
*******************************************************************
Example: To subscribe to the LIST REVIEW SERVICE "jnl.032" send a single
line message to: LISTSERV@UMSLVMA.UMSL.EDU consisting of:
SUBSCRIBE LSTREV-L Raleigh Muns

netInt'Management

name::
* McsEngl.netInt'Management@cptIt,
* McsEngl.internet'management@cptIt, {2012-12-03}

Δεν υπάρχει κεντρική διαχείριση του δικτύου.

netInt'CENSORSHIP

name::
* McsEngl.netInt'CENSORSHIP@cptIt,
* McsEngl.censorship-of-internet@cptIt,
* McsEngl.internet'Freedom@cptIt,
* McsEngl.online-free-speech@cptIt67i,
* McsEngl.global-code-of-conduct@cptIt67i,
* McsEngl.global-network-initiative@cptIt67i,

_DESCRIPTION:
"Censorship is out of control lately.
The most effective way to prevent the spread of stupid ideas is to expose them as stupid, not censorship like we see Steem, Reddit, Twitter, etc."
[{2020-04-11} https://twitter.com/lukestokes/status/1248743366415790082]
===
When we think of the internet, it’s tempting to picture a world with no rules, and no limits. In reality, though, what is allowed in one country is very different to that allowed in another.
According to a recent study by Freedom on the Net, two-thirds of all internet users – 67% – live in countries where criticism of the government, military, or ruling family is subject to censorship.
[https://www.weforum.org/agenda/2016/12/freedom-on-the-net-2016-where-are-social-media-users-under-pressure??]

Big tech companies back global plan to shield online speech
* October 27, 2008 9:25 PM PDT
By Miguel Helft and John Markoff
The New York Times

Google, Microsoft, and Yahoo and a group of human rights and public interest organizations plan to introduce Wednesday a global code of conduct that they say will better protect online free speech and privacy against government intrusion.

The principles are the starting point for a new effort, called the Global Network Initiative, which commits the companies to "avoid or minimize the impact of government restrictions on freedom of expression," according to a final draft of documents obtained by The New York Times.

Stating that privacy is "a human right and guarantor of human dignity," the initiative commits the companies to try to resist overly broad demands for restrictions on freedom of speech and overly broad demands that could compromise the privacy of their users.

The initiative was begun after human rights groups and Congress criticized the Internet companies for cooperating with Chinese government censorship and demands for information on dissidents. In addition to laying out the code of conduct, the initiative will provide a nongovernmental forum for the companies and human rights groups to jointly resist demands for censorship. It will also establish a system of independent auditors to rate the companies' conduct.

"This is an important first step in providing standards for free expression and privacy that obligate companies to do more to challenge government restrictions," said Michael Posner, president of Human Rights First, who agreed to discuss the initiative after The Times obtained the documents. "It sets up an accountability mechanism that will allow each of the companies to be evaluated over time."

In addition to the three American companies, two European telecommunications companies, France Telecom and Vodafone, are also considering participating. And members of the initiative are hoping to recruit additional companies.

So far, AT&T, Verizon Communications, and Sprint Nextel, which were embarrassed in 2005 after it was discovered they were cooperating with the National Security Agency in a warrantless surveillance scheme by the Bush administration, have not signed on.

The principles have the backing of prominent human rights organizations, including the Committee to Protect Journalists, Human Rights Watch, and Human Rights in China. Business for Social Responsibility and the Center for Democracy and Technology helped lead the two-year talks, and organizations like Harvard University's Berkman Center for Internet and Society and the Calvert Group, a socially responsible money manager, also participated.

But the effort is already being criticized by some human rights activists.

"After two years of effort, they have ended up with so little," said Morton Sklar, executive director of the World Organization for Human Rights USA. "It is really very little more than a broad statement of support for a general principle without any concrete backup mechanism to ensure that the guidelines will be followed."

Currently Google, Microsoft's MSN division and Yahoo's Chinese affiliate are all cooperating with the Chinese government's demands that search results be filtered. This month, Canadian researchers revealed that the Chinese version of the Skype Internet chat and telephony client had been modified to permit the logging of chat sessions and storage of the information on server computers belonging to Skype's Chinese partner, Tom, a wireless and Internet company.

Yahoo has been harshly criticized for its decision in 2004 to help Chinese authorities identify Shi Tao, a Chinese business reporter, who had sent a brief of a government document calling for press censorship to his private Yahoo e-mail account. Shi is now serving a 10-year prison sentence.

Asked whether the principles would have made a difference in the Shi case, Sklar said, "My guess is it wouldn't have had any effect at all."

Entire contents, Copyright © 2008 The New York Times. All rights reserved.

Add a Comment (Log in or register) 1 comment
by someguy999 October 27, 2008 10:52 PM PDT
this is lame... everyone knows that they'll publicly claim that they're going to protect it but when push comes to shove and the government says "give us the records or we're charge you for billions"... they'll all roll over. This is a lame publicity stunt.

netInt'ICANN

name::
* McsEngl.netInt'ICANN@cptIt,
* McsEngl.ICANN@cptIt67i,
* McsEngl.Internet-Corporation-for-Assigned-Names-and-Numbers@cptIt,

_DESCRIPTION:
The Internet Corporation for Assigned Names and Numbers (ICANN, /'a?kζn/ eye-kan) is a nonprofit private organization headquartered in Marina del Rey, California, United States, that was created on September 18, 1998, and incorporated on September 30, 1998[1] to oversee a number of Internet-related tasks previously performed directly on behalf of the U.S. government by other organizations, notably the Internet Assigned Numbers Authority (IANA), which ICANN now operates.
ICANN is responsible for the coordination of the global Internet's systems of unique identifiers and, in particular, ensuring its stable and secure operation.[2] This work includes coordination of the Internet Protocol address spaces (IPv4 and IPv6) and assignment of address blocks to regional Internet registries, for maintaining registries of Internet protocol identifiers, and for the management of the top-level domain name space (DNS root zone), which includes the operation of root nameservers. Most visibly, much of its work has concerned the DNS policy development for internationalization of the DNS system and introduction of new generic top-level domains (TLDs). The actual technical maintenance work of maintenance of the central Internet address pools and DNS root registries ICANN performs pursuant to the "IANA function" contract.
ICANN's primary principles of operation have been described as helping preserve the operational stability of the Internet; to promote competition; to achieve broad representation of the global Internet community; and to develop policies appropriate to its mission through bottom-up, consensus-based processes.[3]
On September 29, 2006, ICANN signed a new agreement with the United States Department of Commerce (DOC) that moves the private organization towards full management of the Internet's system of centrally coordinated identifiers through the multi-stakeholder model of consultation that ICANN represents.[4]
[http://en.wikipedia.org/wiki/Icann]
===
Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN).

_ATTRIBUTE:
Founded  September 18, 1998
Location  Marina del Rey, California, U.S.
Key people  Rod Beckstrom
Focus  Manage Internet protocol numbers and Domain Name System root
Website  www.icann.org
[http://en.wikipedia.org/wiki/Icann]

{time.2015}
=== Η κατάληξη .app στην Google για 25 εκατ. δολάρια
ΔΙΑΔΙΚΤΥΟ 28.02.2015 : 17:34

Η αμερικανική εταιρεία τεχνολογίας, λογισμικού και ηλεκτρονικών ειδών Google ανακοίνωσε ότι αγόρασε τη διαδικτυακή κατάληξη .app έναντι ποσού 25 εκατ. δολαρίων, μετέδωσε το δίκτυο BBC.

Η Google απέκτησε την κατάληξη .app σε πλειστηριασμό του Συστήματος Ονομάτων Τομέα του Διαδικτύου, της γνωστής Icann. Όπως αναφέρει το BBC, το ποσό των 25 εκατ. δολαρίων αποτελεί ρεκόρ για αντίστοιχες δημοπρασίες. Η θυγατρική της Google, Charleston Road Registry, ανακοίνωσε ότι το .app θα χρησιμοποιηθεί από προγραμματιστές εφαρμογών για "έξυπνες" συσκευές.

Έως τώρα έχουν δημοπρατηθεί κι άλλες δημοφιλείς καταλήξεις όπως το .baby, το .tech, το .salon αλλά και το .VIP. Η κατάληξη .baby αγοράστηκε έναντι 3 εκατ. δολαρίων από την φαρμακευτική εταιρεία Johnson & Johnson, η οποία δραστηριοποιείται στο χώρο της παρασκευής βρεφικών και παιδικών προϊόντων.

Η εταιρεία Dot Tech LLC αγόρασε την κατάληξη .tech για 6,76 εκατ. δολάρια.

Πηγή: BBC, ΑΠΕ-ΜΠΕ
[http://www.kathimerini.gr/805569/article/texnologia/diadiktyo/h-katalh3h-app-sthn-google-gia-25-ekat-dolaria]

{time.2014}
High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. http://www.ft.com/cms/s/0/123d1154-abc4-11e3-aad9-00144feab7de.html#ixzz2w8Ou57vN

March 14, 2014 11:40 pm
US relinquishes control of internet’s addressing system
By Richard Waters in San Francisco
A customer uses a computer in an internet cafe at Changzhi, Shanxi province January 25, 2010. China widened its attack against U.S. criticisms of Internet censorship on Monday, raising the stakes in a dispute that has put Google in the middle of a political quarrel between the two global powers. REUTERS/Stringer (CHINA - Tags: POLITICS SCI TECH) CHINA OUT. NO COMMERCIAL OR EDITORIAL SALES IN CHINA - RTR29FC5©Reuters
The Obama administration said on Friday that it would give up control of the internet’s addressing system, marking one of its most significant responses yet to the international outcry over revelations of widespread US internet surveillance.
The offer to hand control of the internet addressing system to the private sector also signalled an end to a long-running dispute over a key aspect of the internet. Other countries have pushed Washington for more than 15 years to give up its final sanction over the global network.
More
ON THIS TOPIC
Trademark protection grows as net expands
Companies ignore web’s Big Bang
Amazon and Google to compete for domains
Icann defends domain name allocation plan
IN US POLITICS & POLICY
US continues pursuit of Indian diplomat
Calls for Obama to slow deportation
Senate deal will extend jobless benefits
Watchdog faults DoJ over mortgage cases
The US began a transition in 1997 that was meant to bring the eventual privatisation of Icann, the body that assigns internet addresses. However, a change in the political mood in Washington after the 9/11 terrorist attacks left the body under the ultimate sanction of the Department of Commerce.
It has taken the outcry over internet surveillance to prompt the US finally to promise to give up its privileged role in overseeing the global internet, said Milton Mueller, a professor at Syracuse University who had proposed a way for the US to hand over its powers to an international body.
“The Snowden revelations had a lot to do with it, even though the NSA spying had nothing to do with Icann,” he said.
International anger over the revelations led to a call from a group of influential internet organisations last October for the US to step back from the internet addressing system.
In what became known as the Montevideo statement, the group warned of “the undermining of trust and confidence of internet users globally due to recent revelations of pervasive monitoring and surveillance”, raising the risk that the internet would fragment into separate national networks.
The US was also set to face pressure at a meeting over governance due to take place in Brazil next month, with calls growing for it to hand over more control.
Protect the open web and promise of the digital age

Richard Waters
There is much to be lost if companies and nations put up fences around our digital open plans, says Richard Waters.
Continue reading
Technically, control of the internet’s Domain Name System has left the US in a position to disrupt internet access in other countries, though few experts involved in the field believe it would ever have taken such a radical step.
However, the requirement for the commerce department to renew Icann’s contract every three years has left the body subject to intense lobbying in Washington, bringing a heavy political aspect to decision-making, Mr Mueller said.
While promising to step back, the Obama administration nonetheless made clear on Friday that it wanted Icann itself to shape the debate about how authority is handed to a new international group.
The National Telecommunications and Information Administration, part of the commerce department, said it had asked Icann to assemble a group of “international stakeholders” to decide the next step forward.
It also said it would block any attempt to transfer the internet addressing powers to any government-led group, reflecting continued US resistance to calls for the UN to take over the role.
[http://www.ft.com/intl/cms/s/0/123d1154-abc4-11e3-aad9-00144feab7de.html#axzz2w8MGk0G3]

Resource

_ADDRESS.WPG:
* https://www.weforum.org/agenda/2016/10/the-14-people-and-seven-keys-that-control-the-internet??

netInt'Namespace

name::
* McsEngl.netInt'Namespace@cptIt,
* McsEngl.inet'namespace@cptIt,
* McsEngl.internet'namespace@cptIt,

_DESCRIPTION:
The Internet maintains two principal namespaces,
- the domain name hierarchy[3] and
- the Internet Protocol (IP) address spaces.[4]
The Domain Name System maintains the domain name hierarchy and provides translation services between it and the address spaces.
Internet name servers and a communication protocol implement the Domain Name System.[5]
A DNS name server is a server that stores the DNS records for a domain name, such as address (A) records, name server (NS) records, and mail exchanger (MX) records (see also list of DNS record types); a DNS name server responds with answers to queries against its database.
[http://en.wikipedia.org/wiki/Domain_Name_System]

netInt'Node

name::
* McsEngl.netInt'Node@cptIt,

{time.1994}:
H αρχή του 1994 βρήκε το δίκτυο να αποτελείται απο 16.500 δικτυα υπολογιστών, περιλαμβάνοντας περισσότερους απο 2.5 εκατ. υπολογιστές και συνδέοντας περισσότερους απο 15.000.000 χρήστες.
[TELECOM (CGO), APR 1994, 43]

1990: Today (1990) it has become the intangible eighth wonder of the world, connecting 936 networks, at least 175,000 computers and countless users in 35 countries.
- 750.000 ΣΤΑΘΜΟΥΣ
[ΒΗΜΑ, 2 ΜΑΙΟ 1993, Δ39]

1993: ΔΙΚΤΥΑ ΣΥΝΔΕΔΕΜΕΝΑ: ΕΙΝΑΙ ΣΥΝΔΕΔΕΜΕΝΟ ΜΕ ΤΟΥΛΑΧΙΣΤΟΝ 11.000 ΔΙΑΣΥΝΔΕΔΕΜΕΝΑ ΜΙΚΡΟΤΕΡΑ ΔΙΚΤΥΑ ΥΠΟΛΟΓΙΣΤΩΝ.
[ΚΑΘΗΜΕΡΙΝΗ, 3 ΟΚΤΩ 1993]


ARPAnet,
Bitnet,
EUnet,
MILnet,
NSFnet,
SURANet,
UUCP (Unix to Unix Copy Program),

Terminal connection: on a host computer on the internet. Use of emulation package.

IP connection: You are on the internet.

netInt'device-connected

name::
* McsEngl.netInt'device-connected@cptIt,

{2015}:
By the end of 2015, there were 8.1 billion internet-connected, claims a report by IHS Technology.
These devices consist of smartphones, tablets, PCs, TVs and TV-attached devices such as Apple TV and Chromecast, and audio devices. Averaged out across the globe, this works out at four devices per household.
[http://www.zdnet.com/article/over-8-billion-devices-connected-to-the-internet/]

netInt'Port

name::
* McsEngl.netInt'Port@cptIt,
* McsEngl.port'of'internet@cptIt67i,

_DEFINITION:
It is a 16bit number that represents an internet service.

** Το σύνολο των θυρών του TCP|UDP είναι 65.535 και χωρίζονται σε τρεις κατηγορίες:
-- απο 0 έως 1023 χρησιμοποιούνται από διάφορες γνωστές υπηρεσίες/λειτουργίες:
 * την 80 χρησιμοποιεί το http.
 * τις 25 και 110 το email (smtp και pop3).
-- από 1024 μέχρι 49.151 είναι οι δεσμευμένες θύρες που χρησιμοποιούνται από διάφορες εμπορικές ή μή εφαρμογές και παιγνίδια:
 * την 5.631 χρησιμοποιεί το PCAnywhere.
 * την 26.000 το Quake.
-- από 49.152 μέχρι 65.535 είναι οι δυναμικές/ιδιωτικές θύρες.
[ram 2002.05, 205]

netInt'problem

name::
* McsEngl.netInt'problem@cptIt,
* McsEngl.inet'problem@cptIt,
* McsEngl.internet'problem@cptIt,

_DESCRIPTION:
The internet, our greatest tool of emancipation, has been transformed into the most dangerous facilitator of totalitarianism we have ever seen. The internet is a threat to human civilization.
Julian Assange
[https://twitter.com/noamchomskyT/status/1282317841711206400]

netIntpbm'resource

name::
* McsEngl.netIntpbm'resource@cptIt,

_ADDRESS.WPG:
* https://www.weforum.org/agenda/2016/04/10-forces-that-threaten-to-tear-the-internet-apart??

netInt'addiction

name::
* McsEngl.netInt'addiction@cptIt,
* McsEngl.addiction.internet@cptIt,
* McsEngl.internet'addiction@cptIt,
====== lagoGreek:
* McsElln.διαδίκτυο'εθισμός@cptIt,
* McsElln.εθισμός.διαδίκτυο@cptIt,

_GENERIC:
* infotech-addiction#ql:techinfo'addiction#

Η Ελλάδα πρώτη στην υπερβολική χρήση του Διαδικτύου
25-09-2015 - 9:13πμ

Η Ελλάδα, με ποσοστό 31% έναντι 5% του ευρωπαϊκού μέσου όρου, κατέχει την πρώτη θέση στην υπερβολική χρήση του διαδικτύου, σε σχέση με τις άλλες ευρωπαϊκές χώρες και τη Ρωσία.

Αυτό, τουλάχιστον, προκύπτει από τα πιο πρόσφατα στοιχεία των 31 Γραμμών Βοηθείας του Πανευρωπαϊκού Δικτύου Insafe κατά το δεύτερο εξάμηνο του 2014, σύμφωνα με το Ελληνικό Κέντρο Ασφαλούς Διαδικτύου.

Ως δεύτερο κυριότερο πρόβλημα για την Ελλάδα αναδεικνύεται η προστασία της online ιδιωτικότητας με 16%, ενώ την τρίτη θέση κατέχει ο διαδικτυακός εκφοβισμός με 19%. Οι αντίστοιχοι ευρωπαϊκοί μέσοι όροι ανέρχονται σε 12% για την ιδιωτικότητα και 21% για τον διαδικτυακό εκφοβισμό.

Σύμφωνα με τα στατιστικά στοιχεία της Γραμμής Βοηθείας του Ελληνικού Κέντρου Ασφαλούς Διαδικτύου για το πρώτο τετράμηνο του 2015, έχουν, ήδη, πραγματοποιηθεί 180 αναφορές για υπερβολική χρήση διαδικτύου, 96 αναφορές για θέματα online ιδιωτικότητας (κατάχρηση-προστασία προσωπικών δεδομένων) και 65 αναφορές για κυβερνο-εκφοβισμό.

Επίσης, οι αναφορές για τη σεξουαλικότητα και τις online σχέσεις αναδεικνύονται σε καινούρια τάση, καθώς το ποσοστό αυξήθηκε στο 10% στις αρχές του 2015, από 7% στις αρχές του 2014. Οι σχετικές αναφορές προέρχονται κατά 75% από το γυναικείο φύλο και 25% από το ανδρικό, ενώ μόνο ένα 14% είναι ανήλικοι.
[http://www.altsantiri.gr/ellada/i-ellada-proti-stin-ipervoliki-chrisi-tou-diadiktiou/]

Ν.Κορέα: Πατέρας άφησε τον γιο του να πεθάνει από την πείνα
Ο 22χρονος έπαιζε βιντεοπαιχνίδια επί μέρες ολόκληρες χωρίς να πάει σπίτι
ΔΗΜΟΣΙΕΥΣΗ: 15/04/2014, 16:31 | ΤΕΛΕΥΤΑΙΑ ΕΝΗΜΕΡΩΣΗ: 15/04/2014, 16:31
Ένας 22χρονος στη Νότιο Κορέα συνελήφθη κατηγορούμενος ότι άφησε το γιο του να πεθάνει από πείνα ενώ ο ίδιος έπαιζε βιντεοπαιχνίδια επί μέρες ολόκληρες.

Η νέα αυτή υπόθεση αναμένεται να τροφοδοτήσει τη συζήτηση στη Νότια Κορέα για τον εθισμό στα βιντεοπαιχνίδια. Το κοινοβούλιο εξετάζει την έγκριση νόμου που κατατάσσει τη δραστηριότητα αυτή στην κατηγορία των δραστηριοτήτων που προκαλούν εθισμό, όπως τα ναρκωτικά, το αλκοόλ και τα στοιχήματα.

Ο παίκτης, ο 22χρονος Τσουνγκ όπως τον αποκαλεί η αστυνομία, συνελήφθη μετά τον εντοπισμό του πτώματος του δίχρονου γιου του που βρισκόταν σε αποσύνθεση μέσα σε σακούλα απορριμμάτων, κοντά στη νοτιοανατολική πόλη Νταεγκού.

Το 2009 η χώρα συγκλονίστηκε από μια παρόμοια υπόθεση: ένα νεαρό ζευγάρι είχε αφήσει το τριών μηνών μωρό του να πεθάνει από ασιτία ενώ περνούσε ώρες παίζοντας στο Διαδίκτυο, κυρίως ένα παιχνίδι με θέμα την ανατροφή ενός εικονικού παιδιού.

Στα τέλη Φεβρουαρίου, η σύζυγος του Τσουνγκ βρήκε δουλειά σε εργοστάσιο, μακριά από το σπίτι της οικογένειας, αφήνοντας στον άνεργο σύζυγό της τη φροντίδα του παιδιού.

Ο άνδρας, που είχε ποινικό μητρώο, περνούσε τον χρόνο του στα Internet cafe και επέστρεφε στο σπίτι κάθε δύο ή τρεις ημέρες για να ταΐσει το αγοράκι.

Στις 7 Μαρτίου ο πατέρας βρήκε το παιδί νεκρό στο διαμέρισμα. Άφησε το άψυχο σώμα για τουλάχιστον ένα μήνα πριν τελικά το τοποθετήσει σε σακούλα σκουπιδιών και το ρίξει σε έναν κήπο.

Ο άνδρας δήλωσε την εξαφάνιση του παιδιού του στην αστυνομία, τελικά όμως φέρεται να παραδέχτηκε την πράξη του.

Σύμφωνα με πανεθνική έρευνα του υπουργείου Επιστημών που διεξήχθη το 2013, το 7% των 50 εκατομμυρίων Νοτιοκορεατών παρουσιάζει «υψηλό κίνδυνο» εθισμού στο Διαδίκτυο. Το ποσοστό αυξάνεται στο 11,7% μεταξύ των εφήβων.

Ο «εθισμός» ορίζεται από διάφορα συμπτώματα, όπως οξύ στρες σε περίπτωση έλλειψης πρόσβασης στο Διαδίκτυο και χρήση του Ίντερνετ σε τέτοιο βαθμό που καθιστά δύσκολη την τήρηση μιας φυσιολογικής καθημερινότητας.

Σε διεθνές επίπεδο πάντως ο εθισμός στο Διαδίκτυο δεν είναι αναγνωρισμένη ασθένεια.
[http://www.tovima.gr/PrintArticle/?aid=587079]

netInt'blackmail

name::
* McsEngl.netInt'blackmail@cptIt,

_ADDRESS.WPG:
* http://www.altsantiri.gr/e-lakis/126894// Λάκης Λαζόπουλος: Oι μπράβοι του διαδικτύου 25-02-2016,

netInt'down

name::
* McsEngl.netInt'down@cptIt,

_ADDRESS.WPG:
* http://www.weforum.org/agenda/2016/01/what-if-the-internet-went-down-for-a-day,

netInt'Freedom

name::
* McsEngl.netInt'Freedom@cptIt,
* McsEngl.internet'freedom@cptIt,
* McsEngl.internet'openness@cptIt,

_DESCRIPTION:
'Father of the internet': Why we must fight for its freedom
By Vinton Cerf, Special to CNN
November 30, 2012
Some 42 countries filter and censor content out of the 72 studied by the Open Net Initiative
According to an OECD study, the net already accounts of 13% of American business output
At Google, Cerf says the company sees dangers of a government-led net crackdown
A state-controlled regulatory system is unnecessary and would invariably raise costs
[http://edition.cnn.com/2012/11/29/business/opinion-cerf-google-internet-freedom/index.html]

EFF

name::
* McsEngl.EFF@cptIt,

From the Internet to the iPod, technologies are transforming our society and empowering us as speakers, citizens, creators, and consumers. When our freedoms in the networked world come under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. EFF broke new ground when it was founded in 1990—well before the Internet was on most people's radar—and continues to confront cutting-edge issues defending free speech, privacy, innovation, and consumer rights today. From the beginning, EFF has championed the public interest in every critical battle affecting digital rights.
[https://www.eff.org/about]

Swartz.Aaron.H

name::
* McsEngl.Swartz.Aaron.H@cptIt,

Aaron H. Swartz (November 8, 1986 – January 11, 2013) was an American computer programmer, writer, archivist, political organizer, and Internet activist. Swartz co-authored the "RSS 1.0" specification of RSS, and built the Web site framework web.py and the architecture for the Open Library. Although frequently attributed as a co-founder of Reddit, the claim is disputed by Reddit's original founders.[2][3][4]

Swartz also focused on sociology, civic awareness and activism. In 2010 he was a member of the Harvard University Center for Ethics. He cofounded the online group Demand Progress (which recently voiced its support for Richard O'Dwyer) and later worked with US and international activist groups Rootstrikers and Avaaz.

On January 6, 2011, Swartz was arrested in connection with systematic downloading of academic journal articles from JSTOR, which became the subject of a federal investigation.[5][6] On January 11, 2013, Swartz was found dead in his Brooklyn, New York apartment; it is reported that he had hanged himself.[7][8][9]
[http://en.wikipedia.org/wiki/Aaron_Swartz] 2013-01-13

Internet'privacy

name::
* McsEngl.Internet'privacy@cptIt,
* McsEngl.internet'privacy@cptIt,

_ADDRESS.WPG:
* {2018-07-11} Nithin-Coca, How I Fully Quit Google (And You Can, Too), https://medium.com/s/story/how-i-fully-quit-google-and-you-can-too-4c2f3f85793a,

netIntpbm.security

name::
* McsEngl.netIntpbm.security@cptIt,

netIntpbm.impersonation

name::
* McsEngl.netIntpbm.impersonation@cptIt,
* McsEngl.impersonation.internet@cptIt,

_ADDRESS.WPG:
* https://steemit.com/scammers/@lukestokes/how-to-avoid-getting-scammed-by-impersonators,

netInt'transparency

name::
* McsEngl.netInt'transparency@cptIt,

netInt'organization

_CREATED: {2012-12-17}

name::
* McsEngl.netInt'organization@cptIt,
* McsEngl.internet'organization@cptIt, {2012-12-17}

Electronic-Frontier-Foundation

The Electronic Frontier Foundation (EFF) is an international non-profit digital rights advocacy and legal organization based in the United States. Its stated mission is to:[1]

Engage in and support educational activities which increase popular understanding of the opportunities and challenges posed by developments in computing and telecommunications.
Develop among policy-makers a better understanding of the issues underlying free and open telecommunications, and support the creation of legal and structural approaches which will ease the assimilation of these new technologies by society.
Raise public awareness about civil liberties issues arising from the rapid advancement in the area of new computer-based communications media.
Support litigation in the public interest to preserve, protect, and extend First Amendment rights within the realm of computing and telecommunications technology.
Encourage and support the development of new tools which will endow non-technical users with full and easy access to computer-based telecommunications.
The EFF is supported by donations and is based in San Francisco, California, with staff members in Washington, D.C. They are accredited observers at the World Intellectual Property Organization[2] and one of the participants of the Global Network Initiative.[3]

EFF has taken action in several ways. It provides funds for legal defense in court, presents amici curiae briefs, defends individuals and new technologies from what it considers baseless or misdirected legal threats, works to expose government malfeasance, provides guidance to the government and courts, organizes political action and mass mailings, supports some new technologies which it believes preserve personal freedoms, maintains a database and web sites of related news and information, monitors and challenges potential legislation that it believes would infringe on personal liberties and fair use, and solicits a list of what it considers patent abuses with intentions to defeat those that it considers without merit.
[http://en.wikipedia.org/wiki/Electronic_Frontier_Foundation]

Global-Commission-on-Internet-Governance

name::
* McsEngl.GCIG@cptIt,

_DESCRIPTION:
The Global Commission on Internet Governance

The Global Commission on Internet Governance was established in January 2014, to articulate and advance a strategic vision for the future of Internet governance. With work commencing in May 2014, the two-year project will conduct and support independent research on Internet-related dimensions of global public policy, culminating in an official commission report.

Chaired by Carl Bildt, the commission will inform concrete policy recommendations for the future of Internet governance, by providing a framework both for coordination among advanced industrial democracies and for addressing the interests and values of states that are uncertain about the future of multi-stakeholder governance. Key issues to be addressed by the commission include governance legitimacy and regulation, innovation, online rights and systemic risk.

Launched by two independent global think tanks, the Centre for International Governance Innovation (CIGI) and Chatham House, the Global Commission on Internet Governance will help educate the wider public on the most effective ways to promote Internet access, while simultaneously championing the principles of freedom of expression and the free flow of ideas over the Internet.
[https://www.ourinternet.org/#about]

Global-Network-Initiative

name::
* McsEngl.GNI@cptIt,

The Global Network Initiative (GNI) is a non-governmental organization with the dual goals of preventing Internet censorship by authoritarian governments and protecting the Internet privacy rights of individuals. It is sponsored by a coalition of multinational corporations, non-profit organizations, and universities.
[http://en.wikipedia.org/wiki/Global_Network_Initiative]

netInt'organization.COMPANY

name::
* McsEngl.netInt'organization.COMPANY@cptIt,
* McsEngl.internet'company@cptIt,

_ADDRESS.WPG:
* http://www.weforum.org/agenda/2016/02/who-are-the-great-internet-powers??

netInt'Resource

_CREATED: {2007-12-08}

name::
* McsEngl.netInt'Resource@cptIt,
* McsEngl.internet'resource@cptIt67i,

_DEFINITION:
* The first systematic use of the term resource was introduced in June 1994 by RFC 1630. In this document is defined the generic notion of Universal Resource Identifier (URI), with its two variants Universal Resource Locator (URL) and Universal Resource Name (URN). A resource is implicitly defined as something which can be identified, the identification deserving two distinct purposes, naming and addressing, the latter only being dependent on a protocol. It is noticeable that RFC 1630 does not attempt to define at all the notion of resource, actually it barely uses the term besides its occurrence in URI, URL and URN, and still speaks about "Objects of the Network".
[http://en.wikipedia.org/wiki/Resource_%28Web%29]
... From Web resources to abstract resources
The first explicit definition of resource is found in RFC 2396, in August 1998 : A resource can be anything that has identity. Familiar examples include an electronic document, an image, a service (e.g., "today's weather report for Los Angeles"), and a collection of other resources. Not all resources are network "retrievable"; e.g., human beings, corporations, and bound books in a library can also be considered resources. If examples in this document are still limited to physical entities, the definition opens the door to more abstract resources. Providing a concept is given an identity, and this identity is expressed by a well-formed URI, then a concept can be a resource as well. In January 2005, RFC 3986 makes this extension of the definition completely explicit: ... abstract concepts can be resources, such as the operators and operands of a mathematical equation, the types of a relationship (e.g., "parent" or "employee"), or numeric values (e.g., zero, one, and infinity).
... The concept of Resource is primitive in the Web architecture, and is used in the definition of its fundamental elements. The term was first introduced to refer to targets of Uniform Resource Locators (URLs), but its definition has been further extended to include the referent of any Uniform Resource Identifier (RFC 3986), or Internationalized Resource Identifier (RFC 3987). In the Semantic Web, abstract resources and their semantic properties are described using the family of languages based on Resource Description Framework (RDF).
[http://en.wikipedia.org/wiki/Resource_%28Web%29]

EVOLEINO:
1994.06:
The first systematic use of the term resource was introduced in June 1994 by RFC 1630. In this document is defined the generic notion of Universal Resource Identifier (URI), with its two variants Universal Resource Locator (URL) and Universal Resource Name (URN). A resource is implicitly defined as something which can be identified, the identification deserving two distinct purposes, naming and addressing, the latter only being dependent on a protocol. It is noticeable that RFC 1630 does not attempt to define at all the notion of resource, actually it barely uses the term besides its occurrence in URI, URL and URN, and still speaks about "Objects of the Network".
[http://en.wikipedia.org/wiki/Resource_%28Web%29]

resource'OWNERSHIP

name::
* McsEngl.resource'OWNERSHIP@cptIt,

Resource ownership, intellectual property and trust

In RDF, "anybody can declare anything about anything". Resources are "defined" by formal descriptions which anyone can publish, copy, modify and publish over the Web. If the content of a Web resource in the classical sense (a Web page or on-line file) is clearly owned by its publisher, who can claim intellectual property on it, an abstract resource can be defined by an accumulation of RDF descriptions, not necessarily controlled by a unique publisher, and not necessarily consistent with each other. It's an open issue to know if a resource should have an authoritative definition with clear and trustable ownership, and in this case, how to make this description technically distinct from other descriptions. A parallel issue is how intellectual property applies to such descriptions.
[http://en.wikipedia.org/wiki/Resource_%28Web%29]

resource'TYPE

name::
* McsEngl.resource'TYPE@cptIt,

file
a file on your local system, or a file on an anonymous FTP server

http
a file on a World Wide Web server

gopher
a file on a Gopher server

WAIS
a file on a WAIS server

news
an Usenet newsgroup

telnet
a connection to a Telnet-based service

data-URI-scheme

name::
* McsEngl.data-uri-scheme@cptIt,

The data URI scheme is a URI scheme (Uniform Resource Identifier scheme) that provides a way to include data in-line in web pages as if they were external resources. This technique allows normally separate elements such as images and style sheets to be fetched in a single HTTP request rather than multiple HTTP requests, which can be more efficient.

Data URIs tends to be simpler than other inclusion methods, such as MIME with cid or mid URIs. Data URIs are sometimes called Uniform Resource Locators, although they do not actually locate anything remote. The data URI scheme is defined in RFC 2397 of the Internet Engineering Task Force (IETF).

In browsers that fully support Data URIs for "navigation", JavaScript generated content can be provided as file "download" to the user, simply by setting window.location.href to a Data URI. One example is the conversion of HTML tables to downloadable CSV using a Data URI like this: 'data:text/csv;charset=UTF-8,' + encodeURIComponent(csv), where "csv" has been generated by JavaScript.

The IETF published the data URI specification in 1998[1] as Proposed Standard on the IETF Standards Track, and hasn't progressed it since. The HTML 4.01 specification refers to the data URI scheme,[2] and data URIs have now been implemented in most browsers.
[http://en.wikipedia.org/wiki/Data_URI_scheme]

_CODE.HML:
<img src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAUA
AAAFCAYAAACNbyblAAAAHElEQVQI12P4//8/w38GIAXDIBKE0DHxgljNBAAO
9TXL0Y4OHwAAAABJRU5ErkJggg==" alt="Red dot" />

_PROGRAM:
* http://webcodertools.com/imagetobase64converter,

IRI

_CREATED: {2007-12-08}

name::
* McsEngl.iri@cptIt67i,

_DEFINITION:
On the Internet, the Internationalized Resource Identifier (IRI) is a generalization of the Uniform Resource Identifier (URI), which is in turn a generalization of the Uniform Resource Locator (URL). While URIs are limited to a subset of the ASCII character set, IRIs may contain characters from the Universal Character Set (Unicode/ISO 10646). Basically, an IRI is the internationalized version of a URI.

It is defined by RFC 3987.
[http://en.wikipedia.org/wiki/Internationalized_Resource_Identifier]

URI

_CREATED: {2007-12-08} {2000-10-26}

name::
* McsEngl.uri@cptIt67i,
* McsEngl.uniform-resource-identifier@cptIt67i,
* McsEngl.universal-resource-identifier@cptIt,

_DEFINITION:
URI A "Universal Resource Identifier". A URI is either a URL or a URN#ql:urn-67i#. (URLs and URNs are concrete entities that actually exist. A "URI" is an abstract superclass -- it's a name we can use when we know we are dealing with either an URL or an URN, and we don't care which.

URL Universal Resource Locator. A pointer to a specific location (address) on the Web that is unique in all the world. The first part of the URL defines the type of address. For example, http:/ identifies a Web location. The ftp:/ prefix identifies a downloadable file. Other prefixes include file:/ (a file on the local disk system) and mailto:/ (an email address).

URN Universal Resource Name. A unique identifier that identifies an entity, but doesn't tell where it is located. That lets the system look it up to see if a local copy exists before going out to find it on the Web. It also allows the web location to change, while still allowing the object to be found.
[jaxp tutorial 2.5]
===
url
For entering a URL. It must start with a valid URI scheme, for example http://, ftp:// or mailto:.
[https://developers.google.com/web/fundamentals/design-and-ui/input/forms/choose-the-best-input-type?hl=en]

uri'EVOLEINO

name::
* McsEngl.uri'EVOLEINO@cptIt,

{time.2005 RFC_3986
Some time later, a number of shortcomings discovered in the two specifications led to the development of a number of draft revisions under the title rfc2396bis. This community effort, coordinated by RFC 2396 co-author Roy Fielding, culminated in the publication of RFC 3986 in January 2005. This RFC is the current version of the URI syntax recommended for use on the Internet, and it renders RFC 2396 obsolete. It does not, however, render the details of existing URL schemes obsolete; those are still governed by RFC 1738, except where otherwise superseded — RFC 2616 for example, refines the "http" scheme. The content of RFC 3986 was simultaneously published by the IETF as the full standard STD 66, reflecting the establishment of the URI generic syntax as an official Internet protocol.
[http://en.wikipedia.org/wiki/Uniform_Resource_Identifier] 2007-09-07

{time.2002 RFC_3305 (url near-obsolescence)
In August 2002, RFC 3305 pointed out that the term URL has, despite its ubiquity in the vernacular of the Internet-aware public at large, faded into near-obsolescence. It now serves only as a reminder that some URIs act as addresses because they have schemes that imply some kind of network accessibility, regardless of whether they are actually being used for that purpose. As URI-based standards such as Resource Description Framework make evident, resource identification need not be coupled with the retrieval of resource representations over the Internet, nor does it need to be associated with network-bound resources at all.
[http://en.wikipedia.org/wiki/Uniform_Resource_Identifier]

1999: RFC_2732
In December 1999, RFC 2732 provided a minor update to RFC 2396, allowing URIs to accommodate IPv6 addresses.

1998: RFC_2396 UNIFORM'RI
With the publication of RFC 2396 in 1998, the URI syntax became a separate specification, and most parts of RFCs 1630 and 1738 became obsolete. In the new RFC, the "U" in "URI" was changed to represent "Uniform" rather than "Universal", and all parts of RFCs 1630 and 1738 relating to URIs and URLs in general were revised and expanded. Only those portions of RFC 1738 that summarized existing URL schemes were not rendered obsolete by RFC 2396.
[http://en.wikipedia.org/wiki/Uniform_Resource_Identifier]

1997: RFC_2141 URN DEFINITION
The definition and syntax of URNs was not settled upon until the publication of RFC 2141 in May 1997.
[http://en.wikipedia.org/wiki/Uniform_Resource_Identifier]

1994: RFC_1738 URL
In December 1994, RFC 1738 was published in order to formally define relative and absolute URLs, refine the general URL syntax, define how relative URLs were to be resolved to absolute form, and better enumerate the URL schemes that were in use at the time.
[http://en.wikipedia.org/wiki/Uniform_Resource_Identifier]

uri'SPECIFEINO:
* URL#cptItsoft1015: attSpe#
* URN##

uri.ABSOLUTE

name::
* McsEngl.uri.ABSOLUTE@cptIt,
* McsEngl.absolute-uri@cptIt67,
* McsEngl.uriAbsolute@cptIt67,

Examples of absolute URIs
* http://somehost/absolute/URI/with/absolute/path/to/resource.txt
* ftp://somehost/resource.txt
* urn:issn:1535-3613
[http://en.wikipedia.org/wiki/Uniform_Resource_Identifier]

uri.REFERENCE

name::
* McsEngl.uri.REFERENCE@cptIt,
* McsEngl.uri-reference@cptIt67,
* McsEngl.uriref@cptIt67,

_DEFINITION:
* A URI reference (or URIref) is
- a URI,
- together with an optional fragment identifier at the end.
For example, the URI reference http://www.example.org/index.html#section2 consists of the URI http://www.example.org/index.html and (separated by the "#" character) the fragment identifier Section2. RDF URIrefs can contain Unicode [UNICODE] characters (see [RDF-CONCEPTS]), allowing many languages to be reflected in URIrefs.
[http://www.w3.org/TR/2004/REC-rdf-primer-20040210/]

* A URI reference may be considered to be a same-document reference: a reference to the document containing the URI reference itself.
[http://en.wikipedia.org/wiki/Uniform_Resource_Identifier]

EXAMPLE:
Examples of URI references
* http://example/resource.txt#frag01
* http://somehost/absolute/URI/with/absolute/path/to/resource.txt
* /relative/URI/with/absolute/path/to/resource.txt
* relative/path/to/resource.txt
* ../../../resource.txt
* resource.txt
* /resource.txt#frag01
*#frag01
* (empty string)
[http://en.wikipedia.org/wiki/Uniform_Resource_Identifier]

URI-scheme

In the field of computer networking, a URI scheme is the top level of the uniform resource identifier (URI) naming structure. All URIs and absolute URI references are formed with a scheme name, followed by a colon character (":"), and the remainder of the URI called (in the outdated RFCs 1738 and 2396, but not the current STD 66/RFC 3986) the scheme-specific part. The syntax and semantics of the scheme-specific part are left largely to the specifications, governing individual schemes, subject to certain constraints such as reserved characters and how to "escape" them.

URI schemes are frequently and incorrectly referred to as "protocols", or specifically as URI protocols or URL protocols, since most were originally designed to be used with a particular protocol, and often have the same name. The http scheme, for instance, is generally used for interacting with web resources using HyperText Transfer Protocol. Today, URIs with that scheme are also used for other purposes, such as RDF resource identifiers and XML namespaces, that are not related to the protocol. Furthermore, some URI schemes are not associated with any specific protocol (e.g. "file") and many others do not use the name of a protocol as their prefix (e.g. "news").

URI schemes should be registered with IANA, although non-registered schemes are used in practice. RFC 4395 describes the procedures for registering new URI schemes.
[http://en.wikipedia.org/wiki/URI_scheme]

URN (Uniform Resource Name)

_CREATED: {1999-02-26}

name::
* McsEngl.URN (Uniform Resource Name)@cptIt,
* McsEngl.urn@cptIt67i,
* McsEngl.Uniform-Resource-Name@cptIt,

_DEFINITION:
A Uniform Resource Name (URN) is a URI that identifies a resource by name in a particular namespace. A URN can be used to talk about a resource without implying its location or how to dereference it. For example, the URN urn:isbn:0-395-36341-1 is a URI that, like an International Standard Book Number (ISBN), allows one to talk about a book, but doesn't suggest where and how to obtain an actual copy of it.
[http://en.wikipedia.org/wiki/Uniform_Resource_Identifier]

Evaluation

4.1 Uniform Resource Names (URNs)
It was generally assumed in the early days of the Web [7] that
identifiers would fall into one of two (or possibly more) classes:
locators and names, represented by URLs and URNs respectively.
While URLs have been a phenomenal success, URNs, which had
the potential to become the de facto standard for assigning global
identifiers to arbitrary subjects, are hardly used at all. As of this
writing, twelve years after the URN mechanism was approved,
only 25 formal URN namespace IDs have been registered, most
of them related to the Internet and many of them unused.
There seem to be two reasons for this:
1) URNs do not have a single, well-defined resolution
mechanism. Each URN scheme defines its own, and most of
these are not supported by web browsers. Given a URN, it is
therefore non-trivial to discover what subject it identifies.
(An example, taken from UBL, is given later.)
2) URNs are based on a “top-down” approach whereby URN
schemes must be registered with an authority (IANA) in
order to become official. Whether or not IANA’s approval
policy has been restrictive, this represents a level of
bureaucracy that could easily be intimidating.
PSIs suffer from neither of these problems, since they have a
well-defined resolution mechanism and can be minted by anyone
[http://www.ontopia.net/topicmaps/materials/The_Case_for_Published_Subjects.pdf]

URL/URN Free Software Libraries

From: Justin Couch <couch@ccis.adisys.com.au>
To: Advanced Java List <advanced-java@xcf.berkeley.edu>
Subject: ANN: URL/URN Free Software Libraries available
Date: Πέμπτη, 25 Φεβρουαρίου 1999 11:59 μμ

I've just got the first really public version of my URL and URN libraries available for download. These are designed to replace java.net.* with a more robust, flexible and extensible system.

URN = Uniform Resource Name
Many of you have probably not heard of URNs before - they are a sibling to URLs that allow location independent naming of objects. They are the subject of an IETF working group. For example I could name a book as
urn:isbn:0-7897-0213-4
Then I could ask the URN to resolve itself to a URL or directly to the resource itself. The URN "system" then goes to the trouble of finding the actual object and returning it to you - regardless of whether it exists on the local harddrive or a server on the other side of the world. This is independent of your application code. It may even resolve to meta data structures (called URCs - Uniform Resource Characteristic).

The current release if version 0.5 and released under the LGPL.
http://www.vlc.com.au/~justin/java/urn/uri_0.5.zip
The code is pretty robust because we're using in our applications internally for the past couple of months. All it is really missing is implemenation code for dealing with various protocol and content types.
Anyway, I'm looking for testers and those with an eye on future networking technologies and interested in helping out.
I've attached below the readme from the code for those interested.

-- Justin Couch Author, Java Hacker Snr Software Engineer couch@ccis.adisys.com.au ADI Ltd, Systems Group http://www.vlc.com.au/~justin/ Java3D FAQ: http://tintoy.ncsa.uiuc.edu/~srp/java3d/faq.html ------------------------------------------------------------------- "Look through the lens, and the light breaks down into many lights.

Turn it or move it, and a new set of arrangements appears... is it a single light or many lights, lights that one must know how to distinguish, recognise and appreciate? Is it one light with many frames or one frame for many lights?" -Subcomandante Marcos -------------------------------------------------------------------
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

URN implementation V0.5
(c) The Virtual Light Company 1999

This is the first public, widely announced release of the URI code.

As such, there are still many things missing functionality-wise. It is almost feature complete and is running in a commercial test environment. I want as much feedback as possible - good, bad or otherwise.



Licensing -----------
This code is released under the GNU LGPL. If you wish to redistribute this code then you must include the license.txt file as is.


The original copy of this code can be found at
http://www.vlc.com.au/~justin/java/urn/uri_0.5.zip
This code makes use of other 3rd party GNU libraries.


GNU Regexp v1.0.6 can be found at: http://www.cacas.org/~wes/java/
The GNU LGPL can be found in license.txt or at http://www.gnu.org/lgpl.html
#include <std_disclaimer.h>

Installing -----------
Sorry, no JAR file yet. Just extract everything from the zip file (or leave it in there if you wish) and point the classpath at it. Make sure that urn.conf and urn_bindings may be found from the classpath as that is how they are loaded.


Place gun_regexp_106.jar into your classpath
Once you've done this, then you may import the classes under org.ietf.uri.* and run code with them.


This code makes very heavy use of JDK 1.2 so you need that to be running this library.


Add your own naming schemes to the urn_bindings file. Comments indicate where to find the syntax definition.


To generate javadocs run make_docs.[sh|bat] for your platform. The unix shell script is untested though!


Philosophy -----------
The idea of these classes is to completely replace everything in java.net. In your application, everywhere that you reference java.net.URL change that to org.ietf.uri.URL. There are some other differences that are better in behaviour, so it is not a completely pluggable replacement.


At the bottom end, a lot more things are configurable and perform the way that you expect them to behave. You can put multiple FileNameMaps and multiple factory implemenations for content and protocol handler (some parts not implemented yet). You can fetch the currently set factory.


I've made the best attempt possible at seamless integration with the java.net classes to ease migration hassles. You can use the same content handlers and filename maps. Unfortunately you cannot use the protocol handlers due to a design decision by Sun stopping an external class from fetching URLConnections. There are public wrapper classes for everything that it is possible to use.


There are a number of minor and potentially troubling aspects with this that may not allow full use of the java.net stuff. Read the comments at the top of JavaNetURLConnectionWrapper for when the code deals with URNs.


TODO -----
- Build lots of content handlers! The default one is for text/plain. I will shortly have image loaders available. Stay tuned.

o handler for text/uri-list needed.

o handler for HTML needed
- Protocol handlers for HTTP and FTP are needed. Have some GNU'd code to work with, but work is incomplete.
- Resolvers: o Complete the DNS based resolver based on NetSol code (Problem is that its license doesn't allow commercial use which is a pain) o JINI based resolver o THTTP resolver
- Content handler and ResourceConnection code should have a listener for a percentage complete type feedback and authentication stuff.
- Complete URL implementation. Currently is mainly delegating directly to java.net.URL. This needs to be ripped out and replaced with proper working code (the java.net implementation is very wrong in a couple of places). Also, the resolving to URN/URC from URL needs to be looked at.

Justin Couch, 25 Feb 1999 couch@ccis.adisys.com.au (work) justin@vlc.com.au (home)
Unsubscription, archives, FAQ - http://www.xcf.berkeley.edu/lists.html

URL

name::
* McsEngl.url@cptIt67i,
* McsEngl.uniform-resource-locator@cptIt,
* McsEngl.universal-resource-locator@cptIt,
* McsEngl.web-address@cptIt,

_DEFINITION:
URL is an acronym that stands for Uniform Resource Locator and is a reference (an address) to a resource on the Internet.
[Java Tutorial]
===
Είναι το σημαντικότερο σημείο της γλώσσας. Είναι το FORMAT των LINKS στο web.
Η σύνταξη είναι: πρωτόκολο://host/path
* http://www.compulink.gr= οδηγεί στον web server of compulink.
* http://www.compulink.gr/animate/clink.avi = οδηγει (εκτελεί) στο αρχείο clink.avi του σερβερ της compulink.
* gopher://gopher.forthnet.gr = οδηγει στον gopher server of forthnet στο Ηράκλειο.
* mailto:sigmund@compulink.gr = στέλνει γραμμα
* news:comp.infosystems = συνδεσμος στο usenet.

The structure of a Uniform Resource Locator (URL) may be expressed as:
resource_type:additional_information
where the possible resource types include:
file,
http,
news,
gopher,
telnet,
ftp, and
wais,
among others, and each resource type relates to a specific server type. Since each server performs a unique function, each resource type requires different additional_information. For example http and gopher URLs will have a structure like:
resource_type://host.domain:port/pathname
The colon followed by an integer TCP port number is optional, and is used when a server is listening on a non-standard port.
Strictly speaking, the anchor_name and search_word information included in the name and href attributes in the examples above are part of the URL. They are presented as separate entities for simplicity.
A more complete description of URLs is presented in http://www.w3.org/hypertext/WWW/Addressing/Addressing.html

Uniform Resource Locator
(URL) (Previously "Universal"). A draft standard for specifying an object on the Internet, such as a file or newsgroup. URLs are used extensively on the World-Wide Web. They are used in HTML documents to specify the target of a hyperlink.
Here are some example URLs:
ftp://wuarchive.wustl.edu/mirrors/msdos/graphics/gifkit.zip http://www.w3.org/default.html news:alt.hypertext telnet://dra.com mailto:dbh@doc.ic.ac.uk http://wombat.doc.ic.ac.uk/?Uniform+Resource+Locator http://www.w3.org/default.html#Introduction

The part before the first colon specifies the access scheme or protocol. The part after the colon is interpreted according to the access scheme. In general, two slashes after the colon indicate a hostname (host:port is also valid). Schemes include: ftp, http (World-Wide Web), gopher or WAIS. The "file" scheme should only be used to refer to a file on the same host but is often used (incorrectly) as a sinonym for ftp. Other less commonly used schemes include news, telnet or mailto (e-mail). The port number can generally be omitted from the URL and will default to port 80. The last (optional) part of the URL may be a query string preceded by "?" or a "fragment identifier" preceded by "#". The later indicates a particular position within the specified document.
Only alphanumerics, reserved characters (:/?#"<>%+) used for their reserved purposes and "$", "-", "_", ".", "&", "+" are safe and may be transmitted unencoded. Other characters are encoded as a "%" followed by two hexadecimal digits. Space may also be encoded as "+".
The authoritative URL specification from CERN. (13 Jan 1995)
[www]

url'decoder

name::
* McsEngl.url'decoder@cptIt,

_ADDRESS.WPG:
* http://www.ulimatbach.de/links/url_decoder.html,

_CODE:
\Documents and Settings\HoKoNoUmo\Application Data\jEdit\macros\CHARACTER\Character_Greek_From_Url.bsh,

//884;GREEK NUMERAL SIGN
//
//885;GREEK LOWER NUMERAL SIGN
//
//890;GREEK YPOGEGRAMMENI
//
//894;GREEK QUESTION MARK
//
//900;GREEK TONOS
//
//901;GREEK DIALYTIKA TONOS
//
//902;GREEK CAPITAL LETTER ALPHA WITH TONOS
//// Ά %CE%86
//903;GREEK ANO TELEIA
//
//904;GREEK CAPITAL LETTER EPSILON WITH TONOS
//// Έ %CE%88
//905;GREEK CAPITAL LETTER ETA WITH TONOS
//// Ή %CE%89
//906;GREEK CAPITAL LETTER IOTA WITH TONOS
//// Ί %CE%8A
//908;GREEK CAPITAL LETTER OMICRON WITH TONOS
//// Ό %CE%8C
//910;GREEK CAPITAL LETTER UPSILON WITH TONOS
//// Ύ %CE%8E
//911;GREEK CAPITAL LETTER OMEGA WITH TONOS
//// Ώ %CE%8F
//912;GREEK SMALL LETTER IOTA WITH DIALYTIKA AND TONOS
//
//913;GREEK CAPITAL LETTER ALPHA
//// Α %CE%91
//914;GREEK CAPITAL LETTER BETA
//// Β %CE%92
//915;GREEK CAPITAL LETTER GAMMA
//// Γ %CE%93
//916;GREEK CAPITAL LETTER DELTA
//// Δ %CE%94
//917;GREEK CAPITAL LETTER EPSILON
//// Ε %CE%95
//918;GREEK CAPITAL LETTER ZETA
//// Ζ %CE%96
//919;GREEK CAPITAL LETTER ETA
//// Η %CE%97
//920;GREEK CAPITAL LETTER THETA
//// Θ %CE%98
//921;GREEK CAPITAL LETTER IOTA
//// Ι %CE%99
//922;GREEK CAPITAL LETTER KAPPA
//// Κ %CE%9A
//923;GREEK CAPITAL LETTER LAMDA
//// Λ %CE%9B
//924;GREEK CAPITAL LETTER MU
//// Μ %CE%9C
//925;GREEK CAPITAL LETTER NU
//// Ν %CE%9D
//926;GREEK CAPITAL LETTER XI
//// Ξ %CE%9E
//927;GREEK CAPITAL LETTER OMICRON
//// Ο %CE%9F
//928;GREEK CAPITAL LETTER PI
//// Π %CE%A0
//929;GREEK CAPITAL LETTER RHO
//// Ρ %CE%A1
//931;GREEK CAPITAL LETTER SIGMA
//// Σ %CE%A3
//932;GREEK CAPITAL LETTER TAU
//// Τ %CE%A4
//933;GREEK CAPITAL LETTER UPSILON
//// Υ %CE%A5
//934;GREEK CAPITAL LETTER PHI
//// Φ %CE%A6
//935;GREEK CAPITAL LETTER CHI
//// Χ %CE%A7
//936;GREEK CAPITAL LETTER PSI
//// Ψ %CE%A8
//937;GREEK CAPITAL LETTER OMEGA
//// Ω %CE%A9
//938;GREEK CAPITAL LETTER IOTA WITH DIALYTIKA
//
//939;GREEK CAPITAL LETTER UPSILON WITH DIALYTIKA
//
//940;GREEK SMALL LETTER ALPHA WITH TONOS
//// ά %CE%AC
//941;GREEK SMALL LETTER EPSILON WITH TONOS
//// έ %CE%AD
//942;GREEK SMALL LETTER ETA WITH TONOS
//// ή %CE%AE
//943;GREEK SMALL LETTER IOTA WITH TONOS
//// ί %CE%AF
//944;GREEK SMALL LETTER UPSILON WITH DIALYTIKA AND TONOS
//
//945;GREEK SMALL LETTER ALPHA
//// α %CE%B1
//946;GREEK SMALL LETTER BETA
//// β %CE%B2
//947;GREEK SMALL LETTER GAMMA
//// γ %CE%B3
//948;GREEK SMALL LETTER DELTA
//// δ %CE%B4
//949;GREEK SMALL LETTER EPSILON
//// ε %CE%B5
//950;GREEK SMALL LETTER ZETA
//// ζ %CE%B6
//951;GREEK SMALL LETTER ETA
//// η %CE%B7
//952;GREEK SMALL LETTER THETA
//// θ %CE%B8
//953;GREEK SMALL LETTER IOTA
//// ι %CE%B9
//954;GREEK SMALL LETTER KAPPA
//// κ %CE%BA
//955;GREEK SMALL LETTER LAMDA
//// λ %CE%BB
//956;GREEK SMALL LETTER MU
//// μ %CE%BC
//957;GREEK SMALL LETTER NU
//// ν %CE%BD
//958;GREEK SMALL LETTER XI
//// ξ %CE%BE
//959;GREEK SMALL LETTER OMICRON
//// ο %CE%BF
//960;GREEK SMALL LETTER PI
//// π %CF%80
//961;GREEK SMALL LETTER RHO
//// ρ %CF%81
//962;GREEK SMALL LETTER FINAL SIGMA
//// ς %CF%82
//963;GREEK SMALL LETTER SIGMA
//// σ %CF%83
//964;GREEK SMALL LETTER TAU
//// τ %CF%84
//965;GREEK SMALL LETTER UPSILON
//// υ %CF%85
//966;GREEK SMALL LETTER PHI
//// φ %CF%86
//967;GREEK SMALL LETTER CHI
//// χ %CF%87
//968;GREEK SMALL LETTER PSI
//// ψ %CF%88
//969;GREEK SMALL LETTER OMEGA
//// ω %CF%89
//970;GREEK SMALL LETTER IOTA WITH DIALYTIKA
////%CF%8A
//971;GREEK SMALL LETTER UPSILON WITH DIALYTIKA
////%CF%8B
//972;GREEK SMALL LETTER OMICRON WITH TONOS
//// ό %CF%8C
//973;GREEK SMALL LETTER UPSILON WITH TONOS
//// ύ %CF%8D
//974;GREEK SMALL LETTER OMEGA WITH TONOS
//// ώ %CF%8E
//976;GREEK BETA SYMBOL
//
//977;GREEK THETA SYMBOL
//
//978;GREEK UPSILON WITH HOOK SYMBOL
//
//979;GREEK UPSILON WITH ACUTE AND HOOK SYMBOL
//
//980;GREEK UPSILON WITH DIAERESIS AND HOOK SYMBOL
//
//981;GREEK PHI SYMBOL
//
//982;GREEK PI SYMBOL
//
//983;GREEK KAI SYMBOL
//
//984;GREEK LETTER ARCHAIC KOPPA
//
//985;GREEK SMALL LETTER ARCHAIC KOPPA
//
//986;GREEK LETTER STIGMA
//
//987;GREEK SMALL LETTER STIGMA
//
//988;GREEK LETTER DIGAMMA
//
//989;GREEK SMALL LETTER DIGAMMA
//
//990;GREEK LETTER KOPPA
//
//991;GREEK SMALL LETTER KOPPA
//
//992;GREEK LETTER SAMPI
//
//993;GREEK SMALL LETTER SAMPI
//
// backspace %08
// tab %09
// linefeed %0A
// creturn %0D
// space %20
// ! %21
// " %22
// # %23
// $ %24
// % %25
// & %26
// ' %27
// ( %28
// ) %29
// * %2A
// + %2B
// , %2C
// - %2D
// . %2E
// / %2F
// : %3A
// ; %3B
// < %3C
// = %3D
// > %3E
// ? %3F
// @ %40
// [ %5B
// \ %5C
// ] %5D
// ^ %5E
// _ %5F
// ` %60
// { %7B
// | %7C
// } %7D
// ~ %7E
// ? %A2
// £ %A3
// ¥ %A5
// | %A6
// § %A7
// « %AB
// ¬ %AC
// ? %AD
// ? %B0
// ± %B1
// ? %B2
// , %B4
// µ %B5
// » %BB
// ? %BC
// ½ %BD
// ? %BF
// ? %C0
// ? %C1
// ? %C2
// ? %C3
// ? %C4
// ? %C5
// ? %C6
// ? %C7
// ? %C8
// ? %C9
// ? %CA
// ? %CB
// ? %CC
// ? %CD
// ? %CE
// ? %CF
// ? %D0
// ? %D1
// ? %D2
// ? %D3
// ? %D4
// ? %D5
// ? %D6
// ? %D8
// ? %D9
// ? %DA
// ? %DB
// ? %DC
// ? %DD
// ? %DE
// ? %DF
// ? %E0
// ? %E1
// ? %E2
// ? %E3
// ? %E4
// ? %E5
// ? %E6
// ? %E7
// ? %E8
// ? %E9
// ? %EA
// ? %EB
// ? %EC
// ? %ED
// ? %EE
// ? %EF
// ? %F0
// ? %F1
// ? %F2
// ? %F3
// ? %F4
// ? %F5
// ? %F6
// ? %F7
// ? %F8
// ? %F9
// ? %FA
// ? %FB
// ? %FC
// ? %FD
// ? %FE
// ? %FF

url'part

name::
* McsEngl.url'part@cptIt,

_DESCRIPTION:
The structure of a Uniform Resource Locator (URL) may be expressed as:
resource_type:additional_information

A URL has two main components:
* the protocol identifier
* the resource name

url'character

name::
* McsEngl.url'character@cptIt,

_DESCRIPTION:
List of allowed URL characters[edit]

Unreserved
May be encoded but it is not necessary

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
a b c d e f g h i j k l m n o p q r s t u v w x y z
0 1 2 3 4 5 6 7 8 9 - _ . ~

Reserved
Have to be encoded sometimes

! * ' ( ) ; : @ & = + $ , / ? %# [ ]

Further details can for example be found in RFC 3986 and http://www.w3.org/Addressing/URL/uri-spec.html.
[http://en.wikipedia.org/wiki/Uniform_resource_locator]

_ENCODING:
'  %27
.  %2E
:  %3A
;  %3B
?  %3F
@  %40
/  %2F
(  %28
)  %29
# %23
! %21

url'normalization

name::
* McsEngl.url'normalization@cptIt,

_DESCRIPTION:
URL normalization (or URL canonicalization) is the process by which URLs are modified and standardized in a consistent manner. The goal of the normalization process is to transform a URL into a normalized or canonical URL so it is possible to determine if two syntactically different URLs may be equivalent.

Search engines employ URL normalization in order to assign importance to web pages and to reduce indexing of duplicate pages. Web crawlers perform URL normalization in order to avoid crawling the same resource more than once. Web browsers may perform normalization to determine if a link has been visited or to determine if a page has been cached.
[http://en.wikipedia.org/wiki/URL_normalization]

url'shortener

name::
* McsEngl.url'shortener@cptIt,
* McsEngl.webpage'address'shortener@cptIt,
* McsEngl.url-shrinker@cptIt,
* McsEngl.link-shortener@cptIt,

_ADDRESS.WPG:
* https://goo.gl//
* https://bitly.com//
* http://tinyurl.com//
* http://ow.ly/url/shorten-url,

netInt'resourceInfHmn

name::
* McsEngl.netInt'resourceInfHmn@cptIt,

_ADDRESS.WPG:
* https://www.dianeosis.org/wp-content/uploads/2020/05/WIP_greece.pdf,
* https://www.jacobinmag.com/2016/08/internet-public-dns-privatization-icann-netflix//
* http://www.internetlivestats.com//
* http://webthefilm.com//
* http://www.weforum.org/agenda/2016/01/how-does-the-internet-cross-the-ocean,

netInt'sector

name::
* McsEngl.netInt'sector@cptIt,
* McsEngl.internet-economy@cptIt,

{time.2016}:
With the internet economy now accounting for 6% of global GDP, businesses face ever-growing economic incentives to fight for control of the e-commerce pie.
[https://www.weforum.org/agenda/2016/04/10-forces-that-threaten-to-tear-the-internet-apart?]

netInt'security

name::
* McsEngl.netInt'security@cptIt,
* McsEngl.conceptIt67.2,
* McsEngl.cybersecurity@cptIt67.2, {2012-06-05}
* McsEngl.cyberwar@cptIt67i,
* McsEngl.cyberwarefare@cptIt67i,
* McsEngl.cyberweapon@cptIt67i,
* McsEngl.internet'safety@cptIt, {2012-12-03}
* McsEngl.internet'security@cptIt,
* McsEngl.online'security@cptIt, {2012-12-05}

_GENERIC:
* computer-network-security#ql:cmrnet'security#

inetsct'Accessibility

name::
* McsEngl.inetsct'Accessibility@cptIt,
* McsEngl.internet'shutdown@cptIt,
* McsEngl.internet'accessibility@cptIt,
* McsEngl.internet'shutdown@cptIt,

According to research by the Center for Technology innovation at Brookings, Internet shutdowns between July 1, 2015 and June 30, 2016, cost at least $2.4 bln in GDP globally.
[https://cointelegraph.com/news/bitcoin-without-the-internet-can-it-happen-and-is-it-possible]

inetsct'attack

name::
* McsEngl.inetsct'attack@cptIt,
* McsEngl.inetsct'valnerability@cptIt,

_DESCRIPTION:
Which Vulnerabilities does Acunetix Web Vulnerability Scanner Check for?

Acunetix Web Vulnerability Scanner automatically checks for the following vulnerabilities, among others:

Web Server Configuration Checks

Checks for Web Servers Problems – Determines if dangerous HTTP methods are enabled on the web server (e.g. PUT, TRACE, DELETE)
Verify Web Server Technologies
Vulnerable Web Servers
Vulnerable Web Server Technologies – such as “PHP 4.3.0 file disclosure and possible code execution.
Parameter Manipulation Checks

Cross-Site Scripting (XSS)
Cross-Site Request Forgery (CSRF)
SQL Injection
Code Execution
Directory Traversal
HTTP Parameter Pollution
File Inclusion
Script Source Code Disclosure
CRLF Injection
Cross Frame Scripting (XFS)
PHP Code Injection
XPath Injection
Path Disclosure
(Unix and Windows)
LDAP Injection
Cookie Manipulation
Arbitrary File creation (AcuSensor Technology)
Arbitrary File deletion (AcuSensor Technology)
Email Injection (AcuSensor Technology)
File Tampering (AcuSensor Technology)
URL redirection
Remote XSL inclusion
DOM XSS
MultiRequest Parameter Manipulation
Blind SQL/XPath Injection
Input Validation
Buffer Overflows
Sub-Domain Scanning
File Checks

Checks for Backup Files or Directories - Looks for common files (such as logs, application traces, CVS web repositories)
Cross Site Scripting in URI
Checks for Script Errors
File Uploads

Unrestricted File uploads Checks
Directory Checks

Looks for Common Files (such as logs, traces, CVS)
Discover Sensitive Files/Directories
Discovers Directories with Weak Permissions
Cross Site Scripting in Path and PHPSESSID Session Fixation.
Web Applications
HTTP Verb Tampering
Text Search

Directory Listings
Source Code Disclosure
Check for Common Files
Check for Email Addresses
Microsoft Office Possible Sensitive Information
Local Path Disclosure
Error Messages
Trojan Shell Scripts (such as popular PHP shell scripts like r57shell, c99shell etc)
Weak Password Checks

Weak HTTP Passwords
Authentication attacks
Weak FTP passwords
Google Hacking Database (GHDB)

Over 1200 Google Hacking Database Search Entries
Port Scanner and Network Alerts

Finds All Open Ports on Servers
Displays Network Banner of Port
DNS Server Vulnerability: Open Zone Transfer
DNS Server Vulnerability: Open Recursion
DNS Server Vulnerability: Cache Poisoning
Finds List of Writable FTP Directories
FTP Anonymous Access Allowed
Checks for Badly Configured Proxy Servers
Checks for Weak SNMP Community Strings
Finds Weak SSL Cyphers
[http://www.acunetix.com/support/vulnerability-checks/]

inetsct'google-hacking

name::
* McsEngl.inetsct'google-hacking@cptIt,
* McsEngl.google-hacking@cptIt,

_DESCRIPTION:
What a Hacker can do if your Website is Vulnerable

Information that the Google Hacking Database identifies:
Advisories and server vulnerabilities
Error messages that contain too much information
Files containing passwords
Sensitive directories
Pages containing logon portals
Pages containing network or vulnerability data such as firewall logs.
[http://www.acunetix.com/websitesecurity/google-hacking/]

inetsct'youtube-visit

name::
* McsEngl.inetsct'youtube-visit@cptIt,

FINANCIAL TIMES
Tuesday August 13 2013
FT EXCLUSIVE
Software that hijacks visits to YouTube uncovered
Online investigators have uncovered a new type of software that is hijacking web users’ visits to the YouTube website and inserting an extra layer of adverts – some of which load malicious programmes on to the users’ computers

inetsct'attack.DoS

name::
* McsEngl.inetsct'attack.DoS@cptIt,
* McsEngl.denial-of-service-attack@cptIt,
* McsEngl.DoS-attack@cptIt,

_DESCRIPTION:
In computing, a denial-of-service attack (DoS attack) is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.[1] A DoS attack is analogous to a group of people crowding the entry door or gate to a shop or business, and not letting legitimate parties enter into the shop or business, disrupting normal operations.
Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks or credit card payment gateways. Revenge, blackmail[2][3][4] and activism[5] can motivate these attacks.
[https://en.wikipedia.org/wiki/Denial-of-service_attack]

Resource

_ADDRESS.WPG:
* https://www.hyperfilter.com//

inetsct'attack.DDoS

name::
* McsEngl.inetsct'attack.DDoS@cptIt,
* McsEngl.distributed-denial-of-service-attack@cptIt,
* McsEngl.DDoS-attack@cptIt,

_DESCRIPTION:
A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.[6] Such an attack is often the result of multiple compromised systems (for example, a botnet) flooding the targeted system with traffic. A botnet is a network of zombie computers programmed to receive commands without the owners' knowledge.[17] When a server is overloaded with connections, new connections can no longer be accepted. The major advantages to an attacker of using a distributed denial-of-service attack are that multiple machines can generate more attack traffic than one machine, multiple attack machines are harder to turn off than one attack machine, and that the behavior of each attack machine can be stealthier, making it harder to track and shut down. These attacker advantages cause challenges for defense mechanisms. For example, merely purchasing more incoming bandwidth than the current volume of the attack might not help, because the attacker might be able to simply add more attack machines. This, after all, will end up completely crashing a website for periods of time.
[https://en.wikipedia.org/wiki/Denial-of-service_attack#Distributed_DoS_attack]
===
As has reported already, the recent Bitcoin ‘fork,’ Bitcoin Gold, was the victim of a DDoS attack on the very day it started.
According to the official Bitcoin Gold Twitter account, the platform was under a huge request barrage as the altcoin was seeking to get off the ground, with 10 mln requests per minute. With such huge volume, the site was down for most of the launch day, and took a couple of days to become fully functioning again.
[https://cointelegraph.com/news/how-blockchain-wouldve-saved-bitcoin-gold-can-stop-hackers]

inetsct'botnet

name::
* McsEngl.inetsct'botnet@cptIt,

_DESCRIPTION:
* https://www.youtube.com/watch?v=UdFigmjVwIA,

inetsct'China

name::
* McsEngl.inetsct'China@cptIt,

China Most Threatening Cyberspace Force, U.S. Panel Says
By Tony Capaccio - Nov 6, 2012 1:04 AM GMT+0200
China is “the most threatening actor in cyberspace” as its intelligence agencies and hackers use increasingly sophisticated techniques to gain access to U.S. military computers and defense contractors, according to the draft of an annual report mandated by Congress.
Chinese hackers are moving into “increasingly advanced types of operations or operations against specialized targets,” such as sensors and apertures on deployed U.S. military platforms, according to the report.
“China’s persistence, combined with notable advancements in exploitation activities over the past year, poses growing challenges to information systems and their users,” the U.S.- China Economic and Security Review Commission said in the draft obtained by Bloomberg News. “Chinese penetrations of defense systems threaten the U.S. military’s readiness and ability to operate.”
A U.S. intelligence official, speaking on the condition of anonymity to discuss classified matters, described as relentless China’s efforts to blind or disrupt U.S. intelligence and communications satellites, weapons targeting systems, and navigation computers.
The commission’s draft report bolsters warnings by U.S. officials that cyberattacks pose growing risks to the military and to critical industries such as electric utilities, pipelines, and telecommunications. Defense Secretary Leon Panetta cited Chinese and Russian capabilities in an Oct. 11 speech, saying cyber threats could become as devastating as the Sept. 11, 2001, terrorist attacks.
[http://www.bloomberg.com/news/2012-11-05/china-most-threatening-cyberspace-force-u-s-panel-says.html]

inetsct'content-security-policy

name::
* McsEngl.inetsct'content-security-policy@cptIt,
* McsEngl.content-security-policy@cptIt,
* McsEngl.CSP@cptIt,

_ADDRESS.WPG:
* http://www.w3.org/TR/CSP//
* http://www.html5rocks.com/en/tutorials/security/content-security-policy//

inetsct'control

name::
* McsEngl.inetsct'control@cptIt,
* McsEngl.internet'control@cptIt,

_ADDRESS.WPG:
* https://www.weforum.org/agenda/2016/04/what-can-governments-learn-from-digital-disruptors//

inetsct'cybercrime

name::
* McsEngl.inetsct'cybercrime@cptIt,
* McsEngl.sybercrime@cptIt,

Θύματα εκβιασμού οι άνδρες της Σιγκαπούρης
ΑΘΗΝΑ 22/02/2013

Η αστυνομία της Σιγκαπούρης προειδοποίησε τους άνδρες της πόλης ότι, οι περιπτώσεις εκβιασμού έχουν πενταπλασιαστεί.

Η τελευταία περίπτωση αφορά τους άνδρες, οι οποίοι πείθονται ώστε να γδυθούν μπροστά στην κάμερα του υπολογιστή τους και στη συνέχεια τους εκβιάζουν ότι θα κοινοποιήσουν τις γυμνές τους φωτογραφίες και βίντεο, εάν δεν αποστείλουν κάποιο χρηματικό ποσό.

Οι αστυνομικοί του νησιωτικού έθνους αναφέρουν ότι, ο αριθμός τέτοιων περιστατικών έχει εκτοξευθεί από 11 το 2011 σε πάνω από 50 το προηγούμενο έτος.

Συνήθως, οι γυναίκες που συμμετέχουν επικοινωνούν με τα θύματα τους στέλνοντας μηνύματα σε δημοφιλείς ιστοσελίδες κοινωνικής δικτύωσης, πριν τους πείσουν να μιλήσουν μέσω της κάμερας. Στη συνέχεια, οι εκβιαστές βγάζουν τα ρούχα τους ενθαρρύνοντας τα θύματά τους να κάνουν το ίδιο.

Πηγή: SecNews.gr
[http://www.nooz.gr/tech/8imata-ekviasmoi-oi-andres-tis-sigkapoiris]

inetsct'EUROPEAN-CYBERCIME-CENTRE

_CREATED: {2013-01-12}

name::
* McsEngl.inetsct'EUROPEAN-CYBERCIME-CENTRE@cptIt,
* McsEngl.EC3@cptIt, {2013-01-12}
* McsEngl.european-cybercime-centre@cptIt, {2013-01-12}

_DESCRIPTION:
A collective EU response to cybercrime

Following a feasibility study conducted by Rand Corporation Europe, the European Commission decided to establish a European Cybercrime Centre (EC3) at Europol. The Centre will be the focal point in the EU’s fight against cybercrime, contributing to faster reactions in the event of online crimes. It will support Member States and the European Union’s institutions in building operational and analytical capacity for investigations and cooperation with international partners.
EC3 officially commenced its activities on 1 January 2013 with a mandate to tackle the following areas of cybercrime:
That committed by organised groups to generate large criminal profits such as online fraud
That which causes serious harm to the victim such as online child sexual exploitation
That which affects critical infrastructure and information systems in the European Union
The European Cybercrime Centre is hosted by Europol; the European law enforcement agency in The Hague, The Netherlands, and thus EC3 can draw on Europol’s existing infrastructure and law enforcement network.
[https://www.europol.europa.eu/ec3]

inetsct'EVOLUTION#cptCore546.171#

name::
* McsEngl.inetsct'EVOLUTION@cptIt,

{time.2015}:
=== Hackers steal data on 2.4m Carphone Warehouse customers
Up to 2.4m Carphone Warehouse customers may have had their personal information and bank details compromised, after the mobile phone retailer said its systems had been breached by a sophisticated cyber attack.
[FINANCIAL TIMES, Saturday August 08 2015, BREAKING NEWS]

{time.2013}:
=== 2013-07-17: Half of exchanges fight off cyber attacks
Findings in WFE-Iosco report underline how authorities and exchanges are growing concerned that a potential large-scale attack on infrastructure operators could damage integrity of markets
http://link.ft.com/r/H60H77/VTWKHJ/GKIV3K/GYXOL0/GYCE4C/W1/h?a1=2013&a2=7&a3=17

=== 2013-06-24: Europol battles cyber ‘bands of brothers’
Sophisticated gangs combining computer hackers and financial services experts are able to exploit weaknesses in financial system, says crime agency
http://link.ft.com/r/S4XZQQ/RPAS4R/C5X6J5/5VO3ZL/HI00YN/50/h?a1=2013&a2=6&a3=24

=== Documents: U.S. mining data from 9 leading Internet firms; companies deny knowledge
By Barton Gellman and Laura Poitras, Updated: Friday, June 7, 4:09 AM E-mail the writer
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.

The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.

Graphic

NSA slides explain the PRISM data-collection program
Related stories
‘No Such Agency’ spies on the communications of the world

Anne Gearan 12:35 AM ET
The National Security Agency, nicknamed such for years, is the U.S. government’s eavesdropper-in-chief.
Report: NSA asked Verizon for all U.S. call data

Ellen Nakashima JUN 6
If document requiring company to submit phone records for millions of Americans is authentic, it would be the broadest surveillance order known to date.
All about the NSA surveillance program.

Timothy B. Lee JUN 6
What has the government been doing? Is it legal? Does it mean some bureaucrat somewhere has heard all your phone calls? Read on to find out.
Administration, lawmakers defend NSA program to collect phone logs

Ellen Nakashima, Jerry Markon and Ed O’Keefe JUN 6
The National Security Agency secretly collected phone records of millions of Verizon customers.

Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.”
[http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html]

{time.2012}:
=== 2012-12-05: Hackers net €36m in Europe banking attack
By Bede McCarthy in London
Hackers have stolen more than €36m from 30 banks across Europe using a new two-stage Trojan virus that spreads from a victim’s PC to their mobile phone.
More than 30,000 online banking customers in Germany, Italy, Spain and the Netherlands were affected by the attack, which security companies have called Eurograbber.
It is the second significant online banking breach this year. The first, Operation High Roller, involved an estimated $60m in fraudulent money transfers at 60 financial institutions, according to Guardian Analytics, an online banking security company.
http://link.ft.com/r/YIQXNN/WHHUJ0/9Z5BQZ/97TGE9/9MKTRD/QR/h?a1=2012&a2=12&a3=5

=== 2012-11-24: Συνεχίζονται οι επιθέσεις χάκερ στο Ισραήλ
ΑΘΗΝΑ 24/11/2012
Οι hackers συνεχίζουν τις διαμαρτυρίες σχετικά με τις επιθέσεις που πραγματοποιούνται στη Γάζα, μέσω μαζικών διαδικτυακών επιθέσεων κατά του Ισραήλ, με αποτέλεσμα κυβερνητικές ιστοσελίδες να έχουν παραβιαστεί, αλλοιωθεί, τεθεί εκτός λειτουργίας ή να έχει διαρρεύσει η βάση δεδομένων τους.
Οι Anonymous διέρρευσαν δεδομένα 5000 αξιωματούχων του Ισραήλ και οι «Pakistani hackers» αλλοίωσαν διάφορες γνωστές ιστοσελίδες.
Επίθεση hacking, από την ομάδα WikiBoatBrazil, δέχθηκαν και οι Μυστικές Υπηρεσίες του Ισραήλ (mossad.gov.il). Οι hackers διέρρευσαν τα στοιχεία λογαριασμού του διαχειριστή.
Τέλος, η ομάδα «Venezuelan Hackers» διέρρευσε 1850 λογαριασμούς της Ένωσης Συνομοσπονδίας του Ισαρήλ στη Βενεζουέλα (caiv.org). Τα δεδομένα περιείχαν ονόματα χρηστών, διευθύνσεις ηλεκτρονικού ταχυδρομείου, ονοματεπώνυμα και κωδικούς πρόσβασης σε μορφή απλού κειμένου.
Πηγή: SecNews.gr
[http://www.nooz.gr/tech/sunexizontai-oi-epi8eseis-xaker-sto-israil]

=== 2012-06-26: MI5 chief sets out price of cyber espionage
State-sponsored cyberattacks against the computer systems of a major listed British company cost it £800m in lost potential revenues, the head of Britain’s domestic Security Service MI5 said on Monday, highlighting the huge threat that UK business faces from internet-based espionage
http://link.ft.com/r/WDI4RR/62L3F7/5CA1DC/97RA2M/DWC125/GX/h?a1=2012&a2=6&a3=25
=== DUBBED FLAME:
Massive targeted cyber-attack in Middle East uncovered
Flame, which is designed to steal stored files and information about targeted systems, appears to be state sponsored, Kaspersky Labs says.

by Steven Musil May 28, 2012 8:42 AM PDT

A complex targeted virus has been discovered stealing data in the Middle East, security researchers announced today.
The malware -- dubbed Flame -- has been operation since 2010 and appears to be a state sponsored, Kaspersky Labs said today, but it was not sure of its origins. Flame is designed to steal information about targeted systems and stored files as well as computer display contents and audio conversations.
"The complexity and functionality of the newly discovered malicious program exceed those of all other cyber menaces known to date," Kaspersky Labs said in statement announcing the malware's discovery.
The virus is about 20 times the size of Stuxnet, malware that targeted the controls of an Iranian nuclear facility. The largest concentration of infected machines is in Iran, followed by Israel/Palestine region, Sudan, Syria, Lebanon, Saudi Arabia and Egypt.
"The preliminary findings of the research, conducted upon an urgent request from ITU, confirm the highly targeted nature of this malicious program," Kasperky Labs' chief expert Alexander Gostev said in a statement. "One of the most alarming facts is that the Flame cyber-attack campaign is currently in its active phase, and its operator is consistently surveilling infected systems, collecting information and targeting new systems to accomplish its unknown goals."
Eugene Kaspersky, the founder and CEO of the Kaspersky compared the new virus with Stuxnet and said it appeared to open a new front in state-sponsored cyber warfare. However, he said its full significance won't be understood until more security researchers examine the malware.
"The Flame malware looks to be another phase in this war, and it's important to understand that such cyber weapons can easily be used against any country," Kaspersky said in a statement. "Unlike with conventional warfare, the more developed countries are actually the most vulnerable in this case."
[http://news.cnet.com/8301-1009_3-57442473-83/massive-targeted-cyber-attack-in-middle-east-uncovered/?tag=mncol;topStories]

{time.2010}:
=== 2010.06: STUXNET:
Originally published Friday, June 1, 2012 at 10:35 PM
Officials: Stuxnet cyberweapon was work of U.S., Israel
The use of the cyberweapon — malware designed to infiltrate and damage computer systems — was supposed to make Iranian leaders think their engineers were incapable of running a nuclear-enrichment facility.

By The Washington Post and the Los Angeles Times

WASHINGTON — A damaging cyberattack against Iran's nuclear program was the work of U.S. and Israeli experts and proceeded under the secret orders of President Obama, who was eager to slow Iran's apparent progress toward building an atomic bomb without launching a traditional military attack, current and former U.S. officials say.

The origins of the cyberweapon, dubbed Stuxnet after it was discovered in 2010, long have been debated, with most experts concluding the United States and Israel probably collaborated on the effort. The current and former U.S. officials confirmed that long-standing suspicion Friday, after a New York Times report.

The officials, speaking on condition of anonymity, said the virus first was developed during the George W. Bush administration and was geared toward damaging Iran's nuclear capability gradually while sowing confusion among Iranian scientists about the cause of mishaps at a nuclear plant.

The use of the cyberweapon — malware designed to infiltrate and damage computer systems — was supposed to make the Iranians think their engineers were incapable of running an enrichment facility.

"The idea was to string it out as long as possible," one participant said. "If you had wholesale destruction right away, then they generally can figure out what happened, and it doesn't look like incompetence."

Even after software-security companies discovered Stuxnet loose on the Internet in 2010, causing concern among U.S. officials, Obama secretly ordered the operation continued.

Overall, the attack destroyed nearly 1,000 of Iran's 6,000 centrifuges — fast-spinning machines that enrich uranium. The National Security Agency (NSA) developed the cyberweapon with Israel's help.

White House officials declined to comment on the new details about Stuxnet, and an administration spokesman denied the material had been leaked for political advantage.

"It's our view, as it is the view of everybody who handles classified information, that information is classified for a reason: that it is kept secret," deputy press secretary Josh Earnest said. "It is intended not to be publicized because publicizing it would pose a threat to our national security."

Started in 2006 as a way to damage centrifuges at Iran's uranium-enrichment plant in Natanz, the cyberweapon began to show effects in 2008, when centrifuges began spinning at faster-than-normal speeds until sensitive components began to warp and break, participants said.

U.S. officials were concerned when security companies began reporting on the discovery of the worm in June 2010.

"It took us a little while to figure out" the virus had spread, although it was not damaging machines other than those at Natanz, an official said.

Iran, which repeatedly has said its nuclear program is solely for peaceful purposes, replaced the damaged machines and has continued to enrich uranium.

Efforts are under way to decipher the origins of another malicious program experts believe is part of government-sponsored cyber warfare and intelligence gathering. Again, Iran is the target.

As the Los Angeles Times reported this week, experts at Russia's Kaspersky Lab came across this malware while searching for a villain dubbed the Wiper.

Flame, as it's called, can copy and steal data and audio files, turn on a computer microphone and record all nearby sounds, take screen shots, read documents and emails, and capture passwords and logins.

The program can communicate with computers in the vicinity through the infected computer's Bluetooth and locate them even without an Internet connection, said Vitaly Kamlyuk, a senior anti-virus expert at Kaspersky.

"Many people still think that cyber warfare is a myth and a fantasy," he said, "but as we reassemble and study one by one the numerous components and modules of this unique program, we see that it is a real weapon of this undeclared war that is already going on."
[http://seattletimes.nwsource.com/html/nationworld/2018336484_cyberwar02.html]

inetsct'organization

name::
* McsEngl.inetsct'organization@cptIt,

_ADDRESS.WPG:
* http://www.cert.org//
* https://cert.grnet.gr/

inetsct'PERSONAL-DATA

name::
* McsEngl.inetsct'PERSONAL-DATA@cptIt,

Τα ευαίσθητα δεδομένα και το Internet
Κ. Χ. ΑΡΓΥΡΟΠΟΥΛΟΣ
ΠΡΙΝ από δύο εβδομάδες η εφημερίδα «Daily Mirror» δημοσίευσε στοιχεία σχετικά με τα έξοδα σε αγορές του τραγουδιστή Elton John, βασιζόμενη στις πληροφορίες που είχε συλλέξει ένας ασκούμενος δικηγόρος, θαυμαστής του διάσημου τραγουδιστή. Κύρια πηγή συλλογής των πληροφοριών αυτών ήταν το δίκτυο Internet. Ο εν λόγω ασκούμενος δικηγόρος προχωρούσε και σε επεξεργασία των πληροφοριών, τα αποτελέσματα της οποίας και διέθετε επ' αμοιβή στους ενδιαφερομένους.
Το παράδειγμα αυτό είναι ένα μόνο από τα χιλιάδες που υπάρχουν και αφορούν περιπτώσεις επεξεργασίας προσωπικών πληροφοριών, δεδομένων προσωπικού χαρακτήρα, κατά τη διατύπωση του Ν. 2472/1997, όχι μόνον επώνυμων προσώπων, αλλά κυρίως ανώνυμων πολιτών, οι οποίες γίνονται τις περισσότερες φορές χωρίς τη συναίνεσή των.
Τα «δεδομένα προσωπικού χαρακτήρα» ορίζονται ως κάθε πληροφορία που αναφέρεται στο υποκείμενο των δεδομένων, η δε επεξεργασία τους ως κάθε εργασία που εφαρμόζεται με ή χωρίς τη βοήθεια αυτοματοποιημένων μεθόδων σε δεδομένα προσωπικού χαρακτήρα, όπως η συλλογή, η καταχώριση, η αποθήκευση, η διάθεση, η δέσμευση (κλείδωμα), η διαγραφή.
Πρόκειται για τη δυνατότητα που παρέχει η σύγχρονη τεχνολογία της πληροφορικής για τη συγκέντρωση πληροφοριών που αφορούν την προσωπική, οικογενειακή, επαγγελματική κατάσταση του ατόμου, την κοινωνική του θέση, αλλά και τις ιδέες και τους διαλογισμούς του. Με την εξέλιξη της πληροφορικής και των τηλεπικοινωνιών οι πληροφορίες αυτές μπορούν να υφίστανται κάθε είδους επεξεργασία και να μεταδίδονται σε οποιονδήποτε τρίτο, χωρίς το ενδιαφερόμενο πρόσωπο να το γνωρίζει. Και αυτό μπορεί να συμβεί στις τράπεζες ή στις ασφαλιστικές εταιρείες, όπου τηρούνται ηλεκτρονικά αρχεία με διάφορα στοιχεία των πελατών.
Ξεκινώντας από τη βασική αρχή ότι ο πολίτης πρέπει να είναι γνώστης των στοιχείων που συλλέγονται γι' αυτόν και για ποιο σκοπό ο Ν. 2472/1997, για την προστασία του ατόμου από την επεξεργασία δεδομένων προσωπικού χαρακτήρα, θέτει ως προϋπόθεση της επεξεργασίας τη συγκατάθεση του υποκειμένου των δεδομένων, δίδοντας με τον τρόπον αυτόν ένα σαφές μήνυμα σε όσους προσπαθήσουν να χρησιμοποιήσουν στοιχεία για κάποιο πολίτη χωρίς αυτός να το γνωρίζει.
Διακρίνει όμως ο νόμος τα δεδομένα σε ευαίσθητα και μη ευαίσθητα, αναφέροντας ως ευαίσθητα τα δεδομένα που αφορούν τη φυλετική ή εθνική προέλευση, τα πολιτικά φρονήματα, τις θρησκευτικές ή φιλοσοφικές πεποιθήσεις, την υγεία, την ερωτική ζωή, καθώς και τα σχετικά με ποινικές διώξεις ή καταδίκες.
Τα δεδομένα αυτά εντάσσονται σε ένα πιο αυστηρό πλαίσιο προστασίας σε σύγκριση με αυτό που προβλέπεται για τα υπόλοιπα δεδομένα.
Παράλληλα, με τη χρησιμοποίηση γενικών και ως ένα σημείο ασαφών εννοιών, όπως για παράδειγμα «δημόσιο συμφέρον», «δημόσια εξουσία», ο εν λόγω νόμος καθιστά θεμιτή σε ορισμένες περιπτώσεις την επεξεργασία των δεδομένων και χωρίς τη συγκατάθεση του υποκειμένου αυτών.
Λαμβάνοντας υπόψη ότι η εξέλιξη της πληροφορικής και η μετάβαση από την πληροφορική στην τηλεπληροφορική έχει προκαλέσει έκρηξη στις διαδικασίες επεξεργασίας των πληροφοριών και ότι διαρκώς νέοι ­ πλουσιότεροι ­ τρόποι επεξεργασίας εμφανίζονται, έχουμε ανάγκη από μια περισσότερο αυστηρή προστασία των δεδομένων προσωπικού χαρακτήρα.
Ολα τα δεδομένα προσωπικού χαρακτήρα είναι ευαίσθητα. Γι' αυτό και θα πρέπει να προστατεύονται ανάλογα με την ευαισθησία τους αλλά και να προσδιορίζεται συγκεκριμένα, περίπτωση κατά περίπτωση, πότε είναι εφικτή η επεξεργασία τους δίχως τη συναίνεση του προσώπου το οποίο αφορούν.
Ο κ. Κωνσταντίνος Χ. Αργυρόπουλος είναι δικηγόρος.


ΤΟ ΒΗΜΑ, 05-04-1998 Κωδικός άρθρου: B12475A751

inetsct'resourceInfHmn#cptResource843#

name::
* McsEngl.inetsct'resourceInfHmn@cptIt,

_ADDRESS.WPG:
* ψηφιακά-αποτυπώματα: http://internet-safety.sch.gr/index.php/articles/teach/item/592-df,
* http://www.esafetylabel.eu/web/guest/contact,
* http://arstechnica.com/security/2015/10/how-the-nsa-can-break-trillions-of-encrypted-web-and-vpn-connections//
* http://internet-safety.sch.gr//
* http://www.videoman.gr/32300,
* http://www.html5rocks.com/en/tutorials/security/content-security-policy//
* https://www.owasp.org/index.php/Main_Page,
* https://aboutlockify.com/security/open-source-standards-transparency//

Russian criminals steal 1.2 billion passwords:
By James O'Toole and Jose Pagliery @CNNTech August 6, 2014: 6:56 AM ET
russian cybercriminals
Hackers from Russia and Eastern Europe are known for launching sophisticated cyberattacks for financial gain.
NEW YORK (CNNMoney)
Russian criminals have stolen 1.2 billion Internet user names and passwords, amassing what could be the largest collection of stolen digital credentials in history, a respected security firm said Tuesday.
The news was first reported by The New York Times, which cited research from Milwaukee-based Hold Security. The firm didn't reveal the identities of the targeted websites, citing nondisclosure agreements and a desire to prevent existing vulnerabilities from being more widely exploited.

Hold Security founder Alex Holden told CNNMoney that the trove includes credentials gathered from over 420,000 websites -- both smaller sites as well as "household names." The criminals didn't breach any major email providers, he said.
Holden said the gang makes its money by sending out spam for bogus products like weight-loss pills, and had apparently amassed its collection of digital credentials for that relatively innocuous purpose.
"It's really not that impactful to the individuals, and that's why they were under the radar for so long," Holden said. "They've ignored financial information almost completely."
Related: Hackers hit European Central Bank
But Holden said the gang's success at amassing passwords demonstrates that weak security procedures are common on websites of all sizes.
How to make credit cards more secure
How to make credit cards more secure
The criminals began collecting user data a few years ago by simply buying it on the black market. Their stash has grown significantly this year thanks to their use of an automated program that trawls the Internet to find vulnerabilities on websites, Holden said.
The reported theft dwarfs the one revealed last year by discount retailer Target (TGT), which admitted in December that hackers had stolen credit- and debit-card data from 40 million accounts.
Related: Cybersecurity: How safe are you?
Hackers from Russia and Eastern Europe are known for launching sophisticated cyberattacks for financial gain. Beyond spam, organized crime syndicates in the region have engaged in more sophisticated activities like corporate espionage and the theft of credit-card details.
The extent of the theft shows people need to better manage their credentials, cybersecurity experts say. Most people keep the same password for multiple services, such as banking, email and social media accounts. That allows hackers to turn a single password database into a treasure trove.
Related: Google's plan to rid the world of cyberattacks
One simple way to stem the damage is to use two-factor authentication whenever possible to sign into online services, said Eric Cowperthwaite, an executive at network security provider Core Security. This method requires you to enter a second password, usually generated by your smartphone, upon login.
Jay Kaplan, CEO of cybersecurity firm Synack, criticized the companies involved for not being alert enough about their own security.
"It's likely that most of them do not even realize how many times they've been compromised," he said.
[http://money.cnn.com/2014/08/05/technology/security/russian-hackers-theft/index.html]

Διεύθυνση-Δίωξης-Ηλεκτρονικού-Εγκλήματος

name::
* McsElln.Διεύθυνση-Δίωξης-Ηλεκτρονικού-Εγκλήματος,

Διεύθυνση Δίωξης Ηλεκτρονικού Εγκλήματος στα ακόλουθα στοιχεία επικοινωνίας:
· Στον πενταψήφιο αριθμό: 111 88
· Στέλνοντας e-mail στο : ccu@cybercrimeunit.gov.gr
· Μέσω της εφαρμογής (application) για έξυπνα τηλέφωνα (smartphones) με λειτουργικό σύστημα ios - android: CYBERKID.
[http://www.nooz.gr/tech/vinteoskopise-kai-dimosieuse-sto-diadiktuo-33xroni]

inetsct.EDGE

name::
* McsEngl.inetsct.EDGE@cptIt,
* McsEngl.edge-security@cptIt,

_DESCRIPTION:
Edge Security to the Rescue.
Instead of relying on enterprise server security, Edge-Security encrypts data first the user's device before it ever touches a network or server. A server-side hack yields nothing but fully encrypted, private data. A hack on a user’s device yields only the data of that one user vs millions of users. The incentive to attack the system is reduced by orders of magnitude.

Airbitz provides the world’s first edge security platform that allows developers to build apps that secure users’ data at “The Edge” utilizing several key technologies simultaneously.
Client-Side Encryption
Automatic Backup
Multi-device synchronization
One-Touch 2 Factor Authentication
Password Recovery
Revision Control / Rollback
[https://airbitz.co/]

inetsct.SERVER (centralized)

name::
* McsEngl.inetsct.SERVER (centralized)@cptIt,

_DESCRIPTION:
Digital security is undergoing a paradigm shift.
After decades of striving to secure personal info, money, financial info, and sensitive documents on centralized servers, we’ve discovered that it simply can’t be done. There is too great an incentive to break into the treasure troves of digital data on globally accessible internet servers. Every year, multiple large centralized services are hacked and cause massive data breaches.
[https://airbitz.co/]

netInt'Speed

name::
* McsEngl.netInt'Speed@cptIt,
* McsEngl.internet'speed@cptIt,

_ADDRESS.WPG:
* https://www.weforum.org/agenda/2016/12/bored-of-buffering-these-are-the-places-where-internet-speeds-are-highest??

Η Ελλάδα 92η στην ταχύτητα διαδικτύου
ΑΘΗΝΑ 03/02/2015
Την 92η θέση, μεταξύ 196 χωρών, καταλαμβάνει η Ελλάδα στις ταχύτητες του διαδικτύου, διεθνώς, ενώ η Γλυφάδα είναι η περιοχή της χώρας με το ταχύτερο ίντερνετ. Αυτό προκύπτει από μετρήσεις του Net Index, με βάση τα στοιχεία της OOKLA, όπως ανακοίνωσε ο Σύνδεσμος Επιχειρήσεων Πληροφορικής & Επικοινωνιών Ελλάδας (ΣΕΠΕ).

Η μέση ταχύτητα σύνδεσης στην Ελλάδα είναι τα 9,64 Mbps, που την κατατάσσει σε καλύτερη θέση από την Ιταλία, την Κύπρο και την Αλβανία, αλλά σε χειρότερη από πολλές άλλες ευρωπαϊκές χώρες.

Το ταχύτερο ίντερνετ στον κόσμο έχουν οι κάτοικοι της Σιγκαπούρης με μέση ταχύτητα 103,99Mbps και του Χονγκ Κόνγκ με 96,30 Mbps. Επίσης, με πολύ υψηλές ταχύτητες «σερφάρουν» οι κάτοικοι της Νότιας Κορέας με 76,88 Mbps και της Ιαπωνίας με 67,83 Mbps. Σουηδία, Ολλανδία, Λιθουανία και Ελβετία είναι οι χώρες της Ευρώπης που βρίσκονται μέσα στην πρώτη δεκάδα των χωρών με το ταχύτερο ίντερνετ στο κόσμο.

Η Δανία, η Λετονία, η Μολδαβία, η Ισλανδία, το Λουξεμβούργο, η Γαλλία, η Εσθονία, η Φινλανδία και η Νορβηγία βρίσκονται στην κορυφαία εικοσάδα στο γρήγορο ίντερνετ. Η Μπουρκίνα Φάσο έχει τις χαμηλότερες ταχύτητες ίντερνετ στον κόσμο, με μόλις 1,12 Mbps.

Σε παγκόσμια βάση η μέση ταχύτητα σύνδεσης είναι 22,04 Mbps, ενώ η μέση ευρυζωνική ταχύτητα στην Ευρώπη είναι 27,3 Mbps. Στις χώρες μέλη του ΟΟΣΑ, η μέση ταχύτητας σύνδεσης είναι τα 27,4 Mbps και στις χώρες του G8 28,8 Mbps.

Στην Ελλάδα, η Γλυφάδα, με 17,24 Mbps, είναι η πόλη με τις μεγαλύτερες ταχύτητες σύνδεσης στο διαδίκτυο, ενώ ακολουθούν η Βούλα με 17,04 Mbps και οι Σέρρες με 13,87 Mbps.

Την πρώτη πεντάδα συμπληρώνουν η Αλεξανδρούπολη με 13,5 Mbps και η Κομοτηνή με 11,46 Mbps.

Η Αθήνα βρίσκεται στη 16η θέση με μέση ταχύτητα 9,89 Mbps, ακολουθούμενη από τη Θεσσαλονίκη στη 17η θέση, με 9,87 Mbps. Χαμηλές ταχύτητες έχουν τα Ιωάννινα με 8,08 Mbps, η Καλαμάτα με 8,10 Mbps και η Ναύπακτος με 8,36 Mbps.
[http://www.nooz.gr/tech/i-ellada-92i-stin-taxitita-diadiktiou3215]

Resource

_ADDRESS.WPG:
* https://www.weforum.org/agenda/2016/12/bored-of-buffering-these-are-the-places-where-internet-speeds-are-highest??

netInt'Standard

_CREATED: {2007-12-08}

name::
* McsEngl.netInt'Standard@cptIt,
* McsEngl.conceptIt67.2,
* McsEngl.inet'standard@cptIt67.2,

_DEFINITION:
An Internet standard is a specification for an innovative internetworking technology or methodology, which the Internet Engineering Task Force (IETF) ratified as an open standard after the innovation underwent peer review.
An Internet standard begins as an Internet Draft, which may then be published (usually after several revisions) as a Request for Comments (RFC) memorandum. RFCs that are intended to become Internet standards evolve through a series of three maturation stages: proposed standard, draft standard, and standard. Collectively, these stages of evolution are known as the standards track, and are defined in RFC 2026. RFCs also include other things, such like lists of previous RFCs and basic introductions by TCP.
Not all RFCs are on the standards track, for a complete list of the statuses see the RFC article.
[http://en.wikipedia.org/wiki/Internet_standard]

netInt'RFC

name::
* McsEngl.netInt'RFC@cptIt,

UDP

name::
* McsEngl.UDP@cptIt67i,
* McsEngl.user-datagram-protocol@cptIt,

_DEFINITION:
Απευθύνεται κυρίως σε επικοινωνίες κατά τις οποίες απαιτείται μεγαλύτερη ταχύτητα απόκρισης. Σε αντίθεση με το TCP, δεν σπάει σε πακέτα τα δεδομένα, ενώ τον έλεγχο της επικοινωνίας δεν τον έχει το εκάστοτε λειτουργικό σύστημα (όπως συμβαίνει με το TCP) αλλά οι εφαρμογές που επικοινωνούν μεταξύ τους κάνοντας χρήση δύο υπολογιστών με συγκεκριμένες διευθύνσεις IP και θύρες. Το UDP ταιριάζει περισσότερο σε περιβάλλοντα εταιρικών δικτύων.
[RAM, 2002.05, 205]

MIME

name::
* McsEngl.mime@cptIt67.2i,

Multipurpose Internet Mail Extensions (MIME) is an Internet Standard that extends the format of e-mail to support:
* text in character sets other than US-ASCII;
* non-text attachments;
* multi-part message bodies; and
* header information in non-ASCII character sets.

Virtually all human-written Internet e-mail and a fairly large proportion of automated e-mail is transmitted via SMTP in MIME format. Internet e-mail is so closely associated with the SMTP and MIME standards that it is sometimes called SMTP/MIME e-mail.[1]

The content types defined by MIME standards are also of importance outside of e-mail, such as in communication protocols like HTTP for the World Wide Web. HTTP requires that data be transmitted in the context of e-mail-like messages, even though the data may not actually be e-mail.

MIME is specified in six RFCs : RFC 2045, RFC 2046, RFC 2047, RFC 4288, RFC 4289 and RFC 2077.
[http://en.wikipedia.org/wiki/MIME]

netInt'www#cptIt19#

name::
* McsEngl.netInt'www@cptIt,

netInt'EVOLUTING#cptCore546.171#

name::
* McsEngl.netInt'EVOLUTING@cptIt,
* McsEngl.internet'evolutin@cptIt,
* McsEngl.inet'evolution@cptIt,
* McsEngl.inet'time@cptIt,

{time.2014-12-23}:
=== For 9 hours, N. Korea 'erased from global map of Internet'
North Korea's Internet returns after a disruption due to a possible attack, amid a war of words with the U.S. over a cyberattack on Sony Pictures.
[cnn, 2014-12-23]

{time.2012-12-03}:
=== Internet governance
Governments squabble over new rules for the internet
Dec 1st 2012 | from the print edition
THE rules of the internet decide its speed, safety, accessibility, flexibility and unity. They therefore matter not just to computer enthusiasts, but to everyone with a stake in the modern world. On December 3rd officials from more than 150 countries, plus do-gooders, geeks and other interested parties, will meet in Dubai to argue about how to run the network—and fight over who should control it.
Since the internet’s creation, a ragtag bunch of academics, engineers, firms and non-profit outfits have been in charge. That delights innovators but has been a nightmare for the tidy-minded, and especially for authoritarian governments. They would like the net to be run like the world’s telephone system, with tight standards and clearly set charges. The Dubai meeting brings the chance to write new rules, with a review of an elderly treaty: the International Telecommunication Regulations.
[http://www.economist.com/news/21567340-governments-squabble-over-new-rules-internet-system-error]

{time.2011}:
On June 20, 2011 the ICANN board voted to end most restrictions on the names of generic top-level domains (gTLD).[38][39] Companies and organizations will be able to choose essentially arbitrary top level Internet domain names. The use of non-Latin characters (such as Cyrillic, Arabic, Chinese, etc.) will also be allowed in gTLDs. ICANN will begin accepting applications for new gTLDS on January 12, 2012.[38] The initial price to apply for a new gTLD will be $185,000.[40] The renewal or the annual fee of the domain will further be $25,000.[41][42] It is anticipated that many corporations will apply for gTLDs based on their brands. ICANN expects that the first batch of new gTLDs will be operational by the end of 2012.[43] ICANN expects the new rules to significantly change the face of the Internet. Peter Thrush, chairman of ICANN's board of directors stated after the vote: "Today's decision will usher in a new Internet age. We have provided a platform for the next generation of creativity and inspiration. Unless there is a good reason to restrain it, innovation should be allowed to run free."[44] Some would argue that the innovative freedom Peter Thrush talks about starts at $185,000, and thus is not accessible to everyone.[45]
[http://en.wikipedia.org/wiki/Icann]

{time.2006}:
On July 26, 2006, the United States government renewed the contract with ICANN for performance of the IANA function for an additional one to five years.[12] The context of ICANN's relationship with the U.S. government was clarified on September 29, 2006 when ICANN signed a new Memorandum of Understanding with the United States Department of Commerce (DOC).[13] This document does give the DoC a final, unilateral oversight over some of the ICANN operations. [13][14]
In July 2008, the U.S. Department of Commerce reiterated an earlier statement[15] that it has "no plans to transition management of the authoritative root zone file to ICANN". The letter also stresses the separate roles of the IANA and VeriSign.[16]
[http://en.wikipedia.org/wiki/Icann]

{time.1998}:
=== 1998-02-20: GREEN PAPER on MANAGEMENT OF INTERNET NAMES:
Before the establishment of ICANN, the Government of the United States controlled the domain name system of the Internet.[5]
The original mandate for ICANN came from the United States government, spanning the presidential administrations of both Bill Clinton and George W. Bush. On January 30, 1998, the National Telecommunications and Information Administration (NTIA), an agency of the U.S. Department of Commerce, issued for comment, "A Proposal to Improve the Technical Management of Internet Names and Addresses." The proposed rule making, or "Green Paper", was published in the Federal Register on February 20, 1998, providing opportunity for public comment. NTIA received more than 650 comments as of March 23, 1998, when the comment period closed.[citation needed]
The Green Paper proposed certain actions designed to privatize the management of Internet names and addresses in a manner that allows for the development of robust competition and facilitates global participation in Internet management. The Green Paper proposed for discussion a variety of issues relating to DNS management including private sector creation of a new not-for-profit corporation (the "new corporation") managed by a globally and functionally representative Board of Directors.[citation needed] ICANN was formed in response to this policy.[citation needed] The IANA function currently exists under an agreement with the U.S. Department of Commerce.[citation needed]
ICANN was incorporated in California on September 30, 1998.[1]
[http://en.wikipedia.org/wiki/Icann]

{time.1983}:
TO TCP/IP έγινε το υποχρεωτικό πρωτόκολλο, παρέχοντας τη δυνατότητα σε κάθε χρήστη να "βλέπει" με ομοιόμορφο τρόπο το δίκτυο, ανεξάρτητα απλο τον τρόπο σύνδεσης (σειριακή γραμμή, δορυφορική σύνδεση, ISDN κλπ).
[TELECOM (CGO), APR 1994, 44]

Forcast#cptCore395#

_ΒΙΟΜΗXΑΝΙΚΟ_ΔΙΑΔΙΚΤΥΟ:
Οι μηχανές μπορούν να "μιλάνε" μεταξύ τους;
ΑΘΗΝΑ 27/11/2012
Ένα μέλλον όπου οι παραγωγικές μηχανές των εργοστασίων θα είναι συνδεδεμένες σε ένα δικό τους διαδίκτυο και έτσι θα επικοινωνούν μεταξύ τους, ρυθμίζοντας και συγχρονίζοντας με αυτόματο τρόπο τις διάφορες λειτουργίες τους, παρά τις μεγάλες αποστάσεις που θα τις χωρίζουν, οραματίζεται η μεγάλη αμερικανική πολυεθνική General Electric (GE), όπως αναφέρει σε σχετική έκθεσή της.

Η έκθεση χαρακτηρίζει το «Βιομηχανικό Διαδίκτυο» το τρίτο μείζον κύμα επανάστασης στην οικονομική-τεχνολογική ιστορία του πλανήτη, μετά τη «Βιομηχανική Επανάσταση» (πρώτο κύμα) και την «Οικονομία του Ίντερνετ» (δεύτερο κύμα).

Όπως επισημαίνεται, ο κόσμος ήδη βρίσκεται στο κατώφλι αυτής της τρίτης επανάστασης, που σηματοδοτεί μια νέα εποχή καινοτομικών αλλαγών, μέσα από την επικών διαστάσεων «όσμωση» του ψηφιακού-ηλεκτρονικού και του μηχανικού-παραγωγικού κόσμου.

Όπως τονίζεται, «ο κόσμος των πληροφοριών έρχεται πλέον να συναντήσει τον κόσμο των μηχανών», μεταμορφώνοντας στην πορεία την παγκόσμια βιομηχανία.

Οι ερευνητές Πίτερ Έβανς και Μάρκο Ανουντσιάτα της GE αναφέρουν στην έκθεσή τους με τον εύγλωττο τίτλο «Βιομηχανικό Διαδίκτυο: Επεκτείνοντας τα σύνορα των μυαλών και των μηχανών», σύμφωνα με το Γαλλικό Πρακτορείο, ότι η σύνδεση των βιομηχανικών παραγωγικών διαδικασιών μέσω του Ίντερνετ υπόσχεται τεράστια κέρδη στο πεδίο της παραγωγικότητας, τα οποία μπορούν να φθάσουν τα 10 έως 15 τρισεκατομμύρια δολάρια παγκοσμίως (περίπου όσο το ΑΕΠ των ΗΠΑ).

Η έκθεση επισημαίνει ότι αυτά τα κέρδη θα αφορούν τόσο τις μεμονωμένες εταιρίες, όσο και τις εθνικές οικονομίες ως σύνολο.

«Το πλήρες δυναμικό του "Βιομηχανικού Διαδικτύου" θα γίνει αντιληπτό, όταν οι τρεις βασικές ψηφιακές συνιστώσες -οι έξυπνες συσκευές, τα έξυπνα συστήματα και οι έξυπνοι αυτοματισμοί- θα συγχωνευθούν ολοκληρωμένα με τις φυσικές μηχανές, τις παραγωγικές εγκαταστάσεις, τους στόλους των οχημάτων και τα εταιρικά δίκτυα», όπως επισημαίνει η έκθεση.

«Όταν αυτό θα συμβεί, τα οφέλη από τη βελτιωμένη παραγωγικότητα, τα χαμηλότερα κόστη, καθώς επίσης από τα μειωμένα κατάλοιπα και απόβλητα της παραγωγικής διαδικασίας, θα εξαπλωθούν σε όλο το εύρος της βιομηχανικής οικονομίας», προσθέτει.

Οι ερευνητές εκτιμούν ότι η φιλόδοξη υλοποίηση του Βιομηχανικού Διαδικτύου θα εξοικονομήσει εκατοντάδες δισεκατομμύρια δολάρια τόσο σε χρόνο εργασίας, όσο και σε παραγωγικούς πόρους, καθώς η επικοινωνία των μηχανών, σε συνδυασμό με τα νέου τύπου προγράμματα λογισμικού για τον έλεγχο και την ανάλυση των παραγωγικών διαδικασιών, θα καταστήσει πολύ πιο αποδοτική τη λειτουργία των επιχειρήσεων, ιδίως όσων πρώτες θα κάνουν το μεγάλο τεχνολογικό άλμα και θα πρωτοπορήσουν σε αυτό τον τομέα.

Ακόμα, πέρα από τις βιομηχανικές διαδικασίες, κέρδη παραγωγικότητας αναμένονται και σε άλλα πεδία, όπως της υγείας των εργαζομένων, της εξοικονόμησης ενέργειας, της μείωσης των εμπορευματικών μεταφορών και, κατά συνέπεια, της μικρότερης χρήσης καυσίμων στη ξηρά, τη θάλασσα και τον αέρα.

Πηγή: ΑΜΠΕ
[http://www.nooz.gr/tech/oi-mixanes-mporoin-na-milane-metaksi-tous]

ARPANET {1969}

name::
* McsEngl.ARPANET@cptIt,

_GENERIC:
* packet-switching-network#ql:netit.packet_switching#

_DESCRIPTION:
The Advanced Research Projects Agency Network (ARPANET) was a new technology funded (sponsored) by ARPA and partly developed by BBN, which began during 1969 to facilitate the sharing of data-processing facilities at four universities which achieved by the use of telecommunication networks, and later expanded to include a network of military bases, additional universities, and locations of research at the time being funded by ARPA. [1][2][3][4][5]

The ARPANET was an early packet-switching network and the first network to implement the Internet protocol suite, commonly known as TCP/IP, which became the technical foundation of the Internet.

Packet switching was based on concepts and designs by Americans Leonard Kleinrock and Paul Baran, British scientist Donald Davies[6][7] and Lawrence Roberts of the Lincoln Laboratory.[8] The TCP/IP communications protocols were developed for ARPANET by computer scientists Robert Kahn and Vint Cerf, and incorporated concepts by Louis Pouzin for the French CYCLADES project.
[https://en.wikipedia.org/wiki/ARPANET]

What Was the First Message Sent over the Internet?
The first electronic message sent between two computers was "lo"; the
system crashed before "login" could be typed.

The Information Age had a somewhat inauspicious beginning. Just three
months after man first walked on the Moon, a UCLA professor and a grad
student successfully sent a message over ARPANET, one of the world’s
first computer networks and the predecessor to the modern Internet, in
October 1969. Using a set of primitive routers that connected Leonard
Kleinrock and Charley Kline at UCLA with Bill Duvall at Stanford, on phone
lines leased from AT&T, the first message was sent. Attempting to transmit
the word “login,” a system crash limited the message to just “lo.”
An hour later, the entire message was transmitted successfully.

Read More:
http://www.wisegeek.com/what-was-the-first-message-sent-over-the-internet.htm?m {2018-10-03}

FvMcs.internet'World-Wide-Web (web)

name::
* McsEngl.conceptIt19,
* McsEngl.internet'World-Wide-Web (web)@cptIt,
* McsEngl.FvMcs.internet'World-Wide-Web (web)@cptIt,
* McsEngl.web'NAME@cptIt,
* McsEngl.web@cptIt,
* McsEngl.www@cptIt,
* McsEngl.global-village@cptIt19, {2012-04-15}
* McsEngl.Internet'www@cptIt19,
* McsEngl.web@cptIt19,
* McsEngl.world-wide-web@cptIt,
* McsEngl.w3@cptIt,
* McsEngl.www@cptIt19,
====== lagoGreek:
* McsElln.ΠΑΓΚΟΣΜΙΟ-ΠΛΕΓΜΑ-ΠΛΗΡΟΦΟΡΙΩΝ@cptIt,
* McsElln.ΠΑΓΚΟΣΜΙΟΣ-ΙΣΤΟΣ@cptIt,
* McsElln.παγκοσμιος-ιστος-πτ19@cptIt,

Today, the term "Global Village" is mostly used as a metaphor to describe the Internet and World Wide Web.[citation needed]
[http://en.wikipedia.org/wiki/Global_Village_(Internet)] {2012-04-15}

DEFINITION

_DEFINITION:
Web is an INTERNET-SERVICE that uses the communication-protocol http.
[hmnSngo.2011-08-24]

WWW is
- documents written in html and
- transfered with http.
[KasNik, 2007-12-02]

The World Wide Web (commonly shortened to the Web) is a system of interlinked, hypertext documents accessed via the Internet. With a web browser, a user views web pages that may contain text, images, videos, and other multimedia and navigates between them using hyperlinks. The World Wide Web was created in 1989 by Sir Tim Berners-Lee, working at CERN in Geneva, Switzerland. Since then, Berners-Lee has played an active role in guiding the development of web standards (such as the markup languages in which web pages are composed), and in recent years has advocated his vision of a Semantic Web. Robert Cailliau, also at CERN, was an early evangelist for the project.
[http://en.wikipedia.org/wiki/World_Wide_Web]
===
The World Wide Web (abbreviated as WWW or W3[2] and commonly known as the Web) is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia and navigate between them via hyperlinks.
Using concepts from earlier hypertext systems, British engineer and computer scientist Sir Tim Berners-Lee, now Director of the World Wide Web Consortium (W3C), wrote a proposal in March 1989 for what would eventually become the World Wide Web.[1] At CERN in Geneva, Switzerland, Berners-Lee and Belgian computer scientist Robert Cailliau proposed in 1990 to use hypertext "... to link and access information of various kinds as a web of nodes in which the user can browse at will",[3] and they publicly introduced the project in December.[4]
"The World-Wide Web was developed to be a pool of human knowledge, and human culture, which would allow collaborators in remote sites to share their ideas and all aspects of a common project."[5]
[http://en.wikipedia.org/wiki/Www] {2011-09-09}

Το www είναι ενα HYPERMEDIA ΠΡΩΤΟΚΟΛΟ.
[COMPUTER GO, JAN. 1995, 73]

World Wide Web is based mainly on documents written in Hypertext Markup Language (HTML),
[http://en.wikipedia.org/wiki/Semantic_Web]

Think of the Web as a vast library. Web sites are like the books, and Web pages are like pages in the books. Pages can contain whatever information their creators want to be available to Web users—information such as news, pictures, video clips, sounds, and so on. These pages can be located on computers anywhere in the world; you have the same access to Web sites in other countries as you do to sites in your home town.
[Encarta97, help]

To web αποτελει ουσιαστικά την πρώτη προσπάθεια ΔΙΑΣΥΝΔΕΣΗΣ ΤΗΣ ΣΩΡΕΥΜΕΝΗΣ ΓΝΩΣΗΣ που βρίσκεται διασκορπισμένη στο internet και επιτρεπει στον ᾳναζητητη της πληροφορίας' να φτάσει στο στοχο του, έστω και αν αυτος αγνοει το συγκεκριμένο αρχείο ή το συγκεκριμένο σερβερ ή ακόμα και τη χωρα όπου βρίσκεται αποθηκευμένη αυτή η πληροφορία.
[COMPUTER GO, DEC. 1994, 175]

To WWW είναι ένα σύστημα που αναπτύχθηκε στο CERN#cptIt389#, με κύριο στόχο τη ΔΙΑΝΟΜΗ ακαδημαικών πληροφοριών σε γεωγραφικά διασκορπισμένες ομάδες, καθώς και τη ΔΙΑΧΥΣΗ πληροφοριών απο ομάδες υποστήριξης. Οι τεχνικές της ανάκλησης ενώνονται με το hypertext, για να σχηματίσουν ένα εύκολο στη χρήση και πολύ ισχυρό παγκόσμιο πλέγμα-σύστημα πληροφορησης.
[TELENET (CGO), APR 1994, 47]

Το WWW είναι ένα σύστημα client/server, στο οποιο οι 'πελατες' ζητούν δεδομένα απο τους 'εξυπηρετητες' οι οποίοι πραγματικά εντοπίζουν και επεξεργάζονται τα δεδομένα και στη συνέχεια τα παρέχουν στους πελάτες.
[PC MASTER, OKT. 1944, 55]

web'GENERIC

_GENERIC:
* INTERNET SERVICE#cptItsoft421#

web'WHOLE

_WHOLE:
* internet##

web'Access

name::
* McsEngl.web'Access@cptIt,
* McsEngl.web-accessibility@cptIt19i,

Για προσβαση το multimedia-web χρειαζόταν ειδική σύνδεση SLIP, όμως απο τον προηγούμενο μήνα εμφανίστηκε pseudo-SLIP σύνδεση και την παρέχει η compulink.
[COMPUTER GO, DEC. 1994, 175]

web'Address#ql:webaddress@cptIt#

name::
* McsEngl.web'Address@cptIt,

web'Development

name::
* McsEngl.web'Development@cptIt,
* McsEngl.web-development@cptIt19i,

* McsEngl.webdev@cptIt,

_DESCRIPTION:
Web development is a broad term for the work involved in developing a web site for the Internet (World Wide Web) or an intranet (a private network). This can include web design, web content development, client liaison, client-side/server-side scripting, web server and network security configuration, and e-commerce development. However, among web professionals, "web development" usually refers to the main non-design aspects of building web sites: writing markup and coding. Web development can range from developing the simplest static single page of plain text to the most complex web-based internet applications, electronic businesses, or social network services.
For larger organizations and businesses, web development teams can consist of hundreds of people (web developers). Smaller organizations may only require a single permanent or contracting webmaster, or secondary assignment to related job positions such as a graphic designer and/or information systems technician. Web development may be a collaborative effort between departments rather than the domain of a designated department.
[http://en.wikipedia.org/wiki/Web_development]

_SPECIFIC:
* web_programming,

webdev'computer-language#cptIt149#

name::
* McsEngl.webdev'computer-language@cptIt,

webdev'design

name::
* McsEngl.webdev'design@cptIt,
* McsEngl.web'design@cptIt,

_DESCRIPTION:
Web design encompasses many different skills and disciplines in the production and maintenance of websites. The different areas of web design include web graphic design; interface design; authoring, including standardised code and proprietary software; user experience design; and search engine optimization. Often many individuals will work in teams covering different aspects of the design process, although some designers will cover them all.[1] The term web design is normally used to describe the design process relating to the front-end (client side) design of a website including writing mark up. Web design partially overlaps web engineering in the broader scope of web development. Web designers are expected to have an awareness of usability and if their role involves creating mark up then they are also expected to be up to date with web accessibility guidelines.
[https://en.wikipedia.org/wiki/Web_design]

webdev'resource

name::
* McsEngl.webdev'resource@cptIt,

_ADDRESS.WPG:
* http://www.webdevelopmenthelp.net//
* https://developers.google.com/web/fundamentals/?hl=en, Web Fundamentals Best practices for great multi-device web experiences

web'File-hosting-service

name::
* McsEngl.web'File-hosting-service@cptIt,

_GENERIC:
* web-hosting##

_SPECIFIC:
* dropbox
* google-drive {2012-04-24}
* sky-drive (microsoft {2007.08}

Dropbox

name::
* McsEngl.Dropbox@cptIt,

{time.2015}:
Dropbox <no-reply@dropboxmail.com>
2015-05-02 5:29 AM (4 hours ago)
Hi there,
If you're a user living outside of North America (U.S., Canada, Mexico), we're updating our Terms of Service to better serve you and the growing number of Dropbox users around the world. These changes include the fact that we'll be providing our services (including Dropbox, Dropbox for Business, Carousel, and Mailbox) to you via Dropbox Ireland starting on June 1, 2015. Please note that none of our services or features are changing as a result of this. You can read the updated terms at https://www.dropbox.com/terms.

Have questions about these changes? Visit our Help Center.
Thanks for using Dropbox!
The Dropbox Team

web'Hosting-organization

name::
* McsEngl.web'Hosting-organization@cptIt,
* McsEngl.conceptIt19.5,
* McsEngl.web-hosting@cptIt19.5,
* McsEngl.webhosting@cptIt19.5, {2012-05-29}

_GENERIC:
* internet-service,

_DESCRIPTION:
ISP stands for Internet Service Provider.
An ISP provides Internet Services.
A common Internet service is web hosting.
Web hosting means storing your web site on a public server.
Web hosting normally includes email services.
Web hosting often includes domain name registration.
[http://www.w3schools.com/hosting/host_intro.asp]

_SPECIFIC:
Some specific types of hosting provided by web host service providers:
File hosting service: hosts files, not web pages
Image hosting service
Video hosting service
Blog hosting service
Paste bin
Shopping cart software
E-mail hosting service
[http://en.wikipedia.org/wiki/Web_hosting_service]

webhosting'resource

name::
* McsEngl.webhosting'resource@cptIt,

_ADDRESS.WPG:
* http://www.quackit.com/web_hosting//

webhosting'Shell-access

name::
* McsEngl.webhosting'Shell-access@cptIt,
* McsEngl.secure-shell-account@cptIt19i, {2012-05-29}
* McsEngl.shell-account@cptIt19i, {2012-05-03}
* McsEngl.ssh-account@cptIt19i, {2012-05-29}

_DESCRIPTION:
A shell account is a user account on a remote server which gives access to a shell via a command-line interface protocol such as telnet or ssh.[1]
Originally they were provided by ISPs (such as Netcom (USA) and Digex) and were used for file storage, web space, email accounts, newsgroup access and software development.[2][3][4]
Shell providers are often found to offer shell accounts at low-cost or for free such as xShellz and many others.[5] These shell accounts generally provide users with access to various software and services including compilers, IRC clients, background processes, FTP, text editor (such as nano) and email client (such as pine).[6][7] Some shell providers may also allow tunneling of traffic to bypass corporate firewalls.
Shell accounts have been involved in illegal activity, such as denial of service attacks or distributing illegal software.[8][9][10]
[http://en.wikipedia.org/wiki/Shell_account]

ssh'program

name::
* McsEngl.ssh'program@cptIt,
* McsEngl.program.ssh@cptIt,

Bitvise SSH Client is free for individual use. Click here to download!

putty
\dl\programs\security

fireSSH:
* https://chrome.google.com/webstore/detail/firessh/mcognlamjmofcihollilalojnckfiajm/details,

java:
* http://javassh.org/space/Download,

ssh'protocol#cptIt587#

name::
* McsEngl.ssh'protocol@cptIt,

webhosting'Speed-connection

name::
* McsEngl.webhosting'Speed-connection@cptIt,

Connection Speed

In the early days of the Internet a T1 connection was considered a fast connection. Today connection speeds are much faster.

1 byte equals to 8 bits (and that's the number of bits used to transport one character). Low-speed modems can transport from about 14 000 to 56 000 bits per second (14 to 56 kilobits per second). That is somewhere between 2000 and 7000 characters per second, or about 1 to 5 pages of written text.

One kilobit (Kb) is 1024 bits. One megabit (Mb) is 1024 kilobits. One gigabit (Gb) is 1024 megabits.

These are connection speeds used on the Internet today:

Name  Connection  Speed per second
Modem  Analog  14.4-56Kb
D0  Digital (ISDN)  64Kb
T1  Digital  1.55Mb
T3  Digital  43Mb
OC-1  Optical Carrier  52Mb
OC-3  Optical Carrier  156Mb
OC-12  Optical Carrier  622Mb
OC-24  Optical Carrier  1.244Gb
OC-48  Optical Carrier  2.488Gb
Before you sign up with a host provider, surf some other web sites on their servers, and try to get a good feeling about their network speed. Also compare the other sites against yours, to see if it looks like you have the same needs. Contacting some of the other customers is also a valuable option.
[http://www.w3schools.com/hosting/host_capacity.asp]

webhosting'Storage-quantity

name::
* McsEngl.webhosting'Storage-quantity@cptIt,

How Much Disk Space?

A small or medium web site will need between 10 and 100MB of disk space.

If you look at the size of HTML pages, you will see that the average size is very small. But if you look at the size of the images used inside these pages, you will often find the images larger than the page.

Expect each HTML page to take up between 5 and 50KB of disk space on your web server, depending on the use of images or other space-consuming elements.

If you use a lot of images or graphic elements (or sound files or movies), you might need much more disk space.

Make sure you know your needs, before choosing a web host.
[http://www.w3schools.com/hosting/host_capacity.asp]

webhosting'Traffic

name::
* McsEngl.webhosting'Traffic@cptIt,

Monthly Traffic

A small or medium web site will consume between 1GB and 5GB of data transfer per month.

Calculate the following: average page size * expected page views per month

Example: If your average page size is 30KB and you expect 50,000 page views per month, you will need 0.03MB * 50,000 = 1.5GB.

Larger, commercial sites often consume more than 100GB of monthly traffic.

Before you sign up with a host provider, make sure to check this:

What are the restrictions on monthly transfer?
Will the web site be closed if it exceeds the volume?
Will you be billed a fortune if the web site exceeds the volume?
Is upgrading a simple task?
[http://www.w3schools.com/hosting/host_capacity.asp]

webhosting'Uptime

name::
* McsEngl.webhosting'Uptime@cptIt,

SPECIFIC

name::
* McsEngl.specific@cptIt,
* McsEngl.http.internet.HOSTING@cptIt,
* McsEngl.http.hosting@cptIt,
* McsEngl.http.web-hosting@cptIt,

webhosting.FREE

name::
* McsEngl.webhosting.FREE@cptIt,

_SPECIFIC:
* http://www.000webhost.com//

* http://www.weebly.com/
- http://synagonism.weebly.com/ 2011-05-14

* http://www.atspace.com/ 50MB,

webhosting.GREECE

name::
* McsEngl.webhosting.GREECE@cptIt,

http.pointer:
* http://www.pointer.gr/hosting/linux/goldhosting.php,
5Gb (5.120Mb)
Domains: 1
Subdomains: 15
Parked Domains: ?pe?????sta
FTP accounts: 1
????s? t? µ??a: Unmetered
MySQL Databases: 1
Plesk 9.5 Control panel
PHP5
3 months:  27€
6 " :  54€
12 " :  108€
24 " :  207€

http.webing:
* http://www.webing.gr/

webhosting.PAYED

name::
* McsEngl.webhosting.PAYED@cptIt,

http.SiteGround:
* https://www.siteground.com/web-hosting.htm,

http.arvixe:
* http://www.arvixe.com/
- from $4/month.

http.blueHost:
* http://www.bluehost.com/
- usa/Utah/Provo/

webhosting.TopHost

name::
* McsEngl.webhosting.TopHost@cptIt,
* McsEngl.http.TopHost@cptIt,
* McsEngl.TopHost@cptIt,

_ADDRESS.WPG:
* http://www.tophost.gr//
* server state: http://flashnews.tophost.gr//

_TOPHOST_PANEL:
* tophost panel: URL: https://www.tophost.gr/myTophost/index_en.php,
- διαχείριση ονομάτων,

_DOMAIN:
* synagonism.net#ql:synagonism.net_website#,

tophost'IP: 185.4.133.39,

_WEBHOSTING:
* 2013-05-30: Linux Economy Unlimited
- 62.12 (3.50 per month, 8.50 domain, fpa)

_PLESK_PANEL:
* https://linuxzone33.grserver.gr:8443,
- site management.

_FTP:
* ftp.synagonism.net,

_EMAIL:
* http://webmail.synagonism.net,
* "Incoming mail" (POP3): mail.synagonism.net,
* "Outgoing mail" (SMTP): mail.synagonism.net

tophost'SUPPORT:
* Email at support@tophost.gr
* Telephone at +30 281 1100 060, 801 100 4678
* Live Chat
* Helpdesk (tickets) through http://support.tophost.gr/
* http://www.youtube.com/user/TophostXtremeSupport,

tophost'SSH:
* send ticket.
===
* \pgmNet\putty
* putty.exe
* ftp auth.
* ls, exit,

tophost'WEB_ROOT:
httpdocs

tophost'htaccess

name::
* McsEngl.tophost'htaccess@cptIt,

tophost'register_globals:
Πώς μπορώ να ενεργοποιήσω ή απενεργοποιήσω το register_globals ;
Για να τροποποιήσετε το register_globals, ακολουθήστε τα παρακάτω βήματα:

Συνδεθείτε με FTP στον λογαριασμό σας και ελέγξτε αν υπάρχει το αρχείο .htaccess μέσα στον φάκελο httpdocs

Αν το αρχείο υπάρχει ήδη κατεβάστε το στον υπολογιστή σας. Αν δεν υπάρχει τότε δημιουργήστε σε ένα απλό κειμενογράφο (πχ Notepad) ένα αρχείο με κατάληξη .htaccess

Για να ενεργοποιήσετε την register_globals προσθέστε στο αρχείο .htaccess την παρακάτω γραμμή:
php_flag register_globals on

Αν επιθυμείτε να απενεργοποιήσετε την register_globals θα πρέπει να προσθέσετε την παρακάτω γραμμή:
php_flag register_globals off

Ανεβάστε το αρχείο .htaccess μέσα στον φάκελο httpdocs
[http://support.tophost.gr/kb/article/Πώς-μπορώ-να-ενεργοποιήσω-ή-απενεργοποιήσω-το-register_globals-%3b-754.html]

Αλλαγή αρχείου εκκίνησης ενός site (π.χ. index.html) για Plesk 8.x
Σε περίπτωση που ο server φιλοξενίας σας είναι Linux με Plesk 8
Τέτοιου είδους αλλαγές μπορούν να γίνουν πολύ εύκολα με τη χρήση του αρχείου .htaccess. Η διαδικασία είναι η εξής :
Ανοίξτε έναν text editor (πχ το Notepad) και δημιουργήστε ένα αρχείο χωρίς όνομα, με κατάληξη .htaccess. Αν στον server υπάρχει ήδη αυτό το αρχείο, απλώς κατεβάστε το με FTP στον υπολογιστή σας για να το τροποποιήσετε.

Προσθέστε μέσα στο αρχείο ".htaccess" την παρακάτω γραμμή και αποθηκεύστε το:
DirectoryIndex index.htm
(Στη γραμμή αντικαταστήστε το αρχείο "index.htm" με το αρχείο που θέλετε να ανοίγει το site σας.)

Αποθηκεύστε το αρχείο και ανεβάστε το με FTP μέσα στον φάκελο httpdocs.
Με την ολοκλήρωση της διαδικασίας το site σας θα ξεκινάει με το νέο αρχείο εκινησης.
[http://support.tophost.gr/kb/article/Αλλαγή-αρχείου-εκκίνησης-ενός-site-πχ-indexhtml-για-plesk-8x-757.html]

tophost'PHP

name::
* McsEngl.tophost'PHP@cptIt,

Μπορώ να αλλάξω κάποια ρύθμιση στο php.ini ;
Στα Shared & Reseller hosting πακέτα της Tophost, δεν επιτρέπεται πρόσβαση στο php.ini. Μπορείτε όμως να ενεργοποιήσετε ή να απενεργοποιήσετε διάφορες λειτουργίες του php.ini μέσα από το αρχείο .htaccess. Για παράδειγμα, μπορείτε να ενεργοποιήσετε / απενεργοποιήσετε το safe mode, το register globals, τα sessions και αρκετές άλλες ρυθμίσεις.
Σε υπηρεσίες VPS και Dedicated hosting, παρέχεται πλήρης πρόσβαση στο php.ini.
[http://support.tophost.gr/kb/article/Μπορώ-να-αλλάξω-κάποια-ρύθμιση-στο-phpini-%3b-740.html]

_VERSION:
PHP Version 5.3.13

Loaded Configuration File  /var/www/vhosts/synagonism.net/etc/php.ini

_SERVER["DOCUMENT_ROOT"]  /var/www/vhosts/synagonism.net/httpdocs

_SERVER["SERVER_NAME"]  synagonism.net

_SERVER["SERVER_SOFTWARE"]  Apache

_SERVER["SERVER_ADDR"]  185.4.133.39

_SERVER["SERVER_SIGNATURE"]  <address>Apache Server at synagonism.net Port 80</address>

_SERVER["SERVER_ADMIN"]  kaseluris.nikos@gmail.com

web'HTTP

name::
* McsEngl.web'HTTP@cptIt,

web'Language

name::
* McsEngl.web'Language@cptIt,

_SPECIFIC:
* webpage-language#cptItsoft149#

web'lng.WebIDL

name::
* McsEngl.web'lng.WebIDL@cptIt,
* McsEngl.webidl@cptIt,
* McsEngl.web-IDL@cptIt,
* McsEngl.IDL.Web@cptIt,
* McsEngl.lngWeb.Web-IDL@cptIt,
* McsEngl.ognW3c'Web-IDL@cptIt,
* McsEngl.w3c'web-IDL@cptIt,
* McsEngl.web-IDL@cptIt,

* McsEngl.widl@cptIt,

_ADDRESS.WPG:
* https://github.com/heycam/webidl,
* https://www.w3.org/TR/WebIDL-1//

_DESCRIPTION:
This document defines an interface definition language, Web IDL, that can be used to describe interfaces that are intended to be implemented in web browsers.
Web IDL is an IDL variant with a number of features that allow the behavior of common script objects in the web platform to be specified more readily.
How interfaces described with Web IDL correspond to constructs within ECMAScript execution environments is also detailed in this document.
It is expected that this document acts as a guide to implementors of already-published specifications, and that newly published specifications reference this document to ensure conforming implementations of interfaces are interoperable.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308//]

widl'Archetype

name::
* McsEngl.widl'Archetype@cptIt,

_DESCRIPTION:
This section describes a language, Web IDL, which can be used to define interfaces for APIs in the Web platform.
[https://www.w3.org/TR/WebIDL-1/#idl]

widl'Code

name::
* McsEngl.widl'Code@cptIt,

widl'code'grammar

name::
* McsEngl.widl'code'grammar@cptIt,

_DESCRIPTION:
This section defines an LL(1) grammar whose start symbol, Definitions, matches an entire IDL-fragment#ql:widl'idl_fragment#.

Each production in the grammar has on its right hand side either a non-zero sequence of terminal and non-terminal symbols, or an epsilon (e) which indicates no symbols.
Symbols that begin with an uppercase letter are non-terminal symbols.
Symbols within quotes are terminal symbols that are matched with the exact text between the quotes.
Symbols that begin with a lowercase letter are terminal symbols that are matched by the regular expressions (using Perl 5 regular expression syntax [PERLRE]) as follows:

integer  =  /-?([1-9][0-9]*|0[Xx][0-9A-Fa-f]+|0[0-7]*)/
float  =  /-?(([0-9]+\.[0-9]*|[0-9]*\.[0-9]+)([Ee][+-]?[0-9]+)?|[0-9]+[Ee][+-]?[0-9]+)/
identifier  =  /_?[A-Za-z][0-9A-Z_a-z-]*/
string  =  /"[^"]*"/
whitespace  =  /[\t\n\r ]+/
comment  =  /\/\/.*|\/\*(.|\n)*?\*\//
other  =  /[^\t\n\r 0-9A-Za-z]/
The tokenizer operates on a sequence of Unicode characters [UNICODE].
When tokenizing, the longest possible match must be used.
For example, if the input text is “a1”, it is tokenized as a single identifier, and not as a separate identifier and integer.
If the longest possible match could match one of the above named terminal symbols or one of the quoted terminal symbols from the grammar, it must be tokenized as the quoted terminal symbol.
Thus, the input text “long” is tokenized as the quoted terminal symbol "long" rather than an identifier called “long”, and “.” is tokenized as the quoted terminal symbol "." rather than an other.

The IDL syntax is case sensitive, both for the quoted terminal symbols used in the grammar and the values used for identifier terminals.
Thus, for example, the input text “Const” is tokenized as an identifier rather than the quoted terminal symbol "const", an interface with identifier “A” is distinct from one named “a”, and an extended attribute [constructor] will not be recognized as the [Constructor] extended attribute.

Implicitly, any number of whitespace and comment terminals are allowed between every other terminal in the input text being parsed.
Such whitespace and comment terminals are ignored while parsing.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#idl-grammar]

widlg'start_symbol:
This section defines an LL(1) grammar whose start symbol, Definitions, matches an entire IDL fragment.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#idl-grammar]

widlg:
[1] widlg'Definitions ? ExtendedAttributeList Definition Definitions
| e
[2] widlg'Definition ? CallbackOrInterface
| Partial
| Dictionary
| Enum
| Typedef
| ImplementsStatement
[3] widlg'CallbackOrInterface ? "callback" CallbackRestOrInterface
| Interface
[4] widlg'CallbackRestOrInterface ? CallbackRest
| Interface
[5] widlg'Interface ? "interface" identifier Inheritance "{" InterfaceMembers "}" ";"
[6] widlg'Partial ? "partial" PartialDefinition
[7] widlg'PartialDefinition ? PartialInterface
| PartialDictionary
[8] widlg'PartialInterface ? "interface" identifier "{" InterfaceMembers "}" ";"
[9] widlg'InterfaceMembers ? ExtendedAttributeList InterfaceMember InterfaceMembers
| e
[10] widlg'InterfaceMember ? Const
| Operation
| Serializer
| Stringifier
| StaticMember
| Iterable
| ReadOnlyMember
| ReadWriteAttribute
[11] widlg'Dictionary ? "dictionary" identifier Inheritance "{" DictionaryMembers "}" ";"
[12] widlg'DictionaryMembers ? ExtendedAttributeList DictionaryMember DictionaryMembers
| e
[13] widlg'DictionaryMember ? Required Type identifier Default ";"
[14] widlg'Required ? "required"
| e
[15] widlg'PartialDictionary ? "dictionary" identifier "{" DictionaryMembers "}" ";"
[16] widlg'Default ? "=" DefaultValue
| e
[17] widlg'DefaultValue ? ConstValue
| string
| "[" "]"
[18] widlg'Inheritance ? ":" identifier
| e
[19] widlg'Enum ? "enum" identifier "{" EnumValueList "}" ";"
[20] widlg'EnumValueList ? string EnumValueListComma
[21] widlg'EnumValueListComma ? "," EnumValueListString
| e
[22] widlg'EnumValueListString ? string EnumValueListComma
| e
[23] widlg'CallbackRest ? identifier "=" ReturnType "(" ArgumentList ")" ";"
[24] widlg'Typedef ? "typedef" Type identifier ";"
[25] widlg'ImplementsStatement ? identifier "implements" identifier ";"
[26] widlg'Const ? "const" ConstType identifier "=" ConstValue ";"
[27] widlg'ConstValue ? BooleanLiteral
| FloatLiteral
| integer
| "null"
[28] widlg'BooleanLiteral ? "true"
| "false"
[29] widlg'FloatLiteral ? float
| "-Infinity"
| "Infinity"
| "NaN"
[30] widlg'Serializer ? "serializer" SerializerRest
[31] widlg'SerializerRest ? OperationRest
| "=" SerializationPattern ";"
| ";"
[32] widlg'SerializationPattern ? "{" SerializationPatternMap "}"
| "[" SerializationPatternList "]"
| identifier
[33] widlg'SerializationPatternMap ? "getter"
| "inherit" Identifiers
| identifier Identifiers
| e
[34] widlg'SerializationPatternList ? "getter"
| identifier Identifiers
| e
[35] widlg'Stringifier ? "stringifier" StringifierRest
[36] widlg'StringifierRest ? ReadOnly AttributeRest
| ReturnType OperationRest
| ";"
[37] widlg'StaticMember ? "static" StaticMemberRest
[38] widlg'StaticMemberRest ? ReadOnly AttributeRest
| ReturnType OperationRest
[39] widlg'ReadOnlyMember ? "readonly" ReadOnlyMemberRest
[40] widlg'ReadOnlyMemberRest ? AttributeRest
[41] widlg'ReadWriteAttribute ? "inherit" ReadOnly AttributeRest
| AttributeRest
[42] widlg'AttributeRest ? "attribute" Type AttributeName ";"
[43] widlg'AttributeName ? AttributeNameKeyword
| identifier
[44] widlg'AttributeNameKeyword ? "required"
[45] widlg'Inherit ? "inherit"
| e
[46] widlg'ReadOnly ? "readonly"
| e
[47] widlg'Operation ? ReturnType OperationRest
| SpecialOperation
[48] widlg'SpecialOperation ? Special Specials ReturnType OperationRest
[49] widlg'Specials ? Special Specials
| e
[50] widlg'Special ? "getter"
| "setter"
| "deleter"
| "legacycaller"
[51] widlg'OperationRest ? OptionalIdentifier "(" ArgumentList ")" ";"
[52] widlg'OptionalIdentifier ? identifier
| e
[53] widlg'ArgumentList ? Argument Arguments
| e
[54] widlg'Arguments ? "," Argument Arguments
| e
[55] widlg'Argument ? ExtendedAttributeList OptionalOrRequiredArgument
[56] widlg'OptionalOrRequiredArgument ? "optional" Type ArgumentName Default
| Type Ellipsis ArgumentName
[57] widlg'ArgumentName ? ArgumentNameKeyword
| identifier
[58] widlg'Ellipsis ? "..."
| e
[59] widlg'Iterable ? "iterable" "<" Type OptionalType ">" ";"
[60] widlg'OptionalType ? "," Type
| e
[65] widlg'ExtendedAttributeList ? "[" ExtendedAttribute ExtendedAttributes "]"
| e
[66] widlg'ExtendedAttributes ? "," ExtendedAttribute ExtendedAttributes
| e
[67] widlg'ExtendedAttribute ? "(" ExtendedAttributeInner ")" ExtendedAttributeRest
| "[" ExtendedAttributeInner "]" ExtendedAttributeRest
| "{" ExtendedAttributeInner "}" ExtendedAttributeRest
| Other ExtendedAttributeRest
[68] widlg'ExtendedAttributeRest ? ExtendedAttribute
| e
[69] widlg'ExtendedAttributeInner ? "(" ExtendedAttributeInner ")" ExtendedAttributeInner
| "[" ExtendedAttributeInner "]" ExtendedAttributeInner
| "{" ExtendedAttributeInner "}" ExtendedAttributeInner
| OtherOrComma ExtendedAttributeInner
| e
[70] widlg'Other ? integer
| float
| identifier
| string
| other
| "-"
| "-Infinity"
| "."
| "..."
| ":"
| ";"
| "<"
| "="
| ">"
| "?"
| "ByteString"
| "DOMString"
| "Infinity"
| "NaN"
| "USVString"
| "any"
| "boolean"
| "byte"
| "double"
| "false"
| "float"
| "long"
| "null"
| "object"
| "octet"
| "or"
| "optional"
| "sequence"
| "short"
| "true"
| "unsigned"
| "void"
| ArgumentNameKeyword
| BufferRelatedType
[71] widlg'ArgumentNameKeyword ? "attribute"
| "callback"
| "const"
| "deleter"
| "dictionary"
| "enum"
| "getter"
| "implements"
| "inherit"
| "interface"
| "iterable"
| "legacycaller"
| "partial"
| "required"
| "serializer"
| "setter"
| "static"
| "stringifier"
| "typedef"
| "unrestricted"
[72] widlg'OtherOrComma ? Other
| ","
[73] widlg'Type ? SingleType
| UnionType Null
[74] widlg'SingleType ? NonAnyType
| "any"
[75] widlg'UnionType ? "(" UnionMemberType "or" UnionMemberType UnionMemberTypes ")"
[76] widlg'UnionMemberType ? NonAnyType
| UnionType Null
[77] widlg'UnionMemberTypes ? "or" UnionMemberType UnionMemberTypes
| e
[78] widlg'NonAnyType ? PrimitiveType Null
| PromiseType Null
| "ByteString" Null
| "DOMString" Null
| "USVString" Null
| identifier Null
| "sequence" "<" Type ">" Null
| "object" Null
| "Error" Null
| "DOMException" Null
| BufferRelatedType Null
[79] widlg'BufferRelatedType ? "ArrayBuffer"
| "DataView"
| "Int8Array"
| "Int16Array"
| "Int32Array"
| "Uint8Array"
| "Uint16Array"
| "Uint32Array"
| "Uint8ClampedArray"
| "Float32Array"
| "Float64Array"
[80] widlg'ConstType ? PrimitiveType Null
| identifier Null
[81] widlg'PrimitiveType ? UnsignedIntegerType
| UnrestrictedFloatType
| "boolean"
| "byte"
| "octet"
[82] widlg'UnrestrictedFloatType ? "unrestricted" FloatType
| FloatType
[83] widlg'FloatType ? "float"
| "double"
[84] widlg'UnsignedIntegerType ? "unsigned" IntegerType
| IntegerType
[85] widlg'IntegerType ? "short"
| "long" OptionalLong
[86] widlg'OptionalLong ? "long"
| e
[87] widlg'PromiseType ? "Promise" "<" ReturnType ">"
[88] widlg'Null ? "?"
| e
[89] widlg'ReturnType ? Type
| "void"
[90] widlg'IdentifierList ? identifier Identifiers
[91] widlg'Identifiers ? "," identifier Identifiers
| e
[92] widlg'ExtendedAttributeNoArgs ? identifier
[93] widlg'ExtendedAttributeArgList ? identifier "(" ArgumentList ")"
[94] widlg'ExtendedAttributeIdent ? identifier "=" identifier
[95] widlg'ExtendedAttributeIdentList ? identifier "=" "(" IdentifierList ")"
[96] widlg'ExtendedAttributeNamedArgList ? identifier "=" identifier "(" ArgumentList ")"
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#idl-grammar]

widl'code'Unit

name::
* McsEngl.widl'code'Unit@cptIt,

The tokenizer operates on a sequence of Unicode characters [UNICODE].
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#idl-grammar]

widl'code'Semantic-unit

name::
* McsEngl.widl'code'Semantic-unit@cptIt,
* McsEngl.widlsut@cptIt,
* McsEngl.widl'type@cptIt,

widl'identifier

name::
* McsEngl.widl'identifier@cptIt,

_DESCRIPTION:
Every interface, partial interface definition, dictionary, partial dictionary definition, enumeration, callback function and typedef (together called named definitions) and every constant, attribute, and dictionary member has an identifier, as do some operations. The identifier is determined by an identifier token somewhere in the declaration:
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-identifier]

SPECIFIC

widl'type,

_DESCRIPTION:
This section lists the types supported by Web IDL, the set of values corresponding to each type, and how constants of that type are represented.

The following types are known as integer types: byte, octet, short, unsigned short, long, unsigned long, long long and unsigned long long.

The following types are known as numeric types: the integer types, float, unresticted float, double and unrestricted double.

The primitive types are boolean and the numeric types.

The string types are DOMString, all enumeration types, ByteString and USVString.

The exception types are Error and DOMException.

The typed array types are Int8Array, Int16Array, Int32Array, Uint8Array, Uint16Array, Uint32Array, Uint8ClampedArray, Float32Array and Float64Array.

The buffer source types are ArrayBuffer, DataView, and the typed array types.

The object type, all interface types and the exception types are known as object types.

Every type has a type name, which is a string, not necessarily unique, that identifies the type. Each sub-section below defines what the type name is for each type.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#idl-types]

widlsut.BOOLEAN

name::
* McsEngl.widlsut.BOOLEAN@cptIt,

_DESCRIPTION:
The boolean type has two values: true and false.

boolean constant values in IDL are represented with the true and false tokens.

The type name of the boolean type is “Boolean”.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#idl-boolean]

widlsut.BUFFER-SOURCE-TYPE

name::
* McsEngl.widlsut.BUFFER-SOURCE-TYPE@cptIt,

_DESCRIPTION:
The buffer source types are ArrayBuffer, DataView, and the typed array types.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-buffer-source-type]

widlsut.DICTIONARY

name::
* McsEngl.widlsut.DICTIONARY@cptIt,
* McsEngl.widl'dictionary@cptIt,

_DESCRIPTION:
A dictionary is a definition (matching Dictionary) used to define an associative array data type with a fixed, ordered set of key–value pairs, termed dictionary members, where keys are strings and values are of a particular type specified in the definition.
dictionary identifier {
dictionary-members…
};
Dictionaries are always passed by value. In language bindings where a dictionary is represented by an object of some kind, passing a dictionary to a platform object will not result in a reference to the dictionary being kept by that object. Similarly, any dictionary returned from a platform object will be a copy and modifications made to it will not be visible to the platform object.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-dictionary]

widlsut.ENUMERATION

name::
* McsEngl.widlsut.ENUMERATION@cptIt,
* McsEngl.widl'enumeration@cptIt,

_DESCRIPTION:
An enumeration is a definition (matching Enum) used to declare a type whose valid values are a set of predefined strings. Enumerations can be used to restrict the possible DOMString values that can be assigned to an attribute or passed to an operation.

enum identifier { enumeration-values… };
The enumeration values are specified as a comma-separated list of string literals. The list of enumeration values must not include duplicates.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-enumeration]

widlsut.EXCEPTION

name::
* McsEngl.widlsut.EXCEPTION@cptIt,
* McsEngl.widl'exception@cptIt,

_DESCRIPTION:
The exception types are Error and DOMException.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-exception-type]
===
An exception is a type of object that represents an error and which can be thrown or treated as a first class value by implementations. Web IDL does not allow exceptions to be defined, but instead has a number of pre-defined exceptions that specifications can reference and throw in their definition of operations, attributes, and so on. Exceptions have an error name, a DOMString, which is the type of error the exception represents, and a message, which is an optional, user agent-defined value that provides human readable details of the error.
There are two kinds of exceptions available to be thrown from specifications.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#idl-exceptions]

widlsut.INTERFACE

name::
* McsEngl.widlsut.INTERFACE@cptIt,
* McsEngl.widl'interface@cptIt,

_DESCRIPTION:
An interface is a definition (matching Interface or "callback" Interface) that declares some state and behavior that an object implementing that interface will expose.

interface identifier {
interface-members…
};
An interface is a specification of a set of interface members (matching InterfaceMembers), which are the constants, attributes, operations and other declarations that appear between the braces in the interface declaration. Attributes describe the state that an object implementing the interface will expose, and operations describe the behaviors that can be invoked on the object. Constants declare named constant values that are exposed as a convenience to users of objects in the system.

Interfaces in Web IDL describe how objects that implement the interface behave. In bindings for object oriented languages, it is expected that an object that implements a particular IDL interface provides ways to inspect and modify the object's state and to invoke the behavior described by the interface.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-interface]

widli'identifier

name::
* McsEngl.widli'identifier@cptIt,

widli'member

name::
* McsEngl.widli'member@cptIt,

_DESCRIPTION:
An interface is a specification of a set of interface members (matching InterfaceMembers), which are the constants, attributes, operations and other declarations that appear between the braces in the interface declaration.
Attributes describe the state that an object implementing the interface will expose, and operations describe the behaviors that can be invoked on the object.
Constants declare named constant values that are exposed as a convenience to users of objects in the system.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-interface-member]

widli'member.attribute

name::
* McsEngl.widli'member.attribute@cptIt,

_DESCRIPTION:
An attribute is an interface member (matching "static" AttributeRest, "stringifier" AttributeRest, or Attribute) that is used to declare data fields with a given type and identifier whose value can be retrieved and (in some cases) changed. There are two kinds of attributes:
1. regular attributes, which are those used to declare that objects implementing the interface will have a data field member with the given identifier
attribute type identifier;
2. static attributes, which are used to declare attributes that are not associated with a particular object implementing the interface
static attribute type identifier;
If an attribute has no static keyword, then it declares a regular attribute. Otherwise, it declares a static attribute.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-attribute]

widli'member.constant

name::
* McsEngl.widli'member.constant@cptIt,

_DESCRIPTION:
A constant is a declaration (matching Const) used to bind a constant value to a name. Constants can appear on interfaces.

WARNING
Constants have in the past primarily been used to define named integer codes in the style of an enumeration. The Web platform is moving away from this design pattern in favor of the use of strings. Specification authors who wish to define constants are strongly advised to discuss this on the public-script-coord@w3.org mailing list before proceeding.
const type identifier = value;
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-constant]

widli'member.operation

name::
* McsEngl.widli'member.operation@cptIt,

_DESCRIPTION:
An operation is an interface member (matching "static" OperationRest, "stringifier" OperationRest, "serializer" OperationRest, ReturnType OperationRest or SpecialOperation) that defines a behavior that can be invoked on objects implementing the interface.
There are three kinds of operation:
1. regular operations, which are those used to declare that objects implementing the interface will have a method with the given identifier
return-type identifier(arguments…);
2. special operations, which are used to declare special behavior on objects implementing the interface, such as object indexing and stringification
special-keywords… return-type identifier(arguments…);
special-keywords… return-type (arguments…);
3. static operations, which are used to declare operations that are not associated with a particular object implementing the interface
static return-type identifier(arguments…);
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-operation]

widlsut.NUMERIC

name::
* McsEngl.widlsut.NUMERIC@cptIt,

_DESCRIPTION:
The following types are known as numeric types: the integer types, float, unresticted float, double and unrestricted double.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-numeric-type]

widlsut.INTEGER

name::
* McsEngl.widlsut.INTEGER@cptIt,

_DESCRIPTION:
The following types are known as integer types: byte, octet, short, unsigned short, long, unsigned long, long long and unsigned long long.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-integer-type]

widlsut.OBJECT

name::
* McsEngl.widlsut.OBJECT@cptIt,
* McsEngl.widl'object@cptIt,

_DESCRIPTION:
The object type, all interface types and the exception types are known as object types.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-object-type]

_DESCRIPTION:
Objects implementing interfaces
In a given implementation of a set of IDL fragments, an object can be described as being a platform object, a user object, or neither.
There are two kinds of object that are considered to be platform objects:
1. objects that implement a non-callback interface;
2. objects representing IDL DOMExceptions.
[http://heycam.github.io/webidl/#idl-objects (Second Edition) W3C Editor’s Draft 25 March 2016]

widlsut.PRIMITIVE

name::
* McsEngl.widlsut.PRIMITIVE@cptIt,

_DESCRIPTION:
The primitive types are boolean and the numeric types.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-primitive-type]

widlsut.STRING

name::
* McsEngl.widlsut.STRING@cptIt,

_DESCRIPTION:
The string types are DOMString, all enumeration types, ByteString and USVString.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-string-type]

widlsut.TYPED-ARRAY-TYPE

name::
* McsEngl.widlsut.TYPED-ARRAY-TYPE@cptIt,

_DESCRIPTION:
The typed array types are Int8Array, Int16Array, Int32Array, Uint8Array, Uint16Array, Uint32Array, Uint8ClampedArray, Float32Array and Float64Array.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-typed-array-type]

widl'code'Phrase

name::
* McsEngl.widl'code'Phrase@cptIt,

widl'code'Sentence (definition)

name::
* McsEngl.widl'code'Sentence (definition)@cptIt,

widl'definition

name::
* McsEngl.widl'definition@cptIt,

_DESCRIPTION:
The different kinds of definitions that can appear in an IDL fragment are: interfaces, partial interface definitions, dictionaries, partial dictionary definitions, typedefs and implements statements.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-definition]

_SPECIFIC:
* dictionary#linkL#
* interface#linkL#
* implements-statement#linkL#
* partial-dictionary-definition#linkL#
* partial-interface-definition#linkL#
* typedef#ql:widl'typedef#

widl'definition.NAME

name::
* McsEngl.widl'definition.NAME@cptIt,
* McsEngl.widl'name-definition@cptIt,

_DESCRIPTION:
Every interface, partial interface definition, dictionary, partial dictionary definition, enumeration, callback function and typedef (together called named definitions)
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-named-definition]

widl'implements-statement

name::
* McsEngl.widl'implements-statement@cptIt,

_DESCRIPTION:
An implements statement is a-definition#ql:widl'definition# (matching ImplementsStatement) used to declare that all objects implementing an interface A (identified by the first identifier) must additionally implement interface B (identified by the second identifier), including all other interfaces that B inherits from.
identifier-A implements identifier-B;
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-implements-statement]

widlstc.TYPEDEF

name::
* McsEngl.widlstc.TYPEDEF@cptIt,
* McsEngl.widl'typedef@cptIt,

_GENERIC:
* widl-definition#ql:widl'definition#

_DESCRIPTION:
A typedef is a definition (matching Typedef) used to declare a new name for a type.
This new name is not exposed by language bindings; it is purely used as a shorthand for referencing the type in the IDL.
typedef type identifier;
The type being given a new name is specified after the typedef keyword (matching Type), and the identifier token following the type gives the name.
The Type must not identify the same or another typedef.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-typedef]

widl'code'Fragment

name::
* McsEngl.widl'code'Fragment@cptIt,
* McsEngl.widl'IDL-fragment@cptIt,

_DESCRIPTION:
This section describes a language, Web IDL, which can be used to define interfaces for APIs in the Web platform. A specification that defines Web APIs can include one or more IDL fragments that describe the interfaces (the state and behavior that objects can exhibit) for the APIs defined by that specification. An IDL fragment is a sequence of definitions that matches the Definitions grammar symbol. The set of IDL fragments that an implementation supports is not ordered. See Appendix A. for the complete grammar and an explanation of the notation used.
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308/#dfn-idl-fragment]

widl'code'Root

name::
* McsEngl.widl'code'Root@cptIt,
* McsEngl.widl'set-of-IDL-framents@cptIt,

_DESCRIPTION:
A specification that defines Web APIs can include one or more IDL fragments that describe the interfaces (the state and behavior that objects can exhibit) for the APIs defined by that specification.
An IDL fragment is a sequence of definitions that matches the Definitions grammar symbol.
The set of IDL fragments that an implementation supports is not ordered.
[https://www.w3.org/TR/WebIDL-1/#idl]

_PART:
* IDL-fragment##

widl'Specification

name::
* McsEngl.widl'Specification@cptIt,

WebIDL Level 1
W3C Candidate Recommendation 08 March 2016
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308//]

widl.EVOLUTING

name::
* McsEngl.widl.EVOLUTING@cptIt,

{time.2016-03-08}
WebIDL Level 1
W3C Candidate Recommendation 08 March 2016
[https://www.w3.org/TR/2016/CR-WebIDL-1-20160308//]

web'Organization

name::
* McsEngl.web'Organization@cptIt,

_SPECIFIC:
* CSS-OGN##
* HTML-OGN##
* JavaScript-ogn
===
* IETF##
* W3C##
* WHATWG##

web'organization.WHATWG

name::
* McsEngl.web'organization.WHATWG@cptIt,
* McsEngl.WHATWG@cptIt,

_ADDRESS.WPG:
* http://www.whatwg.org//
* http://wiki.whatwg.org/wiki/Main_Page,
* http://www.whatwg.org/specs/web-apps/current-work/multipage//

_DESCRIPTION:
What is the WHATWG?
The Web Hypertext Application Technology Working Group (WHATWG) is a growing community of people interested in evolving the Web. It focuses primarily on the development of HTML and APIs needed for Web applications.
The WHATWG was founded by individuals of Apple, the Mozilla Foundation, and Opera Software in 2004, after a W3C workshop. Apple, Mozilla and Opera were becoming increasingly concerned about the W3C’s direction with XHTML, lack of interest in HTML and apparent disregard for the needs of real-world authors. So, in response, these organisations set out with a mission to address these concerns and the Web Hypertext Application Technology Working Group was born.
[http://wiki.whatwg.org/wiki/FAQ#What_is_the_WHATWG.3F]

web'organization.W3-CONSORTIUM

_CREATED: {2007-12-02} ?

name::
* McsEngl.web'organization.W3-CONSORTIUM@cptIt,
* McsEngl.conceptIt570,
* McsEngl.ognW3C@cptIt,
* McsEngl.w3c@cptIt570,
* McsEngl.w3-consortium@cptIt,
* McsEngl.web'W3C@cptIt,
* McsEngl.www-consortium@cptIt,
* McsEngl.www'consortium@cptIt570,

DEFINITION

The World Wide Web Consortium (W3C) is the main international standards organization for the World Wide Web (abbreviated WWW or W3). It is arranged as a consortium where member organizations maintain full-time staff for the purpose of working together in the development of standards for the W3. As of March 2007, the W3C had 441 members. It is always open for new organizations to join.

W3C also engages in education and outreach, develops software and serves as an open forum for discussion about the Web.

W3C is headed by Sir Tim Berners-Lee, creator of the first web browser and the primary author of the original URL (Uniform Resource Locator), HTTP (HyperText Transfer Protocol) and HTML (HyperText Markup Language) specifications, the principal technologies that form the basis of the World Wide Web.
[http://en.wikipedia.org/wiki/World_Wide_Web_Consortium]

The World Wide Web Consortium (W3C) is an international community where Member organizations, a full-time staff, and the public work together to develop Web standards. Led by Web inventor Tim Berners-Lee and CEO Jeffrey Jaffe, W3C's mission is to lead the Web to its full potential. Contact W3C for more information.
[http://www.w3.org/Consortium/]

The World Wide Web is the universe of network-accessible information. The World Wide Web Consortium exists to realize the full potential of the Web.
W3C works with the global community to produce specifications and reference software. W3C is funded by industrial members but its products are freely available to all. The Consortium is run by MIT LCS and by INRIA, in collaboration with CERN where the web originated.
[WWW, ]

ognW3c'GENERIC

_GENERIC:
* Infotech_association#ql:[Level CONCEPT:rl? conceptIt969]##cptIt969#

ognW3c'Address#cptCore925.15#

name::
* McsEngl.ognW3c'Address@cptIt,

ognW3c'Browsers-and-authoring-tools

name::
* McsEngl.ognW3c'Browsers-and-authoring-tools@cptIt,

_GENERIC:
* w3c-standard#ql:w3c'standard#

_DESCRIPTION:
Web agents are intended to serve users. In this section you will find information useful when designing browsers and authoring tools, as well as search engine bots, aggregators, and inference engines.
[http://www.w3.org/standards//]

ognW3c'group

name::
* McsEngl.ognW3c'group@cptIt,
* McsEngl.w3c'group@cptIt,

_DESCRIPTION:
A variety of W3C groups enable W3C to pursue its mission through the creation of Web standards, guidelines, and supporting materials. Community and Business Groups offer more ways for innovators to bring work to W3C.
[https://www.w3.org/Consortium/activities]

_SPECIFIC:
* permanent
* permanentNo
===
* past-group
* present-group
===
* interest-group
* working-group

Advisory-Board (TAG)

name::
* McsEngl.w3c'AB@cptIt,
* McsEngl.w3c'Advisory-Board@cptIt,

_DESCRIPTION:
Advisory Board (AB)
The Advisory Board provides ongoing guidance to the Team on issues of strategy, management, legal matters, process, and conflict resolution.
The Advisory Board also serves the Members by tracking issues raised between Advisory Committee meetings, soliciting Member comments on such issues, and proposing actions to resolve these issues.
The Advisory Board manages the evolution of the Process Document.
AB Participants are elected by the W3C Members.
[https://www.w3.org/Consortium/activities]

Community and Business Groups

Community and Business Groups
W3C has created Community and Business Groups to meet the needs of a growing community of Web stakeholders. Community Groups enable anyone to socialize their ideas for the Web at the W3C for possible future standardization. Business Groups provide companies anywhere in the world with access to the expertise and community needed to develop open Web technology. New W3C Working Groups can then build mature Web standards on top of best of the experimental work, and businesses and other organizations can make the most out of W3C's Open Web Platform in their domain of interest.
[https://www.w3.org/Consortium/activities]

Technical Architecture Group (TAG)

name::
* McsEngl.w3c'TAG@cptIt,
* McsEngl.w3c'Technical-Architecture-Group@cptIt,

_DESCRIPTION:
W3C created the TAG to document and build consensus around principles of Web architecture and to interpret and clarify these principles when necessary.
The TAG also helps to resolve issues involving general Web architecture brought to the TAG, and helps coordinate cross-technology architecture developments inside and outside W3C.
Some TAG Participants are elected by by the W3C Members, others are appointed by the W3C Director.
[https://www.w3.org/Consortium/activities]

ognW3c'group.INTEREST-GROUP

name::
* McsEngl.ognW3c'group.INTEREST-GROUP@cptIt,
* McsEngl.w3c'interest-group@cptIt,
* McsEngl.w3c'ig@cptIt,
* McsEngl.w3cig@cptIt,

_DESCRIPTION:
The primary goal of an Interest Group is to bring together people who wish to evaluate potential Web technologies and policies. An Interest Group is a forum for the exchange of ideas.
[https://www.w3.org/Consortium/activities]

_SPECIFIC:
* w3cig.Digital_Publishing
* w3cig.HTML5_Chinese
* w3cig.Internationalization
* w3cig.Internationalization_Tag_Set (ITS)
* w3cig.Patents_and_Standards
* w3cig.Privacy
* w3cig.Semantic_Web_Health_Care_and_Life_Sciences
* w3cig.Semantic_Web
* w3cig.Social
* w3cig.WAI
* w3cig.Web_and_TV
* w3cig.Web_of_Things
* w3cig.Web_Payments
* w3cig.Web_Security

ognW3c'group.WORKING-GROUP

name::
* McsEngl.ognW3c'group.WORKING-GROUP@cptIt,
* McsEngl.w3c'working-group@cptIt,
* McsEngl.w3c'wg@cptIt,
* McsEngl.w3cwg@cptIt,

_DESCRIPTION:
Working Groups typically produce deliverables (e.g., standards track technical reports, software, test suites, and reviews of the deliverables of other groups).
[https://www.w3.org/Consortium/activities]

_SPECIFIC:
* w3cwg.Accessible_Platform_Architectures
* w3cwg.Accessible_Rich_Internet_Applications
* w3cwg.Audio
* w3cwg.Automotive
* w3cwg.Browser_Testing_and_Tools
* w3cwg.Cascading_Style_Sheets (CSS)
* w3cwg.Data_on_the_Web_Best_Practices
* w3cwg.Device_APIs
* w3cwg.Education_and_Outreach
* w3cwg.Efficient_XML_Interchange
* w3cwg.Evaluation_and_Repair_Tools
* w3cwg.Geolocation
* w3cwg.HTML_Media_Extensions
* w3cwg.Internationalization
* w3cwg.Math
* w3cwg.Multimodal_Interaction
* w3cwg.Permissions_and_Obligations_Expression
* w3cwg.Pointer_Events
* w3cwg.RDF_Data_Shapes
* w3cwg.Second_Screen_Presentation
* w3cwg.Social_Web
* w3cwg.Spatial_Data_on_the_Web
* w3cwg.SVG
* w3cwg.Timed_Text
* w3cwg.Tracking_Protection
* w3cwg.Web_Annotation
* w3cwg.Web_Application_Security
* w3cwg.Web_Authentication
* w3cwg.Web_Content_Accessibility_Guidelines
* w3cwg.Web_Cryptography
* w3cwg.Web_Payments
* w3cwg.Web_Performance
* w3cwg.Web_Platform
* w3cwg.Web_Real_Time_Communications
* w3cwg.WebFonts
* w3cwg.XML_Core
* w3cwg.XML_Processing_Model
* w3cwg.XML_Query
* w3cwg.XML_Security
* w3cwg.XSLT

w3cwg.WEBAPPS

name::
* McsEngl.w3cwg.WEBAPPS@cptIt,
* McsEngl.WebApps-WG@cptIt,

WEB APPLICATIONS (WEBAPPS) WORKING GROUP
The W3C Web Applications (WebApps) Working Group is chartered to develop specifications for webapps, including standard APIs for client-side development, and a packaging format for installable webapps. This work will include both documenting existing APIs such as XMLHttpRequest and developing new APIs in order to enable richer web applications.
This group works in public, with details in the WG's Work Mode document and the WG's Wiki.
A detailed list of this group's publications and their status (available in one of the W3C's CVS or Mercurial systems.)
The W3C Team Contact for the WebApps Working Group is Yves Lafon. The Co-Chairs of the Working Group are Art Barstow and Charles McCathieNevile.
Upcoming Meetings
April 2013
The WebApps WG will have a face-to-face meeting in San Jose (CA, USA) on Thursday April 25 and Friday April 26 2013.
[http://www.w3.org/2008/webapps/]

ognW3c'human

name::
* McsEngl.ognW3c'human@cptIt,

Jacobs.Ian

name::
* McsEngl.Jacobs.Ian@cptIt,

_DESCRIPTION:
In September 2004, Ian became Head of W3C Communications. He manages the Consortium's Comm activities, including press, publications, branding, marketing, and some member relations.
Ian began at W3C in 1997. Since then he has co-edited a number of specifications, including HTML 4.0, CSS2, DOM Level 1, three WAI Guidelines (Web Content, User Agent, Authoring Tool), the TAG's Architecture of the World Wide Web, and the W3C Process Document.
Ian Jacobs studied computer science in France after college (Yale), and worked at INRIA for five years.
[http://www.w3.org/People/]
===
I am Head of W3C Marketing and Communications. The most reliable way to reach me is <ij@w3.org>.
Current Activities
Marketing and Communications
Development of W3C Community Groups
Patent Policy Implementation
[http://www.w3.org/People/Jacobs/]

_ADDRESS:
Ian Jacobs <ij@w3.org> http://www.w3.org/People/Jacobs
Tel: +1 718 260 9447

ognW3c'Member

name::
* McsEngl.ognW3c'Member@cptIt,

ALCATEL NV
AT&T
Adobe Systems Incorporated
Apple Computer, Inc.
Aιrospatiale
AGF Group
Alis Technologies, Inc America Online American Internet Corporation Architecture Projects Management Ltd. Belgacom Bellcore British Telecommunications Laboratories Bull S.A. CEA (Commissariat ΰ l'Energie Atomique) CMG Information Systems CWI (Centre for Mathematics and Computer Science) CIRAD Cap Gemini Sogeti Compuserve CyberCash Cygnus Support Dassault Aviation Data Research Associates, Inc. Delphi Internet Deutsche Telekom Digital Equipment Corporation EEIG/ERCIM (European Research Consortium for Informatics and Mathematics) ENEL ENSIMAG ETNOTEAM Eastman Kodak Company Electricitι de France Electronic Book Technologies Enterprise Integration Technologies
FORTH (Foundation for Research and Technology - Hellas) / ICS (Institute of Computer Science)
FTP Software, Inc.
First Floor, Inc.
First Virtual Holding
Folio Corporation
France Telecom
Fujitsu Ltd.
GC Tech S.A.
GMD
GRIF, S.A.
General Magic, Inc.
Groupe ESC Grenoble
Grenoble Network Initiative
HAVAS Harlequin Incorporated Hewlett Packard Hitachi, Ltd. Hummingbird Communications Ltd.
IBM ILOG, S.A. INRETS Iberdrola Incontext Corporation Industrial Technology Research Institute Infopartners S.A. Institut Franco-Russe A.M. Liapunov d'informatique et de mathematiques appliques Internet Profiles Corporation Joint Information Systems Committee Justsystem Corporation Kumamoto Institute of Computer Software, Inc. Los Alamos National Laboratory Lotus Development Corporation Metrowerks Corporation MCI Telecommunications The MITRE Corporation Matra Hachette Michelin Microsoft Corporation Mitsubishi Electric Corporation MTA SZTAKI NCSA / Univ. of Illinois NEC Corporation NTT Data Communications NYNEX Science & Technology National HPCC Software Exchange The NetMarket Company Netscape Communications Corp. Network Computing Devices NeXT Computer Inc. Nippon Telegraph and Telephone Corporation (NTT) Nokia Novell, Inc. O2 Technology Object Management Group, Inc. (OMG) Omron Corporation Open Market Open Software Foundation Research Institute Oracle Corporation O'Reilly & Associates, Inc. PIPEX Public IP Exchange Ltd Pacifitech Corporation PointCast Incorporated Process Software Corp. Prodigy Services Company Reed-Elsevier R.I.S. Technologies The Royal Hong Kong Jockey Club Council for the Central Laboratory of the Research Councils (Rutherford Appleton Laboratory) SICS (Swedish Institute of Computer Science) SISU (Swedish Institute for Systems Development) STET SURFnet bv Sema Group Siemens Nixdorf Silicon Graphics, Inc. Sligos Softquad Software 2000 Sony Corporation Spry, Inc. Spyglass Inc. Sun Microsystems Tandem Computers Inc. Teknema, Inc. Telequip Corporation Terisa Systems Thomson-CSF UKERNA (United Kingdom Research and Education Networking Association) U.S. Web Corporation Verity Inc. Vermeer Technologies VTT Information Technology WWW - KR Wolfram Research, Inc. The Wollongong Group

ognW3c'Process-Document

name::
* McsEngl.ognW3c'Process-Document@cptIt,

_ADDRESS.WPG:
* http://www.w3.org/Consortium/Process//

_DESCRIPTION:
World Wide Web Consortium Process Document
1 September 2015
The mission of the World Wide Web Consortium (W3C) is to lead the World Wide Web to its full potential by developing common protocols that promote its evolution and ensure its interoperability. The W3C Process Document describes the organizational structure of the W3C and the processes related to the responsibilities and functions they exercise to enable W3C to accomplish its mission. This document does not describe the internal workings of the Team or W3C's public communication mechanisms.
[https://www.w3.org/2015/Process-20150901/]

ognW3c'Semantic-web

name::
* McsEngl.ognW3c'Semantic-web@cptIt,

_GENERIC:
* w3c-standard#ql:w3c'standard#

_DESCRIPTION:
In addition to the classic “Web of documents” W3C is helping to build a technology stack to support a “Web of data”, the sort of data you find in databases. The ultimate goal of the Web of data is to enable computers to do more useful work and to develop systems that can support trusted interactions over the network. The term “Semantic Web” refers to W3C’s vision of the Web of linked data. Semantic Web technologies enable people to create data stores on the Web, build vocabularies, and write rules for handling data. Linked data are empowered by technologies such as RDF, SPARQL, OWL, and SKOS.
[http://www.w3.org/standards/semanticweb//]

ognW3c'Ontology

name::
* McsEngl.ognW3c'Ontology@cptIt,
* McsEngl.ontology-w3c@cptIt,
* McsEngl.vocabulary-w3c@cptIt,
* McsEngl.w3c'vocabulary@cptIt,

What is a Vocabulary?
On the Semantic Web, vocabularies define the concepts and relationships (also referred to as “terms”) used to describe and represent an area of concern. Vocabularies are used to classify the terms that can be used in a particular application, characterize possible relationships, and define possible constraints on using those terms. In practice, vocabularies can be very complex (with several thousands of terms) or very simple (describing one or two concepts only).
There is no clear division between what is referred to as “vocabularies” and “ontologies”. The trend is to use the word “ontology” for more complex, and possibly quite formal collection of terms, whereas “vocabulary” is used when such strict formalism is not necessarily used or only in a very loose sense. Vocabularies are the basic building blocks for inference techniques on the Semantic Web.
[http://www.w3.org/standards/semanticweb/ontology]

ognW3c'ResourceInfHmnn#cptResource843#

name::
* McsEngl.ognW3c'ResourceInfHmnn@cptIt,

_ADDRESS.WPG:
* http://www.w3.org//
* http://lists.w3.org//

ognW3c'Specification (TR)

name::
* McsEngl.ognW3c'Specification (TR)@cptIt,
* McsEngl.ognW3c'Standard@cptIt,
* McsEngl.ognW3c'Technical-report@cptIt,
* McsEngl.standard.w3c@cptIt,
* McsEngl.w3c'specification@cptIt,
* McsEngl.w3c'standard@cptIt,
* McsEngl.w3c'technical-report@cptIt,

* McsEngl.w3cspc@cptIt, {2016-06-12}
* McsEngl.w3ctr@cptIt, {2016-03-27}

_GENERIC:
* infotech-standard#ql:standard@cptCore331.9#

_DESCRIPTION:
W3C standards define an Open Web Platform for application development that has the unprecedented potential to enable developers to build rich interactive experiences, powered by vast data stores, that are available on any device. Although the boundaries of the platform continue to evolve, industry leaders speak nearly in unison about how HTML5 will be the cornerstone for this platform. But the full strength of the platform relies on many more technologies that W3C and its partners are creating, including CSS, SVG, WOFF, the Semantic Web stack, XML, and a variety of APIs.
W3C develops these technical specifications and guidelines through a process designed to maximize consensus about the content of a technical report, to ensure high technical and editorial quality, and to earn endorsement by W3C and the broader community.
[http://www.w3.org/standards/]

_SPECIFIC: Alphabetically:

_SPECIFIC_DIVISION.Status:
* Web Standards (Recommendations)
* Proposed Recommendations
* Proposed Edited Recommendations
* Candidate Recommendations
* Last Call Working Drafts
* Working Drafts
* Group Notes
* Retired

w3cspc'resource

name::
* McsEngl.w3cspc'resource@cptIt,

_ADDRESS.WPG:
* {2019-03-04} https://www.zdnet.com/article/w3c-finalizes-web-authentication-webauthn-standard/,
* http://www.w3.org/2005/10/Process-20051014/tr,

SPECIFIC

* w3ctr.specific,

_ADDRESS.WPG:
* https://www.w3.org/TR//

_SPECIFIC:
* RECOMMENDATION
* PROPOSED_RECOMMENDATION
* PROPOSED_EDITED_RECOMMENDATION
* CANDIDATE_RECOMMENDATION
* WORKING_DRAFT
* GROUP_NOTE
===
* WD  Working Draft
* LC  Last Call
* CR  Candidate Recommendation
* PR  Proposed Recommendation
* REC  Recommendation
[https://www.w3.org/Style/CSS/current-work]

_SPECIFIC:
* w3cspc.Accessibility (All)
* w3cspc.Accessible_Rich_Internet_Applications (WAI-ARIA)
* w3cspc.Audio
* w3cspc.Authoring_Tool_Accessibility_Guidelines (ATAG)
* w3cspc.Automotive
* w3cspc.Best_Practices_for_Authoring_HTML
* w3cspc.CC/PP
* w3cspc.Content_Transformation
* w3cspc.CSS
* w3cspc.CSS_Mobile
* w3cspc.CSV_on_the_Web
* w3cspc.Data_on_the_Web
* w3cspc.DCCI
* w3cspc.Declarative_Web_Applications
* w3cspc.Device_Description_Repository
* w3cspc.Device_Independence_Authoring
* w3cspc.Digital_Publishing
* w3cspc.DOM
* w3cspc.DOM_events
* w3cspc.Efficient_XML_Interchange
* w3cspc.eGovernment
* w3cspc.Electronic_Commerce
* w3cspc.Evaluation_and_Report_Language (EARL)
* w3cspc.Geospatial
* w3cspc.Government_Linked_Data
* w3cspc.Graphics
* w3cspc.GRDDL
* w3cspc.Health_Care_and_Life_Sciences (Semantic_Web)
* w3cspc.HTML
* w3cspc.HTML_for_User_Agents
* w3cspc.HTTP
* w3cspc.IndieUI
* w3cspc.InkML
* w3cspc.Internationalization (All)
* w3cspc.Internationalization_of_Web_Architecture
* w3cspc.Internationalization_of_Web_Design_and_Applications
* w3cspc.Internationalization_of_Web_Services
* w3cspc.Internationalization_of_XML
* w3cspc.Javascript_APIs
* w3cspc.Linked_Data
* w3cspc.MathML
* w3cspc.Media_Access
* w3cspc.Mobile_Accessibility
* w3cspc.Mobile_Web_Applications
* w3cspc.Mobile_Web_Authoring
* w3cspc.Mobile_Web_for_Social_Development
* w3cspc.Multimodal_Web_Applications
* w3cspc.OWL_Web_Ontology_Language
* w3cspc.P3P
* w3cspc.PICS
* w3cspc.Plugins
* w3cspc.PNG
* w3cspc.POWDER
* w3cspc.Privacy
* w3cspc.Provenance
* w3cspc.Quality_Assurance_(QA) Framework
* w3cspc.RDB2RDF
* w3cspc.RDF
* w3cspc.RDF_Best_Practices
* w3cspc.RDF_Relationship_to_Other_Formats
* w3cspc.RDF_vocabularies
* w3cspc.RDFa
* w3cspc.RIF_Rule_Interchange_Format
* w3cspc.Security_for_User_Agents
* w3cspc.Security_for_Web_Applications
* w3cspc.Semantic_Annotation_for_WSDL_and_XML_Schema
* w3cspc.Service_Modeling_Language (SML)
* w3cspc.SHACL
* w3cspc.SKOS
* w3cspc.SMIL
* w3cspc.SOAP
* w3cspc.Social_Web
* w3cspc.SPARQL
* w3cspc.Stylesheets_in_XML
* w3cspc.SVG
* w3cspc.SVG_Tiny
* w3cspc.Timed_Text
* w3cspc.URI
* w3cspc.User_Agent_Accessibility_Guidelines (UAAG)
* w3cspc.Voice
* w3cspc.Web_and_TV
* w3cspc.Web_Applications_Manifest_Formats
* w3cspc.Web_Architecture
* w3cspc.Web_Components
* w3cspc.Web_Content_Accessibility_Guidelines (WCAG)
* w3cspc.Web_Fonts
* w3cspc.Web_IDL#linkL#
* w3cspc.Web_Payments
* w3cspc.Web_Performance
* w3cspc.Web_Real_Time_Communication
* w3cspc.Web_Services_Addressing
* w3cspc.Web_Services_Architecture
* w3cspc.Web_Services_Choreography
* w3cspc.Web_Services_Policy
* w3cspc.Web_Services_Resource_Access
* w3cspc.WebCGM
* w3cspc.WICD
* w3cspc.Widgets
* w3cspc.WSDL
* w3cspc.XBL
* w3cspc.XForms
* w3cspc.XHTML_2
* w3cspc.XHTML_For_Mobile
* w3cspc.XHTML_Modularization
* w3cspc.XInclude
* w3cspc.XKMS
* w3cspc.XLink
* w3cspc.XML
* w3cspc.XML_Base
* w3cspc.XML_Canonicalization
* w3cspc.XML_Design_Techniques
* w3cspc.XML_Encryption
* w3cspc.XML_Events
* w3cspc.XML_Fragments
* w3cspc.XML_Pipeline_(XProc)
* w3cspc.XML_Relationship_to_other_formats
* w3cspc.XML_Schema
* w3cspc.XML_Signature
* w3cspc.XML-binary_Optimized_Packaging
* w3cspc.xml:id
* w3cspc.XPath
* w3cspc.XPointer
* w3cspc.XQuery
* w3cspc.XSL-FO
* w3cspc.XSLT
[https://www.w3.org/TR/]

w3cspc.Recommendation (REC)

name::
* McsEngl.w3cspc.Recommendation (REC)@cptIt,
* McsEngl.w3cspc.REC@cptIt,
* McsEngl.recommendation'of'w3c@cptIt570i,
* McsEngl.w3c'recommendation@cptIt570i,
* McsEngl.w3c'web-standard@cptIt570i,
* McsEngl.w3c'rec@cptIt,

_DEFINITION:
* A W3C Recommendation is the final stage of a ratification process of the World Wide Web Consortium (W3C) working group concerning the standard. It is the equivalent of a published standard in many other industries.
[http://en.wikipedia.org/wiki/W3C_recommendation]
===
* A W3C Recommendation is a specification or set of guidelines that, after extensive consensus-building, has received the endorsement of W3C Members and the Director. W3C recommends the wide deployment of its Recommendations.
Note: W3C Recommendations are similar to the standards published by other organizations.
[http://www.w3.org/TR//]

_SPECIFIC:

w3cspc.Proposed-Recommendation (PR)

name::
* McsEngl.w3cspc.Proposed-Recommendation (PR)@cptIt,
* McsEngl.w3cspc.PR@cptIt,
* McsEngl.proposed-recommendation-of-w3c@cptIt,

_DESCRIPTION:
To exit CR and enter this stage, the specification needs a comprehensive test suite and implementation reports proving that every feature is interoperably implemented in at least two shipping implementations. W3C Members are asked to review the specification one last time.
[https://www.w3.org/Style/2011/CSS-process]

w3cspc.Proposed-Edited-Recommendation

name::
* McsEngl.w3cspc.Proposed-Edited-Recommendation@cptIt,

w3cspc.Candidate-recommendation (CR)

name::
* McsEngl.w3cspc.Candidate-recommendation (CR)@cptIt,
* McsEngl.w3cspc.CR@cptIt,
* McsEngl.candidate-recommendation-of-w3c@cptIt1016,

_DEFINITION:
A Candidate Recommendation is a document that W3C believes has been widely reviewed and satisfies the Working Group's technical requirements.
W3C publishes a Candidate Recommendation to gather implementation experience.
[http://www.w3.org/TR/#CR]
===
By publishing a Candidate Recommendation, a working group is expressing that it has resolved all known issues. A CR is also a call for implementations.
[https://www.w3.org/Style/2011/CSS-process]

w3cspc.Last-Call-Working-draft (LC|LCWD)

name::
* McsEngl.w3cspc.Last-Call-Working-draft (LC|LCWD)@cptIt,
* McsEngl.w3csp.LC@cptIt,
* McsEngl.w3csp.LCWD@cptIt,
* McsEngl.last-working-draft-w3c@cptIt570i,
* McsEngl.w3c'Last-working-draft@cptIt570i,

_DESCRIPTION:
Last Call Working Draft (LC or LCWD)
By publishing a Last Call Working Draft, a working group is expressing that it considers the specification to be complete and all issues to be resolved. Publishing a Last Call Working Draft announces that this specification will move toward Candidate Recommendation unless significant issues are brought up. The Last Call period is a last chance for others to submit issues before the transition to CR.
[https://www.w3.org/Style/2011/CSS-process]

w3cspc.Working-draft (WD)

name::
* McsEngl.w3cspc.Working-draft (WD)@cptIt,
* McsEngl.w3cspc.WD@cptIt,
* McsEngl.working-draft-w3c@cptIt570i,

_DEFINITION:
A Working Draft is a document that W3C has published for review by the community, including W3C Members, the public, and other technical organizations. These are draft documents and may be updated, replaced or obsoleted by other documents at any time.
[http://www.w3.org/TR/]
===
It is inappropriate to use W3C Working Drafts as reference material or to cite them as other than "work in progress". A list of current W3C working drafts can be found at: http://www.w3.org/pub/WWW/TR
===
Note: since working drafts are subject to frequent change, you are advised to reference the above address, rather than the addresses of working drafts themselves.

w3cspc.Group-note

name::
* McsEngl.w3cspc.Group-note@cptIt,
* McsEngl.group-note-w3c@cptIt570i,
* McsEngl.w3c'Group-note@cptIt570i,

w3cspc.Retired

name::
* McsEngl.w3cspc.Retired@cptIt,
* McsEngl.w3c'Retired-standard@cptIt570i,

w3cspc.Versioning

name::
* McsEngl.w3cspc.Versioning@cptIt,

Each W3C Technical Report has two URIs associated with it, located at the beginning of the document:

1. A "this version" URI, which identifies the specific document. W3C will make every effort to make a given document indefinitely available, in its original form, at its "this version" URI. W3C may correct broken markup and broken links in place (per the in-place modification policy) but otherwise will make every effort not to change content after publication of a document.
2. A "latest version" URI, which identifies the most recently published draft in a document series. By document series we mean, for example, "all the drafts of the XML Schema 1.0 specification from First Public Working Draft to Recommendation."

We encourage you to consider carefully which of the two identifiers to use when referring to a W3C Technical Report. If you mean to refer to a particular document or passage "forever," please use the "this version" URI. If you need to refer to "whatever is the most up-to-date version", please use the "latest version" URI.
[http://www.w3.org/TR/]

ognW3c'XML-technology

name::
* McsEngl.ognW3c'XML-technology@cptIt,

_GENERIC:
* w3c-standard#ql:w3c'standard#

_DESCRIPTION:
XML Technologies including XML, XQuery, XML Schema, XSLT, XSL-FO, Efficient XML Interchange (EXI), and other related standards.
[http://www.w3.org/standards//]

ognW3c'Web-architecture

name::
* McsEngl.ognW3c'Web-architecture@cptIt,

_GENERIC:
* w3c-standard#ql:w3c'standard#

_DESCRIPTION:
Web Architecture focuses on the foundation technologies and principles which sustain the Web, including URIs and HTTP.
[http://www.w3.org/standards/webarch/]

ognW3c'Web-design-and-applications

name::
* McsEngl.ognW3c'Web-design-and-applications@cptIt,

_GENERIC:
* w3c-standard#ql:w3c'standard#

_DESCRIPTION:
Web Design and Applications involve the standards for building and rendering Web pages, including HTML5, CSS, SVG, Ajax, and other technologies for Web Applications (“WebApps”). This section also includes information on how make pages accessible to people with disabilities (WCAG), internationalized, and work on mobile devices.
[http://www.w3.org/standards//]

ognW3c'Web-of-devices

name::
* McsEngl.ognW3c'Web-of-devices@cptIt,

_GENERIC:
* w3c-standard#ql:w3c'standard#

_DESCRIPTION:
W3C is focusing on technologies to enable Web access anywhere, anytime, using any device. This includes Web access from mobile phones and other mobile devices as well as use of Web technology in consumer electronics, printers, interactive television, and even automobiles.
[http://www.w3.org/standards//]

ognW3c'Web-of-services

name::
* McsEngl.ognW3c'Web-of-services@cptIt,

_GENERIC:
* w3c-standard#ql:w3c'standard#

_DESCRIPTION:
Web of Services refers to message-based design frequently found on the Web and in enterprise software. The Web of Services is based on technologies such as HTTP, XML, SOAP, WSDL, SPARQL, and others.
[http://www.w3.org/standards//]

ognW3c'Web-IDL#ql:web-idl#

name::
* McsEngl.ognW3c'Web-IDL@cptIt,

ognW3c'EVOLUTING#cptCore546.171#

name::
* McsEngl.ognW3c'EVOLUTING@cptIt,

{time.1994}:
The W3C is a vendor-neutral international industry consortium founded in 1994 to develop common protocol specifications for the evolving World Wide Web.
[Khare-Fiffin 1997jul31]

web'Program (pwb)

_CREATED: {2010-09-28}

name::
* McsEngl.web'Program (pwb)@cptIt,

DEFINITION

ProgramWeb is a network-program that uses the http-protocol of the www.
[hmnSngo.2011-12-11]

A web application is an application
- that is accessed over a network such as the Internet or an intranet.
- The term may also mean a computer software application that is hosted in a browser-controlled environment (e.g. a Java applet)[citation needed]
- or coded in a browser-supported language (such as JavaScript, combined with a browser-rendered markup language like HTML) and reliant on a common web browser to render the application executable.
[http://en.wikipedia.org/wiki/Web_application]

pwb'WHOLE

_WHOLE:
* web-application#cptIt580.1#

pwb'bandwidth

name::
* McsEngl.pwb'bandwidth@cptIt,

_DESCRIPTION:
bandwidth efficiency.

pwb'cloud-computing#ql:cloud-computing@cptIt421.1#

name::
* McsEngl.pwb'cloud-computing@cptIt,

pwb'computer-langauge#cptIt204#

name::
* McsEngl.pwb'computer-langauge@cptIt,

pwb'css#cptIt576#

name::
* McsEngl.pwb'css@cptIt,

pwb'html#cptIt568#

name::
* McsEngl.pwb'html@cptIt,

pwb'js#cptIt554#

name::
* McsEngl.pwb'js@cptIt,

pwb'content-delivery-network

name::
* McsEngl.pwb'content-delivery-network@cptIt,
* McsEngl.CDN@cptIt580i,
* McsEngl.content-delivery-network@cptIt,
* McsEngl.content-distribution-network@cptIt,

_DESCRIPTION:
A content delivery network or content distribution network (CDN) is a system of computers containing copies of data placed at various nodes of a network. When properly designed and implemented, a CDN can improve access to the data it caches by increasing access bandwidth and redundancy and reducing access latency. Data content types often cached in CDNs include web objects, downloadable objects (media files, software, documents), applications, live streaming media, and database queries.
[http://en.wikipedia.org/wiki/Content_delivery_network]

cdn.BootstrapCDN

name::
* McsEngl.cdn.BootstrapCDN@cptIt,

_DESCRIPTION:
BootstrapCDN is a free and public content delivery network. Users of BootstrapCDN can load CSS, JavaScript and images remotely, from its servers. Bootstrap uses NetDNA's global content delivery network, which makes websites using its service resilient to unexpected surges in web traffic.
[http://en.wikipedia.org/wiki/BootstrapCDN]

cdn.CacheFly

name::
* McsEngl.cdn.CacheFly@cptIt,
* McsEngl.CacheFly@cptIt,

_DESCRIPTION:
CacheFly is the world’s fastest Content Delivery Network (CDN), delivering rich-media content up to 10x faster than traditional delivery methods.

A leader in CDN technology, CacheFly holds a track record for high-performing, ultra-reliable content delivery for over a decade - longer than nearly every other CDN on the scene. We pioneered the use of TCP anycast in 2002, an innovation that upstart CDNs continue to build upon. With more than 2,000 clients in over 80 countries, organizations consistently choose CacheFly for scalability, reliability and unbeatable performance.

Company History
CacheFly began as Downloadhosting.com in 1999 as a response to the need for high quality, reliable file distribution for small software developers. Initially advertiser supported, popularity with larger developers resulted in the addition of a pay-per-use system to the business model providing ad-free downloads. Working off the success of the Downloadhosting.com platform, CacheNetworks was launched in 2002 to provide a worldwide footprint for customers.

CacheNetworks worked closely with select customers and pioneered the use of TCP Anycast - creating the worlds first TCP Anycast based content delivery network. Thorough research and development with users paid off, resulting in unsurpassed reliability and performance worldwide. After years of comprehensive testing and development, the CacheFly service was launched in March of 2005 to bring a new generation of customers access to the best in content delivery.

CacheFly's anycast technology delivers customer content from the internet's major peering locations, providing customers with a significant performance increase. CacheFly provides users with an abundance of unique features and options, including our 100% service level agreement, real-time traffic reporting, and instantaneous setup. CacheFly leverages its extensive research in technology and infrastructure to deliver scalable content delivery at a cost-effective price.

Today, CacheFly has delivered content for over 2000 clients, based in over 80 countries around the globe. Ranging from Fortune 100 companies down to single person operations, the CacheFly content delivery network gives customers on-demand capacity, unsurpassed performance and a predictable cost model.

CacheFly enables companies to rapidly expand without adding infrastructure while simultaneously increasing performance and reducing costs. Improve performance in your rich media content with the world’s fastest CDN.
[http://www.cachefly.com/about.html]

cdn.FREE

name::
* McsEngl.cdn.FREE@cptIt,

_SPECIFIC:
* BootstrapCDN
* CloudFlare
* Coral Content Distribution Network
* Incapsula

cdn.CloudFlare

name::
* McsEngl.cdn.CloudFlare@cptIt,

_DESCRIPTION:
CloudFlare is a content delivery network and distributed domain name server service marketed as improving website performance and speed and providing security.
[http://en.wikipedia.org/wiki/CloudFlare]

cdn.Coral-Content-Distribution-Network

name::
* McsEngl.cdn.Coral-Content-Distribution-Network@cptIt,

_DESCRIPTION:
Our Goal
Are you tired of clicking on some link from a web portal, only to find that the website is temporarily off-line because thousands or millions of other users are also trying to access it? Does your network have a really low-bandwidth connection, such that everyone, even accessing the same web pages, suffers from slow downloads? Have you ever run a website, only to find that suddenly you get hit with a spike of thousands of requests, overloading your server and possibly causing high monthly bills? If so, CoralCDN might be your free solution for these problems!
Using CoralCDN
Taking advantage of CoralCDN is simple. Just append
.nyud.net
to the hostname of any URL, and your request for that URL is handled by CoralCDN!
[http://www.coralcdn.org/]
===
The Coral Content Distribution Network, sometimes called Coral Cache or Coral, is a free peer-to-peer content distribution network designed and operated by Michael Freedman. Coral uses the bandwidth of a world-wide network of web proxies and nameservers to mirror web content, often to avoid the Slashdot Effect or to reduce the load on websites servers in general.
[http://en.wikipedia.org/wiki/Coral_Content_Distribution_Network]

cdn.INCAPLULA

name::
* McsEngl.cdn.INCAPLULA@cptIt,

Incapsula Inc. is a Cloud-based security and acceleration service provider.[1]

Incapsula features include: Web Application Firewall (WAF), DDoS Mitigation and a Content Delivery Network (CDN), which Incapsula uses for Proxy acceleration and Caching.

Incapsula WAF provides solutions to protect websites against SQL Injections, Cross site scripting, illegal resource access and all other OWASP top ten threats, and web 2.0 threats including comment spam, fake registrations, site scraping and malicious bots. The CDN includes a network of globally distributed servers that cache website content and optimize it.[2][3]

Incapsula is a spin out of Imperva (NYSE:IMPV), a US-based data security company,[4] and was founded by Gur Shatz and Marc Gaffan in 2009. Gur Shatz previously worked at Imperva as VP Products. .[5]

In 2011 Incapsula was chosen as one of the Top 10 companies to participate in RSA Conference Innovation Sandbox.[6]

In May 2012 Incapsula released a study about bot related "parasitic drag" phenomena - a depletion of hosting resources caused by non-human website visitors. The study showed that bot visits will account for 51% of overall traffic to an average sized website (50,000 to 100,000 monthly visitors). The study also revealed that more than 60% of all bot visits are malicious.[7]

In August 2012 Incapsula launched Botopedia.org, an online community-sourced directory that consolidates information about active non-human entities (bots).[8]
[http://en.wikipedia.org/wiki/Incapsula]

pwb'cross-domain-request

_CREATED: {2013-07-06}

name::
* McsEngl.pwb'cross-domain-request@cptIt,
* McsEngl.cross-domain-communication@cptIt,
* McsEngl.cross-domain-request@cptIt,
* McsEngl.cross-site-http-request@cptIt,

_ADDRESS.WPG:
* http://enable-cors.org/index.html,
* Cross-domain Ajax with Cross-Origin Resource Sharing: http://www.nczonline.net/blog/2010/05/25/cross-domain-ajax-with-cross-origin-resource-sharing//
* https://developer.mozilla.org/en-US/docs/HTTP/Access_control_CORS,

Access-Control-Allow-Method

name::
* McsEngl.access-control-allow-method@cptIt,

The Access-Control-Allow-Methods header indicates the methods that can be used in the actual request.
...
Access-Control-Allow-Methods: PUT, DELETE
[http://www.w3.org/TR/cors/#introduction]

Access-Control-Allow-Origin

name::
* McsEngl.access-control-allow-origin@cptIt,

_PHP:
If you don't have access to configure Apache, you can still send the header from a PHP script. It's a case of adding the following to your PHP scripts:
<?php
header("Access-Control-Allow-Origin: *");
Note: as with all uses of the PHP header function, this must be before any output has been sent from the server.
[http://enable-cors.org/server_php.html]

_APACHE:
On Apache, you can do this in an httpd.conf <VirtualHost> section or .htaccess file using mod_headers and this syntax:

Header add Access-Control-Allow-Origin "http://domain1.com"
Header add Access-Control-Allow-Origin "http://domain2.com"
Header add Access-Control-Allow-Origin "http://domain3.com"
The trick is to use add rather than append as the first argument.
[http://stackoverflow.com/questions/1653308/access-control-allow-origin-multiple-origin-domains]

Access-Control-Max-Age

The Access-Control-Max-Age header indicates how long the response can be cached, so that for subsequent requests, within the specified time, no preflight request has to be made.
[http://www.w3.org/TR/cors/#introduction]

CORS

name::
* McsEngl.CORS@cptIt,
* McsEngl.cross-origin-resource-sharing@cptIt,

_ADDRESS.WPG:
* http://www.w3.org/TR/cors//
* http://www.html5rocks.com/en/tutorials/cors//
* http://enable-cors.org/index.html,

_DESCRIPTION:
There have been some criticisms raised about JSONP. Cross-origin resource sharing (CORS) is a more recent method of getting data from a server in a different domain, which addresses some of those criticisms.
[http://en.wikipedia.org/wiki/JSONP] 2013-07-20,
===
Cross-Origin Resource Sharing (CORS) is a W3C spec that allows cross-domain communication from the browser. By building on top of the XMLHttpRequest object, CORS allows developers to work with the same idioms as same-domain requests.
...
A word about security
While CORS lays the groundwork for making cross-domain requests, the CORS headers are not a substitute for sound security practices. You shouldn't rely on the CORS header for securing resources on your site. Use the CORS headers to give the browser directions on cross-domain access, but use some other security mechanism, such as cookies or OAuth2, if you need additional security restrictions on your content.
[http://www.html5rocks.com/en/tutorials/cors/#toc-adding-cors-support-to-the-server]
_DESCRIPTION:
Cross-origin requests look just like same-origin requests, but use a full URL instead of a relative one:
var xhr = new XMLHttpRequest();
var onLoadHandler = function(event) {
/* do something with the response */
}
xhr.open('GET','http://other.server/and/path/to/script');
xhr.onload = onLoadHandler;
xhr.send();
The critical difference is that the target URL must permit access from the requesting origin by sending an Access-Control-Allow-Origin response header.
[http://dev.opera.com/articles/view/xhr2/]
===
In general, Ajax does not work across domains. For instance, a webpage loaded from example1.com is unable to make an Ajax request to example2.com as it would violate the same origin policy. As a work around, JSONP (JSON with Padding) uses <script> tags to load files containing arbitrary JavaScript content and JSON, from another domain. More recently browsers have implemented a technology called Cross-Origin Resource Sharing (CORS), that allows Ajax requests to different domains.
[http://learn.jquery.com/ajax/]
===
CORS on PHP
If you don't have access to configure Apache, you can still send the header from a PHP script. It's a case of adding the following to your PHP scripts:

<?php
header("Access-Control-Allow-Origin: *");
Note: as with all uses of the PHP header function, this must be before any output has been sent from the server.
[http://enable-cors.org/server_php.html]

cors'resource

name::
* McsEngl.cors'resource@cptIt,

_ADDRESS.WPG:
* http://www.nczonline.net/blog/2010/05/25/cross-domain-ajax-with-cross-origin-resource-sharing//
* http://www.html5rocks.com/en/tutorials/cors//
* http://www.leggetter.co.uk/2010/03/12/making-cross-domain-javascript-requests-using-xmlhttprequest-or-xdomainrequest.html,

JSONP

name::
* McsEngl.jsonp@cptIt,
* McsEngl.jason-with-padding@cptIt,

_DESCRIPTION:
JSONP is a way to fetch JSON data from a different domain, in an asynchronous way, but without being restricted by the browser’s same-origin policy like you would with XMLHttpRequest.
[http://schock.net/articles/2013/02/05/how-jsonp-really-works-examples/]
===
JSONP (first documented by Bob Ippolito in 2005) is a simple and effective alternative that makes use of the ability of script tags to fetch content from any server.
[http://javascriptweblog.wordpress.com/2010/11/29/json-and-jsonp/]
===
In this page We will discuss JSONP, i.e. JSON with padding. JSONP is used to request data from a server residing in a different domain. But why do we need a special technique to access data from a different domain? It's because of the Same Origin Policy.
How JSONP works - Step by Step

Step 1 - You need to create a callback function. The function accepts some data. Like following code :

function w3r_callback(data){
console.log(data);
}
Step 2 - Include a script in your web page which contains the callback function created a step 1 as a parameter.

<script src="http://www.example.com?q=w3r_callback"><script>
Step 3 - It outputs a script which calls the function and requested data is passed.

w3r_callback({
"FirstName" : "xyz",
"LastName" : "abc",
"Grade" : "A"
}
);

[http://www.w3resource.com/JSON/JSONP.php]

jsonp'resource

name::
* McsEngl.jsonp'resource@cptIt,

_ADDRESS.WPG:
* http://bob.ippoli.to/archives/2005/12/05/remote-json-jsonp//
* http://schock.net/articles/2013/02/05/how-jsonp-really-works-examples//
* http://www.w3resource.com/JSON/JSONP.php,

jsonp.jQuery#ql:jquery'jsonp#

name::
* McsEngl.jsonp.jQuery@cptIt,

pwb'data

name::
* McsEngl.pwb'data@cptIt,
* McsEngl.pgmWeb'content@cptIt,

_GENERIC:
* data-of-program#ql:program'data#

pwb'data-storage

name::
* McsEngl.pwb'data-storage@cptIt,
* McsEngl.pgmWeb'Storage@cptIt,

_SPECIFIC:
* database-server,
* flat-files, file-system, (flat storage)

Audio

Collection

Collection-Predefined

name::
* McsEngl.Option@cptIt,

List
Table

Image

Text

Heading
Paragraph

Time

URL

Video

pwb'doing

name::
* McsEngl.pwb'doing@cptIt,

_SPECIFIC:
* collaborating##
* developing#ql:prgweb'developing#,
* using#ql:prgweb'using#

pwb'collaborating

name::
* McsEngl.pwb'collaborating@cptIt,

pwb'doing.DEVELOPING

name::
* McsEngl.pwb'doing.DEVELOPING@cptIt,

_DESCRIPTION:
Writing of web applications is often simplified by open source software such as Django, Ruby on Rails or Symfony called web application frameworks. These frameworks facilitate rapid application development by allowing a development team to focus on the parts of their application which are unique to their goals without having to resolve common development issues such as user management.[8] While many of these frameworks are open source, this is by no means a requirement.

The use of web application frameworks can often reduce the number of errors in a program, both by making the code simpler, and by allowing one team to concentrate on the framework while another focuses on a specified use case. In applications which are exposed to constant hacking attempts on the Internet, security-related problems can be caused by errors in the program. Frameworks can also promote the use of best practices[9] such as GET after POST.

In addition, there is potential for the development of applications on Internet operating systems, although currently there are not many viable platforms that fit this model.
[http://en.wikipedia.org/wiki/Web_application]

pwb'Google-App-Engine

name::
* McsEngl.pwb'Google-App-Engine@cptIt,
* McsEngl.GAE@cptIt580i,
* McsEngl.google-app-engine@cptIt580i,

_DESCRIPTION:
Google App Engine lets you run your web applications on Google's infrastructure. App Engine applications are easy to build, easy to maintain, and easy to scale as your traffic and data storage needs grow. With App Engine, there are no servers to maintain: You just upload your application, and it's ready to serve your users.
You can serve your app from your own domain name (such as http://www.example.com/) using Google Apps. Or, you can serve your app using a free name on the appspot.com domain. You can share your application with the world, or limit access to members of your organization.
Google App Engine supports apps written in several programming languages. With App Engine's Java runtime environment, you can build your app using standard Java technologies, including the JVM, Java servlets, and the Java programming language—or any other language using a JVM-based interpreter or compiler, such as JavaScript or Ruby. App Engine also features a dedicated Python runtime environment, which includes a fast Python interpreter and the Python standard library, and a Go runtime environment that runs natively compiled Go code. These runtime environments are built to ensure that your application runs quickly, securely, and without interference from other apps on the system.
With App Engine, you only pay for what you use. There are no set-up costs and no recurring fees. The resources your application uses, such as storage and bandwidth, are measured by the gigabyte, and billed at competitive rates. You control the maximum amounts of resources your app can consume, so it always stays within your budget.
App Engine costs nothing to get started. All applications can use up to 1 GB of storage and enough CPU and bandwidth to support an efficient app serving around 5 million page views a month, absolutely free. When you enable billing for your application, your free limits are raised, and you only pay for resources you use above the free levels.
[http://code.google.com/appengine/docs/whatisgoogleappengine.html]
===
Google App Engine (often referred to as GAE or simply App Engine, and also used by the acronym GAE/J) is a cloud computing platform for developing and hosting web applications in Google-managed data centers. It was first released as a beta version in April 2008.

Google App Engine is Platform as a Service technology. It virtualizes applications across multiple servers.[1] Google App Engine is free up to a certain level of used resources. Fees are charged for additional storage, bandwidth, or CPU cycles required by the application.[2]
[http://en.wikipedia.org/wiki/Google_App_Engine]

pwb'Framework

name::
* McsEngl.pwb'Framework@cptIt,
* McsEngl.web-application-framework@cptIt580i,

_DESCRIPTION:
A web application framework is a software framework that is designed to support the development of dynamic websites, web applications and web services. The framework aims to alleviate the overhead associated with common activities performed in Web development. For example, many frameworks provide libraries for database access, templating frameworks and session management, and they often promote code reuse.[1]
[http://en.wikipedia.org/wiki/Web_application_framework]

_SPECIFIC:
* ajax,
* drupal,
* google-app-engine,

Force.com

name::
* McsEngl.Force.com@cptIt,

Force.com is a platform for creating and deploying applications for the social enterprise. Because there are no servers or software to buy or manage, you can focus solely on building apps that include built-in social and mobile functionality, business processes, reporting, and search. Your apps run on a secure, proven service that scales, tunes, and backs up data automatically.
[http://www.force.com/why-force.jsp]

pwb'doing.EXECUTING

name::
* McsEngl.pwb'doing.EXECUTING@cptIt,
* McsEngl.pgmWeb'executing@cptIt,

_DESCRIPTION:
By opening the-file 'INDEX.HTML', which holds and the-configuration-variables.
[hmnSngo.2016-01-05]

pwb'doing.USING

name::
* McsEngl.pwb'doing.USING@cptIt,
* McsEngl.pgmWeb'usage@cptIt,

_GENERIC:
* doing#ql:prgweb'doing#

_SPECIFIC_DIVISION.content:
* content-managing#ql:pgmweb'content_managing#,
* non-content-management-(admining)#ql:pgmweb'administering#

_SPECIFIC:
* collaborative-writting,
* content-management-system,

pwb'using.ADMINISTERING

name::
* McsEngl.pwb'using.ADMINISTERING@cptIt,

_GENERIC:
* using#ql:prgweb'using#

pwb'Backuping

name::
* McsEngl.pwb'Backuping@cptIt,

pwb'Installing

name::
* McsEngl.pwb'Installing@cptIt,

pwb'Configuring

name::
* McsEngl.pwb'Configuring@cptIt,

pwb'Starting

name::
* McsEngl.pwb'Starting@cptIt,
* McsEngl.pgmWeb'executing@cptIt,
* McsEngl.pgmWeb'running@cptIt,

pwb'Upgrading

name::
* McsEngl.pwb'Upgrading@cptIt,

pwb'User-managing

name::
* McsEngl.pwb'User-managing@cptIt,

pwb'using.CONTENT-MANAGING

name::
* McsEngl.pwb'using.CONTENT-MANAGING@cptIt,

_GENERIC:
* content_managment,
* using#ql:prgweb'using#

_SPECIFIC:
* inferencing,
* retrieving#ql:prgweb'content_retrieving#,
* storing#ql:pgmweb'content_storing#

pwb'Content-inferencing

name::
* McsEngl.pwb'Content-inferencing@cptIt,
* McsEngl.pgmWeb'inferencing@cptIt,

_SPECIFIC:
* retrieving-inferencing,
* storing-inferencing,
* transitivity,

pwb'Content-retrieving

name::
* McsEngl.pwb'Content-retrieving@cptIt,
* McsEngl.pgmWeb'navigating@cptIt,
* McsEngl.pgmWeb'reading@cptIt,

pwb'Content-storing

name::
* McsEngl.pwb'Content-storing@cptIt,
* McsEngl.pgmWeb'content-editing@cptIt,
* McsEngl.pgmWeb'editing@cptIt,

_SPECIFIC:
* html,
* html-forms,
* wikitext,
* wysiwyg,

pwb'Versioning

name::
* McsEngl.pwb'Versioning@cptIt,

pwb'evaluating

name::
* McsEngl.pwb'evaluating@cptIt,

pwb'advantage

name::
* McsEngl.pwb'advantage@cptIt,

_INSTALLATION, _UPGRADE, _COMPATIBILITY:
The lack of installation and compatibility or upgrade problems gives them a definite advantage.
[http://www.xul.fr/web-application.html]

pwb'advantageNo

name::
* McsEngl.pwb'advantageNo@cptIt,

_LOCAL_SORAGE:
persistent local storage is one of the areas where native client applications have held an advantage over web applications.
[http://diveintohtml5.info/storage.html]

pwb'human

name::
* McsEngl.pwb'human@cptIt,

pwb'human'permission

name::
* McsEngl.pwb'human'permission@cptIt,

pwb'human.ADMINISTRATOR

name::
* McsEngl.pwb'human.ADMINISTRATOR@cptIt,
* McsEngl.pgmWeb'administrator@cptIt,

_GENERIC:
* user-of-pgmWeb##

pwb'human.AUTHOR

name::
* McsEngl.pwb'human.AUTHOR@cptIt,
* McsEngl.pgmWeb'author@cptIt,
* McsEngl.pgmWeb'Editor-human@cptIt,

_GENERIC:
* user-of-pgmWeb##

_DESCRIPTION:
* author of the site's content.

pwb'human.DEVELOPER

name::
* McsEngl.pwb'human.DEVELOPER@cptIt,
* McsEngl.pgmWeb'developer@cptIt,

_GENERIC:
* human-of-pgmWeb##

_DESCRIPTION:
* developing the program itself

pwb'human.END-USER

name::
* McsEngl.pwb'human.END-USER@cptIt,
* McsEngl.end-user.pgmWeb@cptIt,
* McsEngl.pgmWeb'end-user@cptIt,

_DESCRIPTION:
The user who is NOT administrator.
[hmnSngo.2013-07-31]

pwb'human.USER

name::
* McsEngl.pwb'human.USER@cptIt,
* McsEngl.pgmWeb'user@cptIt,
* McsEngl.user.pgmWeb@cptIt,

_GENERIC:
* human-of-pgmWeb##

_SPECIFIC:
* administrator##
* user##
===
* administrator##
* author##
* enduser##
* reader##

pwb'plugin

name::
* McsEngl.pwb'plugin@cptIt,

pwb'programming#attEnv#

name::
* McsEngl.pwb'programming@cptIt,
* McsEngl.web-coding@cptIt580i,
* McsEngl.web-programming@cptIt580i,

_GENERIC:
* web-development,

_SPECIFIC:
* client-side--programming
* server-side--programming

pwb'resource

name::
* McsEngl.pwb'resource@cptIt,

_SPECIFIC:
* https://msdn.microsoft.com/en-us/library/hh772406(v=vs.85).aspx,
* Numecent makes any app a Web app: 2012-03-05, http://news.cnet.com/8301-19882_3-57390356-250/numecent-makes-any-app-a-web-app/?tag=mncol;editorPicks,
* http://en.wikipedia.org/wiki/Web_application
* http://www.w3resource.com//

pwb'same-domain-request

_CREATED: {2013-07-06}

name::
* McsEngl.pwb'same-domain-request@cptIt,
* McsEngl.same-domain-communication@cptIt,
* McsEngl.same-domain-request@cptIt,
* McsEngl.same-origing-communication@cptIt,

_ADDRESS.WPG:
* https://developer.mozilla.org/en-US/docs/Web/JavaScript/Same_origin_policy_for_JavaScript,

_DESCRIPTION:
The same-origin policy restricts how a document or script loaded from one origin can interact with a resource from another origin.

Definition of an origin
Two pages have the same origin if the protocol, port (if one is specified), and host are the same for both pages. The following table gives examples of origin comparisons to the URL http://store.company.com/dir/page.html:
URL            Outcome  Reason
http://store.company.com/dir2/other.html    Success  
http://store.company.com/dir/inner/another.html  Success  
https://store.company.com/secure.html    Failure    Different protocol
http://store.company.com:81/dir/etc.html    Failure    Different port
http://news.company.com/dir/other.html    Failure    Different host
See also origin definition for file: URLs.

Cookies use a definition of origins, which is different from the above.
[https://developer.mozilla.org/en-US/docs/Web/JavaScript/Same_origin_policy_for_JavaScript]

same-origin-policy

name::
* McsEngl.same-origin-policy@cptIt,

_DESCRIPTION:
Same Origin Policy
In general, this policy states that, if protocol (like http), Port number (like 80) and host (like example.com) is different from where data is being requested, it should not be permitted.
But HTML <script> element is allowed to perform content retrieval from foreign origins.
[http://www.w3resource.com/JSON/JSONP.php]

_ADDRESS.WPG:
* http://javascript.info/tutorial/same-origin-security-policy,

pwb'security

name::
* McsEngl.pwb'security@cptIt,

_ADDRESS.WPG:
* http://www.itworld.com/article/2842676/why-you-should-worry-about-html5-mobile-apps.html,
* http://venturebeat.com/2014/11/04/google-releases-open-source-nogotofail-network-traffic-security-testing-tool//

pwb'site

name::
* McsEngl.pwb'site@cptIt,
* McsEngl.prgweb'App@cptIt,
* McsEngl.prgweb'WebSite@cptIt,

_GENERIC:
* app#ql:app_it393#

_PART:
* endUser-code##
* program##

pwb'storage

name::
* McsEngl.pwb'storage@cptIt,

pwb'cookies

name::
* McsEngl.pwb'cookies@cptIt,
* McsEngl.cookies@cptIt,

_DESCRIPTION:
Historically, web applications have had none of these luxuries. Cookies were invented early in the web’s history, and indeed they can be used for persistent local storage of small amounts of data. But they have three potentially dealbreaking downsides:

Cookies are included with every HTTP request, thereby slowing down your web application by needlessly transmitting the same data over and over
Cookies are included with every HTTP request, thereby sending data unencrypted over the internet (unless your entire web application is served over SSL)
Cookies are limited to about 4 KB of data — enough to slow down your application (see above), but not enough to be terribly useful
[http://diveintohtml5.info/storage.html]

This site uses cookies from Google to deliver its services, to personalize ads and to analyze traffic. Information about your use of this site is shared with Google. By using this site, you agree to its use of cookies.LEARN MOREGOT IT

pwb'tech

name::
* McsEngl.pwb'tech@cptIt,

_SPECIFIC:
* java
* java applet
* javascript,
* .NET,
* perl,
* PHP,
* python,

pwb'Client-tech

name::
* McsEngl.pwb'Client-tech@cptIt,

_SPECIFIC:
* CSJS
* Java
* SSJS

pwb'file-api#ql:jsfileapi#

name::
* McsEngl.pwb'file-api@cptIt,

pwb'geolocation-api#ql:jsapi.geolocation#

name::
* McsEngl.pwb'geolocation-api@cptIt,

pwb'IndexedDB-api#ql:jsapi.indexeddb#

name::
* McsEngl.pwb'IndexedDB-api@cptIt,

pwb'performance-and-timing-api

name::
* McsEngl.pwb'performance-and-timing-api@cptIt,

pwb'Server-tech

name::
* McsEngl.pwb'Server-tech@cptIt,

_SPECIFIC:
* ASP.NET
* PHP
* SSJS

pwb'WebSocket-api#ql:jsapi.indexeddb#

name::
* McsEngl.pwb'WebSocket-api@cptIt,

pwb'zero-installation

name::
* McsEngl.pwb'zero-installation@cptIt,
* McsEngl.zero-installation@cptIt,

pwb'GENERIC

_GENERIC:
* program-net#cptItsoft350#

SPECIFIC

name::
* McsEngl.pwb.specific@cptIt,
* McsEngl.pgmWeb.specific@cptIt,

_SPECIFIC:
* collaborative-editor,
* web-server--program#cptItsoft572#
===
* Etherpad,

_SPECIFIC:
* ezFILEMANAGER: http://www.webnaz.net/en/support/ezfilemanager-v2-installation,
- integrated inside tinyMCE v3,

pwb.SPECIFIC-DIVISION.server

name::
* McsEngl.pwb.SPECIFIC-DIVISION.server@cptIt,

_SPECIFIC:
* client-side##
* client-server##
* server-side##

pwb.ADOBE-FLASH

name::
* McsEngl.pwb.ADOBE-FLASH@cptIt,
* McsEngl.adobe-flash@cptIt,

_DESCRIPTION:
Adobe Flash manipulates vector and raster graphics to provide animation of text, drawings, and still images. It supports bidirectional streaming of audio and video, and it can capture user input via mouse, keyboard, microphone, and camera. Flash contains an object-oriented language called ActionScript and supports automation via the Javascript Flash language (JFSL). Flash content may be displayed on various computer systems and devices, using Adobe Flash Player, which is available free of charge for common web browsers, some mobile phones and a few other electronic devices (using Flash Lite).
[http://en.wikipedia.org/wiki/Internet_application]

pwb.BROWSER-EXECUTING

_CREATED: {2011-09-09 {2011-08-24}}

name::
* McsEngl.pwb.BROWSER-EXECUTING@cptIt,
* McsEngl.conceptIt580.1,
* McsEngl.Wapp@cptIt, {2020-05-11}
* McsEngl.appWeb@cptIt580.1, {2011-09-09}
* McsEngl.browser-application@cptIt, {2014-05-22}
* McsEngl.browser-based-application@cptIt, {2014-05-22}
* McsEngl.browser-executing-program@cptIt, {2015-03-29}
* McsEngl.browser-program@cptIt,
* McsEngl.browser-running-program@cptIt, {2015-03-29}
* McsEngl.client-side-web-program@cptIt580i,
* McsEngl.online-application@cptIt,
* McsEngl.pgmWeb.CLIENT-SIDE@cptIt,
* McsEngl.program.browser-executing@cptIt,
* McsEngl.program.browser-running@cptIt,
* McsEngl.program.WebBrowser-Executing@cptIt,
* McsEngl.program.webbrowser-running@cptIt,
* McsEngl.webapp@cptIt,
* McsEngl.web-application@cptIt,
* McsEngl.web-based-application@cptIt580.1, {2011-09-09}
* McsEngl.web-application@cptIt580.1, {2011-09-09}
* McsEngl.webpage.application@cptIt,
* McsEngl.web'Page.Dynamic@cptIt,
* McsEngl.dynamic-webpage@cptIt19i,
===-ABBREVIATION:
* McsEngl.pgmWbe@cptIt, {2015-04-09}
* McsEngl.pgmBsr@cptIt, {2015-03-29}
* McsEngl.webapn@cptIt,
* McsEngl.web-app@cptIt580.1, {2011-09-09}

_DESCRIPTION:
Dynamic web pages usually consist of a static part (HTML) and a dynamic part, which is code that generates HTML. The code that generates the HTML can do this based on variables in a template, or on code. The text to be generated can come from a database, thereby making it possible to dramatically reduce the number of pages in a site.
[http://en.wikipedia.org/wiki/Web_application_framework]

_GENERIC:
* application#ql:application_it393#,
* program-app#cptIt304#

_DESCRIPTION:
A-BROWSER-APPLICATION is a-net-program that runs on a-webbrowser#ql:webbrowser@cptIt#, (on the-server is only stored)
[hmnSngo.2015-03-29]
===
A web application is any application that uses a web-browser#ql:web_browser@cptIt# as a client.[1] The term may also mean a computer software application that is coded in a browser-supported programming language (such as JavaScript, combined with a browser-rendered markup language like HTML) and reliant on a common web browser to render the application executable.
Web applications are popular due to the ubiquity of web browsers, and the convenience of using a web browser as a client, sometimes called a thin client. The ability to update and maintain web applications without distributing and installing software on potentially thousands of client computers is a key reason for their popularity, as is the inherent support for cross-platform compatibility. Common web applications include webmail, online retail sales, online auctions, wikis and many other functions.
[http://en.wikipedia.org/wiki/Web_application]
===
Javascript helped in the creation of client-side web-applications.

pgmWbe'Archetype

name::
* McsEngl.pgmWbe'Archetype@cptIt,

_DESCRIPTION:
Examples of browser applications are simple office software (word processors, online spreadsheets, and presentation tools), but can also include more advanced applications such as project management, computer-aided design, video editing and point-of-sale.
[http://en.wikipedia.org/wiki/Web_application]

pgmWbe'Code

name::
* McsEngl.pgmWbe'Code@cptIt,

pgmWbe'benefit

name::
* McsEngl.pgmWbe'benefit@cptIt,

Benefits[edit]
This article possibly contains original research. Please improve it by verifying the claims made and adding inline citations. Statements consisting only of original research may be removed. (April 2011)
Web applications do not require any complex "roll out" procedure to deploy in large organizations. A compatible web browser is all that is needed;
Browser applications typically require little or no disk space on the client;
They require no upgrade procedure since all new features are implemented on the server and automatically delivered to the users;
Web applications integrate easily into other server-side web procedures, such as email and searching.
They also provide cross-platform compatibility in most cases (i.e., Windows, Mac, Linux, etc.) because they operate within a web browser window.
With the advent of HTML5, programmers can create richly interactive environments natively within browsers. Included in the list of new features are native audio, video and animations, as well as improved error handling.
[http://en.wikipedia.org/wiki/Web_application]

pgmWbe'drawback

name::
* McsEngl.pgmWbe'drawback@cptIt,

Drawbacks[edit]
This article possibly contains original research. Please improve it by verifying the claims made and adding inline citations. Statements consisting only of original research may be removed. (April 2011)
In practice, web interfaces, compared to thick clients, typically force significant sacrifice to user experience and basic usability.
Web applications absolutely require compatible web browsers. If a browser vendor decides not to implement a certain feature, or abandons a particular platform or operating system version, this may affect a huge number of users;
Standards compliance is an issue with any non-typical office document creator, which causes problems when file sharing and collaboration becomes critical;
Browser applications rely on application files accessed on remote servers through the Internet. Therefore, when connection is interrupted, the application is no longer usable. However, if it uses HTML5 API's such as Offline Web application caching,[10] it can be downloaded and installed locally, for offline use. Google Gears, although no longer in active development, is a good example of a third party plugin for web browsers that provides additional functionality for creating web applications;
Since many web applications are not open source, there is also a loss of flexibility, making users dependent on third-party servers, not allowing customizations on the software and preventing users from running applications offline (in most cases). However, if licensed, proprietary software can be customized and run on the preferred server of the rights owner;
They depend entirely on the availability of the server delivering the application. If a company goes bankrupt and the server is shut down, the users have little recourse. Traditional installed software keeps functioning even after the demise of the company that produced it (though there will be no updates or customer service);
Likewise, the company has much greater control over the software and functionality. They can roll out new features whenever they wish, even if the users would like to wait until the bugs have been worked out before upgrading. The option of simply skipping a weak software version is often not available. The company can foist unwanted features on the users or cut costs by reducing bandwidth. Of course, companies will try to keep the good will of their customers, but the users of web applications have fewer options in such cases unless a competitor steps in and offers a better product and easy migration;
The company can theoretically track anything the users do. This can cause privacy problems.
According to Jonathan Zittrain, the online applications like Facebook and Google Apps have made the Internet become far more proprietary than early versions of Microsoft Windows.[11]
[http://en.wikipedia.org/wiki/Web_application]

pgmWbe'resource

name::
* McsEngl.pgmWbe'resource@cptIt,

_ADDRESS.WPG:
* http://singlepageappbook.com/single-page.html,

SPECIFIC

* pgmWbe.specific,

_SPECIFIC:
* pgmWpg#ql:pgmhml@cptIt#

pgmWbe.CLOCK.COUNTDOWN

name::
* McsEngl.pgmWbe.CLOCK.COUNTDOWN@cptIt,

_ADDRESS.WPG:
* https://github.com/iamshaunjp/js-tricks-countdown,

_CODE.HML:
<html>
<head>
<link href="style.css" rel="stylesheet" type="text/css" />
</head>
<body>
<div id="del-countdown">
<h1>MEGA EVENT</h1>
<div id="clock"></div>
<div id="units">
<span>Days</span>
<span>Hours</span>
<span>Minutes</span>
<span>Seconds</span>
</div>
</div>
<script src="countdown.js"></script>
</body>
</html>

_CODE.LJS:
//countdown.js
function updateTimer(deadline){
var time = deadline - new Date();
return {
'days': Math.floor( time/(1000*60*60*24) ),
'hours': Math.floor( (time/(1000*60*60)) % 24 ),
'minutes': Math.floor( (time/1000/60) % 60 ),
'seconds': Math.floor( (time/1000) % 60 ),
'total' : time
};
}


function animateClock(span){
span.className = "turn";
setTimeout(function(){
span.className = "";
},700);
}

function startTimer(id, deadline){
var timerInterval = setInterval(function(){
var clock = document.getElementById(id);
var timer = updateTimer(deadline);

clock.innerHTML = '<span>' + timer.days + '</span>'
+ '<span>' + timer.hours + '</span>'
+ '<span>' + timer.minutes + '</span>'
+ '<span>' + timer.seconds + '</span>';

//animations
var spans = clock.getElementsByTagName("span");
animateClock(spans[3]);
if(timer.seconds == 59) animateClock(spans[2]);
if(timer.minutes == 59 && timer.seconds == 59) animateClock(spans[1]);
if(timer.hours == 23 && timer.minutes == 59 && timer.seconds == 59) animateClock(spans[0]);

//check for end of timer
if(timer.total < 1){
clearInterval(timerInterval);
clock.innerHTML = '<span>0</span><span>0</span><span>0</span><span>0</span>';
}


}, 1000);
}


window.onload = function(){
var deadline = new Date("April 25, 2016 17:15:00");
startTimer("clock", deadline);
};

_CODE.CSS:
/* style.css */
body{
background:#282e3a;
font-family: tahoma;
}
h1{
color:#fff;
text-align: center;
font-size: 74px;
letter-spacing: 10px;
}
#del-countdown{
width: 850px;
margin: 15% auto;
}
#clock span{
float: left;
text-align: center;
font-size: 84px;
margin: 0 2.5%;
color:#fff;
padding: 20px;
width: 20%;
border-radius: 20px;
box-sizing: border-box;
}
#clock span:nth-child(1){
background:#fa5559;
}
#clock span:nth-child(2){
background:#26c2b9;
}
#clock span:nth-child(3){
background:#f6bc58;
}
#clock span:nth-child(4){
background:#2dcb74;
}
#clock:after{
content: "";
display: block;
clear: both;
}
#units span{
float: left;
width: 25%;
text-align: center;
margin-top: 30px;
color:#ddd;
text-transform: uppercase;
font-size: 13px;
letter-spacing: 2px;
text-shadow: 1px 1px 1px rgba(10,10,10, 0.7);
}

span.turn{
animation: turn 0.7s ease forwards;
}

@keyframes turn{
0%{transform: rotateX(0deg)}
100%{transform: rotateX(360deg)}
}

pwb.COLLABORATING

name::
* McsEngl.pwb.COLLABORATING@cptIt,

pwb.COMMENT

name::
* McsEngl.pwb.COMMENT@cptIt,
* McsEngl.conversation-network@cptIt,
* McsEngl.comment-adding@cptIt,
* McsEngl.commenter-program@cptIt,
* McsEngl.discussion-platform@cptIt,

pwb.DISQUS

_CREATED: {2013-08-02}

name::
* McsEngl.pwb.DISQUS@cptIt,
* McsEngl.disqus@cptIt,

_ADDRESS.WPG:
* http://help.disqus.com/customer/portal/articles/466182-quick-start-guide,
* http://help.disqus.com/customer/portal/articles/472098-javascript-configuration-variables,
* http://help.disqus.com/customer/portal/articles/1208081-receiving-payments-from-disqus,

_CODE.DISQUS:
//this creates a discussion in a unique page.
var disqus_shortname = 'example'; // Required - Replace example with your forum shortname
var disqus_identifier = 'a unique identifier for each page where Disqus is present';
var disqus_title = 'a unique title for each page where Disqus is present';
var disqus_url = 'a unique URL for each page where Disqus is present';
[http://help.disqus.com/customer/portal/articles/472098-javascript-configuration-variables]

===
<div id="disqus_thread"></div>
<script type="text/javascript">
/* * * CONFIGURATION VARIABLES: EDIT BEFORE PASTING INTO YOUR WEBPAGE * * */
var disqus_shortname = 'synagonism'; // required: replace example with your forum shortname

/* * * DON'T EDIT BELOW THIS LINE * * */
(function() {
var dsq = document.createElement('script'); dsq.type = 'text/javascript'; dsq.async = true;
dsq.src = '//' + disqus_shortname + '.disqus.com/embed.js';
(document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq);
})();
</script>
<noscript>Please enable JavaScript to view the <a href="http://disqus.com/?ref_noscript">comments powered by Disqus.</a></noscript>
<a href="http://disqus.com" class="dsq-brlink">comments powered by <span class="logo-disqus">Disqus</span></a>
[http://synagonism.disqus.com/admin/universalcode/]
===

var disqus_shortname = 'nodemanual';
var paths = window.location.pathname.split("/");
var fileName = paths[paths.length - 2] + "/" + paths[paths.length - 1];
var disqus_identifier = fileName;

(function() {
var dsq = document.createElement('script'); dsq.type = 'text/javascript'; dsq.async = true;
dsq.src = 'http://' + disqus_shortname + '.disqus.com/embed.js';
(document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq);
})();

HOW TO DISPLAY COMMENT COUNT
Place the following code before your site's closing </body> tag:
<script type="text/javascript">
/* * * CONFIGURATION VARIABLES: EDIT BEFORE PASTING INTO YOUR WEBPAGE * * */
var disqus_shortname = 'synagonism'; // required: replace example with your forum shortname

/* * * DON'T EDIT BELOW THIS LINE * * */
(function () {
var s = document.createElement('script'); s.async = true;
s.type = 'text/javascript';
s.src = '//' + disqus_shortname + '.disqus.com/count.js';
(document.getElementsByTagName('HEAD')[0] || document.getElementsByTagName('BODY')[0]).appendChild(s);
}());
</script>

Append#disqus_thread to the href attribute in your links. This will tell Disqus which links to look up and return the comment count. For example: <a href="http://foo.com/bar.html#disqus_thread">Link</a>.
[http://synagonism.disqus.com/admin/universalcode/]

disqus'discussion

name::
* McsEngl.disqus'discussion@cptIt,

_DESCRIPTION:
A discussion in ONE webpage, part of a disqus-site.
[hmnSngo.2014-09-06]

_CREATION:
You have ONLY to add the following code IN the webpage:

<div id="disqus_thread"></div>
<script type="text/javascript">
/* * * CONFIGURATION VARIABLES: EDIT BEFORE PASTING INTO YOUR WEBPAGE * * */
var disqus_shortname = 'synagonism'; //site's-shortname#ql:disqus'site'shortname#. common to all discussions.
var disqus_identifier = 'wvwEduMyschool'; //PAGE id
var disqus_title = 'wvw.edu.myschool'; //PAGE title
var disqus_url = 'http://synagonism.net/worldview/edu/myschool.html';
/* * * DON'T EDIT BELOW THIS LINE * * */
(function() {
var dsq = document.createElement('script'); dsq.type = 'text/javascript'; dsq.async = true;
dsq.src = '//' + disqus_shortname + '.disqus.com/embed.js';
(document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq);
})();
</script>
<noscript>Please enable JavaScript to view the <a href="http://disqus.com/?ref_noscript">comments powered by Disqus.</a></noscript>
<a href="http://disqus.com" class="dsq-brlink">comments powered by <span class="logo-disqus">Disqus</span></a>

disqus'site

name::
* McsEngl.disqus'site@cptIt,

_DESCRIPTION:
Disqus-site is a website with address 'shortname.disqus.com', which can include many discussions#ql:disqus'discussion# in different webpages.
[hmnSngo.2014-09-06]

disqus'site'REGISTRATION:
* https://disqus.com/admin/create//

disqus'site'NAME:
[https://disqus.com/admin/create//]

disqus'site'SHORTNAME:
Choose your unique Disqus URL

SHORTNAME.disqus.com

This is where you'll access moderation tools and site settings. This will also become your site's "shortname".
[https://disqus.com/admin/create//]

disqus'site'CATEGORY:
[https://disqus.com/admin/create//]

pwb.CONTENT-MANAGEMENT-SYSTEM (CMS)

name::
* McsEngl.pwb.CONTENT-MANAGEMENT-SYSTEM (CMS)@cptIt,
* McsEngl.CMS.web@cptIt,
* McsEngl.content-management.web@cptIt,
* McsEngl.WCMS@cptIt,
* McsEngl.web-content-management@cptIt580i,

_DESCRIPTION:
A web content management system (WCMS)[1] is a software system that provides website authoring, collaboration, and administration tools designed to allow users with little knowledge of web programming languages or markup languages to create and manage website content with relative ease. A robust WCMS provides the foundation for collaboration, offering users the ability to manage documents and output for multiple author editing and participation.

Most systems use a database to store page content, metadata, and other information assets that might be needed by the system.

A presentation layer displays the content to website visitors based on a set of templates. The templates are sometimes XSLT files.[2]

Most systems use server side caching to improve performance. This works best when the WCMS is not changed often but visits happen regularly.

Administration is typically done through browser-based interfaces, but some systems require the use of a fat client.

A WCMS allows non-technical users to make changes to a website with little training. A WCMS typically requires a systems administrator and/or a web developer to set up and add features, but it is primarily a website maintenance tool for non-technical staff.
[http://en.wikipedia.org/wiki/Web_content_management_system]

_SpecificFree:
* Drupal,
* Joomla,
* TYPO3,
* WordPress.

pwb.DEBUGGING

name::
* McsEngl.pwb.DEBUGGING@cptIt,

pwb.Fiddler

name::
* McsEngl.pwb.Fiddler@cptIt,
* McsEngl.fiddler.program@cptIt,

_DESCRIPTION:
Fiddler
The free web debugging proxy
for any browser, system or platform
[http://www.telerik.com/fiddler]
===
Ένα ισχυρό πρόγραμμα για την ανάλυση του traffic είναι το Fiddler. Ενώ είναι σπουδαίο, είναι μάλλον περίπλοκο στη χρήση χάρη στα εντυπωσιακά χαρακτηριστικά του.

Αν δεν έχετε λογισμικό καταγραφής όλων των τοπικών και απομακρυσμένων συνδέσεων, δεν μπορείτε να δείτε τι συμβαίνει όταν συνδέεστε σε μια ιστοσελίδα ή εκτελείτε ένα πρόγραμμα που συνδέεται στο Internet.

Η εταιρεία που έχει δημιουργήσει το προϊόν δημιούργησε και το FiddlerCap ως ένα συμπληρωματικό πρόγραμμα για το Fiddler. Μπορείτε να το χρησιμοποιήσετε μόνο του χωρίς τη χρήση του Fiddler και έχει ειδικά σχεδιαστεί για άπειρους χρήστες που μπορούν να σώσουν web συνεδρίες με μερικά μόνο κλικ.
[http://www.nooz.gr/tech/sillipsi-kai-proetoimasia-tou-web-traffic-gia-analusi]

pwb.DokuWiki

name::
* McsEngl.pwb.DokuWiki@cptIt,
* McsEngl.conceptIt580.2,
* McsEngl.dokuWiki@cptIt580.2, {2011-09-21}
* McsEngl.dw@cptIt580.2, {2011-09-21}

_DESCRIPTION:
DokuWiki is a standards compliant, simple to use Wiki, mainly aimed at creating documentation of any kind. It is targeted at developer teams, workgroups and small companies. It has a simple but powerful syntax which makes sure the datafiles remain readable outside the Wiki and eases the creation of structured texts. All data is stored in plain text files – no database is required.
[http://www.dokuwiki.org/dokuwiki]

dw'Configuration

name::
* McsEngl.dw'Configuration@cptIt,

InterWiki shortcuts are defined in the conf/interwiki.conf file.
[http://www.dokuwiki.org/interwiki]

dw'Installation

name::
* McsEngl.dw'Installation@cptIt,

1. download, unzip.

2. run QuickPHP
to run it from localhost: http://127.0.0.1:5723/

3. run install.php
http://127.0.0.1:5723/install.php
to set admin.
The setup script install.php assists you to do your initial DokuWiki setup. It checks for the availability of required PHP functions and checks for needed file permissions. It also creates an initial administrator account and an initial ACL policy.
To run the installer, open the page http://[dokuwikiPath]/install.php in the web browser. (For security reasons it will only work with a new and unmodified DokuWiki installation.)
[http://www.dokuwiki.org/installer]

dw'Plagin

name::
* McsEngl.dw'Plagin@cptIt,

* tree-menu:
* http://www.dokuwiki.org/plugin:indexmenu,

dw'Resource

name::
* McsEngl.dw'Resource@cptIt,

_SPECIFIC:
* main: http://www.dokuwiki.org/dokuwiki,
- http://forum.dokuwiki.org//
- http://www.dokuwiki.org/manual,

dw'Security

name::
* McsEngl.dw'Security@cptIt,

The following directories should not be accessible from the web:
data
conf
bin
inc (isn't dangerous when accessible, though)
[http://www.dokuwiki.org/security]

dw'Storage

name::
* McsEngl.dw'Storage@cptIt,

All data is stored in plain text files – no database is required.
[http://www.dokuwiki.org/dokuwiki]

pwb.Drupal (PHP)

name::
* McsEngl.pwb.Drupal (PHP)@cptIt,
* McsEngl.drupal@cptIt580i,

_DESCRIPTION:
Drupal ( /'dru?p?l/) is a free and open-source content management system (CMS) and content management framework (CMF) written in PHP and distributed under the GNU General Public License.[2][3][4] It is used as a back-end system for at least 1.5% of all websites worldwide[5][6] ranging from personal blogs to corporate, political, and government sites including whitehouse.gov and data.gov.uk.[7] It is also used for knowledge management and business collaboration.

The standard release of Drupal, known as Drupal core, contains basic features common to content management systems. These include user account registration and maintenance, menu management, RSS-feeds, page layout customization, and system administration. The Drupal core installation can be used as a brochureware website, a single- or multi-user blog, an Internet forum, or a community website providing for user-generated content.

As of August 2011 there are more than 11,000 free community-contributed addons, known as contrib modules, available to alter and extend Drupal's core capabilities and add new features or customize Drupal's behavior and appearance. Because of this plug-in extensibility and modular design, Drupal is sometimes described as a content management framework.[3][8] Drupal is also described as a web application framework, as it meets the generally accepted feature requirements for such frameworks.

Although Drupal offers a sophisticated programming interface for developers, no programming skills are required for basic website installation and administration.[9]

Drupal runs on any computing platform that supports both a web server capable of running PHP (including Apache, IIS, lighttpd, and nginx) and a database (such as MySQL, MariaDB, PostgreSQL, SQLite, MongoDB or Microsoft SQL Server) to store content and settings. Drupal 6 requires PHP 4.4.0+ while Drupal 7 requires PHP 5.2 or higher.[4]
[http://en.wikipedia.org/wiki/Drupal]

drupal'Comment

name::
* McsEngl.drupal'Comment@cptIt,

_DESCRIPTION:
Comments are another type of content you can have on your site (if you have enabled the core Comment module). Each comment is a typically small piece of content that a user submits, attached to a particular node. For example, each piece of discussion attached to a particular forum topic node is a comment.
[http://drupal.org/node/19828] 2011-09-20

drupal'Database

name::
* McsEngl.drupal'Database@cptIt,

Drupal stores information in a database; each type of information has its own database table. For instance, the basic information about the nodes of your site are stored in the Node table, and if you use the CCK module to add fields to your nodes, the field information is stored in separate tables. Comments and Users also have their own database tables, and roles, permissions, and other settings are also stored in database tables.
[http://drupal.org/node/19828] 2011-09-20

drupal'Evolution

name::
* McsEngl.drupal'Evolution@cptIt,

drupal 7.8,

drupal'Module

name::
* McsEngl.drupal'Module@cptIt,

_DESCRIPTION:
A module is software (code) that extends Drupal features and/or functionality. Core modules are those included with the main download of Drupal, and you can turn on their functionality without installing additional software. Contributed modules are downloaded from the Modules download section of drupal.org, and installed within your Drupal installation. You can also create your own modules; this requires a thorough understanding of Drupal, PHP programming, and Drupal's module API.
[http://drupal.org/node/19828] 2011-09-20

drupal'Node

name::
* McsEngl.drupal'Node@cptIt,

_DESCRIPTION:
A node in Drupal is the generic term for a piece of content on your web site. (Note that the choice of the word "node" is not meant in the mathematical sense as part of a network.) Some examples of nodes:
- Pages in books
- Discussion topics in forums
- Entries in blogs
- News article stories
Each node on your site has a Content Type. It also has a Node ID, a Title, a creation date, an author (a user on the site), a Body (which may be ignored/omitted for some content types), and some other properties. By using modules such as the contributed Content Construction Kit (CCK) module, the core Taxonomy module, and the contributed Location module, you can add fields and other properties to your nodes.
[http://drupal.org/node/19828]

drupal'NID

name::
* McsEngl.drupal'NID@cptIt,

NID#
Node ID. The unique identifier for each node. It can be found in the path to the node. For example, a node with path, "http://drupal.org/node/937", has a node ID of "937".

drupal.Node-type

name::
* McsEngl.drupal.Node-type@cptIt,
* McsEngl.drupal-content-type@cptIt,

drupal'User

name::
* McsEngl.drupal'User@cptIt,

_DESCRIPTION:
Every visitor to your site, whether they have an account and log in or visit the site anonymously, is considered a user to Drupal. Each user has a numeric user ID, and non-anonymous users also have a user name and an email address. Other information can also be associated with users by modules; for instance, if you use the core Profile module, you can define user profile fields to be associated with each user.

Anonymous users have a user ID of zero (0). The user with user ID one (1), which is the user account you create when you install Drupal, is special: that user has permission to do absolutely everything on the site.

Other users on your site can be assigned permissions via roles. To do this, you first need to create a role, which you might call "Content editor" or "Member". Next, you will assign permissions to that role, to tell Drupal what that role can and can't do on the site. Finally, you will grant certain users on your site your new role, which will mean that when those users are logged in, Drupal will let them do the actions you gave that role permission to do.

You can also assign permissions for the special built-in roles of "anonymous user" (a user who is not logged in) and "authenticated user" (a user who is logged in, with no special role assignments). Drupal permissions are quite flexible -- you are allowed to assign permission for any task to any role, depending on the needs of your site.
[http://drupal.org/node/19828]

pwb.EDITOR

name::
* McsEngl.pwb.EDITOR@cptIt,
* McsEngl.web-editor@cptIt,

pwb.editor.COLLABORATIVE

name::
* McsEngl.pwb.editor.COLLABORATIVE@cptIt,

pwb.editor.ETHERPAD

_CREATED: {2012-02-12}

name::
* McsEngl.pwb.editor.ETHERPAD@cptIt,
* McsEngl.etherpad@cptIt580i,
* McsEngl.pgmWeb.Etherpad@cptIt,

_GENERIC:
* collaborative-editor,

_DESCRIPTION:
Etherpad (previously known as EtherPad[1][2]) is a web-based collaborative real-time editor, allowing authors to simultaneously edit a text document, and see all of the participants' edits in real-time, with the ability to display each author's text in their own color. There is also a chat box in the sidebar to allow meta communication.
First launched in November 2008, the software was acquired by Google in December 2009 and released as open source later that month. Several services now use the Etherpad software, including PiratePad, Telecomix Pad, Framapad, Mozilla Pad (MoPad), PrimaryPad, TypeWith.me, Sync.in, TitanPad and iEtherPad.com. Further development is coordinated by the Etherpad Foundation.
[http://en.wikipedia.org/wiki/Etherpad]

_Programming_language#cptIt248#
* Scala,

_ADDRESS.WPG:
* http://en.wikipedia.org/wiki/Etherpad,

pwb.Etherpad-lite

_CREATED: {2012-02-12}

name::
* McsEngl.pwb.Etherpad-lite@cptIt,
* McsEngl.eplite@cptIt580i,
* McsEngl.etherpad-lite@cptIt580i,

_GENERIC:
* collaborative-editor,

_DESCRIPTION:
Etherpad Lite is an almost complete rewrite of the original Etherpad software, based on different technical foundations and written by different authors. While the original Etherpad is written in Scala and has quite big system requirements, Etherpad Lite is written in server-side JavaScript using node.js. The original realtime synchronization library (called Easysync) remains the same.

At the moment, this new version is not on the par with the original Etherpad feature-wise. Etherpad Lite does, however, have some distinctive features which are not available in the original version:

An HTTP API which allows the user to interact with the pad contents, and with user and group management
A jQuery plugin exists which helps embedding the collaborative editor in other sites [17]
A PHP client which interfaces with the API [18]
A Python client which interfaces with the API [19]
A Ruby client which interfaces with the API [20]
A JavaScript client which interfaces with the API [21]
[http://en.wikipedia.org/wiki/Etherpad#Etherpad_Lite]

_ADDRESS.WPG:
* https://github.com/Pita/etherpad-lite//
* http://en.wikipedia.org/wiki/Etherpad#Etherpad_Lite,
* https://github.com/Pita/etherpad-lite/wiki/FAQ,
* https://github.com/Pita/etherpad-lite/wiki/HTTP-API,
* https://github.com/johnyma22/etherpad-lite-jquery-plugin,

eplite'Installation

name::
* McsEngl.eplite'Installation@cptIt,

Installation
Windows
Download http://etherpad.org/etherpad-lite-win.zip
Extract the file
Open the extracted folder and double click start.bat
Open your web browser and browse to http://localhost:9001. You like it? Look at the 'Next Steps' section below
[https://github.com/Pita/etherpad-lite/]

eplite'Programming-language#cptIt248#

name::
* McsEngl.eplite'Programming-language@cptIt,

Etherpad Lite is written in server-side JavaScript using node.js. The original realtime synchronization library (called Easysync) remains the same.
[http://en.wikipedia.org/wiki/Etherpad#Etherpad_Lite]

pwb.FILE-MANAGER#ql:pgmweb.file-manager -name.english#

name::
* McsEngl.pwb.FILE-MANAGER@cptIt,

pwb.Google-docs

_CREATED: {2011-10-15}

name::
* McsEngl.pwb.Google-docs@cptIt,
* McsEngl.conceptIt580.5,
* McsEngl.google-docs@cptIt580.5,

_DESCRIPTION:
Google Docs is a free, Web-based office suite, and data storage service offered by Google. It allows users to create and edit documents online while collaborating in real-time with other users. Google Docs combines the features of Writely and Spreadsheets with a presentation program incorporating technology designed by Tonic Systems. Data storage of files up to 1 GB total in size was introduced on January 13, 2011, documents created inside Google Docs do not count towards this quota.
[http://en.wikipedia.org/wiki/Google_docs]

gDocs'Limit-of-file-size

name::
* McsEngl.gDocs'Limit-of-file-size@cptIt,

Google Docs size limits
Docs you create and files you upload have some limits built in.

Documents: 1,024,000 characters, regardless of the number of pages or font size. Uploaded document files that are converted to Google documents format can’t be larger than 2MB.

Spreadsheets: 400,000 cells, with a maximum of 256 columns per sheet. Uploaded spreadsheet files that are converted to Google spreadsheets format can’t be larger than 20MB, and need to be under 400,000 cells and 256 columns per sheet.

More information about spreadsheet size limits
Presentations: Presentations created in Google Docs can be up to 10MB -- which is about 200 slides. Uploaded presentation files that are converted into Google presentations format can also be up to 10MB.

Drawings: We’ve never seen anyone make a drawing that was too big (but that’s not a dare).

Other files:

Files that you upload but don’t convert to Google Docs format can be up to 10GB each.

This upload limit is larger than the free storage space given to each Google Docs user. Every user is given 1GB of free storage space for files, and can purchase additional Google Docs storage to upload larger files.
[https://docs.google.com/support/bin/answer.py?hl=en&answer=37603] 2011-10-15

gDocs'Resource

name::
* McsEngl.gDocs'Resource@cptIt,

_SPECIFIC:
* http://code.google.com/apis/documents/docs/developers_guide.html,
* https://docs.google.com/support//

pwb.JAMWiki

name::
* McsEngl.pwb.JAMWiki@cptIt,
* McsEngl.conceptIt580.3,
* McsEngl.jamwiki@cptIt580.3,

_DESCRIPTION:
JAMWiki is a Java-based wiki engine that offers many of the features of MediaWiki. Setup is quick and easy with no external database required. The code can be run on almost any application server running Java 5 or greater and is licensed under the GNU Lesser General Public License (LGPL).
[http://jamwiki.org/wiki/en/Features]

jamwiki'Developing

name::
* McsEngl.jamwiki'Developing@cptIt,

jamwiki'Evolution

name::
* McsEngl.jamwiki'Evolution@cptIt,

{time.2011}:
JAMWiki 1.1.1 - Sep 28, 2011
JAMWiki 1.0.7 - Sep 13, 2011
JAMWiki 1.1 - Aug 30, 2011

jamwiki'Installing

name::
* McsEngl.jamwiki'Installing@cptIt,

1) install tomcat#ql:tomcat'installation# webserver.

2) download jamwiki.war and put it on: /tomcat/webapp

3) browser: localhost:8080/jamwiki/

4) database-postgress: put jdbc-driver on /tomcat/lib/

jamwiki'Configuring

name::
* McsEngl.jamwiki'Configuring@cptIt,

A web-based configuration interface allows very fine-grained customization of values ranging such as the default wiki topic, whether or not to allow Javascript tags, database connection settings, etc.
[http://jamwiki.org/wiki/en/FAQ#How_are_releases_numbered.3F]

jamwiki'Upgrading

name::
* McsEngl.jamwiki'Upgrading@cptIt,

jamwiki'Package

name::
* McsEngl.jamwiki'Package@cptIt,

_SPECIFIC:
Packages
org.jamwiki
org.jamwiki.authentication
org.jamwiki.db
org.jamwiki.mail
org.jamwiki.migrate
org.jamwiki.model
org.jamwiki.parser
org.jamwiki.parser.jflex
org.jamwiki.search
org.jamwiki.servlets
org.jamwiki.taglib
org.jamwiki.utils

jamwiki'Resource

name::
* McsEngl.jamwiki'Resource@cptIt,

_SPECIFIC:
* http://jamwiki.org/wiki//
* api: http://jamwiki.org/javadoc//

jamwiki'User-managment

name::
* McsEngl.jamwiki'User-managment@cptIt,

Is it possible to manage users with different permissions?
Permissions can be managed at the group level for anonymous users and logged-in users, and at the user level for individual users. Thus, it is possible to allow non-logged in users to view pages but prevent them from editing, or to allow only one or two trusted users to manage system settings. See the configuration guide for more information.
JAMWiki integrates with Spring Security, and thus supports LDAP, fine-grained access, and other capabilities via a configuration file.
[http://jamwiki.org/wiki/en/FAQ]

pwb.Joomla

_CREATED: {2012-01-30}

name::
* McsEngl.pwb.Joomla@cptIt,
* McsEngl.joomla@cptIt,

_DESCRIPTION:
Welcome to Joomla!, a leading open source Content Management System (CMS) platform. Joomla! is a well-tested, extensible and effective tool supported by a very active and friendly community of developers and users.
[http://docs.joomla.org/Beginners]
===
Developer(s)  The Joomla Project Team
Initial release  17 August 2005
Stable release  2.5.11 (LTS) / April 26, 2013; 43 days ago[1]
Preview release  3.1.1 / 26 April 2013; 43 days ago[2]
Development status  Active
Written in  PHP
Operating system  Cross-platform
Size  7.6 MB (compressed) 20.9 MB (uncompressed)
Type  Content management framework
License  GNU General Public License
Website  www.joomla.org
[http://en.wikipedia.org/wiki/Joomla]

joomla'Installation

name::
* McsEngl.joomla'Installation@cptIt,

_ADDRESS.WPG:
* http://docs.joomla.org/Installation,

joomla'Resource

name::
* McsEngl.joomla'Resource@cptIt,

_SPECIFIC:
* http://docs.joomla.org/Beginners,
* http://www.joomla.gr//
* http://docs.joomla.org/Getting_Started_with_Joomla!,
* http://help.joomla.org/ghop/feb2008/task048/joomla_15_quickstart.pdf,
* http://docs.joomla.org/Hands-on_editing_an_article:_Joomla!_1.6,
* http://docs.joomla.org/Hands-on_adding_a_new_article:_Joomla!_1.6,

joomla'Site

name::
* McsEngl.joomla'Site@cptIt,

_SPECIFIC:
* http://gym-koutsel.ioa.sch.gr//

gymKoutsel

_Administering:
* http://gym-koutsel.ioa.sch.gr/sch/administrator/

pwb.MAIL

name::
* McsEngl.pwb.MAIL@cptIt,
* McsEngl.web-mail@cptIt,

pwb.OFFLINE

name::
* McsEngl.pwb.OFFLINE@cptIt,

_ADDRESS.WPG:
* http://www.w3.org/TR/html5/browsers.html#offline,

_DESCRIPTION:
Application Cache API ("AppCache")
Internet Explorer 10 and Windows Store apps using JavaScript support the Application Cache API (or AppCache), as defined in the HTML5 specification, which allows you to create offline web applications. AppCache enables webpages to cache (or save) resources locally, including images, script libraries, style sheets, and so on. In addition, AppCache allows URLs to be served from cached content using standard Uniform Resource Identifier (URI) notation.
By using AppCache to save resources locally, you improve the performance of a webpage by reducing the number of requests made to the hosting server; you also enable offline access to cached resources.
To cache resources locally:
1.  Create a manifest file that defines the resources you want to save.
2.  Reference the manifest file in each webpage designed to use cached resources.
[https://msdn.microsoft.com/en-us/library/hh673545(v=vs.85).aspx]

pwb.ONLINE

name::
* McsEngl.pwb.ONLINE@cptIt,

pwb.Rich-internet-application

name::
* McsEngl.pwb.Rich-internet-application@cptIt,
* McsEngl.rich-internet-application@cptIt580i,

A Rich Internet Application (RIA) is a Web application that has many of the characteristics of desktop application software, typically delivered either by way of a site-specific browser, via a browser plug-in, independent sandboxes, extensive use of Javascript, or virtual machines.[1] Adobe Flash, JavaFX, and Microsoft Silverlight are currently the three most common platforms, with penetration rates around 99%, 80%, and 54% respectively (as of July 2010).[2] Although new Web standards have emerged, they still use the principles behind RIAs.
Users generally need to install a software framework using the computer's operating system before launching the application, which typically downloads, updates, verifies and executes the RIA.[3] This is the main differentiator from JavaScript-based alternatives like Ajax that use built-in browser functionality to implement comparable interfaces. As can be seen on the List of rich Internet application frameworks which includes even server-side frameworks, while some consider such interfaces to be RIAs, some consider them competitors to RIAs; and others, including Gartner, treat them as similar but separate technologies.[4]

RIAs dominate in online gaming as well as applications that require access to video capture (with the notable exception of Gmail, which uses its own task-specific browser plug-in).[5] Web standards such as HTML5 have developed and the compliance of Web browsers with those standards has improved somewhat. However, the need for plug-in based RIAs for accessing video capture and distribution has not diminished,[6] even with the emergence of HTML5 and JavaScript-based desktop-like widget sets that provide alternative solutions for mobile Web browsing.
[http://en.wikipedia.org/wiki/Internet_application]

_SPECIFIC:
* flash-application
* java-applet#cptItsoft1030#

pwb.SERVER-SIDE

name::
* McsEngl.pwb.SERVER-SIDE@cptIt,
* McsEngl.server-side-web-program@cptIt580i,

_DESCRIPTION:
Scripting languages are the most common server-side programs used for web sites, but it is also possible to run compiled programs.
Some of the scripting languages commonly used:
PHP
Perl
ASP
ASP.NET
Adobe ColdFusion
JSP
Ruby on Rails
Some of the compiling languages commonly used:
C
C++
C#
Java
VB
[http://en.wikipedia.org/wiki/Form_(web)]
===
Server Side Coding
ASP (Microsoft proprietary)
CSP, Server-Side ANSI C
ColdFusion (Adobe proprietary, formerly Macromedia, formerly Allaire)
CGI and/or Perl (open source)
Groovy (programming language) Grails (framework)
Java, e.g. Java EE or WebObjects
Lotus Domino
PHP (open source)
Python, e.g. Django (web framework) (open source)
Real Studio Web Edition
Ruby, e.g. Ruby on Rails (open source)
Smalltalk e.g. Seaside, AIDA/Web
SSJS Server-Side JavaScript, e.g. Aptana Jaxer, Mozilla Rhino
Websphere (IBM proprietary)
.NET and .NET MVC Frameworks (Microsoft proprietary)
[http://en.wikipedia.org/wiki/Web_development]

pwb.SMW-plus

_CREATED: {2012-01-20}

name::
* McsEngl.pwb.SMW-plus@cptIt,
* McsEngl.smwp@cptIt580i,
* McsEngl.smw-plus@cptIt580i,

_DESCRIPTION:
SMW+ is a semantic enterprise wiki that is distributed by ontoprise GmbH, Karlsruhe, Germany. SMW+ is well suited for organisations or teams dealing with complex and informal workflows. SMW+ offers a rich feature set to create, share, publish and re-use knowledge contained in wiki contents.
Ontoprise develops extensions to MediaWiki and carefully picks other useful extensions and, if having passed our rigorous quality assurance procedure, casts them into SMW+. Apart from a team work ontology, SMW+ includes Semantic MediaWiki, Halo Extension, Semantic Forms, a WYSIWYG editor and many more useful extensions.
[http://semanticweb.org/wiki/SMW%2B]

_ADDRESS.WPG:
* http://www.smwplus.com/index.php/Semantic_MediaWiki_Plus,
* http://semanticweb.org/wiki/SMW%2B,

_Feature:
Homepage: wiki.ontoprise.com
Demo: smwdemo.ontoprise.com
editing in Wiki-syntax, Forms, Point and click, WYSIWYG
is written in PHP
description and manual at smwforum.ontoprise.com
article showing enterprise applications and use cases at Business applications with SMW+, a Semantic Enterprise Wiki
ontoprise, others
Subject Attribution: current
Subject Granularity: document
Representation destinction: true
Terminology reuse: true
Object type: any
Context: false
Import RDF: true (import of OWL/RDF files)
Import RDFS: true (import of OWL/RDF files)
Export RDF: true
Class model: None
[http://semanticweb.org/wiki/SMW%2B]

smwp'Human

name::
* McsEngl.smwp'Human@cptIt,

Daniel Hansch:
* http://www.smwplus.com/index.php/Daniel,
* email: hansch@ontoprise.de,

pwb.WORDPRESS

_CREATED: {2017-10-24}

name::
* McsEngl.pwb.WORDPRESS@cptIt,
* McsEngl.wordpress@cptIt,

wdps'Resource

name::
* McsEngl.wdps'Resource@cptIt,

_ADDRESS.WPG:
* https://learn.wordpress.com/,

pwb.Yanel (Java/XML)

name::
* McsEngl.pwb.Yanel (Java/XML)@cptIt,

_DESCRIPTION:
Everything is content management (WCMS/Wiki, DMS, CRM, ECM, ERP, PIM/E-Mail, DRM, ...) and Yanel is a humble attempt to provide a solution for all your content management needs by offering an Open Source service oriented Content Management Framework written in Java.
[http://www.yanel.org/en/about.html]

yanel'Realm

name::
* McsEngl.yanel'Realm@cptIt,

A realm is a part of Yanel which has its own configuration and repository. This allows you to run several subsites (which are independent of one another) in a single Yanel instance. For example, each department in your company can have its own realm. This allows one department to use its database as a content repository and another to use the filesystem to provide the content to Yanel.
Realms can also be nested, which allows you to have a subsite within a subsite. Continuing with the department example, one department could have its public file-based website within its realm and access its database for internal use in a subrealm.
Realms are registered within the realms.xml configuration file.
[http://www.yanel.org/en/documentation/what-is-a-realm.html]

yanel'Resource

name::
* McsEngl.yanel'Resource@cptIt,

One could describe a resource as the atom of Yanel. Resources are responsible for processing requests and generating responses. Examples are

Node/File resource which helps to retrieve static content, for example images or PDF documents.
XML resource which helps to generate XHTML or generic XML pages by applying various XSLTs to some original XML
Calendar resource which helps to read/write calendars based on the ICS format (for example with Sunbird as a client)
The Yanel distribution (source and binary) contains many more examples, which can be reused or customized.

For complete customization, one can also create a resource from scratch very easily, whereas a resource from scratch doesn't do much in the first place. In order to actually get life into a from scratch resource one can implement various interfaces. In most cases one wants to implement the four basic functions called CRUD (Create, Read, Update and Delete).
[http://www.yanel.org/en/documentation/resources/what-is-a-resource-type.html]

web'widget

name::
* McsEngl.web'widget@cptIt,

_DESCRIPTION:
What are Widgets?
Standalone Web Apps
The word widget is used to mean many things, from a form control to a particular piece of interactive software in a larger application. A W3C Widget is specifically a packaged web application of any degree of complexity, from a simple form to a shared calendar to a game to a full-blown productivity application. W3C Widgets are made using the same technologies as regular applications, such as HTML, CSS, SVG, and Javascript, with all the resources packaged up in a zip file, to be run on your desktop or mobile device (or on a server), with all the same functionality that you expect from a webapp, including server access. When a user gives permission, Widgets also have access to local system resources, as well, just like a local application.
[http://www.w3.org/2008/webapps/]

web'probram.BROWSER#ql:browser@cptIt#

name::
* McsEngl.web'probram.BROWSER@cptIt,

web'program.SERVER

NAME

name::
* McsEngl.web'program.SERVER@cptIt,
* McsEngl.conceptIt572,
* McsEngl.webserver@cptIt,

* McsEngl.pgmNet.WEB-SERVER@cptIt,
* McsEngl.pgmWeb.WEB-SERVER@cptIt,
* McsEngl.web-server@cptIt572, {2007-12-31}
* McsEngl.webServer@cptIt572,
* McsEngl.www'server@cptIt572,
* McsEngl.wwwServer@cptIt572,
* McsEngl.server'in'www@cptIt572,
* McsEngl.wsr@cptIt, {2013-08-30}

DEFINITION

The term web server can mean one of two things:
1. A computer program that is responsible for accepting HTTP requests from clients, which are known as web browsers, and serving them HTTP responses along with optional data contents, which usually are web pages such as HTML documents and linked objects (images, etc.).
2. A computer that runs a computer program which provides the functionality described in the first sense of the term.
[http://en.wikipedia.org/wiki/Web_server]

wsrp'GENERIC

_GENERIC:
* program-web#cptItsoft580#

wsrp'Evolution#cptCore756#

name::
* McsEngl.wsrp'Evolution@cptIt,

wsrp'Computer

name::
* McsEngl.wsrp'Computer@cptIt,
* McsEngl.web-server-computer@cptIt572i,

_DEFINITION:
The term web server can mean one of two things:
1. A computer program that is responsible for accepting HTTP requests from clients, which are known as web browsers, and serving them HTTP responses along with optional data contents, which usually are web pages such as HTML documents and linked objects (images, etc.).
2. A computer that runs a computer program which provides the functionality described in the first sense of the term.
[http://en.wikipedia.org/wiki/Web_server]

QUANTITY:
Σήμερα υπάρχουν 10.000 servers
[COMPUTER GO, JAN. 1995, 74]

wsrp'Web-root

name::
* McsEngl.wsrp'Web-root@cptIt,
* McsEngl.web-root@cptIt572i,

The web root is the directory where you put all the html files that your web server makes publicly available.
[http://www.mediawiki.org/wiki/Manual:Short_URL]

SPECIFIC

wsrp.SPECIFIC-DIVISION.Use

name::
* McsEngl.wsrp.SPECIFIC-DIVISION.Use@cptIt,

Given below is a list of top Web server software vendors published in a Netcraft survey in December 2007.
Vendor  Product  WebSites Hosted  Percent
Apache  Apache  76,591,442  49.35%
Microsoft  IIS    55,502,886  35.76%
Google  GFE    8,555,391  5.51%
Oversee  Oversee  1,573,701  1.01%
lighttpd  lighttpd    1,521,250  0.98%
nginx  nginx    767,966  0.49%
Others  -    10,690,101  6.89%
Total  -    155,202,737  100.00%
[http://en.wikipedia.org/wiki/Web_server]

wsrp.APACHE

name::
* McsEngl.wsrp.APACHE@cptIt,
* McsEngl.conceptIt572.1,
* McsEngl.apache@cptIt572.1,
* McsEngl.apache-http-server@cptIt572.1,
* McsEngl.apache-web-server@cptIt572.1,

_DESCRIPTION:
The Apache HTTP Server, commonly referred to as Apache (/?'pζt?i?/), is web server software notable for playing a key role in the initial growth of the World Wide Web.[2] In 2009 it became the first web server software to surpass the 100 million website milestone.[3] Apache was the first viable alternative to the Netscape Communications Corporation web server (currently known as Oracle iPlanet Web Server), and has since evolved to rival other web servers in terms of functionality and performance. Typically Apache is run on a Unix-like operating system.[4]

Apache is developed and maintained by an open community of developers under the auspices of the Apache Software Foundation. The application is available for a wide variety of operating systems, including Unix, GNU, FreeBSD, Linux, Solaris, Novell NetWare, AmigaOS, Mac OS X, Microsoft Windows, OS/2, TPF, and eComStation. Released under the Apache License, Apache is open-source software.

Apache was originally based on NCSA HTTPd code. The NCSA code has since been removed from Apache, as part of a rewrite.

Since April 1996 Apache has been the most popular HTTP server software in use. As of May 2011 Apache was estimated to serve 63% of all websites and 66% of the million busiest.[5]
[http://en.wikipedia.org/wiki/Apache_HTTP_Server]

wsrapch'configuring

name::
* McsEngl.wsrapch'configuring@cptIt,

_httpd.conf:
\Program Files\Apache Software Foundation\Apache2.2\conf\httpd.conf

Save the Configuration File and Restart Apache
When you are satisfied with your changes, save the file - just use the "Save" item from the "File" menu or type Ctrl+S. After you make a configuration change, you need to restart Apache. To do this, go to the Start Menu and click the "Restart" item in the "Control Apache" folder, that is, select Start -> Programs -> Apache HTTP Server -> Control Apache Server -> Restart.

# Secure (SSL/TLS) connections
#Include conf/extra/httpd-ssl.conf

# Virtual hosts
#Include conf/extra/httpd-vhosts.conf

wsrapch'htaccess

name::
* McsEngl.wsrapch'htaccess@cptIt,
* McsEngl.htaccess@cptIt,
* McsEngl.htaccess-authentication@cptIt,
* McsEngl.htaccess-password-protection@cptIt,

_ADDRESS.WPG:
* http://www.elated.com/articles/password-protecting-your-pages-with-htaccess//

deny from all:
* hides the files.

_php_file_max:
php_value upload_max_filesize 100M
php_value post_max_size 200M
php_value memory_limit 320M
[http://extplorer.net/projects/extplorer/wiki/Large_uploads]

wsrapch'mime-types

name::
* McsEngl.wsrapch'mime-types@cptIt,
* McsEngl.mime-types.apache@cptIt,

_DESCRIPTION:
add them into the xampp\apache\conf\mime.types file using your text editor. Save the file then restart Apache.
[https://community.apachefriends.org/f/viewtopic.php?p=91676]
===
create a .htaccess file with the following text:

AddType application/wasm wasm

wsrapch'mod-rewrite

name::
* McsEngl.wsrapch'mod-rewrite@cptIt,
* McsEngl.apache'mod-rewrite@cptIt,

Things you can do with mod_rewrite
mod_rewrite lets you create all sorts of rules for manipulating URLs. For example, you can insert values pulled from the requested URL into the new URL, letting you rewrite URLs dynamically. Or you can check server variables such as the user agent (browser), and only rewrite a URL if the browser is, say, Safari running on an iPhone.

Here are some common uses of mod_rewrite:

Creating "friendly" URLs that map to "ugly" URLs. For example, you can map the nice-looking URL www.example.com/articles/my-article/ to the real URL at www.example.com/display_article.php?articleId=my-article. Then everyone can use the friendly URL instead of the real one.
Stopping image leeching/hotlinking. To stop other sites linking to your images in their pages, you can use mod_rewrite to send back a "Forbidden" error if the referring URL isn't on your own site.
Redirecting to canonical URLs. Many webpages can be accessed via several URLs — for example, www.example.com/mypage.html and example.com/mypage.html. You can use mod_rewrite to always redirect browsers to the "correct" URL, such as www.example.com/mypage.html. Amongst other things, this ensures that only the correct URL shows up in search results.
Avoiding 404 errors when reorganizing your site. Say you've redone your site and moved the page at www.example.com/myarticle.html to www.example.com/articles/myarticle.html. Using mod_rewrite, you can redirect www.example.com/myarticle.html to www.example.com/articles/myarticle.html so that visitors don't get 404 "not found" errors when visiting the old URL. Thanks to the flexibility of mod_rewrite, you can easily create generic rules that can map all old URLs to your new URL format.
[http://www.elated.com/articles/mod-rewrite-tutorial-for-absolute-beginners/]

wsrapch'Installation

name::
* McsEngl.wsrapch'Installation@cptIt,

Making Apache point to your files
Using Notepad open C:/Program Files/Apache Software Foundation/Apache2.2/conf/httpd.conf (in the start-menu there should also be a "Apache HTTP Server 2.2 > Configure Apache Server > Edit the Apache httpd.conf Configuration File" shortcut) and search for DocumentRoot. Change it from something like DocumentRoot "C:/Program Files/Apache Software Foundation/Apache2.2/htdocs" to the location where your HTML files and site are located. In my case: DocumentRoot "C:/public_html"
[http://www.ricocheting.com/how-to-install-on-windows/apache]

_UnInstall:
* run again installer.

XAMPP

name::
* McsEngl.XAMPP@cptIt,

_XAMPP:
XAMPP is a very easy to install Apache Distribution for Linux, Solaris, Windows and Mac OS X. The package includes the Apache web server, MySQL, PHP, Perl, a FTP server and phpMyAdmin.

_TROUBLSHOOTING:
* xampp-control.ini does not save
- go xamp-control.exe / properties/ run as administrator

wsrapch'upgrading

name::
* McsEngl.wsrapch'upgrading@cptIt,

1. remove previous (leaves conf)

2. install new.
set servername: localhost
set email.

wsrapch'installing-certificate

name::
* McsEngl.wsrapch'installing-certificate@cptIt,

_ADDRESS.WPG:
* http://www.sslshopper.com/article-how-to-create-and-install-an-apache-self-signed-certificate.html,

wsrapch'Programming-language

name::
* McsEngl.wsrapch'Programming-language@cptIt,

_SPECIFIC:
* C

wsrapch'Resource

name::
* McsEngl.wsrapch'Resource@cptIt,

_SPECIFIC:
* installation: http://www.ricocheting.com/how-to-install-on-windows/apache,
* docs: http://httpd.apache.org/docs/2.0//
* faq: http://wiki.apache.org/httpd/FAQ,
* http://www.elated.com/articles/mod-rewrite-tutorial-for-absolute-beginners//

wsrapch'security

name::
* McsEngl.wsrapch'security@cptIt,

Apache usually blocks access to files starting with .ht
[http://www.elated.com/articles/password-protecting-your-pages-with-htaccess/]

Disable any unnecessary modules

Apache typically comes with several modules installed. Go through the apache module documentation and learn
what each module you have enabled actually does. Many times you will find that you don't need to have the said module enabled.

Look for lines in your httpd.conf that contain LoadModule. To disable the module you can typically just add a# at the beginning of the line.
[http://www.apachelounge.com/viewtopic.php?p=9549]

Ensure that files outside the web root are not served

We don't want apache to be able to access any files out side of its web root.
So assuming all your web sites are placed under one directory (we will call this
C:/apache2/htdocs), you would set it up as follows:

Code:

<Directory />
Order Deny,Allow
Deny from all
Options None
AllowOverride None
</Directory>
<Directory C:/apache2/htdocs>
Order Allow,Deny
Allow from all
</Directory>


Note that because we set Options None and AllowOverride None this will turn off all options and overrides for the server.
You now have to add them explicitly for each directory that requires an Option or Override
[http://www.apachelounge.com/viewtopic.php?p=9549]

wsrapch'localhost-security

name::
* McsEngl.wsrapch'localhost-security@cptIt,
* McsEngl.apache'localhost-security@cptIt,
* McsEngl.apache'localhost-https@cptIt,

_ADDRESS.WPG:
* http://rubayathasan.com/tutorial/apache-ssl-on-windows//
* http://stackoverflow.com/questions/4221874/how-do-i-create-https-for-localhost-apache,

Hide the Apache Version number; and other sensitive information

here are two directives that you need to add, or edit in your httpd.conf file:
Code:

ServerSignature Off
ServerTokens Prod


The ServerSignature appears on the bottom of pages generated by apache such as 404 pages, directory listings, etc.

The ServerTokens directive is used to determine what Apache will put in the Server HTTP response header. By setting
it to Prod it sets the HTTP response header as follows:

Code:
Server: Apache

If you're super paranoid you could change this to something other than "Apache" by editing the source code, or by using mod_security
[http://www.apachelounge.com/viewtopic.php?p=9549]

Restricting Access by IP

If you have a resource that should only by accessed by a certain network, or IP address you can enforce this in your apache configuration. For instance if you want to restrict access to your intranet to allow only the 192.168 network:

Code:

Order Deny,Allow
Deny from all
Allow from 192.18.0.0/16


or by IP

Code:

Order Deny,Allow
Deny from all
Allow from 127.0.0.1 192.168
[http://www.apachelounge.com/viewtopic.php?p=9549]

Turn off CGI execution

If you're not using CGI turn it off with the Options directive inside a Directory tag. Set Options to either [color=green]None or -ExecCGI

Code:
Options -ExecCGI
[http://www.apachelounge.com/viewtopic.php?p=9549]

turn off directory browsing

You can do this with an Options directive inside a Directory tag. Set Options to either None or -Indexes

Code:
Options -Indexes
[http://www.apachelounge.com/viewtopic.php?p=9549]

Turning off multiple Options

Now combine all stuff!

shortest

Code:
Options None


or

Code:
Options -ExecCGI -Includes -Indexes
[http://www.apachelounge.com/viewtopic.php?p=9549]

Turn off server side includes

This is also done with the Options directive inside a Directory tag. Set Options to either None or -Includes

Code:
Options -Includes
[http://www.apachelounge.com/viewtopic.php?p=9549]

Turn off support for .htaccess files

name::
* McsEngl.Turn off support for .htaccess files@cptIt,

This is done in a Directory tag but with the AllowOverride directive. Set it to None.

Code:
AllowOverride None
[http://www.apachelounge.com/viewtopic.php?p=9549]

wsrapch'server-side-includes

name::
* McsEngl.wsrapch'server-side-includes@cptIt,
* McsEngl.server-side-includes@cptIt,
* McsEngl.SSI@cptIt,
* McsEngl.apache'ssi@cptIt,

_DESCRIPTION:
Server Side Includes (SSI) Primer
by Christopher Heng, thesitewizard.com
If you look at the pages on thesitewizard.com, you'll probably notice that there are a lot of text on each page common with the other pages (such as the logo, the navigation bar, the quick menu, etc). Maintaining so many pages with common code or text can be quite a pain when you want to change it. This is where having Server Side Includes (or SSI) on your web server comes in useful.

Server Side Includes (SSI) are especially useful and most commonly used when:

you have a lot of common text or code on each of your pages (such as your navigation menu) that you would like to remove and place in a separate file for ease of maintenance.
you want to embed the output HTML code of a CGI script (such as a banner rotation CGI script) in your web pages.
Who is this Guide For?
This is a primer designed for those who want to get started with using SSI for the common tasks listed above. It is by no means an exhaustive guide on SSI - I have omitted SSI facilities like setting environment variables, printing the date, etc, in order to focus on the most common use of SSI listed above.

To benefit from this tutorial, you should also know how to create a web page and how to add raw HTML code into that page.

What You Need
Before you can use the methods given below, your web host must be an Apache server with Server Side Includes (SSI) enabled. You can probably find such information from your web host's documentation. In most cases, your website will probably be hosted on a Unix server (or one of its many clones like Linux or FreeBSD) and not Win2K/XP.

How to Include the Contents of Another File
There are a number of reasons why you might want to insert the contents of a file into your web page. As mentioned earlier, one reason may be that you want to put the code or text that is common to all your pages (like your navigation bar) in a single location. That way, when you want to update your (say) navigation menu, you only need to change one file and it will automatically be reflected on all your pages.

To include a file named, say, "commoncode.txt", into a page on your site, simply insert the following line in the web page at the place where you want the contents of commoncode.txt:

<!--#include virtual="commoncode.txt" -->
Note that there are no spaces between "<!--" and the "#include" directive.

If you place your file in a subdirectory somewhere, you can use the usual relative path. For example, if your commoncode.txt file is placed in a subdirectory called "common", then your SSI directive will look like the following:

<!--#include virtual="common/commoncode.txt" -->
Note that the directory separator is the forward slash, "/", as in all Unix systems and not the backslash that you may be accustomed to if you come from the Windows world.

You can put anything you like in the commoncode.txt file that you want inserted into your web page at that point. The SSI directive makes it seem as though your web page contained the entire contents of the included file at the location you put the directive. The entire process is transparent to the visitor who visits your site.

Including the Output of a CGI Script
Sometimes you want to insert the output of a CGI or PHP script into your web page. You might want to do this if, for example, you were running a banner rotation script that generates a different set of HTML code on each invocation.

If your script has the name "banner.cgi" and it is located in your website's cgi-bin subdirectory, the SSI directive would look like the following:

<!--#exec cgi="/cgi-bin/banner.cgi" -->
Some web hosts allow you to execute any program on the server and include its output on your page. If so, and you wish to run (say) the "/bin/ls" command, you would put a directive like the following:

<!--#exec cmd="/bin/ls" -->
You will naturally have to use the correct path for that particular program before it will work as desired.

File Names
Most web hosts that support SSI directives require that the web pages that use them have a ".shtml" extension. This is because SSI processing takes up processor time and the web host does not want their machine to slowed down by having the web server check every single HTML file for SSI directives. As such, if you want your web page's SSI directives to work, you will need to rename it with the appropriate extension. Check with your web host what this extension is (usually ".shtml").

Some free web hosts parse SSI directives for every single HTML file their server delivers, including ".html" files. Even so, you may still want to consider using the ".shtml" extension for new files so that you can easily move to a commercial host in future without the headache of having to rename your files and updating all the links to those pages.

Planning Ahead
Even if you think you do not need to use Server Side Includes (SSI) on your site now, I suggest that you plan ahead.

Take a look at your web site. Is it a site that is likely to expand in number of pages? If you're selling a product and have the product description on its own page, does it seem likely that you will be selling more products in the future? If so, you should start using SSI on your site, even though at this point in time, you probably feel it is unnecessary. You'll think differently once your site expands, and you have to update a few hundred pages each time something changes. At that time, changing your pages to a ".shtml" extension and replacing blocks of common code with SSI directives in all your pages will be much more of a hassle than when your site is smaller.

Copyright 2000-2002 by Christopher Heng. All rights reserved.
Get more free tips and articles like this, on web design, promotion, revenue and scripting, from http://www.thesitewizard.com/
[http://www.thesitewizard.com/archive/ssiprimer.shtml]

wsrapch'version

name::
* McsEngl.wsrapch'version@cptIt,

2.4.6 (released 2013-07-22)
Stable Release - Latest Version:

2.2.25 (released 2013-07-09)
Legacy Release - 2.2 Branch:

2.2.21: mypc

wsrp.Jetty

name::
* McsEngl.wsrp.Jetty@cptIt,
* McsEngl.conceptIt572.2,

=== _NOTES: Jetty is a pure Java-based HTTP client/server, WebSocket client/server and servlet container (Application server) developed as a free and open source project as part of the Eclipse Foundation. It is currently used in products such as ActiveMQ,[1] Alfresco, [2] Apache Geronimo,[3] Apache Maven, Google App Engine,[4] Eclipse,[5] FUSE,[6] HP OpenView, JBoss,[7] Liferay,[8] Ubuntu, Twitter's Streaming API[9] and Zimbra.[10] Jetty is also used as a standard Java application server by many open source projects such as Eucalyptus and Hadoop.[citation needed]
[http://en.wikipedia.org/wiki/Jetty_(Web_server)]

wsrp.LIGHTWEIGHT

name::
* McsEngl.wsrp.LIGHTWEIGHT@cptIt,

Lightweight web servers are Web servers which have been designed to run with very small resource overhead because of hardware, environment, or simply for the challenge of it.
[http://en.wikipedia.org/wiki/Tiny_web_servers]

wsrp.LOCALHOST

name::
* McsEngl.wsrp.LOCALHOST@cptIt,
* McsEngl.localhost@cptIt,

_DESCRIPTION:
In computer networking, localhost is a hostname that means this computer. It is used to access the network services that are running on the host via its loopback network interface. Using the loopback interface bypasses any local network interface hardware.
The local loopback mechanism is useful for testing software during development, independently of any networking configurations. For example, loopback may be used to direct a locally running web browser to http://localhost to display a local html file.
On most computer systems, localhost resolves to the IP address 127.0.0.1, which is the most commonly used IPv4 loopback address, and to the IPv6 loopback address ::1.[1]
The name localhost is also a reserved top-level domain name, set aside to avoid confusion with the definition as a hostname.[2] The IETF standards restrict domain name registrars from assigning the name localhost in registration procedures, such as for second-level domains.
[https://en.wikipedia.org/wiki/Localhost] {2016-11-12}
===
localhost:4001
means on port 4001

wsrp.Tomcat

_CREATED: {2011-09-11}

name::
* McsEngl.wsrp.Tomcat@cptIt,
* McsEngl.apache-tomcat@cptIt572i,
* McsEngl.tomcat@cptIt572i,

_DESCRIPTION:
Apache Tomcat (or Jakarta Tomcat or simply Tomcat) is an open source servlet container developed by the Apache Software Foundation (ASF). Tomcat implements the Java Servlet and the JavaServer Pages (JSP) specifications from Oracle Corporation, and provides a "pure Java" HTTP web server environment for Java code to run.
Tomcat should not be confused with the Apache web server, which is a C implementation of an HTTP web server; these two web servers are not bundled together, although they are frequently used together as part of a server application stack. Apache Tomcat includes tools for configuration and management, but can also be configured by editing XML configuration files.
[http://en.wikipedia.org/wiki/Apache_Tomcat] 2011-09-11

tomcat'Evolution

name::
* McsEngl.tomcat'Evolution@cptIt,

_2011-09-27:
Version 7.0.22, Sep 27 2011

tomcat'Installation

name::
* McsEngl.tomcat'Installation@cptIt,

(1) Download and Install the Java SE Runtime Environment (JRE)

(2) Download and Install the Tomcat Binary Distribution
- unzip the file.

(3) Start Up Tomcat

(3.1) Tomcat can be started by executing the following commands:
$CATALINA_HOME\bin\startup.bat (Windows)
$CATALINA_HOME/bin/startup.sh (Unix)

(3.2) After startup, the default web applications included with Tomcat will be
available by visiting:
http://localhost:8080/

(4) Shut Down Tomcat

(4.1) Tomcat can be shut down by executing the following command:
$CATALINA_HOME\bin\shutdown (Windows)
$CATALINA_HOME/bin/shutdown.sh (Unix)

tomcat'Resource

name::
* McsEngl.tomcat'Resource@cptIt,

_SPECIFIC:
* http://tomcat.apache.org//
* docs: http://tomcat.apache.org/tomcat-7.0-doc/index.html,

web'resourceInfHmn#cptResource843#

name::
* McsEngl.web'resourceInfHmn@cptIt,
* McsEngl.web'resource@cptIt,

_DESCRIPTION:
What is the Internet backbone? What's a browser cookie? Are ActiveX and Java the same thing? What is an intranet? What, really, is "push"? We've prepared a list of the 20 most popular questions about the Web--and the corresponding answers--to help you understand the basic principles of the Internet:
http://www.cnet.com/Content/Features/Techno/Networks/?dd

_ADDRESS.WPG:
* https://developer.mozilla.org/en-US/docs/Web/Guide,
* http://alistapart.com/about,

web'security

name::
* McsEngl.web'security@cptIt,

_ADDRESS.WPG:
* http://www.acunetix.com/blog//

web'Service

_CREATED: {2011-08-24}

name::
* McsEngl.web'Service@cptIt,
* McsEngl.conceptIt19.3,
* McsEngl.web-service@cptIt19.3, {2011-09-10}
* McsEngl.web-services@cptIt19.3, {2011-09-10}

_DESCRIPTION:
Any application can have a Web Service component.
Web Services can be created regardless of programming language.
[http://www.w3schools.com/webservices/ws_example.asp]
===
A Web service is a method of communication between two electronic devices over a network.
The W3C defines a "Web service" as "a software system designed to support interoperable machine-to-machine interaction over a network. It has an interface described in a machine-processable format (specifically Web Services Description Language WSDL). Other systems interact with the Web service in a manner prescribed by its description using SOAP messages, typically conveyed using HTTP with an XML serialization in conjunction with other Web-related standards."[1]
The W3C also states, "We can identify two major classes of Web services, REST-compliant Web services, in which the primary purpose of the service is to manipulate XML representations of Web resources using a uniform set of "stateless" operations; and arbitrary Web services, in which the service may expose an arbitrary set of operations."[2]
[http://en.wikipedia.org/wiki/Web_service]
===
What are Web Services?

Web services are application components
Web services communicate using open protocols
Web services are self-contained and self-describing
Web services can be discovered using UDDI
Web services can be used by other applications
XML is the basis for Web services
[http://www.w3schools.com/webservices/ws_intro.asp] 2011-09-10

GraphQL-service

_CREATED: {2015-2012}

name::
* McsEngl.GraphQL-service@cptIt,
* McsEngl.GraphQL-service@cptIt,
* McsEngl.gqls@cptIt,

_DESCRIPTION:
GraphQL is a query language for your API, and a server-side runtime for executing queries by using a type system you define for your data. GraphQL isn't tied to any specific database or storage engine and is instead backed by your existing code and data.
A GraphQL service is created by defining types and fields on those types, then providing functions for each field on each type.
[http://graphql.org/learn/]

gqls'Query

name::
* McsEngl.gqls'Query@cptIt,

_DESCRIPTION:
If you've seen a GraphQL query before, you know that the GraphQL query language is basically about selecting fields on objects.
[http://graphql.org/learn/schema/]

gqls'Query-language

name::
* McsEngl.gqls'Query-language@cptIt,
* McsEngl.QraphQL@cptIt,

_DESCRIPTION:
GraphQL is a querying language developed by Facebook over the course of several years. In essence, you construct your request by defining the resources you want. You send this via a POST to a server, and the response matches the format of your request.
[http://githubengineering.com/the-github-graphql-api/#the-switch]
===
GraphQL[1] is a data query language developed internally by Facebook in 2012 before being publicly released in 2015.[2] It provides an alternate to REST and ad-hoc webservice architectures.[1]
[https://en.wikipedia.org/wiki/GraphQL]

gqls'Resource

name::
* McsEngl.gqls'Resource@cptIt,

_ADDRESS.WPG:
* https://dev.to/reactiveconf/why-i-believe-graphql-will-come-to-replace-rest, Martijn Walraven Oct 04, 2016,
* http://githubengineering.com/the-github-graphql-api//
* https://github.com/graphql/graphql-js,

gqls'Result

name::
* McsEngl.gqls'Result@cptIt,

_DESCRIPTION:
After being validated, a GraphQL query is executed by a GraphQL server which returns a result that mirrors the shape of the requested query, typically as JSON.
[http://graphql.org/learn/execution/]

gqls'Server

name::
* McsEngl.gqls'Server@cptIt,

REST {2000}

name::
* McsEngl.REST@cptIt19i,
* McsEngl.RESTful-web-service@cptIt,

_DESCRIPTION:
Representational state transfer (REST) or RESTful web services are one way of providing interoperability between computer systems on the internet. REST-compliant web services allow requesting systems to access and manipulate textual representations of web resources using a uniform and predefined set of stateless operations. Other forms of web service exist, which expose their own arbitrary sets of operations such as via WSDL and SOAP.[1] 'Web resources' were first defined on the World Wide Web as documents or files identified by their URLs, but today they have a much more generic and abstract definition encompassing every 'thing' or entity that can be identified, named, addressed or handled, in any way whatsoever, in the web.
In a REST web service, requests made to a resource's URI will elicit a response that may be in XML, HTML, JSON or some other defined format.
The response may confirm that some alteration has been made to the stored resource, and it may provide hypertext links to other related resources or collections of resources.
Using HTTP, as is most common, the kind of operations available include those predefined by the HTTP verbs GET, POST, PUT, DELETE and so on. By making use of a stateless protocol and standard operations REST systems aim for fast performance, reliability, and the ability to grow, by using reusable components that can be managed and updated without affecting the system as a whole, even while it is running.
The term representational state transfer was introduced and defined in 2000 by Roy Fielding in his doctoral dissertation.[2][3] Fielding used REST to design HTTP 1.1 and Uniform Resource Identifiers (URI).[4][5][6] The term is intended to evoke an image of how a well-designed web application behaves: It is a network of web resources (a virtual state-machine) where the user progresses through the application by selecting links, such as /user/tom, and operations such as GET or DELETE (state transitions), resulting in the next resource (representing the next state of the application) being transferred to the user for their use.
[https://en.wikipedia.org/wiki/Representational_state_transfer] {2016-10-11}
===
Representational State Transfer (REST) is a style of software architecture for distributed hypermedia systems such as the World Wide Web. The term Representational State Transfer was introduced and defined in 2000 by Roy Fielding in his doctoral dissertation.[1][2] Fielding is one of the principal authors of the Hypertext Transfer Protocol (HTTP) specification versions 1.0 and 1.1.[3][4]
Conforming to the REST constraints is referred to as being "RESTful".[5]
[http://en.wikipedia.org/wiki/Representational_State_Transfer]

SOAP

name::
* McsEngl.SOAP@cptIt19i,

_Ddescription:
What is SOAP?
SOAP is an XML-based protocol to let applications exchange information over HTTP.
Or more simple: SOAP is a protocol for accessing a Web Service.

SOAP stands for Simple Object Access Protocol
SOAP is a communication protocol
SOAP is a format for sending messages
SOAP is designed to communicate via Internet
SOAP is platform independent
SOAP is language independent
SOAP is based on XML
SOAP is simple and extensible
SOAP allows you to get around firewalls
SOAP is a W3C standard
[http://www.w3schools.com/webservices/ws_platform.asp] 2011-09-10
===
SOAP, originally defined as Simple Object Access Protocol, is a protocol specification for exchanging structured information in the implementation of Web Services in computer networks. It relies on Extensible Markup Language (XML) for its message format, and usually relies on other Application Layer protocols, most notably Remote Procedure Call (RPC) and Hypertext Transfer Protocol (HTTP), for message negotiation and transmission. SOAP can form the foundation layer of a web services protocol stack, providing a basic messaging framework upon which web services can be built. This XML based protocol consists of three parts: an envelope, which defines what is in the message and how to process it, a set of encoding rules for expressing instances of application-defined datatypes, and a convention for representing procedure calls and responses.

As an example of how SOAP procedures can be used, a SOAP message could be sent to a web-service-enabled web site such as a real-estate price database, with the parameters needed for a search. The site would then return an XML-formatted document with the resulting data, e.g., prices, location, features. With the data being returned in a standardized machine-parseable format, it can then be integrated directly into a third-party web site or application.

The SOAP architecture consists of several layers of specifications: for message format, Message Exchange Patterns (MEP), underlying transport protocol bindings, message processing models, and protocol extensibility. SOAP is the successor of XML-RPC, though it borrows its transport and interaction neutrality and the envelope/header/body from elsewhere (probably from WDDX).[speculation?]
[http://en.wikipedia.org/wiki/SOAP]
===
SOAP provides a basic messaging framework for Web services to exchange messages. SOAP defines an XML-based format for the specification of structured and typed messages that can be exchanged by Web services (also called SOAP endpoints) in a distributed environment. The message exchange mechanism is primarily one-way, although more complex mechanisms can be easily built on top of it. In addition, SOAP provides a way to describe the actions that an endpoint must take on receiving a particular SOAP message.
SOAP constitutes a basic building block for Web services and is therefore a common foundation for several Web services standards, in particular WSDL. The OWL-S Grounding supports SOAP message exchange between Web services by using WSDL to specify the format of the messages exchanged between Web services.
[http://www.daml.org/services/owl-s/1.1/related.html]

Web-API

name::
* McsEngl.web-api@cptIt19i,

A web API (Application Programming Interface) is typically a defined set of HTTP request messages along with a definition of the structure of response messages, typically expressed in JSON or XML. While "web API" is sometimes considered a synonym for web service, the Web 2.0 applications typically have moved away from SOAP based web services towards more direct REST style communications[1]. Web APIs allow the combination of multiple services into new applications known as mashups [2].
[http://en.wikipedia.org/wiki/Web_API]

Web API is a development in Web services (in a movement called Web 2.0) where emphasis has been moving away from SOAP based services towards Representational State Transfer (REST) based communications.[3] REST services do not require XML, SOAP, or WSDL service-API definitions.

Web APIs allow the combination of multiple Web services into new applications known as mashups.[4]

When used in the context of Web development, Web API is typically a defined set of Hypertext Transfer Protocol (HTTP) request messages along with a definition of the structure of response messages, usually expressed in an Extensible Markup Language (XML) or JavaScript Object Notation (JSON) format.

When running composite Web services, each sub service can be considered autonomous. The user has no control over these services. Also the Web services themselves are not reliable; the service provider may remove, change or update their services without giving notice to users. The reliability and fault tolerance is not well supported; faults may happen during the execution. Exception handling in the context of Web services is still an open research issue, although this can still be handled by responding with an error object to the client.
[http://en.wikipedia.org/wiki/Web_service]

WSDL

name::
* McsEngl.WSDL@cptIt19i,

The Web Services Description Language (WSDL, pronounced 'wiz-dul') is an XML-based language that is used for describing the functionality offered by a Web service. A WSDL description of a web service (also referred to as a WSDL file) provides a machine-readable description of how the service can be called, what parameters it expects and what data structures it returns. It thus serves a roughly similar purpose as a Method signature in a programming language.

The meaning of the acronym has changed from version 1.1 where the D stood for Definition.
[http://en.wikipedia.org/wiki/Web_Services_Description_Language]

web'Webpage

name::
* McsEngl.web'Webpage@cptIt,

web'Website

name::
* McsEngl.web'Website@cptIt,
* McsEngl.conceptIt19.6,
* McsEngl.site@cptIt19i, {2011-10-13}
* McsEngl.web-site@cptIt19i, {2008-01-03}
* McsEngl.website@cptIt19.6,
* McsEngl.wbs@cptIt, (like wbp) {2017-07-08}
* McsEngl.wst@cptIt, {2016-01-11} (like wpg) {2013-11-11}
* McsEngl.www@cptIt, {2015-11-24}
* McsEngl.wbst@cptIt, {2013-08-30}
====== lagoGreek:
* McsElln.ιστότοπος@cptIt,
* McsElln.ιστοxώρος@cptIt,

_GENERIC:
* resource.information.human#cptResource843#

_DEFINITION:
A website (alternatively, web site or Web site) is a collection of Web pages, images, videos or other digital assets that is hosted on one or several Web server(s), usually accessible via the Internet, cell phone or a LAN.

A Web page is a document, typically written in HTML, that is almost always accessible via HTTP, a protocol that transfers information from the Web server to display in the user's Web browser.

All publicly accessible websites are seen collectively as constituting the "World Wide Web".

The pages of websites can usually be accessed from a common root URL called the homepage, and usually reside on the same physical server. The URLs of the pages organize them into a hierarchy, although the hyperlinks between them control how the reader perceives the overall structure and how the traffic flows between the different parts of the sites.

Some websites require a subscription to access some or all of their content. Examples of subscription sites include many business sites, parts of many news sites, academic journal sites, gaming sites, message boards, Web-based e-mail, services, social networking website, and sites providing real-time stock market data.
[http://en.wikipedia.org/wiki/Web_site]

website'whole.OWNER

name::
* McsEngl.website'whole.OWNER@cptIt,

website'part.webpage#ql:webpage-19i#

name::
* McsEngl.website'part.webpage@cptIt,

website'address

name::
* McsEngl.website'address@cptIt,

website'hosting#cptIt19.5#

name::
* McsEngl.website'hosting@cptIt,

website'Resource

name::
* McsEngl.website'Resource@cptIt,

_ADDRESS.WPG:
* http://www.nooz.gr/world/tramp-katoxos-sites-pou-ton-vrizoun,

website'system#cptIt223#

name::
* McsEngl.website'system@cptIt,

website'webpage#ql:webpage@cptIt*#

name::
* McsEngl.website'webpage@cptIt,

_SPECIFIC:
Web is the internet-service that uses the protocol http, then we have specific information communication services:
* chat##
* email##
* file-shearing##
* info-retreival##
* searching
* shopping

website'doing.CREATING

name::
* McsEngl.website'doing.CREATING@cptIt,

_ADDRESS.WPG:
* http://pythonhow.com/building-a-website-with-python-flask,

SPECIFIC

name::
* McsEngl.website.specific@cptIt,

_SPECIFIC:
* geography-website#cptIt19.7#
* synagonism.net#cptItsoft67.4#
* wikipedia,

website.MOBILE

name::
* McsEngl.website.MOBILE@cptIt,

_ADDRESS.WPG:
* https://developers.google.com/webmasters/mobile-sites/get-started//

website.EVOLUTING

name::
* McsEngl.website.EVOLUTING@cptIt,

website.SYNAGONISM.NET

name::
* McsEngl.website.SYNAGONISM.NET@cptIt,
* McsEngl.conceptIt67.4,
* McsEngl.sgm@cptIt, {2013-07-30}
* McsEngl.sgm-website@cptIt,
* McsEngl.sgmwbs@cptIt, {2017-03-21}
* McsEngl.sngm-website@cptIt,
* McsEngl.synagonism-site@cptIt,
* McsEngl.synagonism.net-website@cptIt,
* McsEngl.synagonism.net@cptIt,
* McsEngl.wbsSgm@cptIt, {2013-07-29}
* McsEngl.wst.synagonism.net@cptIt,
* McsEngl.wsSngm@cptIt,

* McsElln.ιστότοπος-υπερ-του-συναγωνισμού@cptIt,
* McsElln.συναγωνισμός-ιστότοπος@cptIt,

* McsElln.συνεργασία-ιστότοπος@cptIt,
* McsElln.συνεργατικό-ιστότοπος@cptIt,
* McsEngl.cooperative-website@cptIt,

* McsEngl.synergism-website@cptIt,

=== _NOTES: synergy /'si-ne-rji/
noun
the interaction or cooperation of two or more organizations, substances, or other agents to produce a combined effect greater than the sum of their separate effects.
"the synergy between artist and record company"
[google dic]

_IP:
* 185.4.133.39,
* http://synagonism.net.185-4-133-39.linuxzone33.grserver.gr/

_GOOGLE_SEARCH.synagonism.net:
* 2013-06-19: 2130,

_TODO:

COPYRIGHT:
All information in this site is FREE under ...
in other words, do it whatever you want with this information, but mention my name in respect of the INFINITE hours I spend on them.

sgm'counter

name::
* McsEngl.sgm'counter@cptIt,

Visitor Counter - Perl CGI Scripts

   Visitor Counter v2.5              

The handy and very simple text-based counter for intended calculating the number of visitors to a page. One script (counter.cgi) can be applied to many pages of site. The information on visits is kept in a simple textual database.
Demonstration:
This page was visited: 158 times since July 28, 1999.

How to use ?
Just add the following server side include onto any of your pages, on which you would like to calculate the traffic statistics <!--#include virtual="cgi-bin/counter.cgi" -->
Very simple, isn't ? ;-)

Install instruction:
1. Copy counter.cgi and counter.txt files onto your cgi-bin directory.
2. Set attributes to counter.cgi file as executable (chmod 755).
3. Set attributes to counter.txt file as 'read-write' (chmod 666).

Support: Perl CGI Help message board.

License: Freeware
Last updated: July 26, 1999
Requirements: Unix or Windows, CGI permission with Perl5, SSI
Download: counter.zip - 1 Kb
[http://www.utilmind.com/scripts/visitorcounter.html]

sgm'evaluation

name::
* McsEngl.sgm'evaluation@cptIt,

http://www.alexa.com/:
* 2013-12-02:
Global Rank 21,572,509 ^~20,924,359
* 2013-09-25:
Global rank 880,914 ^922,133
Rank in Greece 20,521
* 2013-08-13:
Alexa Traffic Rank: 775,735 Greece Flag Traffic Rank in GR: 5,803
link-icon Sites Linking In: 30
* 2013-07-24:
Alexa Traffic Rank: 994,499 Greece Flag Traffic Rank in GR: 6,581
link-icon Sites Linking In: 23
* 2013-07-14:
Alexa Traffic Rank: 1,191,887 Traffic Rank in GR: 5,673
Sites Linking In: 20
* 2013-07-03:
Alexa Traffic Rank: 1,458,429 Traffic Rank in GR: 5,787
Sites Linking In: 14

sgm'disqus

name::
* McsEngl.sgm'disqus@cptIt,

nnnHknm

disqus_identifier = 'wvwKeynes1936Gteim';
var disqus_title = 'wvw.keynes.1936.gteim';
var disqus_url = 'http://synagonism.net/book/economy/keynes.1936.general-theory.html';
* 'book2015Ppm'; 'book.2015.2015';
* crxToc
* hitp
* home
* 'wvwEduMyschool'; 'wvw.edu.myschool';
* 'wvwEduGymIfs007'; 'wvw.gym.informatics';

sgm'file

name::
* McsEngl.sgm'file@cptIt,

sgm'file.IMAGE

name::
* McsEngl.sgm'file.IMAGE@cptIt,

_SPECIFIC:
* sgm'file.img.sound: http://synagonism.net/worldview/edu/gym.informatics.2007.files/sound.png,

sgm'google-ads

name::
* McsEngl.sgm'google-ads@cptIt,

_DOING:
1) https://www.google.com/adsense/app#home ===> my ads
get code and add to page

sgm'host

name::
* McsEngl.sgm'host@cptIt,

_HOST:
* TopHost.gr#ql:tophost@cptIt#, Economy Unlimited. 801.100.4678.

synagonism.net is hosted by the ISP Fragkoulis Maounis & Co. General Partnership (OE) in Greece.
We found that on the IP of Synagonism.net 10 more websites are hosted.
Hostname:  linux337.grserver.gr
IP address:  185.4.133.39
Country:  Greece
Latitude:  39.000000
Longitude:  22.000000
ISP:  Fragkoulis Maounis & Co. General Partnership (OE)
Organization:  Shared Hosting IPs, daticated & VPSserver infrastr
Here are the IP Neighbours for Synagonism.net
dreamkitchen.grmavromichalai.grsynagonism.netwww.casa-lucia-corfu.comwww.fairworld.grwww.kaminco.comwww.lavriaki.grwww.oceanis-hotel.grwww.ovaldean.comwww.rc-world.grwww.studiosrania.gr
[http://synagonism.net.dedicatedornot.com/]

sgn'SSL

name::
* McsEngl.sgn'SSL@cptIt,

_ΑΝΑΝΕΩΣΗ:
1. Approve την διαδικασία στο email που θα λάβετε στο admin email από την εκδούσα αρχή.
2. Εγκατάσταση SSL στο Plesk.
Αφού έχετε εκδώσει το CSR και σας έχει αποστείλει η εκδούσα αρχή το πιστοποιητικό, εγκαταστήστε το μέσα από το Plesk (https://top.host/support/kb/article.php?id=1550)
- Στο πεδίο Certificate (*.crt) , επικολλήστε το πρώτο κατά σειρά κλειδί που σας έχει αποσταλεί (main certificate) και στο πεδίο CA certificate (*-ca.crt) επικολλήστε το root και το Intermediate (διπλό κλειδί) το ένα κάτω από το άλλο χωρίς κενή γραμμή. μετά upload

3. Βεβαιωθείτε πως έχετε εγκαταστήσει το SSL σωστά.
Μετά από 60 λεπτά που έχετε ολοκληρώσει και το τελευταίο βήμα, βεβαιωθείτε πως έχετε εγκαταστήσει το SSL με επιτυχία. (https://top.host/support/kb/article/%CE%A0%CF%89%CF%82-%CE%BC%CF%80%CE%BF%CF%81%CF%8E-%CE%BD%CE%B1-%CE%B5%CE%BB%CE%AD%CE%B3%CE%BE%CF%89-%CE%B1%CE%BD-%CE%AD%CF%87%CF%89-%CE%B5%CE%B3%CE%BA%CE%B1%CF%84%CE%B1%CF%83%CF%84%CE%AE%CF%83%CE%B5%CE%B9-%CF%83%CF%89%CF%83%CF%84%CE%AC-%CF%84%CE%BF-ssl-%CE%BC%CE%BF%CF%85%3b-1280.html)

sgm'visit

name::
* McsEngl.sgm'visit@cptIt,
* McsEngl.wsSngm'hit@cptIt,

_TIME:
===
     2016-01-01,  07.01,    10.01    2017-01-01:  2018-01-01:
- site (ga)    1033,    1561,    1900,    1015,    
- Καλλικρ:    28195,  34030,  38026,  41742,  48385,
- πληροφορ  7012,    8187,    8582,    9612,    12396,
- home:    6946,    8492,    9136,    9899,    12174,
- keynes:    6042,    7456,    7813,    8168,    9085,
- Σύνταγμα:  2963,    3408,    3565,    3873,    4447,
- hitp:    2136,    2603,    2895,    3127,    3526,
- myschool  1419,    1890,    2071,    2430,    3468,
- sna:    2157,    2487,    2652,    2816,    3363,
- ljs        218,    531,    858,    1712,
- marx:    667,    820,    909,    979,    1284,
- worldview  412,    489,    598,    672,    932,
- crxToc:    650,    733,    757,    795,    905,
- PPMoney  370,    475,    521,    569,    796,
- Engels:    400,    501,    533,    579,    684,
- ecma:    361,    383,    391,    404,    433,
- Πnet:                    364,
- mcs:                    138,
===========================================================
     2015-01-01,  02.01,  03.01,  04.01,  05.01,  06.01,  08.01,  09.01,
- site (ga)    1172,    1118,  1471,  1359,  1178,  1501,  1049,  1156,
- Καλλικρ:    18256,    19172,  20123,  21195,  22077,  23029,  24865,  25553,
- home:    4751,    4899,  5049,  5256,  5404,  5555,  5787,  6070,
- πληροφορική  4106,    4313,  4623,  4888,  5002,  5129,  5335,  5366,
- keynes:    2891,    3223,  3563,  3898,  4224,  4561,  4977,  5186,
- Σύνταγμα:  1811,    1892,  1992,  2061,  2098,  2150,  2395,  2487,
- hitp:    1755,    1795,  1818,  1852,  1880,  1907,  1975,  2009,
- sna:    1467,    1507,  1554,  1620,  1664,  1722,  1811,  1869,
- myschool    580,    615,  661,  725,  745,  783,  878,  907,
- crxToc:    488,    505,  515,  530,  553,  570,  589,  604,
- marx:    377,    402,  439,  467,  492,  519,  559,  572,
- worldview    338,    345,  355,  365,  366,  372,  382,  385,
- ecma:    325,    328,  330,  332,  335,  338,  345,  350,
- Engels:    223,    233,  244,  259,  271,  283,  311,  325,
- PPMoney                  47,  271,
===========================================================
     2014-06-01,  2014-08-01,  2014-11-01,  2014-12-01,
- site (ga)    1703,    1230,    1724,    1747,
- Καλλικρ:    9801,    12294,    16179,    17408,
- home:    2964,    3434,    4213,    4548,
- πληροφορική  2377,    2645,    3229,    3831,
- keynes:    1356,    1734,    2444,    2691,
- hitp:    1356,    1448,    1661,    1720,
- Σύνταγμα:  1324,    1460,    1602,    1707,
- sna:    1118,    1207,    1356,    1420,
- crxToc:    378,    407,    440,    471,
- ecma:    308,    311,    321,    323,
- worldview    268,    275,    303,    327,
- marx:    228,    247,    302,    346,
- Engels:    139,    155,    195,    210,
- myschool            385,    460,
===========================================================
     2014-01-02,  2014-02-01,  2014-03-02,  2014-05-01,
- site (ga)    711,    1047,    1614,    1682,
- home:    1978,    2135,    2361,    2736,
- hitp:    1134,    1173,    1214,    1309,
- crxToc:    310,    336,    348,    365,
- Engels:    081,    92,    101,    121,
- keynes:    725,    806,    910,    1195,
- marx:    131,    171,    181,    208,
- ecma:    218,    225,    295,    302,
- sna:    730,    813,    918,    1068,
- worldview    205,    223,    243,    259,
- πληροφορική  1116,    1424,    1873,    2243,
- Καλλικρ:    2622,    3602,    4874,    7902,
- Σύνταγμα:  842,    894,    1028,    1189,
===========================================================
     2013-11-01,  10,  20,  2013-12-01,  10,  20,
- site (ga)    832,    834,  830,  910,    945,
- home:    1587,    1654,  1719,  1820,    1886,
- hitp:    959,    1057,  1081,  1094,    1112,
- crxToc:    254,    271,  284,  290,    300,
- Engels:    061,    062,  065,  68,    073,
- keynes:    592,    617,  637,  660,    680,
- marx:    107,    111,  113,  120,    124,
- ecma:    206,    208,  211,  214,    215,
- sna:    563,    584,  604,  622,    668,
- worldview    145,    170,  177,  190,    196,
- πληροφορική  364,    447,  566,  734,    928,
- Καλλικρ:    1502,    1712,  1930,  2170,    2340,
- Σύνταγμα:  660,    698,  735,  768,    809,
===
     2013-10-01:  5,  10,  15,  20,  25,
- site (ga)    587,    633,  669,  687,  741,  813,
- home:    1376,    1410,  1444,  1472,  1503,  1543,
- hitp:    901,    915,  925,  931,  940,  946,
- crxToc:    208,    217,  223,  231,  239,  248,
- Engels:    044,    046,  047,  050,  054,  056,
- keynes:    456,    466,  477,  490,  542,  560,
- marx:    093,    097,  098,  101,  103,  104,
- ecma:    193,    194,  195,  199,  202,  203,
- sna:    480,    494,  508,  523,  537,  545,
- worldview                107,
- πληροφορική      044,  095,  169,  238,  303,
- Καλλικρ:    940,    1030,  1130,  1188,  1287,  1386,
- Σύνταγμα:  541,    562,  585,  611,  625,  637,
===
* 2013-09-01:  4,  7,  10,  13,  16,  20,  22,  24,  27,  30,
- site (ga)  461,  483,  502,  501,  536,  550,  578,  580,  579,  357u,  577,
- home:  1089,  1113,  1158,  1197,  1231,  1257,  1277,  1293,  1314,  1338,  1365,
- hitp:  663,  701,  757,  769,  798,  822,  837,  851,  875,  889,  899,
- engels:            005,  023,  027,  029,  040,  043,
- keynes:  379,  384,  389,  394,  401,  409,  415,  421,  426,  432,  452,
- marx:  063,  064,  069,  077,  082,  084,  086,  087,  089,  090,  092,
- ecma:  179,  180,  181,  186,  187,    188,    189,  190,  192,
- sna:  361,  367,  381,  393,  405,  424,  428,  431,  437,  458,  476,
- Καλλικρ:  556,  586,  618,  631,  672,  721,  770,  787,  807,  878,  918,
- Σύνταγμα: 449,  455,  463,  470,  484,  493,  498,  500,  507,  520,  535,
- crxToc:  149,  150,  160,  167,  170,  173,  175,  182,  184,  203,  207,
===
* 2013-08-01:  4,  7,  10,  13,  16,  19,  21,  24,  27,  30,
- site (ga)  329,  316,  331,  353,  370,  389,  384,  396,  401,  444,  469,
- home:  670,  735,  763,  816,  833,  858,  889,  911,  951,  1034,  1080,
- hitp:  312,  336,  396,  453,  463,  486,  510,  557,  609,  633,  644,
- keynes:  269,  280,  300,  315,  328,  335,  341,  347,  354,  369,  376,
- marx:        030,  038,  044,  048,  050,  054,  058,  061,
- ecma:  155,  157,  159,  162,  163,  167,  168,  170,  174,  177,  178,
- sna:  257,  267,  284,  292,  307,  326,  331,  341,  349,  353,  359,
- Καλλικρ:  379,  391,  404,  429,  437,  448,  452,  461,  494,  517,  544,
- Σύνταγμα: 275,  285,  293,  303,  316,  325,  334,  397,  421,  429,  440,
- crxToc:  105,  112,  118,  124,  126,  129,  133,  135,  138,  142,  146,
===
* 2013-08-01:  4,  7,  10,  13,  16,  19,  21,  24,  27,  30,
- site (ga)  
- home:  
- hitp:  
- keynes:  
- marx:  
- ecma:  
- sna:  
- Καλλικρ:  
- Σύνταγμα:
- crxToc:  
===
* 2013-07-16:  18,  19,  20,  21,  22,  23,  24,  25,  28,  31,
- site (ga):  425,  428,  408,  398,  391,  389,  392,  387,  394,  348,  329,
- home:  537,  552,  563,  578,  582,  589,  599,  605,  614,  638,  667,
- hitp:  262,  278,  282,  284,  286,  289,  291,  295,  298,  305,  310,
- keynes:  193,  204,  210,  213,  216,  228,  231,  235,  238,  248,  259,
- ecma:   114,  134,  137,  139,  140,  141,  142,  144,  146,  150,  153,
- sna:  196,  207,  208,  215,  218,  225,  230,  236,  238,  246,  256,
- Καλλικρ: 304,  316,  321,  323,  325,  327,  333,  339,  357,  366,  377,
- Σύνταγμα: 207,  218,  224,  230,  233,  234,  238,  243,  247,  264,  274,
- crxToc:   076,  078,  079,  080,  081,  082,  083,  084,    095,  102,
===
* 2013-07-14:
- site:  435 (g-analytics),
- home:  525,
- hitp:  238,
- keynes:  186,
- sna:  162,
- ecma:   112,
- Σύνταγμα: 199,
- Καλλικρ: 268,
- crxToc:   074,
===
* 2013-07-07:
- site:  504 (g-analytics),
- home:  497,
- hitp:  226,
- keynes:  167,
- sna:  105,
- ecma:   110,
- Σύνταγμα: 183,
- Καλλικρ: 248,
- crxToc:   070,
===
* 2013-07-02:
- site:  504 (g-analytics),
- home:  454,
- hitp:  207,
- keynes:  143,
- sna:  089,
- Σύνταγμα: 167,
- Καλλικρ: 215,
- crxToc:   057,
- ecma:   100,
======
* 2013-06-30:
- site:  504 (g-analytics),
- home:  436,
- hitp:  201,
- keynes:  135,
- sna:  083,
- Σύνταγμα: 165,
- Καλλικρ: 202,
- crxToc:   051,
- ecma:   095,
===
* 2013-06-28:
- site:  477 (g-analytics),
- home:  410,
- hit:  175,
- keynes:  130,
- sna:  081,
- Σύνταγμα: 159,
- Καλλικρ: 186,
- crxToc:  043,
- ecma:  087,
===
* 2013-06-26:
- site:  400 (g-analytics),
- home:  383,
- hit:  155,
- keynes:  121,
- sna:  072,
- Σύνταγμα: 155,
- Καλλικρ: 169,
- crxToc:  
- ecma:  035,
===
* 2013-06-22:
- site:  383 (g-analytics),
- home:  360,
- hit:  137,
- keynes:  108,
- sna:  067,
- Σύνταγμα: 141,
- Καλλικρ: 147,
===
* 2013-06-22:
- site:  358 (g-analytics),
- home:  345,
- hit:  126,
- keynes:  102,
- sna:  062,
- Σύνταγμα: 132,
- Καλλικρ: 137,
===
* 2013-06-18:
- site:  294 (g-analytics),
- home:  316,
- hit:  108,
- keynes:  091,
- sna:  052,
- Σύνταγμα: 112,
- Καλλικρ: 118,
===
* 2013-06-16:
- site:  251,
- home:  289,
- hit:  075,
- keynes:  078,
- sna:  046,
- Σύνταγμα: 062,
- Καλλικρ: 087,

website.ART

name::
* McsEngl.website.ART@cptIt,
* McsEngl.art-website@cptIt,
* McsEngl.website.art@cptIt,

HERITAGE DEVELOPMENT:
http://www.heritagedevelopment.co.uk
ΠΕΡΙΟΔΙΚΟ: παρουσιάζει 20 μουσεία.

ΒΑΣΙΛΙΚΗ ΟΠΕΡΑ ΤΟΥ ΛΟΝΔΙΝΟΥ:
http://www.royalopera.org

ΜΟΥΣΙΚΗ ΒΙΒΛΙΟΘΗΚΗ 'ΛΙΛΙΑΝ ΒΟΥΔΟΥΡΗ' ΣΤΟ ΜΕΓΑΡΟ ΜΟΥΣΙΚΗΣ:
httpadrs.mmb.org.gr

website.BUSINESS

name::
* McsEngl.website.BUSINESS@cptIt,

_ADDRESS.WPG:
* http://www.businessinsider.com//
Welcome! Business Insider is a fast-growing business site with deep financial, media, tech, and other industry verticals. The flagship vertical, Silicon Alley Insider, launched on July 19, 2007, led by DoubleClick founders Dwight Merriman and Kevin Ryan and former top-ranked Wall Street analyst Henry Blodget.
One year after launch, many more verticals joined Silicon Alley Insider, from Clusterstock to Money Game, The Wire, and more. The verticals have been relaunched under one brand to focus on building the leading online business news site for the digital age. There are no subscription fees or production delays. Business Insider is dedicated to aggregating, reporting, and analyzing the top news stories across the web and delivering them to you at rapid-fire pace.
[http://www.businessinsider.com/about]

* http://www.kickstarter.com//
Kickstarter is a new way to fund creative projects.
We’re a home for everything from films, games, and music to art, design, and technology. Kickstarter is full of projects, big and small, that are brought to life through the direct support of people like you. Since our launch in 2009, more than 4.3 million people have pledged over $665 million, funding more than 43,000 creative projects. Thousands of creative projects are raising funds on Kickstarter right now.
[http://www.kickstarter.com/hello?ref=nav]

website.CURRENCY

name::
* McsEngl.website.CURRENCY@cptIt,

_SPECIFIC:
* XE: http://www.xe.com/company//

website.ECONOMY

name::
* McsEngl.website.ECONOMY@cptIt,
* McsEngl.economy-website@cptIt,
* McsEngl.website.economy@cptIt,

httpadrs.multipress.gr:
περιέχει το cdrom με 1250 μεγαλύτερες ελληνικές επιχειρήσεις.

ΕΘΝΙΚΟ ΙΝΣΤΙΤΟΥΤΟ ΕΡΓΑΣΙΑΣ:
httpadrs.eie.org.gr

website.STOCK-EXCANGE

name::
* McsEngl.website.STOCK-EXCANGE@cptIt,

George Marcovits, Athens, Greece
http://users.otenet.gr/~geomar/
Θερμή παράκληση να μας επισκεφθείτε στο http://www.sophocleous.com

website.EMAIL

name::
* McsEngl.website.EMAIL@cptIt,

website.EXCHANGE

name::
* McsEngl.website.EXCHANGE@cptIt,

_ADDRESS.WPG:
* http://www.rebook.gr//

website.GEOGRAPHY#cptCore91#

name::
* McsEngl.website.GEOGRAPHY@cptIt,
* McsEngl.conceptIt19.7,

_ADDRESS.WPG:
* google-maps#cptItsoftorg988.1#

website.HEALTH

name::
* McsEngl.website.HEALTH@cptIt,
* McsEngl.health-website@cptIt,
* McsEngl.website.health@cptIt,

_ADDRESS.WPG:
* http://www.iatropedia.gr//

HEALTHFINDER:
USA. It is a gateway consumer health information web site from the United States government. The official launch date for this site is April 15th.
http://www.healthfinder.gov.

MEDICONSULT:
httpadrs.mediconsult.com

MedNet Hellas: Table of Contents

Cancer Servers

American Cancer Society

National Cancer Institute

Med Access

OPHTHALMOLOGY IN CYBERSPACE

The Human Transcript Map

website.HUMAN

name::
* McsEngl.website.HUMAN@cptIt,
* McsEngl.human-website@cptIt,
* McsEngl.website.human@cptIt,
* McsEngl.website.people@cptIt,
* McsEngl.wst.PEOPLE@cptIt,

KASSELOURIS NIKOS:
users.forthnet.gr/ioa/nikas

PEPPER, STEVE:
pepper@falch.no

website.IMAGE

name::
* McsEngl.website.IMAGE@cptIt,
* McsEngl.website.image@cptIt,

_ADDRESS.WPG:
* https://www.remove.bg/ removes background automatically for free,

website.INFO

name::
* McsEngl.website.INFO@cptIt,

website.info.NEWS

name::
* McsEngl.website.info.NEWS@cptIt,
* McsEngl.website.news@cptIt,

_ADDRESS.WPG:
* διευθύνσεις ελληνικού τύπου: http://www.clipnews.gr/site_application/assets/documents/dirnewspapers.pdf,

website.INTERNET

name::
* McsEngl.website.INTERNET@cptIt,
* McsEngl.internet-website@cptIt,
* McsEngl.website.internet@cptIt,

_ADDRESS.WPG:
* απομόνωση: http://www.iatropedia.gr/articles/read/4172,

website.COMMUNICATION

name::
* McsEngl.website.COMMUNICATION@cptIt,

Talk to your friends online with Yahoo! Messenger.
http://im.yahoo.com {2000-09-01}

web.FTP

name::
* McsEngl.web.FTP@cptIt,

FORTHnet IOANNINA

DOWNLOAD.COM -- c|net

Compulink -ftp

Folio ftp

FORTHnet FTP Server

HOL ftp

iWORLD: Software Downloads

Microsoft Site Builder Network

PC Magazine Online -- Downloads Area

PCWeek Downloads

web.WWW

name::
* McsEngl.web.WWW@cptIt,

Fifth International World Wide Web Conference

The World Wide Web Consortium (W3C)

World Wide Web server software

W3C Activity: WWW and OOP

Integrating Object Technology and the Web

HYTIME

HyTime: ISO 10744 Hypermedia/Time-based Structuring Language

Directory of /pub/HyTime

HTML

A Beginner's Guide to HTML

HTML Guides and References

NetMind Free Services Home Page

SGML

The SGML Web Page (Robin COVER)

The Whirlwind Guide (Steve Pepper)

The Whirlwind Guide Tools - By Product Category

The WhirlWind Guide Tools - By Vendor

SGML Home Page, Ikeda Lab.

SGML Open Home Page

mfx's Page On HTML, SGML, And All That Stuff

TEI

Text Encoding Initiative Home Page

TEI Guidelines for Electronic Text Encoding and Interchange

website.ISP

name::
* McsEngl.website.ISP@cptIt,

ΚΑΛΩΣΗΛΘΑΤΕ ΣΤΑ IOANNINA

Acropolis Net

AEAS NET

Ariadne "Demokritos"

Compulink ftp

Compulink Hepirus

EEXI

Ermis On-Line WWW Services

Forthnet

Hellas On Line

HIWAY - ΠΑΤΡΑ

INTERNET HELLAS

MATRIX

NETOR WWW

Spark Net (Greek)

OTEnet

Technical Press S.A.

ΕΞΩΤΕΡΙΚΟΥ

IBM Global Network home page

MSN - USA

ΘΕΣΣΑΛΟΝΙΚΗ

DIAVLOS - ΘΕΣΣΑΛΟΝΙΚΗ

GROOVY NET

Hypernet - θεσσαλονίκη

MAG NET - ΘΕΣΣΑΛΟΝΙΚΗ

OPENET - ΘΕΣΣΑΛΟΝΙΚΗ

website.JOB (link#ql:job'searching#)

website.LEARN

name::
* McsEngl.website.LEARN@cptIt,
* McsEngl.learning-website@cptIt,
* McsEngl.website.learning@cptIt,

website.LEARN.LAW

name::
* McsEngl.website.LEARN.LAW@cptIt,

On-Line Searchable International Trade Law Library Available for Free
February 1, 1998 - WWW.NFOWEB.COM (http://www.nfoweb.com/trade), The Definitive Folio Infobase Site, and Tradewinds Publishing (http://www.intl-trade.com) announce the FREE availability of the most complete searchable Library related to International Trade.
The information in the Library is contained in Folio Infobases. Folio Infobases are indexed for every word for the fastest possible searching and you can download the entire infobase and use it on your computer.
For the full text of this news item, point your browser to http://www.eurekapub.com/infobasenews/IN980206.html

website.NETWORK.HUMAN#cptCore372.2#

name::
* McsEngl.website.NETWORK.HUMAN@cptIt,

website.NEWS

name::
* McsEngl.website.NEWS@cptIt,
* McsEngl.news-website@cptIt,
* McsEngl.website.news@cptIt,

Athens News Agency (ΑΠΕ)

The Nando Times: info tech news

CNN - Digest

MSNBC Personal News Page

Yahoo - World Summary (REUTER)

httpadrs.NEWS.agency

name::
* McsEngl.httpadrs.NEWS.agency@cptIt,

NEW EUROPE:
new-europe.com

ΑΠΕ (ΑΘΗΝΑΙΚΟ ΠΡΑΚΤΟΡΕΙΟ ΕΙΔΗΣΕΩΝ)
httpadrs.ana.gr

ΜΑΚΕΔΟΝΙΚΟ ΠΡΑΚΤΟΡΕΙΟ ΕΙΔΗΣΕΩΝ
httpadrs.mpa.gr

httpadrs.NEWS.ECONOMY

name::
* McsEngl.httpadrs.NEWS.ECONOMY@cptIt,

Financial Times
nikass nak1759

CNNfn - the financial network

MSNBC Commerce Front Page

Yahoo! - Business Summary

Nando Times - business

ΝΑΥΤΕΜΠΟΡΙΚΗ

WEEKLY ECONOMIC-NEWS

Economist

βημα - Τμήμα Περιεχομένων

httpadrs.NEWS.newspaper

name::
* McsEngl.httpadrs.NEWS.newspaper@cptIt,

ΕΛΕΥΘΕΡΟΤΥΠΙΑ
httpadrs.enet.gr

ΝΑΥΤΕΜΠΟΡΙΚΗ
httpadrs.naftemporiki.gr

ΤΟ ΒΗΜΑ
tovima.dolnet.gr

httpadrs.NEWS.periodical

name::
* McsEngl.httpadrs.NEWS.periodical@cptIt,

4 ΤΡΟΧΟΙ:
httpadrs.techlink.gr/win/4t

NetControl:
netcontrol.net

ΑΘΗΝΟΡΑΜΑ:
httpadrs.athinorama.gr

ΚΕΦΑΛΑΙΟ:
httpadrs.addr.com/kefalaio

ΛΟΓΙΣΤΗΣ:
www0.netor.gr/logist/logist.htm

WIN:
httpadrs.acropolis.net/magazines/net

Business Week

Info (ΕΛΕΥΘΕΡΟΤΥΠΙΑ)

βημα - Τμήμα Περιεχομένων

BYTE Magazine

Economist

Elle

DownTown

Fortune

JavaWorld - USA

Nature

New Scientist:Planet Science
nikass nak1759

Nitro

TIME World Wide

Playboy

magazine

SCIENCE Magazine On-Line

Wired

The Wall Street Journal Interactive Edition

httpadrs.NEWS.RADIO

name::
* McsEngl.httpadrs.NEWS.RADIO@cptIt,

FLASH 9.61
httpadrs.flash.gr

KLIK FM
httpadrs.klikfm.gr

ΔΗΜΟΤΙΚΟ ΡΑΔΙΟΦΩΝΟ ΙΩΑΝΝΙΝΩΝ
ioannina.forthnet.gr/depei

httpadrs.NEWS.TECHNOLOGY

name::
* McsEngl.httpadrs.NEWS.TECHNOLOGY@cptIt,

HELLAS NEWS

CNN - Technology News Main Page

Computer News Daily

InfoWorld Electric Page One

MSNBC Science/Technology Front Page

NEWS.COM

Newsbytes

PC Magazine Online

PC Week

Yahoo! - Technology Summary

iWORLD: Internet News and Resources

ZD Net

WEEKLY

Info (ΕΛΕΥΘΕΡΟΤΥΠΙΑ)

MONTHLY

BYTE Magazine

Computer για ολους

JavaWorld - USA

httpadrs.NEW.TV

name::
* McsEngl.httpadrs.NEW.TV@cptIt,

ANTENNA
httpadrs.antenna.gr

MEGA
httpadrs.megatv.gr

STAR:
httpadrs0.netor.gr/star

ΕΡΤ:
httpadrs.ert.gr

WORLD NEWS

MSNBC World Front Page

CNN - World News

Nando Times Global News

HEALTH

Official American Medical Association (AMA) Home Page

Yahoo! - Health Summary

CNN - Health

Nando Times - Health & Science News

SCIENCE

MSNBC Science/Technology Front Page

Health & Science News - Oct 27, 1996 12:01 p.m.

WHEATHER

CNN - Weather Forecast for Europe

CNN - Satellite image for Europe

CNN - Athens Weather Forecast

DAILY NEWS (NEWSPAPERS - ONLINE SYSTEMS)

ΚΑΘΗΜΕΡΙΝΗ

ΕΛΕΥΘΕΡΟΤΥΠΙΑ (Enet)

ΜΑΚΕΔΟΝΙΑ - ΘΕΣΣΑΛΟΝΙΚΗ

ΤΑ ΝΕΑ (DOLnet)

NYT: Computer News Daily

ATHENS NEWS-Electronic Edition (Home Page)

CNN Interactive

Forbes Magazine

InfoWorld Electric Page One

MS NBC

NewsPage

Time Daily

The Nando Times

Times Fax

WashingtonPost.com

website.PROGRAMMING

name::
* McsEngl.website.PROGRAMMING@cptIt,
* McsEngl.programing-website@cptIt,
* McsEngl.website.programing@cptIt,

Object-Oriented Information Sources

website.JAVA#ql:java'source#

name::
* McsEngl.website.JAVA@cptIt,

C++

C++ Annotations

The C++ Virtual Library

Learning C++ ( 7-Nov-1996)

C++ tutorial (from pascal)

SMALLTALK

The Object People

IBM Smalltalk Tutorial

Introduction to Smalltalk Express

Smalltalk Textbook (in English)

website.GOVERNMENT

name::
* McsEngl.website.GOVERNMENT@cptIt,
* McsEngl.government-website@cptIt,
* McsEngl.website.government@cptIt,

How Long Do Political Campaign Websites Stay on the Internet?
The Bob Dole-Jack Kemp campaign website is still active, 20 years after they lost the 1996 presidential election.

There are term limits for US presidents -- they can only serve a maximum of
two terms, or eight years. But their campaign websites can live forever on
the Internet, and even presidential candidates who weren't elected can have
their campaign promises immortalized online. Take the 1996 campaign of
Republican candidates Bob Dole and Jack Kemp. Their campaign website is
still active, two decades after they lost to the Democratic ticket of Bill
Clinton and Al Gore.

Read More: http://www.wisegeek.com/how-long-do-political-campaign-websites-stay-on-the-internet.htm?m, {2016-03-15}

Skopja - soros-home

White House

website.EU

name::
* McsEngl.website.EU@cptIt,

Citizens First Welcome page

EUDOR:
κοινοτική νομοθεσία
http://www.eudor.com

EUROPA:
http://www.europa.eu.int

I*M-EUROPE:
http://www2.echo.lu

EU: Information Engineering Initiative

DG XII on EUROPA :
http://europa.eu.int/en/comm/dg12/dg12tst2.html

website.gov.GREECE

name::
* McsEngl.website.gov.GREECE@cptIt,

ΜΗΤΡΩΟ ΜΙΣΘΟΔΟΤΟΥΜΕΝΩΝ ΕΛΛΗΝΙΚΟΥ ΔΗΜΟΣΙΟΥ:
* https://apografi.gov.gr/ap//

ΕΛΛΗΝΙΚΑ ΥΠΟΥΡΓΕΙΑ

Υπουργείο Εξωτερικών

ΥΠΟΥΡΓΕΙΟ ΟΙΚΟΝΟΜΙΚΩΝ:
www.di.uoa.gr/GSIS

Υπουργείο Παιδείας

Υπουργείο Πολιτισμού

website.ORGANIZATION

name::
* McsEngl.website.ORGANIZATION@cptIt,
* McsEngl.organization-website@cptIt,
* McsEngl.website.organization@cptIt,

website.ORG.EDUCATION'RESEARCH

name::
* McsEngl.website.ORG.EDUCATION'RESEARCH@cptIt,

Unicode Home Page

College and University Home Pages

CollegeTown!

The Globewide Network Academy

ASIA UNIV

China E&R network

NUS - Singapore

Peking University

GREEK UNIVERSITY

name::
* McsEngl.GREEK UNIVERSITY@cptIt,

httpadrs.UNIVERSITY.GREECE

ΑΡΙΣΤΟΤΕΛΕΙΟ ΠΑΝΕΠΙΣΤΗΜΙΟ ΘΕΣΣΑΛΟΝΙΚΗΣ:
httpadrs.auth.gr

ΕΘΝΙΚΟ ΜΕΤΣΟΒΕΙΟ ΠΟΛΥΤΕΧΝΕΙΟ:
www.ntua.gr

KNOWLEDGE AND DATABASE SYSTEMS LABORATORY

ΠΑΝΕΠΙΣΤΗΜΙΟ ΑΘΗΝΩΝ:
www.uoa.gr

ΤΟΜΕΑΣ ΓΛΩΣΣΟΛΟΓΙΑΣ:
platon.uoa.gr/departs/linguistics/

ΠΑΝΕΠΙΣΤΗΜΙΟ ΑΙΓΑΙΟΥ:
www.aegean.gr

ΠΑΝΕΠΙΣΤΗΜΙΟ ΘΕΣΣΑΛΙΑΣ:
www.uth.gr/

ΠΑΝΕΠΙΣΤΗΜΙΟ ΙΩΑΝΝΙΝΩΝ:
www.uoi.gr

COMPUTER SCIENCE DEPARTMENT

ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΡΗΤΗΣ
www.uch.gr

ΤΜΗΜΑ ΠΛΗΡΟΦΟΡΙΚΗΣ

ΠΑΝΕΠΙΣΤΗΜΙΟ ΠΑΤΡΑΣ:

ΤΜΗΜΑ ΜΗΧΑΝΟΛΟΓΩΝ ΥΠΟΛΟΓΙΣΤΩΝ ΚΑΙ ΠΛΗΡΟΦΟΡΙΚΗΣ
medusa.ceid.upatras.gr

ΤΜΗΜΑ ΗΛΕΚΤΡΟΛΟΓΩΝ ΜΗΧΑΝΙΚΩΝ ΚΑΙ ΤΕΧΝΟΛΟΓΙΑΣ ΥΠΟΛΟΓΙΣΤΩΝ:
www.apel.ee.upatras.gr/www/pub/ee/ee.html

ΠΟΛΥΤΕΧΝΕΙΟ ΚΡΗΤΗΣ:
www.ergasya.tuc.gr

website.UNIVERSITY.USA

name::
* McsEngl.website.UNIVERSITY.USA@cptIt,

The George Washington University
www.gwu.edu

Harvard University

MIT:
web.mit.edu

website.UNIVERSITY.UK

name::
* McsEngl.website.UNIVERSITY.UK@cptIt,

University of Cambridge

London Scool of Economics

Oxford University

website.RESEARCH

name::
* McsEngl.website.RESEARCH@cptIt,

Microsoft Research:

CERN

CORDIS:
Ερευνητική & Αναπτυξιακή πολιτική
http://www.cordis.lu

CURL - Consortium of University Research Libraries

EURODICAUTOM:
4,5 εκατ. επιστημονικοί και τεχνικοί όροι
http://www2.echo.lu/echo/test/en/eu92-des.html

EURISTOTE:
18.000 διπλωματικές εργασίες, 7000 καθηγητές
http://www.epms.nl/www.ecsa/euristot.htm

KNOWLEDGE AND DATABASE SYSTEMS LABORATORY

ΕΚΤ

(ΕΕ) ΚΟΙΝΟ ΚΕΝΤΡΟ ΕΡΕΥΝΩΝ:
http://www.jrc.org

website.ORG.PROFIT

name::
* McsEngl.website.ORG.PROFIT@cptIt,

folio support

Reed Elsevier plc (Folio Parent Company) - UK/NETHERLANDS/USA

website.BANK'organization

name::
* McsEngl.website.BANK'organization@cptIt,

ΤΡΑΠΕΖΑ ΠΙΣΤΕΩΣ:
httpadrs.alpha.gr

CITIBANK:
httpadrs.Citibank.com

httpadrs.InfoTech'organization

name::
* McsEngl.httpadrs.InfoTech'organization@cptIt,

Alinco - GREECE

Balder Computer Systems - GREECE

Big City Corporation - GREECE

BSI - GREECE

BOOKSTORE
On-line Bookstore in GREECE

Bookshop - UK
750.000 titles

Compaq - USA

Computer Trade Center S.A. - GREECE

Philips Electronics N.V. - NETHERLANDS

GRIF S.A.
** SGML and HTML solutions

HP - USA

Hypercorner - GREECE

InterGrand - GREECE

InterTech - Panasonic - GREECE

IBM (USA)

Kis Ware (θεσσαλονίκη)

MicroChip - GREECE

Microtech - EIZO - GREECE

ODS - GREECE

ONAR&D - IOANNINA

Pouliadis Associates Corp. - GREECE

Silicon Star - GREECE

Smart Systems - GREECE

Sony

Toshiba - JAPAN

ZERO ONE (Θεσσαλονίκη)

INFO-TECH (SOFTWARE)

Dictionary on InfoTech

Anodos - GREECE

Electronic Book Technologies (EBT)

HELKETEC Ltd - ΕΛΚΕΤΕΚ ΕΠΕ

Hyper-G

HyperSystems - GREECE

Istos (web creator) - GREECE

Lycos, Inc. Home Page

LEXIS-NEXIS Communication Center - USA

Mailbase Mailing List Service

Microsoft Corporation - USA

SHERPA project

Singular Software - GREECE

Sony

Symantec Corporation - USA

ΕΛΕΑ ΕΠΕ - GREECE
** ΒΙΒΛΙΟΓΡΑΦΙΑ ΣΕ CDROM

ΕΡΑΤΟΣΘΕΝΗΣ -GREECE:
** http://www.eranet.gr
** ΓΕΩΓΡΑΦΙΚΑ ΣΥΣΤΗΜΑΤΑ ΠΛΗΡΟΦΟΡΙΩΝ. Οι χρήστες θα μπορούν να κατασκευάζουν χάρτες.

AUTO

NISSAN HELLAS - Νικ. Ι. Θεοχαράκης Α.Ε.

Toyota

MISC

Nasa (USA)

website.ORG.NON'PROFIT

name::
* McsEngl.website.ORG.NON'PROFIT@cptIt,

Electronic Frontier Foundation
www.eff.org
απαραβίαστο ιδιωτικής ζωής,
ελευθερία έκφρασης,
αισθημα ευθύνης χρηστών,
πρόσβαση σε πληροφορίες,
Διασφάλιση προσωπικών και συνταγματικών δικαιωμάτων

KKE

UN

website.SEARCHING

name::
* McsEngl.website.SEARCHING@cptIt,
* McsEngl.http.search@cptIt,
* McsEngl.httpadrs.gnc.searching@cptIt,
* McsEngl.searching-website@cptIt,

_ADDRESS.WPG:
* http://www.google.com/search?sourceid=navclient&q=jdb+tutorial
===
httpadrs.mrwhatis:
* http://mrwhatis.net/
ΏMr What Is?
Sometimes in life you need answer to simple questions, even though not all the questions have answers, you can always try and search references about the main topic. Thats why Mr What Is exists. Just type any topic in the search box below and we will give you a list of the main resources you can check to know your answer.
===
WorldPages: Find the World Here!
===
AltaVista:
altavista.digital.com
===
Excite:
httpadrs.excite.com
===
HotBot:
httpadrs.hotbot.com
===
Infoseek:
httpadrs.infoseek.com
===
Lycos:
httpadrs.lycos.com
===
Magellan:
httpadrs..mckinley.com
===
Pathfinder
===
Yahoo!
httpadrs.yahoo.com
===
WebCrawler:
webcrawler.com
===
Deja News - Power Search Form
===
ANSWERS.COM:
** http://www.answers.com
** it charges for answers, $2/6/12
===
HUMANSEARCH:
http://www.humansearch.w1.com
free
===
Webindex:
** httpadrs.webindex.gr
** ελληνική search engine
===
UNITED HELLAS:
httpadrs.united-hellas.com
έχει δημιουργήσει κατάλογο
===
* http://www.stumbleupon.com/about
We help you easily discover new and interesting stuff on the Web. Tell us what you like, and we’ll introduce you to amazing web pages, videos, photos and more that you wouldn’t have found on your own.

As you Stumble through great web pages, tell us whether you Like or Dislike our recommendations so we can show you more of what’s best for you. We’ll show you web pages based on that feedback as well as what similar Stumblers and the people you follow have Liked or Disliked.

Our members have given us some pretty great compliments in the past, including describing us as “the entire Internet, all in one place,” ”an epic journey” and “a map to an adventure you wouldn’t otherwise have found out about.”

Whether you’re interested in Humor, Photography, Fashion or Sports, we have something for you. Every Stumble is an adventure, and something amazing is always just a click away.

website.SHOPPING

name::
* McsEngl.website.SHOPPING@cptIt,
* McsEngl.shopping-website@cptIt,
* McsEngl.website.shopping@cptIt,

website.shopping.COMPANY

name::
* McsEngl.website.shopping.COMPANY@cptIt,
* McsEngl.website.company.shopping@cptIt,

GOSHOP

website.shopping.BOOK

name::
* McsEngl.website.shopping.BOOK@cptIt,
* McsEngl.website.book-shopping@cptIt,

website.shopping.DISPLAY

name::
* McsEngl.website.shopping.DISPLAY@cptIt,
* McsEngl.website.display-shopping@cptIt,

EIZO Monitor types

Philips Sound & Vision

Sony - Monitors / Multiscan 100sx

website.shopping.FOOD

name::
* McsEngl.website.shopping.FOOD@cptIt,
* McsEngl.website.food-shopping@cptIt,

_ADDRESS.WPG:
* https://www.e-food.gr//

website.shopping.PRODUCT

name::
* McsEngl.website.shopping.PRODUCT@cptIt,
* McsEngl.website.product.shopping@cptIt,

_SPECIFIC:
* book##
* display##
* food##
* software##

website.shopping.SOFTWARE

name::
* McsEngl.website.shopping.SOFTWARE@cptIt,
* McsEngl.website.software-shopping@cptIt,
* McsEngl.www.software-shopping@cptIt,

website.EDITOR

name::
* McsEngl.website.EDITOR@cptIt,

PROGRAMER'S FILE EDITOR:
http://httpadrs.lancs.ac.uk/people/cpaap/pfe/

website.SOFTWARE.FREE

name::
* McsEngl.website.SOFTWARE.FREE@cptIt,

DOWNLOAD.COM -- Welcome

PC Magazine Online -- Downloads Area

PROGRAMER'S FILE EDITOR:
http://www.lancs.ac.uk/people/cpaap/pfe/

website.SPORT

name::
* McsEngl.website.SPORT@cptIt,
* McsEngl.sport-website@cptIt,
* McsEngl.website.sport@cptIt,

ΕΛΛΗΝΙΚΟΣ ΟΡΕΙΒΑΤΙΚΟΣ ΣΥΛΛΟΓΟΣ:
httpadrs.oreibatein.com

website.TRAVEL

name::
* McsEngl.website.TRAVEL@cptIt,
* McsEngl.traveling-website@cptIt,
* McsEngl.turism-website@cptIt,
* McsEngl.web.turism@cptIt,
* McsEngl.website.traveling@cptIt,
* McsEngl.www.turism@cptIt,

_ADDRESS.WPG:
* http://www.zorpidis.gr//
* http://www.outtahere.com/

website.MISC

name::
* McsEngl.website.MISC@cptIt,
* McsEngl.misc-website@cptIt,
* McsEngl.website.misc@cptIt,

NGS - National Geographic Online

COUNTRIES

wwws of Greece

ASIA

New Zealand

CHINA

JAPAN

SINGAPORE

Yahoo! - Regional:Countries:Singapore

National Computer Board, Singapore

DATABASES

ECHO Databases Index

ENCYCLOPEDIAS

Britannika

LIBRARYS

Library of Congress World Wide Web (LC Web) Home Page

Library of Peking Univ

ART

art

Lalaounis - GREECE

Andy Warhol

Louvre

mtv

Smithsonian - USA

WebMuseum: Gris, Juan

TURISM - TRAVEL

Airline Tickets and Reservations

Bufalo

virtual turism.

Excite City.Net

EPICURIOUS TRAVEL: HOME PAGE

Paris

GREECE

The Aegean Web Server - for Holidays, Hotels, Travel and Touring in Greece

campings

CES

Poros Island, Saronic Gulf, Greece

AreiaNet: infoXenios - GNTO Greek Tourism Information, NetHold Group

Tourist Guide of Greece - Plus S.A.

travelling

HELLAS MAP

Greece (cia publications)

infoXenios: G.N.T.O. Greek Tourism Information

MISC

desire

olympics

Toolbar Folder

What's New?

What's Cool?

ΕΥΡΩΠΑΙΚΗ ΕΠΙΤΡΟΠΗ ΣΤΗΝ ΕΛΛΑΔΑ

Users Start Page

website.TEXT-CONVERSION

name::
* McsEngl.website.TEXT-CONVERSION@cptIt,

TO PDF:
Check out http://www.retep.org.uk/pdf/.
It might not be exactly what your looking for, but should get you started.
I think this might also be available at www.sourceforge.com

Maxime check out the FOP project at XML.apache
http://xml.apache.org/fop/index.html
{2000-09-01}

ΜΗΝΥΜΑ ΣΕ ΚΙΝΗΤΟ ΤΗΛΕΦΩΝΟ

mtn.co.za:
μέχρι 150 χαρακτήρες

website.VIDEO

name::
* McsEngl.website.VIDEO@cptIt,

website.YouTube

name::
* McsEngl.website.YouTube@cptIt,
* McsEngl.YouTube@cptIt,

_LINK_TO_SPECIFIC_TIMEPOINT:
* https://www.youtube.com/watch?v=uGetRoB_f2w#t=11m22s,

web'Specification

name::
* McsEngl.web'Specification@cptIt,

_ADDRESS.WPG:
* https://www.w3.org/standards//

_DESCRIPTION:
W3C standards define an Open Web Platform for application development that has the unprecedented potential to enable developers to build rich interactive experiences, powered by vast data stores, that are available on any device. Although the boundaries of the platform continue to evolve, industry leaders speak nearly in unison about how HTML5 will be the cornerstone for this platform. But the full strength of the platform relies on many more technologies that W3C and its partners are creating, including CSS, SVG, WOFF, the Semantic Web stack, XML, and a variety of APIs.
W3C develops these technical specifications and guidelines through a process designed to maximize consensus about the content of a technical report, to ensure high technical and editorial quality, and to earn endorsement by W3C and the broader community.
[https://www.w3.org/standards/]

_SPECIFIC:
VIEW BY
Technology topic
Status / Stability
Date
Title
Group publishing the standard

SPECIFIC

name::
* McsEngl.website.specific@cptIt,

web.Semantic-web

_CREATED: {2007-12-02}

name::
* McsEngl.web.Semantic-web@cptIt,
* McsEngl.conceptIt19.1,
* McsEngl.semantic-web@cptIt,
* McsEngl.semantic-web-19.1@cptIt, {2007-12-02}
* McsEngl.semweb-19.1@cptIt,
* McsEngl.swww-19.1@cptIt, {2007-12-07}
* McsEngl.sweb-19.1@cptIt,

_DEFINITION:
Machine-Understandable information: Semantic Web
[http://www.w3.org/DesignIssues/Semantic.html. Tim Berners-Lee, September 1998]
===
The Semantic Web is an evolving extension of the World Wide Web in which web content can be expressed not only in natural language, but also in a format that can be read and used by software agents, thus permitting them to find, share and integrate information more easily.[1] It derives from W3C director Sir Tim Berners-Lee's vision of the Web as a universal medium for data, information, and knowledge exchange.
At its core, the semantic web comprises a philosophy,[2] a set of design principles,[3] collaborative working groups, and a variety of enabling technologies. Some elements of the semantic web are expressed as prospective future possibilities that have yet to be implemented or realized.[4] Other elements of the semantic web are expressed in formal specifications.[5] Some of these include Resource Description Framework (RDF), a variety of data interchange formats (e.g. RDF/XML, N3, Turtle, N-Triples), and notations such as RDF Schema (RDFS) and the Web Ontology Language (OWL), all of which are intended to provide a formal description of concepts, terms, and relationships within a given knowledge domain.
[http://en.wikipedia.org/wiki/Semantic_Web]

* Humans are capable of using the Web to carry out tasks such as finding the Finnish word for "car", to reserve a library book, or to search for the cheapest DVD and buy it. However, a computer cannot accomplish the same tasks without human direction because web pages are designed to be read by people, not machines. The semantic web is a vision of information that is understandable by computers, so that they can perform more of the tedious work involved in finding, sharing and combining information on the web.
[http://en.wikipedia.org/wiki/Semantic_Web]

OWL is a component of the Semantic Web activity. This effort aims to make Web resources more readily accessible to automated processes by adding information about the resources that describe or provide Web content. As the Semantic Web is inherently distributed, OWL must allow for information to be gathered from distributed sources. This is partly done by allowing ontologies to be related, including explicitly importing information from other ontologies.
[http://www.w3.org/TR/2004/REC-owl-guide-20040210/]

sweb'Service

_CREATED: {2007-12-07}

name::
* McsEngl.sweb'Service@cptIt,
* McsEngl.semantic'web'service@cptIt19.i,

_DEFINITION:
Among the most important Web resources are those that provide services. By ``service'' we mean Web sites that do not merely provide static information but allow one to effect some action or change in the world, such as the sale of a product or the control of a physical device. The Semantic Web should enable users to locate, select, employ, compose, and monitor Web-based services automatically.
[http://www.daml.org/services/owl-s/1.1/overview/] 2007-12-07

LANGUAGE:
* SOAP#ql:soap-*###
* WSDL#ql:wsdl-*###

ONTOLOGY:
* OWL_S#ql:owl_s'ontology-561i###

sweb'Markup-language

name::
* McsEngl.sweb'Markup-language@cptIt,

_SPECIFIC:
* OWL#cptIt562#
* WSDL

sweb'Relationship-to-Hypertext-Web

name::
* McsEngl.sweb'Relationship-to-Hypertext-Web@cptIt,

Markup
Many files on a typical computer can be loosely divided into documents and data. Documents, like mail messages, reports and brochures, are read by humans. Data, like calendars, addressbooks, playlists and spreadsheets, are presented using an application program which lets them be viewed, searched and combined in many ways.

Currently, the World Wide Web is based mainly on documents written in Hypertext Markup Language (HTML), a markup convention that is used for coding a body of text interspersed with multimedia objects such as images and interactive forms. Metadata tags, for example <meta name="keywords" content="computing, computer studies, computer"><meta name="description" content="xxxx... "><meta name="author" content="xxxx"> provide a method by which computers can read the content of web pages.

The semantic web takes the concept further; it involves publishing the data in a language, Resource Description Framework (RDF), specifically for data, so that it can be manipulated and combined just as can data files on a local computer.

The HTML language describes documents and the links between them. RDF, by contrast, describes arbitrary things such as people, meetings, or airplane parts.

For example, with HTML and a tool to render it (perhaps Web browser software, perhaps another user agent), one can create and present a page that lists items for sale. The HTML of this catalog page can make simple, document-level assertions such as "this document's title is 'Widget Superstore'". But there is no capability within the HTML itself to assert unambiguously that, for example, item number X586172 is an Acme Gizmo with a retail price of €199, or that it is a consumer product. Rather, HTML can only say that the span of text "X586172" is something that should be positioned near "Acme Gizmo" and "€ 199", etc. There is no way to say "this is a catalog" or even to establish that "Acme Gizmo" is a kind of title or that "€ 199" is a price. There is also no way to express that these pieces of information are bound together in describing a discrete item, distinct from other items perhaps listed on the page.

See also: Semantic HTML, Linked Data.

Descriptive and extensible
The semantic web addresses this shortcoming, using the descriptive technologies Resource Description Framework (RDF) and Web Ontology Language (OWL), and the data-centric, customizable Extensible Markup Language (XML). These technologies are combined in order to provide descriptions that supplement or replace the content of Web documents. Thus, content may manifest as descriptive data stored in Web-accessible databases, or as markup within documents (particularly, in Extensible HTML (XHTML) interspersed with XML, or, more often, purely in XML, with layout/rendering cues stored separately). The machine-readable descriptions enable content managers to add meaning to the content, i.e. to describe the structure of the knowledge we have about that content. In this way, a machine can process knowledge itself, instead of text, using processes similar to human deductive reasoning and inference, thereby obtaining more meaningful results and facilitating automated information gathering and research by computers.
[http://en.wikipedia.org/wiki/Semantic_Web]

sweb'Resource

name::
* McsEngl.sweb'Resource@cptIt,

_SPECIFIC:
* w3c: http://www.w3.org/2001/sw//
* wiki: http://www.w3.org/2001/sw/wiki/Main_Page,
* http://semanticweb.org/wiki/Main_Page,

web.EVOLUTING#cptCore546.171#

name::
* McsEngl.web.EVOLUTING@cptIt,

{time.2007}:
today www=internet.
[KasNik, 2007-12-08]

{time.2004}:
=== SEMANTIC_WEB:
In December 2004 he accepted a chair in Computer Science at the School of Electronics and Computer Science, University of Southampton, UK, to work on his new project — the Semantic Web.[8]
[http://en.wikipedia.org/wiki/Tim_Berners-Lee]

{time.1994}:
=== W3C
In 1994, Berners-Lee founded the World Wide Web Consortium (W3C) at the Massachusetts Institute of Technology. It comprised various companies that were willing to create standards and recommendations to improve the quality of the Web.
[http://en.wikipedia.org/wiki/Tim_Berners-Lee]

{time.1993}:
1993.01:
υπήρχαν 50 www servers.

{time.1991-08-06}:
1991-08-06: first WEB SITE:
The first Web site built was at CERN[4][5][6][7] and was first put online on 1991-08-06. It provided an explanation about what the World Wide Web was, how one could own a browser and how to set up a Web server. It was also the world's first Web directory, since Berners-Lee maintained a list of other Web sites apart from his own.
[http://en.wikipedia.org/wiki/Tim_Berners-Lee]

1991
Δημοσίευση της ύπαρξης του WWW μέσω ενος newleter of CERN.

{time.1990}:
Νοεμ. 1990.
Υλοποίηση της πρότασης σε NeXT. Το δεκέμβριο είχαν γραφτεί δύο clients.

{time.1989}:
Μαρτιος 1989
άρχισε η προσπάθεια. Γράφτηκε η πρόταση.

web'Extensible-Web-Manifesto

name::
* McsEngl.web'Extensible-Web-Manifesto@cptIt,
* McsEngl.Extensible-Web-Manifesto@cptIt,

The Extensible Web Manifesto
#extendthewebforward
We—the undersigned—want to change how web standards committees create and prioritize new features. We believe that this is critical to the long-term health of the web.

We aim to tighten the feedback loop between the editors of web standards and web developers.

Today, most new features require months or years of standardization, followed by careful implementation by browser vendors, only then followed by developer feedback and iteration. We prefer to enable feature development and iteration in JavaScript, followed by implementation in browsers and standardization.

To enable libraries to do more, browser vendors should provide new low-level capabilities that expose the possibilities of the underlying platform as closely as possible.

They should also seed the discussion of high-level APIs through JavaScript implementations of new features (such as Mozilla’s X-Tags and Google’s Polymer).

Specifically, we offer the following design principles for an Extensible Web Platform:

Focus on adding new low-level capabilities to the web platform that are secure and efficient.
Expose low-level capabilities that explain existing features, such as HTML and CSS, allowing authors to understand and replicate them.
Develop, describe and test new high-level features in JavaScript, and allow web developers to iterate on them before they become standardized. This creates a virtuous cycle between standards and developers.
Prioritize efforts that follow these recommendations and deprioritize and refocus those which do not.
By focusing on standardizing new low-level capabilities, and building new features in terms of them, we:

Contain new security surface area.
Allow optimizations in browser engines to focus on the stable core, which affects more APIs as they are added. This leads to better performance with less implementation effort.
Allow browser vendors and library authors to iterate on libraries that provide developer-friendly, high-level APIs.
By explaining existing and new features in terms of low-level capabilities, we:

Reduce the rate of growth in complexity, and therefore bugs, in implementations.
Make it possible to polyfill more of the platform's new features.
Require less developer education for new features. Educational materials can build off of concepts that are already in the platform.
Making new features easy to understand and polyfill introduces a virtuous cycle:

Developers can ramp up more quickly on new APIs, providing quicker feedback to the platform while the APIs are still the most malleable.
Mistakes in APIs can be corrected quickly by the developers who use them, and library authors who serve them, providing high-fidelity, critical feedback to browser vendors and platform designers.
Library authors can experiment with new APIs and create more cow-paths for the platform to pave.
By prioritizing efforts that follow these principles, we:

Free up the standards process (especially in the short-term) to focus on features with security or performance concerns, and features that can only be added at the platform level, such as new hardware.
Allow web developers and browser-initiated libraries to take the lead in costly explorations.
Simplify and streamline the longer-term process of standardizing new APIs, which will already have implementations and significant real-world usage.
We want web developers to write more declarative code, not less. This calls for eliminating the standards bottleneck to introducing new declarative forms, and giving library and framework authors the tools to create them.

In order for the open web to compete with its walled competitors, there must be a clear path for good ideas by web developers to become part of the infrastructure of the web. We must enable web developers to build the future web.
[https://extensiblewebmanifesto.org/]

NCZOnline Newsletter - The Extensible Web Manifesto
April 12, 2016
From nczonline.net, with love.
Hi everyone,

It's possible that you've never heard of the Extensible Web Manifesto, and if that's the case, I'd suggest you look it up, because it's the reason you're happier with web development than ever before. The manifesto was created almost three years ago as a group of developers from across the various standards bodies and browser vendors came together to promise a new way forward.

For decades, change on the web happened slowly and deliberately (and often times behind closed doors). It's why there was a decade-long wait between HTML4 and HTML5; it's why it took ECMAScript 6 four years to complete; it's why we are only now gaining capabilities in CSS that we could do using tables in the 1990s. The manifesto was meant as a public pledge by those who work on these standards to improve the rate of innovation on the web and adopt a more incremental approach.

The fundamental process described in the manifesto is to focus on low-level functionality, both for new features and as a way to explain the behavior of existing features. The belief was that exposing low-level functionality helps move things along faster because it allows web developers to explore and create higher-level libraries. Those higher-level libraries would then inform how the web should continue to evolve. And we're seeing this very thing happening in spades today.

New low-level features are being added to the web platform at a fairly rapid pace. Features such as service workers, web components, and Houdini are exposing important primitives that allow developers to extend the behavior of the browser. TC39, the committee responsible for the core JavaScript language specification, now releases a new spec every year instead of trying to bundle a bunch of features together in a single release.

The Extensible Web Manifesto gave us a vision of what the future of a faster-moving web platform could be, and we are now starting to see the benefits. The stagnation we encountered when Internet Explorer ruled the web has long since passed, and the future is incredibly exciting.

Be well.

-N {2016-04-12}

web.GENESIS#cptCore753#

name::
* McsEngl.web.GENESIS@cptIt,

To WWW αναπτύχθηκε από το CERN και πουλήθηκε στο MIT για 1,5 εκ. ECU, μετά από αποτυχία να το πουλήσουν στην Ευρωπαϊκή κοινότητα.
[ΒΗΜΑ, 30 ΑΠΡ. 1995, Α10]

web.Web-3

name::
* McsEngl.web.Web-3@cptIt,
* McsEngl.web3@cptIt,
* McsEngl.web-3@cptIt,

_DESCRIPTION:
Ethereum enables the decentralised web, referred to as ‘web 3’. What makes it different from web 2 is that on Ethereum, there are no web servers, and therefore no middlemen to take commissions, steal your data or offer it to the NSA, and of course nothing to DDoS.
[https://dappsforbeginners.wordpress.com/tutorials/your-first-dapp/]
===
Web 3.0
See also: Semantic Web
Definitions of Web 3.0 vary greatly. Some[60] believe its most important features are the Semantic Web and personalization. Focusing on the computer elements, Conrad Wolfram has argued that Web 3.0 is where "the computer is generating new information", rather than humans.[61]

Andrew Keen, author of The Cult of the Amateur, considers the Semantic Web an "unrealisable abstraction" and sees Web 3.0 as the return of experts and authorities to the Web. For example, he points to Bertelsmann's deal with the German Wikipedia to produce an edited print version of that encyclopedia.[62] CNN Money's Jessi Hempel expects Web 3.0 to emerge from new and innovative Web 2.0 services with a profitable business model.[63]

Futurist John Smart, lead author of the Metaverse Roadmap[64] echoes Sharma's perspective, defining Web 3.0 as the first-generation Metaverse (convergence of the virtual and physical world), a web development layer that includes TV-quality open video, 3D simulations, augmented reality, human-constructed semantic standards, and pervasive broadband, wireless, and sensors. Web 3.0's early geosocial (Foursquare, etc.) and augmented reality (Layar, etc.) webs are an extension of Web 2.0's participatory technologies and social networks (Facebook, etc.) into 3D space. Of all its metaverse-like developments, Smart suggests Web 3.0's most defining characteristic will be the mass diffusion of NTSC-or-better quality open video to TVs, laptops, tablets, and mobile devices, a time when "the internet swallows the television."[65] Smart considers Web 4.0 to be the Semantic Web and in particular, the rise of statistical, machine-constructed semantic tags and algorithms, driven by broad collective use of conversational interfaces, perhaps circa 2020.[66] David Siegel's perspective in Pull: The Power of the Semantic Web, 2009, is consonant with this, proposing that the growth of human-constructed semantic standards and data will be a slow, industry-specific incremental process for years to come, perhaps unlikely to tip into broad social utility until after 2020.

According to some Internet experts Web 3.0 will allow the user to sit back and let the Internet do all of the work for them.[67] Rather than having search engines gear towards your keywords, the search engines will gear towards the user. Keywords will be searched based on your culture, region, and jargon.[68] For example, when going on a vacation you have to do separate searches for your airline ticket, your hotel reservations, and your car rental. With Web 3.0 you will be able to do all of this in one simple search. The search engine will present the results in a comparative and easily navigated way to the user.
[http://en.wikipedia.org/wiki/Web_2.0]

web.Web-2.0

name::
* McsEngl.web.Web-2.0@cptIt,
* McsEngl.web2@cptIt,
* McsEngl.web20@cptIt19i,
* McsEngl.web-2.0@cptIt19i,

_DESCRIPTION:
The term Web 2.0 is associated with web applications that facilitate participatory information sharing, interoperability, user-centered design,[1] and collaboration on the World Wide Web. A Web 2.0 site allows users to interact and collaborate with each other in a social media dialogue as creators (prosumers) of user-generated content in a virtual community, in contrast to websites where users (consumers) are limited to the passive viewing of content that was created for them. Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, web applications, mashups and folksonomies.

The term is closely associated with Tim O'Reilly because of the O'Reilly Media Web 2.0 conference in late 2004.[2][3] Although the term suggests a new version of the World Wide Web, it does not refer to an update to any technical specification, but rather to cumulative changes in the ways software developers and end-users use the Web. Whether Web 2.0 is qualitatively different from prior web technologies has been challenged by World Wide Web inventor Tim Berners-Lee, who called the term a "piece of jargon",[4] precisely because he intended the Web in his vision as "a collaborative medium, a place where we [could] all meet and read and write". He called it the "Read/Write Web".[5]
[http://en.wikipedia.org/wiki/Web_2.0]

web.Web-1.0

name::
* McsEngl.web.Web-1.0@cptIt,
* McsEngl.web1@cptIt,
* McsEngl.web1.0@cptIt19i,

Web 1.0, or web, refers to the first stage of the World Wide Web linking webpages with hyperlinks.
[http://en.wikipedia.org/wiki/Web_1.0]

FvMcs.language.Webpage (lwp)

_CREATED: {2013-09-20}

name::
* McsEngl.conceptIt149,
* McsEngl.language.Webpage (lwp)@cptIt,
* McsEngl.FvMcs.language.Webpage (lwp)@cptIt,
* McsEngl.language.webpage@cptIt,
* McsEngl.webpage-language@cptIt,
* McsEngl.wpglag@cptIt, {2016-08-08}
* McsEngl.wpglag@cptIt,
* McsEngl.lagWpg@cptIt,
* McsEngl.lwp@cptIt, {2016-08-08}

lwp'DESCRIPTION

_DESCRIPTION:
Webpage-language is any computer-language or set of computer-languages used to create webpages.
[HmnSynagonism.2016-08-09]

lwp'GENERIC

_GENERIC:
* computer-language#cptItsoft204#

lwp'entity#cptCore387#

name::
* McsEngl.lwp'entity@cptIt,

_ENTITY:
* web#cptItsoft19#

lwp'Archetype

name::
* McsEngl.lwp'Archetype@cptIt,
* McsEngl.lwp'archetype@cptIt,
* McsEngl.lwp'archetype-doc@cptIt,
* McsEngl.lwp'archo-doc@cptIt,

_DESCRIPTION:
Lwp-archetype is the-document we want to map with the-language.

lwparcho'USER-INTERFACE-COMPONENT (lwpuic)

name::
* McsEngl.lwparcho'USER-INTERFACE-COMPONENT (lwpuic)@cptIt,
* McsEngl.lwpui'component@cptIt,
* McsEngl.lwpuic@cptIt,
* McsEngl.lwpui@cptIt,
* McsEngl.lwpui'component@cptIt,
* McsEngl.component.lwpui@cptIt,

lwpuic'Resource

name::
* McsEngl.lwpuic'Resource@cptIt,

_ADDRESS.WPG:
* https://github.com/felipeccastro/html-component/ Component-based UIs with vanilla ES6 and Custom Elements
* http://getbootstrap.com/components//
* https://design.google.com//
* http://google.github.io/material-design-icons//
* https://material.google.com//
* https://en.wikipedia.org/wiki/List_of_graphical_user_interface_elements,

lwpuic'web-components (wbc)

name::
* McsEngl.lwpuic'web-components (wbc)@cptIt,
* McsEngl.web-components@cptIt,
* McsEngl.wbc@cptIt,

_DESCRIPTION:
Web Components consists of several separate technologies. You can think of Web Components as reusable user interface widgets that are created using open Web technology. They are part of the browser, and so they do not need external libraries like jQuery or Dojo. An existing Web Component can be used without writing code, simply by adding an import statement to an HTML page. Web Components use new or still-developing standard browser capabilities.
[https://developer.mozilla.org/en-US/docs/Web/Web_Components]
===
"Web components" is an umbrella term for 4 different technologies:
- Custom Elements: allow creation of new element tags, with custom behavior
- HTML Imports: allow importing an .html file like we can already do with .css and .js files
- Template tags: standard approach for holding DOM based templates
- Shadow DOM: allow creating an internal DOM for each element, out of the document's main scope.
While all these technologies are great, it's not very easy to use them on all browsers today. Shadow DOM is very hard to polyfill, and attempts to do it are either slow and/or very complex. HTML Imports (polyfilled) can have performance issues when there are too many dependencies (each dependency being a new call to the server), and is still subject to spec changes.
The goal of this project is to enable the usage of web components today, by replacing these tricky technologies with safer alternatives, while keeping a simple and modern workflow for development.
[https://github.com/felipeccastro/html-component/#web-components-technologies]

wbc'Custom-elements#ql:custom-elements-html#

name::
* McsEngl.wbc'Custom-elements@cptIt,

wbc'Relation-to-react#ql:relation-webcomponents-to-react-cpt#

name::
* McsEngl.wbc'Relation-to-react@cptIt,

wbc'Resource

name::
* McsEngl.wbc'Resource@cptIt,

_ADDRESS.WPG:
* https://developer.mozilla.org/en-US/docs/Web/Web_Components,
* http://webcomponents.org//
* https://github.com/w3c/webcomponents//
===
* {2017-04-29} https://hackernoon.com/why-im-moving-on-to-web-components-and-not-looking-back-aa8028c99c83,

SPECIFIC

_SPECIFIC:
* accordion,
* button,
* checkbox,
* checkbos.radio (radiobutton)
* container,
* datepicker,
* dialog,
* dialog.modal,
* image,
* image.flag,
* image.icon,
* input-textfield,
* loader,
* menu,
* progressbar,
* slider,
* step,
* table,
* tooltip,
* tree,
* list,

lwpuic.lib.RIOT (riotjs)

name::
* McsEngl.lwpuic.lib.RIOT (riotjs)@cptIt,

_DESCRIPTION:
Simple and elegant component-based UI library
CUSTOM TAGS • ENJOYABLE SYNTAX • ELEGANT API • TINY SIZE
[http://riotjs.com/]

riotjs'Resource

name::
* McsEngl.riotjs'Resource@cptIt,

_ADDRESS.WPG:
* https://github.com/riot/riot/
* http://riotjs.com//

lwpuic.lib.SKATE

name::
* McsEngl.lwpuic.lib.SKATE@cptIt,
* McsEngl.skatejs@cptIt,

_ADDRESS.WPG:
* https://github.com/skatejs/skatejs/ SkateJS is a web component library designed to give you an augmentation of the web component specs focusing on a functional rendering pipeline, clean property / attribute semantics and a small footprint. http://skate.js.org,
* https://hackernoon.com/building-a-custom-tag-input-with-skate-js-fbd4cdf744f#.q76gv7u83,

lwpuic.3D

name::
* McsEngl.lwpuic.3D@cptIt,
* McsEngl.3D.lwp@cptIt,
* McsEngl.3D-lwp@cptIt,

_ADDRESS.WPG:
* http://keithclark.co.uk/articles/creating-3d-worlds-with-html-and-css/
* https://www.sitepoint.com/javascript-3d-minecraft-editor//

lwpuic.Accordion

name::
* McsEngl.lwpuic.Accordion@cptIt,
* McsEngl.accordion.lwp@cptIt,
* McsEngl.lwpui'accordion@cptIt,
* McsEngl.accordion.lwpui@cptIt,

_DESCRIPTION:
Accordion
Displays collapsible content panels for presenting information in a limited amount of space.
[https://jqueryui.com/accordion/]

lwpuic.Button

name::
* McsEngl.lwpuic.Button@cptIt,
* McsEngl.button.lwp@cptIt,
* McsEngl.lwpui'dialog@cptIt,
* McsEngl.lwpui'window@cptIt,
* McsEngl.dialog.lwpui@cptIt,

_DESCRIPTION:
A button indicates a possible user action
[http://semantic-ui.com/elements/button.html]

_SPECIFIC:
* modal
* modalNo

lwpuic.Chart

name::
* McsEngl.lwpuic.Chart@cptIt,
* McsEngl.chart.lwp@cptIt,
* McsEngl.chart-uic-of-webpage@cptIt,
* McsEngl.chart.lwpuic@cptIt,
* McsEngl.diagram.web@cptIt,
* McsEngl.graph.web@cptIt,
* McsEngl.lwpuic'chart@cptIt,
* McsEngl.web-chart@cptIt,
* McsEngl.wpg-chart@cptIt,

_ADDRESS.WPG:
* bar-chart https://codepen.io/Muthukrishnan/pen/vGoZVz,
* https://image-charts.com/documentation,
* https://github.com/chartjs/Chart.js,
- http://www.chartjs.org// Simple HTML5 Charts using the <canvas> tag,
- https://www.sitepoint.com/introduction-chart-js-2-0-six-examples//
* https://www.highcharts.com/demo/line-basic,

lwp'image-chart

name::
* McsEngl.lwp'image-chart@cptIt,

_ADDRESS.WPG:
* https://image-charts.com/documentation,

_CODE:
<img src="https://image-charts.com/chart?chs=400x200&cht=lc&chd=t:40,60,60,45,47,75,70,72">
//start:  https://image-charts.com/chart?
//size  chs=400x200&
//type  cht=lc&
//data  chd=t:40,60,60,45,47,75,70,72
//title  chtt=Site+visitors+by+month+January+to+July

lwpuic.Dialog

name::
* McsEngl.lwpuic.Dialog@cptIt,
* McsEngl.dialog.lwp@cptIt,
* McsEngl.lwpui'dialog@cptIt,
* McsEngl.dialog.lwpui@cptIt,

_DESCRIPTION:
This is the default dialog which is useful for displaying information. The dialog window can be moved, resized and closed with the 'x' icon.
[https://jqueryui.com/dialog/]

lwpuic.Font

name::
* McsEngl.lwpuic.Font@cptIt,
* McsEngl.font.lwp@cptIt,
* McsEngl.lwpui'font@cptIt,
* McsEngl.font.lwpui@cptIt,
* McsEngl.font.webpage@cptIt,
* McsEngl.web-font@cptIt,
* McsEngl.webfont@cptIt,
* McsEngl.webpage-font@cptIt,

font-face-css-rule#ql:font-face-css-cpt#

lwpuic.Icon

name::
* McsEngl.lwpuic.Icon@cptIt,
* McsEngl.icon.lwp@cptIt,
* McsEngl.lwpui'icon@cptIt,
* McsEngl.icon.lwpui@cptIt,
* McsEngl.icon.webpage@cptIt,
* McsEngl.web-icon@cptIt,
* McsEngl.webpage-icon@cptIt,

_ADDRESS.WPG:
* http://www.w3schools.com/icons/icons_reference.asp,

icnWpg.Font-awesome

name::
* McsEngl.icnWpg.Font-awesome@cptIt,
* McsEngl.font-awesome-icons@cptIt,

_ADDRESS.WPG:
* http://fontawesome.io/icons//
* https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.6.3/css/font-awesome.min.css,

_CODE.LWP:
<!DOCTYPE html>
<html>
<head>
<title>Font Awesome Icons</title>
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.6.3/css/font-awesome.min.css">
</head>
<body>

<h1>fa fa-angle-down</h1>

<i class="fa fa-angle-down"></i>
<i class="fa fa-angle-down" style="font-size:24px"></i>
<i class="fa fa-angle-down" style="font-size:36px"></i>
<i class="fa fa-angle-down" style="font-size:48px;color:red"></i>
<br>

<p>Used on a button:</p>
<button style="font-size:24px">Button <i class="fa fa-angle-down"></i></button>

<p>Unicode:</p>
<i style="font-size:24px" class="fa"></i>

</body>
</html>
[http://www.w3schools.com/icons/tryit.asp?filename=tryicons_fa-angle-down]

icnWpg.Icon-moon

name::
* McsEngl.icnWpg.Icon-moon@cptIt,
* McsEngl.icon-moon@cptIt,

_ADDRESS.WPG:
* https://icomoon.io//

icnWpg.Material-design

name::
* McsEngl.icnWpg.Material-design@cptIt,
* McsEngl.material-design-icons@cptIt,

_ADDRESS.WPG:
* http://google.github.io/material-design-icons//
* https://design.google.com/icons//
* https://materialdesignicons.com/getting-started,

_CODE.LWP:
<!DOCTYPE html>
<html>
<head>
<link rel="stylesheet" href="https://fonts.googleapis.com/icon?family=Material+Icons">
</head>
<body>

<i class="material-icons">cloud</i>
<i class="material-icons" style="font-size:48px;">cloud</i>
<i class="material-icons" style="font-size:60px;color:red;">cloud</i>

</body>
</html>
[http://www.w3schools.com/icons/google_icons_intro.asp]
===
/* fallback */
@font-face {
font-family: 'Material Icons';
font-style: normal;
font-weight: 400;
src: local('Material Icons'), local('MaterialIcons-Regular'), url(https://fonts.gstatic.com/s/materialicons/v18/2fcrYFNaTjcS6g4U3t-Y5ZjZjT5FdEJ140U2DJYC3mY.woff2) format('woff2');
}

.material-icons {
font-family: 'Material Icons';
font-weight: normal;
font-style: normal;
font-size: 24px;
line-height: 1;
letter-spacing: normal;
text-transform: none;
display: inline-block;
white-space: nowrap;
word-wrap: normal;
direction: ltr;
-webkit-font-feature-settings: 'liga';
-webkit-font-smoothing: antialiased;
}

icnWpg.MaterialDesignIcons Austin Andrews

name::
* McsEngl.icnWpg.MaterialDesignIcons Austin Andrews@cptIt,

_ADDRESS.WPG:
* https://materialdesignicons.com//
* https://materialdesignicons.com/getting-started,
* https://cdn.materialdesignicons.com/1.7.22//

_DESCRIPTION:
To reference the icons add the line below into the head tag.
<link href="css/materialdesignicons.min.css" media="all" rel="stylesheet" type="text/css" />

To use the icons inline you can use the syntax below.
<i class="mdi mdi-bell"></i> <!-- bell -->

lwpuic.Image

name::
* McsEngl.lwpuic.Image@cptIt,
* McsEngl.image.lwp@cptIt,
* McsEngl.lwpui'image@cptIt,
* McsEngl.image.lwpui@cptIt,

_ADDRESS.WPG:
* https://davidwalsh.name/css-circles,

lwpuic.Map

name::
* McsEngl.lwpuic.Map@cptIt,
* McsEngl.map.lwp@cptIt,
* McsEngl.lwpui'map@cptIt,
* McsEngl.map.lwpui@cptIt,

_ADDRESS.WPG:
* https://mapbuildr.com// Google Maps — Simplified
Enrich your website with a Google Map

lwpuic.Scrollbar

name::
* McsEngl.lwpuic.Scrollbar@cptIt,
* McsEngl.scrollbar.web@cptIt,

_ADDRESS.WPG:
* https://annexare.com/js/scrolly/,
* https://github.com/wieringen/tinyscrollbar,

lwpuic.Slider

name::
* McsEngl.lwpuic.Slider@cptIt,
* McsEngl.slider.lwp@cptIt,
* McsEngl.lwpui'slider@cptIt,
* McsEngl.slider.lwpui@cptIt,

_DESCRIPTION:
Drag a handle to select a numeric value.
[https://jqueryui.com/slider/]

lwpuic.Step

name::
* McsEngl.lwpuic.Step@cptIt,
* McsEngl.step.lwp@cptIt,
* McsEngl.lwpui'step@cptIt,
* McsEngl.step.lwpui@cptIt,

_DESCRIPTION:
A step shows the completion status of an activity in a series of activities
[http://semantic-ui.com/elements/step.html]

lwpuic.Syntax-highlighter

name::
* McsEngl.lwpuic.Syntax-highlighter@cptIt,
* McsEngl.syntax-highlighter.web@cptIt,

_ADDRESS.WPG:
* https://highlightjs.org/,

lwpuic.Table

name::
* McsEngl.lwpuic.Table@cptIt,
* McsEngl.table.lwp@cptIt,

_ADDRESS.WPG:
* https://www.sitepoint.com/dynamic-tables-json//
* http://www.terrill.ca/sorting/table_sort_example.html,
* http://tristen.ca/tablesort/demo/,

lwpuic.Tooltip

name::
* McsEngl.lwpuic.Tooltip@cptIt,
* McsEngl.tooltip.lwp@cptIt,

_ADDRESS.WPG:
* http://www.walterzorn.de/en/tooltip/tooltip_e.htm,

lwpuic.Tree

name::
* McsEngl.lwpuic.Tree@cptIt,

lwp'Document (Model; Webpage)#ql:wpage#

name::
* McsEngl.lwp'Document (Model; Webpage)@cptIt,

lwpdoc'AST

name::
* McsEngl.lwpdoc'AST@cptIt,

_ADDRESS.WPG:
* https://github.com/fkling/astexplorer, A web tool to explore the ASTs generated by various parsers. https://astexplorer.net/

lwpdoc.SPECIFIC

name::
* McsEngl.lwpdoc.SPECIFIC@cptIt,

lwpdoc.STATIC

name::
* McsEngl.lwpdoc.STATIC@cptIt,

lwpdoc.STATIC.NO

name::
* McsEngl.lwpdoc.STATIC.NO@cptIt,

lwp'Specification (spn)

name::
* McsEngl.lwp'Specification (spn)@cptIt,

lwp'Tool

name::
* McsEngl.lwp'Tool@cptIt,
* McsEngl.lwp'tool@cptIt,

_SPECIFIC:
* hml-tool,
* css-tool,
* ljb-tool,

lwptool.TESTING

name::
* McsEngl.lwptool.TESTING@cptIt,

_ADDRESS.WPG:
* Browser Automation
Nightwatch.js is an easy to use Node.js based End-to-End (E2E) testing solution for browser based apps and websites. It uses the powerful Selenium WebDriver API to perform commands and assertions on DOM elements.
- http://nightwatchjs.org//

SPECIFIC

name::
* McsEngl.lwp.specific@cptIt,
* McsEngl.lwp.dialect@cptIt,
* McsEngl.lwp.framework@cptIt,
* McsEngl.lngWpg.specific@cptIt,

_SPECIFIC:
* HML##
* HML-CSS##
* HML-CSS-LJS##
===
* CoffeeScript##
* LESS##
* java##
* JavaScript##
* MathML##
* PHP##
* SVG#ql:svg_cptresource#
* Web-IDL##

lwp.HTML (required Html)

name::
* McsEngl.lwp.HTML (required Html)@cptIt,
* McsEngl.conceptIt568,

Html'NAME

name::
* McsEngl.Html'NAME@cptIt,
* McsEngl.conceptCore637,
* McsEngl.lmh@cptIt, {2016-05-30}
* McsEngl.hml@cptIt, {2015-10-24}

* McsEngl.lngWeb.HTML@cptIt,
* McsEngl.language.markup.hypertext-(lmh)@cptIt, {2016-05-29}
* McsEngl.language.data.html@cptIt,
* McsEngl.markup-language.HTML@cptIt,
* McsEngl.html@cptIt,
* McsEngl.hypertext-markup-language@cptIt,
* McsEngl.method.data.html@cptIt,
* McsEngl.hypertext-markup-language@cptIt,
* McsEngl.wpg'code'LngHml@cptIt,
* McsEngl.hml@cptIt,
* McsEngl.lngHml@cptIt,
* McsEngl.ldh@cptIt,
====== lagoGreek:
* McsElln.Γλώσσα-Σήμανσης-Υπερκειμένου@cptIt568,

DEFINITION

HML is a-computer-language that represents the-structure and content of documents we communicate in the-web.
[hmnSngo.2016-06-11]

HTML είναι η γλώσσα βάσει της οποίας κατασκευάζονται τα hypertext κείμενα σε www
[COMPUTER GO, JAN. 1995, 74]

HTML is a markup language for hypertext which is understood by all WWW clients.
Built on top of SGML.
[www]

Html'GENERIC

_GENERIC:
* entity.model.information.method.mapping.computer-language.markup-language#cptItsoft204.12#
* entity.model.information.method.mapping.computer-language#cptItsoft458#
* entity.model.information.method.mapping#cptCore320#
* entity.model.information.method#cptCore181.67#
* entity.model.information#cptCore181#
* entity.model#cptCore437#
* entity#cptCore387#

Html'WHOLE

_WHOLE:
* webpage##

Html'Archetype

name::
* McsEngl.Html'Archetype@cptIt,
* McsEngl.hml'document@cptIt,
* McsEngl.hml'archo-doc@cptIt,

_DESCRIPTION:
Document is recorded human-information.
Its content could-be text, images, audio, and video.
Electronic-documents changed what were the-paper-documents.
Threre are NO definitions of the types and parts of documents accepted worldwide.
I defined in http://synagonism.net/hitp/ the-title-content-tree-structured-document and its representation with the-hitp-format.
[hmnSngo.2016-06-11]
===
A document, is a term usually used to describe a written or drawn representation of thoughts. Originating from the Latin Documentum meaning lesson - the verb doceo means to teach, and is pronounced similarly, in the past it was usually used as a term for a written proof used as evidence. In the computer age, a document is usually used to describe a primarily textual file, along with its structure and design, such as fonts, colors and additional images.

The modern term 'document' can no longer be defined by its transmission medium (such as paper), following the existence of electronic documents.

The formal term 'document' is defined in Library and information science and in documentation science, as a basic theoretical construct. It is everything which may be preserved or represented in order to serve as evidence for some purpose. The classical example provided by Suzanne Briet is an antelope: "An antelope running wild on the plains of Africa should not be considered a document, she rules. But if it were to be captured, taken to a zoo and made an object of study, it has been made into a document. It has become physical evidence being used by those who study it. Indeed, scholarly articles written about the antelope are secondary documents, since the antelope itself is the primary document." (Quoted from Buckland, 1998 [1]). (This view has been seen as an early expression of what now is known as actor–network theory).
[http://en.wikipedia.org/wiki/Document] {2014-03-01}

Html'MODEL (doc | webpage )

_CREATED: {2016-05-29} {2013-08-20}

name::
* McsEngl.Html'MODEL (doc | webpage )@cptIt,
* McsEngl.conceptIt1012,
* McsEngl.Htmldoc@cptIt,
* McsEngl.hml-webpage-part@cptIt, {2016-08-09}
* McsEngl.data-webpage@cptIt,
* McsEngl.hml'source-code@cptIt,
* McsEngl.web'page@cptIt,
* McsEngl.data-webPage@cptIt19i,
* McsEngl.web-page@cptIt19i,
* McsEngl.web'page@cptIt19i,
* McsEngl.wpage@cptIt,
* McsEngl.hml'document@cptIt,
* McsEngl.document-html@cptIt,
* McsEngl.hdoc@cptIt,
* McsEngl.html'doc@cptIt,
* McsEngl.html'page@cptIt, {2012-01-27}
* McsEngl.wpg@cptIt, {2013-08-20}
* McsEngl.hmldoc@cptIt,

=== _NOTES: hmldoc or webpage, NOT 'hmlwpg'
[hmnSngo.2016-06-18]

Htmldoc'DESCRIPTION

name::
* McsEngl.Htmldoc'DESCRIPTION@cptIt,

_DESCRIPTION:
The-hml-doc is the REQUIRED part of a-webpage.
It containes ALL other code.
[HmnSynagonism.2016-08-09]
===
A-webpage is a-model of a-document written in html.
This model is a-whole-part-tree of computer-characters.
[hmnSngo.2016-06-11]
===
A-webpage is a-software-document#ql:software.document@cptIt# written in html.
[hmnSngo.2015-04-20]

DEFINITION

_DESCRIPTION:

A-webpage is an-html-document#ql:html'document# (static/file or dynamic).
[hmnSngo.2014-12-21]
===
A-webpage is an-html-document#ql:html'document# (file or not).
[hmnSngo.2014-12-20]
===
A Web page or webpage is a resource of information that is suitable for the World Wide Web and can be accessed through a web browser. This information is usually in HTML or XHTML format, and may provide navigation to other web pages via hypertext links.

Web pages may be retrieved from a local computer or from a remote web server. The web server may restrict access only to a private network, e.g. a corporate intranet, or it may publish pages on the World Wide Web. Web pages are requested and served from web servers using Hypertext Transfer Protocol (HTTP).

Web pages may consist of files of static text stored within the web server's file system (static web pages), or the web server may construct the (X)HTML for each web page when it is requested by a browser (dynamic web pages). Client-side scripting can make web pages more responsive to user input once in the client browser.

A web page is a type of web document.
[http://en.wikipedia.org/wiki/Web_page]

name::
* McsEngl.webpage-doc@cptIt,
* McsEngl.lwp'modeldoc@cptIt,
* McsEngl.webpage@cptIt,
* McsEngl.lwpdoc@cptIt,
* McsEngl.wbp@cptIt, {2017-07-08}
* McsEngl.wpage@cptIt,
* McsEngl.lwpwpg@cptIt,
* McsEngl.wpgdoc@cptIt,

_DESCRIPTION:
Webpage is the-document created with the-webpage-langauge|s, which we view on browsers and communicate in the-www.
[hknm.2016-08-09]

_DESCRIPTION:
a web page (an HTML file which references the usual CSS files, JavaScript files, images, etc.)
[https://medium.com/developers-writing/building-a-desktop-application-with-electron-204203eeb658]

What is the average lifespan of webpage? Predictably, estimates vary and vary over time. A 1997 special report in Scientific American claimed 44 days. A subsequent 2001 academic study in IEEE Computer suggested 75 days. More recently, in 2003, a Washington Post article indicated that the number was 100 days.
[http://blogs.loc.gov/thesignal/2011/11/the-average-lifespan-of-a-webpage/]

Htmldoc'GENERIC

_GENERIC:
* document-software#ql:software.document@cptIt#
* semistructured-information#ql:semistructured_information@cptCore#

Htmldoc'code'Counter

name::
* McsEngl.Htmldoc'code'Counter@cptIt,
* McsEngl.hit-counter-it@cptIt,
* McsEngl.web-counter-it@cptIt,

_ADDRESS.WPG:
* http://statcounter.com// (to steki)
* http://www.hitwebcounter.com// no reg
* online users couter free: http://www.myonlineusers.com/?gclid=CNWP74nJprYCFcbKtAodPVcAvA,
* http://www.amazingcounters.com//
* http://www.supercounters.com/
* http://www.reliablecounter.com// no reg

Htmldoc'WHOLE

_WHOLE:
* website#ql:website-19i#

Htmldoc'Address#ql:url@cptIt67i#

name::
* McsEngl.Htmldoc'Address@cptIt,

Htmldoc'Browser-compatibility

name::
* McsEngl.Htmldoc'Browser-compatibility@cptIt,

Htmldoc'Language

name::
* McsEngl.Htmldoc'Language@cptIt,

_SPECIFIC:
* CSS##
* HTML##
* Browser-JavaScript##
* hmlwpg'LngCss (css)#cptItsoft576#
* hmlwpg'LngHml#cptItsoft568#
* hmlwpg'LngJs (ljb)#ql:ljs#

Htmldoc'Syntax-tree

name::
* McsEngl.Htmldoc'Syntax-tree@cptIt,
* McsEngl.wpg'syntax-tree@cptIt,

Htmldoc'Unit (character) (Htmlchr)

name::
* McsEngl.Htmldoc'Unit (character) (Htmlchr)@cptIt,
* McsEngl.char.html@cptIt,
* McsEngl.hmlchr@cptIt, {2017-05-07}
* McsEngl.htmlchar@cptIt,
* McsEngl.chr.html@cptIt,
* McsEngl.html'character@cptIt,
* McsEngl.html'chr@cptIt,
* McsEngl.html'symbol@cptIt,
* McsEngl.symbol.html@cptIt,

Html'character'program

name::
* McsEngl.Html'character'program@cptIt,

_TEXT_TO_HTML:
* https://mothereff.in/html-entities,
* http://unicode-table.com/en/tools/encoder//

Html'character-reference

name::
* McsEngl.Html'character-reference@cptIt,
* McsEngl.conceptIt568.2,
* McsEngl.html'eschape-character@cptIt,
* McsEngl.htmlcharref@cptIt,
* McsEngl.character-entity-in-html@cptIt568,
* McsEngl.character-reference-in-html@cptIt568,
* McsEngl.special-character-in-html@cptIt568,
* McsEngl.html'special-character@cptIt568,
* McsEngl.html'entity@cptIt,
* McsEngl.html-entity@cptIt,
* McsEngl.html-character-entity@cptIt,
* McsEngl.sblHml@cptIt,
* McsEngl.symbol.html.decimal@cptIt, [`]
* McsEngl.symbol.html.hexadecimal@cptIt, [–]
* McsEngl.symbol.html.named@cptIt, [&name;]

_ADDRESS.WPG:
* http://dev.w3.org/html5/html-author/charref,
* http://entity-lookup.leftlogic.com//

_DEFINITION:
Character references are a form of markup for representing single individual characters. There are three types of character references:
* NAMED character-references      (†)
* DECIMAL numeric-character-references    (†)
* HEXADECIMAL numeric-character-references  (†)
Note: Character references are not themselves text, and no part of a character reference is text.
[http://dev.w3.org/html5/markup/spec.html#syntax-charref]
===
Markup languages are typically defined in terms of UCS or Unicode characters. That is, a document consists, at its most fundamental level of abstraction, of a sequence of characters, which are abstract units that exist independently of any encoding.
Ideally, when the characters of a document utilizing a markup language are encoded for storage or transmission over a network as a sequence of bits, the encoding that is used will be one that supports representing each and every character in the document, if not in the whole of Unicode, directly as a particular bit sequence.
Sometimes, though, for reasons of convenience or due to technical limitations, documents are encoded with an encoding that cannot represent some characters directly. For example, the widely used encodings based on ISO 8859 can only represent, at most, 256 unique characters as one 8-bit byte each.
Documents are rarely, in practice, ever allowed to use more than one encoding internally, so the onus is usually on the markup language to provide a means for document authors to express unencodable characters in terms of encodable ones. This is generally done through some kind of "escaping" mechanism.
The SGML-based markup languages allow document authors to use special sequences of characters from the ASCII range (the first 128 code points of Unicode) to represent, or reference, any Unicode character, regardless of whether the character being represented is directly available in the document's encoding. These special sequences are character references.
Character references that are based on the referenced character's UCS or Unicode code point are called numeric character references. In HTML 4 and in all versions of XHTML and XML, the code point can be expressed either as a decimal (base 10) number or as a hexadecimal (base 16) number. The syntax is as follows:
Character U+0026 (ampersand), followed by character U+0023 (number sign), followed by one of the following choices:
one or more decimal digits zero (U+0030) through nine (U+0039); or
character U+0078 ("x") followed by one or more hexadecimal digits, which are zero (U+0030) through nine (U+0039), Latin capital letter A (U+0041) through F (U+0046), and Latin small letter a (U+0061) through f (U+0066);
all followed by character U+003B (semicolon). Older versions of HTML disallowed the hexadecimal syntax.
The characters that comprise a numeric character reference can be represented in every character encoding used in computing and telecommunications today, so there is no risk of the reference itself being unencodable.
There is another kind of character reference called a character entity reference, which allows a character to be referred to by a name instead of a number. (Naming a character creates a character entity.) HTML defines some character entities, but not many; all other characters can only be included by direct encoding or using NCRs.
[http://en.wikipedia.org/wiki/Numeric_character_reference#Discussion] 2015-04-21
===
Character entities in HTML (htmlchar):
* http://en.wikip.../List_of_XML_and_HTML_character_entity_references:
The HTML 4 DTD explicitly declares 252 character entities. HTML processors must honor the HTML DTD's declarations, even if the DTD is not mentioned in the HTML document. HTML does not allow other named entities to be defined.

HTML document authors who have been exposed to XML and XHTML often overlook the fact that the apos entity is not defined in HTML. rsquo is the best alternative in this case.

In the table below, the HTML built-in character entities are listed. The columns are as in the XML entity table, above, except "Standard" column indicates the first version of HTML that includes the entity. The version is one of the major releases of the HTML spec: 2.0, 3.2, or 4.0. HTML 4.01 didn't introduce any new entities.

Special Characters
Escape Sequences
Four characters of the ASCII character set
- the left angle bracket (<),
- the right angle bracket (>),
- the ampersand (&) and
- the double quote (")
have special meaning within HTML and therefore cannot be used ``as is'' in text. (The angle brackets are used to indicate the beginning and end of HTML tags, and the ampersand is used to indicate the beginning of an escape sequence.) To use one of these characters in an HTML document, you must enter its escape sequence instead:
< the escape sequence for <
> the escape sequence for >
& the escape sequence for &
" the escape sequence for "
Additional escape sequences support accented characters. For example:
ö the escape sequence for a lowercase o with an umlaut: _
ñ the escape sequence for a lowercase n with an tilde:
È the escape sequence for an uppercase E with a grave accent:
A full list of supported characters can be found at CERN.


Æ  the AE together.
     space.



®
9642      μικρό τετράγωνο γεμάτο
9643      μικρό τετράγωνο άδειο
9655      τρίγωνο δεξιά άδειο
9658      τρίγωνο δεξιά
9670      ρόμβος γεμάτος
9672      διπλός ρόμβος
9679      κύκλος γεμάτος
9678      διπλός κύκλος
9702      μικρός κύκλος άδειος


ANCIENT-GREEK:
<FONT FACE="Palatino Linotype" SIZE="6">ἁ</FONT>

This page is a quick reference for the "standard" mathematical symbols in HTML that should work on most browsers, and is intended mainly for people editing mathematical articles on Wikipedia.

* Numbers: 1/4 ½ 3/4 ^(1) ² ³ ¼ ½ ¾ ¹ ² ³
* Analysis: ? ? ? ? ? ? ? ? I R ∂ ∫ ∑ ∏ √ ∞ ∇ ℘ ℑ ℜ
* Arrows: ? ? ? ? ? ? ? ? ? ? ? ← ↓ → ↑ ↔ ↵ ⇐ ⇓ ⇒ ⇑ ⇔
* Logic: ¬ ? ? ? ? ¬ ∧ ∨ ∃ ∀
* Sets: ? ? ? ? ? ? ? ? ? ? ? ? ∈ ∉ ∋ ∅ ⊆ ⊇ ⊃ ⊂ ⊄ ∪ ∩ ℵ
* Relations: ? ? ? < > ? ? ? ? ≠ ≤ ≥ < > ≡ ≅ ≈ ∝
* Binary operations: ± - ? ? ? ? ? ? ? ± − × ÷ ⁄ ⊥ ⊕ ⊗ ∗
* Delimiters: ? ? ? ? ? ? « » ⌈ ⌉ ⌊⌋ ⟨ ⟩ « »
* Miscellaneous: † ¦ ? ? ? • ? ? ? ? † ¦ ∠ ∴ ◊ • ♠ ♣ ♥ ♦
* Punctuation: ? ? ? ^ ° ? · … – — ′ ″ ‾ ˆ ° ⋅ · … – —
* Spacing: thin (), n-width (), m-width (), and non-breaking spaces ( ).        
* Greek: α β γ Α Β Γ etc. α β γ
Α Β Γ etc.
* Unicode: ⊢ (for example) gives the character ? with unicode number x22A2 (hexadecimal). Warning: many of the more obscure unicode characters do not yet work on all browsers.

It might be easier to just copy and paste the symbols instead of using them by reference.
[http://en.wikipedia.org/wiki/Wikipedia:Mathematical_symbols]

Htmlcharref.NAMED (&name;)

name::
* McsEngl.Htmlcharref.NAMED (&name;)@cptIt,
* McsEngl.char.html.named@cptIt,
* McsEngl.html'character-entity-reference@cptIt,
* McsEngl.html'entity@cptIt,
* McsEngl.symbol.html.named@cptIt,
* McsEngl.html'character-reference.named@cptIt,
* McsEngl.html'named-character-reference@cptIt,
* McsEngl.sblHmlNamed@cptIt,

_CODE.HML:
&name;

_ADDRESS.WPG:
* http://en.wikipedia.org/wiki/List_of_XML_and_HTML_character_entity_references,

_DESCRIPTION:
Character entity references, or entities for short, provide a method of entering characters that cannot be expressed in the document's character encoding or that cannot easily be entered on a keyboard. Entities are case-sensitive and take the form &name;. Examples of entities include © for the copyright symbol and Α for the Greek capital letter alpha.
[http://htmlhelp.com/reference/html40/entities/]


NAMED-CHARACTER-REFERENCE:
Name    Char  Unicode cPoint  Standard  Description
* sblHml.Aacute ? U+00C1 (193) HTML 2.0 sblHml.Latin_capital_letter a with acute
* sblHml.aacute ? U+00E1 (225) HTML 2.0 sblHml.Latin_small_letter a with acute
* sblHml.Acirc ? U+00C2 (194) HTML 2.0 sblHml.Latin_capital_letter a with_circumflex
* sblHml.acirc ? U+00E2 (226) HTML 2.0 sblHml.Latin_small_letter a with_circumflex
* sblHml.acute ? U+00B4 (180) HTML 3.2 sblHml.acute_accent
* sblHml.AElig ? U+00C6 (198) HTML 2.0 sblHml.Latin_capital_letter ae
* sblHml.aelig ? U+00E6 (230) HTML 2.0 sblHml.Latin_lowercase_ligature ae
* sblHml.Agrave ? U+00C0 (192) HTML 2.0 sblHml.Latin_capital_letter a with grave
* sblHml.agrave ? U+00E0 (224) HTML 2.0 sblHml.Latin_small_letter a with grave
* sblHml.alefsym ? U+2135 (8501) HTML 4.0 sblHml.alef_symbol
* sblHml.Alpha Α U+0391 (913) HTML 4.0 Greek_capital_letter alpha
* sblHml.alpha α U+03B1 (945) HTML 4.0 Greek_small_letter alpha
* sblHml.amp & U+0026 (38) HTML 2.0 sblHml.ampersand
* sblHml.and ? U+2227 (8743) HTML 4.0 sblHml.logical_and
* sblHml.ang ? U+2220 (8736) HTML 4.0 sblHml.angle
* sblHml.Aring ? U+00C5 (197) HTML 2.0 sblHml.Latin_capital_letter a with ring above
* sblHml.aring ? U+00E5 (229) HTML 2.0 sblHml.Latin_small_letter a with ring above
* sblHml.asymp ? U+2248 (8776) HTML 4.0 sblHml.almost_equal_to
* sblHml.Atilde ? U+00C3 (195) HTML 2.0 sblHml.Latin_capital_letter a with tilde
* sblHml.atilde ? U+00E3 (227) HTML 2.0 sblHml.Latin_small_letter a with tilde
* sblHml.Auml ? U+00C4 (196) HTML 2.0 sblHml.Latin_capital_letter a with diaeresis
* sblHml.auml ? U+00E4 (228) HTML 2.0 sblHml.Latin_small_letter a with diaeresis
* sblHml.bdquo „ U+201E (8222) HTML 4.0 sblHml.double_low_9_quotation_mark
* sblHml.Beta Β U+0392 (914) HTML 4.0 Greek_capital_letter beta
* sblHml.beta β U+03B2 (946) HTML 4.0 Greek_small_letter beta
* sblHml.brvbar ¦ U+00A6 (166) HTML 3.2 sblHml.broken_bar
* sblHml.bull • U+2022 (8226) HTML 4.0 sblHml.bullet
* sblHml.cap ? U+2229 (8745) HTML 4.0 sblHml.intersection
* sblHml.Ccedil ? U+00C7 (199) HTML 2.0 sblHml.Latin_capital_letter_c with_cedilla
* sblHml.ccedil ? U+00E7 (231) HTML 2.0 sblHml.Latin_small_letter_c with_cedilla
* sblHml.cedil ? U+00B8 (184) HTML 3.2 sblHml.cedilla
* sblHml.cent ? U+00A2 (162) HTML 3.2 sblHml.cent_sign
* sblHml.chi χ U+03C7 (967) HTML 4.0 Greek_small_letter_chi
* sblHml.Chi Χ U+03A7 (935) HTML 4.0 Greek_capital_letter_chi
* sblHml.circ ? U+02C6 (710) HTML 4.0 sblHml.modifier_letter_circumflex accent
* sblHml.clubs ? U+2663 (9827) HTML 4.0 sblHml.black_club_suit
* sblHml.cong ? U+2245 (8773) HTML 4.0 sblHml.congruent_to
* sblHml.copy © U+00A9 (169) HTML 3.2 sblHml.copyright_sign
* sblHml.crarr ? U+21B5 (8629) HTML 4.0 sblHml.downwards_arrow_with_corner_leftwards
* sblHml.cup ? U+222A (8746) HTML 4.0 sblHml.union
* sblHml.curren ¤ U+00A4 (164) HTML 3.2 sblHml.currency_sign
* sblHml.dagger † U+2020 (8224) HTML 4.0 sblHml.dagger
* sblHml.Dagger ‡ U+2021 (8225) HTML 4.0 sblHml.double_dagger
* sblHml.darr ? U+2193 (8595) HTML 4.0 sblHml.downwards_arrow
* sblHml.dArr ? U+21D3 (8659) HTML 4.0 sblHml.downwards_double_arrow
* sblHml.deg ° U+00B0 (176) HTML 3.2 sblHml.degree_sign
* sblHml.Delta Δ U+0394 (916) HTML 4.0 Greek_capital_letter delta
* sblHml.delta δ U+03B4 (948) HTML 4.0 Greek_small_letter delta
* sblHml.diams ? U+2666 (9830) HTML 4.0 sblHml.sblHml.black_diamond_suit
* sblHml.divide ? U+00F7 (247) HTML 3.2 sblHml.division_sign
* sblHml.Eacute ? U+00C9 (201) HTML 2.0 sblHml.Latin_capital_letter e with acute
* sblHml.eacute ? U+00E9 (233) HTML 2.0 sblHml.Latin_small_letter e with acute
* sblHml.Ecirc ? U+00CA (202) HTML 2.0 sblHml.Latin_capital_letter e with_circumflex
* sblHml.ecirc ? U+00EA (234) HTML 2.0 sblHml.Latin_small_letter e with_circumflex
* sblHml.Egrave ? U+00C8 (200) HTML 2.0 sblHml.Latin_capital_letter e with grave
* sblHml.egrave ? U+00E8 (232) HTML 2.0 sblHml.Latin_small_letter e with grave
* sblHml.empty ? U+2205 (8709) HTML 4.0 sblHml.empty_set
* sblHml.emsp ? U+2003 (8195) HTML 4.0 sblHml.em_space [2]
* sblHml.ensp ? U+2002 (8194) HTML 4.0 sblHml.en_space [1]
* sblHml.Epsilon Ε U+0395 (917) HTML 4.0 Greek_capital_letter epsilon
* sblHml.epsilon ε U+03B5 (949) HTML 4.0 Greek_small_letter epsilon
* sblHml.equiv ? U+2261 (8801) HTML 4.0 sblHml.identical_to (equivalent to)
* sblHml.eta η U+03B7 (951) HTML 4.0 Greek_small_letter eta
* sblHml.Eta Η U+0397 (919) HTML 4.0 Greek_capital_letter eta
* sblHml.eth ? U+00F0 (240) HTML 2.0 Latin_small_letter eth
* sblHml.ETH ? U+00D0 (208) HTML 2.0 sblHml.Latin_capital_letter eth
* sblHml.Euml ? U+00CB (203) HTML 2.0 sblHml.Latin_capital_letter e with diaeresis
* sblHml.euml ? U+00EB (235) HTML 2.0 sblHml.Latin_small_letter e with diaeresis
* sblHml.euro € U+20AC (8364) HTML 4.0 sblHml.euro_sign
* sblHml.exist ? U+2203 (8707) HTML 4.0 sblHml.there_exists
* sblHml.fnof ƒ U+0192 (402) HTML 4.0 Latin_small_letter f with hook
* sblHml.forall ? U+2200 (8704) HTML 4.0 sblHml.for_all
* sblHml.frac12 ½ U+00BD (189) HTML 3.2 sblHml.vulgar_fraction_one_half
* sblHml.frac14 ? U+00BC (188) HTML 3.2 sblHml.vulgar_fraction_one_quarter
* sblHml.frac34 ? U+00BE (190) HTML 3.2 sblHml.vulgar_fraction_three_quarters
* sblHml.frasl ? U+2044 (8260) HTML 4.0 sblHml.fraction_slash
* sblHml.Gamma Γ U+0393 (915) HTML 4.0 Greek_capital_letter gamma
* sblHml.gamma γ U+03B3 (947) HTML 4.0 Greek_small_letter gamma
* sblHml.ge ? U+2265 (8805) HTML 4.0 sblHml.greater_than_or_equal_to
* sblHml.gt > U+003E (62) HTML 2.0 sblHml.greater_than_sign
* sblHml.harr ? U+2194 (8596) HTML 4.0 sblHml.left_right_arrow
* sblHml.hArr ? U+21D4 (8660) HTML 4.0 sblHml.left_right_double_arrow
* sblHml.hearts ? U+2665 (9829) HTML 4.0 sblHml.sblHml.black_heart_suit
* sblHml.hellip … U+2026 (8230) HTML 4.0 sblHml.horizontal_ellipsis
* sblHml.Iacute ? U+00CD (205) HTML 2.0 sblHml.Latin_capital_letter i with acute
* sblHml.iacute ? U+00ED (237) HTML 2.0 Latin_small_letter i with acute
* sblHml.Icirc ? U+00CE (206) HTML 2.0 sblHml.Latin_capital_letter i with_circumflex
* sblHml.icirc ? U+00EE (238) HTML 2.0 Latin_small_letter i with_circumflex
* sblHml.iexcl ? U+00A1 (161) HTML 3.2 sblHml.inverted_exclamation_mark
* sblHml.Igrave ? U+00CC (204) HTML 2.0 sblHml.Latin_capital_letter i with grave
* sblHml.igrave ? U+00EC (236) HTML 2.0 Latin_small_letter i with grave
* sblHml.image ? U+2111 (8465) HTML 4.0 sblHml.black_letter_capital_i
* sblHml.infin ? U+221E (8734) HTML 4.0 sblHml.infinity
* sblHml.int ? U+222B (8747) HTML 4.0 sblHml.integral
* sblHml.Iota Ι U+0399 (921) HTML 4.0 Greek_capital_letter iota
* sblHml.iota ι U+03B9 (953) HTML 4.0 Greek_small_letter iota
* sblHml.iquest ? U+00BF (191) HTML 3.2 sblHml.inverted_question_mark
* sblHml.isin ? U+2208 (8712) HTML 4.0 sblHml.element_of
* sblHml.Iuml ? U+00CF (207) HTML 2.0 sblHml.Latin_capital_letter i with diaeresis
* sblHml.iuml ? U+00EF (239) HTML 2.0 Latin_small_letter i with diaeresis
* sblHml.Kappa Κ U+039A (922) HTML 4.0 Greek_capital_letter kappa
* sblHml.kappa κ U+03BA (954) HTML 4.0 Greek_small_letter kappa
* sblHml.Lambda Λ U+039B (923) HTML 4.0 Greek_capital_letter_lambda
* sblHml.lambda λ U+03BB (955) HTML 4.0 Greek_small_letter_lambda
* sblHml.lang ? U+2329 (9001) HTML 4.0 sblHml.left_pointing_angle_bracket
* sblHml.laquo « U+00AB (171) HTML 3.2 sblHml.left_pointing_double_angle_quotation_mark
* sblHml.larr ? U+2190 (8592) HTML 4.0 sblHml.leftwards_arrow
* sblHml.lArr ? U+21D0 (8656) HTML 4.0 sblHml.leftwards_double_arrow
* sblHml.lceil ? U+2308 (8968) HTML 4.0 sblHml.left_ceiling
* sblHml.ldquo “ U+201C (8220) HTML 4.0 sblHml.left_double_quotation_mark
* sblHml.le ? U+2264 (8804) HTML 4.0 sblHml.less_than_or_equal_to
* sblHml.lfloor ? U+230A (8970) HTML 4.0 sblHml.left_floor
* sblHml.lowast ? U+2217 (8727) HTML 4.0 sblHml.asterisk_operator
* sblHml.loz ? U+25CA (9674) HTML 4.0 sblHml.lozenge
* sblHml.lrm ? U+200E (8206) HTML 4.0 sblHml.left_to_right_mark
* sblHml.lsaquo ‹ U+2039 (8249) HTML 4.0 sblHml.single_left_pointing_angle_quotation_mark
* sblHml.lsquo ‘ U+2018 (8216) HTML 4.0 sblHml.left_single_quotation_mark
* sblHml.lt < U+003C (60) HTML 2.0 sblHml.less_than_sign
* sblHml.macr ? U+00AF (175) HTML 3.2 sblHml.macron
* sblHml.mdash — U+2014 (8212) HTML 4.0 sblHml.em_dash
* sblHml.micro µ U+00B5 (181) HTML 3.2 sblHml.micro_sign
* sblHml.middot · U+00B7 (183) HTML 3.2 sblHml.middle_dot
* sblHml.minus ? U+2212 (8722) HTML 4.0 sblHml.minus_sign
* sblHml.Mu Μ U+039C (924) HTML 4.0 Greek_capital_letter_mu
* sblHml.mu μ U+03BC (956) HTML 4.0 Greek_small_letter_mu
* sblHml.nabla ? U+2207 (8711) HTML 4.0 sblHml.nabla
* sblHml.nbsp U+00A0 (160) HTML 3.2 sblHml.non_breaking_space
* sblHml.ndash – U+2013 (8211) HTML 4.0 sblHml.en_dash
* sblHml.ne ? U+2260 (8800) HTML 4.0 sblHml.not_equal_to
* sblHml.ni ? U+220B (8715) HTML 4.0 sblHml.contains_as_member
* sblHml.not ¬ U+00AC (172) HTML 3.2 sblHml.not_sign
* sblHml.notin ? U+2209 (8713) HTML 4.0 sblHml.not_an_element_of
* sblHml.nsub ? U+2284 (8836) HTML 4.0 sblHml.not a_subset_of
* sblHml.Ntilde ? U+00D1 (209) HTML 2.0 sblHml.Latin_capital_letter n with tilde
* sblHml.ntilde ? U+00F1 (241) HTML 2.0 Latin_small_letter n with tilde
* sblHml.nu ν U+03BD (957) HTML 4.0 Greek_small_letter nu
* sblHml.Nu Ν U+039D (925) HTML 4.0 Greek_capital_letter nu
* sblHml.Oacute ? U+00D3 (211) HTML 2.0 sblHml.Latin_capital_letter o with acute
* sblHml.oacute ? U+00F3 (243) HTML 2.0 Latin_small_letter o with acute
* sblHml.Ocirc ? U+00D4 (212) HTML 2.0 sblHml.Latin_capital_letter o with_circumflex
* sblHml.ocirc ? U+00F4 (244) HTML 2.0 Latin_small_letter o with_circumflex
* sblHml.OElig ? U+0152 (338) HTML 4.0 Latin_capital_ligature oe
* sblHml.oelig ? U+0153 (339) HTML 4.0 Latin_small_ligature oe
* sblHml.Ograve ? U+00D2 (210) HTML 2.0 sblHml.Latin_capital_letter o with grave
* sblHml.ograve ? U+00F2 (242) HTML 2.0 Latin_small_letter o with grave
* sblHml.oline ? U+203E (8254) HTML 4.0 sblHml.overline
* sblHml.Omega Ω U+03A9 (937) HTML 4.0 Greek_capital_letter omega
* sblHml.omega ω U+03C9 (969) HTML 4.0 Greek_small_letter omega
* sblHml.Omicron Ο U+039F (927) HTML 4.0 Greek_capital_letter omicron
* sblHml.omicron ο U+03BF (959) HTML 4.0 Greek_small_letter omicron
* sblHml.oplus ? U+2295 (8853) HTML 4.0 sblHml.circled_plus
* sblHml.or ? U+2228 (8744) HTML 4.0 sblHml.logical_or
* sblHml.ordf ? U+00AA (170) HTML 3.2 sblHml.feminine_ordinal_indicator
* sblHml.ordm ? U+00BA (186) HTML 3.2 sblHml.masculine_ordinal_indicator
* sblHml.Oslash ? U+00D8 (216) HTML 2.0 sblHml.Latin_capital_letter o with_stroke
* sblHml.oslash ? U+00F8 (248) HTML 2.0 Latin_small_letter o with_stroke
* sblHml.Otilde ? U+00D5 (213) HTML 2.0 sblHml.Latin_capital_letter o with tilde
* sblHml.otilde ? U+00F5 (245) HTML 2.0 Latin_small_letter o with tilde
* sblHml.otimes ? U+2297 (8855) HTML 4.0 sblHml.circled_times
* sblHml.Ouml ? U+00D6 (214) HTML 2.0 sblHml.Latin_capital_letter o with diaeresis
* sblHml.ouml ? U+00F6 (246) HTML 2.0 Latin_small_letter o with diaeresis
* sblHml.para ¶ U+00B6 (182) HTML 3.2 sblHml.pilcrow_sign
* sblHml.part ? U+2202 (8706) HTML 4.0 sblHml.partial_differential
* sblHml.permil ‰ U+2030 (8240) HTML 4.0 sblHml.per_mille_sign
* sblHml.perp ? U+22A5 (8869) HTML 4.0 sblHml.up_tack (perpendicular_sign in_math)
* sblHml.Phi Φ U+03A6 (934) HTML 4.0 Greek_capital_letter phi
* sblHml.phi φ U+03C6 (966) HTML 4.0 Greek_small_letter phi
* sblHml.Pi Π U+03A0 (928) HTML 4.0 Greek_capital_letter pi
* sblHml.pi π U+03C0 (960) HTML 4.0 Greek_small_letter pi
* sblHml.piv ? U+03D6 (982) HTML 4.0 Greek pi_symbol
* sblHml.plusmn ± U+00B1 (177) HTML 3.2 sblHml.plus_minus_sign
* sblHml.pound £ U+00A3 (163) HTML 3.2 sblHml.pound_sign
* sblHml.prime ? U+2032 (8242) HTML 4.0 sblHml.prime
* sblHml.Prime ? U+2033 (8243) HTML 4.0 sblHml.double_prime
* sblHml.prod ? U+220F (8719) HTML 4.0 sblHml.n_ary_product
* sblHml.prop ? U+221D (8733) HTML 4.0 sblHml.proportional_to
* sblHml.Psi Ψ U+03A8 (936) HTML 4.0 Greek_capital_letter psi
* sblHml.psi ψ U+03C8 (968) HTML 4.0 Greek_small_letter psi
* sblHml.quot " U+0022 (34) HTML 2.0 sblHml.quotation_mark
* sblHml.radic ? U+221A (8730) HTML 4.0 sblHml.square_root
* sblHml.rang ? U+232A (9002) HTML 4.0 sblHml.right_pointing_angle_bracket
* sblHml.raquo » U+00BB (187) HTML 3.2 sblHml.right_pointing_double_angle_quotation_mark
* sblHml.rarr ? U+2192 (8594) HTML 4.0 sblHml.rightwards_arrow
* sblHml.rArr ? U+21D2 (8658) HTML 4.0 sblHml.rightwards_double_arrow
* sblHml.rceil ? U+2309 (8969) HTML 4.0 sblHml.right_ceiling
* sblHml.rdquo ” U+201D (8221) HTML 4.0 sblHml.right_double_quotation_mark
* sblHml.real ? U+211C (8476) HTML 4.0 sblHml.black_letter_capital_r
* sblHml.reg ® U+00AE (174) HTML 3.2 sblHml.registered_sign
* sblHml.rfloor ? U+230B (8971) HTML 4.0 sblHml.right_floor
* sblHml.Rho Ρ U+03A1 (929) HTML 4.0 Greek_capital_letter rho
* sblHml.rho ρ U+03C1 (961) HTML 4.0 Greek_small_letter rho
* sblHml.rlm ? U+200F (8207) HTML 4.0 sblHml.right_to_left_mark
* sblHml.rsaquo › U+203A (8250) HTML 4.0 sblHml.single_right_pointing_angle_quotation_mark
* sblHml.rsquo ’ U+2019 (8217) HTML 4.0 sblHml.right_single_quotation_mark
* sblHml.sbquo ‚ U+201A (8218) HTML 4.0 sblHml.single_low_9_quotation_mark
* sblHml.Scaron ? U+0160 (352) HTML 4.0 Latin_capital_letter_s with_caron
* sblHml.scaron ? U+0161 (353) HTML 4.0 Latin_small_letter_s with_caron
* sblHml.sdot ? U+22C5 (8901) HTML 4.0 sblHml.dot_operator
* sblHml.sect § U+00A7 (167) HTML 3.2 sblHml.section_sign
* sblHml.shy ­ U+00AD (173) HTML 3.2 sblHml.soft_hyphen
* sblHml.Sigma Σ U+03A3 (931) HTML 4.0 Greek_capital_letter_sigma
* sblHml.sigma σ U+03C3 (963) HTML 4.0 Greek_small_letter_sigma
* sblHml.sigmaf ς U+03C2 (962) HTML 4.0 Greek_small_letter final_sigma
* sblHml.sim ? U+223C (8764) HTML 4.0 sblHml.tilde_operator
* sblHml.spades ? U+2660 (9824) HTML 4.0 sblHml.black_spade_suit
* sblHml.sub ? U+2282 (8834) HTML 4.0 sblHml.subset_of
* sblHml.sube ? U+2286 (8838) HTML 4.0 sblHml.subset_of_or_equal_to
* sblHml.sum ? U+2211 (8721) HTML 4.0 sblHml.n_ary_summation
* sblHml.sup ? U+2283 (8835) HTML 4.0 sblHml.superset_of
* sblHml.sup1 ? U+00B9 (185) HTML 3.2 sblHml.superscript_one
* sblHml.sup2 ² U+00B2 (178) HTML 3.2 sblHml.superscript_two
* sblHml.sup3 ³ U+00B3 (179) HTML 3.2 sblHml.superscript_three
* sblHml.supe ? U+2287 (8839) HTML 4.0 sblHml.superset_of_or_equal_to
* sblHml.szlig ? U+00DF (223) HTML 2.0 sblHml.Latin_small_letter_sharp_s (German Eszett)
* sblHml.tau τ U+03C4 (964) HTML 4.0 Greek_small_letter tau
* sblHml.Tau Τ U+03A4 (932) HTML 4.0 Greek_capital_letter tau
* sblHml.there4 ? U+2234 (8756) HTML 4.0 sblHml.therefore
* sblHml.Theta Θ U+0398 (920) HTML 4.0 Greek_capital_letter theta
* sblHml.theta θ U+03B8 (952) HTML 4.0 Greek_small_letter theta
* sblHml.thetasym ? U+03D1 (977) HTML 4.0 Greek theta_symbol
* sblHml.thinsp ? U+2009 (8201) HTML 4.0 sblHml.thin_space [3]
* sblHml.THORN ? U+00DE (222) HTML 2.0 sblHml.Latin_capital_letter thorn
* sblHml.thorn ? U+00FE (254) HTML 2.0 Latin_small_letter thorn
* sblHml.tilde ? U+02DC (732) HTML 4.0 sblHml.small tilde
* sblHml.times ? U+00D7 (215) HTML 3.2 sblHml.multiplication_sign
* sblHml.trade ™ U+2122 (8482) HTML 4.0 sblHml.trademark_sign
* sblHml.Uacute ? U+00DA (218) HTML 2.0 sblHml.Latin_capital_letter u with acute
* sblHml.uacute ? U+00FA (250) HTML 2.0 Latin_small_letter u with acute
* sblHml.uarr ? U+2191 (8593) HTML 4.0 sblHml.upwards_arrow
* sblHml.uArr ? U+21D1 (8657) HTML 4.0 sblHml.upwards_double_arrow
* sblHml.Ucirc ? U+00DB (219) HTML 2.0 sblHml.Latin_capital_letter u with_circumflex
* sblHml.ucirc ? U+00FB (251) HTML 2.0 Latin_small_letter u with_circumflex
* sblHml.Ugrave ? U+00D9 (217) HTML 2.0 sblHml.Latin_capital_letter u with grave
* sblHml.ugrave ? U+00F9 (249) HTML 2.0 Latin_small_letter u with grave
* sblHml.uml ¨ U+00A8 (168) HTML 3.2 sblHml.diaeresis
* sblHml.upsih ? U+03D2 (978) HTML 4.0 Greek upsilon with hook_symbol
* sblHml.Upsilon Υ U+03A5 (933) HTML 4.0 Greek_capital_letter upsilon
* sblHml.upsilon υ U+03C5 (965) HTML 4.0 Greek_small_letter upsilon
* sblHml.Uuml ? U+00DC (220) HTML 2.0 sblHml.Latin_capital_letter u with diaeresis
* sblHml.uuml ? U+00FC (252) HTML 2.0 Latin_small_letter u with diaeresis
* sblHml.weierp ? U+2118 (8472) HTML 4.0 sblHml.script_capital_p (Weierstrass p)
* sblHml.Xi Ξ U+039E (926) HTML 4.0 Greek_capital_letter xi
* sblHml.xi ξ U+03BE (958) HTML 4.0 Greek_small_letter xi
* sblHml.Yacute ? U+00DD (221) HTML 2.0 sblHml.Latin_capital_letter y with acute
* sblHml.yacute ? U+00FD (253) HTML 2.0 Latin_small_letter y with acute
* sblHml.yen ¥ U+00A5 (165) HTML 3.2 sblHml.yen_sign
* sblHml.yuml ? U+00FF (255) HTML 2.0 Latin_small_letter y with diaeresis
* sblHml.Yuml ? U+0178 (376) HTML 4.0 Latin_capital_letter y with diaeresis
* sblHml.Zeta Ζ U+0396 (918) HTML 4.0 Greek_capital_letter zeta
* sblHml.zeta ζ U+03B6 (950) HTML 4.0 Greek_small_letter zeta
* sblHml.zwj ? U+200D (8205) HTML 4.0 sblHml.zero_width_joiner
* sblHml.zwnj ? U+200C (8204) HTML 4.0 sblHml.zero_width_non_joiner
===
* sblHml.quot " U+0022 (34) HTML 2.0 sblHml.quotation_mark
* sblHml.amp & U+0026 (38) HTML 2.0 sblHml.ampersand
* sblHml.lt < U+003C (60) HTML 2.0 sblHml.less_than_sign
* sblHml.gt > U+003E (62) HTML 2.0 sblHml.greater_than_sign
* sblHml.nbsp U+00A0 (160) HTML 3.2 sblHml.non_breaking_space
* sblHml.iexcl ? U+00A1 (161) HTML 3.2 sblHml.inverted_exclamation_mark
* sblHml.cent ? U+00A2 (162) HTML 3.2 sblHml.cent_sign
* sblHml.pound £ U+00A3 (163) HTML 3.2 sblHml.pound_sign
* sblHml.curren ¤ U+00A4 (164) HTML 3.2 sblHml.currency_sign
* sblHml.yen ¥ U+00A5 (165) HTML 3.2 sblHml.yen_sign
* sblHml.brvbar ¦ U+00A6 (166) HTML 3.2 sblHml.broken_bar
* sblHml.sect § U+00A7 (167) HTML 3.2 sblHml.section_sign
* sblHml.uml ¨ U+00A8 (168) HTML 3.2 sblHml.diaeresis
* sblHml.copy © U+00A9 (169) HTML 3.2 sblHml.copyright_sign
* sblHml.ordf ? U+00AA (170) HTML 3.2 sblHml.feminine_ordinal_indicator
* sblHml.laquo « U+00AB (171) HTML 3.2 sblHml.left_pointing_double_angle_quotation_mark
* sblHml.not ¬ U+00AC (172) HTML 3.2 sblHml.not_sign
* sblHml.shy ­ U+00AD (173) HTML 3.2 sblHml.soft_hyphen
* sblHml.reg ® U+00AE (174) HTML 3.2 sblHml.registered_sign
* sblHml.macr ? U+00AF (175) HTML 3.2 sblHml.macron
* sblHml.deg ° U+00B0 (176) HTML 3.2 sblHml.degree_sign
* sblHml.plusmn ± U+00B1 (177) HTML 3.2 sblHml.plus_minus_sign
* sblHml.sup2 ² U+00B2 (178) HTML 3.2 sblHml.superscript_two
* sblHml.sup3 ³ U+00B3 (179) HTML 3.2 sblHml.superscript_three
* sblHml.acute ? U+00B4 (180) HTML 3.2 sblHml.acute_accent
* sblHml.micro µ U+00B5 (181) HTML 3.2 sblHml.micro_sign
* sblHml.para ¶ U+00B6 (182) HTML 3.2 sblHml.pilcrow_sign
* sblHml.middot · U+00B7 (183) HTML 3.2 sblHml.middle_dot
* sblHml.cedil ? U+00B8 (184) HTML 3.2 sblHml.cedilla
* sblHml.sup1 ? U+00B9 (185) HTML 3.2 sblHml.superscript_one
* sblHml.ordm ? U+00BA (186) HTML 3.2 sblHml.masculine_ordinal_indicator
* sblHml.raquo » U+00BB (187) HTML 3.2 sblHml.right_pointing_double_angle_quotation_mark
* sblHml.frac14 ? U+00BC (188) HTML 3.2 sblHml.vulgar_fraction_one_quarter
* sblHml.frac12 ½ U+00BD (189) HTML 3.2 sblHml.vulgar_fraction_one_half
* sblHml.frac34 ? U+00BE (190) HTML 3.2 sblHml.vulgar_fraction_three_quarters
* sblHml.iquest ? U+00BF (191) HTML 3.2 sblHml.inverted_question_mark

* sblHml.Agrave ? U+00C0 (192) HTML 2.0 sblHml.Latin_capital_letter a with grave
* sblHml.Aacute ? U+00C1 (193) HTML 2.0 sblHml.Latin_capital_letter a with acute
* sblHml.Acirc ? U+00C2 (194) HTML 2.0 sblHml.Latin_capital_letter a with_circumflex
* sblHml.Atilde ? U+00C3 (195) HTML 2.0 sblHml.Latin_capital_letter a with tilde
* sblHml.Auml ? U+00C4 (196) HTML 2.0 sblHml.Latin_capital_letter a with diaeresis
* sblHml.Aring ? U+00C5 (197) HTML 2.0 sblHml.Latin_capital_letter a with ring above
* sblHml.AElig ? U+00C6 (198) HTML 2.0 sblHml.Latin_capital_letter ae
* sblHml.Ccedil ? U+00C7 (199) HTML 2.0 sblHml.Latin_capital_letter_c with_cedilla
* sblHml.Egrave ? U+00C8 (200) HTML 2.0 sblHml.Latin_capital_letter e with grave
* sblHml.Eacute ? U+00C9 (201) HTML 2.0 sblHml.Latin_capital_letter e with acute
* sblHml.Ecirc ? U+00CA (202) HTML 2.0 sblHml.Latin_capital_letter e with_circumflex
* sblHml.Euml ? U+00CB (203) HTML 2.0 sblHml.Latin_capital_letter e with diaeresis
* sblHml.Igrave ? U+00CC (204) HTML 2.0 sblHml.Latin_capital_letter i with grave
* sblHml.Iacute ? U+00CD (205) HTML 2.0 sblHml.Latin_capital_letter i with acute
* sblHml.Icirc ? U+00CE (206) HTML 2.0 sblHml.Latin_capital_letter i with_circumflex
* sblHml.Iuml ? U+00CF (207) HTML 2.0 sblHml.Latin_capital_letter i with diaeresis
* sblHml.ETH ? U+00D0 (208) HTML 2.0 sblHml.Latin_capital_letter eth
* sblHml.Ntilde ? U+00D1 (209) HTML 2.0 sblHml.Latin_capital_letter n with tilde
* sblHml.Ograve ? U+00D2 (210) HTML 2.0 sblHml.Latin_capital_letter o with grave
* sblHml.Oacute ? U+00D3 (211) HTML 2.0 sblHml.Latin_capital_letter o with acute
* sblHml.Ocirc ? U+00D4 (212) HTML 2.0 sblHml.Latin_capital_letter o with_circumflex
* sblHml.Otilde ? U+00D5 (213) HTML 2.0 sblHml.Latin_capital_letter o with tilde
* sblHml.Ouml ? U+00D6 (214) HTML 2.0 sblHml.Latin_capital_letter o with diaeresis
* sblHml.times ? U+00D7 (215) HTML 3.2 sblHml.multiplication_sign
* sblHml.Oslash ? U+00D8 (216) HTML 2.0 sblHml.Latin_capital_letter o with_stroke
* sblHml.Ugrave ? U+00D9 (217) HTML 2.0 sblHml.Latin_capital_letter u with grave
* sblHml.Uacute ? U+00DA (218) HTML 2.0 sblHml.Latin_capital_letter u with acute
* sblHml.Ucirc ? U+00DB (219) HTML 2.0 sblHml.Latin_capital_letter u with_circumflex
* sblHml.Uuml ? U+00DC (220) HTML 2.0 sblHml.Latin_capital_letter u with diaeresis
* sblHml.Yacute ? U+00DD (221) HTML 2.0 sblHml.Latin_capital_letter y with acute
* sblHml.THORN ? U+00DE (222) HTML 2.0 sblHml.Latin_capital_letter thorn
* sblHml.szlig ? U+00DF (223) HTML 2.0 sblHml.Latin_small_letter_sharp_s (German Eszett)
* sblHml.agrave ? U+00E0 (224) HTML 2.0 sblHml.Latin_small_letter a with grave
* sblHml.aacute ? U+00E1 (225) HTML 2.0 sblHml.Latin_small_letter a with acute
* sblHml.acirc ? U+00E2 (226) HTML 2.0 sblHml.Latin_small_letter a with_circumflex
* sblHml.atilde ? U+00E3 (227) HTML 2.0 sblHml.Latin_small_letter a with tilde
* sblHml.auml ? U+00E4 (228) HTML 2.0 sblHml.Latin_small_letter a with diaeresis
* sblHml.aring ? U+00E5 (229) HTML 2.0 sblHml.Latin_small_letter a with ring above
* sblHml.aelig ? U+00E6 (230) HTML 2.0 sblHml.Latin_lowercase_ligature ae
* sblHml.ccedil ? U+00E7 (231) HTML 2.0 sblHml.Latin_small_letter_c with_cedilla
* sblHml.egrave ? U+00E8 (232) HTML 2.0 sblHml.Latin_small_letter e with grave
* sblHml.eacute ? U+00E9 (233) HTML 2.0 sblHml.Latin_small_letter e with acute
* sblHml.ecirc ? U+00EA (234) HTML 2.0 sblHml.Latin_small_letter e with_circumflex
* sblHml.euml ? U+00EB (235) HTML 2.0 sblHml.Latin_small_letter e with diaeresis
* sblHml.igrave ? U+00EC (236) HTML 2.0 Latin_small_letter i with grave
* sblHml.iacute ? U+00ED (237) HTML 2.0 Latin_small_letter i with acute
* sblHml.icirc ? U+00EE (238) HTML 2.0 Latin_small_letter i with_circumflex
* sblHml.iuml ? U+00EF (239) HTML 2.0 Latin_small_letter i with diaeresis
* sblHml.eth ? U+00F0 (240) HTML 2.0 Latin_small_letter eth
* sblHml.ntilde ? U+00F1 (241) HTML 2.0 Latin_small_letter n with tilde
* sblHml.ograve ? U+00F2 (242) HTML 2.0 Latin_small_letter o with grave
* sblHml.oacute ? U+00F3 (243) HTML 2.0 Latin_small_letter o with acute
* sblHml.ocirc ? U+00F4 (244) HTML 2.0 Latin_small_letter o with_circumflex
* sblHml.otilde ? U+00F5 (245) HTML 2.0 Latin_small_letter o with tilde
* sblHml.ouml ? U+00F6 (246) HTML 2.0 Latin_small_letter o with diaeresis
* sblHml.divide ? U+00F7 (247) HTML 3.2 sblHml.division_sign
* sblHml.oslash ? U+00F8 (248) HTML 2.0 Latin_small_letter o with_stroke
* sblHml.ugrave ? U+00F9 (249) HTML 2.0 Latin_small_letter u with grave
* sblHml.uacute ? U+00FA (250) HTML 2.0 Latin_small_letter u with acute
* sblHml.ucirc ? U+00FB (251) HTML 2.0 Latin_small_letter u with_circumflex
* sblHml.uuml ? U+00FC (252) HTML 2.0 Latin_small_letter u with diaeresis
* sblHml.yacute ? U+00FD (253) HTML 2.0 Latin_small_letter y with acute
* sblHml.thorn ? U+00FE (254) HTML 2.0 Latin_small_letter thorn
* sblHml.yuml ? U+00FF (255) HTML 2.0 Latin_small_letter y with diaeresis
* sblHml.OElig ? U+0152 (338) HTML 4.0 Latin_capital_ligature oe
* sblHml.oelig ? U+0153 (339) HTML 4.0 Latin_small_ligature oe
* sblHml.Scaron ? U+0160 (352) HTML 4.0 Latin_capital_letter_s with_caron
* sblHml.scaron ? U+0161 (353) HTML 4.0 Latin_small_letter_s with_caron
* sblHml.Yuml ? U+0178 (376) HTML 4.0 Latin_capital_letter y with diaeresis
* sblHml.fnof ƒ U+0192 (402) HTML 4.0 Latin_small_letter f with hook
* sblHml.circ ? U+02C6 (710) HTML 4.0 sblHml.modifier_letter_circumflex accent
* sblHml.tilde ? U+02DC (732) HTML 4.0 sblHml.small tilde

* sblHml.Alpha Α U+0391 (913) HTML 4.0 Greek_capital_letter alpha
* sblHml.Beta Β U+0392 (914) HTML 4.0 Greek_capital_letter beta
* sblHml.Gamma Γ U+0393 (915) HTML 4.0 Greek_capital_letter gamma
* sblHml.Delta Δ U+0394 (916) HTML 4.0 Greek_capital_letter delta
* sblHml.Epsilon Ε U+0395 (917) HTML 4.0 Greek_capital_letter epsilon
* sblHml.Zeta Ζ U+0396 (918) HTML 4.0 Greek_capital_letter zeta
* sblHml.Eta Η U+0397 (919) HTML 4.0 Greek_capital_letter eta
* sblHml.Theta Θ U+0398 (920) HTML 4.0 Greek_capital_letter theta
* sblHml.Iota Ι U+0399 (921) HTML 4.0 Greek_capital_letter iota
* sblHml.Kappa Κ U+039A (922) HTML 4.0 Greek_capital_letter kappa
* sblHml.Lambda Λ U+039B (923) HTML 4.0 Greek_capital_letter_lambda
* sblHml.Mu Μ U+039C (924) HTML 4.0 Greek_capital_letter_mu
* sblHml.Nu Ν U+039D (925) HTML 4.0 Greek_capital_letter nu
* sblHml.Xi Ξ U+039E (926) HTML 4.0 Greek_capital_letter xi
* sblHml.Omicron Ο U+039F (927) HTML 4.0 Greek_capital_letter omicron
* sblHml.Pi Π U+03A0 (928) HTML 4.0 Greek_capital_letter pi
* sblHml.Rho Ρ U+03A1 (929) HTML 4.0 Greek_capital_letter rho
* sblHml.Sigma Σ U+03A3 (931) HTML 4.0 Greek_capital_letter_sigma
* sblHml.Tau Τ U+03A4 (932) HTML 4.0 Greek_capital_letter tau
* sblHml.Upsilon Υ U+03A5 (933) HTML 4.0 Greek_capital_letter upsilon
* sblHml.Phi Φ U+03A6 (934) HTML 4.0 Greek_capital_letter phi
* sblHml.Chi Χ U+03A7 (935) HTML 4.0 Greek_capital_letter_chi
* sblHml.Psi Ψ U+03A8 (936) HTML 4.0 Greek_capital_letter psi
* sblHml.Omega Ω U+03A9 (937) HTML 4.0 Greek_capital_letter omega
* sblHml.alpha α U+03B1 (945) HTML 4.0 Greek_small_letter alpha
* sblHml.beta β U+03B2 (946) HTML 4.0 Greek_small_letter beta
* sblHml.gamma γ U+03B3 (947) HTML 4.0 Greek_small_letter gamma
* sblHml.delta δ U+03B4 (948) HTML 4.0 Greek_small_letter delta
* sblHml.epsilon ε U+03B5 (949) HTML 4.0 Greek_small_letter epsilon
* sblHml.zeta ζ U+03B6 (950) HTML 4.0 Greek_small_letter zeta
* sblHml.eta η U+03B7 (951) HTML 4.0 Greek_small_letter eta
* sblHml.theta θ U+03B8 (952) HTML 4.0 Greek_small_letter theta
* sblHml.iota ι U+03B9 (953) HTML 4.0 Greek_small_letter iota
* sblHml.kappa κ U+03BA (954) HTML 4.0 Greek_small_letter kappa
* sblHml.lambda λ U+03BB (955) HTML 4.0 Greek_small_letter_lambda
* sblHml.mu μ U+03BC (956) HTML 4.0 Greek_small_letter_mu
* sblHml.nu ν U+03BD (957) HTML 4.0 Greek_small_letter nu
* sblHml.xi ξ U+03BE (958) HTML 4.0 Greek_small_letter xi
* sblHml.omicron ο U+03BF (959) HTML 4.0 Greek_small_letter omicron
* sblHml.pi π U+03C0 (960) HTML 4.0 Greek_small_letter pi
* sblHml.rho ρ U+03C1 (961) HTML 4.0 Greek_small_letter rho
* sblHml.sigmaf ς U+03C2 (962) HTML 4.0 Greek_small_letter final_sigma
* sblHml.sigma σ U+03C3 (963) HTML 4.0 Greek_small_letter_sigma
* sblHml.tau τ U+03C4 (964) HTML 4.0 Greek_small_letter tau
* sblHml.upsilon υ U+03C5 (965) HTML 4.0 Greek_small_letter upsilon
* sblHml.phi φ U+03C6 (966) HTML 4.0 Greek_small_letter phi
* sblHml.chi χ U+03C7 (967) HTML 4.0 Greek_small_letter_chi
* sblHml.psi ψ U+03C8 (968) HTML 4.0 Greek_small_letter psi
* sblHml.omega ω U+03C9 (969) HTML 4.0 Greek_small_letter omega
* sblHml.thetasym ? U+03D1 (977) HTML 4.0 Greek theta_symbol
* sblHml.upsih ? U+03D2 (978) HTML 4.0 Greek upsilon with hook_symbol
* sblHml.piv ? U+03D6 (982) HTML 4.0 Greek pi_symbol

* sblHml.ensp ? U+2002 (8194) HTML 4.0 sblHml.en_space [1]
* sblHml.emsp ? U+2003 (8195) HTML 4.0 sblHml.em_space [2]
* sblHml.thinsp ? U+2009 (8201) HTML 4.0 sblHml.thin_space [3]
* sblHml.zwnj ? U+200C (8204) HTML 4.0 sblHml.zero_width_non_joiner
* sblHml.zwj ? U+200D (8205) HTML 4.0 sblHml.zero_width_joiner
* sblHml.lrm ? U+200E (8206) HTML 4.0 sblHml.left_to_right_mark
* sblHml.rlm ? U+200F (8207) HTML 4.0 sblHml.right_to_left_mark
* sblHml.ndash – U+2013 (8211) HTML 4.0 sblHml.en_dash
* sblHml.mdash — U+2014 (8212) HTML 4.0 sblHml.em_dash
* sblHml.lsquo ‘ U+2018 (8216) HTML 4.0 sblHml.left_single_quotation_mark
* sblHml.rsquo ’ U+2019 (8217) HTML 4.0 sblHml.right_single_quotation_mark
* sblHml.sbquo ‚ U+201A (8218) HTML 4.0 sblHml.single_low_9_quotation_mark
* sblHml.ldquo “ U+201C (8220) HTML 4.0 sblHml.left_double_quotation_mark
* sblHml.rdquo ” U+201D (8221) HTML 4.0 sblHml.right_double_quotation_mark
* sblHml.bdquo „ U+201E (8222) HTML 4.0 sblHml.double_low_9_quotation_mark
* sblHml.dagger † U+2020 (8224) HTML 4.0 sblHml.dagger
* sblHml.Dagger ‡ U+2021 (8225) HTML 4.0 sblHml.double_dagger
* sblHml.bull • U+2022 (8226) HTML 4.0 sblHml.bullet
* sblHml.hellip … U+2026 (8230) HTML 4.0 sblHml.horizontal_ellipsis
* sblHml.permil ‰ U+2030 (8240) HTML 4.0 sblHml.per_mille_sign
* sblHml.prime ? U+2032 (8242) HTML 4.0 sblHml.prime
* sblHml.Prime ? U+2033 (8243) HTML 4.0 sblHml.double_prime
* sblHml.lsaquo ‹ U+2039 (8249) HTML 4.0 sblHml.single_left_pointing_angle_quotation_mark
* sblHml.rsaquo › U+203A (8250) HTML 4.0 sblHml.single_right_pointing_angle_quotation_mark
* sblHml.oline ? U+203E (8254) HTML 4.0 sblHml.overline
* sblHml.frasl ? U+2044 (8260) HTML 4.0 sblHml.fraction_slash
* sblHml.euro € U+20AC (8364) HTML 4.0 sblHml.euro_sign
* sblHml.image ? U+2111 (8465) HTML 4.0 sblHml.black_letter_capital_i
* sblHml.weierp ? U+2118 (8472) HTML 4.0 sblHml.script_capital_p (Weierstrass p)
* sblHml.real ? U+211C (8476) HTML 4.0 sblHml.black_letter_capital_r
* sblHml.trade ™ U+2122 (8482) HTML 4.0 sblHml.trademark_sign
* sblHml.alefsym ? U+2135 (8501) HTML 4.0 sblHml.alef_symbol
* sblHml.larr ? U+2190 (8592) HTML 4.0 sblHml.leftwards_arrow
* sblHml.uarr ? U+2191 (8593) HTML 4.0 sblHml.upwards_arrow
* sblHml.rarr ? U+2192 (8594) HTML 4.0 sblHml.rightwards_arrow
* sblHml.darr ? U+2193 (8595) HTML 4.0 sblHml.downwards_arrow
* sblHml.harr ? U+2194 (8596) HTML 4.0 sblHml.left_right_arrow
* sblHml.crarr ? U+21B5 (8629) HTML 4.0 sblHml.downwards_arrow_with_corner_leftwards
* sblHml.lArr ? U+21D0 (8656) HTML 4.0 sblHml.leftwards_double_arrow
* sblHml.uArr ? U+21D1 (8657) HTML 4.0 sblHml.upwards_double_arrow
* sblHml.rArr ? U+21D2 (8658) HTML 4.0 sblHml.rightwards_double_arrow
* sblHml.dArr ? U+21D3 (8659) HTML 4.0 sblHml.downwards_double_arrow
* sblHml.hArr ? U+21D4 (8660) HTML 4.0 sblHml.left_right_double_arrow
* sblHml.forall ? U+2200 (8704) HTML 4.0 sblHml.for_all
* sblHml.part ? U+2202 (8706) HTML 4.0 sblHml.partial_differential
* sblHml.exist ? U+2203 (8707) HTML 4.0 sblHml.there_exists
* sblHml.empty ? U+2205 (8709) HTML 4.0 sblHml.empty_set
* sblHml.nabla ? U+2207 (8711) HTML 4.0 sblHml.nabla
* sblHml.isin ? U+2208 (8712) HTML 4.0 sblHml.element_of
* sblHml.notin ? U+2209 (8713) HTML 4.0 sblHml.not_an_element_of
* sblHml.ni ? U+220B (8715) HTML 4.0 sblHml.contains_as_member
* sblHml.prod ? U+220F (8719) HTML 4.0 sblHml.n_ary_product
* sblHml.sum ? U+2211 (8721) HTML 4.0 sblHml.n_ary_summation
* sblHml.minus ? U+2212 (8722) HTML 4.0 sblHml.minus_sign
* sblHml.lowast ? U+2217 (8727) HTML 4.0 sblHml.asterisk_operator
* sblHml.radic ? U+221A (8730) HTML 4.0 sblHml.square_root
* sblHml.prop ? U+221D (8733) HTML 4.0 sblHml.proportional_to
* sblHml.infin ? U+221E (8734) HTML 4.0 sblHml.infinity
* sblHml.ang ? U+2220 (8736) HTML 4.0 sblHml.angle
* sblHml.and ? U+2227 (8743) HTML 4.0 sblHml.logical_and
* sblHml.or ? U+2228 (8744) HTML 4.0 sblHml.logical_or
* sblHml.cap ? U+2229 (8745) HTML 4.0 sblHml.intersection
* sblHml.cup ? U+222A (8746) HTML 4.0 sblHml.union
* sblHml.int ? U+222B (8747) HTML 4.0 sblHml.integral
* sblHml.there4 ? U+2234 (8756) HTML 4.0 sblHml.therefore
* sblHml.sim ? U+223C (8764) HTML 4.0 sblHml.tilde_operator
* sblHml.cong ? U+2245 (8773) HTML 4.0 sblHml.congruent_to
* sblHml.asymp ? U+2248 (8776) HTML 4.0 sblHml.almost_equal_to
* sblHml.ne ? U+2260 (8800) HTML 4.0 sblHml.not_equal_to
* sblHml.equiv ? U+2261 (8801) HTML 4.0 sblHml.identical_to (equivalent to)
* sblHml.le ? U+2264 (8804) HTML 4.0 sblHml.less_than_or_equal_to
* sblHml.ge ? U+2265 (8805) HTML 4.0 sblHml.greater_than_or_equal_to
* sblHml.sub ? U+2282 (8834) HTML 4.0 sblHml.subset_of
* sblHml.sup ? U+2283 (8835) HTML 4.0 sblHml.superset_of
* sblHml.nsub ? U+2284 (8836) HTML 4.0 sblHml.not a_subset_of
* sblHml.sube ? U+2286 (8838) HTML 4.0 sblHml.subset_of_or_equal_to
* sblHml.supe ? U+2287 (8839) HTML 4.0 sblHml.superset_of_or_equal_to
* sblHml.oplus ? U+2295 (8853) HTML 4.0 sblHml.circled_plus
* sblHml.otimes ? U+2297 (8855) HTML 4.0 sblHml.circled_times
* sblHml.perp ? U+22A5 (8869) HTML 4.0 sblHml.up_tack (perpendicular_sign in_math)
* sblHml.sdot ? U+22C5 (8901) HTML 4.0 sblHml.dot_operator
* sblHml.lceil ? U+2308 (8968) HTML 4.0 sblHml.left_ceiling
* sblHml.rceil ? U+2309 (8969) HTML 4.0 sblHml.right_ceiling
* sblHml.lfloor ? U+230A (8970) HTML 4.0 sblHml.left_floor
* sblHml.rfloor ? U+230B (8971) HTML 4.0 sblHml.right_floor
* sblHml.lang ? U+2329 (9001) HTML 4.0 sblHml.left_pointing_angle_bracket
* sblHml.rang ? U+232A (9002) HTML 4.0 sblHml.right_pointing_angle_bracket
* sblHml.loz ? U+25CA (9674) HTML 4.0 sblHml.lozenge
* sblHml.spades ? U+2660 (9824) HTML 4.0 sblHml.black_spade_suit
* sblHml.clubs ? U+2663 (9827) HTML 4.0 sblHml.black_club_suit
* sblHml.hearts ? U+2665 (9829) HTML 4.0 sblHml.black_heart_suit
* sblHml.diams ? U+2666 (9830) HTML 4.0 sblHml.black_diamond_suit
[http://en.wikipedia.org/wiki/List_of_XML_and_HTML_character_entity_references]

Htmlcharref.DECIMAL ( )

name::
* McsEngl.Htmlcharref.DECIMAL ( )@cptIt,
* McsEngl.char.html.decimal@cptIt,
* McsEngl.symbol.html.number@cptIt,

_SPECIFIC:
* 160,nbsp,
* 161,iexcl,
* 162,cent,
* 163,pound,
* 164,curren,
* 165,yen,
* 166,brvbar,
* 167,sect,
* 168,uml,
* 169,copy,
* 170,ordf,
* 171,laquo,
* 172,not,
* 173,shy,
* 174,reg,
* 175,macr,
* 176,deg,
* 177,plusmn,
* 178,sup2,
* 179,sup3,
* 180,acute,
* 181,micro,
* 182,para,
* 183,middot,
* 184,cedil,
* 185,sup1,
* 186,ordm,
* 187,raquo,
* 188,frac14,
* 189,frac12,
* 190,frac34,
* 191,iquest,
* 192,Agrave,
* 193,Aacute,
* 194,Acirc,
* 195,Atilde,
* 196,Auml,
* 197,Aring,
* 198,AElig,
* 199,Ccedil,
* 200,Egrave,
* 201,Eacute,
* 202,Ecirc,
* 203,Euml,
* 204,Igrave,
* 205,Iacute,
* 206,Icirc,
* 207,Iuml,
* 208,ETH,
* 209,Ntilde,
* 210,Ograve,
* 211,Oacute,
* 212,Ocirc,
* 213,Otilde,
* 214,Ouml,
* 215,times,
* 216,Oslash,
* 217,Ugrave,
* 218,Uacute,
* 219,Ucirc,
* 220,Uuml,
* 221,Yacute,
* 222,THORN,
* 223,szlig,
* 224,agrave,
* 225,aacute,
* 226,acirc,
* 227,atilde,
* 228,auml,
* 229,aring,
* 230,aelig,
* 231,ccedil,
* 232,egrave,
* 233,eacute,
* 234,ecirc,
* 235,euml,
* 236,igrave,
* 237,iacute,
* 238,icirc,
* 239,iuml,
* 240,eth,
* 241,ntilde,
* 242,ograve,
* 243,oacute,
* 244,ocirc,
* 245,otilde,
* 246,ouml,
* 247,divide,
* 248,oslash,
* 249,ugrave,
* 250,uacute,
* 251,ucirc,
* 252,uuml,
* 253,yacute,
* 254,thorn,
* 255,yuml,
* 402,fnof,
* 913,Alpha,
* 914,Beta,
* 915,Gamma,
* 916,Delta,
* 917,Epsilon,
* 918,Zeta,
* 919,Eta,
* 920,Theta,
* 921,Iota,
* 922,Kappa,
* 923,Lambda,
* 924,Mu,
* 925,Nu,
* 926,Xi,
* 927,Omicron,
* 928,Pi,
* 929,Rho,
* 931,Sigma,
* 932,Tau,
* 933,Upsilon,
* 934,Phi,
* 935,Chi,
* 936,Psi,
* 937,Omega,
* 945,alpha,
* 946,beta,
* 947,gamma,
* 948,delta,
* 949,epsilon,
* 950,zeta,
* 951,eta,
* 952,theta,
* 953,iota,
* 954,kappa,
* 955,lambda,
* 956,mu,
* 957,nu,
* 958,xi,
* 959,omicron,
* 960,pi,
* 961,rho,
* 962,sigmaf,
* 963,sigma,
* 964,tau,
* 965,upsilon,
* 966,phi,
* 967,chi,
* 968,psi,
* 969,omega,
* 977,thetasym,
* 978,upsih,
* 982,piv,
* 8226,bull,
* 8230,hellip,
* 8242,prime,
* 8243,Prime,
* 8254,oline,
* 8260,frasl,
* 8472,weierp,
* 8465,image,
* 8476,real,
* 8482,trade,
* 8501,alefsym,
* 8592,larr,
* 8593,uarr,
* 8594,rarr,
* 8595,darr,
* 8596,harr,
* 8629,crarr,
* 8656,lArr,
* 8657,uArr,
* 8658,rArr,
* 8659,dArr,
* 8660,hArr,
* 8704,forall,
* 8706,part,
* 8707,exist,
* 8709,empty,
* 8711,nabla,
* 8712,isin,
* 8713,notin,
* 8715,ni,
* 8719,prod,
* 8721,sum,
* 8722,minus,
* 8727,lowast,
* 8730,radic,
* 8733,prop,
* 8734,infin,
* 8736,ang,
* 8743,and,
* 8744,or,
* 8745,cap,
* 8746,cup,
* 8747,int,
* 8756,there4,
* 8764,sim,
* 8773,cong,
* 8776,asymp,
* 8800,ne,
* 8801,equiv,
* 8804,le,
* 8805,ge,
* 8834,sub,
* 8835,sup,
* 8836,nsub,
* 8838,sube,
* 8839,supe,
* 8853,oplus,
* 8855,otimes,
* 8869,perp,
* 8901,sdot,
* 8968,lceil,
* 8969,rceil,
* 8970,lfloor,
* 8971,rfloor,
* 9001,lang,
* 9002,rang,
* 9674,loz,
* 9824,spades,
* 9827,clubs,
* 9829,hearts,
* 9830,diams,
* 338,OElig,
* 339,oelig,
* 352,Scaron,
* 353,scaron,
* 376,Yuml,
* 710,circ,
* 732,tilde,
* 8194,ensp,
* 8195,emsp,
* 8201,thinsp,
* 8204,zwnj,
* 8205,zwj,
* 8206,lrm,
* 8207,rlm,
* 8211,ndash,
* 8212,mdash,
* 8216,lsquo,
* 8217,rsquo,
* 8218,sbquo,
* 8220,ldquo,
* 8221,rdquo,
* 8222,bdquo,
* 8224,dagger,
* 8225,Dagger,
* 8240,permil,
* 8249,lsaquo,
* 8250,rsaquo,
* 8364,euro,

Htmlcharref.HEXADECIMAL (Ð)

name::
* McsEngl.Htmlcharref.HEXADECIMAL (Ð)@cptIt,
* McsEngl.char.html.hexadecimal@cptIt,
* McsEngl.symbol.html.hexadecimal@cptIt,

Htmlcharref.MATH

name::
* McsEngl.Htmlcharref.MATH@cptIt,
* McsEngl.char.html.math@cptIt,
* McsEngl.symbol.html.math@cptIt,
* McsEngl.html'chr.math@cptIt,
* McsEngl.html'mathchar@cptIt,
* McsEngl.html'math-character@cptIt,
* McsEngl.sblHmlMth@cptIt,

_SPECIFIC:
* sblHmlMth.forall;  ?  ∀  ∀
* sblHmlMth.part;  ?  ∂  ∂
* sblHmlMth.exists;  ?  ∃  ∃
* sblHmlMth.empty;  ?  ∅  ∅
* sblHmlMth.nabla;  ?  ∇  ∇
* sblHmlMth.isin;  ?  ∈  ∈
* sblHmlMth.notin;  ?  ∉  ∉
* sblHmlMth.ni;  ?  ∋  ∋
* sblHmlMth.prod;  ?  ∏  ∏
* sblHmlMth.sum;  ?  ∑  ∑
* sblHmlMth.minus;  ?  −  −
* sblHmlMth.lowast;  ?  ∗  ∗
* sblHmlMth.squareroot;  ?  √  √
* sblHmlMth.proportional to;  ?  ∝  ∝
* sblHmlMth.infinity;  ?  ∞  ∞
* sblHmlMth.angle;  ?  ∠  ∠
* sblHmlMth.and;  ?  ∧  ∧
* sblHmlMth.or;  ?  ∨  ∨
* sblHmlMth.cap;  ?  ∩  ∩
* sblHmlMth.cup;  ?  ∪  ∪
* sblHmlMth.integral;  ?  ∫  ∫
* sblHmlMth.therefore;  ?  ∴  ∴
* sblHmlMth.similarto;  ?  ∼  ∼
* sblHmlMth.congruentto;  ?  ≅  ≅
* sblHmlMth.almostequal;  ?  ≈  ≈
* sblHmlMth.notequal;  ?  ≠  ≠
* sblHmlMth.equivalent;  ?  ≡  ≡
* sblHmlMth.lessorequal;  ?  ≤  ≤
* sblHmlMth.greaterorequal;  ?  ≥  ≥
* sblHmlMth.subsetof;  ?  ⊂  ⊂
* sblHmlMth.supersetof;  ?  ⊃  ⊃
* sblHmlMth.notsubsetof;  ?  ⊄  ⊄
* sblHmlMth.subsetorequal;  ?  ⊆  ⊆
* sblHmlMth.supersetorequal;  ?  ⊇  ⊇
* sblHmlMth.circledplus;  ?  ⊕  ⊕
* sblHmlMth.circledtimes;  ?  ⊗  ⊗
* sblHmlMth.perpendicular;  ?  ⊥  ⊥
* sblHmlMth.dotoperator;  ?  ⋅  ⋅
[http://www.w3schools.com/tags/ref_symbols.asp]

Htmlcharref.SPACE

name::
* McsEngl.Htmlcharref.SPACE@cptIt,
* McsEngl.char.html.space@cptIt,
* McsEngl.symbol.html.space@cptIt,
* McsEngl.html'space-character@cptIt,
* McsEngl.space-character-in-html@cptIt568i,

_DEFINITION:
     space.
===
A space character is any of the following:
* (32)  U+0020 SPACE
* (9)  U+0009 CHARACTER TABULATION (tab)
* (10)  U+000A LINE FEED (LF)
* (12)  U+000C FORM FEED (FF)
* (13)  U+000D CARRIAGE RETURN (CR)
[http://dev.w3.org/html5/markup/spec.html#space]

Htmlcharref.TAB

name::
* McsEngl.Htmlcharref.TAB@cptIt,
* McsEngl.char.html.tab@cptIt,
* McsEngl.symbol.html.tab@cptIt,
* McsEngl.hmlchr.tab@cptIt,
* McsEngl.html'tab-character@cptIt,

_DESCRIPTION:
There's no tab entity defined in ISO-8859-1 HTML - but there are a couple of whitespace characters other than   such as  ,  ,and  .
In ASCII, is a tab.
[http://stackoverflow.com/a/1571693]

Htmlcharref.ESCAPE

name::
* McsEngl.Htmlcharref.ESCAPE@cptIt,

_DESCRIPTION:
&amp;
is an-escape of a-charref in Html.

Htmldoc'Element

name::
* McsEngl.Htmldoc'Element@cptIt,
* McsEngl.elt.html@cptIt, {2013-08-15}
* McsEngl.helt@cptIt, {2013-10-14}
* McsEngl.htmlelt@cptIt,
* McsEngl.html'code.element@cptIt,
* McsEngl.htmlelement@cptIt,
* McsEngl.html-element@cptIt,
* McsEngl.htmlelt@cptIt, {2013-10-08}
* McsEngl.html'elm@cptIt568,

_DEFINITION:
Elements are hml-unit constructs that represent archo-doc parts.
[hmnSngo.2016-06-11]
===
* An HTML element is everything from the start tag to the end tag:
Start tag *  Element content  End tag *
<p>  This is a paragraph  </p>
<a href="default.htm" >  This is a link  </a>
<br />    
* The start tag is often called the opening tag. The end tag is often called the closing tag.
[http://www.w3schools.com/html/html_elements.asp]

Htmlelt'WHOLE

name::
* McsEngl.Htmlelt'WHOLE@cptIt,

Htmlelt'Contexts-in-which-this-element-can-be-used

name::
* McsEngl.Htmlelt'Contexts-in-which-this-element-can-be-used@cptIt,

_DESCRIPTION:
Contexts in which this element can be used
A non-normative description of where the element can be used. This information is redundant with the content models of elements that allow this one as a child, and is provided only as a convenience.
For simplicity, only the most specific expectations are listed. For example, an element that is both flow content and phrasing content can be used anywhere that either flow content or phrasing content is expected, but since anywhere that flow content is expected, phrasing content is also expected (since all phrasing content is flow content), only "where phrasing content is expected" will be listed.
[https://html.spec.whatwg.org/multipage/dom.html#concept-element-content-model]

Htmlelt'GENERIC

name::
* McsEngl.Htmlelt'GENERIC@cptIt,

Htmlelt'PART

name::
* McsEngl.Htmlelt'PART@cptIt,

Htmlelt'Content-model

name::
* McsEngl.Htmlelt'Content-model@cptIt,

_DESCRIPTION:
Content model
A normative description of what content must be included as children and descendants of the element.
[https://html.spec.whatwg.org/multipage/dom.html#concept-element-content-model]

Htmlelt'attribute

name::
* McsEngl.Htmlelt'attribute@cptIt,
* McsEngl.html'attribute@cptIt,
* McsEngl.html'Attribute-of-element@cptIt,
* McsEngl.html'AttributeOfElement@cptIt,
* McsEngl.html'Content-attribute@cptIt,
* McsEngl.html'Element'sAttribute'@cptIt,
* McsEngl.htmleltatt@cptIt, {2016-05-30}
* McsEngl.htmlatt@cptIt, {2014-11-20}
* McsEngl.htmlatt@cptIt,
* McsEngl.htmlabt@cptIt, {2014-10-26}
* McsEngl.habt@cptIt, {2014-08-09}

_WHOLE:
* html-element#ql:html'element#

_DESCRIPTION:
Content attributes
A normative list of attributes that may be specified on the element (except where otherwise disallowed).
[http://dev.w3.org/html5/spec/Overview.html#element-definitions]

Htmleltatt'name

name::
* McsEngl.Htmleltatt'name@cptIt,

Htmleltatt'optimization

name::
* McsEngl.Htmleltatt'optimization@cptIt,

Don't inline CSS attributes
Inlining CSS attributes on HTML elements (e.g., <p style=...>) should be avoided where possible, as this often leads to unnecessary code duplication. Further, inline CSS on HTML elements is blocked by default with Content Security Policy (CSP).
[https://developers.google.com/speed/docs/insights/OptimizeCSSDelivery]

Htmleltatt'value

name::
* McsEngl.Htmleltatt'value@cptIt,

Always Quote Attribute Values

Attribute values should always be enclosed in quotes.

Double style quotes are the most common, but single style quotes are also allowed.

In some rare situations, like when the attribute value itself contains quotes, it is necessary to use single quotes:

name='John "ShotGun" Nelson'
[http://www.w3schools.com/html/html_attributes.asp]

SPECIFIC

name::
* McsEngl.htmleltatt.specific@cptIt,
* McsEngl.hmlatt.specific@cptIt,
* McsEngl.habt.specific@cptIt,
* McsEngl.html'attribute.SPECIFIC@cptIt,

_SPECIFIC:
HTML attributes are generally classed as required attributes, optional attributes, standard attributes, and event attributes. Usually the required and optional attributes modify specific HTML elements, while the standard attributes can be applied to most HTML elements.[7] Event attributes, added in HTML version 4, allow an element to specify scripts to be run under specific circumstances.[8]
[http://en.wikipedia.org/wiki/HTML_attribute]

_SPECIFIC:
Attribute Belongs to Description
* hmlatt.accept <input> Specifies the types of files that the server accepts (only for type="file").
* hmlatt.accept-charset <form> Specifies the character encodings that are to be used for the form submission.
* hmlatt.accesskey Global Attributes Specifies a shortcut key to activate/focus an element.
* hmlatt.action <form> Specifies where to send the form-data when a form is submitted.
* hmlatt.align Not supported in HTML 5. Specifies the alignment according to surrounding elements. Use CSS instead.
* hmlatt.alt <area>, <img>, <input> Specifies an alternate text when the original element fails to display.
* hmlatt.async <script> Specifies that the script is executed asynchronously (only for external scripts).
* hmlatt.autocomplete <form>, <input> Specifies whether the <form> or the <input> element should have autocomplete enabled.
* hmlatt.autofocus <button>, <input>, <keygen>, <select>, <textarea> Specifies that the element should automatically get focus when the page loads.
* hmlatt.autoplay <audio>, <video> Specifies that the audio/video will start playing as soon as it is ready
* hmlatt.bgcolor Not supported in HTML 5. Specifies the background color of an element. Use CSS instead.
* hmlatt.border Not supported in HTML 5. Specifies the width of the border of an element. Use CSS instead.
* hmlatt.challenge <keygen> Specifies that the value of the <keygen> element should be challenged when submitted.
* hmlatt.charset <meta>, <script> Specifies the character encoding.
* hmlatt.checked <input> Specifies that an <input> element should be pre-selected when the page loads (for type="checkbox" or type="radio").
* hmlatt.cite <blockquote>, <del>, <ins>, <q> Specifies a URL which explains the quote/deleted/inserted text.
* hmlatt.class Global Attributes Specifies one or more classnames for an element (refers to a class in a style sheet).
* hmlatt.color Not supported in HTML 5. Specifies the text color of an element. Use CSS instead.
* hmlatt.cols <textarea> Specifies the visible width of a text area.
* hmlatt.colspan <td>, <th> Specifies the number of columns a table cell should span
* hmlatt.content <meta> Gives the value associated with the http-equiv or name attribute
* hmlatt.contenteditable Global Attributes Specifies whether the content of an element is editable or not.
* hmlatt.contextmenu Global Attributes Specifies a context menu for an element. The context menu appears when a user right-clicks on the element.
* hmlatt.controls <audio>, <video> Specifies that audio/video controls should be displayed (such as a play/pause button etc).
* hmlatt.coords <area> Specifies the coordinates of the area.
* hmlatt.data <object> Specifies the URL of the resource to be used by the object.
* hmlatt.data-* Global Attributes Used to store custom data private to the page or application.
* hmlatt.datetime <del>, <ins>, <time> Specifies the date and time.
* hmlatt.default <track> Specifies that the track is to be enabled if the user's preferences do not indicate that another track would be more appropriate.
* hmlatt.defer <script> Specifies that the script is executed when the page has finished parsing (only for external scripts).
* hmlatt.dir Global Attributes Specifies the text direction for the content in an element.
* hmlatt.dirname <input>, <textarea> Specifies that the text direction will be submitted.
* hmlatt.disabled <button>, <fieldset>, <input>, <keygen>, <optgroup>, <option>, <select>, <textarea> Specifies that a the specified element/group of elements should be disabled.
* hmlatt.download <a>, <area> Specifies that the target will be downloaded when a user clicks on the hyperlink.
* hmlatt.draggable Global Attributes Specifies whether an element is draggable or not.
* hmlatt.dropzone Global Attributes Specifies whether the dragged data is copied, moved, or linked, when dropped.
* hmlatt.enctype <form> Specifies how the form-data should be encoded when submitting it to the server (only for method="post").
* hmlatt.for <label>, <output> Specifies which form element(s) a label/calculation is bound to.
* hmlatt.form <button>, <fieldset>, <input>, <keygen>, <label>, <meter>, <object>, <output>, <select>, <textarea> Specifies the name of the form the element belongs to
* hmlatt.formaction <button>, <input> Specifies where to send the form-data when a form is submitted. Only for type="submit".
* hmlatt.headers <td>, <th> Specifies one or more headers cells a cell is related to.
* hmlatt.height <canvas>, <embed>, <iframe>, <img>, <input>, <object>, <video> Specifies the height of the element.
* hmlatt.hidden Global Attributes Specifies that an element is not yet, or is no longer, relevant.
* hmlatt.high <meter> Specifies the range that is considered to be a high value.
* hmlatt.href <a>, <area>, <base>, <link> Specifies the URL of the page the link goes to.
* hmlatt.hreflang <a>, <area>, <link> Specifies the language of the linked document.
* hmlatt.http-equiv <meta> Provides an HTTP header for the information/value of the content attribute.
* hmlatt.id Global Attributes Specifies a unique id for an element.
* hmlatt.ismap <img> Specifies an image as a server-side image-map.
* hmlatt.keytype <keygen> Specifies the security algorithm of the key.
* hmlatt.kind <track> Specifies the kind of text track.
* hmlatt.label <track> Specifies the title of the text track.
* hmlatt.lang Global Attributes Specifies the language of the element's content.
* hmlatt.list <input> Refers to a <datalist> element that contains pre-defined options for an <input> element.
* hmlatt.loop <audio>, <video> Specifies that the audio/video will start over again, every time it is finished.
* hmlatt.low <meter> Specifies the range that is considered to be a low value.
* hmlatt.manifest <html> Specifies the address of the document's cache manifest (for offline browsing).
* hmlatt.max <input>, <meter>, <progress> Specifies the maximum value.
* hmlatt.maxlength <input>, <textarea> Specifies the maximum number of characters allowed in an element.
* hmlatt.media <a>, <area>, <link>, <source>, <style> Specifies what media/device the linked document is optimized for.
* hmlatt.method <form> Specifies the HTTP method to use when sending form-data.
* hmlatt.min <input>, <meter> Specifies a minimum value.
* hmlatt.multiple <input>, <select> Specifies that a user can enter more than one value.
* hmlatt.muted <video> Specifies that the audio output of the video should be muted.
* hmlatt.name <button>, <fieldset>, <form>, <iframe>, <input>, <keygen>, <map>, <meta>, <object>, <output>, <param>, <select>, <textarea> Specifies the name of the element.
* hmlatt.novalidate <form> Specifies that the form should not be validated when submitted.
* hmlatt.onabort <audio>, <embed>, <img>, <object>, <video> Script to be run on abort.
* hmlatt.onafterprint <body> Script to be run after the document is printed.
* hmlatt.onbeforeprint <body> Script to be run before the document is printed
* hmlatt.onbeforeunload <body> Script to be run when the document is about to be unloaded.
* hmlatt.onblur All visible elements. Script to be run when the element loses focus.
* hmlatt.oncanplay <audio>, <embed>, <object>, <video> Script to be run when a file is ready to start playing (when it has buffered enough to begin).
* hmlatt.oncanplaythrough <audio>, <video> Script to be run when a file can be played all the way to the end without pausing for buffering.
* hmlatt.onchange All visible elements. Script to be run when the value of the element is changed.
* hmlatt.onclick All visible elements. Script to be run when the element is being clicked.
* hmlatt.oncontextmenu All visible elements. Script to be run when a context menu is triggered
* hmlatt.oncopy All visible elements. Script to be run when the content of the element is being copied.
* hmlatt.oncuechange <track> Script to be run when the cue changes in a <track> element
* hmlatt.oncut All visible elements. Script to be run when the content of the element is being cut.
* hmlatt.ondblclick All visible elements. Script to be run when the element is being double-clicked.
* hmlatt.ondrag All visible elements. Script to be run at the end of a drag operation.
* hmlatt.ondragend All visible elements. Script to be run at the end of a drag operation.
* hmlatt.ondragenter All visible elements. Script to be run when an element has been dragged to a valid drop target.
* hmlatt.ondragleave All visible elements. Script to be run when an element leaves a valid drop target
* hmlatt.ondragover All visible elements. Script to be run when an element is being dragged over a valid drop target.
* hmlatt.ondragstart All visible elements. Script to be run at the start of a drag operation.
* hmlatt.ondrop All visible elements. Script to be run when dragged element is being dropped.
* hmlatt.ondurationchange <audio>, <video> Script to be run when the length of the media changes
* hmlatt.onemptied <audio>, <video> Script to be run when something bad happens and the file is suddenly unavailable (like unexpectedly disconnects).
* hmlatt.onended <audio>, <video> Script to be run when the media has reach the end (a useful event for messages like "thanks for listening")
* hmlatt.onerror <audio>, <body>, <embed>, <img>, <object>, <script>, <style>, <video> Script to be run when an error occurs.
* hmlatt.onfocus All visible elements. Script to be run when the element gets focus.
* hmlatt.onhashchange <body> Script to be run when there has been changes to the anchor part of the a URL.
* hmlatt.oninput All visible elements. Script to be run when the element gets user input.
* hmlatt.oninvalid All visible elements. Script to be run when the element is invalid.
* hmlatt.onkeydown All visible elements. Script to be run when a user is pressing a key.
* hmlatt.onkeypress All visible elements. Script to be run when a user presses a key.
* hmlatt.onkeyup All visible elements. Script to be run when a user releases a key.
* hmlatt.onload <body>, <iframe>, <img>, <input>, <link>, <script>, <style> Script to be run when the element is finished loading.
* hmlatt.onloadeddata <audio>, <video> Script to be run when media data is loaded
* hmlatt.onloadedmetadata <audio>, <video> Script to be run when meta data (like dimensions and duration) are loaded.
* hmlatt.onloadstart <audio>, <video> Script to be run just as the file begins to load before anything is actually loaded.
* hmlatt.onmousedown All visible elements. Script to be run when a mouse button is pressed down on an element.
* hmlatt.onmousemove All visible elements. Script to be run as long as the mouse pointer is moving over an element.
* hmlatt.onmouseout All visible elements. Script to be run when a mouse pointer moves ot of an element.
* hmlatt.onmouseover All visible elements. Script to be run when a mouse pointer moves over an element.
* hmlatt.onmouseup All visible elements. Script to be run when a mouse button is released over an element.
* hmlatt.onmousewheel All visible elements. Script to be run when a mouse wheel is being scrolled over an element.
* hmlatt.onoffline <body> Script to be run when the browser starts to work offline
* hmlatt.ononline <body> Script to be run when the browser starts to work online
* hmlatt.onpagehide <body> Script to be run when a user navigates away from a page.
* hmlatt.onpageshow <body> Script to be run when a user navigates to a page
* hmlatt.onpaste All visible elements. Script to be run when the user pastes som content in an elements
* hmlatt.onpause <audio>, <video> Script to be run when the media is paused either by the user or programmatically.
* hmlatt.onplay <audio>, <video> Script to be run when the media is ready to start playing.
* hmlatt.onplaying <audio>, <video> Script to be run when the media actually has started playing.
* hmlatt.onpopstate <body> Script to be run when the window's history changes.
* hmlatt.onprogress <audio>, <video> Script to be run when the browser is in the process of getting the media data
* hmlatt.onratechange <audio>, <video> Script to be run each time the playback rate changes (like when a user switches to a slow motion or fast forward mode).
* hmlatt.onreset <form> Script to be run when a reset button in a form is clicked.
* hmlatt.onresize <body> Script to be run when the browser window is being resized.
* hmlatt.onscroll All visible elements. Script to be run when an element's scrollbar is being scrolled.
* hmlatt.onsearch <input> Script to be run when the user writes something in a search field (for <input="search">).
* hmlatt.onseeked <audio>, <video> Script to be run when the seeking attribute is set to false indicating that seeking has ended.
* hmlatt.onseeking <audio>, <video> Script to be run when the seeking attribute is set to true indicating that seeking is active
* hmlatt.onselect All visible elements. Script to be run when the element gets selected.
* hmlatt.onshow <menu> Script to be run when a <menu> element is shown as a context menu
* hmlatt.onstalled <audio>, <video> Script to be run when the browser is unable to fetch the media data for whatever reason.
* hmlatt.onstorage <body> Script to be run when a Web Storage area is updated.
* hmlatt.onsubmit <form> Script to be run when a for is submitted.
* hmlatt.onsuspend <audio>, <video> Script to be run when fetching the media data is stopped before it is completely loaded for whatever reason.
* hmlatt.ontimeupdate <audio>, <video> Script to be run when the playing position has changed (like when the user fast forwards to a different point in the media)
* hmlatt.ontoggle <details> Script to be run when the user opens or closes the <details> element.
* hmlatt.onunload <body> Script to be run when a page has unloaded (or the browser window has been closed)
* hmlatt.onvolumechange <audio>, <video> Script to be run each time the volume is changed which (includes setting the volume to "mute").
* hmlatt.onwaiting <audio>, <video> Script to be run when the media has paused but is expected to resume (like when the media pauses to buffer more data).
* hmlatt.onwheel All visible elements. Script to be run when the mouse wheel rolls up or down over an element.
* hmlatt.open <details> Specifies that the details should be visible (open) to the user
* hmlatt.optimum <meter> Specifies what value is the optimal value for the gauge.
* hmlatt.pattern <input> Specifies a regular expression that an <input> element's value is checked against.
* hmlatt.placeholder <input>, <textarea> Specifies a short hint that describes the expected value of the element.
* hmlatt.poster <video> Specifies an image to be shown while the video is downloading, or until the user hits the play button.
* hmlatt.preload <audio>, <video> Specifies if and how the author thinks the audio/video should be loaded when the page loads
* hmlatt.readonly <input>, <textarea> Specifies that the element is read-only
* hmlatt.rel <a>, <area>, <link> Specifies the relationship between the current document and the linked document.
* hmlatt.required <input>, <select>, <textarea> Specifies that the element must be filled out before submitting the form.
* hmlatt.reversed <ol> Specifies that the list order should be descending (9,8,7...).
* hmlatt.rows <textarea> Specifies the visible number of lines in a text area.
* hmlatt.rowspan <td>, <th> Specifies the number of rows a table cell should span
* hmlatt.sandbox <iframe> Enables an extra set of restrictions for the content in an <iframe>
* hmlatt.scope <th> Specifies whether a header cell is a header for a column, row, or group of columns or rows.
* hmlatt.scoped <style> Specifies that the styles only apply to this element's parent element and that element's child elements
* hmlatt.selected <option> Specifies that an option should be pre-selected when the page loads.
* hmlatt.shape <area> Specifies the shape of the area.
* hmlatt.size <input>, <select> Specifies the width, in characters (for <input>) or specifies the number of visible options (for <select>)
* hmlatt.sizes <link> Specifies the size of the linked resource.
* hmlatt.span <col>, <colgroup> Specifies the number of columns to span.
* hmlatt.spellcheck Global Attributes Specifies whether the element is to have its spelling and grammar checked or not.
* hmlatt.src <audio>, <embed>, <iframe>, <img>, <input>, <script>, <source>, <track>, <video> Specifies the URL of the media file.
* hmlatt.srcdoc <iframe> Specifies the HTML content of the page to show in the <iframe>.
* hmlatt.srclang <track> Specifies the language of the track text data (required if kind="subtitles").
* hmlatt.start <ol> Specifies the start value of an ordered list.
* hmlatt.step <input> Specifies the legal number intervals for an input field.
* hmlatt.style Global Attributes Specifies an inline CSS style for an element.
* hmlatt.tabindex Global Attributes Specifies the tabbing order of an element.
* hmlatt.target <a>, <area>, <base>, <form> Specifies the target for where to open the linked document or where to submit the form.
* hmlatt.title Global Attributes Specifies extra information about an element.
* hmlatt.translate Global Attributes Specifies whether the content of an element should be translated or not.
* hmlatt.type <button>, <embed>, <input>, <link>, <menu>, <object>, <script>, <source>, <style> Specifies the type of element.
* hmlatt.usemap <img>, <object> Specifies an image as a client-side image-map.
* hmlatt.value <button>, <input>, <li>, <option>, <progress>, <param> Specifies the value of the element.
* hmlatt.width <canvas>, <embed>, <iframe>, <img>, <input>, <object>, <video> Specifies the width of the element.
* hmlatt.wrap <textarea> Specifies how the text in a text area is to be wrapped when submitted in a form.
[http://www.w3schools.com/tags/ref_attributes.asp]

Htmleltatt.generic.BOOLEAN

name::
* McsEngl.Htmleltatt.generic.BOOLEAN@cptIt,
* McsEngl.htmlboolean-attribute@cptIt,

_DESCRIPTION:
There existance (with no value) indicates truthness.
[hmnSngo.2015-05-23]

Htmleltatt.generic.CONTENT-ATTRIBUTES

name::
* McsEngl.Htmleltatt.generic.CONTENT-ATTRIBUTES@cptIt,
* McsEngl.htmlelt'content-attributes@cptIt,

_DESCRIPTION:
Content attributes
A normative list of attributes that may be specified on the element (except where otherwise disallowed), along with non-normative descriptions of those attributes. (The content to the left of the dash is normative, the content to the right of the dash is not.)
[https://html.spec.whatwg.org/multipage/dom.html#concept-element-attributes]

Htmleltatt.generic.DEPRECATED

name::
* McsEngl.Htmleltatt.generic.DEPRECATED@cptIt,
* McsEngl.htmldeprecated-attribute@cptIt,

_SPECIFIC:
HTML Decprecated Attributes
Following is the list of deprecated HTML attributes and alternative CSS options available.

Attribute  Description  Alternate
* htmleltatt.align  Specifies positioning of an element  text-align, float & vertical-align
* htmleltatt.alink  Specifies the color of an active link or selected link  active
* htmleltatt.background  Specifies background image  background-image
* htmleltatt.bgcolor  Specifies background color  background-color
* htmleltatt.border  Specifies a border width of any element  border-width
* htmleltatt.clear  Indicates how the browser should display the line after the <br /> element  clear
* htmleltatt.height  Specifies height of body and other elements  height
* htmleltatt.hspace  Specifies the amount of whitespace or padding that should appear left or right an element  padding
* htmleltatt.language  Specifies scripting language being used  type
* htmleltatt.link  Specifies the default color of all links in the document  link
* htmleltatt.nowrap  Prevents the text from wrapping within that table cell  white-space
* htmleltatt.start  Indicates the number at which a browser should start numbering a list  counter-reset
* htmleltatt.text  Specifies color of body text  color
* htmleltatt.type  Specifies the type of list in <li> tag  list-style-type
* htmleltatt.vlink  Specifies the color of visited links  visited
* htmleltatt.vspace  Specifies the amount of whitespace or padding that should appear above or below an element  padding
* htmleltatt.width  Specifies width of body and other elements  width
[http://www.tutorialspoint.com/html/html_deprecated_tags.htm]

Htmleltatt.generic.EVENT

name::
* McsEngl.Htmleltatt.generic.EVENT@cptIt,
* McsEngl.htmlevent@cptIt,

_DESCRIPTION:
As html is becoming only CONTENT language, these events are NOT USED. JavaScript is used to code the functionality of these events.
[hmnSngo.2014-08-09]
===
Global Event Attributes

HTML 4 added the ability to let events trigger actions in a browser, like starting a JavaScript when a user clicks on an element.

To learn more about programming events, please visit our JavaScript tutorial and our DHTML tutorial.

Below are the global event attributes that can be added to HTML5 elements to define event actions.
[http://www.w3schools.com/html5/html5_ref_eventattributes.asp]

_SPECIFIC:
ent attributes[edit]
<frameset>  onload  onunload                              
<body>  onload  onunload    onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<abbr>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<acronym>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<address>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<b>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<big>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<blockquote>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<caption>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<center>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<cite>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<code>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<col>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<colgroup>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<dd>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<del>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<dfn>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<dir>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<div>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<dl>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<dt>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<em>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<fieldset>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<h1>, <h2>, <h3>, <h4>, <h5>, <h6>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<hr>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<i>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<ins>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<kbd>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<legend>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<li>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<link>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<map>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<menu>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<noframes>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<noscript>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<object>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<ol>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<optgroup>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<option>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<p>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<pre>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<q>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<s>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<samp>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<small>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<span>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<strike>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<strong>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<sub>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<sup>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<table>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<tbody>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<td>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<tfoot>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<th>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<thead>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<tr>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<tt>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<u>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<ul>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<var>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<img>      onabort  onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup        
<a>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup  onblur  onfocus    
<area>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup  onblur  onfocus    
<button>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup  onblur  onfocus    
<form>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup  onblur  onfocus    
<label>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup  onblur  onfocus    
<select>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup  onblur  onfocus  onchange  
<input>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup  onblur  onfocus  onchange  onselect
<textarea>        onclick  ondblclick  onmousedown  onmousemove  onmouseout  onmouseover  onmouseup  onkeydown  onkeypress  onkeyup  onblur  onfocus  onchange  onselec
[http://en.wikipedia.org/wiki/HTML_attribute]

Htmleltatt.onclick

name::
* McsEngl.Htmleltatt.onclick@cptIt,
* McsEngl.onclick.html-568i@cptIt,

<input
onclick="javascript:alert('button clicked');return true;"
onmousedown="javascript:alert('button down');return true;"
onmouseup="javascript:alert('button up');return true;"
type="button" value="Button"/>

<div onclick="myFavoriteFunction();"></div>

<div onclick="alert('Message 1'); alert('Message 2');"></div>

Htmleltatt.onkeydown

name::
* McsEngl.Htmleltatt.onkeydown@cptIt,

<input onkeydown="javascript:return true;" type="text" name="textfield" />
<input onkeydown="javascript:return false;" type="text" name="textfield" />

Htmleltatt.generic.GLOBAL

name::
* McsEngl.Htmleltatt.generic.GLOBAL@cptIt,
* McsEngl.html'global-attribute@cptIt,

_DESCRIPTION:
HTML attributes give elements meaning and context.
The global attributes below can be used on any HTML5 element.

HTML5 Global Attributes
New: New global attributes in HTML5.
Attribute      Description
* htmlatt.accesskey    Specifies a shortcut key to activate/focus an element
* htmlatt.class    Specifies one or more classnames for an element (refers to a class in a style sheet)
* htmlatt.contenteditableNew  Specifies whether the content of an element is editable or not
* htmlatt.contextmenuNew  Specifies a context menu for an element. The context menu appears when a user right-clicks on the element
* htmlatt.dir    Specifies the text direction for the content in an element
* htmlatt.draggableNew  Specifies whether an element is draggable or not
* htmlatt.dropzoneNew  Specifies whether the dragged data is copied, moved, or linked, when dropped
* htmlatt.hiddenNew  Specifies that an element is not yet, or is no longer, relevant
* htmlatt.id      Specifies a unique id for an element
* htmlatt.lang    Specifies the language of the element's content
* htmlatt.spellcheckNew  Specifies whether the element is to have its spelling and grammar checked or not
* htmlatt.style    Specifies an inline CSS style for an element
* htmlatt.tabindex    Specifies the tabbing order of an element
* htmlatt.title    Specifies extra information about an element
* htmlatt.translateNew  Specifies whether the content of an element should be be translated or not
[http://www.w3schools.com/html5/html5_ref_globalattributes.asp]

Htmleltatt.generic.global.HTML5

name::
* McsEngl.Htmleltatt.generic.global.HTML5@cptIt,
* McsEngl.habt.html5.global@cptIt,
* McsEngl.html'html5-global-attribute@cptIt,

_SPECIFIC:
* contenteditable,
* contextmenu,
* draggable,
* dropzone,
* hidden,
* spellcheck,
* translate,
[http://www.w3schools.com/html5/html5_ref_globalattributes.asp]

Htmleltatt.generic.HML5

name::
* McsEngl.Htmleltatt.generic.HML5@cptIt,

_SPECIFIC:
As explained in previous chapter, elements may contain attributes that are used to set various properties of an element.

Some attributes are defined globally and can be used on any element, while others are defined for specific elements only. All attributes have a name and a value and look like as shown below in the example.

Following is the example of an HTML5 attributes which illustrates how to mark up a div element with an attribute named class using a value of "example" -

<div class="example">...</div>
Attributes may only be specified within start tags and must never be used in end tags.

HTML5 attributes are case insensitive and may be written in all uppercase or mixed case, although the most common convention is to stick with lowercase.

Standard Attributes
The attributes listed below are supported by almost all the HTML 5 tags.

Attribute  Options  Function
accesskey  User Defined  Specifies a keyboard shortcut to access an element.
align  right, left, center  Horizontally aligns tags
background  URL  Places an background image behind an element
bgcolor  numeric, hexidecimal, RGB values  Places a background color behind an element
class  User Defined  Classifies an element for use with Cascading Style Sheets.
contenteditable  true, false  Specifies if the user can edit the element's content or not.
contextmenu  Menu id  Specifies the context menu for an element.
data-XXXX  User Defined  Custom attributes. Authors of a HTML document can define their own attributes. Must start with "data-".
draggable  true,false, auto  Specifies whether or not a user is allowed to drag an element.
height  Numeric Value  Specifies the height of tables, images, or table cells.
hidden  hidden  Specifies whether element should be visible or not.
id  User Defined  Names an element for use with Cascading Style Sheets.
item  List of elements  Used to group elements.
itemprop  List of items  Used to group items.
spellcheck  true, false  Specifies if the element must have it's spelling or grammar checked.
style  CSS Style sheet  Specifies an inline style for an element.
subject  User define id  Specifies the element's corresponding item.
tabindex  Tab number  Specifies the tab order of an element.
title  User Defined  "Pop-up" title for your elements.
valign  top, middle, bottom  Vertically aligns tags within an HTML element.
width  Numeric Value  Specifies the width of tables, images, or table cells.
For a complete list of HTML5 Tags and related attributes please check reference to HTML5 Tags.

Custom Attributes
A new feature being introduced in HTML 5 is the addition of custom data attributes.

A custom data attribute starts with data- and would be named based on your requirement. Following is the simple example -

<div class="example" data-subject="physics" data-level="complex">
...
</div>
The above will be perfectly valid HTML5 with two custom attributes called data-subject and data-level. You would be able to get the values of these attributes using JavaScript APIs or CSS in similar way as you get for standard attributes.
[http://www.tutorialspoint.com/html5/html5_attributes.htm]

Htmleltatt.action

name::
* McsEngl.Htmleltatt.action@cptIt,
* McsEngl.html'action-attribute@cptIt,

_DESCRIPTION:

Htmleltatt.aria

name::
* McsEngl.Htmleltatt.aria@cptIt,
* McsEngl.hmlaria@cptIt,
* McsEngl.html'aria-attribute@cptIt,
* McsEngl.WAI-ARIA@cptIt,
* McsEngl.WAIARIA@cptIt,
* McsEngl.Web-Accessibility-Initiative-Accessible-Rich-Internet-Application@cptIt,

_ADDRESS.WPG:
* http://w3c.github.io/aria-in-html//
* http://www.w3.org/TR/wai-aria-practices//

_DESCRIPTION:
WAI-ARIA, the Accessible Rich Internet Applications Suite, defines a way to make Web content and Web applications more accessible to people with disabilities. It especially helps with dynamic content and advanced user interface controls developed with Ajax, HTML, JavaScript, and related technologies. Currently certain functionality used in Web sites is not available to some users with disabilities, especially people who rely on screen readers and people who cannot use a mouse. WAI-ARIA addresses these accessibility challenges, for example, by defining new ways for functionality to be provided to assistive technology. With WAI-ARIA, developers can make advanced Web applications accessible and usable to people with disabilities.
[http://www.w3.org/WAI/intro/aria.php]
===
Accessible Rich Internet Applications (ARIA)
In order to allow assistive technologies to convey appropriate information to persons with disabilities, web content requires semantic information about controls, structures, and behaviors. The Accessible Rich Internet Applications (WAI-ARIA) specification helps to define accessible user interface elements by providing an set of roles, states, and properties that can be used to improve the accessibility and interoperability of web content and applications. These semantics are designed to allow an author to properly convey user interface behaviors and structural information to assistive technologies in document-level markup.
[https://msdn.microsoft.com/en-us/library/hh801958(v=vs.85).aspx]
===
Accessible Rich Internet Applications (ARIA) defines ways to make Web content and Web applications (especially those developed with Ajax and JavaScript) more accessible to people with disabilities. For example, ARIA enables accessible navigation landmarks, JavaScript widgets, form hints and error messages, live content updates, and more.
ARIA is a set of special accessibility attributes which can be added to any markup, but is especially suited to HTML. The role attribute defines what the general type of object is (such as an article, alert, or slider). Additional ARIA attributes provide other useful properties, such as a description for a form or the current value of a progressbar.
ARIA is implemented in most popular browsers and screen readers. However, implementations vary and older technologies don't support it well (if at all). Use either "safe" ARIA that degrades gracefully, or ask users to upgrade to newer technology.
[https://developer.mozilla.org/en-US/docs/Web/Accessibility/ARIA]
===
Is the "ARIA" that is mentioned by other organizations the same as WAI-ARIA?
As far as we know, all of the documents and references to "ARIA" that are related to making Web sites accessible are actually references to WAI-ARIA.
"WAI-ARIA" is the abbreviation for the Accessible Rich Internet Applications documents. In order to avoid confusion, please use "WAI-ARIA" (instead of just "ARIA"), at least in titles, headings, and on first reference in documentation.
[http://www.w3.org/WAI/aria/faq#justaria]

_SPECIFIC:
* aria-disabled="false"
* aria-expanded="true"
* aria-haspopup="true"
* aria-label="Undo"
* aria-labeledby="id66"
* aria-pressed="false"

importance

Aria Attributes
The URL we scanned didn't have ARIA roles defined. Adding ARIA roles will make the content at this URL more accessible to people with disabilities.
Why is it important?
The web is open to anyone and anyone should be able to enjoy it. By using ARIA roles on a site your content will be more accessible to people with disabilities that need special software like screen readers to browse it.
[https://dev.windows.com/en-us/microsoft-edge/tools/staticscan/?url=http%3A%2F%2Fsynagonism.net]

Htmleltatt.state-and-property

name::
* McsEngl.Htmleltatt.state-and-property@cptIt,
* McsEngl.htmlatt.property-and-state@cptIt,

_DESCRIPTION:
The terms "states" and "properties" refer to similar features. Both provide specific information about an object, and both form part of the definition of the nature of roles. In this document, states and properties are both treated as aria-prefixed markup attributes. However, they are maintained conceptually distinct to clarify subtle differences in their meaning. One major difference is that the values of properties (such as aria-labelledby) are often less likely to change throughout the application life-cycle than the values of states (such as aria-checked) which may change frequently due to user interaction. Note that the frequency of change difference is not a rule; a few properties, such as aria-activedescendant, aria-valuenow, and aria-valuetext are expected to change often. Because the distinction between states and properties is of little consequence to most web content authors, this specification refers to both "states" and "properties" simply as "attributes" whenever possible.
[http://www.w3.org/TR/wai-aria/states_and_properties#statevsprop]

Htmleltatt.aria-disabled

name::
* McsEngl.Htmleltatt.aria-disabled@cptIt,

_DESCRIPTION:
Sets or retrieves the disabled state of this element.
[https://msdn.microsoft.com/en-us/library/cc304077(v=vs.85).aspx]

Htmleltatt.aria-label

name::
* McsEngl.Htmleltatt.aria-label@cptIt,

_DESCRIPTION:
This technique demonstrates how to use the aria-label attribute.

The aria-label attribute is used to define a string that labels the current element. Use it in cases where a text label is not visible on the screen. (If there is visible text labeling the element, use aria-labelledby instead.)

This attribute can be used with any typical HTML element; it is not limited to elements that have an ARIA role assigned.
[https://developer.mozilla.org/en-US/docs/Web/Accessibility/ARIA/ARIA_Techniques/Using_the_aria-label_attribute]

Htmleltatt.aria-labeledby

name::
* McsEngl.Htmleltatt.aria-labeledby@cptIt,
* McsEngl.html'aria-labeledby-attribute@cptIt,

_ADDRESS.WPG:
* http://www.w3.org/TR/wai-aria/states_and_properties#aria-labelledby,

_DESCRIPTION:
If the label text is visible on screen, authors SHOULD use aria-labelledby and SHOULD NOT use aria-label. Use aria-label only if the interface is such that it is not possible to have a visible label on the screen. As required by the text alternative computation, user agents give precedence to aria-labelledby over aria-label when computing the accessible name property.
[http://www.w3.org/TR/wai-aria/states_and_properties#aria-labelledby]

Htmleltatt.aria-haspopup

name::
* McsEngl.Htmleltatt.aria-haspopup@cptIt,
* McsEngl.html'aria-haspopup-attribute@cptIt,

_ADDRESS.WPG:
* http://www.w3.org/TR/wai-aria/states_and_properties#aria-haspopup,

Htmleltatt.aria-pressed

name::
* McsEngl.Htmleltatt.aria-pressed@cptIt,

_DESCRIPTION:
Sets or retrieves the pressed state of a button that can be toggled.
[https://msdn.microsoft.com/en-us/library/cc304088(v=vs.85).aspx]

Htmleltatt.role

name::
* McsEngl.Htmleltatt.role@cptIt,
* McsEngl.html'attribute.role@cptIt,
* McsEngl.html'role-attribute@cptIt,
* McsEngl.htmlrole@cptIt,

_DESCRIPTION:
Role
Main indicator of type. This semantic association allows tools to present and support interaction with the object in a manner that is consistent with user expectations about other objects of that type.
[http://www.w3.org/TR/wai-aria/terms#def_role]
===
As I understand it, roles were initially defined by XHTML but were deprecated. However, they are now defined by HTML 5, see here: http://www.w3.org/TR/wai-aria/#roles
The purpose of the role attribute is to identify to parsing software the exact function of an element (and its children) as part of a web application. This is mostly as an accessibility thing for screen readers, but I can also see it as being useful for embedded browsers and screen scrapers. In order to be useful to the unusual HTML client, the attribute needs to be set to one of the roles from the spec I linked. If you make up your own, this 'future' functionality can't work - a comment would be better.
Practicalities here: http://www.accessibleculture.org/articles/2011/04/html5-aria-2011/
[http://stackoverflow.com/a/10403139]

_CODE:
role="presentation"
role="button"
role="line"
role="option"
role="menubar"
role="menuitem"
role="toolbar"

Htmleltatt.class.global

name::
* McsEngl.Htmleltatt.class.global@cptIt,
* McsEngl.habt.class@cptIt,
* McsEngl.hmlatt.class@cptIt,
* McsEngl.html'attribute.class@cptIt,
* McsEngl.htmlclass-att@cptIt,
* McsEngl.htmlatt.class@cptIt,

_DESCRIPTION:
CSS make havy use of this attribute to denote the STYLE, which now is separeated from content.
[hmnSngo.2014-08-09]

css'class-selector#ql:css'class-selector#

name::
* McsEngl.css'class-selector@cptIt,

ljs'classList#ql:ljs'classlist_cpt#

name::
* McsEngl.ljs'classList@cptIt,

ljs'className#ql:ljs'classname_cpt#

name::
* McsEngl.ljs'className@cptIt,

Htmleltatt.cols

name::
* McsEngl.Htmleltatt.cols@cptIt,

_CODE.HML:
<textarea rows="4" cols="50">

Htmleltatt.contenteditable.global

name::
* McsEngl.Htmleltatt.contenteditable.global@cptIt,
* McsEngl.htmlcontenteditable@cptIt,
* McsEngl.htmlatt.contenteditable@cptIt,

_DESCRIPTION:
Firefox 3 – ContentEditable
July 23, 2007 at 3:32 pm · Filed under HTML, Javascript, Mozilla

Firefox 3 is expanding its rich WYSIWYG editing capabilities by adding support for the contentEditable attribute. Setting contentEditable to “true” allows you to make parts of a document editable. Firefox already supports using designMode to make an entire document editable. Here is a previous post about using designMode.

Here is an example of using contentEditable to make a simple rich editor in HTML: contenteditable.htm
(NOTE: requires Firefox3.a6+ or a browser that supports contentEditable)

The new contentEditable features support the same API as designMode for interacting with the editable element:

document.execCommand – Executes the given command.
document.queryCommandEnabled – Determines whether the given command can be executed on the document in its current state.
document.queryCommandIndeterm – Determines whether the current selection is in an indetermined state.
document.queryCommandState – Determines whether the given command has been executed on the current selection.
document.queryCommandValue – Determines the current value of the document, range, or current selection for the given command.
[http://starkravingfinkle.org/blog/2007/07/firefox-3-contenteditable/]

_CODE.HML:
<div contenteditable="true">
<h1>Heading1</h1>
HTML <b>content</b> <i>default</i> in textarea
<h2>heading2</h2>
para
para
</div>

Htmleltatt.data (CUSTOM)

name::
* McsEngl.Htmleltatt.data (CUSTOM)@cptIt,
* McsEngl.html'attribute.custom@cptIt,

_DESCRIPTION:
In HTML 5 you can/will be able to add custom attributes. Something like this:
<tag data-myAttri="myVal" />
===
A new feature being introduced in HTML 5 is the addition of custom data attributes. This is a, seemingly, bizarre addition to the specification – but actually provides a number of useful benefits.

Simply, the specification for custom data attributes states that any attribute that starts with “data-” will be treated as a storage area for private data (private in the sense that the end user can’t see it – it doesn’t affect layout or presentation).

This allows you to write valid HTML markup (passing an HTML 5 validator) while, simultaneously, embedding data within your page. A quick example:

<li class="user" data-name="John Resig" data-city="Boston"
data-lang="js" data-food="Bacon">
<b>John says:</b> <span>Hello, how are you?</span>
</li>
The above will be perfectly valid HTML 5. This should be a welcome addition to nearly every JavaScript developer. The question of the best means of attaching raw data to HTML elements – in a valid manner – has been a long-lingering question. Frameworks have tried to deal with this in different manners, two solutions being:

Using HTML, but with a custom DTD.
Using XHTML, with a specific namespace.
The addition of this prefix completely routes around both issues (including any extra markup for validation or needing to be valid XHTML) with this effective addition.
[http://ejohn.org/blog/html-5-data-attributes/]
===
A word of warning
As data attributes become more widely used, the potential for clashes in naming conventions becomes much greater. If you use an unimaginative attribute name such as data-height, then it is likely you will eventually come across a library or plugin that uses the same attribute name. Multiple scripts getting and setting a common data- attribute will probably cause chaos. In order to avoid this, I encourage people to choose a standard string (perhaps the site/plugin name) to prefix all their data- attributes — e.g. data-html5doctor-height or data-my-plugin-height.
[http://html5doctor.com/html5-custom-data-attributes/]

Htmleltatt.dir

name::
* McsEngl.Htmleltatt.dir@cptIt,
* McsEngl.hmldir@cptIt,
* McsEngl.htmldir@cptIt,

_CODE.HML:
<p dir="rtl">Write this text right-to-left!</p>
===
!Write this text right-to-left

Htmleltatt.disabled

name::
* McsEngl.Htmleltatt.disabled@cptIt,
* McsEngl.hmldisabled@cptIt,
* McsEngl.htmldisabled@cptIt,

_CODE.HML:
<textarea id="idEdrTarget" aria-hidden="true" disabled>Your content here.</textarea>

_CODE.LJS:
* jsdisabled
Definition and Usage
The disabled property sets or returns whether an element is disabled, or not.
A disabled element is unusable and un-clickable. Disabled elements are usually rendered in gray by default in browsers.

Syntax
Set the disabled property:
HTMLElementObject.disabled=true|false
Return the disabled property:
HTMLElementObject.disabled
[http://www.w3schools.com/jsref/prop_html_disabled.asp]

Htmleltatt.hidden.global

name::
* McsEngl.Htmleltatt.hidden.global@cptIt,
* McsEngl.habt.hidden@cptIt,
* McsEngl.html'attribute.hidden@cptIt,
* McsEngl.htmlhidden@cptIt,
* McsEngl.htmlatt.hidden@cptIt,

_DESCRIPTION:
Description
Using the hidden attribute (set to “true”), it is possible to hide any visual element that may otherwise appear with the embedded content. Typically it may be used for audio content whereby not including the attribute would result in the transport controls (play, pause, etc) being visible underneath the audio.

Example
The hidden attribute set to "true" to hide the transport control on some audio:
<embed src="Crash.wav" hidden="true"></embed>

Value
“true” or “false” only.
[http://www.sitepoint.com/web-foundations/hidden-html-attribute/]

Htmleltatt.hidefocus

name::
* McsEngl.Htmleltatt.hidefocus@cptIt,

_DESCRIPTION:
Browser support: IE,
Specifies whether a dotted rectangle (focus rectangle) is drawn around an object while it has focus.
This attribute has effect only for the focus rectangle.
If you want prevent the user from interacting with the object, use the DISABLED attribute.
If you want prevent the contents of the object from being changed, use the READONLY attribute.
In Firefox, Opera, Google Chrome and Safari, you can use the outline style property with a value of 'none' for similar functionality.
JavaScript page for this attribute: hideFocus. You can find other example(s) there.
Possible values:
This attribute has no values.
Specifying the HIDEFOCUS attribute with an arbitrary value has the same effect as specifying it with no value.
For example, all of the following declarations have the same effect: hidefocus, hidefocus="true", hidefocus="false", hidefocus="on", hidefocus="hidefocus".
Although Boolean attributes may be used with no value in HTML, for XHTML compatibility, always use the HIDEFOCUS attribute in the following format: hidefocus="hidefocus".
[http://help.dottoro.com/lhgdtcso.php]

Htmleltatt.id.global

name::
* McsEngl.Htmleltatt.id.global@cptIt,
* McsEngl.hmlatt.id@cptIt,
* McsEngl.hmlid@cptIt,
* McsEngl.hml'id@cptIt,
* McsEngl.habt.id@cptIt,
* McsEngl.html'id-attribute@cptIt,
* McsEngl.htmlid@cptIt,
* McsEngl.htmlatt.id@cptIt,

_DESCRIPTION:
The id attribute assigns a unique identifier to an element (which may be verified by an SGML parser). For example, the following paragraphs are distinguished by their id values:
<P id="myparagraph"> This is a uniquely named paragraph.</P>
<P id="yourparagraph"> This is also a uniquely named paragraph.</P>

The id attribute has several roles in HTML:
* As a style sheet selector.
* As a target anchor for hypertext links.
* As a means to reference a particular element from a script.
* As the name of a declared OBJECT element.
* For general purpose processing by user agents (e.g. for identifying fields when extracting data from HTML pages into a database, translating HTML documents into other formats, etc.).
[http://www.w3.org/TR/REC-html40/struct/global.html#id-and-class] 2010-08-28

_MULTIPLE_ID:
I understand that an id must be unique within an HTML/XHTML page.
My question is, for a given element, can I assign multiple ids to it?
<div id="nested_element_123 task_123"></div>
I realize I have an easy solution with simply using a class. I'm just curious about using ids in this manner.
===
My understanding has always been:
ID's are single use and are only applied to one element
They are used to identify a single element

Classes can be used more than once
They can therefore be applied to more than one element, and more than once per element
===
No. Every DOM element, if it has an id, has a single, unique id. You could approximate it using something like:
<div id='enclosing_id_123'><span id='enclosed_id_123'></span></div>
and then use navigation to get what you really want.
If you are just looking to apply styles, class names are better.

Htmleltatt.lang.global

name::
* McsEngl.Htmleltatt.lang.global@cptIt,
* McsEngl.html'lang-attribute@cptIt,
* McsEngl.htmllang@cptIt,
* McsEngl.htmlatt.lang@cptIt,

_DESCRIPTION:
* english: lang="en"
* frence: fr
* german: de
* greek: el
===
ISO-639-1#ql:lnghmn.2letter.iso.639-1# defines abbreviations for languages. In HTML and XHTML they can be used in the lang and xml:lang attributes.
[http://www.w3schools.com/tags/ref_language_codes.asp]
===
lang = language-code [CI]
This attribute specifies the base language of an element's attribute values and text content. The default value of this attribute is unknown.
[http://www.w3.org/TR/REC-html40/struct/dirlang.html#adef-lang]

xhtml'lang-attribute

name::
* McsEngl.xhtml'lang-attribute@cptIt,

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
This attribute specifies the base language of an element's attribute values and text content.
[http://xhtml.com/en/xhtml/reference/html/]

The Lang Attribute

The lang attribute applies to almost every XHTML element. It specifies the language of the content within an element.

If you use the lang attribute in an element, you must also add the xml:lang attribute, like this:
<div lang="it" xml:lang="it">Ciao bella!</div>
[http://www.w3schools.com/xhtml/xhtml_syntax.asp]

language-code

Two-letter primary codes are reserved for [ISO639] language abbreviations. Two-letter codes include fr (French), de (German), it (Italian), nl (Dutch), el (Greek), es (Spanish), pt (Portuguese), ar (Arabic), he (Hebrew), ru (Russian), zh (Chinese), ja (Japanese), hi (Hindi), ur (Urdu), and sa (Sanskrit).

Any two-letter subcode is understood to be a [ISO3166] country code.
[http://www.w3.org/TR/REC-html40/struct/dirlang.html#adef-lang]

Htmleltatt.maxlength

name::
* McsEngl.Htmleltatt.maxlength@cptIt,
* McsEngl.html'attribute.maxlength@cptIt,
* McsEngl.html'maxlength-attribute@cptIt,
* McsEngl.htmlmaxlength@cptIt,

_DESCRIPTION:
The maxlength (not max-length) attribute specifies the maximum length of the input string in characters or, more exactly, in code units. The browser is expected to enforce this, by refusing to accept more characters. However, this is not meant to act as a security measure, since it can be overridden trivially. Rather, it tells the user that no more characters will be accepted in processing the data. This is useful when you have to set an upper limit, e.g. your database can store only a fixed number of characters fpr some information, and also when there is a logical limit on the length (e.g., if the data is a two-letter code for a US state, it has the logical upper limit of 2).

The maxlength attribute is thus logical, and it is expected to work even in non-visual user interface. It is not meant to affect the visual appearance of the input field in any way.

The size attribute, in contrast, is for visual rendering only. It suggests a visible width for the field, in terms of “average” characters. This vague concept has not been clarified in specifications, and browsers implement it inconsistently. It works best when a monospace font is used. This attribute does not limit the amount of characters entered, but it affects usability: it is difficult to enter, say, a 30 characters long string in a field that lets you see only 10 characters at a time. The width of a field is also a signal to the user: it indicates the expected maximum width of the input.

It is often suitable to use both attributes, often with the same value. For example, if the field is for a 5-digit postal code, size=5 maxlength=5 is suitable, especially if you also set font-family: monospace, so that the actual width is more or less exactly five digits.

However, the values may differ. E.g., when asking for a line in a postal address, you might set size=30, since this is normally sufficient for a line, but maxlength=80, if this corresponds to the limitations set by your database or data processing and you have no particular reason not to allo such long lines.

The size attribute can in principle be replaced by CSS, since it deals with visual rendering only. However, the width is usually best set in characters, and there is no universally supported unit for the average width of a character in CSS; the new ch unit comes close, but isn’t quite the same and isn’t supported by old browsers.
[http://stackoverflow.com/a/25248436]

Htmleltatt.placeholder (Html5.new)

name::
* McsEngl.Htmleltatt.placeholder (Html5.new)@cptIt,
* McsEngl.hmlplaceholder@cptIt,

_DESCRIPTION:
HTML5 introduced a new attribute called placeholder. This attribute on <input> and <textarea> elements provides a hint to the user of what can be entered in the field. The place holder text must not contain carriage returns or line-feeds.
[http://www.tutorialspoint.com/html5/html5_web_forms2.htm]

Htmleltatt.rows

name::
* McsEngl.Htmleltatt.rows@cptIt,

_CODE.HML:
<textarea rows="4" cols="50">

Htmleltatt.size

name::
* McsEngl.Htmleltatt.size@cptIt,
* McsEngl.html'attribute.size@cptIt,
* McsEngl.html'size-attribute@cptIt,
* McsEngl.htmlsize@cptIt,

_DESCRIPTION:
The maxlength (not max-length) attribute specifies the maximum length of the input string in characters or, more exactly, in code units. The browser is expected to enforce this, by refusing to accept more characters. However, this is not meant to act as a security measure, since it can be overridden trivially. Rather, it tells the user that no more characters will be accepted in processing the data. This is useful when you have to set an upper limit, e.g. your database can store only a fixed number of characters fpr some information, and also when there is a logical limit on the length (e.g., if the data is a two-letter code for a US state, it has the logical upper limit of 2).

The maxlength attribute is thus logical, and it is expected to work even in non-visual user interface. It is not meant to affect the visual appearance of the input field in any way.

The size attribute, in contrast, is for visual rendering only. It suggests a visible width for the field, in terms of “average” characters. This vague concept has not been clarified in specifications, and browsers implement it inconsistently. It works best when a monospace font is used. This attribute does not limit the amount of characters entered, but it affects usability: it is difficult to enter, say, a 30 characters long string in a field that lets you see only 10 characters at a time. The width of a field is also a signal to the user: it indicates the expected maximum width of the input.

It is often suitable to use both attributes, often with the same value. For example, if the field is for a 5-digit postal code, size=5 maxlength=5 is suitable, especially if you also set font-family: monospace, so that the actual width is more or less exactly five digits.

However, the values may differ. E.g., when asking for a line in a postal address, you might set size=30, since this is normally sufficient for a line, but maxlength=80, if this corresponds to the limitations set by your database or data processing and you have no particular reason not to allo such long lines.

The size attribute can in principle be replaced by CSS, since it deals with visual rendering only. However, the width is usually best set in characters, and there is no universally supported unit for the average width of a character in CSS; the new ch unit comes close, but isn’t quite the same and isn’t supported by old browsers.
[http://stackoverflow.com/a/25248436]

Htmleltatt.spellcheck.global

name::
* McsEngl.Htmleltatt.spellcheck.global@cptIt,
* McsEngl.html'attribute.spellcheck@cptIt,
* McsEngl.html'spellcheck-attribute@cptIt,
* McsEngl.htmlspellcheck@cptIt,
* McsEngl.htmlatt.spellcheck@cptIt,

_CODE.HML:
<p contenteditable="true" spellcheck="true">This is a paragraph. It is editable. Try to change the text.</p>

Htmleltatt.style.global (Html401.new)

name::
* McsEngl.Htmleltatt.style.global (Html401.new)@cptIt,
* McsEngl.hmlatt.style@cptIt,
* McsEngl.html'attribute.style@cptIt,
* McsEngl.html'style-attribute@cptIt,
* McsEngl.htmlstyle@cptIt,
* McsEngl.htmlatt.style@cptIt,

_DESCRIPTION:
Markup languages such as HTML [HTML401] and SVG [SVG11] provide a style attribute on most elements, to hold inline style information that applies to those elements. This draft describes the syntax and interpretation of the CSS fragment that can be used in such style attributes.
[https://www.w3.org/TR/2013/REC-css-style-attr-20131107/]
===
Some document formats have a style attribute to permit the author to directly apply style information to specific elements in documents. If a document format defines a style attribute (whether named ‘style’ or something else) and the attribute accepts CSS as its value, then this specification defines that style attribute’s syntax and interpretation.
The following example shows the use of the style attribute in HTML [HTML401]:
<p style="color:#090; line-height: 1.2">...</p>
[https://www.w3.org/TR/2013/REC-css-style-attr-20131107/#intro]
===
Html-style corresponds to a css-declaration#ql:css'declaration#.
[hmnSngo.2014-11-16]
===
CSS is the language with which we code the functionality (presentation) of these attributes as html is becoming only content language.
[hmnSngo.2014-08-09]

_CODE.HML:
<img src="misc/img/nikkas.1978.jpg" style="width:424px; hight:317px" alt="nikkas"/>
- without 'px', does not work.
===
<p style="font-family:courier new; color:red; font-size:20px">
The style attribute defines a style for the <p> element.
===
style="font-family: 'arial black', 'avant garde';"

Htmleltatt.type

name::
* McsEngl.Htmleltatt.type@cptIt,

_DEFINITION:
Definition and Usage
The type attribute specifies the type of <input> element#ql:"htmlinput@cptIt"# to display.

The default type is: text.

Tip: This is not a required attribute, but we think you should always include it.
[http://www.w3schools.com/tags/att_input_type.asp]

_SPECIFIC:
Value  Description
button  Defines a clickable button (mostly used with a JavaScript to activate a script)
checkbox  Defines a checkbox
color  Defines a color picker
date  Defines a date control (year, month and day (no time))
datetime  The input type datetime has been removed from the HTML standard. Use datetime-local instead.
datetime-local  Defines a date and time control (year, month, day, hour, minute, second, and fraction of a second (no time zone)
email  Defines a field for an e-mail address
file  Defines a file-select field and a "Browse..." button (for file uploads)
hidden  Defines a hidden input field
image  Defines an image as the submit button
month  Defines a month and year control (no time zone)
number  Defines a field for entering a number
password  Defines a password field (characters are masked)
radio  Defines a radio button
range  Defines a control for entering a number whose exact value is not important (like a slider control)
reset  Defines a reset button (resets all form values to default values)
search  Defines a text field for entering a search string
submit  Defines a submit button
tel  Defines a field for entering a telephone number
text  Default. Defines a single-line text field (default width is 20 characters)
time  Defines a control for entering a time (no time zone)
url  Defines a field for entering a URL
week  Defines a week and year control (no time zone)
[http://www.w3schools.com/tags/att_input_type.asp]

Htmleltatt.value

name::
* McsEngl.Htmleltatt.value@cptIt,
* McsEngl.html'value-attribute@cptIt,
* McsEngl.htmlvalue@cptIt,
* McsEngl.value.html-attribute@cptIt,

_DEFINITION:
Definition and Usage
The value attribute specifies the value of an <input> element.

The value attribute is used differently for different input types:

For "button", "reset", and "submit" - it defines the text on the button
For "text", "password", and "hidden" - it defines the initial (default) value of the input field
For "checkbox", "radio", "image" - it defines the value associated with the input (this is also the value that is sent on submit)
Note: The value attribute is required with <input type="checkbox"> and <input type="radio">.

Note: The value attribute cannot be used with <input type="file">.
[http://www.w3schools.com/tags/att_input_value.asp]

_CODE.HML:
<form action="demo_form.asp">
First name: <input type="text" name="fname" value="John"><br>
Last name: <input type="text" name="lname" value="Doe"><br>
<input type="submit" value="Submit form">
</form>

Htmlelt'browser-compatibility

name::
* McsEngl.Htmlelt'browser-compatibility@cptIt,
* McsEngl.htmlelt'browser-support@cptIt,

Htmlelt'content

name::
* McsEngl.Htmlelt'content@cptIt,
* McsEngl.html'content-of-element@cptIt,
* McsEngl.hml'CONTET-MODEL@cptIt,

_DEFINITION:
The element content is everything between the start and the end tag
[http://www.w3schools.com/html/html_elements.asp]
===
* The contents of an element are any elements, character data, and comments that it contains. Attributes and their values are not considered to be the “contents” of an element.
[http://dev.w3.org/html5/markup/spec.html#contents]
===
A normative description of what content must be included as children and descendants of the element.
[http://dev.w3.org/html5/spec/Overview.html#element-definitions] 2010-10-21
===
Each element defined in this specification has a content model: a description of the element's expected contents. An HTML element must have contents that match the requirements described in the element's content model.

As noted in the conformance and terminology sections, for the purposes of determining if an element matches its content model or not, CDATASection nodes in the DOM are treated as equivalent to Text nodes, and entity reference nodes are treated as if they were expanded in place.
[http://dev.w3.org/html5/spec/Overview.html#content-models] 2010-10-21

SPECIFIC

_DESCRIPTION:
3.2.5.1 Kinds of content
Each element in HTML falls into zero or more categories that group elements with similar characteristics together. The following broad categories are used in this specification:
Metadata content
Flow content
Sectioning content
Heading content
Phrasing content
Embedded content
Interactive content
Some elements also fall into other categories, which are defined in other parts of this specification.
[http://dev.w3.org/html5/spec/Overview.html#content-models]
===
Each HTML element must abide by rules defining what kind of content it can have. These rules are grouped into content models common to several elements. Each HTML element belongs to zero, one, or multiple content models, each setting rules that the element's content must follow in an HTML-conformant document.
There are three types of content categories:
Main content categories, which describe common content rules shared by many elements;
Form-related content categories, which describe content rules common to form-related elements;
Specific content categories, which describe rare categories shared only by a few elements, sometimes only in a specific context.
[https://developer.mozilla.org/en-US/docs/Web/Guide/HTML/Content_categories#Sectioning_content]

Html'content.EMBEDDED

name::
* McsEngl.Html'content.EMBEDDED@cptIt,
* McsEngl.html'embedded-content@cptIt,

Embedded content is content that imports another resource into the document, or content from another vocabulary that is inserted into the document.

audio canvas embed iframe img math object svg video
Elements that are from namespaces other than the HTML namespace and that convey content but not metadata, are embedded content for the purposes of the content models defined in this specification. (For example, MathML, or SVG.)

Some embedded content elements can have fallback content: content that is to be used when the external resource cannot be used (e.g. because it is of an unsupported format). The element definitions state what the fallback is, if any.
[http://dev.w3.org/html5/spec/Overview.html#embedded-content-0] 2010-10-21

Html'content.HEADING

name::
* McsEngl.Html'content.HEADING@cptIt,
* McsEngl.html'heading-content@cptIt,

Heading content defines the header of a section (whether explicitly marked up using sectioning content elements, or implied by the heading content itself).

h1 h2 h3 h4 h5 h6 hgroup
[http://dev.w3.org/html5/spec/Overview.html#heading-content-0] 2010-10-21

Html'content.SECTIONING

name::
* McsEngl.Html'content.SECTIONING@cptIt,
* McsEngl.html'sectioning-content@cptIt,

_DESCRIPTION:
Sectioning content is content that defines the scope of headings and footers.

article aside nav section

Each sectioning content element potentially has a heading and an outline. See the section on headings and sections for further details.

There are also certain elements that are sectioning roots. These are distinct from sectioning content, but they can also have an outline.
[http://dev.w3.org/html5/spec/Overview.html#sectioning-content-0] 2010-10-21

Html'content.TEXT

name::
* McsEngl.Html'content.TEXT@cptIt,

_DESCRIPTION:
Content that is text.

Htmlelt'context

name::
* McsEngl.Htmlelt'context@cptIt,
* McsEngl.html'context-of-element@cptIt,

_DESCRIPTION:
Contexts in which this element can be used
A non-normative description of where the element can be used. This information is redundant with the content models of elements that allow this one as a child, and is provided only as a convenience.
[http://dev.w3.org/html5/spec/Overview.html#element-definitions] 2010-10-21

Htmlelt'jsevent

name::
* McsEngl.Htmlelt'jsevent@cptIt,

_DESCRIPTION:
Every html-element supports some js-events, the names of which are stored as html-element-attributes.
[hmnSngo.2015-05-19]

_CODE.HML:
<button onclick="fSave()">Save</button>

Htmlelt'jsfunction

name::
* McsEngl.Htmlelt'jsfunction@cptIt,

_DESCRIPTION:
A-js-function which constructs a-js-object that represents the-html-element.
[hmnSngo.2015-05-19]

Htmlelt'jsobject

name::
* McsEngl.Htmlelt'jsobject@cptIt,

_DESCRIPTION:
http://synagonism.net/dMiw/dTchInf/lngJs.html#idLjbo that represents the-html-element.
[hmnSngo.2015-05-19]

Htmlelt'dom-interface

name::
* McsEngl.Htmlelt'dom-interface@cptIt,
* McsEngl.DOM-interface@cptIt,

_DESCRIPTION:
DOM interface
A normative definition of a DOM interface that such elements must implement.
[http://dev.w3.org/html5/spec/Overview.html#element-definitions]

Htmlelt'layer#ql:css'z_index#

name::
* McsEngl.Htmlelt'layer@cptIt,

Htmlelt'margin#ql:css'margin#

name::
* McsEngl.Htmlelt'margin@cptIt,

Htmlelt'position

name::
* McsEngl.Htmlelt'position@cptIt,

Htmlelt'position.DISPLAY

name::
* McsEngl.Htmlelt'position.DISPLAY@cptIt,

Htmlelt'position.PHYSICAL

name::
* McsEngl.Htmlelt'position.PHYSICAL@cptIt,

Htmlelt'tag

name::
* McsEngl.Htmlelt'tag@cptIt,
* McsEngl.html'tag-of-element@cptIt,

An HTML element may include a name, some attributes and some text or hypertext, and will appear in an HTML document as
<tag_name> text </tag_name>
<tag_name attribute_name=argument> text </tag_name>, or just
<tag_name>

"Tags" are embedded in the text. A tag consists of
- a "<",
- a "directive",
- zero or more parameters
- and a ">".
Matched pairs of directives, like <title> and </title> are used to delimit text which is to appear in a special place or style.

Links to other documents are in the form
<a name="baz" href="http://machine.edu/subdir/file.html"> foo</a>
where "a", "/a" delimit an "anchor" called baz, "href" introduces a hypertext reference, which in this case is a Uniform Resource Locator (URL) (the thing in double quotes in the example above). The text "foo" will be the label appearing on the link in the browser.

A certain place within an HTML document can be specified by following the document name with a hash (#) and the name of an anchor at that position.

Other common tags include <p> for a new paragraph, <b>..</b> for bold text, <ul> for an unnumbered list, <pre> for preformated text, <h1>, <h2> ..<h6> for headings.
HTML supports some national characters through special escape sequences.
[WWW]

TAGS are NOT case sensitive, αλλά συνηθίζεται οι λέξεις να γράφονται με κεφαλαία γράμματα.

Htmlelt'tag'Case

name::
* McsEngl.Htmlelt'tag'Case@cptIt,

HTML Tip: Use Lowercase Tags

HTML tags are not case sensitive: <P> means the same as <p>. Plenty of web sites use uppercase HTML tags in their pages.

W3Schools use lowercase tags because the World Wide Web Consortium (W3C) recommends lowercase in HTML 4, and demands lowercase tags in future versions of (X)HTML.
[http://www.w3schools.com/html/html_elements.asp]

Htmlelt'Tag-omission-in-text/html

name::
* McsEngl.Htmlelt'Tag-omission-in-text/html@cptIt,

_DESCRIPTION:
Tag omission in text/html
A non-normative description of whether, in the text/html syntax, the start and end tags can be omitted. This information is redundant with the normative requirements given in the optional tags section, and is provided in the element definitions only as a convenience.
[https://html.spec.whatwg.org/multipage/dom.html#concept-element-tag-omission]

Htmlelt'tag.SPECIFIC

name::
* McsEngl.Htmlelt'tag.SPECIFIC@cptIt,

Htmlelt'tag.End

name::
* McsEngl.Htmlelt'tag.End@cptIt,
* McsEngl.html'closing-tag@cptIt,

Don't Forget the End Tag

Most browsers will display HTML correctly even if you forget the end tag:
<p>This is a paragraph
<p>This is a paragraph

The example above will work in most browsers, but don't rely on it. Forgetting the end tag can produce unexpected results or errors.

Note: Future version of HTML will not allow you to skip end tags.

Htmlelt'tag.Start

name::
* McsEngl.Htmlelt'tag.Start@cptIt,
* McsEngl.html'opening-tag@cptIt,

An HTML element starts with a start tag / opening tag
[http://www.w3schools.com/html/html_elements.asp]

Htmlelt'version

name::
* McsEngl.Htmlelt'version@cptIt,

_VERSION.CREATED:

_VERSION.DEPRECATED:

Htmlelt'width

name::
* McsEngl.Htmlelt'width@cptIt,

SPECIFIC

name::
* McsEngl.helt.specific@cptIt,
* McsEngl.htmlelt.specific@cptIt,
* McsEngl.htmlelt.specific@cptIt,
* McsEngl.html'elt.specific@cptIt,

_ADDRESS.WPG:
* https://developer.mozilla.org/en-US/docs/Web/HTML/Element,

_SPECIFIC:
* block,
* blockNo (inline)#ql:html'elm.inline#
* displayable
* displayableNo
* generic#ql:html'elt.generic#
* genericNo

Htmlelt.SPECIFIC-DIVISION.content

name::
* McsEngl.Htmlelt.SPECIFIC-DIVISION.content@cptIt,

_SPECIFIC:
3.2.4.2 Kinds of content
Each element in HTML falls into zero or more categories that group elements with similar characteristics together. The following broad categories are used in this specification:
Metadata content
Flow content
Sectioning content
Heading content
Phrasing content
Embedded content
Interactive content
[https://html.spec.whatwg.org/multipage/dom.html#content-categories]

Htmlelt.SPECIFIC-DIVISION.CSS

name::
* McsEngl.Htmlelt.SPECIFIC-DIVISION.CSS@cptIt,

_DESCRIPTION:
We can classify (and make divisions) the html-elements AND in relation to css-attributes we give to them.
[hmnSngo.2013-08-15]

_SPECIFIC:
* block-element##
* inline-element##
* positioned-element##
* positioned.no-element##

Htmlelt.GENERIC

name::
* McsEngl.Htmlelt.GENERIC@cptIt,
* McsEngl.html'elt.Generic@cptIt,
* McsEngl.html'elt'specific.GENERIC@cptIt,
* McsEngl.html'elt'category@cptIt,
* McsEngl.html'elt'group@cptIt,
* McsEngl.html'generic-element@cptIt,
* McsEngl.htmlelt.Category@cptIt,

_DESCRIPTION:
Each element in HTML falls into zero or more categories that group elements with similar characteristics together. The following broad categories are used in this specification:

Metadata content
Flow content
Sectioning content
Heading content
Phrasing content
Embedded content
Interactive content

Some elements also fall into other categories, which are defined in other parts of this specification.
[http://dev.w3.org/html5/spec/Overview.html#content-categories] 2010-10-21
===
Categories
A list of categories to which the element belongs. These are used when defining the content models for each element.
[https://html.spec.whatwg.org/multipage/dom.html#concept-element-categories]

Htmlelt.generic.BLOCK

name::
* McsEngl.Htmlelt.generic.BLOCK@cptIt,
* McsEngl.hmlEltBlk@cptIt,
* McsEngl.hmlElt.block@cptIt,
* McsEngl.helt.block@cptIt,
* McsEngl.html'block-elements@cptIt,
* McsEngl.htmlelt.block@cptIt,

_GENERIC:
* generic-element#ql:html'element.generic#

_DEFINITION:
In visual browsers, displayable elements can be rendered as either block or inline. While all elements are part of the document sequence, block elements appear within their parent elements:
* as rectangular objects which do not break across lines;
* with block margins, width and height properties which can be set independently of the surrounding elements.
Conversely, inline elements are treated as part of the flow of document text; they cannot have margins, width or height set, and do break across lines.
[http://en.wikipedia.org/wiki/HTML_element] 2010-05-13
===
Description
1. HTML block level elements can appear in the body of an HTML page.
2. It can contain other block level as well as inline elements.
3. By default, block-level elements begin on new lines.
4. block level elements create larger structures (than inline elements).
[http://www.w3resource.com/html/HTML-block-level-and-inline-elements.php]

SECOND-BOOLEAN:
BLOCKQUOTE = new Tag("blockquote", true, true);
BODY = new Tag("body", true, true);
DD = new Tag("dd", true, true);
DIR#ql:htmlelt.dir# = new Tag("dir", true, true);
DIV = new Tag("div", true, true);
DL = new Tag("dl", true, true);
DT = new Tag("dt", true, true);
H1 = new Tag("h1", true, true);
H2 = new Tag("h2", true, true);
H3 = new Tag("h3", true, true);
H4 = new Tag("h4", true, true);
H5 = new Tag("h5", true, true);
H6 = new Tag("h6", true, true);
HEAD = new Tag("head", true, true);
LI = new Tag("li", true, true);
MENU = new Tag("menu", true, true);
NOFRAMES = new Tag("noframes", true, true);
OL = new Tag("ol", true, true);
P = new Tag("p", true, true);
PRE = new Tag("pre", true, true);
TABLE = new Tag("table", false, true);
TD = new Tag("td", true, true);
TH = new Tag("th", true, true);
TITLE = new Tag("title", true, true);
TR = new Tag("tr", false, true);
UL = new Tag("ul", true, true);
==================================
BR = new Tag("br", true, false);
CENTER = new Tag("center", true, false);
FORM = new Tag("form", true, false);
HR = new Tag("hr", true, false);
HTML = new Tag("html", true, false);
ISINDEX = new Tag("isindex", true, false);

_SPECIFIC:
p
h1, h2, h3, h4, h5, h6
ol, ul
pre
address
blockquote
dl
div
fieldset
form
hr
noscript
table
[http://www.w3resource.com/html/HTML-block-level-and-inline-elements.php]

Htmlelt.generic.BLOCK.NO (INLINE)

name::
* McsEngl.Htmlelt.generic.BLOCK.NO (INLINE)@cptIt,
* McsEngl.htmleltIln@cptIt,
* McsEngl.htmlelt.inline@cptIt,
* McsEngl.helt.inline@cptIt,
* McsEngl.html'inline-element@cptIt,
* McsEngl.inline-element-of-html@cptIt568,

_GENERIC:
* generic-element#ql:html'element.generic#

_DEFINITION:
In visual browsers, displayable elements can be rendered as either block or inline. While all elements are part of the document sequence, block elements appear within their parent elements:
* as rectangular objects which do not break across lines;
* with block margins, width and height properties which can be set independently of the surrounding elements.
Conversely, inline elements are treated as part of the flow of document text; they cannot have margins, width or height set, and do break across lines.
[http://en.wikipedia.org/wiki/HTML_element] 2010-05-13
===
HTML inline elements
Description

1. HTML inline level elements can appear in the body of an HTML page.

2. It can contain data and other inline elements.

3. By default, inline elements do not begin on new lines.

4. inline elements create shorter structures (than block level elements).

List of inline elements
b, big, i, small, tt
abbr, acronym, cite, code, dfn, em, kbd, strong, samp, var
a, bdo, br, img, map, object, q, script, span, sub, sup
button, input, label, select, textarea
[http://www.w3resource.com/html/HTML-block-level-and-inline-elements.php]

Htmlelt.generic.BODY

name::
* McsEngl.Htmlelt.generic.BODY@cptIt,
* McsEngl.hml'body-elements@cptIt,
* McsEngl.htmlelt.BODY-GROUP@cptIt,

_GENERIC:
* generic-element#ql:html'element.generic#

_DEFINITION:
* the elements inside the body-element.

Htmlelt.generic.FLOW-CONTENT

name::
* McsEngl.Htmlelt.generic.FLOW-CONTENT@cptIt,
* McsEngl.hml'flow-content-elements@cptIt,

_DESCRIPTION:
Most elements that are used in the body of documents and applications are categorised as flow content.
[https://html.spec.whatwg.org/multipage/dom.html#flow-content-2]

_SPECIFIC:
* a, href="https://html.spec.whatwg.org/multipage/semantics.html#the-a-element"
* abbr, href="https://html.spec.whatwg.org/multipage/semantics.html#the-abbr-element"
* address, href="https://html.spec.whatwg.org/multipage/semantics.html#the-address-element"
* area, href="https://html.spec.whatwg.org/multipage/embedded-content.html#the-area-element" (if it is a descendant of a map element)
* article, href="https://html.spec.whatwg.org/multipage/semantics.html#the-article-element"
* aside, href="https://html.spec.whatwg.org/multipage/semantics.html#the-aside-element"
* audio, href="https://html.spec.whatwg.org/multipage/embedded-content.html#the-audio-element"
* b, href="https://html.spec.whatwg.org/multipage/semantics.html#the-b-element"
* bdi, href="https://html.spec.whatwg.org/multipage/semantics.html#the-bdi-element"
* bdo, href="https://html.spec.whatwg.org/multipage/semantics.html#the-bdo-element"
* blockquote, href="https://html.spec.whatwg.org/multipage/semantics.html#the-blockquote-element"
* br, href="https://html.spec.whatwg.org/multipage/semantics.html#the-br-element"
* button, href="https://html.spec.whatwg.org/multipage/forms.html#the-button-element"
* canvas, href="https://html.spec.whatwg.org/multipage/scripting.html#the-canvas-element"
* cite, href="https://html.spec.whatwg.org/multipage/semantics.html#the-cite-element"
* code, href="https://html.spec.whatwg.org/multipage/semantics.html#the-code-element"
* data, href="https://html.spec.whatwg.org/multipage/semantics.html#the-data-element"
* datalist, href="https://html.spec.whatwg.org/multipage/forms.html#the-datalist-element"
* del, href="https://html.spec.whatwg.org/multipage/semantics.html#the-del-element"
* details, href="https://html.spec.whatwg.org/multipage/forms.html#the-details-element"
* dfn, href="https://html.spec.whatwg.org/multipage/semantics.html#the-dfn-element"
* dialog, href="https://html.spec.whatwg.org/multipage/forms.html#the-dialog-element"
* div, href="https://html.spec.whatwg.org/multipage/semantics.html#the-div-element"
* dl, href="https://html.spec.whatwg.org/multipage/semantics.html#the-dl-element"
* em, href="https://html.spec.whatwg.org/multipage/semantics.html#the-em-element"
* embed, href="https://html.spec.whatwg.org/multipage/embedded-content.html#the-embed-element"
* fieldset, href="https://html.spec.whatwg.org/multipage/forms.html#the-fieldset-element"
* figure, href="https://html.spec.whatwg.org/multipage/semantics.html#the-figure-element"
* footer, href="https://html.spec.whatwg.org/multipage/semantics.html#the-footer-element"
* form, href="https://html.spec.whatwg.org/multipage/forms.html#the-form-element"
* h1, href="https://html.spec.whatwg.org/multipage/semantics.html#the-h1,-h2,-h3,-h4,-h5,-and-h6-elements"
* h2, href="https://html.spec.whatwg.org/multipage/semantics.html#the-h1,-h2,-h3,-h4,-h5,-and-h6-elements"
* h3, href="https://html.spec.whatwg.org/multipage/semantics.html#the-h1,-h2,-h3,-h4,-h5,-and-h6-elements"
* h4, href="https://html.spec.whatwg.org/multipage/semantics.html#the-h1,-h2,-h3,-h4,-h5,-and-h6-elements"
* h5, href="https://html.spec.whatwg.org/multipage/semantics.html#the-h1,-h2,-h3,-h4,-h5,-and-h6-elements"
* h6, href="https://html.spec.whatwg.org/multipage/semantics.html#the-h1,-h2,-h3,-h4,-h5,-and-h6-elements"
* header, href="https://html.spec.whatwg.org/multipage/semantics.html#the-header-element"
* hgroup, href="https://html.spec.whatwg.org/multipage/semantics.html#the-hgroup-element"
* hr, href="https://html.spec.whatwg.org/multipage/semantics.html#the-hr-element"
* i, href="https://html.spec.whatwg.org/multipage/semantics.html#the-i-element"
* iframe, href="https://html.spec.whatwg.org/multipage/embedded-content.html#the-iframe-element"
* img, href="https://html.spec.whatwg.org/multipage/embedded-content.html#the-img-element"
* input, href="https://html.spec.whatwg.org/multipage/forms.html#the-input-element"
* ins, href="https://html.spec.whatwg.org/multipage/semantics.html#the-ins-element"
* kbd, href="https://html.spec.whatwg.org/multipage/semantics.html#the-kbd-element"
* keygen, href="https://html.spec.whatwg.org/multipage/forms.html#the-keygen-element"
* label, href="https://html.spec.whatwg.org/multipage/forms.html#the-label-element"
* link, href="https://html.spec.whatwg.org/multipage/semantics.html#the-link-element" (if it is allowed in the body)
* main, href="https://html.spec.whatwg.org/multipage/semantics.html#the-main-element"
* map, href="https://html.spec.whatwg.org/multipage/embedded-content.html#the-map-element"
* mark, href="https://html.spec.whatwg.org/multipage/semantics.html#the-mark-element"
* MathML math
* menu, href="https://html.spec.whatwg.org/multipage/forms.html#the-menu-element"
* meta, "https://html.spec.whatwg.org/multipage/semantics.html#the-meta-element" (if the itemprop attribute is present)
* meter, href="https://html.spec.whatwg.org/multipage/forms.html#the-meter-element"
* nav, href="https://html.spec.whatwg.org/multipage/semantics.html#the-nav-element"
* noscript, href="https://html.spec.whatwg.org/multipage/scripting.html#the-noscript-element"
* object, href="https://html.spec.whatwg.org/multipage/embedded-content.html#the-object-element"
* ol, href="https://html.spec.whatwg.org/multipage/semantics.html#the-ol-element"
* output, href="https://html.spec.whatwg.org/multipage/forms.html#the-output-element"
* p, href="https://html.spec.whatwg.org/multipage/semantics.html#the-p-element"
* picture, href="https://html.spec.whatwg.org/multipage/embedded-content.html#the-picture-element"
* pre, href="https://html.spec.whatwg.org/multipage/semantics.html#the-pre-element"
* progress, href="https://html.spec.whatwg.org/multipage/forms.html#the-progress-element"
* q, href="https://html.spec.whatwg.org/multipage/semantics.html#the-q-element"
* ruby, href="https://html.spec.whatwg.org/multipage/semantics.html#the-ruby-element"
* s, href="https://html.spec.whatwg.org/multipage/semantics.html#the-s-element"
* samp, href="https://html.spec.whatwg.org/multipage/semantics.html#the-samp-element"
* script, href="https://html.spec.whatwg.org/multipage/scripting.html#the-script-element"
* section, href="https://html.spec.whatwg.org/multipage/semantics.html#the-section-element"
* select, href="https://html.spec.whatwg.org/multipage/forms.html#the-select-element"
* slot, href="https://html.spec.whatwg.org/multipage/scripting.html#the-slot-element"
* small, href="https://html.spec.whatwg.org/multipage/semantics.html#the-small-element"
* span, href="https://html.spec.whatwg.org/multipage/semantics.html#the-span-element"
* strong, href="https://html.spec.whatwg.org/multipage/semantics.html#the-strong-element"
* sub, href="https://html.spec.whatwg.org/multipage/semantics.html#the-sub-and-sup-elements"
* sup, href="https://html.spec.whatwg.org/multipage/semantics.html#the-sub-and-sup-elements"
* SVG code
* table, href="https://html.spec.whatwg.org/multipage/tables.html#the-table-element"
* template, href="https://html.spec.whatwg.org/multipage/scripting.html#the-template-element"
* textarea, href="https://html.spec.whatwg.org/multipage/forms.html#the-textarea-element"
* time, href="https://html.spec.whatwg.org/multipage/semantics.html#the-time-element"
* u, href="https://html.spec.whatwg.org/multipage/semantics.html#the-u-element"
* ul, href="https://html.spec.whatwg.org/multipage/semantics.html#the-ul-element"
* var, href="https://html.spec.whatwg.org/multipage/semantics.html#the-var-element"
* video, href="https://html.spec.whatwg.org/multipage/embedded-content.html#the-video-element"
* wbr, href="https://html.spec.whatwg.org/multipage/semantics.html#the-wbr-element"
* autonomous custom elements, href="https://html.spec.whatwg.org/multipage/scripting.html#autonomous-custom-element"
* Text-content, href="https://html.spec.whatwg.org/multipage/dom.html#text-content"

Htmlelt.generic.BREAK-GROUP

name::
* McsEngl.Htmlelt.generic.BREAK-GROUP@cptIt,

_GENERIC:
* generic-element#ql:html'element.generic#

FIRST-BOOLEAN:
BLOCKQUOTE = new Tag("blockquote", true, true);
BODY = new Tag("body", true, true);
BR = new Tag("br", true, false);
CENTER = new Tag("center", true, false);
DD = new Tag("dd", true, true);
DIR = new Tag("dir", true, true);
DIV = new Tag("div", true, true);
DL = new Tag("dl", true, true);
DT = new Tag("dt", true, true);
FORM = new Tag("form", true, false);
H1 = new Tag("h1", true, true);
H2 = new Tag("h2", true, true);
H3 = new Tag("h3", true, true);
H4 = new Tag("h4", true, true);
H5 = new Tag("h5", true, true);
H6 = new Tag("h6", true, true);
HEAD = new Tag("head", true, true);
HR = new Tag("hr", true, false);
HTML = new Tag("html", true, false);
ISINDEX = new Tag("isindex", true, false);
LI = new Tag("li", true, true);
MENU = new Tag("menu", true, true);
NOFRAMES = new Tag("noframes", true, true);
OL = new Tag("ol", true, true);
P = new Tag("p", true, true);
PRE = new Tag("pre", true, true);
TD = new Tag("td", true, true);
TH = new Tag("th", true, true);
TITLE = new Tag("title", true, true);
UL = new Tag("ul", true, true);

TABLE = new Tag("table", false, true);
TR = new Tag("tr", false, true);

Htmlelt.generic.content.HEADING

name::
* McsEngl.Htmlelt.generic.content.HEADING@cptIt,
* McsEngl.htmlelt.generic.HEADING-GROUP@cptIt,
* McsEngl.html'elt.heading@cptIt,

_DESCRIPTION:
[https://html.spec.whatwg.org/multipage/dom.html#heading-content-2]
===
Heading content defines the header of a section (whether explicitly marked up using sectioning content elements, or implied by the heading content itself).
h1 h2 h3 h4 h5 h6 hgroup
[http://dev.w3.org/html5/spec/Overview.html#heading-content-0] 2010-10-21

_GENERIC:
* generic-element#ql:html'element.generic#

_DESCRIPTION:
Heading content defines the header of a section (whether explicitly marked up using sectioning content elements, or implied by the heading content itself).

h1 h2 h3 h4 h5 h6 hgroup
[http://dev.w3.org/html5/spec/Overview.html#heading-content-0]
===
<h1> . . . </h1> Most prominent header
<h2> . . . </h2>
<h3> . . . </h3>
<h4> . . . </h4>
<h5> . . . </h5>
<h6> . . . </h6> Least prominent header

Htmlelt.generic.content.METADATA

name::
* McsEngl.Htmlelt.generic.content.METADATA@cptIt,
* McsEngl.html'metadata-content-element@cptIt,

_GENERIC:
* generic-element#ql:html'element.generic#

_DESCRIPTION:
Metadata content is content that sets up the presentation or behaviour of the rest of the content, or that sets up the relationship of the document with other documents, or that conveys other "out of band" information.
base#ql:idlmheltbase#,link,meta,noscript,script,style,template,title
[https://html.spec.whatwg.org/multipage/dom.html#metadata-content-2]
===
Metadata content is content that sets up the presentation or behavior of the rest of the content, or that sets up the relationship of the document with other documents, or that conveys other "out of band" information.
base command link meta noscript script style title
Elements from other namespaces whose semantics are primarily metadata-related (e.g. RDF) are also metadata content.
[http://dev.w3.org/html5/spec/Overview.html#metadata-content]

Htmlelt.generic.content.PHRASING

name::
* McsEngl.Htmlelt.generic.content.PHRASING@cptIt,
* McsEngl.html'prasing-content-element@cptIt,

_DESCRIPTION:
Phrasing content is the text of the document, as well as elements that mark up that text at the intra-paragraph level. Runs of phrasing content form paragraphs.
a abbr area (if it is a descendant of a map element) audio b bdi bdo br button canvas cite code data datalist del dfn em embed i iframe img input ins kbd keygen label map mark math meter noscript object output progress q ruby s samp script select small span strong sub sup svg template textarea time u var video wbr text
[https://www.w3.org/TR/html5/dom.html#phrasing-content-1]

_SPECIFIC:
a; abbr; audio; b; bdi; bdo; br; button; canvas; cite; code; data; datalist; del; dfn; em; embed; i; iframe; img; input; ins; kbd; keygen; label; map; mark; math; meter; noscript; object; output; progress; q; ruby; s; samp; script; select; small; span; strong; sub; sup; svg; template; textarea; time; u; var; video; wbr; Text,

Htmlelt.generic.content.SECTIONING

name::
* McsEngl.Htmlelt.generic.content.SECTIONING@cptIt,
* McsEngl.html'SectioningContent-element@cptIt,

_GENERIC:
* generic-element#ql:html'element.generic#

_DEFINITION:
Sectioning content is content that defines the scope of headings and footers.
article aside nav section
Each sectioning content element potentially has a heading and an outline. See the section on headings and sections for further details.
There are also certain elements that are sectioning roots. These are distinct from sectioning content, but they can also have an outline.
[https://html.spec.whatwg.org/multipage/dom.html#sectioning-content-2]
===
Sectioning content is content that defines the scope of headings and footers.
article aside nav section
Each sectioning content element potentially has a heading and an outline.
[http://dev.w3.org/html5/spec/Overview.html#sectioning-content-0]

_SEMANTIC_SECTION:
Sectioning content elements are always considered subsections of their nearest ancestor sectioning root or their nearest ancestor element of sectioning content, whichever is nearest, regardless of what implied sections other headings may have created.
[http://dev.w3.org/html5/spec/Overview.html#headings-and-sections]

Htmlelt.generic.CUSTOM (HtmleltCtm)

name::
* McsEngl.Htmlelt.generic.CUSTOM (HtmleltCtm)@cptIt,
* McsEngl.custom-elements-html@cptIt,
* McsEngl.htmleltCtm@cptIt,
* McsEngl.htmlelt.custom@cptIt,
* McsEngl.htmleltCtm@cptIt,
* McsEngl.hml-custom-element@cptIt,
* McsEngl.html-custom-element@cptIt,
* McsEngl.custom-element-html@cptIt,

_DESCRIPTION:
Custom elements are the answer to modernizing HTML; filling in the missing pieces, and bundling structure with behavior. If HTML doesn't provide the solution to a problem, we can create a custom element that does. Custom elements teach the browser new tricks while preserving the benefits of HTML.
[https://developers.google.com/web/fundamentals/getting-started/primers/customelements]

_WHOLE:
* web-components#ql:web_components#

HtmleltCtm'customElements object#ql:customelements_object_ljb#

name::
* McsEngl.HtmleltCtm'customElements object@cptIt,

HtmleltCtm'Name

name::
* McsEngl.HtmleltCtm'Name@cptIt,

_DESCRIPTION:
The name of a custom element must contain a dash (-). So <x-tags>, <my-element>, and <my-awesome-app> are all valid names, while <tabs> and <foo_bar> are not. This requirement is so the HTML parser can distinguish custom elements from regular elements. It also ensures forward compatibility when new tags are added to HTML. https://developers.google.com/web/fundamentals/getting-started/primers/customelements,

HtmleltCtm'Resource

name::
* McsEngl.HtmleltCtm'Resource@cptIt,

_ADDRESS.WPG:
* https://w3c.github.io/webcomponents/spec/custom//
* https://customelements.io// How do I add my elements to this list? 1 Add the web-components keyword to your bower.json or package.json file 2 Make sure your package is published to Bower or npm 3 Wait for it to show up! Shouldn't take longer than an hour :)
* https://developers.google.com/web/fundamentals/getting-started/primers/customelements/
* http://riotjs.com// custom-elements components,

SPECIFIC
HtmleltCtm.Customized-builtin-element

name::
* McsEngl.HtmleltCtm.Customized-builtin-element@cptIt,

_DESCRIPTION:
Let's say you wanted to create a fancier <button>. Instead of replicating the behavior and functionality of <button>, a better option is to progressively enhance the existing element using custom elements.

A customized built-in element is a custom element that extends one of the browser's built-in HTML tags. The primary benefit of extending an existing element is to gain all of its features (DOM properties, methods, accessibility). There's no better way to write a progressive web app than to progressively enhance existing HTML elements.
[https://developers.google.com/web/fundamentals/getting-started/primers/customelements]

HtmleltCtm.Self-closing

name::
* McsEngl.HtmleltCtm.Self-closing@cptIt,

_DESCRIPTION:
Custom elements cannot be self-closing because HTML only allows a few elements to be self-closing. Always write a closing tag (<app-drawer></app-drawer>).
[https://developers.google.com/web/fundamentals/getting-started/primers/customelements]

Htmlelt.generic.DEPRECATED

name::
* McsEngl.Htmlelt.generic.DEPRECATED@cptIt,
* McsEngl.htmlelt.deprecated@cptIt,
* McsEngl.htmlelt.removed@cptIt,
* McsEngl.html'elt.deprecated@cptIt,

_DESCRIPTION:
Deprecated
A deprecated element or attribute is one that has been outdated by newer constructs. Deprecated elements are defined in the reference manual in appropriate locations, but are clearly marked as deprecated. Deprecated elements may become obsolete in future versions of HTML.
User agents should continue to support deprecated elements for reasons of backward compatibility.

Definitions of elements and attributes clearly indicate which are deprecated.

This specification includes examples that illustrate how to avoid using deprecated elements. In most cases these depend on user agent support for style sheets. In general, authors should use style sheets to achieve stylistic and formatting effects rather than HTML presentational attributes. HTML presentational attributes have been deprecated when style sheet alternatives exist (see, for example, [CSS1]).
[https://www.w3.org/TR/1999/REC-html401-19991224/conform.html#deprecated]

_SPECIFIC:
* isindex (html4.01)#linkL#
===
Obsolete and deprecated elements
Warning: These are old HTML elements which are deprecated and should not be used. You should never use them in new projects, and should replace them in old projects as soon as you can. They are listed here for informational purposes only.
Element  Description
<htmlelt.acronym>  The HTML Acronym Element (<acronym>) allows authors to clearly indicate a sequence of characters that compose an acronym or abbreviation for a word.(removed hml5)

<applet#ql:htmlelt.applet#>  The HTML Applet Element (<applet>) identifies the inclusion of a Java applet.

<htmlelt.basefont>  The HTML basefont element (<basefont>) establishes a default font size for a document. Font size then can be varied relative to the base font size using the <font> element. (removed hml5)

<htmlelt.big>  The HTML Big Element (<big>) makes the text font size one size bigger (for example, from small to medium, or from large to x-large) up to the browser's maximum font size. (removed hml5)

<blink#ql:htmlelt.blink#>  The HTML Blink Element (<blink>) is a non-standard element causing the enclosed text to flash slowly.
<center#ql:htmlelt.center#>  The HTML Center Element (<center>) is a block-level element that can contain paragraphs and other block-level and inline elements. The entire content of this element is centered horizontally within its containing element (typically, the <body>).
<htmlelt.command>  The command element represents a command which the user can invoke.
<htmlelt.content>  The HTML <content> element is used inside of Shadow DOM as an insertion point. It is not intended to be used in ordinary HTML. It is used with Web Components. It has now been replaced by the <slot> element.
<dir#ql:htmlelt.dir#>  The HTML directory element (<dir>) represents a directory, namely a collection of filenames.
<font#ql:htmlelt.font#>  The HTML Font Element (<font>) defines the font size, color and face for its content.
<frame#ql:htmlelt.frame#>  <frame> is an HTML element which defines a particular area in which another HTML document can be displayed. A frame should be used within a <frameset>.
<frameset#ql:htmlelt.frameset#>  <frameset> is an HTML element which is used to contain <frame> elements.
<isindex#ql:htmlelt.isindex#>  <isindex> is an obsolete HTML element that puts a text field in a page for querying the document.
<htmlelt.keygen>  The HTML <keygen> element exists to facilitate generation of key material, and submission of the public key as part of an HTML form. This mechanism is designed for use with Web-based certificate management systems. It is expected that the <keygen> element will be used in an HTML form along with other information needed to construct a certificate request, and that the result of the process will be a signed certificate.
<listing#ql:htmlelt.listing#>  The HTML Listing Element (<listing>) renders text between the start and end tags without interpreting the HTML in between and using a monospaced font. The HTML 2 standard recommended that lines shouldn't be broken when not greater than 132 characters.
<htmlelt.marquee>  The HTML <marquee> element is used to insert a scrolling area of text.
<htmlelt.noembed>  The <noembed> element is a deprecated and non-standard way to provide alternative, or "fallback", content for browsers that do not support the <embed> element or do not support embedded content an author wishes to use.
<plaintext#ql:htmlelt.plaintext#>  The HTML Plaintext Element (<plaintext>) renders everything following the start tag as raw text, without interpreting any HTML. There is no closing tag, since everything after it is considered raw text.
<htmlelt.spacer>  <spacer> is an HTML element which is used for inserting white spaces to web pages. It was created by NetScape for achieving same effect as a single-pixel layout GIF image, which was something web designers used to use to add white spaces to web pages, without actually using a GIF. However <spacer> is not supported by any major browser and same effects can be created with various CSS rules. In Mozilla applications, support for this element was removed in Gecko 2.0. Therefore usage of <spacer> is unnecessary.
<htmlelt.strike>  The HTML Strikethrough Element (<strike>) renders text with a strikethrough, or a line through it. removed hml5
<tt#ql:htmlelt.tt#>  The HTML Teletype Text Element (<tt>) produces an inline element displayed in the browser's default monotype font. This element was intended to style text as it would display on a fixed width display, such as a teletype. It probably is more common to display fixed width type using the <code> element.
<xmp#ql:htmlelt.xmp#>  The HTML Example Element (<xmp>) renders text between the start and end tags without interpreting the HTML in between and using a monospaced font. The HTML2 specification recommended that it should be rendered wide enough to allow 80 characters per line.
[https://developer.mozilla.org/en-US/docs/Web/HTML/Element]

Htmlelt.OBSOLETE

name::
* McsEngl.Htmlelt.OBSOLETE@cptIt,
* McsEngl.hml'obsolete-element@cptIt,

_DESCRIPTION:
Obsolete
An obsolete element or attribute is one for which there is no guarantee of support by a user agent. Obsolete elements are no longer defined in the specification, but are listed for historical purposes in the changes section of the reference manual.
[https://www.w3.org/TR/1999/REC-html401-19991224/conform.html#deprecated]

Htmlelt.applet (Html5.deprecated)

name::
* McsEngl.Htmlelt.applet (Html5.deprecated)@cptIt,
* McsEngl.html'Applet-element@cptIt,

DefinitionRelation:
To include applets, authors should use the OBJECT element as the APPLET element is deprecated.
[http://www.w3.org/TR/REC-html40/struct/objects.html]

The applet element is a Java-specific variant of the embed element. The applet element is now obsoleted so that all extension frameworks (Java, .NET, Flash, etc) are handled in a consistent manner.
[http://dev.w3.org/html5/spec/Overview.html#the-applet-element] 2010-08-28

Here's a more complex example of an APPLET tag:
<applet codebase="http://...Nervous" code="Nervous.class" width=400 height=75 align=center >
<param name="text" value="This is the Applet Viewer.">
<blockquote>
<hr>
If you were using a Java-enabled browser,
you would see dancing text instead of this paragraph.
<hr>
</blockquote>
</applet>

Htmlelt.blink

name::
* McsEngl.Htmlelt.blink@cptIt,
* McsEngl.html'blink@cptIt,

<BLINK>
ΔΙΠΛΟ. κάνει το κείμενο που περικλείεται να αναβοσβήνει

Htmlelt.center (Html5.deprecated)

name::
* McsEngl.Htmlelt.center (Html5.deprecated)@cptIt,
* McsEngl.html'center@cptIt,

_DESCRIPTION:
* use Css#ql:css'centering#,
<CENTER>
ΔΙΠΛΟ. Κεντραρει το κείμενο που περικλείει

Htmlelt.dir (Html5.deprecated)

name::
* McsEngl.Htmlelt.dir (Html5.deprecated)@cptIt,
* McsEngl.hmldir@cptIt,
* McsEngl.html'dir@cptIt,

_DESCRIPTION:
Obsolete
This feature is obsolete. Although it may still work in some browsers, its use is discouraged since it could be removed at any time. Try to avoid using it.
Summary
The HTML directory element (<dir>) represents a directory, namely a collection of filenames.
Usage note: Do not use this element. Though present in the early HTML specification, it has been deprecated in HTML 4, then is obsolete in HTML5. Use the <ul> instead.
[https://developer.mozilla.org/en-US/docs/Web/HTML/Element/dir]
===
<DIR>...</DIR>
Present a directory list of items
<li> First item in the list <li> Second item in the list <li> Next item in the list.
Items should be less than 20 characters long.

Htmlelt.font (Html5.deprecated)

name::
* McsEngl.Htmlelt.font (Html5.deprecated)@cptIt,
* McsEngl.html'Font@cptIt,

HTML5:
The <font> tag is not supported in HTML 5. Use CSS to define fonts.
[http://www.w3schools.com/html5/tag_font.asp]

CSS:
 font-family: Georgia, "Times New Roman", Times, serif;
 font-size: 22px;
 font-weight: bold;

<FONT...>
ΔΙΠΛΟ. Ακολουθείται από το μέγεθος των γραμμάτων που ορίζει

EXAMPLE:
<font size="+1"><strong>Born to travel</strong></font><br>
Increases the size of the text.

<font color="#FF0000">(20/03/97)</font>
color red

<FONT FACE="code2000">

Htmlelt.frame (Html5.deprecated)

name::
* McsEngl.Htmlelt.frame (Html5.deprecated)@cptIt,
* McsEngl.html'frame@cptIt,

RESIZE:
If a frame has visible borders, the user can resize it by dragging the border. To prevent a user from doing this, you can add noresize="noresize" to the <frame> tag.

Htmlelt.frameset (Html5.deprecated)

name::
* McsEngl.Htmlelt.frameset (Html5.deprecated)@cptIt,
* McsEngl.html'frameset@cptIt,

_DEFINITION:
The frameset element holds two or more frame elements.

FRAME_SIZE:
The frameset column size can also be set in pixels (cols="200,500"), and one of the columns can be set to use the remaining space, with an asterisk (cols="25%,*").

<frameset cols="25%,50%,25%">
= 3 spliters

<frameset rows="25%,50%,25%">
= horizontal spliters.

a frame file:
<HTML> <HEAD> <TITLE>WordNet</TITLE> </HEAD>

<FRAMESET COLS="200,*">
<FRAME SRC="main.htm" NAME="tocframe">
<FRAME SRC="about.htm" NAME="targetframe">
</FRAMESET>

<NOFRAMES> Please follow <A HREF="main/">this link</A> to view the WordNet web site from a browser which does not support frames. We apologize for the inconvenience.
</NOFRAMES>
</HTML>

The main.htm file:
============
<HEAD>
<TITLE>Science-Support-System 1990</TITLE>
<BASE TARGET="targetframe"> </HEAD>

ANOTHER EXAMPLE:
<FRAMESET COLS="159,*" framespacing="0" frameborder=no border=0>
<FRAME SRC="scstoc.html" NAME="tocframe"  marginwidth=1 marginheight=1  scrolling="no" noresize >
<FRAME SRC="scs.html" NAME="targetframe"  marginwidth="3" marginheight="1"    SCROLLING="auto" resize> </FRAMESET>
<NOFRAMES> Please follow <A HREF="scs.html">this link</A> to view the paper from a browser which does not support frames.</NOFRAMES>

NESTED_FRAMESET:
<frameset rows="20%,*">

<frame src="frame_a.htm" />
<frameset cols="25%,75%">
<frame src="frame_b.htm" />
<frame src="frame_c.htm" />
</frameset>

</frameset>

= A FRAME
-------------------|----------------
B FRAME | C FRAME

Important: You cannot use the <body></body> tags together with the <frameset></frameset> tags! However, if you add a <noframes> tag containing some text for browsers that do not support frames, you will have to enclose the text in <body></body> tags! See how it is done in the first example below.

Htmlelt.isindex (Html401.deprecated)

name::
* McsEngl.Htmlelt.isindex (Html401.deprecated)@cptIt,
* McsEngl.html'isindex@cptIt,

_DESCRIPTION:
<ISINDEX>
HEAD TAG. Specifies that the current document describes a database that can be searched using the index search method appropriate for whatever client is being used to read the document. For example, a Lynx user will use the "s" keyboard command.

Htmlelt.listing

name::
* McsEngl.Htmlelt.listing@cptIt,
* McsEngl.html'listing@cptIt,

_DESCRIPTION:
<LISTING>...</LISTING>
Example computer listing; embedded taGs will be ignored, but embedded taBs will work. This is an archaic tag.

Htmlelt.menu

name::
* McsEngl.Htmlelt.menu@cptIt,
* McsEngl.html'menu@cptIt,

_DESCRIPTION:
<MENU>...</MENU>
Present an interactive menu.
<li> First item in the menu <li> Next item

Htmlelt.plaintext (Html32.deprecated)

name::
* McsEngl.Htmlelt.plaintext (Html32.deprecated)@cptIt,
* McsEngl.html'plaintext@cptIt,

_DESCRIPTION:
The <plaintext> tag should be avoided in any HTML because it has been deprecated since HTML version 3.2.
[http://www.authoringhtml.com/avoid/#plaintext]

<PLAINTEXT>
Similar to <pre> except no embedded tags will be recognized, and since there is no end tag, the remainder of the document will be rendered as plain text. This is an archaic tag. Note that some browsers actually recognize a </plaintext> tag, even though it is not defined by the standard.

Htmlelt.s

name::
* McsEngl.Htmlelt.s@cptIt,
* McsEngl.html's@cptIt,
* McsEngl.html's-element@cptIt,

_DESCRIPTION:
The s element represents contents that are no longer accurate or no longer relevant.

The s element is not appropriate when indicating document edits; to mark a span of text as having been removed from a document, use the del element.

In this example a recommended retail price has been marked as no longer relevant as the product in question has a new sale price.

<p>Buy our Iced Tea and Lemonade!</p>
<p><s>Recommended retail price: $3.99 per bottle</s></p>
<p><strong>Now selling for just $2.99 a bottle!</strong></p>
[http://dev.w3.org/html5/spec/Overview.html#the-s-element]

Htmlelt.tt (Html5.deprecated)

name::
* McsEngl.Htmlelt.tt (Html5.deprecated)@cptIt,
* McsEngl.html'tt@cptIt,

_DESCRIPTION:
The HTML Teletype Text Element (<tt>) produces an inline element displayed in the browser's default monotype font. This element was intended to style text as it would display on a fixed width display, such as a teletype. It probably is more common to display fixed width type using the <code> element.
[https://developer.mozilla.org/en-US/docs/Web/HTML/Element]
===
<TT>...t;/TT>
PHYSICAL STYLE. Typewriter font

Htmlelt.u (Html5.deprecated)

name::
* McsEngl.Htmlelt.u (Html5.deprecated)@cptIt,
* McsEngl.html'Underline@cptIt,
* McsEngl.html'u@cptIt,

HTML5:
The <u> tag is not supported in HTML 5. Use CSS instead.
[http://www.w3schools.com/html5/tag_u.asp]

CSS:
text-decoration: underline;

<U>...</U>
PHYSICAL STYLE. Underline.

Htmlelt.xmp

name::
* McsEngl.Htmlelt.xmp@cptIt,
* McsEngl.html'xmp@cptIt,

_DESCRIPTION:
<XMP>...</XMP>
Similar to <pre> except no embedded tags will be recognized.

Htmlelt.generic.DISPLAYABLE

name::
* McsEngl.Htmlelt.generic.DISPLAYABLE@cptIt,

_GENERIC:
* generic-element#ql:html'element.generic#

_DESCRIPTION:
In visual browsers, displayable elements can be rendered as either block or inline. While all elements are part of the document sequence, block elements appear within their parent elements:
* as rectangular objects which do not break across lines;
* with block margins, width and height properties which can be set independently of the surrounding elements.
Conversely, inline elements are treated as part of the flow of document text; they cannot have margins, width or height set, and do break across lines.
[http://en.wikipedia.org/wiki/HTML_element]

_SPECIFIC:
* block,
* inline,

Htmlelt.generic.EMPTY

name::
* McsEngl.Htmlelt.generic.EMPTY@cptIt,
* McsEngl.self-closing-htmlelt@cptIt,
* McsEngl.htmlelt.empty@cptIt,
* McsEngl.htmlelt.void@cptIt,

* McsEngl.htmlelt.empty@cptIt,
* McsEngl.htmlelt.void@cptIt,
* McsEngl.html'empty-elements@cptIt,
* McsEngl.empty-element-of-html@cptIt568i,
* McsEngl.html-self-closing-tag@cptIt568i,
* McsEngl.void-element-of-html@cptIt568i,

_GENERIC:
* generic-element#ql:html'element.generic#

_DEFINITION:
HTML5 does not require empty elements to be closed. But if you want stricter validation, or if you need to make your document readable by XML parsers, you must close all HTML elements properly.
[http://www.w3schools.com/html/html_elements.asp]
===
Empty Elements (Self Closing Tags) in HTML 5 and XHTML
Self Closing Tags are used for “Empty” Elements within XHTML and HTML5.

An empty element is an element that has no child element. Think of a pregnant woman – she has a child inside. Elements like…

<p><strong><em>Hello World!</em></strong></p>
…can contain other elements between the opening and closing tags. Empty elements do not. So there is no closing tag, we just end the opening tag with ” />” That is a space, slash and the closing greater than sign.

HTML4 Most people do not realize that although self closing tags are not part of the HTML4 standard, and will not pass the W3C Validator, nonetheless virtually ALL browsers available today accept self closing tags!

CNN.COM uses self closing tags in its HTML 4.o1 doctype pages! This prepares them for the jump to HTML5.

Below is my list of empty elements in their self closing tag form…

HTML5 or XHTML 1.x
<area />
<base />
<br />
<col />
<hr />
<img />
<input />
<link />
<meta />
<param />

XHTML 1.0 Transitional Only (add)
<basefont />
<frame />
[http://alantait.net/2010/10/15/empty-elements-self-closing-tags-in-html-5-and-xhtml/]
===
* A void element is an element whose content model never allows it to have contents under any circumstances. Void elements can have attributes.
[http://dev.w3.org/html5/markup/spec.html#syntax-elements]
===
* HTML elements without content are called empty elements. Empty elements can be closed in the start tag.

<br> is an empty element without a closing tag (it defines a line break).

In XHTML, XML, and future versions of HTML, all elements must be closed.

Adding a slash to the start tag, like <br />, is the proper way of closing empty elements, accepted by HTML, XHTML and XML.

Even if <br> works in all browsers, writing <br /> instead is more future proof.
[http://www.w3schools.com/html/html_elements.asp]

Should I close empty elements with /> or >?
Void elements in HTML (e.g. the br, img and input elements) do not require a trailing slash. e.g. Instead of writing <br />, you only need to write <br>. This is the same as in HTML4. However, due to the widespread attempts to use XHTML1, there are a significant number of pages using the trailing slash. Because of this, the trailing slash syntax has been permitted on void elements in HTML in order to ease migration from XHTML1 back to HTML.
The new HTML specification also introduces the ability to embed MathML elements. On elements inside a math element the trailing slash works just like it does in XML. I.e. it closes the element. This is only inside that context however, it does not work for normal HTML elements.
[http://wiki.whatwg.org/wiki/FAQ#Should_I_close_empty_elements_with_.2F.3E_or_.3E.3F]

_SPECIFIC:
HTML5 or XHTML 1.x
<area />
<base />
<br />
<col#ql:html'element.col# />
<hr />
<img />
<input />
<link />
<meta />
<param#ql:html'element.param# />

XHTML 1.0 Transitional Only (add)
<basefont />
<frame />

Htmlelt.generic.FORM-ASSOCIATED

name::
* McsEngl.Htmlelt.generic.FORM-ASSOCIATED@cptIt,
* McsEngl.html'form-associated-element@cptIt,

_GENERIC:
* generic-element#ql:html'element.generic#

Form-associated elements  button; fieldset; input; keygen; label; meter; object; output; progress; select; textarea
[http://dev.w3.org/html5/spec/Overview.html#element-content-categories] 2010-10-21

The HTML forms interface allows document creators to define HTML documents containing forms to be filled out by users. When a user fills out the form and presses a button indicating the form should be "submitted," the information on the form is sent to a server for processing. The server will usually prepare an HTML document using the information supplied by the user and return it to the client for display.

The following tags implement the forms interface:
<form> . . . </form>
<input>
<select> . . . </select>
<option>
<textarea> . . . </textarea>
The last four tags can only be used within a <form> . . . </form> element.

Htmlelt.generic.GRAPHIC

name::
* McsEngl.Htmlelt.generic.GRAPHIC@cptIt,
* McsEngl.hml'graphic-elements@cptIt,

_DESCRIPTION:
New graphic elements: <svg#ql:htmlelt.s#> and <canvas>.
[http://www.w3schools.com/html/html5_intro.asp]

Htmlelt.generic.HEAD

name::
* McsEngl.Htmlelt.generic.HEAD@cptIt,
* McsEngl.hml'head-elements@cptIt,
* McsEngl.html'elt.head-group@cptIt,

_GENERIC:
* generic-element#ql:html'element.generic#

_DEFINITION:
* the elements inside the-head-element#ql:idLmheltHead#.

_SPECIFIC:
* link-element#ql:html'elt.link#
* meta-element#ql:html'elt.meta#
* script-element#ql:html'elt.script#
* style-element#ql:html'elt.style#
* title-element#ql:html'elt.title#

Htmlelt.generic.HTML5

name::
* McsEngl.Htmlelt.generic.HTML5@cptIt,
* McsEngl.hmlet.hml5@cptIt,

_SPECIFIC:
A complete list of standard tags available in HTML5 is given below. All the tags are ordered alphabetically along with an indication if they have been introduced newly or they have been deprecated in HTML5.

Tag    Description
<!--...-->    Specifies a comment
<!DOCTYPE>  Specifies the document type
<a>    Specifies an anchor
<abbr>    Specifies an abbreviation
<acronym>  DEPRECATED:Specifies an acronym
<address>  Specifies an address element
<applet>    DEPRECATED: Specifies an applet
<area>    Specifies an area inside an image map
<article#ql:htmlelt.article#>    NEW-TAG: Specifies an independent piece of content of a document, such as a blog entry or newspaper article
<aside#ql:htmlelt.aside#>    NEW-TAG:Specifies a piece of content that is only slightly related to the rest of the page.
<audio>    NEW-TAG:Specifies an audio file.
<base>    Specifies a base URL for all the links in a page
<basefont>  DEPRECATED: Specifies a base font
<bdo>    Specifies the direction of text display
<bgsound>  Specifies the background music
<blink>    Specifies a text which blinks
<blockquote>  Specifies a long quotation
<body>    Specifies the body element
<br>    Inserts a single line break
<button>    Specifies a push button
<canvas>    NEW-TAG:This is used for rendering dynamic bitmap graphics on the fly, such as graphs or games.
<caption>  Specifies a table caption
<center>    DEPRECATED: Specifies centered text
<col>    Specifies attributes for table columns
<colgroup>  Specifies groups of table columns
<command#ql:htmlelt.command#>  NEW-TAG:Specifies a command the user can invoke.
<comment>  Puts a comment in the document
<datalist#ql:htmlelt.datalist#>  NEW-TAG:Together with the a new list attribute for input can be used to make comboboxes
<dd>    Specifies a definition description
<del>    Specifies deleted text
<details#ql:htmlelt.details#>  NEW-TAG:Specifies additional information or controls which the user can obtain on demand.
<dir>    DEPRECATED: Specifies a directory list
<div>    Specifies a section in a document
<dl>    Specifies a definition list
<dt>    Specifies a definition term
<embed#ql:htmlelt.embed#>  NEW-TAG:Defines external interactive content or plugin.
<fieldset>  Specifies a fieldset
<figure#ql:htmlelt.figure#>    NEW-TAG:Specifies a piece of self-contained flow content, typically referenced as a single unit from the main flow of the document.
<b>    Specifies bold text
<big>    DEPRECATED:Specifies big text
<i>    Specifies italic text
<small>    Specifies small text
<tt>    DEPRECATED:Specifies teletype text
<font>    DEPRECATED: Specifies text font, size, and color
<footer>    NEW-TAG:Specifies a footer for a section and can contain information about the author, copyright information, et cetera.
<form>    Specifies a form
<frame>    DEPRECATED:Specifies a sub window (a frame)
<frameset>  DEPRECATED:Specifies a set of frames
<head>    Specifies information about the document
<header>    NEW-TAG:Specifies a group of introductory or navigational aids.
<hgroup>  NEW-TAG:Specifies the header of a section.
<h1> to <h6>  Specifies header 1 to header 6
<hr>    Specifies a horizontal rule
<html>    Specifies an html document
<isindex>  DEPRECATED: Specifies a single-line input field
<iframe>    Specifies an inline sub window (frame)
<ilayer>    Specifies an inline layer
<img>    Specifies an image
<input>    Specifies an input field
<ins>    Specifies inserted text
<keygen#ql:htmlelt.keygen#>  NEW-TAG:Specifies control for key pair generation.
<keygen>  Generate key information in a form
<label>    Specifies a label for a form control
<layer>    Specifies a layer
<legend>    Specifies a title in a fieldset
<li>    Specifies a list item
<link>    Specifies a resource reference
<map>    Specifies an image map
<mark#ql:htmlelt.mark#>    NEW-TAG:Specifies a run of text in one document marked or highlighted for reference purposes, due to its relevance in another context.
<marquee>  Create a scrolling-text marquee
<menu>    DEPRECATED: Specifies a menu list
<meta>    Specifies meta information
<meter#ql:htmlelt.meter#>    NEW-TAG:Specifies a measurement, such as disk usage.
<multicol>  Specifies a multicolumn text flow
<nav#ql:htmlelt.nav#>    NEW-TAG:Specifies a section of the document intended for navigation.
<nobr>    No breaks allowed in the enclosed text
<noembed>  Specifies content to be presented by browsers that do not support the <embed>tag
<noframes>  DEPRECATED:Specifies a noframe section
<noscript>  Specifies a noscript section
<object>    Specifies an embedded object
<ol>    Specifies an ordered list
<optgroup>  Specifies an option group
<option>    Specifies an option in a drop-down list
<output#ql:htmlelt.output#>  NEW-TAG:Specifies some type of output, such as from a calculation done through scripting.
<p>    Specifies a paragraph
<param>    Specifies a parameter for an object
<cite>    Specifies a citation
<code>    Specifies computer code text
<dfn>    Specifies a definition term
<em>    Specifies emphasized text
<kbd>    Specifies keyboard text
<samp>    Specifies sample computer code
<strong>    Specifies strong text
<var>    Specifies a variable
<plaintext>  DEPRECATED: Render the raminder of the document as preformatted plain text
<pre>    Specifies preformatted text
<progress#ql:htmlelt.progress#>  NEW-TAG:Specifies a completion of a task, such as downloading or when performing a series of expensive operations.
<q>    Specifies a short quotation
<ruby#ql:htmlelt.ruby#>    NEW-TAG:Together with <rt> and <rp> allow for marking up ruby annotations.
<script>    Specifies a script
<section>  NEW-TAG:Represents a generic document or application section.
<select>    Specifies a selectable list
<spacer>    Specifies a white space
<span>    Specifies a section in a document
<s>    DEPRECATED: Specifies strikethrough text
<strike>    DEPRECATED: Specifies strikethrough text
<style>    Specifies a style definition
<sub>    Specifies subscripted text
<sup>    Specifies superscripted text
<table>    Specifies a table
<tbody>    Specifies a table body
<td>    Specifies a table cell
<textarea>  Specifies a text area
<tfoot>    Specifies a table footer
<th>    Specifies a table header
<thead>    Specifies a table header
<time>    NEW-TAG:Specifies a date and/or time.
<title>    Specifies the document title
<tr>    Specifies a table row
<u>    DEPRECATED: Specifies underlined text
<ul>    Specifies an unordered list
<video>    NEW-TAG:Specifies a video file.
<wbr>    NEW-TAG:Specifies a line break opportunity.
<wbr>    Indicate a potential word break point within a <nobr> section
<xmp>    DEPRECATED: Specifies preformatted text
[http://www.tutorialspoint.com/html5/html5_tags.htm]

_SPECIFIC:
HTML 5 Tags
<!--...-->
<!doctype>
<a>
<abbr>
<address>
<area>
<article>
<aside>
<audio>
<b>
<base>
<bb>
<bdi>
<bdo>
<blockquote>
<body>
<br>
<button>
<canvas>
<caption>
<cite>
<code>
<col>
<colgroup>
<command>
<data>
<datagrid>
<datalist>
<dd>
<del>
<details>
<dfn>
<div>
<dl>
<dt>
<em>
<embed>
<eventsource>
<fieldset>
<figcaption>
<figure>
<footer>
<form>
<h1>
<h2>
<h3>
<h4>
<h5>
<h6>
<head>
<header>
<hgroup>
<hr>
<html>
<i>
<iframe>
<img>
<input>
<ins>
<kbd>
<keygen>
<label>
<legend>
<li>
<link>
<mark>
<map>
<menu>
<meta>
<meter>
<nav>
<noscript>
<object>
<ol>
<optgroup>
<option>
<output>
<p>
<param>
<pre>
<progress>
<q>
<ruby>
<rp>
<rt>
<s>
<samp>
<script>
<section>
<select>
<small>
<source>
<span>
<strong>
<style>
<sub>
<summary>
<sup>
<table>
<tbody>
<td>
<textarea>
<tfoot>
<th>
<thead>
<time>
<title>
<tr>
<track>
<u>
<ul>
<var>
<video>
<wbr>
[http://www.quackit.com/html_5/tags/html_data_tag.cfm]

Htmlelt.generic.INTERACTIVE

name::
* McsEngl.Htmlelt.generic.INTERACTIVE@cptIt,
* McsEngl.htmlelt.interactive-elements@cptIt,

_DESCRIPTION:
Interactive content is content that is specifically intended for user interaction.
a audio (if the controls attribute is present) button embed iframe img (if the usemap attribute is present) input (if the type attribute is not in the hidden state) keygen label object (if the usemap attribute is present) select textarea video (if the controls attribute is present)
[https://www.w3.org/TR/html5/dom.html#interactive-content]

Htmlelt.generic.LIST

name::
* McsEngl.Htmlelt.generic.LIST@cptIt,
* McsEngl.html'elt.generic.list@cptIt,
* McsEngl.html'elt.list-group@cptIt,

_GENERIC:
* generic-element#ql:html'element.generic#

_SPECIFIC:
* dd#linkL#
* dl#linkL#
* dt#linkL#
* li#linkL#
* ol#linkL#
* ul#ql:html'elt.ul#

Htmlelt.generic.MEDIA

name::
* McsEngl.Htmlelt.generic.MEDIA@cptIt,
* McsEngl.html'media-element@cptIt,

_SPECIFIC:
* audio
* source
* video

Htmlelt.generic.POSITIONED

name::
* McsEngl.Htmlelt.generic.POSITIONED@cptIt,
* McsEngl.html'positioned-element@cptIt,

_DESCRIPTION:
static is the default value. An element with position#ql:cssppt.position#: static; is not positioned in any special way. A static element is said to be not positioned and an element with its position set to anything else is said to be positioned.
[http://learnlayout.com/position.html]

Htmlelt.generic.POSITIONED.NO

name::
* McsEngl.Htmlelt.generic.POSITIONED.NO@cptIt,
* McsEngl.html'non-positioned-element@cptIt,
* McsEngl.html'positioned.no-element@cptIt,

_DESCRIPTION:
static is the default value. An element with position: static; is not positioned in any special way. A static element is said to be not positioned and an element with its position set to anything else is said to be positioned.
[http://learnlayout.com/position.html]

Htmlelt.generic.PSEUDO

name::
* McsEngl.Htmlelt.generic.PSEUDO@cptIt,
* McsEngl.htmlelt.pseudo@cptIt,
* McsEngl.pseudo-element@cptIt,

_ADDRESS.WPG:
* https://davidwalsh.name/pseudo-element,

Htmlelt.generic.SCRIPT

name::
* McsEngl.Htmlelt.generic.SCRIPT@cptIt,
* McsEngl.hml'script-elements@cptIt,

_DESCRIPTION:
Script-supporting elements are those that do not represent anything themselves (i.e. they are not rendered), but are used to support scripts, e.g. to provide functionality for the user.
The following elements are script-supporting elements:
script template
[https://www.w3.org/TR/html5/dom.html#script-supporting-elements]

Htmlelt.generic.SECTIONING-ROOT

name::
* McsEngl.Htmlelt.generic.SECTIONING-ROOT@cptIt,
* McsEngl.html'sectioning-root-element@cptIt,

_GENERIC:
* generic-element#ql:html'element.generic#

_DESCRIPTION:
Certain elements are said to be sectioning roots, including blockquote and td elements.
These elements can have their own outlines, but the sections and headings inside these elements do not contribute to the outlines of their ancestors.

blockquote body details fieldset figure td
[http://dev.w3.org/html5/spec/Overview.html#sectioning-root] 2010-10-21

Htmlelt.generic.SEMANTIC

name::
* McsEngl.Htmlelt.generic.SEMANTIC@cptIt,
* McsEngl.html'semantic-element@cptIt,

_SPECIFIC:
* data-element##
* header-element##
* footer-element##
* section-element##
* time-element##

Htmlelt.generic.spec.UNKNOWN

name::
* McsEngl.Htmlelt.generic.spec.UNKNOWN@cptIt,
* McsEngl.htmlelt.unknown@cptIt,
* McsEngl.html-unknown-element@cptIt,

_DESCRIPTION:
HTML is lenient and flexible to work with. For example, declare <randomtagthatdoesntexist> on a page and the browser is perfectly happy accepting it. Why do non-standard tags work? The answer is the HTML specification allows it. Elements that are not defined by the specification get parsed as HTMLUnknownElement.
The same is not true for custom elements. Potential custom elements are parsed as an HTMLElement if they're created with a valid name (includes a "-"). You can check this in a browser that supports custom elements. Fire up the Console: Ctrl+Shift+J (or Cmd+Opt+J on Mac) and paste in the following lines of code:

// "tabs" is not a valid custom element name
document.createElement('tabs') instanceof HTMLUnknownElement === true

// "x-tabs" is a valid custom element name
document.createElement('x-tabs') instanceof HTMLElement === true
[https://developers.google.com/web/fundamentals/getting-started/primers/customelements#unknown]

Htmlelt.generic.TEXT

name::
* McsEngl.Htmlelt.generic.TEXT@cptIt,
* McsEngl.hml'text-elements@cptIt,

_GENERIC:
* generic-element#ql:html'element.generic#

_SPECIFIC:
<blockquote>...</blockquote>
<p>
<pre> . . . </pre>
===
<listing#ql:htmlelt.listing#> . . . </listing>
<plaintext#ql:html'element.plaintext#>
<xmp#ql:htmlelt.xmp#> . . . </xmp>

Htmlelt.generic.USER-INTERFACE

name::
* McsEngl.Htmlelt.generic.USER-INTERFACE@cptIt,
* McsEngl.hml'ui-elements@cptIt,

Htmlelt.a

name::
* McsEngl.Htmlelt.a@cptIt,
* McsEngl.htmleltA@cptIt,
* McsEngl.htmlelt.a@cptIt,
* McsEngl.htmlelt.hyperlink@cptIt,
* McsEngl.hmlhyperlink-element@cptIt,
* McsEngl.html'a-element@cptIt,
* McsEngl.html'elt.anchor@cptIt,
* McsEngl.htmla@cptIt,

_GENERIC:
* location-link,

_DESCRIPTION:
* The a element represents a hyperlink.
[http://dev.w3.org/html5/markup/spec.html#a 2010-07-30]
===
<a name="anchor_name"> . . . </a>
<a href="#anchor_name"> . . . </a>
<a href="URL"> . . . </a>
<a href="URL#anchor_name"> . . . </a>
<a href="URL?search_word+search_word"> . . . </a>

An anchor must include a name or href attribute, and may include both. There are several optional attributes, but they are rarely encountered.

URL = Uniform Resource Locator.

<A NAME="anchor_name">...</A>
Define a target location in a document

Htmla'javascript

name::
* McsEngl.Htmla'javascript@cptIt,
* McsEngl.HTMLLinkElement@cptIt,

_DESCRIPTION:
HTMLLinkElement
[https://developer.mozilla.org/en-US/docs/Web/API/HTMLLinkElement]

Htmla'attribute

name::
* McsEngl.Htmla'attribute@cptIt,

WARNING:
The name attribute on the a element is obsolete.
Consider putting an id attribute on the nearest container instead.
[http://dev.w3.org/html5/markup/spec.html#a 2010-07-30]

_SPECIFIC:
* href##
* rel##
* target##

Html'href-attribute

name::
* McsEngl.Html'href-attribute@cptIt,

<A HREF="#anchor_name">...</A>
Link to a location in the same document

<A HREF="URL">...</A>
Link to another file or resource

<A HREF="url" TARGET="classFrame">...</A>:
Links to a different window.
===
<A HREF="http://www.microsoft.com/ie/download/" TARGET="new">

<A HREF="URL#anchor_name">...</a>
Link to a target location in another document

<A HREF="URL?search_word+search_word">...</A>
Send a search string to a server. Different servers may interpret the search string differently. In the case of word-oriented search engines, multiple search words might be specified by separating individual words with a plus sign (+).

HREF = "../Default.html"
A page in the superdirectory.

HREF = "/Default.html"
A page in the first/base directory.

Htmla'rel-attribute

name::
* McsEngl.Htmla'rel-attribute@cptIt,
* McsEngl.hmlatt.rel@cptIt,
* McsEngl.htmlatt.rel@cptIt,
* McsEngl.htmlrel@cptIt,

_DESCRIPTION:
Definition and Usage
The rel attribute specifies the relationship between the current document and the linked document.
Only used if the href attribute is present.
Note: Browsers do not use this attribute in any way. However, search engines can use this attribute to get more information about a link.

Example
A link with a rel attribute:
<a rel="nofollow" href="http://www.functravel.com/">Cheap Flights</a>

Browser Support
Attribute          
rel  Yes  Yes  Yes  Yes  Yes

Differences Between HTML 4.01 and HTML5
Some values are removed, and some new values are added.

Syntax
<a rel="value">

Attribute Values
Value  Description
alternate  Links to an alternate version of the document (i.e. print page, translated or mirror)
author  Links to the author of the document
bookmark  Permanent URL used for bookmarking
help  Links to a help document
license  Links to copyright information for the document
next  The next document in a selection
nofollow  Links to an unendorsed document, like a paid link.
("nofollow" is used by Google, to specify that the Google search spider should not follow that link)
noreferrer  Specifies that the browser should not send a HTTP referer header if the user follows the hyperlink
prefetch  Specifies that the target document should be cached
prev  The previous document in a selection
search  Links to a search tool for the document
tag  A tag (keyword) for the current document
[http://www.w3schools.com/tags/att_a_rel.asp]

Htmla'target-attribute

name::
* McsEngl.Htmla'target-attribute@cptIt,
* McsEngl.hmlatt.target@cptIt,
* McsEngl.htmlatt.target@cptIt,
* McsEngl.htmltarget@cptIt,

_DESCRIPTION:
Definition and Usage
The target attribute specifies where to open the linked document.

Example
The target attribute specifies where to open the linked document:
<a href="http://www.w3schools.com" target="_blank">Visit W3Schools</a>

Browser Support
Attribute          
target  Yes  Yes  Yes  Yes  Yes
Syntax
<a target="_blank|_self|_parent|_top|framename">
Attribute Values
Value  Description
_blank  Opens the linked document in a new window or tab
_self  Opens the linked document in the same frame as it was clicked (this is default)
_parent  Opens the linked document in the parent frame
_top  Opens the linked document in the full body of the window
framename  Opens the linked document in a named frame
[http://www.w3schools.com/tags/att_a_target.asp]

_CODE.CHROME:
<a href="http://synagonism.net" target="new" style="target-new: tab;">target tab</a>
<a href="http://synagonism.net" target="new" style="target-new: window;">target window</a>
<a href="http://synagonism.net" target="new" style="target-new: none;">target none</a>
//opens all links in ONE new TAB.
===
<a href="http://synagonism.net" target="_blank" style="target-new: tab;">target tab</a>
<a href="http://synagonism.net" target="_blank" style="target-new: window;">target window</a>
<a href="http://synagonism.net" target="_blank" style="target-new: none;">target none</a>
//opens all links in DIFFERENT new tabs.

Htmlelt.abbr

name::
* McsEngl.Htmlelt.abbr@cptIt,
* McsEngl.html'abbr-element@cptIt,

_CODE.HML:
abbr  Abbreviations  
Organic food in Ireland is certified by the <abbr title="Irish Organic Farmers and Growers Association">IOFGA</abbr>.

Htmlelt.address

name::
* McsEngl.Htmlelt.address@cptIt,
* McsEngl.html'address@cptIt,

<ADDRESS>...</ADDRESS>
Present address information

The <ADDRESS> tag is generally used to specify the author of a document and a means of contacting the author (e.g., an email address). This is usually the last item in a file.

Htmlelt.article (Html5.new)

name::
* McsEngl.Htmlelt.article (Html5.new)@cptIt,
* McsEngl.html'article@cptIt,

_DESCRIPTION:
For external content, like text from a news-article, blog, forum, or any other content from an external source

_ADDRESS.WPG:
* http://www.quackit.com/html_5/tags/html_article_tag.cfm,

Htmlelt.aside (Html5.new)

name::
* McsEngl.Htmlelt.aside (Html5.new)@cptIt,
* McsEngl.html'aside-element@cptIt,

_DESCRIPTION:
The aside element represents a section of a page that consists of content that is tangentially related to the content around the aside element, and which could be considered separate from that content. Such sections are often represented as sidebars in printed typography.
[http://dev.w3.org/html5/spec/Overview.html#the-aside-element] 2010-10-20

Htmlelt.audio (Html5.new)

name::
* McsEngl.Htmlelt.audio (Html5.new)@cptIt,
* McsEngl.html'audio-element@cptIt,

_DESCRIPTION:
HTML5 provides a standard for playing audio files.

Audio on the Web
Before HTML5, there was no standard for playing audio files on a web page.

Before HTML5, audio files could only be played with a plug-in (like flash).

The HTML5 <audio> element specifies a standard way to embed audio in a web page.

Browser Support
The numbers in the table specify the first browser version that fully supports the <audio> element.

Element          
<audio>  4.0  9.0  3.5  4.0  10.5
The HTML <audio> Element
To play an audio file in HTML, use the <audio> element:

Example

<audio controls>
<source src="horse.ogg" type="audio/ogg">
<source src="horse.mp3" type="audio/mpeg">
Your browser does not support the audio element.
</audio>

Try it yourself »
HTML Audio - How It Works
The controls attribute adds audio controls, like play, pause, and volume.

Text between the <audio> and </audio> tags will display in browsers that do not support the <audio> element.

Multiple <source> elements can link to different audio files. The browser will use the first recognized format.

HTML Audio - Browser Support
Currently, there are 3 supported file formats for the <audio> element: MP3, Wav, and Ogg:

Browser  MP3  Wav  Ogg
Internet Explorer  YES  NO  NO
Chrome  YES  YES  YES
Firefox  YES  YES  YES
Safari  YES  YES  NO
Opera  YES  YES  YES
HTML Audio - Media Types
File Format  Media Type
MP3  audio/mpeg
Ogg  audio/ogg
Wav  audio/wav
HTML Audio - Methods, Properties, and Events
HTML5 defines DOM methods, properties, and events for the <audio> element.

This allows you to load, play, and pause audios, as well as setting duration and volume.

There are also DOM events that can notify you when an audio begins to play, is paused, etc.

For a full DOM reference, go to our HTML5 Audio/Video DOM Reference.
[http://www.w3schools.com/htmL/html5_audio.asp]

_CODE.HML:
<audio controls autoplay>
<source src="horse.ogg" type="audio/ogg">
<source src="horse.mp3" type="audio/mpeg">
Your browser does not support the audio element.
</audio>
[http://www.w3schools.com/tags/att_audio_autoplay.asp]

Htmlelt.b

name::
* McsEngl.Htmlelt.b@cptIt,
* McsEngl.html'bold@cptIt,

_DESCRIPTION:
<B>...</B>
PHYSICAL STYLE. Boldface.

_ADDRESS.WPG:
* http://www.w3.org/International/questions/qa-b-and-i-tags,

_CODE.CSS:
To replace <b>, simply use this: font-weight: bold;

_CODE.HML5:
Note: According to the HTML 5 specification, the <b> tag should be used as a LAST resort when no other tag is more appropriate. The HTML 5 specification states that headings should be denoted with the <h1> to <h6> tags, emphasized text should be denoted with the <em> tag, important text should be denoted with the <strong> tag, and marked/highlighted text should use the <mark> tag.
[http://www.w3schools.com/html5/tag_b.asp]

Htmlelt.base

name::
* McsEngl.Htmlelt.base@cptIt,
* McsEngl.hmlBase@cptIt,
* McsEngl.html'base@cptIt,

_WHOLE:
* head-element#linkidLmheltHead#ql:idLmheltHead##

_DESCRIPTION:
The HTML <base> element specifies the base URL to use for all relative URLs contained within a document.
Usage Note: If multiple <base> elements are specified, only the first href and first target value are used; all others are ignored.
Content categories Metadata content.
Permitted content Empty; this is a void element.
Tag omission There must be no closing tag.
Permitted parent elements Any <head> that doesn't content any other <base> element
DOM interfaceHTMLBaseElement
[https://developer.mozilla.org/en-US/docs/Web/HTML/Element/base]
...
Examples
<base href="http://www.example.com/">
<base target="_blank" href="http://www.example.com/">
===
<BASE HREF="URL">
HEAD TAG. Specify the name of the file in which the current document is stored. This is useful when link references within the document do not include full pathnames (i.e., are partially qualified).
===
* The <base> tag specifies a default address or a default target for all links on a page.
The <base> tag goes inside the head element.
===
Differences Between HTML and XHTML
In HTML the <base> tag has no end tag.
In XHTML the <base> tag must be properly closed.
[http://www.w3schools.com/tags/tag_base.asp]

Htmlelt.blockquote

name::
* McsEngl.Htmlelt.blockquote@cptIt,
* McsEngl.hml'blockquote-elment@cptIt,
* McsEngl.html'blockquote-elment@cptIt,

_DESCRIPTION:
The blockquote element represents a section that is quoted from another source.

Content inside a blockquote must be quoted from another source, whose address, if it has one, may be cited in the cite attribute.

If the cite attribute is present, it must be a valid URL potentially surrounded by spaces. To obtain the corresponding citation link, the value of the attribute must be resolved relative to the element. User agents should allow users to follow such citation links.

The cite IDL attribute must reflect the element's cite content attribute.

This next example shows the use of cite alongside blockquote:

<p>His next piece was the aptly named <cite>Sonnet 130</cite>:</p>
<blockquote cite="http://quotes.example.org/s/sonnet130.html">
<p>My mistress' eyes are nothing like the sun,<br>
Coral is far more red, than her lips red,<br>
...
[http://dev.w3.org/html5/spec/Overview.html#the-blockquote-element]

<BLOCKQUOTE>...</BLOCKQUOTE>
Includes a section of text quoted from some other source. INTEDS the quoted text.

Htmlelt.body

name::
* McsEngl.Htmlelt.body@cptIt,
* McsEngl.html'body@cptIt,

_DESCRIPTION:
<BODY>
ΔΙΠΛΟ. Υποδηλώνει το κορμό ντοκουμέντου.

_WHOLE:
* html-element#linkidLmheltHtml#ql:idLmheltHtml##

ATTRIBUTES:
BGCOLOR="#FFFFFF"
BACKGROUND="/images/9607/bgbar.gif"
TEXT="#000000"
LINK="#0000EE"
VLINK="#551A8B"
ALINK="#FF0000"
MARGINHEIGHT=0
MARGINWIDTH=0

COLORS:
white:#ffffff
black:#000000
blue:#ff0000
gray:#c0c0c0

EXAMPLE:
<BODY bgcolor="#FFFFFF" text="#000000" link="#0000FF" alink="#FF0000" vlink="#551a8b">
Background=white, text=black, link=blue.

Htmlelt.br

name::
* McsEngl.Htmlelt.br@cptIt,
* McsEngl.html'br@cptIt,

<BR>
Αλλαζει γραμμή
Forces a line break immediately and retains the same style.

One use of <BR> is in formatting addresses:
National Center for Supercomputing Applications<BR>
605 East Springfield Avenue<BR>
Champaign, Illinois 61820-5518<BR>

<NOBR> = Forces a line not to wrap.

Htmlelt.button

name::
* McsEngl.Htmlelt.button@cptIt,
* McsEngl.hbutton@cptIt,
* McsEngl.html'button@cptIt,
* McsEngl.htmlbtn@cptIt,
* McsEngl.htmlbutton@cptIt,

* McsEngl.elmBtn@cptIt,
* McsEngl.hmlBtn@cptIt,

_ADDRESS.WPG:
* http://css-tricks.com/use-button-element/

_DESCRIPTION:
The HTML <button> Element represents a clickable button.
Content categories Flow content, phrasing content, Interactive content, listed, labelable, and submittable form-associated element, palpable content.
Permitted content Phrasing content.
Tag omission None, both the starting and ending tag are mandatory.
Permitted parent elements Any element that accepts phrasing content.
DOM interface HTMLButtonElement
Element type Inline
[https://developer.mozilla.org/en-US/docs/Web/HTML/Element/button]

The most suitable answer is in using HTML5 <button>...</button> instead of <input type=button value=""/>

HTML:

<button type="button" id="control-play" title="Play"><span></span></button>
CSS:

button#control-play {width: 50px; height: 49px;}
button#control-play span {display: inline-block; background: url('../i/ruler/play.png') no-repeat;}
There's no need in sprites, 3 backgrounds for imitation standart browser opportunities for buttons. Everyone will use these buttons in its favorite style (even using skin for a browser), and only my icons will be permanent.
[http://stackoverflow.com/a/12000588]

HtmlBtn'attribute

name::
* McsEngl.HtmlBtn'attribute@cptIt,

_SPECIFIC:
Attributes
This element includes the global attributes.
===
autofocus HTML5
This Boolean attribute lets you specify that the button should have input focus when the page loads, unless the user overrides it, for example by typing in a different control. Only one form-associated element in a document can have this attribute specified.
===
disabled
This Boolean attribute indicates that the user cannot interact with the button. If this attribute is not specified, the button inherits its setting from the containing element, for example <fieldset>; if there is no containing element with the disabled attribute set, then the button is enabled.
===
form HTML5
The form element that the button is associated with (its form owner). The value of the attribute must be the id attribute of a <form> element in the same document. If this attribute is not specified, the <button> element must be a descendant of a form element. This attribute enables you to place <button> elements anywhere within a document, not just as descendants of their <form> elements.
===
formaction HTML5
The URI of a program that processes the information submitted by the button. If specified, it overrides the action attribute of the button's form owner.
===
formenctype HTML5
If the button is a submit button, this attribute specifies the type of content that is used to submit the form to the server. Possible values are:
application/x-www-form-urlencoded: The default value if the attribute is not specified.
multipart/form-data: Use this value if you are using an <input> element with the type attribute set to file.
text/plain

If this attribute is specified, it overrides the enctype attribute of the button's form owner.
===
formmethod HTML5
If the button is a submit button, this attribute specifies the HTTP method that the browser uses to submit the form. Possible values are:
post: The data from the form is included in the body of the form and is sent to the server.
get: The data from the form are appended to the form attribute URI, with a '?' as a separator, and the resulting URI is sent to the server. Use this method when the form has no side-effects and contains only ASCII characters.
If specified, this attribute overrides the method attribute of the button's form owner.
formnovalidate HTML5
If the button is a submit button, this Boolean attribute specifies that the form is not to be validated when it is submitted. If this attribute is specified, it overrides the novalidate attribute of the button's form owner.
===
formtarget HTML5
If the button is a submit button, this attribute is a name or keyword indicating where to display the response that is received after submitting the form. This is a name of, or keyword for, a browsing context (for example, tab, window, or inline frame). If this attribute is specified, it overrides the target attribute of the button's form owner. The following keywords have special meanings:
_self: Load the response into the same browsing context as the current one. This value is the default if the attribute is not specified.
_blank: Load the response into a new unnamed browsing context.
_parent: Load the response into the parent browsing context of the current one. If there is no parent, this option behaves the same way as _self.
_top: Load the response into the top-level browsing context (that is, the browsing context that is an ancestor of the current one, and has no parent). If there is no parent, this option behaves the same way as _self.
===
name
The name of the button, which submitted with the form data.
===
type
The type of the button. Possible values are:
submit: The button submits the form data to the server. This is the default if the attribute is not specified, or if the attribute is dynamically changed to an empty or invalid value.
reset: The button resets all the controls to their initial values.
button: The button has no default behavior. It can have client-side scripts associated with the element's events, which are triggered when the events occur.
===
value
The initial value of the button.
[https://developer.mozilla.org/en-US/docs/Web/HTML/Element/button]

HtmlBtn'relation-to-input-button

name::
* McsEngl.HtmlBtn'relation-to-input-button@cptIt,
* McsEngl.hmlIptBtn'relation-to-button@cptIt,

_ADDRESS.WPG:
* http://stackoverflow.com/questions/469059/button-vs-input-type-button-which-to-use,

Htmlelt.canvas (Html5.new)

name::
* McsEngl.Htmlelt.canvas (Html5.new)@cptIt,
* McsEngl.html'canvas@cptIt,

_DEFINITION:
What is Canvas?
The HTML5 canvas element uses JavaScript to draw graphics on a web page.
A canvas is a rectangular area, and you control every pixel of it.
The canvas element has several methods for drawing paths, boxes, circles, characters, and adding images.
[http://www.w3schools.com/html5/html5_canvas.asp]

_CODE.HML:
<canvas id="myCanvas" width="200" height="100"></canvas>

_CODE.LJS:
<script type="text/javascript">
var c=document.getElementById("myCanvas");
var cxt=c.getContext("2d");
cxt.fillStyle="#FF0000";
cxt.fillRect(0,0,150,75);
</script>

Htmlelt.cdata

name::
* McsEngl.Htmlelt.cdata@cptIt,

_DESCRIPTION:
CDATA has no meaning at all in HTML.

CDATA is an XML construct which sets a tag's contents that is normally#PCDATA - parsed character data, to be instead taken as#CDATA, that is, non-parsed character data. It is only relevant and valid in XHTML.

It is used in script tags to avoid parsing < and &. In HTML, this is not needed, because in HTML, script is already#CDATA.
[http://stackoverflow.com/a/7092256]
===
<![CDATA[data]]>

Htmlelt.cite

name::
* McsEngl.Htmlelt.cite@cptIt,
* McsEngl.html'cite@cptIt,

<CITE>...</CITE>
LOGICAL STYLE. Display a citation

for titles of books, films, etc. Typically displayed in italics.

Htmlelt.code

name::
* McsEngl.Htmlelt.code@cptIt,
* McsEngl.html'code@cptIt,

<CODE>
LOGICAL STYLE. Display an HTML directive

for snippets of computer code. Displayed in a fixed-width font. (The <stdio.h> header file)¥

Htmlelt.col

name::
* McsEngl.Htmlelt.col@cptIt,

_DESCRIPTION:
The <col> tag specifies column properties for each column within a <colgroup> element.
The <col> tag is useful for applying styles to entire columns, instead of repeating the styles for each cell, for each row.
[http://www.w3schools.com/html5/tag_col.asp]

_WHOLE:
* colgroup-element,

_CODE.HML:
<table border="1">
<colgroup>
<col span="2" style="background-color:red" />
<col style="background-color:yellow" />
</colgroup>
<tr>
<th>ISBN</th>
<th>Title</th>
<th>Price</th>
</tr>
<tr>
<td>3476896</td>
<td>My first HTML</td>
<td>$53</td>
</tr>
<tr>
<td>5869207</td>
<td>My first CSS</td>
<td>$49</td>
</tr>
</table>
[http://www.w3schools.com/html5/tryit.asp?filename=tryhtml5_col_colgroup]

Htmlelt.COMMENT <!-- ...-->

name::
* McsEngl.Htmlelt.COMMENT <!-- ...-->@cptIt,
* McsEngl.html'Comment-element@cptIt,
* McsEngl.hml'comment@cptIt,
* McsEngl.html'comment@cptIt,
* McsEngl.hml'webpage.COMMENT@cptIt,

_DESCRIPTION:
<!-- ... -->
χρησιμοποιείται για σχόλια.
Place a comment in the HTML source

_DEFINITION:
Comments consist of the following parts, in exactly the following order:
1. the comment start delimiter "<!--"
2. text
3. the comment end delimiter "-->"
The text part of comments has the following restrictions:
* must not start with a ">" character
* must not start with the string "->"
* must not contain the string "--"
* must not end with a "-" character
The following is an example of a comment.
<!-- main content starts here -->
[http://dev.w3.org/html5/markup/spec.html#comments]

Htmlelt.data (Html5.new)

name::
* McsEngl.Htmlelt.data (Html5.new)@cptIt,
* McsEngl.html'data@cptIt,

_DESCRIPTION:
The HTML <data> tag is used for providing a machine-readable version of its own contents. This can be useful in cases where your data needs to be in a certain format because it may be processed by a script, but this might not be the format that you'd like your users to see.

For example, you might prefer to present numbers to your users written with letters (eg, One, Two, Three... etc), but you might also have a script that sorts the numbers in ascending or descending order. Such a script may require that the numbers are provided as numbers (eg, 1, 2, 3... etc) instead. The <data> tag enables you to overcome this by providing two numbers - one for the users (provided within the <data></data> tags) and one for the script (provided in the value attribute). This could look something like: <data value="1">One</data>

Using another example, you might like to display a list of products for your users to choose from. Each product has a unique product ID. Because the product ID is a lengthy number, it's not so user-friendly (i.e. users probably won't know what the product is simply by looking at its ID). Therefore, you place the product ID into the value attribute of the <data> element. You then display the product title to the user.

Note that if the value is date or time related, use the <time> tag instead.
[http://www.quackit.com/html_5/tags/html_data_tag.cfm]
===
HTML5 adds a new element to the mix of semantic elements: the DATA element. This element represents data with a machine-readable value attribute attached so that computers can understand that it is data as well. This means that content that is stored in a DATA element can be used by a computer to adjust scripts or provide additional information to scripts.

The CODE element is, in contrast, just a semantic element. It defines blocks of programming code that are displayed on the web page. The CODE element is not intended to be read by a computer and have the information stored within it used in some fashion other than as displayed on a web page.
[http://webdesign.about.com/od/html5tags/a/data-tag-vs-code-tag.htm]

Htmlelt.datalist (Html5.new)

name::
* McsEngl.Htmlelt.datalist (Html5.new)@cptIt,

_DESCRIPTION:
The HTML Datalist Element (<datalist>) contains a set of <option> elements that represent the values available for other controls.
Content categories  Flow content, phrasing content.
Permitted content  Either phrasing content or zero or more <option> elements.
Tag omission  None, both the starting and ending tag are mandatory.
Permitted parent elements  Any element that accepts phrasing content.
DOM interface  HTMLDataListElement
[https://developer.mozilla.org/en-US/docs/Web/HTML/Element/datalist]

Htmlelt.dd

name::
* McsEngl.Htmlelt.dd@cptIt,
* McsEngl.html'dd@cptIt,

_WHOLE:
* dl-element#ql:html'elt.dl#

_DESCRIPTION:
<DD>
Στοιχειο της definition list.

Htmlelt.del

name::
* McsEngl.Htmlelt.del@cptIt,
* McsEngl.html'del-element@cptIt,

_DESCRIPTION:
* strikethrough text.

Htmlelt.details (Html5.new)

name::
* McsEngl.Htmlelt.details (Html5.new)@cptIt,
* McsEngl.html'details-element@cptIt,
* McsEngl.html'expandable-element@cptIt,
* McsEngl.html'summary-element@cptIt,

_CODE.HML:
<details>
<summary>Name</summary>
<p>Homer J Simpson</p>
</details>

Htmlelt.dfn

name::
* McsEngl.Htmlelt.dfn@cptIt,
* McsEngl.html'dfn@cptIt,

_DESCRIPTION:
<DFN>...</DFN>
LOGICAL STYLE. Display a definition (not widely supported)
===
for a word being defined. Typically displayed in italics.

Htmlelt.div

name::
* McsEngl.Htmlelt.div@cptIt,
* McsEngl.div.html@cptIt,
* McsEngl.html'div-element@cptIt,
* McsEngl.htmldiv@cptIt, {2014-10-26}

_DESCRIPTION:
The div element has no special meaning at all. It represents its children. It can be used with the class, lang, and title attributes to mark up semantics common to a group of consecutive elements.
Authors are strongly encouraged to view the div element as an element of last resort, for when no other element is suitable. Use of the div element instead of more appropriate elements leads to poor accessibility for readers and poor maintainability for authors.
[http://dev.w3.org/html5/spec/Overview.html#the-div-element]

Htmldiv.tabindex

name::
* McsEngl.Htmldiv.tabindex@cptIt,
* McsEngl.tabindex.div@cptIt,

_DESCRIPTION:
Div can get the focus if it has tabindex attribute... The index even could be -1. For example:

Htmlelt.dl

name::
* McsEngl.Htmlelt.dl@cptIt,
* McsEngl.html'dl@cptIt,

_DESCRIPTION:
<DL>...t;/DL>
ΔΙΠΛΟ. Ορίζει μια definition list/ GLOSSARY.

<dt> First term to be defined <dd> Definition of first term <dt> Next term to be defined <dd> Next definition.
The <dl> attribute compact can be used to generate a definition list requiring less space.

A definition list usually consists of alternating a term (abbreviated as DT) and a definition (abbreviated as DD). Web browsers generally format the definition on a new line.

The following is an example of a definition list:
<DL>
<DT> NCSA
<DD> NCSA, the National Center for Supercomputing Applications, is located on the campus of the University of Illinois at Urbana-Champaign. NCSA is one of the participants in the National MetaCenter for Computational Science and Engineering.
<DT> Cornell Theory Center
<DD> CTC is located on the campus of Cornell University in Ithaca, New York. CTC is another participant in the National MetaCenter for Computational Science and Engineering.
t;/DL>

The output looks like:
NCSA
NCSA, the National Center for Supercomputing Applications, is located on the campus of the University of Illinois at Urbana-Champaign. NCSA is one of the participants in the National MetaCenter for Computational Science and Engineering.
Cornell Theory Center
CTC is located on the campus of Cornell University in Ithaca, New York. CTC is another participant in the National MetaCenter for Computational Science and Engineering.
The <DT> and <DD> entries can contain multiple paragraphs (separated by <P> paragraph tags), lists, or other definition information.

Htmlelt.doctype (required)

name::
* McsEngl.Htmlelt.doctype (required)@cptIt,
* McsEngl.doctype-element@cptIt,
* McsEngl.html'doctype@cptIt,
* McsEngl.htmldoctype@cptIt,
* McsEngl.hml'document'doctype-declaration@cptIt,
* McsEngl.html'doctype-declaration@cptIt,
* McsEngl.html'document-type-declaration@cptIt,
* McsEngl.html'DTD-declaration@cptIt,

_DESCRIPTION:
There is not just one type of HTML, there are actually many: HTML 4.01 Strict, HTML 4.01 Transitional, XHTML 1.0 Strict, and many more. All these types of HTML are defined in their respective W3C specifications, but they are also defined in a machine-readable language specifying the legal structure, elements and attributes of a type of HTML.

Such a definition is called a "Document Type Definition", or, for short, DTD.

Some tools which process HTML documents might need to know which DTD an (X)HTML document uses: this is why each (X)HTML document needs, at the beginning, a DTD declaration, such as:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
Given its syntax, the DTD declaration is often called, for short, "Doctype".
[http://www.w3.org/QA/Tips/Doctype]
===
A document type declaration, or DOCTYPE, is an instruction that associates a particular SGML or XML document (for example, a webpage) with a document type definition (DTD) (for example, the formal definition of a particular version of HTML). In the serialized form of the document, it manifests as a short string of markup that conforms to a particular syntax.
The HTML layout engines in modern web browsers perform DOCTYPE "sniffing" or "switching", wherein the DOCTYPE in a document served as text/html determines a layout mode, such as "quirks mode" or "standards mode". The text/html serialization of HTML5, which is not SGML-based, uses the DOCTYPE only for mode selection. Since web browsers are implemented with special-purpose HTML parsers, rather than general-purpose DTD-based parsers, they don't use DTDs and will never access them even if a URL is provided. The DOCTYPE is retained in HTML5 as a "mostly useless, but required" header only to trigger "standards mode" in common browsers.[1]
[http://en.wikipedia.org/wiki/Document_type_declaration]
The <!DOCTYPE> declaration must be the very first thing in your HTML document, before the <html> tag.

The <!DOCTYPE> declaration is not an HTML tag; it is an instruction to the web browser about what version of HTML the page is written in.

In HTML 4.01, the <!DOCTYPE> declaration refers to a DTD, because HTML 4.01 was based on SGML. The DTD specifies the rules for the markup language, so that the browsers render the content correctly.

HTML5 is not based on SGML, and therefore does not require a reference to a DTD.

Tip: Always add the <!DOCTYPE> declaration to your HTML documents, so that the browser knows what type of document to expect.
[http://www.w3schools.com/tags/tag_doctype.asp]
===
At the very top of the page you will see the doctype declaration:
<!DOCTYPE html> *
* Unlike earlier versions of HTML, in HTML5 the doctype declaration is case-insensitive.
In other words <!doctype html> works as well as <!DOCTYPE html>.
[http://www.html-5-tutorial.com/doctype.htm]
===
A doctype (sometimes capitalized as “DOCTYPE”) is an special instruction which, for legacy reasons that have to do with processing modes in browsers, is a required part of any document in the HTML syntax; it must match the characteristics of one of the following three formats:
normal doctype
deprecated doctype
legacy-tool-compatible doctype
[http://dev.w3.org/html5/markup/syntax.html#doctype-syntax]

_WHOLE:
* hml-document#linkidLmhdoc#ql:idLmhdoc##

_CODE.html5:
<!DOCTYPE html>

_CODE.html4:
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0//EN">
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

Html'DTD

name::
* McsEngl.Html'DTD@cptIt,

xhtml'DTD

name::
* McsEngl.xhtml'DTD@cptIt,

Document Type Definitions (DTD)

* A DTD specifies the syntax of a web page in SGML
* DTDs are used by SGML applications, such as HTML, to specify rules for documents of a particular type, including a set of elements and entity declarations
* An XHTML DTD describes in precise, computer-readable language, the allowed syntax of XHTML markup

There are three XHTML DTDs:
* STRICT
* TRANSITIONAL
* FRAMESET

XHTML 1.0 Strict
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

Use the strict DOCTYPE when you want really clean markup, free of presentational clutter. Use it together with CSS.
XHTML 1.0 Transitional
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

Use the transitional DOCTYPE when you want to still use HTML ' s presentational features.
XHTML 1.0 Frameset
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Frameset//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-frameset.dtd">

Use the frameset DOCTYPE when you want to use HTML frames.
[http://www.w3schools.com/xhtml/xhtml_dtd.asp]

Htmlelt.dt

name::
* McsEngl.Htmlelt.dt@cptIt,
* McsEngl.html'dt@cptIt,

_WHOLE:
* dl-element#ql:html'elt.dl#

_DESCRIPTION:
<DT>
Στοιχειο της definition list

Htmlelt.em

name::
* McsEngl.Htmlelt.em@cptIt,
* McsEngl.html'em@cptIt,

<EM>...t;/EM>
LOGICAL STYLE. Emphasis.

for emphasis. Typically displayed in italics. (Watch out for pickpockets.)

Htmlelt.embed (Html5.new)

name::
* McsEngl.Htmlelt.embed (Html5.new)@cptIt,
* McsEngl.html'embed@cptIt,

_DESCRIPTION:
The embed element represents an integration point for an external (typically non-HTML) application or interactive content.
[http://dev.w3.org/html5/spec/Overview.html#the-embed-element] 2010-08-28

Htmlelt.fieldset

name::
* McsEngl.Htmlelt.fieldset@cptIt,
* McsEngl.html'fieldset@cptIt,
* McsEngl.html'legend@cptIt,

_DESCRIPTION:
The <fieldset> tag is used to logically group together elements in a form.
The <fieldset> tag draws a box around the related form elements.
The <legend> tag defines a caption for the fieldset element.
[http://www.w3schools.com/tags/tag_fieldset.asp]

_BROWSER:
The <fieldset> tag is supported in all major browsers.

_CODE.HML:
<html>
<body>

<form>
<fieldset>
<legend>Personalia:</legend>
Name: <input type="text" size="30" /><br />
Email: <input type="text" size="30" /><br />
Date of birth: <input type="text" size="10" />
</fieldset>
</form>

</body>
</html>
[http://www.w3schools.com/tags/tryit.asp?filename=tryhtml_fieldset]
===
<fieldset>
<legend> Personalia</legend>
text here <br>
Date of birth
</fieldset>
=> works

Htmlelt.figure (Html5.new)

name::
* McsEngl.Htmlelt.figure (Html5.new)@cptIt,

Htmlelt.footer (Html5.new)

name::
* McsEngl.Htmlelt.footer (Html5.new)@cptIt,
* McsEngl.html'footer@cptIt,

_DEFINITION:
The <footer> tag defines the footer of a section or document. Typically contains the name of the author, the date the document was written and/or contact information.
Tip: If you use the footer to insert contact information, use the address element inside the footer element.
[http://www.w3schools.com/html5/tag_footer.asp]

_CODE.HML:
<footer>This document was written in 2009</footer>

Htmlelt.form

name::
* McsEngl.Htmlelt.form@cptIt,
* McsEngl.htmlform@cptIt,
* McsEngl.html'form@cptIt,
* McsEngl.html'form-element@cptIt,
* McsEngl.webform@cptIt568i,

* McsEngl.htmlFrm@cptIt,

_DESCRIPTION:
The form element creates a form for user input.
The form element contains one or more form elements: button, input, keygen, object, output, select, and textarea.
Forms are used to pass user-data to a server.
[http://www.w3schools.com/html5/tag_form.asp]
===
_DEFINITION:
A form is a component of a Web page that has form controls, such as text fields, buttons, check boxes, range controls, or color pickers. A user can interact with such a form, providing data that can then be sent to the server for further processing (e.g. returning the results of a search or calculation). No client-side scripting is needed in many cases, though an API is available so that scripts can augment the user experience or use forms for purposes other than submitting data to a server.

Writing a form consists of several steps, which can be performed in any order: writing the user interface, implementing the server-side processing, and configuring the user interface to communicate with the server.
[http://dev.w3.org/html5/spec/Overview.html#forms]
===
<FORM>...</FORM>
ΔΙΠΛΟ. ορίζει μια φόρμα.
Define a form within an HTML document. A document may contain multiple <form> elements, but <form> elements may not be nested. Note that non-form tags can be used within a <form> element.

Attributes and their arguments:
* action="URL": The location of the program that will process the form.
* method=data_exchange method The method chosen to exchange data between the client and the program started to process the form: One of get or post. post is preferred for most applications.

Example:
<form action="http://kuhttp.cc.ukans.edu/cgi-bin/register" method=post> . . . </form>

TAGS that can be used with the <FORM>
<input>
<select> . . . </select>
<option>
<textarea> . . . </textarea>

Htmlcode.Form

name::
* McsEngl.Htmlcode.Form@cptIt,

_WELCOME:
=== welcome.html:
<html>
<body>

<form action="welcome.php" method="post">
Name: <input type="text" name="fname">
Age: <input type="text" name="fage">
<input type="submit">
</form>

</body>
</html>

=== welcome.php:
<html>
<body>

Welcome <?php echo $_POST["fname"]; ?>!<br>
You are <?php echo $_POST["fage"]; ?> years old.

</body>
</html>
[http://www.w3schools.com/php/php_forms.asp]

_TEXT_FIELD:
<form action="foo.php" method="post">
Name: <input type="text" name="username" /><br />
Email: <input type="text" name="email" /><br />
<input type="submit" name="submit" value="Submit me!" />
</form>

_PASSWORD_FIELD:
<form>
Password: <input type="password" name="pwd">
</form>

_RADIO_BUTTON:
Radio buttons let a user select ONLY ONE of a limited number of choices:
<form>
<input type="radio" name="sex" value="male">Male<br>
<input type="radio" name="sex" value="female">Female
</form>

_CHECKBOX:
<form>
<input type="checkbox" name="vehicle" value="Bike">I have a bike<br>
<input type="checkbox" name="vehicle" value="Car">I have a car
</form>

_SUBMIT_BUTTON:
A submit button is used to send form data to a server. The data is sent to the page specified in the form's action attribute. The file defined in the action attribute usually does something with the received input:

<form name="input" action="html_form_action.asp" method="get">
Username: <input type="text" name="user">
<input type="submit" value="Submit">
</form>

_FIELDSET:
//creates a border around with the label 'Personal information'
<form action="">
<fieldset>
<legend>Personal information:</legend>
Name: <input type="text" size="30"><br>
E-mail: <input type="text" size="30"><br>
<input type="submit" value="Submit">
</fieldset>
</form>

File-uploading:
<form action="file-upload.php" method="post" enctype="multipart/form-data">
Send these files:<br />
<input name="userfile[]" type="file" /><br />
<input name="userfile[]" type="file" /><br />
<input type="submit" value="Send files" />
</form>

This code shows a choice with a button 'go':
<form action="/javaworld/cgi-bin/jw-nav.cgi" method="POST"> <p><select name="jump_list" size="1"> <option value="http://www.javaworld.com//javaworld/jw-01-1998/index.html"> Also this month in JavaWorld </option> <option value="http://www.javaworld.com/javaworld/jw-01-1998/jw-01-step.html"> - Networking our whiteboard with servlets </option> <option value="http://www.javaworld.com/javaworld/jw-01-1998/jw-01-lawsuit.results.html"> - Who is right in the Sun-Microsoft lawsuit? SunWorld posts results of reader survey </option> <option value="http://www.javaworld.com/javaworld/jw-01-1998/jw-01-activator.html"> - Activator gets thumbs up from Java community </option> <option value="http://www.javaworld.com/javaworld/jw-01-1998/jw-01-idgns.smartcard.html"> - Bull to launch Java smart card next year </option> </select> <input type="submit" value="Go"> </p> </form>

Htmlelt.h1

name::
* McsEngl.Htmlelt.h1@cptIt,
* McsEngl.html'h1@cptIt,

_DESCRIPTION:
<Η1>...</H1>
<Η2> <Η3> <Η4> <Η5> <Η6>
ΔΙΠΛΑ. Ορίζουν μεγέθη τίτλων

_CODE.HML:
<h3 align=center>An introduction to the basic structure <br>and lifestyle of the Java class file</h3>
Centers the heading AND brakes it in two lines after the word 'structure'.

Htmlelt.h2

name::
* McsEngl.Htmlelt.h2@cptIt,
* McsEngl.html'h2@cptIt,

Htmlelt.head

name::
* McsEngl.Htmlelt.head@cptIt,
* McsEngl.html'head-element@cptIt,

_DESCRIPTION:
Τα head elements χρησιμοποιούνται για να υποδηλώσουν ιδιότητες του συνόλου του κειμένου.
[COMPUTER GO, OCT. 1996, ΕΝΘΕΤΟ 34]
===
<HEAD>
ΔΙΠΛΟ. Περικλείει στοιχεία της ταυτότητας ενός ντοκουμέντου.

_CODE.HML:
<head>
<base href="URL">
<isindex>
<link rev="RELATIONSHIP" rel="RELATIONSHIP" href="URL">
<title> . . . </title>
</head>

_PART:
* link-element#ql:html'elt.link#
* meta-element#ql:html'elt.meta#
* script-element#ql:html'elt.script#
* style-element#ql:html'elt.style#
* title-element#ql:html'elt.title#

Htmlelt.header (Html5.new)

name::
* McsEngl.Htmlelt.header (Html5.new)@cptIt,
* McsEngl.html'header@cptIt,
* McsEngl.html'header-element@cptIt,

_DEFINITION:
The <header> tag defines an introduction to the document.
[http://www.w3schools.com/html5/tag_header.asp]

_CODE.HML:
<header>
<h1>Welcome to my homepage</h1>
<p>My name is Donald Duck</p>
</header>

<p>The rest of my home page...</p>

Htmlelt.hgroup

name::
* McsEngl.Htmlelt.hgroup@cptIt,
* McsEngl.html'hgroup-element@cptIt,

_DESCRIPTION:
The hgroup element represents the heading of a section. The element is used to group a set of h1–h6 elements when the heading has multiple levels, such as subheadings, alternative titles, or taglines.

For the purposes of document summaries, outlines, and the like, the text of hgroup elements is defined to be the text of the highest ranked h1–h6 element descendant of the hgroup element, if there are any such elements, and the first such element if there are multiple elements with that rank. If there are no such elements, then the text of the hgroup element is the empty string.

Other elements of heading content in the hgroup element indicate subheadings or subtitles.

The rank of an hgroup element is the rank of the highest-ranked h1–h6 element descendant of the hgroup element, if there are any such elements, or otherwise the same as for an h1 element (the highest rank).
[http://dev.w3.org/html5/spec/Overview.html#the-hgroup-element] 2010-10-20

Usage note: This element has been removed from the HTML5 (W3C) specification, but it still is in the WHATWG version of HTML. It is partially implemented in most browsers, though, so is unlikely to go away. As the outline algorithm is not implemented in any browsers, the <hgroup> semantics are in practice only theoretical. The HTML5 (W3C) specification provides advice on how to mark up Subheadings, subtitles, alternative titles and taglines
[https://developer.mozilla.org/en-US/docs/Web/HTML/Element/hgroup]

Htmlelt.hr

name::
* McsEngl.Htmlelt.hr@cptIt,
* McsEngl.html'hr@cptIt,

_DESCRIPTION:
<HR>
Σχηματίζει μια κατά μήκος γραμμή
Places a horizontal rule or separator between sections of text.

Htmlelt.html

name::
* McsEngl.Htmlelt.html@cptIt,
* McsEngl.html'html-element@cptIt,
* McsEngl.hmlhtml@cptIt,

_WHOLE:
* hml-document##

hmlhtml'part.HEAD-ELEMENT

name::
* McsEngl.hmlhtml'part.HEAD-ELEMENT@cptIt,

hmlhtml'part.BODY-ELEMENT

name::
* McsEngl.hmlhtml'part.BODY-ELEMENT@cptIt,

Htmlelt.i

name::
* McsEngl.Htmlelt.i@cptIt,
* McsEngl.html'i@cptIt,
* McsEngl.html'italics@cptIt,

_DESCRIPTION:
Definition and Usage
The <i> tag defines a part of text in an alternate voice or mood. The content of the <i> tag is usually displayed in italic.
The <i> tag can be used to indicate a technical term, a phrase from another language, a thought, or a ship name, etc.
Use the <i> element only when there is not a more appropriate semantic element, such as:
<em> (emphasized text)
<strong> (important text)
<mark> (marked/highlighted text)
<cite> (the title of a work)
<dfn> (a definition term)
Differences Between HTML 4.01 and HTML 5
None, but in HTML 4.01, there was an understanding that you should use CSS to make italic text. This is still the case, but in HTML 5 you should use the <i> tag to define some part of a text as a certain type, not only how it renders in the layout.
[http://www.w3schools.com/html5/tag_i.asp]

===
<I>...</I>
PHYSICAL STYLE. ΔΙΠΛΟ. Εμφανίζει πλαγια γράμματα
Italics

_CODE.CSS:
font-style: italic;

Htmlelt.iframe

name::
* McsEngl.Htmlelt.iframe@cptIt,
* McsEngl.hmlEltIfm@cptIt,
* McsEngl.hmlIframe@cptIt,
* McsEngl.html'elt.iframe@cptIt,
* McsEngl.html'iframe@cptIt568i,
* McsEngl.htmliframe@cptIt, {2014-10-26}
* McsEngl.inline-frame@cptIt568i,
* McsEngl.iframe@cptIt568i,
* McsEngl.iframe.html@cptIt,

_DEFINITION:
The <iframe> tag defines an inline frame that contains another document.
===
So how can you fix this? Using a relatively old web technique called an iframe. Inline frame, or iframe, is an HTML element that can load any web page inside another in a type of box. So, even though you can’t load an external web page as your popup, you can load it within it.

A simple example for a Bing search extension would be:
view sourceprint?
01  <html>
02  <head>
03   <style type="text/css">
04   body {width:200; height:300;}
05   </style>
06  </head>
07  <body>
08   <iframe src="http://m.bing.com" width="100%" height="100%" frameborder="0">
09   </iframe>
10  </body>
11  </html>
[http://julianapena.com/2010/01/how-to-build-a-chrome-extension-part-3-loading-any-web-page-in-a-popup/]
===
Internet Explorer included a proprietary tag designated <iframe> in the v3.0 release to place a frame within a page. This technique, called inline frames or floating frames, originally worked only with Internet Explorer. The World Wide Web Consortium (W3C) included the iframe feature in HTML 4.01. Virtually all current browsers support inline frames(iframe).
[http://manda.com/iframe/]

_CODE.HML:
<iframe src="template1.html" ></iframe>
//inserts the file
===
<iframe width="420" height="315" src="http://www.youtube.com/embed/6Yr_W4zeBLs" frameborder="0" allowfullscreen></iframe>
===
<iframe src="foobar.html" frameBorder="0">
Sorry: Your browser cannot show the included content.
</iframe>
===
<iframe src ="html_intro.asp" width="100%" height="300">
<p>Your browser does not support iframes.</p>
</iframe>

===
<base target="_blank" />
<iframe width="400"
height="215"
frameborder="0"
scrolling="no" marginheight="0" marginwidth="0"
src="https://maps.google.com/maps?f=q&source=s_q&hl=es-419&geocode=&q=buenos+aires&sll=37.0625,-95.677068&sspn=38.638819,80.859375&t=h&ie=UTF8&hq=&hnear=Buenos+Aires,+Argentina&z=11&ll=-34.603723,-58.381593&output=embed">
</iframe>
<br />
<small><a href="https://maps.google.com/maps?f=q&source=embed&hl=es-419&geocode=&q=buenos+aires&sll=37.0625,-95.677068&sspn=38.638819,80.859375&t=h&ie=UTF8&hq=&hnear=Buenos+Aires,+Argentina&z=11&ll=-34.603723,-58.381593"
style="color:#0000FF;text-align:left">See bigger map</a>
</small>

Htmliframe'allowtransparency

name::
* McsEngl.Htmliframe'allowtransparency@cptIt,

allowtransparency="true"

_ADDRESS.WPG:
* http://stackoverflow.com/a/5182176,

Htmliframe'frameborder

name::
* McsEngl.Htmliframe'frameborder@cptIt,

_CODE.HML:
<iframe width="420" height="315" src="http://www.youtube.com/embed/6Yr_W4zeBLs" frameborder="0" allowfullscreen></iframe>

Htmliframe'src

name::
* McsEngl.Htmliframe'src@cptIt,

_CODE.HML:
<iframe width="420" height="315" src="http://www.youtube.com/embed/6Yr_W4zeBLs" frameborder="0" allowfullscreen></iframe>

Htmlelt.IMG

name::
* McsEngl.Htmlelt.IMG@cptIt,
* McsEngl.html'img@cptIt,

_GENERIC:
* inline-html-element,

_IMAGE.STYLE:
* WRAP_TEXT: <img src="/images/pulpit.jpg" style="float:left; margin-right: 15px">
* VERTICAL-ALIGN: style="vertical-align:top; width:22px; height:22px"

_IMAGE.CENTER:
display: block;
margin-left: auto;
margin-right: auto

_IMAGE.EXAMPLE:
<IMG SRC="URL" ALT="alternate text">
Include an In-line image in the document.
Embed a graphic image in the document.


Attributes:
src Specifies the location of the image.

alt Allows a text string to be put in place of the image in clients that cannot display images.

align Specify a relationship to surrounding text. The argument for align can be one of top, middle, or bottom.

ismap If ismap is present and the image tag is within an anchor, the image will become a "clickable image". The pixel coordinates of the cursor will be appended to the URL specified in the anchor if the user clicks within the ismap image. The resulting URL will take the form "URL?m,n" where m and n are integer coordinates, and the URL will specify the location of a program that will examine the pixel coordinates, and return an appropriate document.
===
<IMG SRC="ram.gif"
WIDTH=119
HEIGHT=102
ALT="creating"
ALIGN="RIGHT"
BORDER=5>

Htmlelt.INPUT (Htmlipt)

name::
* McsEngl.Htmlelt.INPUT (Htmlipt)@cptIt,
* McsEngl.html'input@cptIt,
* McsEngl.htmlinput@cptIt,
* McsEngl.htmlinput@cptIt,

* McsEngl.hmlipt@cptIt,
* McsEngl.eltIpt@cptIt,

_DESCRIPTION:
<input> (there is no ending tag)
It is used in <FORM>
Defines an input field where the user may enter information on the form.
Each input field assigns a value to a variable which has a specified name and a specified data type.

Attributes and their arguments:
* type="variable_type" Specifies the data type for the variable, where:
- type="text" and type="password" fields accept character data
- type="checkbox" fields are either selected or not
- type="radio" fields of the same name allow selection of only one of the associated values
- type="submit" defines an action button that sends the completed form to the query server
- type="reset" defines a button that resets the form variables to their default values
- type="hidden" defines an invisible input field whose value will be sent along with the other form values when the form is submitted. This is used to pass state information from one script or form to another.

name="textstring"
where textstring is a symbolic name (not displayed) identifying the input variable as in:
<input type="checkbox" name="box1">

value="textstring"
where the meaning of textstring depends on the argument for type.
- For type="text" or type="password", textstring is the default value for the input variable. Password values will not be shown on the user's form. Anything entered by the user will replace any default value defined with this attribute.
- If type="checkbox" or type="radio", textstring is the value that will be sent to the server if the checkbox is "checked".
- For type="reset" or type="submit", textstring is a label that will appear on the submit or reset button in place of the words "submit" and "reset".

checked
No arguments. For type="checkbox" or type="radio", if checked is present the input field is "checked" by default.

size="display_width"
where display_width is an integer value representing the number of characters displayed for the type="text" or type="password" input field.

maxlength="string_length"
where string_length is the maximum number of characters allowed within type="text" or type="password" variable values. This attribute is only valid for single line "text" or "password" fields.

_CODE.HML:
<html>
<head>
<script type="text/javascript">
function changeStyle()
{
var x=document.getElementById("myframe");
var y=(x.contentWindow || x.contentDocument);
if (y.document)y=y.document;
y.body.style.backgroundColor="#00eeee";
}
</script>
</head>
<body>

<iframe id="myframe" src="demo_iframe.htm">
<p>Your browser does not support iframes.</p>
</iframe>
<br /><br />

<input type="button" onclick="changeStyle()" value="Change background color" />

Htmlipt'attribute

name::
* McsEngl.Htmlipt'attribute@cptIt,

autofocus:
This is a simple one-step pattern, easily programmed in JavaScript at the time of document load, automatically focus one particular form field.
HTML5 introduced a new attribute called autofocus which would be used as follows -
<input type="text" name="search" autofocus/>
This attribute is supported by latest versions of Mozilla, Safari and Chrome browsers only.
[http://www.tutorialspoint.com/html5/html5_web_forms2.htm]

required:
Now you do not need to have javascript for client side validations like empty text box would never be submitted because HTML5 introduced a new attribute called required which would be used as follows and would insist to have a value -
<input type="text" name="search" required/>
This attribute is supported by latest versions of Mozilla, Safari and Chrome browsers only.
[http://www.tutorialspoint.com/html5/html5_web_forms2.htm]

SPECIFIC

<form>
<input type="button" value="Input Button"/>
<input type="checkbox" />

<input type="file" />
<input type="hidden" />
<input type="image" />

<input type="password" />
<input type="radio" />
<input type="reset" />

<input type="submit" />
<input type="text" />
<select><option>Option<option/></select>
<textarea></textarea>
<button>Button</button>
</form>
[http://api.jquery.com/file-selector/]

Htmlelt.CHECKBOX

name::
* McsEngl.Htmlelt.CHECKBOX@cptIt,
* McsEngl.htmlcheckbox@cptIt,

_CODE.HML:
//CHECKED
<input type="checkbox" checked>preview on|off</input>
//UNCHECKED
<input type="checkbox"></input>

Htmlelt.RADIOBUTTON

name::
* McsEngl.Htmlelt.RADIOBUTTON@cptIt,
* McsEngl.htmlradiobutton@cptIt,

* McsEngl.htmlRdb@cptIt,

_CODE.HML:
//common 'name' make them to choose only one:
What color do you prefer?<br>
<input type="radio" name="n">on<br>
<input type="radio" name="n">off
<form>
What color do you prefer?<br>
<input type="radio" name="colors" id="red">Red<br>
<input type="radio" name="colors" id="blue">Blue
</form>
===
//javascript
document.getElementById("red").checked = true;

Htmlelt.kbd

name::
* McsEngl.Htmlelt.kbd@cptIt,
* McsEngl.html'kbd@cptIt,

_DESCRIPTION:
<KBD>...</KBD>
LOGICAL STYLE. Display a keyboard key

for user keyboard entry. Should be displayed in a bold fixed-width font, but many browsers render it in the plain fixed-width font. (Enter passwd to change your password.)

Htmlelt.label

name::
* McsEngl.Htmlelt.label@cptIt,
* McsEngl.htmllabel@cptIt,
* McsEngl.html'label@cptIt,

_DESCRIPTION:
The HTML <label> Element represents a caption for an item in a user interface. It can be associated with a control either by placing the control element inside the label element, or by using the for attribute. Such a control is called the labeled control of the label element.
[https://developer.mozilla.org/en-US/docs/Web/HTML/Element/label]

_CODE.HML:
<label for="User">Click me</label>
<input type="text" id="User" name="Name" />
[https://developer.mozilla.org/en-US/docs/Web/HTML/Element/label]

Htmllabel'for-attribute

name::
* McsEngl.Htmllabel'for-attribute@cptIt,
* McsEngl.htmlatt.for@cptIt,
* McsEngl.html'for-attribute@cptIt,
* McsEngl.htmlfor@cptIt,

_DESCRIPTION:
The for attribute specifies which form element a label is bound to.
Differences Between HTML 4.01 and HTML5
NONE.
Syntax
<label for="element_id">//The id of the element the label is bound to
[http://www.w3schools.com/tags/att_label_for.asp]

_CODE.HML:
<label for="male">Male</label>
<input type="radio" name="sex" id="male" value="male"><br>
<label for="female">Female</label>
<input type="radio" name="sex" id="female" value="female">

Htmlelt.li

name::
* McsEngl.Htmlelt.li@cptIt,
* McsEngl.html'li@cptIt,

_WHOLE:
* ul-element#ql:html'elm.ul#
* ol-element#linkL#

_DESCRIPTION:
<LI>
Προσδιορίζει το item μιας λίστας

Htmlelt.link

name::
* McsEngl.Htmlelt.link@cptIt,
* McsEngl.hmllink@cptIt,
* McsEngl.html'element.link@cptIt,
* McsEngl.html'link@cptIt,
* McsEngl.html'link-element@cptIt,

_DESCRIPTION:
So far you were writing <link> as follows -
<link rel="stylesheet" type="text/css" href="stylefile.css">
HTML 5 removes extra information required and you can use simply following syntax -
<link rel="stylesheet" href="stylefile.css">

[http://www.tutorialspoint.com/html5/html5_syntax.htm]

_GENERIC:
* head-group-element#ql:html'elt.generic.head#

_DESCRIPTION:
<LINK rev="RELATIONSHIP" rel="RELATIONSHIP" href="URL">
HEAD TAG. The link tag allows you to define relationships between the document containing the link tag and the document specified in the "URL".
The rel attribute specifies the relationship between the HTML file and the Uniform Resource Locator (URL).
The rev attribute (for "reverse") specifies the relationship between the URL and the HTML file. For example, <link rev="made" href="URL"> indicates that the file maker or owner is described in the document identified by the URL. (Note that link tags are not displayed on the screen as part of the document. They define static relationships, not hypertext links.)

_CODE.HML:
=== stylesheet:
<link rel="stylesheet" href="css-HoKoNoUmo-2010-09-14.css" type="text/css"/>
=== canonical
<link rel="canonical" href="http://www.example.com/" />
A canonical link element is an HTML element that helps webmasters prevent duplicate content issues by specifying the "canonical", or "preferred", version of a web page[1][2] as part of search engine optimization. It is described in RFC 6596, which went live in April 2012.

Duplicate content issues occur when the same content is accessible from multiple URLs.[3] For example, http://www.example.com/page.html would be considered by search engines to be an entirely different page from http://www.example.com/page.html?parameter=1, even though both URLs return the same content. Another example is essentially the same (tabular) content, but sorted differently.

In February 2009, Google, Yahoo and Microsoft (for their Bing search engine) announced support for the canonical link element, which can be inserted into the <head> section of a web page, to allow webmasters to prevent these issues.[4] The canonical link element helps webmasters make clear to the search engines which page should be credited as the original.

According to Google, the canonical link element is not considered to be a directive, but a hint that the web crawler will "honor strongly".[1]

While the canonical link element has its benefits, Matt Cutts, who is the head of Google's webspam team, has claimed that the search engine prefers the use of 301 redirects. Cutts claims the preference for redirects is because Google's spiders can choose to ignore a canonical link element if they feel it is more beneficial to do so.[5]
[http://en.wikipedia.org/wiki/Canonical_link_element]

Htmllink'icon

name::
* McsEngl.Htmllink'icon@cptIt,

_CODE.HML:
<link rel="icon" href="favicon.ico">
===
<link rel="shortcut icon" href="http://htmlmgr.sourceforge.net/javaws/icons/16x16/hm_VJavaStructure.png">

Htmllink'import

name::
* McsEngl.Htmllink'import@cptIt,

_ADDRESS.WPG:
* http://www.html5rocks.com/en/tutorials/webcomponents/imports//

_CODE.HML:
<link rel="import" href="/path/to/imports/stuff.html">

Htmllink'media-att

name::
* McsEngl.Htmllink'media-att@cptIt,

_DESCRIPTION:
The media attribute specifies what media/device the target resource is optimized for.

This attribute is mostly used with CSS stylesheets to specify different styles for different media types.

The media attribute can accept several values.

Value  Description
all    Default. Suitable for all devices
aural  Speech synthesizers
braille  Braille feedback devices
handheld  Handheld devices (small screen, limited bandwidth)
projection  Projectors
print  Print preview mode/printed pages
screen  Computer screens
tty    Teletypes and similar media using a fixed-pitch character grid
tv    Television type devices (low resolution, limited scroll ability)
[http://www.w3schools.com/tags/att_link_media.asp]

_CODE.HML:
<link rel="stylesheet" type="text/css" href="demo_screen.css">
<link rel="stylesheet" type="text/css" href="demo_print.css" media="print">

Htmllink'stylesheet

name::
* McsEngl.Htmllink'stylesheet@cptIt,

_CODE.HML:
<link rel="stylesheet" href="https://synagonism.github.io/hitp/hitp.css">
===
// import font-family
<link rel='stylesheet' href='http://fonts.googleapis.com/css?family=Droid+Sans'>
Then in CSS:
h1 { font-family: 'Droid Sans', arial, serif; }

Htmlelt.map

name::
* McsEngl.Htmlelt.map@cptIt,
* McsEngl.html'map@cptIt,

_CODE.HML:
<MAP NAME="PCP-header">
<AREA SHAPE="rect" COORDS="x1,y1,x2,y2" HREF= "DEFAULT.html" >
<AREA SHAPE="circle" COORDS="x,y,radious" HREF= "HELP.html" >
<AREA SHAPE="poly" COORDS="x1,y1 x2,y2 x3,y3 x4,y4 x5" HREF="HELP.html" >
</MAP>

<IMG SRC= "tableheader.jpg" USEMAP="#PCP-header" height=78 width=592 ALT="Principia Cybernetica Web" BORDER=0>

Htmlelt.mark (Html5.new)

name::
* McsEngl.Htmlelt.mark (Html5.new)@cptIt,

Htmlelt.meta

name::
* McsEngl.Htmlelt.meta@cptIt,
* McsEngl.hmlmeta@cptIt,
* McsEngl.html'encoding@cptIt,
* McsEngl.html'meta@cptIt,
* McsEngl.html'meta-element@cptIt,

_WHOLE:
* head-element#linkidLmheltHead#ql:idLmheltHead##

_GENERIC:
* head-group-element#ql:html'elt.generic.head#

_DESCRIPTION:
But that meta tag really has to be the very first thing in the <head> section because as soon as the web browser sees this tag it's going to stop parsing the page and start over after reinterpreting the whole page using the encoding you specified.
[http://www.joelonsoftware.com/articles/Unicode.html]

_CODE.HML5:
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta name="description" content="Free Web tutorials">
<meta name="keywords" content="HTML, CSS, XML, JavaScript">
<meta name="author" content="Stεle Refsnes">
===
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">

Htmlmeta'Character-encoding

name::
* McsEngl.Htmlmeta'Character-encoding@cptIt,
* McsEngl.hml'character-encoding@cptIt,

_CODE.HML5:
<meta charset="utf-8">
===
HTML 5 authors can use simple syntax to specify Character Encoding as follows -
<meta charset="UTF-8">
All the above syntax is case-insensitive.
[http://www.tutorialspoint.com/html5/html5_syntax.htm]

Htmlmeta'Viewport

name::
* McsEngl.Htmlmeta'Viewport@cptIt,
* McsEngl.viewport.hmlmeta-cpt@cptIt,

_DESCRIPTION:
Background
Mobile browsers like Fennec render pages in a virtual "window" (the viewport), usually wider than the screen, so they don't need to squeeze every page layout into a tiny window (which would break many non-mobile-optimized sites). Users can pan and zoom to see different areas of the page.

Mobile Safari introduced the "viewport meta tag" to let web developers control the viewport's size and scale. Many other mobile browsers now support this tag, although it is not part of any web standard. Apple's documentation does a good job explaining how web developers can use this tag, but we had to do some detective work to figure out exactly how to implement it in Fennec. For example, Safari's documentation says the content is a "comma-delimited list," but existing browsers and web pages use any mix of commas, semicolons, and spaces as separators.

Learn more about viewports in different mobile browsers in A Tale of Two Viewports at quirksmode.org.

Viewport basics
A typical mobile-optimized site contains something like the following:
<meta name="viewport" content="width=device-width, initial-scale=1">

The width property controls the size of the viewport. It can be set to a specific number of pixels like width=600 or to the special value device-width value which is the width of the screen in CSS pixels at a scale of 100%. (There are corresponding height and device-height values, which may be useful for pages with elements that change size or position based on the viewport height.)

The initial-scale property controls the zoom level when the page is first loaded. The maximum-scale, minimum-scale, and user-scalable properties control how users are allowed to zoom the page in or out.
[https://developer.mozilla.org/en-US/docs/Mozilla/Mobile/Viewport_meta_tag#Background]

<meta name="viewport" content="initial-scale=1.0, user-scalable=no" />
Disabling user-scalable (namely, the ability to double tap to zoom) allows the browser to reduce the click delay. In touch-enable browsers, when the user expects the double tap to zoom, the browser generally waits 300ms before firing the click event, waiting to see if the user will double tap. Disabling user-scalable allows for the Chrome browser to fire the click event immediately, allowing for a better user experience.
From Google IO 2013 session https://www.youtube.com/watch?feature=player_embedded&v=DujfpXOKUp8#t=1435s
[http://stackoverflow.com/a/16910559]
===
What is The Viewport?
The viewport is the user's visible area of a web page.

The viewport varies with the device, and will be smaller on a mobile phone than on a computer screen.

Before tablets and mobile phones, web pages were designed only for computer screens, and it was common for web pages to have a static design and a fixed size.

Then, when we started surfing the internet using tablets and mobile phones, fixed size web pages were too large to fit the viewport. To fix this, browsers on those devices scaled down the entire web page to fit the screen.

This was not perfect!! But a quick fix.
[http://www.w3schools.com/css/css_rwd_viewport.asp]

_ADDRESS.WPG:
* http://www.w3schools.com/css/css_rwd_viewport.asp,
* http://qnimate.com/how-to-detect-element-entered-viewport//

Htmlelt.meter (Html5.new)

name::
* McsEngl.Htmlelt.meter (Html5.new)@cptIt,

Htmlelt.nav (Html5.new)

name::
* McsEngl.Htmlelt.nav (Html5.new)@cptIt,

Htmlelt.nobr

name::
* McsEngl.Htmlelt.nobr@cptIt,
* McsEngl.html'nobr@cptIt,

_DESCRIPTION:
<NOBR> = Forces a line not to wrap.

Htmlelt.object

name::
* McsEngl.Htmlelt.object@cptIt,
* McsEngl.html'object@cptIt,

_DESCRIPTION:
DefinitionRelation:
The object element can represent an external resource, which, depending on the type of the resource, will either be treated as an image, as a nested browsing context, or as an external resource to be processed by a plugin.
[http://dev.w3.org/html5/spec/Overview.html#the-object-element] 2010-08-28
===
For example, to include a PNG image in a document, authors may write:
<BODY>
<P>Here's a closeup of the Grand Canyon:
<OBJECT data="canyon.png" type="image/png">
This is a <EM>closeupt;/EM> of the Grand Canyon.
</OBJECT>
</BODY>
[http://www.w3.org/TR/REC-html40/struct/objects.html]

Htmlelt.ol

name::
* McsEngl.Htmlelt.ol@cptIt,
* McsEngl.html'elt.list.ordered@cptIt,
* McsEngl.html'ol@cptIt,

_DESCRIPTION:
<OL>...t;/OL>
ΔΙΠΛΟ. Ορίζει μια αριθμητικά διατεταγμένη λίστα
<li> First item in the list <li> Next item in the list
Lists can be arbitrarily nested, although in practice you probably should limit the nesting to three levels. You can also have a number of paragraphs, each containing a nested list, in a single list item.
===
<OL TYPE=a>:
Orders the list-items as a,b,c,...

Htmlelt.option

name::
* McsEngl.Htmlelt.option@cptIt,
* McsEngl.html'option@cptIt,

_DESCRIPTION:
<OPTION>
Define a select field option
Within the <select> element the <option> tags are used to define the possible values for the select field. If the attribute selected is present then the option value is selected by default. In the following example all three options may be chosen but bananas are selected by default.
<select multiple> <option>Apples <option selected>Bananas <option>Cherries </select>

Htmlelt.output (Html5.new)

name::
* McsEngl.Htmlelt.output (Html5.new)@cptIt,

Htmlelt.p

name::
* McsEngl.Htmlelt.p@cptIt,
* McsEngl.html'p@cptIt,

_DESCRIPTION:
<P>
Αλλάζει παράγραφο.
Αν το πηγαίο κείμενο έχει HR αυτά δεν παίρνονται υπόψιν.
The end of a paragraph that will be formatted before it is displayed on the screen.
Important: You must separate paragraphs with <P>. The browser ignores any indentations or blank lines in the source text. HTML relies almost entirely on the tags for formatting instructions, and without the <P> tags, the document becomes one large paragraph. (The exception is text tagged as ``preformatted,'' which is explained below.) For instance, the following would produce identical output as the first bare-bones HTML example: <TITLE>The simplest HTML example</TITLE><H1>This is a level one heading</H1>Welcome to the world of HTML. This is one paragraph.<P>And this is a second.<P> However, to preserve readability in HTML files, headings should be on separate lines, and paragraphs should be separated by blank lines (in addition to the <P> tags). NCSA Mosaic handles <P> by ending the current paragraph and inserting a blank line.

In HTML+, a successor to HTML currently in development, <P> becomes a ``container'' of text, just as the text of a level-one heading is¥``contained'' within<H1> ... </H1>: The difference is that the </P> closing tag can always be omitted. (That is, if a browser sees a <P>, it knows that there must be an implied </P> to end the previous paragraph.) In other words, in HTML+, <P> is a beginning-of-paragraph marker. The advantage of this change is that you will be able to specify formatting options for a paragraph. For example, in HTML+, you will be able to center a paragraph by coding <P ALIGN=CENTER> This is a centered paragraph. This is HTML+, so you can't do it yet.

<P ALIGN=CENTER>
3 Εκδοση. Παράγραφος κεντραρισμένη.

Htmlelt.param

name::
* McsEngl.Htmlelt.param@cptIt,

_DESCRIPTION:
The <param> tag is used to define parameters for plugins embedded with an <object> element.

Tip: HTML 5 also includes two new elements for playing audio or video: The <audio> and <video> tags.
[http://www.w3schools.com/html5/tag_param.asp]

_CODE.HML:
<object data="horse.wav">
<param name="autoplay" value="false">
</object>
[http://www.w3schools.com/html5/tag_param.asp]

Htmlelt.picture

name::
* McsEngl.Htmlelt.picture@cptIt,

_DESCRIPTION:
The <picture> element works similar to the <video> and <audio> elements. You set up different sources, and the first source that fits the preferences is the one being used:

Example
<picture>
<source srcset="img_smallflower.jpg" media="(max-width: 400px)">
<source srcset="img_flowers.jpg">
<img src="img_flowers.jpg" alt="Flowers">
</picture>
[http://www.w3schools.com/css/css_rwd_images.asp]

Htmlelt.pre

name::
* McsEngl.Htmlelt.pre@cptIt,
* McsEngl.hml'pre-element@cptIt,
* McsEngl.hml-preformated-text@cptIt,
* McsEngl.hml-unformated-text@cptIt,
* McsEngl.html'pre@cptIt,

_DESCRIPTION:
<PRE>...</PRE>
===
Definition and Usage
The <pre> tag defines preformatted text.
Text in a <pre> element is displayed in a fixed-width font (usually Courier), and it preserves both spaces and line breaks.
[https://www.w3schools.com/tags/tag_pre.asp]
===
ΔΙΠΛΟ. Ορίζει προδιαμορφωμένο κείμενο
Identifies text that has already been formatted (preformatted) by some other system and must be displayed as is. Preformatted text may include embedded tags, but not all tag types are permitted. The <pre> tag can be used to include tables in documents.

Use the <PRE> tag (which stands for ``preformatted'') to generate text in a fixed-width font and cause spaces, new lines, and tabs to be significant. (That is, multiple spaces are displayed as multiple spaces, and lines break in the same locations as in the source HTML file.) This is useful for program listings.

Note that because <, >, and & have special meaning in HTML, you have to use their escape sequences (<, >, and &, respectively) to enter these characters. See the section Special Characters for more information.

_GENERIC:
* hml-block-element#ql:idLmheltGncBlock#

Htmlelt.progress (Html5.new)

name::
* McsEngl.Htmlelt.progress (Html5.new)@cptIt,

Htmlelt.root

name::
* McsEngl.Htmlelt.root@cptIt,
* McsEngl.html'root-element@cptIt,
* McsEngl.html'root-element-of-element@cptIt,
* McsEngl.html'root-element-of-document@cptIt,

_DESCRIPTION:
The term root element, when not explicitly qualified as referring to the document's root element, means the furthest ancestor element node of whatever node is being discussed, or the node itself if it has no ancestors. When the node is a part of the document, then the node's root element is indeed the document's root element; however, if the node is not currently part of the document tree, the root element will be an orphaned node.

When an element's root element is the root element of a Document, it is said to be in a Document. An element is said to have been inserted into a document when its root element changes and is now the document's root element.
[http://dev.w3.org/html5/spec/Overview.html#dom-trees]

Htmlelt.ruby (Html5.new)

name::
* McsEngl.Htmlelt.ruby (Html5.new)@cptIt,

Htmlelt.samp

name::
* McsEngl.Htmlelt.samp@cptIt,
* McsEngl.hmlsamp@cptIt,
* McsEngl.html'samp@cptIt,

_DESCRIPTION:
<SAMP>...</SAMP>
LOGICAL STYLE. Include sample output

for computer status messages. Displayed in a fixed-width font. (Segmentation fault: Core dumped.)

Htmlelt.script

name::
* McsEngl.Htmlelt.script@cptIt,
* McsEngl.html'script@cptIt,
* McsEngl.hmlscript@cptIt,

_DESCRIPTION:
It's common practice to add a type attribute with a value of "text/javascript" to script elements as follows -
<script type="text/javascript" src="scriptfile.js"></script>
HTML 5 removes extra information required and you can use simply following syntax -
<script src="scriptfile.js"></script>
[http://www.tutorialspoint.com/html5/html5_syntax.htm]

_GENERIC:
* body-elements#linkL#
* head-elements#ql:html'elt.generic.head#

_ATTRIBUTE:
* js-code-loading#ql:js'code'loading#
* js-loader#ql:js'loader#

Htmlscript'attribute

name::
* McsEngl.Htmlscript'attribute@cptIt,

_ATTRIBUTE.async:
The <script> element has an attribute called async that will override the sequential blocking nature of <script> elements when the DOM is being constructed by a web browser. By using this attribute, we are telling the browser not to block the construction (i.e. DOM parsing, including downloading other assets e.g. images, style sheets, etc...) of the html page and forgo the the sequential loading as well.
What happens by using the async attribute is the files are loaded in parallel and parsed in order of download once they are fully downloaded.
...
A major drawback to using the async attribute is JavaScript files potentially get parsed out of the order they are included in the DOM. This raises a dependency management issue.
[http://domenlightenment.com/#10.4]
===
async=false

_ATTRIBUTE.defer:
The <script> element has an attribute called defer that will defer the blocking, downloading, and executing of an external JavaScript file until the browser has parsed the closing <html> node. Using this attribute simply defers what normally occurs when a web browser encoutners a <script> node. In the code below I defer each external JavaScript file until the final <html> is encountered.
[http://domenlightenment.com/#10.3]

_CODE.LJS:
<!-- defer, don't block just ignore this until the <html> element node is parsed -->
<script defer src="http://cdnjs.cloudflare.com/ajax/libs/underscore.js/1.3.3/underscore-min.js"></script>
[http://domenlightenment.com/#10.3]
===

Htmlelt.script'position

name::
* McsEngl.Htmlelt.script'position@cptIt,

_PHYSICAL_POSITION:
Given a <script> elements synchronous nature, placing one in the <head> element of an HTML document presents a timing problem if the JavaScript execution is dependant upon any of the DOM that proceeds the <script>. In a nut shell, if JavaScript is executed at the begining of a document that manipulates the DOM, that proceeds it, you are going to get a JavaScript error. Proven by the following code example:

live code: N/A
<!DOCTYPE html>
<html lang="en">
<head>
<!-- stop parsing, block parsing, exectue js then resume... -->
<script>
//we can't script the body element yet, its null, not even been parsed by the browser, its not in the DOM yet
console.log(document.body.innerHTML); //logs Uncaught TypeError: Cannot read property 'innerHTML' of null
</script>
</head>
<body>
<strong>Hi</strong>
</body>
</html>
Many developers, myself being one of them, for this reason will attempt to place all <script> elements before the closing </body> element. By doing this you can rest assured the DOM in front of the <script>'s has been parsed and is ready for scripting. As well, this strategy will remove a dependancy on DOM ready events that can liter a code base.
[http://domenlightenment.com/#10.7]

Htmlelt.section (Html5.new)

name::
* McsEngl.Htmlelt.section (Html5.new)@cptIt,
* McsEngl.hmlsection@cptIt,
* McsEngl.htmlsection@cptIt,
* McsEngl.html'section-element@cptIt,

* McsEngl.eltScn@cptIt,

_ADDRESS.WPG:
* http://dev.w3.org/html5/spec/Overview.html#the-section-element

_DESCRIPTION:
The section element represents a generic section of a document or application. A section, in this context, is a thematic grouping of content, typically with a heading.

Examples of sections would be chapters, the various tabbed pages in a tabbed dialog box, or the numbered sections of a thesis. A Web site's home page could be split into sections for an introduction, news items, and contact information.

Authors are encouraged to use the article element instead of the section element when it would make sense to syndicate the contents of the element.

The section element is not a generic container element. When an element is needed for styling purposes or as a convenience for scripting, authors are encouraged to use the div element instead. A general rule is that the section element is appropriate only if the element's contents would be listed explicitly in the document's outline.
[http://dev.w3.org/html5/spec/Overview.html#the-section-element] 2010-10-10

_CONTENT:
Sections may contain headings of any rank, but authors are strongly encouraged to either use only h1 elements, or to use elements of the appropriate rank for the section's nesting level.
[http://dev.w3.org/html5/spec/Overview.html#headings-and-sections]

Htmlelt.select

name::
* McsEngl.Htmlelt.select@cptIt,
* McsEngl.htmlselect@cptIt,
* McsEngl.html'select-element@cptIt,

_DESCRIPTION:
The <select> element is used to create a drop-down list.
The <option> tags inside the <select> element define the available options in the list.
[http://www.w3schools.com/tags/tag_select.asp]
===
<SELECT>...</SELECT>
It is used in <FORM> tag.
defines and displays a set of optional list items from which the user can select one or more items. This element requires an <option> element for each item in the list.

Attributes and their arguments:
- name="textstring" where textstring is the symbolic identifier for the select field variable.
- size="list_length" where list_length is an integer value representing the number of <option> items that will be displayed at one time.
- multiple No arguments. If present, the multiple attribute allows selection of more than one <option> value.

_CODE.HML:
<select>
<option value="volvo">Volvo</option>
<option value="saab">Saab</option>
<option value="mercedes">Mercedes</option>
<option value="audi">Audi</option>
</select>

Htmlelt.span

name::
* McsEngl.Htmlelt.span@cptIt,
* McsEngl.html'span@cptIt,

_GENERIC:
* inline-element#ql:html'element.inline#

_DESCRIPTION:
The <span> tag is used to group inline-elements in a document.

The <span> tag provides no visual change by itself.

The <span> tag provides a way to add a hook to a part of a text or a part of a document.

Tip: When a text is hooked in a <span> element you can add styles to the content, or manipulate the content with for example JavaScript.
[http://www.w3schools.com/html5/tag_span.asp]
===
The <SPAN> tag is used to modify the characteristics of a particular section of text.

The difference between <DIV> and <SPAN> is that <SPAN> is used within a paragraph, sentence or even word, while <DIV> is intended for block-level formatting.

This examine demonstrates how SPAM can be used to modify sections of text<BR>
<SPAN style="color: purple">Purple text</SPAN>
<SPAN style="font-size: 8pt">8 point font</SPAN><P>
Testing <SPAN style="color: red">See the color changes
<SPAN style="font-size: 20pt"> and now the size changes</SPAN>
and now the size changes back</SPAN>
[http://www.html-reference.com/SPAN.asp]
===

_CODE.HML:
* creates a rectacgle around the text.
HTML:
===
... <span class="key">F1</span> ...
CSS:
===
.key {
border: 1px solid black;
padding: 0px 2px;
}

===
<span id='enclosed_id_123'></span>

Htmlelt.strong

name::
* McsEngl.Htmlelt.strong@cptIt,
* McsEngl.html'strong@cptIt,

_DESCRIPTION:
<STRONG>...</STRONG>
LOGICAL STYLE. ΔΙΠΛΟ. Υποδηλώνει έμφαση, έντονο κείμενο
Stronger emphasis
for strong emphasis. Typically displayed in bold. (Important)
===
Differences Between HTML 4.01 and HTML5
In HTML 4.01, the <strong> tag defines strong emphasized text, but in HTML5 it defines important text.
[http://www.w3schools.com/tags/tag_strong.asp]

Htmlelt.sup

name::
* McsEngl.Htmlelt.sup@cptIt,
* McsEngl.html'sup@cptIt,

_DESCRIPTION:
<sup>...</sup>
Defines superscript.

example:
<sup><font size="-2">TM</font></sup>

Htmlelt.svg (Html5.new)#ql:imgsvg'htmlelt#

name::
* McsEngl.Htmlelt.svg (Html5.new)@cptIt,

Htmlelt.table

name::
* McsEngl.Htmlelt.table@cptIt,
* McsEngl.hml'table@cptIt,
* McsEngl.hmltbl@cptIt,
* McsEngl.html'TABLE@cptIt,

_DESCRIPTION:
<TABLE>
ΔΙΠΛΟ. Ορίζει πίνακα

_CODE.HML:
<table border=2 width=100% cellpadding=5>
<tr><td>up/down arrow<td>move focus up or down one line in the tree.
<tr><td>left arrow<td>move focus to parent of current node.
<tr><td>right arrow<td>move focus to child of current node.
<tr><td>page up/down<td>move focus up or down one page in the tree.
<tr><td>home/end<td>move focus to top or bottom of tree.
<tr><td>space<td>expand or collapse the current node.
<tr><td>return<td>same as double click. See above.
</table>

ATTRIBUTES:
* border: html5 border="1" or"". border=3: ορίζει το πάχος της γραμμής
* CELLSPACING=0
* CELLPADDING=7
* colspan="x" how many columns a line spans.
* rowspan="x"

<tr></tr> a ROW

<td valign="top" rowspan="2"></td> COLUMN

_ADDRESS.WPG:
* A responsive table will display a horizontal scroll bar if the screen is too small to display the full content. https://www.w3schools.com/howto/howto_css_table_responsive.asp,

Htmlelt.tbody

name::
* McsEngl.Htmlelt.tbody@cptIt,
* McsEngl.html'tbody@cptIt,

_DESCRIPTION:
The HTML Table Body Element (<tbody>) defines one or more <tr> element data-rows to be the body of its parent <table> element (as long as no <tr> elements are immediate children of that table element.) In conjunction with a preceding <thead> and/or <tfoot> element, <tbody> provides additional semantic information for devices such as printers and displays. Of the parent table's child elements, <tbody> represents the content which, when longer than a page, will most likely differ for each page printed; while the content of <thead> and <tfoot> will be the same or similar for each page printed. For displays, <tbody> will enable separate scrolling of the <thead>, <tfoot>, and <caption> elements of the same parent <table> element. Note that unlike the <thead>, <tfoot>, and <caption> elements however, multiple <tbody> elements are permitted (if consecutive), allowing the data-rows in long tables to be divided into different sections, each separately formatted as needed.
[https://developer.mozilla.org/en-US/docs/Web/HTML/Element/tbody]

Htmlelt.td

name::
* McsEngl.Htmlelt.td@cptIt,
* McsEngl.html'td@cptIt,
* McsEngl.html'table'data@cptIt,

_DESCRIPTION:
<td style="width:70%">January</td>

Htmlelt.th

name::
* McsEngl.Htmlelt.th@cptIt,
* McsEngl.html'th@cptIt,
* McsEngl.html'table'head@cptIt,

Htmlelt.template

name::
* McsEngl.Htmlelt.template@cptIt,
* McsEngl.htmlelt.template@cptIt,
* McsEngl.hml'template-element@cptIt,

_DESCRIPTION:
4.12.3 The template element
Categories:
Metadata content.
Flow content.
Phrasing content.
Script-supporting element.
Contexts in which this element can be used:
Where metadata content is expected.
Where phrasing content is expected.
Where script-supporting elements are expected.
As a child of a colgroup element that doesn't have a span attribute.
Content model:
Nothing.
Tag omission in text/html:
Neither tag is omissible.
Content attributes:
Global attributes
DOM interface:
[HTMLConstructor]
interface HTMLTemplateElement : HTMLElement {
readonly attribute DocumentFragment content;
};
The template element is used to declare fragments of HTML that can be cloned and inserted in the document by script.

In a rendering, the template element represents nothing.

The template contents of a template element are not children of the element itself. Instead, they are stored in a DocumentFragment associated with a different Document without a browsing context so as to avoid the template contents interfering with the main Document. (For example, this avoids form controls from being submitted, scripts from executing, and so forth.) The template contents have no conformance requirements.
[https://html.spec.whatwg.org/multipage/scripting.html#the-template-element]

Htmlelt.textarea

name::
* McsEngl.Htmlelt.textarea@cptIt,
* McsEngl.htmleltTextarea@cptIt,
* McsEngl.hml'textarea@cptIt,
* McsEngl.html'textarea@cptIt,

_DESCRIPTION:
<TEXTAREA>...</TEXTAREA>
Define a text area.
<textarea> . . . default text . . . </textarea>
Defines a rectangular field where the user may enter text data. If "default text" is present it will be displayed when the field appears. Otherwise the field will be blank.

Attributes and their values:
- name="textstring" textstring is a symbolic name that identifies the <textarea> variable.
- rows="num_rows" and cols="numcols" Both attributes take an integer value which represents the lines and number of characters per line in the <textarea> to be displayed.

_CODE.HML:
<textarea id="INPUT" style="
border: 2px solid black;
color: black;
font-family: monospace;
height: 3in;
overflow: auto;
padding: 0.5em;
width: 100%;"></textarea>

_ADDRESS.WPG:
* http://www.quirksmode.org/dom/cms.html,

Htmlelt.time (Html5.new)

name::
* McsEngl.Htmlelt.time (Html5.new)@cptIt,
* McsEngl.html'time@cptIt,
* McsEngl.html'time-element@cptIt,

_DESCRIPTION:
The <time> tag does not render as anything special in any of the major browsers.
Definition and Usage
The <time> tag defines either a time (24 hour clock), or a date in the Gregorian calendar, optionally with a time and a time-zone offset.
This element can be used as a way to encode dates and times in a machine-readable way so that, for example, user agents can offer to add birthday reminders or scheduled events to the user's calendar, and search engines can produce smarter search results.
[http://www.w3schools.com/tags/tag_time.asp]
===
The HTML <time> element represents either a time on a 24-hour clock or a precise date in the Gregorian calendar (with optional time and timezone information).

This element is intended to be used presenting dates and times in a machine readable format. This can be helpful for user agents to offer any event scheduling for user's calendar.

Usage note: This element is not appropriate for instances where a specific date cannot be calculated, nor should it be used for dates prior to the introduction to the Gregorian calendar (due to complications with calculating those dates).
Content categoriesFlow content, phrasing content, palpable content.
Permitted contentPhrasing content, but no descendant time elements.
Tag omission None; both the starting and ending tags are mandatory.
Permitted parent elements Any element that accepts phrasing content.
DOM interfaceHTMLTimeElement
Attributes

Like all other HTML elements, this element supports the global attributes.

datetime
This attribute indicates the time and date of the element and must be a valid date with an optional time string. If the value cannot be parsed as a date with an optional time string, the element does not have an associated time stamp.
Examples

Simple example

<p>The concert starts at <time>20:00</time>.</p>
Above HTML will output:

The concert starts at 20:00.

datetime example

<p>The concert took place on <time datetime="2001-05-15 19:00">May 15</time>.</p>
Above HTML will output:

The concert took place on May 15.

Specifications

Specification  Status  Comment
WHATWG HTML Living Standard  Living Standard  No change from HTML5.1 (draft)
HTML5.1 (draft)  Working Draft  No change from HTML5
HTML5  Candidate Recommendation  Initial definition.
Browser compatibility

Desktop Mobile
Feature  Chrome  Firefox (Gecko)  Internet Explorer  Opera  Safari
Basic support  Not supported  22.0 (22.0)  ?  11.50
Removed in 15.0  Not supported
[https://developer.mozilla.org/en-US/docs/Web/HTML/Element/time]

Htmlelt.title

name::
* McsEngl.Htmlelt.title@cptIt,
* McsEngl.html'title@cptIt,

_GENERIC:
* head-group-element#ql:html'elt.generic.head#

_GENERIC:
<TITLE>...</TITLE>
HEAD TAG. Specify a document title. Note that the title will not appear on the document as is customary on printed documents. It will usually appear in a window bar identifying the contents of the window. HTML header tags perform the functions usually reserved for titles.
Every HTML document should have a title.
A title is generally displayed separately from the document and is used primarily for document identification in other contexts (e.g., a WAIS search). Choose about half a dozen words that describe the document's purpose.
In the X Window System and Microsoft Windows versions of NCSA Mosaic, the Document Title field is at the top of the screen just below the pulldown menus. In NCSA Mosaic for Macintosh, text tagged as <TITLE> appears as the window title.

Htmlelt.tr

name::
* McsEngl.Htmlelt.tr@cptIt,
* McsEngl.html'tr@cptIt,
* McsEngl.html'table'raw@cptIt,

Htmlelt.ul

name::
* McsEngl.Htmlelt.ul@cptIt,
* McsEngl.html'list.unordered@cptIt,
* McsEngl.html'ul@cptIt,
* McsEngl.html'unorderd-list@cptIt,

_GENERIC:
* list-group-element#ql:html'elt.list_group#

_DESCRIPTION:
<UL>...t;/UL>
ΔΙΠΛΟ. Ορίζει μια λίστα με bullets.
<li> First item in the list <li> Next item in the list
Lists can be arbitrarily nested, although in practice you probably should limit the nesting to three levels. You can also have a number of paragraphs, each containing a nested list, in a single list item.

_CODE.HML:
<p>list unordered:
<ul>
<li>ABC</li>
<li>XYZ
<ul>
<li>ABC</li>
<li>XYZ</li>
<li>XYZ</li>
</ul>
</li>
<li>XYZ</li>
</ul>
</p>

Htmlelt.var

name::
* McsEngl.Htmlelt.var@cptIt,
* McsEngl.html'var@cptIt,

_DESCRIPTION:
Example
<p> A simple equation: <var>x</var> = <var>y</var> + 2 </p>
[https://developer.mozilla.org/en/docs/Web/HTML/Element/var]
===
<VAR>...</VAR>
LOGICAL STYLE. Define a variable
===
for a ``metasyntactic'' variable, where the user is to replace the variable with a specific instance. Typically displayed in italics. (rm filename deletes the file.)

Htmlelt.video (Html5.new)

name::
* McsEngl.Htmlelt.video (Html5.new)@cptIt,
* McsEngl.html'video@cptIt,

_CODE.HML:
===
<iframe width="420" height="315" src="http://www.youtube.com/embed/6Yr_W4zeBLs" frameborder="0" allowfullscreen></iframe>
===
<video width="320" height="240" controls="controls">
<source src="movie.ogg" type="video/ogg" />
<source src="movie.mp4" type="video/mp4" />
Your browser does not support the video tag.
</video>
===
Playing Videos in HTML
Before HTML5, there was no standard for showing videos on a web page.

Before HTML5, videos could only be played with a plug-in (like flash).

The HTML5 <video> element specifies a standard way to embed a video in a web page.

Browser Support
The numbers in the table specify the first browser version that fully supports the <video> element.

Element          
<video>  4.0  9.0  3.5  4.0  10.5
The HTML <video> Element
To show a video in HTML, use the <video> element:

Example

<video width="320" height="240" controls>
<source src="movie.mp4" type="video/mp4">
<source src="movie.ogg" type="video/ogg">
Your browser does not support the video tag.
</video>

Try it yourself »
How it Works
The controls attribute adds video controls, like play, pause, and volume.

It is a good idea to always include width and height attributes.

If height and width are not set, the browser does not know the size of the video. The effect will be that the page will change (or flicker) while the video loads.

Text between the <video> and </video> tags will only display in browsers that do not support the <video> element.

Multiple <source> elements can link to different video files. The browser will use the first recognized format.

HTML <video> Autoplay
To start a video automatically use the autoplay attribute:

Example

<video width="320" height="240" autoplay>
<source src="movie.mp4" type="video/mp4">
<source src="movie.ogg" type="video/ogg">
Your browser does not support the video tag.
</video>

Try it yourself »
Note  The autoplay attribute does not work in Safari and Opera, or in mobile devices like iPad and iPhone.
HTML Video - Browser Support
Currently, there are 3 supported video formats for the <video> element: MP4, WebM, and Ogg:

Browser  MP4  WebM  Ogg
Internet Explorer  YES  NO  NO
Chrome  YES  YES  YES
Firefox  YES  YES  YES
Safari  YES  NO  NO
Opera  YES (from Opera 25)  YES  YES
HTML Video - Media Types
File Format  Media Type
MP4  video/mp4
WebM  video/webm
Ogg  video/ogg
HTML Video - Methods, Properties, and Events
HTML5 defines DOM methods, properties, and events for the <video> element.

This allows you to load, play, and pause videos, as well as setting duration and volume.

There are also DOM events that can notify you when a video begins to play, is paused, etc.

Example: Using JavaScript


Play/Pause Big Small Normal

Video courtesy of Big Buck Bunny.


Try it yourself »
For a full DOM reference, go to our HTML5 Audio/Video DOM Reference.

HTML5 Video Tags
Tag  Description
<video>  Defines a video or movie
<source>  Defines multiple media resources for media elements, such as <video> and <audio>
<track>  Defines text tracks in media players
[http://www.w3schools.com/html/html5_video.asp]

Htmlelt.style

name::
* McsEngl.Htmlelt.style@cptIt,
* McsEngl.htmlstyle-element@cptIt,
* McsEngl.html'css@cptIt,
* McsEngl.html'style-element@cptIt,
* McsEngl.html'styleelement@cptIt,

_GENERIC:
* body-group
* head-group-element#ql:html'elt.generic.head#

_CODE.HML:
<style type="text/css">
h1 {color:red}
p {color:blue}
</style>

_POSITION:
* http://stackoverflow.com/a/16844668,

_DESCRIPTION:
You can code individual words or sentences with special styles. There are two types of styles: logical and physical.

Logical styles tag text according to its meaning, while physical styles specify the specific appearance of a section. For example, in the preceding sentence, the words ``logical styles'' was tagged as a ``definition. The same effect (formatting those words in italics), could have been achieved via a different tag that specifies merely ``put these words in italics.''

Physical Versus Logical: Use Logical Styles When Possible If physical and logical styles produce the same result on the screen, why are there both? We devolve, for a couple of paragraphs, into the philosophy of SGML, which can be summed in a Zen-like mantra: ``Trust your browser.'' In the ideal SGML universe, content is divorced from presentation. Thus, SGML tags a level-one heading as a level-one heading, but does not specify that the level-one heading should be, for instance, 24-point bold Times centered on the top of a page. The advantage of this approach (it's similar in concept to style sheets in many word processors) is that if you decide to change level-one headings to be 20-point left-justified Helvetica, all you have to do is change the definition of the level-one heading in the you have to do is change the definition of the level-one heading in the presentation device (i.e., your World Wide Web browser). The other advantage of logical tags is that they help enforce consistency in your documents. It's easier to tag something as <H1> than to remember that level-one headings are 24-point bold Times or whatever. The same is true for character styles. For example, consider the <STRONG> tag. Most browsers render it in bold text. However, it is possible that a reader would prefer that these sections be displayed in red instead. Logical styles offer this flexibility.


<cite> . . . </cite>
<code>...</code>
<dfn> . . . </dfn>
<em> . . . </em>
<kbd> . . . </kbd>
<samp> . . . </samp>
<strong> . . . </strong>
<var> . . . </var>

Htmlelt.Styles.physical

name::
* McsEngl.Htmlelt.Styles.physical@cptIt,


<b> . . . </b>
<i> . . . </i>
<tt> . . . </tt>
<u> . . . </u>

Htmldoc'Root-tree

name::
* McsEngl.Htmldoc'Root-tree@cptIt,
* McsEngl.hml'root-tree@cptIt,

* McsEngl.hmlrtr@cptIt, {2016-06-18}

_DESCRIPTION:
* hml-doc is the whole constuction. hml-root-tree is the FIRST tree in the-hmldoc.
[hmnSngo.2016-06-18]
===
Html-doc is a COMPUTER-DOCUMENT#ql:computer_document@cptIt242# (file persistent or dynamic) written with the html-language.
[hmnSngo.2014-11-28]
===
Ενα ΕΓΓΡΑΦΟ/DOCUMENT περιλαμβάνει μία ή περισσότερες ΣΕΛΙΔΕΣ/PAGES και δομείται σύμφωνα με τις προδιαγραφές της γλώσσας.
[COMPUTER GO, OCT. 1995, ΕΝΘΕΤΟ 23]

_CODE.HML:
<!DOCTYPE html>
<html>
<head>
<title>This is a title</title>
</head>
<body>
<p>Hello world!</p>
</body>
</html>

Htmlrtr'child.doctype-element#ql:htmlelt.doctype#

name::
* McsEngl.Htmlrtr'child.doctype-element@cptIt,

Htmlrtr'child.html-element#ql:htmlelt.html#

name::
* McsEngl.Htmlrtr'child.html-element@cptIt,

Htmlrtr.HTML5

name::
* McsEngl.Htmlrtr.HTML5@cptIt,
* McsEngl.hml5v'doc@cptIt,

_CODE.HML:
<!DOCTYPE html>
<html>
<head>
<title></title>
<meta charset="utf-8">
</head>
<body>
<body>
</html>

Htmlrtr.HTML4

name::
* McsEngl.Htmlrtr.HTML4@cptIt,

_CODE.HML:
An HTML 4 document is composed of three parts:

a line containing HTML version information,
a declarative header section (delimited by the HEAD element),
a body, which contains the document's actual content. The body may be implemented by the BODY element or the FRAMESET element.
White space (spaces, newlines, tabs, and comments) may appear before or after each section. Sections 2 and 3 should be delimited by the HTML element.

Here's an example of a simple HTML document:

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
"http://www.w3.org/TR/html4/strict.dtd">
<HTML>
<HEAD>
<TITLE>My first HTML document</TITLE>
</HEAD>
<BODY>
<P>Hello world!
</BODY>
</HTML>
[http://www.w3.org/TR/html401/struct/global.html]

Htmlrtr.XHTML

name::
* McsEngl.Htmlrtr.XHTML@cptIt,

_CODE.XHTML:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>XHTML 1.0 Strict Example</title>
<script type="text/javascript">
//<![CDATA[
function loadpdf() {
document.getElementById("pdf-object").src="http://www.w3.org/TR/xhtml1/xhtml1.pdf";
}
//]]>
</script>
</head>
<body onload="loadpdf()">
<p>This is an example of an
<abbr title="Extensible HyperText Markup Language">XHTML</abbr> 1.0 Strict document.<br />
<img id="validation-icon"
src="http://www.w3.org/Icons/valid-xhtml10"
alt="Valid XHTML 1.0 Strict" /><br />
<object id="pdf-object"
name="pdf-object"
type="application/pdf"
data="http://www.w3.org/TR/xhtml1/xhtml1.pdf"
width="100%"
height="500">
</object>
</p>
</body>
</html>
[http://en.wikipedia.org/wiki/XHTML]

Htmldoc'user-interface-element

name::
* McsEngl.Htmldoc'user-interface-element@cptIt,
* McsEngl.Html'ui-element@cptIt,
* McsEngl.Html'ui-component@cptIt,

_SPECIFIC:
Input Controls: checkboxes, radio buttons, dropdown lists, list boxes, buttons, toggles, text fields, date field
Navigational Components: breadcrumb, slider, search field, pagination, slider, tags, icons
Informational Components: tooltips, icons, progress bar, notifications, message boxes, modal windows
Containers: accordion
[https://www.usability.gov/how-to-and-tools/methods/user-interface-elements.html]

Html'dropdown-list

name::
* McsEngl.Html'dropdown-list@cptIt,
* McsEngl.Html'dropdown-list@cptIt,
* McsEngl.Html-select-element@cptIt,
* McsEngl.Htmlelt.select@cptIt,

_DESCRIPTION:
<select>
<option value="volvo">Volvo</option>
<option value="saab" selected="selected">Saab</option>
<option value="mercedes">Mercedes</option>
<option value="audi">Audi</option>
</select>
[https://www.w3schools.com/tags/tag_select.asp]

_JAVASCRIPT:
* https://www.daftlogic.com/information-programmatically-preselect-dropdown-using-javascript.htm,
===
//oElt.options is an-array
//oElt.options.length
//oElt.options[i].text is the-text we see
//oElt.options[i].value
//
//sLag = oEltTabCntSrchSlt.options[oEltTabCntSrchSlt.selectedIndex].value,
//
function setSelectedIndex(oElt, i) {
oElt.options[i-1].selected = true;
return;
}
setSelectedIndex(document.getElementById("ddl_example3"),5);
===
document.getElementById('idEltSelect').addEventListener('change', function(oEvtIn) {
//oElt = oEvtIn.target;
// You can use “this” to refer to the selected element.
if(!event.target.value) alert('Please Select One');
else alert('You like ' + event.target.value + ' ice cream.');
});
===
document.getElementById('idEltSelect').onchange = function(){myScript};

Htmldoc.SPECIFIC

name::
* McsEngl.Htmldoc.SPECIFIC@cptIt,
* McsEngl.hml'webpage.SPECIFIC@cptIt,
* McsEngl.webpage.specific@cptIt,

_SPECIFIC_DIVISION:
* dynamic-page,
* static-page,

_SPECIFIC:
* program-webpage,
* programNo-webpage,

Htmldoc.SELECTING

name::
* McsEngl.Htmldoc.SELECTING@cptIt,
* McsEngl.html'selecting@cptIt,

How to make text on a web page unselectable? There are several possible approaches - using overlay transparent image in front of the text, using image with text instead of text, or using the following best practice:

There are currently two independent ways for preventing text selection: using CSS style user-select: none; and using attribute on target element unselectable="on". Unfortunately only subset of browsers supports the first one and another subset the second one. To be more precise the CSS style user-select: none; is currently not supported anywhere, but you can use these browser specific styles:
-webkit-user-select: none; - working in Chrome and Safari
-moz-user-select: none; - working in FireFox

On the other hand unselectable="on" is working in Internet Explorer 6+ and in Opera. There is actually one simple hiccup with this property - you need to use it on each sub element in you text to prevent the selection across elements, but I'm sure you'll figure this out :)

Summing that up: using the style and the attribute at the same time on your text you can easily prevent selecting anything.
[http://suchan.cz/?p=33]

<head>
<style>
.unselectable {
-moz-user-select: none;
-webkit-user-select: none;
}
</style>
</head>
<body>
<div class="unselectable" unselectable="on">
The user is not able to select this text in Firefox, Google Chrome and Safari.
In Internet Explorer and Opera, it is selectable only if the selection starts outside.
</div>
</body>
[http://help.dottoro.com/lcrlukea.php#-webkit-user-select]

Htmldoc.ABBREVIATION

name::
* McsEngl.Htmldoc.ABBREVIATION@cptIt,

_CODE.HML:
<abbr title="System of National Accounts">SNA</abbr>

_CODE.CSS:
abbr {
border-bottom: 1px dashed black;
cursor: help;
}

Htmldoc.AUDIO

name::
* McsEngl.Htmldoc.AUDIO@cptIt,
* McsEngl.htmlaudio-code@cptIt,
* McsEngl.htmlcode.audio@cptIt,

_AUDIO_ELEMENT#ql:helt.audio#

Htmldoc.COLOR

name::
* McsEngl.Htmldoc.COLOR@cptIt,
* McsEngl.html'color@cptIt,

_DESCRIPTION:
Hex values are written as 3 double digit numbers, starting with a# sign.
#C0C0C0

_CODE.CSS:
color:#F0FFFF;
background-color:#0000FF; /* Blue; */

Htmldoc.CONVERSATION

name::
* McsEngl.Htmldoc.CONVERSATION@cptIt,
* McsEngl.html'conversation@cptIt,

4.13.3 Conversations

This specification does not define a specific element for marking up conversations, meeting minutes, chat transcripts, dialogues in screenplays, instant message logs, and other situations where different players take turns in discourse.

Instead, authors are encouraged to mark up conversations using p elements and punctuation. Authors who need to mark the speaker for styling purposes are encouraged to use span or b. Paragraphs with their text wrapped in the i element can be used for marking up stage directions.

This example demonstrates this using an extract from Abbot and Costello's famous sketch, Who's on first:

<p> Costello: Look, you gotta first baseman?
<p> Abbott: Certainly.
<p> Costello: Who's playing first?
<p> Abbott: That's right.
<p> Costello becomes exasperated.
<p> Costello: When you pay off the first baseman every month, who gets the money?
<p> Abbott: Every dollar of it.
The following extract shows how an IM conversation log could be marked up.

<p> <time>14:22</time> <b>egof</b> I'm not that nerdy, I've only seen 30% of the star trek episodes
<p> <time>14:23</time> <b>kaj</b> if you know what percentage of the star trek episodes you have seen, you are inarguably nerdy
<p> <time>14:23</time> <b>egof</b> it's unarguably
<p> <time>14:23</time> <i>* kaj blinks</i>
<p> <time>14:24</time> <b>kaj</b> you are not helping your case
[http://dev.w3.org/html5/spec/Overview.html#conversations] 2010-10-22

Htmldoc.DYNAMIC#ql:pgmwbe@cptIt#

name::
* McsEngl.Htmldoc.DYNAMIC@cptIt,

Htmldoc.DYNAMIC.NO

_CREATED: {2012-02-07}

name::
* McsEngl.Htmldoc.DYNAMIC.NO@cptIt,
* McsEngl.hmldoc.STATIC@cptIt,
* McsEngl.web'Page.static@cptIt,
* McsEngl.static-webpage@cptIt19i,

Web pages may consist of files of static text stored within the web server's file system (static web pages), or the web server may construct the (X)HTML for each web page when it is requested by a browser (dynamic web pages). Client-side scripting can make web pages more responsive to user input once in the client browser.
[http://en.wikipedia.org/wiki/Web_page]

Htmldoc.FOOTNOTE

name::
* McsEngl.Htmldoc.FOOTNOTE@cptIt,
* McsEngl.html'footnote@cptIt,

4.13.4 Footnotes

HTML does not have a dedicated mechanism for marking up footnotes. Here are the recommended alternatives.

For short inline annotations, the title attribute should be used.

In this example, two parts of a dialogue are annotated with footnote-like content using the title attribute.

<p> <b>Customer</b>: Hello! I wish to register a complaint. Hello. Miss?
<p> <b>Shopkeeper</b>: <span title="Colloquial pronunciation of 'What do you'"
>Watcha</span> mean, miss?
<p> <b>Customer</b>: Uh, I'm sorry, I have a cold. I wish to make a complaint.
<p> <b>Shopkeeper</b>: Sorry, <span title="This is, of course, a lie.">we're
closing for lunch</span>.
For longer annotations, the a element should be used, pointing to an element later in the document. The convention is that the contents of the link be a number in square brackets.

In this example, a footnote in the dialogue links to a paragraph below the dialogue. The paragraph then reciprocally links back to the dialogue, allowing the user to return to the location of the footnote.

<p> Announcer: Number 16: The <i>hand</i>.
<p> Interviewer: Good evening. I have with me in the studio tonight
Mr Norman St John Polevaulter, who for the past few years has been
contradicting people. Mr Polevaulter, why <em>do</em> you
contradict people?
<p> Norman: I don't. <sup><a href="#fn1" id="r1">[1]</a></sup>
<p> Interviewer: You told me you did!
...
<section>
<p id="fn1"><a href="#r1">[1]</a> This is, naturally, a lie,
but paradoxically if it were true he could not say so without
contradicting the interviewer and thus making it false.</p>
</section>
For side notes, longer annotations that apply to entire sections of the text rather than just specific words or sentences, the aside element should be used.

In this example, a sidebar is given after a dialogue, giving it some context.

<p> <span class="speaker">Customer</span>: I will not buy this record, it is scratched.
<p> <span class="speaker">Shopkeeper</span>: I'm sorry?
<p> <span class="speaker">Customer</span>: I will not buy this record, it is scratched.
<p> <span class="speaker">Shopkeeper</span>: No no no, this's'a tobacconist's.
<aside>
<p>In 1970, the British Empire lay in ruins, and foreign
nationalists frequented the streets — many of them Hungarians
(not the streets — the foreign nationals). Sadly, Alexander
Yalt has been publishing incompetently-written phrase books.
</aside>
For figures or tables, footnotes can be included in the relevant figcaption or caption element, or in surrounding prose.

In this example, a table has cells with footnotes that are given in prose. A figure element is used to give a single legend to the combination of the table and its footnotes.

<figure>
<figcaption>Table 1. Alternative activities for knights.</figcaption>
<table>
<tr>
<th> Activity
<th> Location
<th> Cost
<tr>
<td> Dance
<td> Wherever possible
<td> £0<sup><a href="#fn1">1</a></sup>
<tr>
<td> Routines, chorus scenes<sup><a href="#fn2">2</a></sup>
<td> Undisclosed
<td> Undisclosed
<tr>
<td> Dining<sup><a href="#fn3">3</a></sup>
<td> Camelot
<td> Cost of ham, jam, and spam<sup><a href="#fn4">4</a></sup>
</table>
<p id="fn1">1. Assumed.</p>
<p id="fn2">2. Footwork impeccable.</p>
<p id="fn3">3. Quality described as "well".</p>
<p id="fn4">4. A lot.</p>
</figure>
[http://dev.w3.org/html5/spec/Overview.html#footnotes] 2010-10-22

Htmldoc.HYPERLINKING

name::
* McsEngl.Htmldoc.HYPERLINKING@cptIt,
* McsEngl.html'hyperlinking@cptIt,

_CODE.HML:
<A HREF=sound.mp3>a sound</A>: has a link to sound and the browser calls a program to play it.

Htmldoc.IMAGE

name::
* McsEngl.Htmldoc.IMAGE@cptIt,
* McsEngl.html'image@cptIt,
* McsEngl.hmlimg@cptIt,
* McsEngl.htmlimg@cptIt,

_SPECIFIC:
* data-URI-scheme#ql:data_uri_scheme@cptIt#
* img-element#ql:html'elm.img#

_CODE.HML:
<img src="klematis3_small.jpg" width="110" height="90" alt="Klematis" />

Htmlimg'alt-attribute

name::
* McsEngl.Htmlimg'alt-attribute@cptIt,

Missing Image Alt Attributes
Some of the img tags we found at this URL do not have an alt attribute. Adding alt attribute tags will make this page more accessible.
Why is it important?
The web is open to anyone and anyone should be able to enjoy it. By adding alt attributes to img tags this page will be more accessible to people with disabilities that need special software like screen readers to browse it.
[https://dev.windows.com/en-us/microsoft-edge/tools/staticscan/?url=http%3A%2F%2Fsynagonism.net]

Htmlcode.Image-gallery

name::
* McsEngl.Htmlcode.Image-gallery@cptIt,

<html>
<head>
<style type="text/css">
div.img
{
margin: 2px;
border: 1px solid#0000ff;
height: auto;
width: auto;
float: left;
text-align: center;
}  
div.img img
{
display: inline;
margin: 3px;
border: 1px solid#ffffff;
}
div.img a:hover img {border: 1px solid#0000ff;}
div.desc
{
text-align: center;
font-weight: normal;
width: 120px;
margin: 2px;
}
</style>
</head>
<body>

<div class="img">
<a target="_blank" href="klematis_big.htm"><img src="klematis_small.jpg" alt="Klematis" width="110" height="90" /></a>
<div class="desc">Add a description of the image here</div>
</div>
<div class="img">
<a target="_blank" href="klematis2_big.htm"><img src="klematis2_small.jpg" alt="Klematis" width="110" height="90" /></a>
<div class="desc">Add a description of the image here</div>
</div>
<div class="img">
<a target="_blank" href="klematis3_big.htm"><img src="klematis3_small.jpg" alt="Klematis" width="110" height="90" /></a>
<div class="desc">Add a description of the image here</div>
</div>
<div class="img">
<a target="_blank" href="klematis4_big.htm"><img src="klematis4_small.jpg" alt="Klematis" width="110" height="90" /></a>
<div class="desc">Add a description of the image here</div>
</div>

</body>
</html>

[http://www.w3schools.com/css/tryit.asp?filename=trycss_image_gallery]

Html'image.SPRITE

name::
* McsEngl.Html'image.SPRITE@cptIt,

_DESCRIPTION:
Image Sprites
An image sprite is a collection of images put into a single image.

A web page with many images can take a long time to load and generates multiple server requests.

Using image sprites will reduce the number of server requests and save bandwidth.
[http://www.w3schools.com/css/css_image_sprites.asp]

_CODE.CSS:
<!DOCTYPE html>
<html>
<head>
<style>
img.home {
width:44px;
height:44px;
background:url(img_navsprites.gif) 0 0;
}
img.next {
width:43px;
height:44px;
background:url(img_navsprites.gif) 176px 0;
}
</style>
</head>

<body>
<img src="img_navsprites.gif"/>
<br>
<img class="home" src="img_trans.gif" />
<br><br>
<img class="next" src="img_trans.gif"/>
</body>
</html>

Htmldoc.INDENT-TEXT

name::
* McsEngl.Htmldoc.INDENT-TEXT@cptIt,
* McsEngl.html'indent-text@cptIt,

_CSS:
a) whole paragraph or <br> inside paragraph:
span.indent-1 {
margin-left: 25px;
}
===
<br/><span class="indent-1">...</span>
===

b) first line left:
text-indent: -25px;
margin-left: 25px;

_CODE:
<blockquote>This text would be indented</blockquote>

_Hard_space:
        
uses Jext.

Htmldoc.List

name::
* McsEngl.Htmldoc.List@cptIt,
* McsEngl.hmllist@cptIt,
* McsEngl.html'list@cptIt,

1. DEFINITION-LIST:
The following is an example of a definition list:
<DL>
<DT> NCSA
<DD> NCSA, the National Center for Supercomputing Applications, is located on the campus of the University of Illinois at Urbana-Champaign. NCSA is one of the participants in the National MetaCenter for Computational Science and Engineering.
<DT> Cornell Theory Center
<DD> CTC is located on the campus of Cornell University in Ithaca, New York. CTC is another participant in the National MetaCenter for Computational Science and Engineering.
t;/DL>

2. ORDERD-LIST:
<OL>
 <LI>
 <LI>
t;/OL>

3. UNORDERD-LIST:
<UL>
 <LI>
 <LI>
t;/UL>

Html'list.Select

name::
* McsEngl.Html'list.Select@cptIt,
* McsEngl.hml'drop-down-list@cptIt,
* McsEngl.html'selection-list@cptIt,
* McsEngl.html'drop-down-list@cptIt,

_CODE.HML:
<select>
<option value="volvo">Volvo</option>
<option value="saab">Saab</option>
<option value="mercedes">Mercedes</option>
<option value="audi">Audi</option>
</select>

<select>
<option>California -- CA</option>
<option>Colorado -- CO</option>
<option selected="yes">Conneticut -- CN</option>
</select>

<select multiple="yes" size="3">
<option>California -- CA</option>
<option>Colorado -- CO</option>
<option>Connecticut -- CN</option>
</select>

List-with-contries-telephone-prefixes:
<div class="input">
<div class="intl-tel-input">
<input name="phone" id="phone" type="tel" data-required="1" maxlength="32" data-error-message="Phone number must start with a + and can contain only numbers, spaces and dashes" data-validator="phoneValidator" autocomplete="off">
<div class="flag-dropdown">
<div class="selected-flag" title="Estonia (Eesti): +372">
<div class="iti-flag ee"></div>
<div class="arrow"></div>
</div>

<ul class="country-list hide" style="top: -199px;">

<li class="country" data-dial-code="93" data-country-code="af"><div class="flag"><div class="iti-flag af"></div></div><span class="country-name">Afghanistan (????????????)</span><span class="dial-code">+93</span></li>

<li class="country" data-dial-code="355" data-country-code="al"><div class="flag"><div class="iti-flag al"></div></div><span class="country-name">Albania (Shqipλri)</span><span class="dial-code">+355</span></li>

<li class="country" data-dial-code="213" data-country-code="dz"><div class="flag"><div class="iti-flag dz"></div></div><span class="country-name">Algeria (??????????)</span><span class="dial-code">+213</span></li>

<li class="country" data-dial-code="1684" data-country-code="as"><div class="flag"><div class="iti-flag as"></div></div><span class="country-name">American Samoa</span><span class="dial-code">+1684</span></li>

<li class="country" data-dial-code="376" data-country-code="ad"><div class="flag"><div class="iti-flag ad"></div></div><span class="country-name">Andorra</span><span class="dial-code">+376</span></li>

<li class="country" data-dial-code="244" data-country-code="ao"><div class="flag"><div class="iti-flag ao"></div></div><span class="country-name">Angola</span><span class="dial-code">+244</span></li>

<li class="country" data-dial-code="1264" data-country-code="ai"><div class="flag"><div class="iti-flag ai"></div></div><span class="country-name">Anguilla</span><span class="dial-code">+1264</span></li>

<li class="country" data-dial-code="1268" data-country-code="ag"><div class="flag"><div class="iti-flag ag"></div></div><span class="country-name">Antigua and Barbuda</span><span class="dial-code">+1268</span></li>

<li class="country" data-dial-code="54" data-country-code="ar"><div class="flag"><div class="iti-flag ar"></div></div><span class="country-name">Argentina</span><span class="dial-code">+54</span></li>

<li class="country" data-dial-code="374" data-country-code="am"><div class="flag"><div class="iti-flag am"></div></div><span class="country-name">Armenia (????????)</span><span class="dial-code">+374</span></li>

<li class="country" data-dial-code="297" data-country-code="aw"><div class="flag"><div class="iti-flag aw"></div></div><span class="country-name">Aruba</span><span class="dial-code">+297</span></li>

<li class="country" data-dial-code="61" data-country-code="au"><div class="flag"><div class="iti-flag au"></div></div><span class="country-name">Australia</span><span class="dial-code">+61</span></li>

<li class="country" data-dial-code="43" data-country-code="at"><div class="flag"><div class="iti-flag at"></div></div><span class="country-name">Austria (Φsterreich)</span><span class="dial-code">+43</span></li>

<li class="country" data-dial-code="994" data-country-code="az"><div class="flag"><div class="iti-flag az"></div></div><span class="country-name">Azerbaijan (Az?rbaycan)</span><span class="dial-code">+994</span></li>

<li class="country" data-dial-code="1242" data-country-code="bs"><div class="flag"><div class="iti-flag bs"></div></div><span class="country-name">Bahamas</span><span class="dial-code">+1242</span></li>

<li class="country" data-dial-code="973" data-country-code="bh"><div class="flag"><div class="iti-flag bh"></div></div><span class="country-name">Bahrain (??????????)</span><span class="dial-code">+973</span></li>

<li class="country" data-dial-code="880" data-country-code="bd"><div class="flag"><div class="iti-flag bd"></div></div><span class="country-name">Bangladesh (????????)</span><span class="dial-code">+880</span></li>

<li class="country" data-dial-code="1246" data-country-code="bb"><div class="flag"><div class="iti-flag bb"></div></div><span class="country-name">Barbados</span><span class="dial-code">+1246</span></li>

<li class="country" data-dial-code="375" data-country-code="by"><div class="flag"><div class="iti-flag by"></div></div><span class="country-name">Belarus (????????)</span><span class="dial-code">+375</span></li>

<li class="country" data-dial-code="32" data-country-code="be"><div class="flag"><div class="iti-flag be"></div></div><span class="country-name">Belgium (Belgiλ)</span><span class="dial-code">+32</span></li>

<li class="country" data-dial-code="501" data-country-code="bz"><div class="flag"><div class="iti-flag bz"></div></div><span class="country-name">Belize</span><span class="dial-code">+501</span></li>

<li class="country" data-dial-code="229" data-country-code="bj"><div class="flag"><div class="iti-flag bj"></div></div><span class="country-name">Benin (Bιnin)</span><span class="dial-code">+229</span></li>

<li class="country" data-dial-code="1441" data-country-code="bm"><div class="flag"><div class="iti-flag bm"></div></div><span class="country-name">Bermuda</span><span class="dial-code">+1441</span></li>

<li class="country" data-dial-code="975" data-country-code="bt"><div class="flag"><div class="iti-flag bt"></div></div><span class="country-name">Bhutan (?????)</span><span class="dial-code">+975</span></li>

<li class="country" data-dial-code="591" data-country-code="bo"><div class="flag"><div class="iti-flag bo"></div></div><span class="country-name">Bolivia</span><span class="dial-code">+591</span></li>

<li class="country" data-dial-code="387" data-country-code="ba"><div class="flag"><div class="iti-flag ba"></div></div><span class="country-name">Bosnia and Herzegovina (????? ? ???????????)</span><span class="dial-code">+387</span></li>

<li class="country" data-dial-code="267" data-country-code="bw"><div class="flag"><div class="iti-flag bw"></div></div><span class="country-name">Botswana</span><span class="dial-code">+267</span></li>

<li class="country" data-dial-code="55" data-country-code="br"><div class="flag"><div class="iti-flag br"></div></div><span class="country-name">Brazil (Brasil)</span><span class="dial-code">+55</span></li>

<li class="country" data-dial-code="246" data-country-code="io"><div class="flag"><div class="iti-flag io"></div></div><span class="country-name">British Indian Ocean Territory</span><span class="dial-code">+246</span></li>

<li class="country" data-dial-code="1284" data-country-code="vg"><div class="flag"><div class="iti-flag vg"></div></div><span class="country-name">British Virgin Islands</span><span class="dial-code">+1284</span></li>

<li class="country" data-dial-code="673" data-country-code="bn"><div class="flag"><div class="iti-flag bn"></div></div><span class="country-name">Brunei</span><span class="dial-code">+673</span></li>

<li class="country" data-dial-code="359" data-country-code="bg"><div class="flag"><div class="iti-flag bg"></div></div><span class="country-name">Bulgaria (????????)</span><span class="dial-code">+359</span></li>

<li class="country" data-dial-code="226" data-country-code="bf"><div class="flag"><div class="iti-flag bf"></div></div><span class="country-name">Burkina Faso</span><span class="dial-code">+226</span></li>

<li class="country" data-dial-code="257" data-country-code="bi"><div class="flag"><div class="iti-flag bi"></div></div><span class="country-name">Burundi (Uburundi)</span><span class="dial-code">+257</span></li>

<li class="country" data-dial-code="855" data-country-code="kh"><div class="flag"><div class="iti-flag kh"></div></div><span class="country-name">Cambodia (???????)</span><span class="dial-code">+855</span></li>

<li class="country" data-dial-code="237" data-country-code="cm"><div class="flag"><div class="iti-flag cm"></div></div><span class="country-name">Cameroon (Cameroun)</span><span class="dial-code">+237</span></li>

<li class="country" data-dial-code="1" data-country-code="ca"><div class="flag"><div class="iti-flag ca"></div></div><span class="country-name">Canada</span><span class="dial-code">+1</span></li>

<li class="country" data-dial-code="238" data-country-code="cv"><div class="flag"><div class="iti-flag cv"></div></div><span class="country-name">Cape Verde (Kabu Verdi)</span><span class="dial-code">+238</span></li>

<li class="country" data-dial-code="599" data-country-code="bq"><div class="flag"><div class="iti-flag bq"></div></div><span class="country-name">Caribbean Netherlands</span><span class="dial-code">+599</span></li>

<li class="country" data-dial-code="1345" data-country-code="ky"><div class="flag"><div class="iti-flag ky"></div></div><span class="country-name">Cayman Islands</span><span class="dial-code">+1345</span></li>

<li class="country" data-dial-code="236" data-country-code="cf"><div class="flag"><div class="iti-flag cf"></div></div><span class="country-name">Central African Republic (Rιpublique centrafricaine)</span><span class="dial-code">+236</span></li>

<li class="country" data-dial-code="235" data-country-code="td"><div class="flag"><div class="iti-flag td"></div></div><span class="country-name">Chad (Tchad)</span><span class="dial-code">+235</span></li>

<li class="country" data-dial-code="56" data-country-code="cl"><div class="flag"><div class="iti-flag cl"></div></div><span class="country-name">Chile</span><span class="dial-code">+56</span></li>

<li class="country" data-dial-code="86" data-country-code="cn"><div class="flag"><div class="iti-flag cn"></div></div><span class="country-name">China (??)</span><span class="dial-code">+86</span></li>

<li class="country" data-dial-code="57" data-country-code="co"><div class="flag"><div class="iti-flag co"></div></div><span class="country-name">Colombia</span><span class="dial-code">+57</span></li>

<li class="country" data-dial-code="269" data-country-code="km"><div class="flag"><div class="iti-flag km"></div></div><span class="country-name">Comoros (???? ???????)</span><span class="dial-code">+269</span></li>

<li class="country" data-dial-code="243" data-country-code="cd"><div class="flag"><div class="iti-flag cd"></div></div><span class="country-name">Congo (DRC) (Jamhuri ya Kidemokrasia ya Kongo)</span><span class="dial-code">+243</span></li>

<li class="country" data-dial-code="242" data-country-code="cg"><div class="flag"><div class="iti-flag cg"></div></div><span class="country-name">Congo (Republic) (Congo-Brazzaville)</span><span class="dial-code">+242</span></li>

<li class="country" data-dial-code="682" data-country-code="ck"><div class="flag"><div class="iti-flag ck"></div></div><span class="country-name">Cook Islands</span><span class="dial-code">+682</span></li>

<li class="country" data-dial-code="506" data-country-code="cr"><div class="flag"><div class="iti-flag cr"></div></div><span class="country-name">Costa Rica</span><span class="dial-code">+506</span></li>

<li class="country" data-dial-code="225" data-country-code="ci"><div class="flag"><div class="iti-flag ci"></div></div><span class="country-name">Cτte d’Ivoire</span><span class="dial-code">+225</span></li>

<li class="country" data-dial-code="385" data-country-code="hr"><div class="flag"><div class="iti-flag hr"></div></div><span class="country-name">Croatia (Hrvatska)</span><span class="dial-code">+385</span></li>

<li class="country" data-dial-code="53" data-country-code="cu"><div class="flag"><div class="iti-flag cu"></div></div><span class="country-name">Cuba</span><span class="dial-code">+53</span></li>

<li class="country" data-dial-code="599" data-country-code="cw"><div class="flag"><div class="iti-flag cw"></div></div><span class="country-name">Curaηao</span><span class="dial-code">+599</span></li>

<li class="country" data-dial-code="357" data-country-code="cy"><div class="flag"><div class="iti-flag cy"></div></div><span class="country-name">Cyprus (??p???)</span><span class="dial-code">+357</span></li>

<li class="country" data-dial-code="420" data-country-code="cz"><div class="flag"><div class="iti-flag cz"></div></div><span class="country-name">Czech Republic (Ceskα republika)</span><span class="dial-code">+420</span></li>

<li class="country" data-dial-code="45" data-country-code="dk"><div class="flag"><div class="iti-flag dk"></div></div><span class="country-name">Denmark (Danmark)</span><span class="dial-code">+45</span></li>

<li class="country" data-dial-code="253" data-country-code="dj"><div class="flag"><div class="iti-flag dj"></div></div><span class="country-name">Djibouti</span><span class="dial-code">+253</span></li>

<li class="country" data-dial-code="1767" data-country-code="dm"><div class="flag"><div class="iti-flag dm"></div></div><span class="country-name">Dominica</span><span class="dial-code">+1767</span></li>

<li class="country" data-dial-code="1" data-country-code="do"><div class="flag"><div class="iti-flag do"></div></div><span class="country-name">Dominican Republic (Repϊblica Dominicana)</span><span class="dial-code">+1</span></li>

<li class="country" data-dial-code="593" data-country-code="ec"><div class="flag"><div class="iti-flag ec"></div></div><span class="country-name">Ecuador</span><span class="dial-code">+593</span></li>

<li class="country" data-dial-code="20" data-country-code="eg"><div class="flag"><div class="iti-flag eg"></div></div><span class="country-name">Egypt (??????)</span><span class="dial-code">+20</span></li>

<li class="country" data-dial-code="503" data-country-code="sv"><div class="flag"><div class="iti-flag sv"></div></div><span class="country-name">El Salvador</span><span class="dial-code">+503</span></li>

<li class="country" data-dial-code="240" data-country-code="gq"><div class="flag"><div class="iti-flag gq"></div></div><span class="country-name">Equatorial Guinea (Guinea Ecuatorial)</span><span class="dial-code">+240</span></li>

<li class="country" data-dial-code="291" data-country-code="er"><div class="flag"><div class="iti-flag er"></div></div><span class="country-name">Eritrea</span><span class="dial-code">+291</span></li><li class="country active" data-dial-code="372" data-country-code="ee"><div class="flag"><div class="iti-flag ee"></div></div><span class="country-name">Estonia (Eesti)</span><span class="dial-code">+372</span></li>

<li class="country" data-dial-code="251" data-country-code="et"><div class="flag"><div class="iti-flag et"></div></div><span class="country-name">Ethiopia</span><span class="dial-code">+251</span></li>

<li class="country" data-dial-code="500" data-country-code="fk"><div class="flag"><div class="iti-flag fk"></div></div><span class="country-name">Falkland Islands (Islas Malvinas)</span><span class="dial-code">+500</span></li>

<li class="country" data-dial-code="298" data-country-code="fo"><div class="flag"><div class="iti-flag fo"></div></div><span class="country-name">Faroe Islands (Fψroyar)</span><span class="dial-code">+298</span></li>

<li class="country" data-dial-code="679" data-country-code="fj"><div class="flag"><div class="iti-flag fj"></div></div><span class="country-name">Fiji</span><span class="dial-code">+679</span></li>

<li class="country" data-dial-code="358" data-country-code="fi"><div class="flag"><div class="iti-flag fi"></div></div><span class="country-name">Finland (Suomi)</span><span class="dial-code">+358</span></li>

<li class="country" data-dial-code="33" data-country-code="fr"><div class="flag"><div class="iti-flag fr"></div></div><span class="country-name">France</span><span class="dial-code">+33</span></li>

<li class="country" data-dial-code="594" data-country-code="gf"><div class="flag"><div class="iti-flag gf"></div></div><span class="country-name">French Guiana (Guyane franηaise)</span><span class="dial-code">+594</span></li>

<li class="country" data-dial-code="689" data-country-code="pf"><div class="flag"><div class="iti-flag pf"></div></div><span class="country-name">French Polynesia (Polynιsie franηaise)</span><span class="dial-code">+689</span></li>

<li class="country" data-dial-code="241" data-country-code="ga"><div class="flag"><div class="iti-flag ga"></div></div><span class="country-name">Gabon</span><span class="dial-code">+241</span></li>

<li class="country" data-dial-code="220" data-country-code="gm"><div class="flag"><div class="iti-flag gm"></div></div><span class="country-name">Gambia</span><span class="dial-code">+220</span></li>

<li class="country" data-dial-code="995" data-country-code="ge"><div class="flag"><div class="iti-flag ge"></div></div><span class="country-name">Georgia (??????????)</span><span class="dial-code">+995</span></li>

<li class="country" data-dial-code="49" data-country-code="de"><div class="flag"><div class="iti-flag de"></div></div><span class="country-name">Germany (Deutschland)</span><span class="dial-code">+49</span></li>

<li class="country" data-dial-code="233" data-country-code="gh"><div class="flag"><div class="iti-flag gh"></div></div><span class="country-name">Ghana (Gaana)</span><span class="dial-code">+233</span></li>

<li class="country" data-dial-code="350" data-country-code="gi"><div class="flag"><div class="iti-flag gi"></div></div><span class="country-name">Gibraltar</span><span class="dial-code">+350</span></li>


<li class="country" data-dial-code="30" data-country-code="gr">
<div class="flag"><div class="iti-flag gr"></div></div>
<span class="country-name">Greece (????da)</span><span class="dial-code">+30</span>
</li>



<li class="country" data-dial-code="299" data-country-code="gl"><div class="flag"><div class="iti-flag gl"></div></div><span class="country-name">Greenland (Kalaallit Nunaat)</span><span class="dial-code">+299</span></li>

<li class="country" data-dial-code="1473" data-country-code="gd"><div class="flag"><div class="iti-flag gd"></div></div><span class="country-name">Grenada</span><span class="dial-code">+1473</span></li>

<li class="country" data-dial-code="590" data-country-code="gp"><div class="flag"><div class="iti-flag gp"></div></div><span class="country-name">Guadeloupe</span><span class="dial-code">+590</span></li>

<li class="country" data-dial-code="1671" data-country-code="gu"><div class="flag"><div class="iti-flag gu"></div></div><span class="country-name">Guam</span><span class="dial-code">+1671</span></li>

<li class="country" data-dial-code="502" data-country-code="gt"><div class="flag"><div class="iti-flag gt"></div></div><span class="country-name">Guatemala</span><span class="dial-code">+502</span></li>

<li class="country" data-dial-code="224" data-country-code="gn"><div class="flag"><div class="iti-flag gn"></div></div><span class="country-name">Guinea (Guinιe)</span><span class="dial-code">+224</span></li>

<li class="country" data-dial-code="245" data-country-code="gw"><div class="flag"><div class="iti-flag gw"></div></div><span class="country-name">Guinea-Bissau (Guinι Bissau)</span><span class="dial-code">+245</span></li>

<li class="country" data-dial-code="592" data-country-code="gy"><div class="flag"><div class="iti-flag gy"></div></div><span class="country-name">Guyana</span><span class="dial-code">+592</span></li>

<li class="country" data-dial-code="509" data-country-code="ht"><div class="flag"><div class="iti-flag ht"></div></div><span class="country-name">Haiti</span><span class="dial-code">+509</span></li>

<li class="country" data-dial-code="504" data-country-code="hn"><div class="flag"><div class="iti-flag hn"></div></div><span class="country-name">Honduras</span><span class="dial-code">+504</span></li>

<li class="country" data-dial-code="852" data-country-code="hk"><div class="flag"><div class="iti-flag hk"></div></div><span class="country-name">Hong Kong (??)</span><span class="dial-code">+852</span></li>

<li class="country" data-dial-code="36" data-country-code="hu"><div class="flag"><div class="iti-flag hu"></div></div><span class="country-name">Hungary (Magyarorszαg)</span><span class="dial-code">+36</span></li>

<li class="country" data-dial-code="354" data-country-code="is"><div class="flag"><div class="iti-flag is"></div></div><span class="country-name">Iceland (Νsland)</span><span class="dial-code">+354</span></li>

<li class="country" data-dial-code="91" data-country-code="in"><div class="flag"><div class="iti-flag in"></div></div><span class="country-name">India (????)</span><span class="dial-code">+91</span></li>

<li class="country" data-dial-code="62" data-country-code="id"><div class="flag"><div class="iti-flag id"></div></div><span class="country-name">Indonesia</span><span class="dial-code">+62</span></li>

<li class="country" data-dial-code="98" data-country-code="ir"><div class="flag"><div class="iti-flag ir"></div></div><span class="country-name">Iran (????????)</span><span class="dial-code">+98</span></li>

<li class="country" data-dial-code="964" data-country-code="iq"><div class="flag"><div class="iti-flag iq"></div></div><span class="country-name">Iraq (?????????)</span><span class="dial-code">+964</span></li>

<li class="country" data-dial-code="353" data-country-code="ie"><div class="flag"><div class="iti-flag ie"></div></div><span class="country-name">Ireland</span><span class="dial-code">+353</span></li>

<li class="country" data-dial-code="972" data-country-code="il"><div class="flag"><div class="iti-flag il"></div></div><span class="country-name">Israel (????????)</span><span class="dial-code">+972</span></li>

<li class="country" data-dial-code="39" data-country-code="it"><div class="flag"><div class="iti-flag it"></div></div><span class="country-name">Italy (Italia)</span><span class="dial-code">+39</span></li>

<li class="country" data-dial-code="1876" data-country-code="jm"><div class="flag"><div class="iti-flag jm"></div></div><span class="country-name">Jamaica</span><span class="dial-code">+1876</span></li>

<li class="country" data-dial-code="81" data-country-code="jp"><div class="flag"><div class="iti-flag jp"></div></div><span class="country-name">Japan (??)</span><span class="dial-code">+81</span></li>

<li class="country" data-dial-code="962" data-country-code="jo"><div class="flag"><div class="iti-flag jo"></div></div><span class="country-name">Jordan (?????????)</span><span class="dial-code">+962</span></li>

<li class="country" data-dial-code="7" data-country-code="kz"><div class="flag"><div class="iti-flag kz"></div></div><span class="country-name">Kazakhstan (?????????)</span><span class="dial-code">+7</span></li>

<li class="country" data-dial-code="254" data-country-code="ke"><div class="flag"><div class="iti-flag ke"></div></div><span class="country-name">Kenya</span><span class="dial-code">+254</span></li>

<li class="country" data-dial-code="686" data-country-code="ki"><div class="flag"><div class="iti-flag ki"></div></div><span class="country-name">Kiribati</span><span class="dial-code">+686</span></li>

<li class="country" data-dial-code="965" data-country-code="kw"><div class="flag"><div class="iti-flag kw"></div></div><span class="country-name">Kuwait (?????????)</span><span class="dial-code">+965</span></li>

<li class="country" data-dial-code="996" data-country-code="kg"><div class="flag"><div class="iti-flag kg"></div></div><span class="country-name">Kyrgyzstan (??????????)</span><span class="dial-code">+996</span></li>

<li class="country" data-dial-code="856" data-country-code="la"><div class="flag"><div class="iti-flag la"></div></div><span class="country-name">Laos (???)</span><span class="dial-code">+856</span></li>

<li class="country" data-dial-code="371" data-country-code="lv"><div class="flag"><div class="iti-flag lv"></div></div><span class="country-name">Latvia (Latvija)</span><span class="dial-code">+371</span></li>

<li class="country" data-dial-code="961" data-country-code="lb"><div class="flag"><div class="iti-flag lb"></div></div><span class="country-name">Lebanon (????????)</span><span class="dial-code">+961</span></li>

<li class="country" data-dial-code="266" data-country-code="ls"><div class="flag"><div class="iti-flag ls"></div></div><span class="country-name">Lesotho</span><span class="dial-code">+266</span></li>

<li class="country" data-dial-code="231" data-country-code="lr"><div class="flag"><div class="iti-flag lr"></div></div><span class="country-name">Liberia</span><span class="dial-code">+231</span></li>

<li class="country" data-dial-code="218" data-country-code="ly"><div class="flag"><div class="iti-flag ly"></div></div><span class="country-name">Libya (????????)</span><span class="dial-code">+218</span></li>

<li class="country" data-dial-code="423" data-country-code="li"><div class="flag"><div class="iti-flag li"></div></div><span class="country-name">Liechtenstein</span><span class="dial-code">+423</span></li>

<li class="country" data-dial-code="370" data-country-code="lt"><div class="flag"><div class="iti-flag lt"></div></div><span class="country-name">Lithuania (Lietuva)</span><span class="dial-code">+370</span></li>

<li class="country" data-dial-code="352" data-country-code="lu"><div class="flag"><div class="iti-flag lu"></div></div><span class="country-name">Luxembourg</span><span class="dial-code">+352</span></li>

<li class="country" data-dial-code="853" data-country-code="mo"><div class="flag"><div class="iti-flag mo"></div></div><span class="country-name">Macau (??)</span><span class="dial-code">+853</span></li>

<li class="country" data-dial-code="389" data-country-code="mk"><div class="flag"><div class="iti-flag mk"></div></div><span class="country-name">Macedonia (FYROM) (??????????)</span><span class="dial-code">+389</span></li>

<li class="country" data-dial-code="261" data-country-code="mg"><div class="flag"><div class="iti-flag mg"></div></div><span class="country-name">Madagascar (Madagasikara)</span><span class="dial-code">+261</span></li>

<li class="country" data-dial-code="265" data-country-code="mw"><div class="flag"><div class="iti-flag mw"></div></div><span class="country-name">Malawi</span><span class="dial-code">+265</span></li>

<li class="country" data-dial-code="60" data-country-code="my"><div class="flag"><div class="iti-flag my"></div></div><span class="country-name">Malaysia</span><span class="dial-code">+60</span></li>

<li class="country" data-dial-code="960" data-country-code="mv"><div class="flag"><div class="iti-flag mv"></div></div><span class="country-name">Maldives</span><span class="dial-code">+960</span></li>

<li class="country" data-dial-code="223" data-country-code="ml"><div class="flag"><div class="iti-flag ml"></div></div><span class="country-name">Mali</span><span class="dial-code">+223</span></li>

<li class="country" data-dial-code="356" data-country-code="mt"><div class="flag"><div class="iti-flag mt"></div></div><span class="country-name">Malta</span><span class="dial-code">+356</span></li>

<li class="country" data-dial-code="692" data-country-code="mh"><div class="flag"><div class="iti-flag mh"></div></div><span class="country-name">Marshall Islands</span><span class="dial-code">+692</span></li>

<li class="country" data-dial-code="596" data-country-code="mq"><div class="flag"><div class="iti-flag mq"></div></div><span class="country-name">Martinique</span><span class="dial-code">+596</span></li>

<li class="country" data-dial-code="222" data-country-code="mr"><div class="flag"><div class="iti-flag mr"></div></div><span class="country-name">Mauritania (????????????)</span><span class="dial-code">+222</span></li>

<li class="country" data-dial-code="230" data-country-code="mu"><div class="flag"><div class="iti-flag mu"></div></div><span class="country-name">Mauritius (Moris)</span><span class="dial-code">+230</span></li>

<li class="country" data-dial-code="52" data-country-code="mx"><div class="flag"><div class="iti-flag mx"></div></div><span class="country-name">Mexico (Mιxico)</span><span class="dial-code">+52</span></li>

<li class="country" data-dial-code="691" data-country-code="fm"><div class="flag"><div class="iti-flag fm"></div></div><span class="country-name">Micronesia</span><span class="dial-code">+691</span></li>

<li class="country" data-dial-code="373" data-country-code="md"><div class="flag"><div class="iti-flag md"></div></div><span class="country-name">Moldova (Republica Moldova)</span><span class="dial-code">+373</span></li>

<li class="country" data-dial-code="377" data-country-code="mc"><div class="flag"><div class="iti-flag mc"></div></div><span class="country-name">Monaco</span><span class="dial-code">+377</span></li>

<li class="country" data-dial-code="976" data-country-code="mn"><div class="flag"><div class="iti-flag mn"></div></div><span class="country-name">Mongolia (??????)</span><span class="dial-code">+976</span></li>

<li class="country" data-dial-code="382" data-country-code="me"><div class="flag"><div class="iti-flag me"></div></div><span class="country-name">Montenegro (Crna Gora)</span><span class="dial-code">+382</span></li>

<li class="country" data-dial-code="1664" data-country-code="ms"><div class="flag"><div class="iti-flag ms"></div></div><span class="country-name">Montserrat</span><span class="dial-code">+1664</span></li>

<li class="country" data-dial-code="212" data-country-code="ma"><div class="flag"><div class="iti-flag ma"></div></div><span class="country-name">Morocco (?????????)</span><span class="dial-code">+212</span></li>

<li class="country" data-dial-code="258" data-country-code="mz"><div class="flag"><div class="iti-flag mz"></div></div><span class="country-name">Mozambique (Moηambique)</span><span class="dial-code">+258</span></li>

<li class="country" data-dial-code="95" data-country-code="mm"><div class="flag"><div class="iti-flag mm"></div></div><span class="country-name">Myanmar (Burma) (??????)</span><span class="dial-code">+95</span></li>

<li class="country" data-dial-code="264" data-country-code="na"><div class="flag"><div class="iti-flag na"></div></div><span class="country-name">Namibia (Namibiλ)</span><span class="dial-code">+264</span></li>

<li class="country" data-dial-code="674" data-country-code="nr"><div class="flag"><div class="iti-flag nr"></div></div><span class="country-name">Nauru</span><span class="dial-code">+674</span></li>

<li class="country" data-dial-code="977" data-country-code="np"><div class="flag"><div class="iti-flag np"></div></div><span class="country-name">Nepal (?????)</span><span class="dial-code">+977</span></li>

<li class="country" data-dial-code="31" data-country-code="nl"><div class="flag"><div class="iti-flag nl"></div></div><span class="country-name">Netherlands (Nederland)</span><span class="dial-code">+31</span></li>

<li class="country" data-dial-code="687" data-country-code="nc"><div class="flag"><div class="iti-flag nc"></div></div><span class="country-name">New Caledonia (Nouvelle-Calιdonie)</span><span class="dial-code">+687</span></li>

<li class="country" data-dial-code="64" data-country-code="nz"><div class="flag"><div class="iti-flag nz"></div></div><span class="country-name">New Zealand</span><span class="dial-code">+64</span></li>

<li class="country" data-dial-code="505" data-country-code="ni"><div class="flag"><div class="iti-flag ni"></div></div><span class="country-name">Nicaragua</span><span class="dial-code">+505</span></li>

<li class="country" data-dial-code="227" data-country-code="ne"><div class="flag"><div class="iti-flag ne"></div></div><span class="country-name">Niger (Nijar)</span><span class="dial-code">+227</span></li>

<li class="country" data-dial-code="234" data-country-code="ng"><div class="flag"><div class="iti-flag ng"></div></div><span class="country-name">Nigeria</span><span class="dial-code">+234</span></li>

<li class="country" data-dial-code="683" data-country-code="nu"><div class="flag"><div class="iti-flag nu"></div></div><span class="country-name">Niue</span><span class="dial-code">+683</span></li>

<li class="country" data-dial-code="672" data-country-code="nf"><div class="flag"><div class="iti-flag nf"></div></div><span class="country-name">Norfolk Island</span><span class="dial-code">+672</span></li>

<li class="country" data-dial-code="850" data-country-code="kp"><div class="flag"><div class="iti-flag kp"></div></div><span class="country-name">North Korea (?? ???? ?? ???)</span><span class="dial-code">+850</span></li>

<li class="country" data-dial-code="1670" data-country-code="mp"><div class="flag"><div class="iti-flag mp"></div></div><span class="country-name">Northern Mariana Islands</span><span class="dial-code">+1670</span></li>

<li class="country" data-dial-code="47" data-country-code="no"><div class="flag"><div class="iti-flag no"></div></div><span class="country-name">Norway (Norge)</span><span class="dial-code">+47</span></li>

<li class="country" data-dial-code="968" data-country-code="om"><div class="flag"><div class="iti-flag om"></div></div><span class="country-name">Oman (????????)</span><span class="dial-code">+968</span></li>

<li class="country" data-dial-code="92" data-country-code="pk"><div class="flag"><div class="iti-flag pk"></div></div><span class="country-name">Pakistan (??????????)</span><span class="dial-code">+92</span></li>

<li class="country" data-dial-code="680" data-country-code="pw"><div class="flag"><div class="iti-flag pw"></div></div><span class="country-name">Palau</span><span class="dial-code">+680</span></li>

<li class="country" data-dial-code="970" data-country-code="ps"><div class="flag"><div class="iti-flag ps"></div></div><span class="country-name">Palestine (?????????)</span><span class="dial-code">+970</span></li>

<li class="country" data-dial-code="507" data-country-code="pa"><div class="flag"><div class="iti-flag pa"></div></div><span class="country-name">Panama (Panamα)</span><span class="dial-code">+507</span></li>

<li class="country" data-dial-code="675" data-country-code="pg"><div class="flag"><div class="iti-flag pg"></div></div><span class="country-name">Papua New Guinea</span><span class="dial-code">+675</span></li>

<li class="country" data-dial-code="595" data-country-code="py"><div class="flag"><div class="iti-flag py"></div></div><span class="country-name">Paraguay</span><span class="dial-code">+595</span></li>

<li class="country" data-dial-code="51" data-country-code="pe"><div class="flag"><div class="iti-flag pe"></div></div><span class="country-name">Peru (Perϊ)</span><span class="dial-code">+51</span></li>

<li class="country" data-dial-code="63" data-country-code="ph"><div class="flag"><div class="iti-flag ph"></div></div><span class="country-name">Philippines</span><span class="dial-code">+63</span></li>

<li class="country" data-dial-code="48" data-country-code="pl"><div class="flag"><div class="iti-flag pl"></div></div><span class="country-name">Poland (Polska)</span><span class="dial-code">+48</span></li>

<li class="country" data-dial-code="351" data-country-code="pt"><div class="flag"><div class="iti-flag pt"></div></div><span class="country-name">Portugal</span><span class="dial-code">+351</span></li>

<li class="country" data-dial-code="1" data-country-code="pr"><div class="flag"><div class="iti-flag pr"></div></div><span class="country-name">Puerto Rico</span><span class="dial-code">+1</span></li>

<li class="country" data-dial-code="974" data-country-code="qa"><div class="flag"><div class="iti-flag qa"></div></div><span class="country-name">Qatar (??????)</span><span class="dial-code">+974</span></li>

<li class="country" data-dial-code="262" data-country-code="re"><div class="flag"><div class="iti-flag re"></div></div><span class="country-name">Rιunion (La Rιunion)</span><span class="dial-code">+262</span></li>

<li class="country" data-dial-code="40" data-country-code="ro"><div class="flag"><div class="iti-flag ro"></div></div><span class="country-name">Romania (Romβnia)</span><span class="dial-code">+40</span></li>

<li class="country" data-dial-code="7" data-country-code="ru"><div class="flag"><div class="iti-flag ru"></div></div><span class="country-name">Russia (??????)</span><span class="dial-code">+7</span></li>

<li class="country" data-dial-code="250" data-country-code="rw"><div class="flag"><div class="iti-flag rw"></div></div><span class="country-name">Rwanda</span><span class="dial-code">+250</span></li>

<li class="country" data-dial-code="590" data-country-code="bl"><div class="flag"><div class="iti-flag bl"></div></div><span class="country-name">Saint Barthιlemy (Saint-Barthιlemy)</span><span class="dial-code">+590</span></li>

<li class="country" data-dial-code="290" data-country-code="sh"><div class="flag"><div class="iti-flag sh"></div></div><span class="country-name">Saint Helena</span><span class="dial-code">+290</span></li>

<li class="country" data-dial-code="1869" data-country-code="kn"><div class="flag"><div class="iti-flag kn"></div></div><span class="country-name">Saint Kitts and Nevis</span><span class="dial-code">+1869</span></li>

<li class="country" data-dial-code="1758" data-country-code="lc"><div class="flag"><div class="iti-flag lc"></div></div><span class="country-name">Saint Lucia</span><span class="dial-code">+1758</span></li>

<li class="country" data-dial-code="590" data-country-code="mf"><div class="flag"><div class="iti-flag mf"></div></div><span class="country-name">Saint Martin (Saint-Martin (partie franηaise))</span><span class="dial-code">+590</span></li>

<li class="country" data-dial-code="508" data-country-code="pm"><div class="flag"><div class="iti-flag pm"></div></div><span class="country-name">Saint Pierre and Miquelon (Saint-Pierre-et-Miquelon)</span><span class="dial-code">+508</span></li>

<li class="country" data-dial-code="1784" data-country-code="vc"><div class="flag"><div class="iti-flag vc"></div></div><span class="country-name">Saint Vincent and the Grenadines</span><span class="dial-code">+1784</span></li>

<li class="country" data-dial-code="685" data-country-code="ws"><div class="flag"><div class="iti-flag ws"></div></div><span class="country-name">Samoa</span><span class="dial-code">+685</span></li>

<li class="country" data-dial-code="378" data-country-code="sm"><div class="flag"><div class="iti-flag sm"></div></div><span class="country-name">San Marino</span><span class="dial-code">+378</span></li>

<li class="country" data-dial-code="239" data-country-code="st"><div class="flag"><div class="iti-flag st"></div></div><span class="country-name">Sγo Tomι and Prνncipe (Sγo Tomι e Prνncipe)</span><span class="dial-code">+239</span></li>

<li class="country" data-dial-code="966" data-country-code="sa"><div class="flag"><div class="iti-flag sa"></div></div><span class="country-name">Saudi Arabia (???????? ??????? ??????????)</span><span class="dial-code">+966</span></li>

<li class="country" data-dial-code="221" data-country-code="sn"><div class="flag"><div class="iti-flag sn"></div></div><span class="country-name">Senegal (Sιnιgal)</span><span class="dial-code">+221</span></li>

<li class="country" data-dial-code="381" data-country-code="rs"><div class="flag"><div class="iti-flag rs"></div></div><span class="country-name">Serbia (??????)</span><span class="dial-code">+381</span></li>

<li class="country" data-dial-code="248" data-country-code="sc"><div class="flag"><div class="iti-flag sc"></div></div><span class="country-name">Seychelles</span><span class="dial-code">+248</span></li>

<li class="country" data-dial-code="232" data-country-code="sl"><div class="flag"><div class="iti-flag sl"></div></div><span class="country-name">Sierra Leone</span><span class="dial-code">+232</span></li>

<li class="country" data-dial-code="65" data-country-code="sg"><div class="flag"><div class="iti-flag sg"></div></div><span class="country-name">Singapore</span><span class="dial-code">+65</span></li>

<li class="country" data-dial-code="1721" data-country-code="sx"><div class="flag"><div class="iti-flag sx"></div></div><span class="country-name">Sint Maarten</span><span class="dial-code">+1721</span></li>

<li class="country" data-dial-code="421" data-country-code="sk"><div class="flag"><div class="iti-flag sk"></div></div><span class="country-name">Slovakia (Slovensko)</span><span class="dial-code">+421</span></li>

<li class="country" data-dial-code="386" data-country-code="si"><div class="flag"><div class="iti-flag si"></div></div><span class="country-name">Slovenia (Slovenija)</span><span class="dial-code">+386</span></li>

<li class="country" data-dial-code="677" data-country-code="sb"><div class="flag"><div class="iti-flag sb"></div></div><span class="country-name">Solomon Islands</span><span class="dial-code">+677</span></li>

<li class="country" data-dial-code="252" data-country-code="so"><div class="flag"><div class="iti-flag so"></div></div><span class="country-name">Somalia (Soomaaliya)</span><span class="dial-code">+252</span></li>

<li class="country" data-dial-code="27" data-country-code="za"><div class="flag"><div class="iti-flag za"></div></div><span class="country-name">South Africa</span><span class="dial-code">+27</span></li>

<li class="country" data-dial-code="82" data-country-code="kr"><div class="flag"><div class="iti-flag kr"></div></div><span class="country-name">South Korea (????)</span><span class="dial-code">+82</span></li>

<li class="country" data-dial-code="211" data-country-code="ss"><div class="flag"><div class="iti-flag ss"></div></div><span class="country-name">South Sudan (????? ?????????)</span><span class="dial-code">+211</span></li>

<li class="country" data-dial-code="34" data-country-code="es"><div class="flag"><div class="iti-flag es"></div></div><span class="country-name">Spain (Espaρa)</span><span class="dial-code">+34</span></li>

<li class="country" data-dial-code="94" data-country-code="lk"><div class="flag"><div class="iti-flag lk"></div></div><span class="country-name">Sri Lanka (????? ?????)</span><span class="dial-code">+94</span></li>

<li class="country" data-dial-code="249" data-country-code="sd"><div class="flag"><div class="iti-flag sd"></div></div><span class="country-name">Sudan (??????????)</span><span class="dial-code">+249</span></li>

<li class="country" data-dial-code="597" data-country-code="sr"><div class="flag"><div class="iti-flag sr"></div></div><span class="country-name">Suriname</span><span class="dial-code">+597</span></li>

<li class="country" data-dial-code="268" data-country-code="sz"><div class="flag"><div class="iti-flag sz"></div></div><span class="country-name">Swaziland</span><span class="dial-code">+268</span></li>

<li class="country" data-dial-code="46" data-country-code="se"><div class="flag"><div class="iti-flag se"></div></div><span class="country-name">Sweden (Sverige)</span><span class="dial-code">+46</span></li>

<li class="country" data-dial-code="41" data-country-code="ch"><div class="flag"><div class="iti-flag ch"></div></div><span class="country-name">Switzerland (Schweiz)</span><span class="dial-code">+41</span></li>

<li class="country" data-dial-code="963" data-country-code="sy"><div class="flag"><div class="iti-flag sy"></div></div><span class="country-name">Syria (????????)</span><span class="dial-code">+963</span></li>

<li class="country" data-dial-code="886" data-country-code="tw"><div class="flag"><div class="iti-flag tw"></div></div><span class="country-name">Taiwan (??)</span><span class="dial-code">+886</span></li>

<li class="country" data-dial-code="992" data-country-code="tj"><div class="flag"><div class="iti-flag tj"></div></div><span class="country-name">Tajikistan</span><span class="dial-code">+992</span></li>

<li class="country" data-dial-code="255" data-country-code="tz"><div class="flag"><div class="iti-flag tz"></div></div><span class="country-name">Tanzania</span><span class="dial-code">+255</span></li>

<li class="country" data-dial-code="66" data-country-code="th"><div class="flag"><div class="iti-flag th"></div></div><span class="country-name">Thailand (???)</span><span class="dial-code">+66</span></li>

<li class="country" data-dial-code="670" data-country-code="tl"><div class="flag"><div class="iti-flag tl"></div></div><span class="country-name">Timor-Leste</span><span class="dial-code">+670</span></li>

<li class="country" data-dial-code="228" data-country-code="tg"><div class="flag"><div class="iti-flag tg"></div></div><span class="country-name">Togo</span><span class="dial-code">+228</span></li>

<li class="country" data-dial-code="690" data-country-code="tk"><div class="flag"><div class="iti-flag tk"></div></div><span class="country-name">Tokelau</span><span class="dial-code">+690</span></li>

<li class="country" data-dial-code="676" data-country-code="to"><div class="flag"><div class="iti-flag to"></div></div><span class="country-name">Tonga</span><span class="dial-code">+676</span></li>

<li class="country" data-dial-code="1868" data-country-code="tt"><div class="flag"><div class="iti-flag tt"></div></div><span class="country-name">Trinidad and Tobago</span><span class="dial-code">+1868</span></li>

<li class="country" data-dial-code="216" data-country-code="tn"><div class="flag"><div class="iti-flag tn"></div></div><span class="country-name">Tunisia (???????)</span><span class="dial-code">+216</span></li>

<li class="country" data-dial-code="90" data-country-code="tr"><div class="flag"><div class="iti-flag tr"></div></div><span class="country-name">Turkey (Tόrkiye)</span><span class="dial-code">+90</span></li>

<li class="country" data-dial-code="993" data-country-code="tm"><div class="flag"><div class="iti-flag tm"></div></div><span class="country-name">Turkmenistan</span><span class="dial-code">+993</span></li>

<li class="country" data-dial-code="1649" data-country-code="tc"><div class="flag"><div class="iti-flag tc"></div></div><span class="country-name">Turks and Caicos Islands</span><span class="dial-code">+1649</span></li>

<li class="country" data-dial-code="688" data-country-code="tv"><div class="flag"><div class="iti-flag tv"></div></div><span class="country-name">Tuvalu</span><span class="dial-code">+688</span></li><li class="country highlight" data-dial-code="1340" data-country-code="vi"><div class="flag"><div class="iti-flag vi"></div></div><span class="country-name">U.S. Virgin Islands</span><span class="dial-code">+1340</span></li>

<li class="country" data-dial-code="256" data-country-code="ug"><div class="flag"><div class="iti-flag ug"></div></div><span class="country-name">Uganda</span><span class="dial-code">+256</span></li>

<li class="country" data-dial-code="380" data-country-code="ua"><div class="flag"><div class="iti-flag ua"></div></div><span class="country-name">Ukraine (???????)</span><span class="dial-code">+380</span></li>

<li class="country" data-dial-code="971" data-country-code="ae"><div class="flag"><div class="iti-flag ae"></div></div><span class="country-name">United Arab Emirates (????????? ??????? ?????????)</span><span class="dial-code">+971</span></li>

<li class="country" data-dial-code="44" data-country-code="gb"><div class="flag"><div class="iti-flag gb"></div></div><span class="country-name">United Kingdom</span><span class="dial-code">+44</span></li>

<li class="country" data-dial-code="1" data-country-code="us"><div class="flag"><div class="iti-flag us"></div></div><span class="country-name">United States</span><span class="dial-code">+1</span></li>

<li class="country" data-dial-code="598" data-country-code="uy"><div class="flag"><div class="iti-flag uy"></div></div><span class="country-name">Uruguay</span><span class="dial-code">+598</span></li>

<li class="country" data-dial-code="998" data-country-code="uz"><div class="flag"><div class="iti-flag uz"></div></div><span class="country-name">Uzbekistan (O?zbekiston)</span><span class="dial-code">+998</span></li>

<li class="country" data-dial-code="678" data-country-code="vu"><div class="flag"><div class="iti-flag vu"></div></div><span class="country-name">Vanuatu</span><span class="dial-code">+678</span></li>

<li class="country" data-dial-code="39" data-country-code="va"><div class="flag"><div class="iti-flag va"></div></div><span class="country-name">Vatican City (Cittΰ del Vaticano)</span><span class="dial-code">+39</span></li>

<li class="country" data-dial-code="58" data-country-code="ve"><div class="flag"><div class="iti-flag ve"></div></div><span class="country-name">Venezuela</span><span class="dial-code">+58</span></li>

<li class="country" data-dial-code="84" data-country-code="vn"><div class="flag"><div class="iti-flag vn"></div></div><span class="country-name">Vietnam (Vi?t Nam)</span><span class="dial-code">+84</span></li>

<li class="country" data-dial-code="681" data-country-code="wf"><div class="flag"><div class="iti-flag wf"></div></div><span class="country-name">Wallis and Futuna</span><span class="dial-code">+681</span></li>

<li class="country" data-dial-code="967" data-country-code="ye"><div class="flag"><div class="iti-flag ye"></div></div><span class="country-name">Yemen (????????)</span><span class="dial-code">+967</span></li>

<li class="country" data-dial-code="260" data-country-code="zm"><div class="flag"><div class="iti-flag zm"></div></div><span class="country-name">Zambia</span><span class="dial-code">+260</span></li>

<li class="country" data-dial-code="263" data-country-code="zw"><div class="flag"><div class="iti-flag zw"></div></div><span class="country-name">Zimbabwe</span><span class="dial-code">+263</span></li></ul></div></div>
<span class="error-message icon-warning"></span>
<p class="error-message-content"></p>
</div>

Htmldoc.MOBILE

name::
* McsEngl.Htmldoc.MOBILE@cptIt,
* McsEngl.mobile-webpage@cptIt,
* McsEngl.webpage.mobile@cptIt,

_DESCRIPTION:
ONTOP: always shows the-sitestructure-button AND the-page-structurepath:
[bSitestructure] home > subpage > ... > PAGE/heading/.../heading
ONLEFT: a column which will open on hovering and will show the-page-structure.
[hmnSngo.2015-03-08]

Htmldoc.Navigation-bar.Horizontal

name::
* McsEngl.Htmldoc.Navigation-bar.Horizontal@cptIt,

The complete code for our simple navigation bar is:


<ul id="list-nav">
<li><a href="#">Home</a></li>
<li><a href="#">About Us</a></li>
<li><a href="#">Services</a></li>
<li><a href="#">Products</a></li>
<li><a href="#">Contact</a></li>
</ul>

ul#list-nav {
list-style:none;
margin:20px;
padding:0;
width:525px
}

ul#list-nav li {
display:inline
}

ul#list-nav li a {
text-decoration:none;
padding:5px 0;
width:100px;
background:#485e49;
color:#eee;
float:left;
text-align:center;
border-left:1px solid#fff;
}

ul#list-nav li a:hover {
background:#a2b3a1;
color:#000
}
[http://www.vanseodesign.com/css/simple-navigation-bar-with-css-and-xhtml/]

<html>
<head>
<style type="text/css">
ul
{
list-style-type:none;
margin:0;
padding:0;
padding-top:6px;
padding-bottom:6px;
}
li
{
display:inline;
}
a:link,a:visited
{
font-weight:bold;
color:#FFFFFF;
background-color:#98bf21;
text-align:center;
padding:6px;
text-decoration:none;
text-transform:uppercase;
}
a:hover,a:active
{
background-color:#7A991A;
}

</style>
</head>

<body>
<ul>
<li><a href="#home">Home</a></li>
<li><a href="#news">News</a></li>
<li><a href="#contact">Contact</a></li>
<li><a href="#about">About</a></li>
</ul>

<p><b>Note:</b> If you only set the padding for a elements (and not ul), the links will go outside the ul element. Therefore, we have added a top and bottom padding for the ul element.</p>
</body>
</html>

Htmldoc.Navigation.Images

name::
* McsEngl.Htmldoc.Navigation.Images@cptIt,

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>
<head>
<style type="text/css">
#navlist{position:relative;}
#navlist li{margin:0;padding:0;list-style:none;position:absolute;top:0;}
#navlist li,#navlist a{height:44px;display:block;}

#home{left:0px;width:46px;}
#home{background:url('img_navsprites.gif') 0 0;}

#prev{left:63px;width:43px;}
#prev{background:url('img_navsprites.gif') -47px 0;}

#next{left:129px;width:43px;}
#next{background:url('img_navsprites.gif') -91px 0;}
</style>
</head>

<body>
<ul id="navlist">
<li id="home"><a href="default.asp"></a></li>
<li id="prev"><a href="css_intro.asp"></a></li>
<li id="next"><a href="css_syntax.asp"></a></li>
</ul>
</body>
</html>
[http://www.w3schools.com/css/tryit.asp?filename=trycss_sprites_nav]

Htmldoc.MENU

name::
* McsEngl.Htmldoc.MENU@cptIt,
* McsEngl.html'menu-code@cptIt,

_ADDRESS.WPG:
* http://cssmenumaker.com//
* http://line25.com/tutorials/how-to-create-a-pure-css-dropdown-menu,

Htmldoc.Menu.Horizontal

name::
* McsEngl.Htmldoc.Menu.Horizontal@cptIt,

* http://www.dynamicdrive.com/style/csslibrary/item/suckertree-menu-horizontal//
<div class="suckertreemenu">
<ul id="treemenu1">
<li><a href="#" style="border-left: 1px solid black">Item 1</a></li>
<li><a href="#">Item 2</a></li>
<li><a href="#">Folder 1</a>
<ul>
<li><a href="#">Sub Item 1.1</a></li>
<li><a href="#">Sub Item 1.2</a></li>
<li><a href="#">Sub Item 1.3</a></li>
<li><a href="#">Sub Item 1.4</a></li>
</ul>
</li>
<li><a href="#">Item 3</a></li>
<li><a href="#">Folder 2</a>
<ul>
<li><a href="#">Sub Item 2.1</a></li>
<li><a href="#">Folder 2.1</a>
<ul>
<li><a href="#">Sub Item 2.1.1</a></li>
<li><a href="#">Sub Item 2.1.2</a></li>
<li><a href="#">Sub Item 2.1.3</a></li>
<li><a href="#">Sub Item 2.1.4</a></li>
</ul>
</li>
</ul>
</a>
</li>
<li><a href="#">Item 4</a></li>
</ul>
<br style="clear: left;" />
</div>

<p id="iepara">Rest of content here</p>

<style type="text/css">

.suckertreemenu ul{
margin: 0;
padding: 0;
list-style-type: none;
}

/*Top level list items*/
.suckertreemenu ul li{
position: relative;
display: inline;
float: left;
background-color:#F3F3F3; /*overall menu background color*/
}

/*Top level menu link items style*/
.suckertreemenu ul li a{
display: block;
width: 90px; /*Width of top level menu link items*/
padding: 1px 8px;
border: 1px solid black;
border-left-width: 0;
text-decoration: none;
color: navy;
}
 
/*1st sub level menu*/
.suckertreemenu ul li ul{
left: 0;
position: absolute;
top: 1em; /* no need to change, as true value set by script */
display: block;
visibility: hidden;
}

/*Sub level menu list items (undo style from Top level List Items)*/
.suckertreemenu ul li ul li{
display: list-item;
float: none;
}

/*All subsequent sub menu levels offset after 1st level sub menu */
.suckertreemenu ul li ul li ul{
left: 159px; /* no need to change, as true value set by script */
top: 0;
}

/* Sub level menu links style */
.suckertreemenu ul li ul li a{
display: block;
width: 160px; /*width of sub menu levels*/
color: navy;
text-decoration: none;
padding: 1px 5px;
border: 1px solid#ccc;
}

.suckertreemenu ul li a:hover{
background-color: black;
color: white;
}

/*Background image for top level menu list links */
.suckertreemenu .mainfoldericon{
background:#F3F3F3 url(media/arrow-down.gif) no-repeat center right;
}

/*Background image for subsequent level menu list links */
.suckertreemenu .subfoldericon{
background:#F3F3F3 url(media/arrow-right.gif) no-repeat center right;
}

* html p#iepara{ /*For a paragraph (if any) that immediately follows suckertree menu, add 1em top spacing between the two in IE*/
padding-top: 1em;
}
 
/* Holly Hack for IE \*/
* html .suckertreemenu ul li { float: left; height: 1%; }
* html .suckertreemenu ul li a { height: 1%; }
/* End */

</style>

<script type="text/javascript">

//SuckerTree Horizontal Menu (Sept 14th, 06)
//By Dynamic Drive: http://www.dynamicdrive.com/style/

var menuids=["treemenu1"] //Enter id(s) of SuckerTree UL menus, separated by commas

function buildsubmenus_horizontal(){
for (var i=0; i<menuids.length; i++){
var ultags=document.getElementById(menuids[i]).getElementsByTagName("ul")
for (var t=0; t<ultags.length; t++){
   if (ultags[t].parentNode.parentNode.id==menuids[i]){ //if this is a first level submenu
     ultags[t].style.top=ultags[t].parentNode.offsetHeight+"px" //dynamically position first level submenus to be height of main menu item
     ultags[t].parentNode.getElementsByTagName("a")[0].className="mainfoldericon"
   }
   else{ //else if this is a sub level menu (ul)
    ultags[t].style.left=ultags[t-1].getElementsByTagName("a")[0].offsetWidth+"px" //position menu to the right of menu item that activated it
 ultags[t].parentNode.getElementsByTagName("a")[0].className="subfoldericon"
   }
ultags[t].parentNode.onmouseover=function(){
this.getElementsByTagName("ul")[0].style.visibility="visible"
}
ultags[t].parentNode.onmouseout=function(){
this.getElementsByTagName("ul")[0].style.visibility="hidden"
}
}
}
}

if (window.addEventListener)
window.addEventListener("load", buildsubmenus_horizontal, false)
else if (window.attachEvent)
window.attachEvent("onload", buildsubmenus_horizontal)

</script>

Htmldoc.MUSIC

name::
* McsEngl.Htmldoc.MUSIC@cptIt,
* McsEngl.html'music@cptIt,

EXPLORER:
<bgsound src="music/FANTASY.MID" loop="-1">

Browser compatibility
Desktop Mobile
Feature    Chrome  Firefox (Gecko)  Internet Explorer  Opera    Safari
Basic support  ?    No support [1]  (Yes)      ?    ?
[https://developer.mozilla.org/en-US/docs/Web/HTML/Element/bgsound]

Htmldoc.POSITIONING

name::
* McsEngl.Htmldoc.POSITIONING@cptIt,
* McsEngl.html'positioning-elements@cptIt,

SOURCE:
* http://www.html.net/tutorials/css/lesson14.php

Htmldoc.REDIRECTING-PAGE

name::
* McsEngl.Htmldoc.REDIRECTING-PAGE@cptIt,
* McsEngl.html'redirecting-page@cptIt,

_CODE.HML:
<!DOCTYPE HTML>
<html>
<head>
<meta http-equiv="REFRESH" content="0;url=index.en.html" />
</head>

<body>
redirecting to ... <a href="index.en.html">index.en.html</a>
</body>
</html>
====
0 ==> the time after which begins redirection.

REDIRECTION
Learn how to perform temporary redirection and permanent redirection using PHP, htaccess with mod_rewrite, and Javascript.

There is many ways to redirect traffic. A couple of examples:

Server side scripting such as PHP, ASP.NET and Ruby.
Htaccess using the mod_rewrite or mod_alias module in Apache webserver.
Javascript.
I will explain how to perform temporary redirection and permanent redirections using the above methods.

Redirection using PHP
In PHP you can redirect using the header() function. To send a temporary 302 redirection from PHP:

1
2
3
4
<?php
header('Location: http://www.example.com/');
exit;
?>
It is important that the script has not printed any HTML before you make the redirection, or you will get a warning about:

Cannot modify header information - headers already sent by ...
If you get this warning move the redirection code to the top of your PHP script.

To make a permanent 301 redirection using PHP:

1
2
3
4
<?php
header('Location: http://www.example.com/', true, 301);
exit;
?>
Redirection with htaccess
With the Apache webserver you can use a file called “.htaccess” to perform redirections. In the htaccess file you can use so-called directives or commands. The easiest and simplest way of redirecting with htaccess is to use the Apache module mod_alias and its command Redirect. Here’s is how to make a temporary 302 redirection with htaccess:

Redirect /articles.html http://www.example.com/new-articles.html
If you copy the above to a htaccess file on your domain “example.com”, it will redirect http://www.example.com/articles.html to http://www.example.com/new-articles.html. To make a permanent 301 redirection use:

Redirect 301 /articles.html http://www.example.com/new-articles.html
The module mod_rewrite is the most powerful and allows you can make very complicated redirections and changes to the requested URL, so-called rewrites. Mod_rewrite can be used to ie redirect from an old domain to a new or to redirect non-www traffic to www. Its also possible to hotlink protect images or redirect based on language with mod_rewrite. Because mod_rewrite is so complex I have written an article on how to redirect with htaccess and mod_rewrite.

Redirection with Javascript
You can also use Javascript to perform redirections. It works by placing some Javascript code on your HTML pages. The following code will make your page redirect to example.com:

1
2
3
<script type="text/javascript">
window.location = "http://www.example.com/";
</script>
Place the code between your head-tags (<head></head>). You can also redirect using relative URLs:

1
2
3
<script type="text/javascript">
window.location = "../some-dir/index.html";
</script>
Using the above code the user will be able to go back to the original page by using the “Back” button in the browser. This is often undesirable, so instead you should use:

1
2
3
<script type="text/javascript">
window.location.replace("../some-dir/index.html");
</script>
[http://www.htaccesstools.com/articles/redirection/]

Htmldoc.TAB

name::
* McsEngl.Htmldoc.TAB@cptIt,
* McsEngl.html'tab@cptIt,

BarelyFitz Designs
Since 1994, Patrick Fitzgerald has created and maintained sites for diverse clients — from Fortune 100 corporations to non-profit organizations.
* http://www.barelyfitz.com/projects/tabber//
Converts your HTML into a dynamic tabbed interface.
Does not require you to set up a list of links, or anchors for the tabs.
Plug and play: no need to know JavaScript, just make a few simple changes to your HTML.
Use CSS to customize the appearance of the tabs.
Gracefully degrades if JavaScript is not present and allows a different set of styles to be applied when JavaScript is not present.
Gracefully supports printing (try a print preview on the example.html page) and allows a different set of styles to be applied when printing.
Multiple tab sets on a page - you can even nest one tab set within another.
Set the initial tab to be displayed.
Use javascript to control which tab is displayed.
Define onLoad and onClick callback functions to perform more advanced functions, such as loading the tab content dynamically using AJAX.
Use a cookie to remember which tab was selected so it remains selected when you return to the page.
Object-oriented, extensively-commented code.
MIT license so you can modify and use in commercial projects.

From ul-element:
* http://www.webonweboff.com/widgets/js/tabbed_content.aspx

Htmldoc.TABLE

name::
* McsEngl.Htmldoc.TABLE@cptIt,
* McsEngl.hml'table-component@cptIt,
* McsEngl.wpg'table@cptIt,
* McsEngl.wpgtbl@cptIt,

* McsEngl.table.webpage@cptIt,
* McsEngl.wpg'table@cptIt,
* McsEngl.wpgtbl@cptIt,

wpgtbl'Hml-element

name::
* McsEngl.wpgtbl'Hml-element@cptIt,

_SPECIFIC:
* table##
* tbody##
* td##
* tfooter##
* thead
* tr##

wpgtbl'Resource

name::
* McsEngl.wpgtbl'Resource@cptIt,

_ADDRESS.WPG:
* http://www.w3schools.com/css/css_table.asp,

SPECIFIC
wpgtbl.ROW-COLOR

name::
* McsEngl.wpgtbl.ROW-COLOR@cptIt,

_CODE.CSS:
// border only around
<style>
table { border-collapse:collapse; border:1px solid#000000}
.clsTblcolor tr:nth-child(odd){background-color:#ffffff}
.clsTblcolor tr:nth-child(even){background-color:#d1d1d1}
</style>
===
// border on all rows and columns
<style>
table { border-collapse:collapse;}
td {border:1px solid#000000}
.clsTblcolor tr:nth-child(odd){background-color:#ffffff}
.clsTblcolor tr:nth-child(even){background-color:#d1d1d1}
</style>

Htmldoc.VIDEO

name::
* McsEngl.Htmldoc.VIDEO@cptIt,
* McsEngl.wpg'video@cptIt,

Htmldoc.XML

name::
* McsEngl.Htmldoc.XML@cptIt,

* display xml:
http://www.levmuchnik.net/Content/ProgrammingTips/WEB/XMLDisplay/DisplayXMLFileWithJavascript.html,

<!DOCTYPE html>
<html>
<body>

<script>
if (window.XMLHttpRequest)
{// code for IE7+, Firefox, Chrome, Opera, Safari
xmlhttp=new XMLHttpRequest();
}
else
{// code for IE6, IE5
xmlhttp=new ActiveXObject("Microsoft.XMLHTTP");
}
xmlhttp.open("GET","cd_catalog.xml",false);
xmlhttp.send();
xmlDoc=xmlhttp.responseXML;

document.write("<table border='1'>");
var x=xmlDoc.getElementsByTagName("CD");
for (i=0;i<x.length;i++)
{
document.write("<tr><td>");
document.write(x[i].getElementsByTagName("ARTIST")[0].childNodes[0].nodeValue);
document.write("</td><td>");
document.write(x[i].getElementsByTagName("TITLE")[0].childNodes[0].nodeValue);
document.write("</td></tr>");
}
document.write("</table>");
</script>

</body>
</html>
[http://www.w3schools.com/xml/tryit.asp?filename=tryxml_display_table]

/*
* jParse (Beta) v0.3.3
* jparse.kylerush.net
*
* Copyright (c) 2009 Kyle Rush
* Licensed under the MIT license.
* http://creativecommons.org/licenses/MIT/
*
* Date: Wednesday, 7 Apr 2010 20:22 (GMT - 5:00)
*/
(function($){

$.fn.extend({

//pass the options variable to the function
jParse: function(options) {

//Set the default values, use comma to separate the o2, example:
var defaults = {
ajaxOpts: {dataType: ($.browser.msie) ? "text" : "xml", contentType: 'text/xml'},
parentElement: 'item',
elementTag: ['title', 'link', 'description'],
output: '<div><h2><a href="jpet01">jpet00</a></h2><p>jpet02</p></div>'
};

//consolidate both user defined and default functions
settings = $.extend(true, defaults, options);

//run precallback
if(settings.precallback !== undefined){
settings.precallback();
}

//assign the selected element to the variable 'slected'
var selected = $(this);

//master colon regexp
var colon = /\:/;

//settings.ajaxOpts.dataType = ($.browser.msie) ? "text" : "xml";
settings.ajaxOpts.success = function(data){

//extra code for ie content type handling
var xml;
if (typeof data == "string") {
xml = new ActiveXObject("Microsoft.XMLDOM");
xml.async = false;
xml.loadXML(data);
} else {
xml = data;
}

//shortcut for referencing settings
var o = settings;

//create an object/array of all specified 'items' in xml document
var parentElementArray = $(xml).find(o.parentElement);

//initiate the containg variable
var container = '';

//initiate the number of included elements variable
var numberIncluded = 0;

//this nodeChecker function formats entry variables for proper namespace parsing
function nodeChecker(node){
//if there is a colon in the entryTag name
if(colon.test(node) === true){
//asign the elemTagName variable to a jQuery parsable attribute selector
elemTagName = '[nodeName=' + node + ']';
} else {
elemTagName = node;
}
}

//element value processor function
function processElementValue(elementValue, elementParent){

//detect if the specified element tag is a string or an object
if(o.elementTag[n].elem === undefined){

//run the node checker function
nodeChecker(elementValue);

//set the element's value
elemTagValue = $(elementParent).find(elemTagName).text();

//strip any CDATA text from the result if it exists
elemTagValue = elemTagValue.replace(/^\[CDATA\[/, '').replace(/\]\]$/, '');

} else {

//run the node checker function
nodeChecker(elementValue);

//detect if the the user has not specified an attribute to pull
if(o.elementTag[n].attr === undefined){

//detect if array of element tag was provided
if(o.elementTag[n].select !== undefined){

var arrayElements = $(elementParent).find(elemTagName);
elemTagValue = $(arrayElements[o.elementTag[n].select]).text();

} else if(o.elementTag[n].select === undefined) {

elemTagValue = $(elementParent).find(elemTagName).text();

}

} else {

elemTagValue = $(elementParent).find(elemTagName).attr(o.elementTag[n].attr);

}

//detect for the exclude variable if specified
if(o.elementTag[n].exclude !== undefined){
var excluder = new RegExp(o.elementTag[n].exclude);
if(excluder.test(elemTagValue) === true){

//increment the value of the excludeFound variable
excludeFound = true;

}
}

//Format function
if (o.elementTag[n].format !== undefined) {
elemTagValue = o.elementTag[n].format(elemTagValue);
}

//JS Date Format
if(o.elementTag[n].dateFormat !== undefined){
elemTagValue = date(o.elementTag[n].dateFormat, elemTagValue);
}

}
}//END processElementValue Function

//detect count variable
if(o.count !== undefined){
jQuery(o.count).append(parentElementArray.length);
}

//MAIN LOOP: FOR EACH PARENT ELEMENT
for(var i = 0; i < parentElementArray.length; i++){

//detect if number of exclude variable has been satisfied
if(numberIncluded >= settings.limit){
$(selected).append(container);
if(settings.callback !== undefined){
settings.callback();
}
return false;
}

//define the output variable option
var outputVar = o.output;

//initiate the exclude variable
var excludeFound = false;

//SUB LOOP: through each specified 'elementTag'
for(var n = 0; n < o.elementTag.length; n++){

//define position variable
var position;

//add a 0 for nodes 1-9
if(n < 10){

//create a regular expression to find the position for the element tag
position = new RegExp('jpet0' + [n], 'g');

} else {

//create a regular expression to find the position for the element tag
position = new RegExp('jpet' + [n], 'g');

}



//detect if the elementTag is a simple string or object
if(o.elementTag[n].constructor == String){
processElementValue(o.elementTag[n], parentElementArray[i]);
} else if(o.elementTag[n].constructor == Object){
processElementValue(o.elementTag[n].elem, parentElementArray[i]);
}

//replace the position with the value of the selected element tag
outputVar = outputVar.replace(position, elemTagValue);


} //END SUB LOOP

//append the results to the container
if(excludeFound !== true){
container += outputVar;
numberIncluded++;
}

}//END MAIN LOOP

//append the results to the selected element
$(selected).append(container);

//run callback
if(settings.callback !== undefined){
settings.callback();
}

};

return this.each(function() {
$.ajax(settings.ajaxOpts);
});
}
});

})(jQuery);
[http://jparse.kylerush.net/download]

Htmldoc.EVOLUTING

name::
* McsEngl.Htmldoc.EVOLUTING@cptIt,

_VERSION:
• version.6.last.minor: keynes.1936.general-theory.html 2015-01-30.6.1
• version.6.last.minorNo (= 5.23): keynes.1936.general-theory.2015-01-29.6.html.
• version.5.previous: keynes.1936.general-theory.2014-01-09.5.html.
A last minor is becoming NEXT minorNo.
[hmnSngo.2015-01-30]

Html'Evaluation#cptCore546.107#

name::
* McsEngl.Html'Evaluation@cptIt,

Specific features missing from HTML
•HTML does not provide a way to validate document data structures or impose editorial control in projects with multiple authors
•It is difficult or impossible in the general case to reliably generate navigational aids from HTML documents
•As a result, navigation usually has to be implemented by adding handcrafted hypertext links
•HTML browsers have no concept of entity management (no mechanism for modular reuse)
•With just a general-purpose tag set, context searching or other behavior based on semantic distinctions is difficult or impossible
•HTML cannot easily be made to model data structures residing in databases

HTML is not the optimum data format for database interchange or certain kinds of large-scale commercial publishing.
[SOURCE: Overview: XML, HTML, and all that, Jon Bosak Sun Microsystems, {1997-04-11}]

Html'icon#ql:icon_cptresource#

name::
* McsEngl.Html'icon@cptIt,

Html'Notation

name::
* McsEngl.Html'Notation@cptIt,
* McsEngl.html'code-convension@cptIt,
* McsEngl.html'convension@cptIt,

Html'organization#ql:web'organization#

name::
* McsEngl.Html'organization@cptIt,

Html'outline

name::
* McsEngl.Html'outline@cptIt,
* McsEngl.html'table-of-contents@cptIt,

Html'PARAGRAPH

name::
* McsEngl.Html'PARAGRAPH@cptIt,
* McsEngl.html'semantic-paragraph@cptIt,

_ADDRESS.WPG:
* http://dev.w3.org/html5/spec/Overview.html#paragraph

_DEFINITION:
The term paragraph as defined in this section is distinct from (though related to) the p element defined later. The paragraph concept defined here is used to describe how to interpret documents.

A paragraph is typically a run of phrasing content that forms a block of text with one or more sentences that discuss a particular topic, as in typography, but can also be used for more general thematic grouping. For instance, an address is also a paragraph, as is a part of a form, a byline, or a stanza in a poem.
[http://dev.w3.org/html5/spec/Overview.html#paragraph] 2010-10-22

_CODE.HML:
In the following example, there are two paragraphs in a section. There is also a heading, which contains phrasing content that is not a paragraph. Note how the comments and inter-element whitespace do not form paragraphs.

<section>
<h1>Example of paragraphs</h1>
This is the <em>first</em> paragraph in this example.
<p>This is the second.</p>
<!-- This is not a paragraph. -->
</section>
[http://dev.w3.org/html5/spec/Overview.html#paragraph] 2010-10-22

Html'SECTION

name::
* McsEngl.Html'SECTION@cptIt,
* McsEngl.html'semantic-section@cptIt,
* McsEngl.html'conceptual-section@cptIt,

_DEFINITION:
The outline for a sectioning content element or a sectioning root element consists of a list of one or more potentially nested sections.
A section is a container that corresponds to some nodes in the original DOM tree. Each section can have one heading associated with it, and can contain any number of further nested sections. The algorithm for the outline also associates each node in the DOM tree with a particular section and potentially a heading. (The sections in the outline aren't section elements, though some may correspond to such elements — they are merely conceptual sections.)
[http://dev.w3.org/html5/spec/Overview.html#outlines] 2010-10-21

Selecting the first section of the document therefore always takes the user to the top of the document, regardless of where the first heading in the body is to be found.
[http://dev.w3.org/html5/spec/Overview.html#outlines] 2010-10-21

Html'section'heading

name::
* McsEngl.Html'section'heading@cptIt,
* McsEngl.html'heading-of-section@cptIt,

The first element of heading content in an element of sectioning content represents the heading for that section.
[http://dev.w3.org/html5/spec/Overview.html#headings-and-sections]

html'outline'element-neutral

name::
* McsEngl.html'outline'element-neutral@cptIt,

The hr element does not affect the document's outline.
[http://dev.w3.org/html5/spec/Overview.html#the-hr-element]

Htmldoc.OUTLINE

name::
* McsEngl.Htmldoc.OUTLINE@cptIt,
* McsEngl.html'ex.toc@cptIt,

TOC EXAMPLE:
* Microtek ScanWizard 5, has a nice example with toc like windows help.

Example toc always visible:
* http://tm4jscript.sourceforge.net/userguide-capabilities.html

Html'Tool

name::
* McsEngl.Html'Tool@cptIt,
* McsEngl.hml'program@cptIt,
* McsEngl.program.html@cptIt,
* McsEngl.prgmHtml@cptIt,

_SPECIFIC:
* browser#linkL#
* counter
* editor
* converter
* validator
* widget

Html'program.BROWSER

name::
* McsEngl.Html'program.BROWSER@cptIt,
* McsEngl.html'browser-program@cptIt,

Ms Internet Explorer

Netscape Navigator

Html'program.COUNTER

name::
* McsEngl.Html'program.COUNTER@cptIt,
* McsEngl.hit-counter@cptIt,
* McsEngl.html'counter-program@cptIt,
* McsEngl.webpage-counter@cptIt,

_ADDRESS.WPG:
* http://www.phpjunkyard.com/php-text-hit-counter.php,

Html'program.CONVERTER

name::
* McsEngl.Html'program.CONVERTER@cptIt,
* McsEngl.html'converter@cptIt, {2012-11-25}

_SPECIFIC:
* html-to-wiki: http://toolserver.org/~diberri/cgi-bin/html2wiki/index.cgi,

HtmlCleaner

HtmlCleaner is open-source HTML parser written in Java. HTML found on Web is usually dirty, ill-formed and unsuitable for further processing. For any serious consumption of such documents, it is necessary to first clean up the mess and bring the order to tags, attributes and ordinary text. For the given HTML document, HtmlCleaner reorders individual elements and produces well-formed XML. By default, it follows similar rules that the most of web browsers use in order to create Document Object Model. However, user may provide custom tag and rule set for tag filtering and balancing.
[http://htmlcleaner.sourceforge.net/]

Html'program.EDITOR

name::
* McsEngl.Html'program.EDITOR@cptIt,
* McsEngl.editor.html@cptIt,
* McsEngl.html-editor@cptIt,,
* McsEngl.html'editor-program@cptIt,

_ADDRESS.WPG:
* http://webdesign.about.com/od/htmleditors/a/aa121304.htm,

_SPECIFIC:
* aloha: http://aloha-editor.org/index.php,
* ckEditor#cptItsoft583#
* elRTE: http://elrte.org// wysiwyg, jquery,
* mercury: http://jejacks0n.github.com/mercury//
* nicEdit: http://nicedit.com/index.php,#cptItsoft561#
* raptor: http://www.raptor-editor.com//
* tinyMCE: http://www.tinymce.com//
* wymEditor: http://www.wymeditor.org//
* http://www.openwebware.com//
* http://developer.yahoo.com/yui/editor//

SPAW-Editor (php):
SPAW Editor is a web based in-browser WYSIWYG editor control enabling web site developers to replace a standard textarea html control with full-featured, fully customizable, multilingual, skinable web based WYSIWYG editor. Version 2 adds tabbed multi-document interface, floating/shared toolbars, modular architecture and many other exciting features
[http://www.solmetra.com/en/disp.php/en_products/en_spaw/en_spaw_intro]

Html'editor.elRTE

name::
* McsEngl.Html'editor.elRTE@cptIt,
* McsEngl.elRTE@cptIt,

_ADDRESS.WPG:
* http://elrte.org//
* https://github.com/Studio-42/elRTE,

elrte'file-manager.elFinder

name::
* McsEngl.elrte'file-manager.elFinder@cptIt,

_ADDRESS.WPG:
* http://elrte.org/redmine/boards/4/topics/1178,
* http://jsbin.com/esejuw/1/edit,

Html'editor.JavaScript

name::
* McsEngl.Html'editor.JavaScript@cptIt,

CLEditor:
* http://premiumsoftware.net/cleditor//

jHtmlArea:
A simple, light weight, extensible WYSIWYG HTML Editor built on top of jQuery. This component allows you to easily display a WYSIWYG HTML Editor in place of any TextArea DOM Elements on the page. The minified script alone is 9.17kb; CSS and Images it's a total of 25.9kb.
[http://jhtmlarea.codeplex.com//]

_ADDRESS.WPG:
* http://www.devguru.com/features/tutorials/wysiwyg/wysiwyg1.asp,
* http://unverse.net/Whizzywig-2011,

Html'editor.ONLINE

name::
* McsEngl.Html'editor.ONLINE@cptIt,

_SPECIFIC:
* http://www.w3schools.com/html5/tryit.asp?filename=tryhtml5_doctype,
* http://www.tutorialspoint.com/html5/html5_editor.htm,
* http://jsbin.com//

Html'program.VALIDATOR

name::
* McsEngl.Html'program.VALIDATOR@cptIt,
* McsEngl.html'validator-program@cptIt,

_SPECIFIC:
* W3C XHTML Validator. http://validator.w3.org//
* Test Your HTML With the W3C Validator: http://www.w3schools.com/html/html_whyusehtml4.asp,
* https://html5.validator.nu//

HTMLPurifier

name::
* McsEngl.HTMLPurifier@cptIt,

_ADDRESS.WPG:
* http://htmlpurifier.org//

_DESCRIPTION:
HTML Purifier is a standards-compliant HTML filter library written in PHP. HTML Purifier will not only remove all malicious code (better known as XSS) with a thoroughly audited, secure yet permissive whitelist, it will also make sure your documents are standards compliant, something only achievable with a comprehensive knowledge of W3C's specifications. Tired of using BBCode due to the current landscape of deficient or insecure HTML filters? Have a WYSIWYG editor but never been able to use it? Looking for high-quality, standards-compliant, open-source components for that application you're building? HTML Purifier is for you!
[http://htmlpurifier.org/]

Tidy

_CREATED: {2013-04-14}

name::
* McsEngl.html-tidy@cptIt,

_DESCRIPTION:
HTML Tidy is a computer program and a library whose purpose is to fix invalid HTML and to improve the layout and indent style of the resulting markup.

It was developed by Dave Raggett of World Wide Web Consortium (W3C), then transferred to a SourceForge project. Its source code is written in ANSI C for maximum portability and precompiled binaries are available for a variety of platforms. It is available under the W3C license (a permissive, BSD-style license). New versions are available only as source code, checked out under CVS (Concurrent Versions System, a version control system), not binary.

Examples of fixes it can make to bad HTML:

Straighten mixed-up tags
Fix missing or mismatched end tags
Add missing items (some tags, quotes, ...)
Report proprietary HTML extensions
Change layout of markup to predefined style
Transform characters from some encodings into HTML entities
[http://en.wikipedia.org/wiki/HTML_Tidy]

_ADDRESS.WPG:
* http://w3c.github.io/tidy-html5//

Html'Program.WIDGET

name::
* McsEngl.Html'Program.WIDGET@cptIt,
* McsEngl.html'widget-program@cptIt,
* McsEngl.widget-in-HTML@cptIt568i,

_DEFINITION:
A widget is a fragment of HTML with some script.
[http://www.adsafe.org/widget.html]

Html'Relation-to-Xhtml

name::
* McsEngl.Html'Relation-to-Xhtml@cptIt,

_DESCRIPTION:
HTML vs XHTML

This section is non-normative.

This specification defines an abstract language for describing documents and applications, and some APIs for interacting with in-memory representations of resources that use this language.

The in-memory representation is known as "DOM HTML", or "the DOM" for short.

There are various concrete syntaxes that can be used to transmit resources that use this abstract language, two of which are defined in this specification.

The first such concrete syntax is the HTML syntax. This is the format suggested for most authors. It is compatible with most legacy Web browsers. If a document is transmitted with the text/html MIME type, then it will be processed as an HTML document by Web browsers. This specification defines version 5.0 of the HTML syntax, known as "HTML 5".

The second concrete syntax is the XHTML syntax, which is an application of XML. When a document is transmitted with an XML MIME type, such as application/xhtml+xml, then it is treated as an XML document by Web browsers, to be parsed by an XML processor. Authors are reminded that the processing for XML and HTML differs; in particular, even minor syntax errors will prevent a document labeled as XML from being rendered fully, whereas they would be ignored in the HTML syntax. This specification defines version 5.0 of the XHTML syntax, known as "XHTML 5".

The DOM, the HTML syntax, and the XHTML syntax cannot all represent the same content. For example, namespaces cannot be represented using the HTML syntax, but they are supported in the DOM and in the XHTML syntax. Similarly, documents that use the noscript feature can be represented using the HTML syntax, but cannot be represented with the DOM or in the XHTML syntax. Comments that contain the string "-->" can only be represented in the DOM, not in the HTML and XHTML syntaxes.
[https://www.w3.org/TR/html/introduction.html#html-vs-xhtml]

Html'ResourceInfHmnn#cptResource843#

name::
* McsEngl.Html'ResourceInfHmnn@cptIt,

_ADDRESS.WPG:
* http://reference.sitepoint.com/html,
* https://thimble.webmaker.org/en-US//
* http://www.openbookproject.net/tutorials/getdown/html/index.html,

For more information about HTML see Larry Aronson's The HTML 3 Manual of Style (Ziff-Davis, 1996) or the NCSA Beginner's Guide to HTML.
http://www.ncsa.uiuc.edu/General/Internet/WWW/HTMLPrimer.html
[E. Harold]

T. Berners-Lee, D. Connolly. "Hypertext Markup Language - 2.0" RFC 1866, MIT/W3C, November 1995.

For general information about HTML including plans for new versions, see http://www.w3.org/hypertext/WWW/MarkUp/MarkUp.html.

For a comprehensive list of HTML elements see http://www.sandia.gov/sci_compute/html_ref.html

For a tutorial introduction to HTML see: http://www.ncsa.uiuc.edu/demoweb/html-primer.html.

For an introduction to forms within HTML see:
An Instantaneous Introduction to CGI Scripts and HTML Forms.

Michael Grobe
Academic Computing Services
The University of Kansas
grobe@kuhub.cc.ukans.edu
October 11, 1995

Htmlrsc.Twitter

name::
* McsEngl.Htmlrsc.Twitter@cptIt,

https://twitter.com/html5
Staging the plaguing of the raised platform.
platform.html5.org
Joined May 2008
TWEETS
7,033
FOLLOWERS
111K

LIKES
1
{2016-08-08}

https://twitter.com/html5doctor:
@html5doctor
here to help you learn more about HTML5, see our sister gallery at http://html5gallery.com
html5doctor.com
Joined May 2009
TWEETS
1,658
FOLLOWING
10
FOLLOWERS
62.9K

LIKES
118
LISTS
2
{2016-08-08}

https://twitter.com/html5andcss3:
HTML5 and CSS3 discover what the future of the web is with news, tutorials, tips & tricks.#HTML5#CSS3 - Sponsored by @Reach7

@html5andcss3
TWEETS
231
FOLLOWING
177
FOLLOWERS
33.1K

LIKES
89
LISTS
1
{2016-08-08}

Html'SFI-Proposal

name::
* McsEngl.Html'SFI-Proposal@cptIt,
* McsEngl.html'LocDoc-Proposal@cptIt,

A proposal for a standar for Locators INSIDE html-text-files.

USEFULNESS:
I've created a java open-source program, the HtmlMgr, to demostrate the usefullness of LocDocs.
1) The program automatically creates the Table-of-Contents (ToC) of the file.
2) Clicking anywhere in the text, the program shows in the ToC the location we are.
3) The program indexes the words and terms of the files, with the LocDocs for each one.

WHAT_WE_NEED:
1) Inside body-elements, we need 2 types of elements: headings and contents.
2) The existing h1, h2, ... h6 can serve as heading-elements. The p-element can serve as content, but because of existing limitations it is better to create a new c-element for content.
3) The locators will have the form:
- h0, h0c1, h0c2, ...
- h1, h1c1, ... h1.1, ... h1.2, ... h1.2.1, h1.2.1c1, h1.2.1c2, ...
- h2, h2c1, ... h2.1, ... h2.2, ... h2.2.1, h2.2.1c1, h2.2.1c2, ...
...
- h?, h?c1, ... h?.1, ... h?.2, ... h?.2.1, h?.2.1c1, h?.2.1c2, ...

We need h0-element, which will be the same as title-element BUT inside body-element.
Also I think we could add and h7, h8, h9 elements, just in case anyone could need them but to suggest not to use them.
4) INSIDE content-elements:
- we will have anything can serve as content (=information), text, audio, image, video content.
- lists (ol, ul, dl) and tables, are considered content.
- it is useful to add and sentence-elements, and to have locators and for every sentence, inside paragraphs.
- Finally syntax and meaning elements could be added to resolve ambiguities of text that the reader will NOT see when he reads the text, but can have access if he needs them. Also any program can have access to these elements add will have a better management of text, eg translation.

Html'Specification

name::
* McsEngl.Html'Specification@cptIt,
* McsEngl.hml'spec@cptIt,

* McsEngl.hmlspc@cptIt,

hmlspc.LIVING_STANDARD:
WHATWG Living Standard
* https://html.spec.whatwg.org/multipage//

hmlspc.HTML5.2014-10-28:
HTML5
A vocabulary and associated APIs for HTML and XHTML
W3C Recommendation 28 October 2014
* https://www.w3.org/TR/2014/REC-html5-20141028//

hmlspc.HTML401.1999-12-24:
HTML 4.01 Specification
W3C Recommendation 24 December 1999
* https://www.w3.org/TR/1999/REC-html401-19991224//

hmlspc.HTML40.1997-12-18:
HTML 4.0 Specification
W3C Recommendation 18-Dec-1997
* https://www.w3.org/TR/REC-html40-971218//

hmlspc.HTML32.1997-01-14:
HTML 3.2 Reference Specification
W3C Recommendation 14-Jan-1997
* https://www.w3.org/TR/REC-html32,

hmlspc.HTML20.1995-12:
Hypertext Markup Language - 2.0
November 1995
* http://www.ietf.org/rfc/rfc1866.txt,

Html'DOM#ql:ljshml'dom_spec#

name::
* McsEngl.Html'DOM@cptIt,

_DESCRIPTION:
DOM defines a platform-neutral model for events and node trees.

WHATWG Living Standard
* https://dom.spec.whatwg.org//

Document Object Model (DOM) Level 3 Core Specification
Version 1.0
W3C Recommendation 07 April 2004
* http://www.w3.org/TR/2004/REC-DOM-Level-3-Core-20040407/DOM3-Core.html

Html'storage

name::
* McsEngl.Html'storage@cptIt,
* McsEngl.client-side-storage@cptIt,
* McsEngl.local-storage-in-html@cptIt,

resource

_ADDRESS.WPG:
* http://arty.name/localstorage.html,
* http://stackoverflow.com/questions/4692245/html5-local-storage-fallback-solutions?rq=1,
* PersistJS: http://pablotron.org/?cid=1557,

Client-Side Storage
By Michael Mahemoff
Published Oct. 1, 2010
* http://www.html5rocks.com/en/tutorials/offline/storage//

THE PAST, PRESENT & FUTURE OF LOCAL STORAGE FOR WEB APPLICATIONS
* http://diveintohtml5.info/storage.html,

size

Last time I've checked, Chrome 6.0.472.36 beta let me save 2600-2700 thousands of characters, Firefox 3.6.8 - 5200-5300k, Explorer 8 - 4900-5000k, and Opera 10.70 build 9013 popped a dialog, letting me give the script unlimited storage. Spec arbitrarily recommends 5 megabytes of storage, but doesn't say a thing about actual characters, so in UTF-16 you get twice less.
[http://arty.name/localstorage.html]

Html'svg#ql:imgsvg'html#

name::
* McsEngl.Html'svg@cptIt,

Html'Troubleshooting

name::
* McsEngl.Html'Troubleshooting@cptIt,

Avoid Overlapping Tags

Consider this snippet of HTML:
<B>This is an example of <DFN>overlapping</B> HTML tags.</DFN>
The word ``overlapping'' is contained within both the <B> and <DFN> tags. How does the browser format it? You won't know until you look, and different browsers will likely react differently. In general, avoid overlapping tags.

Embed Anchors and Character Tags; But Nothing Else

It is acceptable to embed anchors within another HTML element: <H1><A HREF = "Destination.html">My heading</A></H1>
Do not embed a heading or another HTML element within an anchor:
<A HREF = "Destination.html"><H1>My heading</H1></A>
Although most browsers currently handle this example, it is forbidden by the official HTML and HTML+ specifications, and will not work with future browsers.

Html'URL#cptItsoft1015#

name::
* McsEngl.Html'URL@cptIt,

url##cptItsoft1015#: attPar#

ΣΥΝΔΕΣΜΟΙ/HYPERLINKS
παρέχουν ένα πλούσιο ρεπερτότιο επιλογών. Συνήθως είναι
- διευθύνσεις άλλων σελλίδων
- διευθύνσεις ηλεκτ. ταχυδρομίου
- διευθύνσεις ftp
- σύνδεσμο σε καποιο αρχείο του server που βρισκόμαστε
- σύνδεση με αρχείο ήχου ή βίντεο κλπ
[COMPUTER GO, OCT. 1996, ΕΝΘΕΤΟ 24]

SPECIFIC

name::
* McsEngl.hml.specific@cptIt, html.specific#cptCore768#,

Html.DHTML

name::
* McsEngl.Html.DHTML@cptIt,
* McsEngl.DHTML@cptIt568i,

_DESCRIPTION:
Dynamic HTML, or DHTML, is a complex marriage of Cascading Style Sheets (CSS), the Document Object Model (DOM), and JavaScript. And of course the two major 4.0 browsers have incompatible implementations of these technologies.
[C/NET 1998apr]
===
* Η DHTML (Dynamic HTML) δεν είναι μια ξεχωριστή γλώσσα σήμανσης υπερκειμένου, αλλά μάλλον ένας συνδυασμός τεχνολογιών για τη δημιουργία δυναμικών ιστοσελίδων στον Παγκόσμιο Ιστό.
[Λιακέας, Η γλώσσα JavaScript. 2002, 299]

Html.5.2014

name::
* McsEngl.Html.5.2014@cptIt,
* McsEngl.conceptIt568.1,
* McsEngl.hml5@cptIt,
* McsEngl.html.5version@cptIt,
* McsEngl.html5@cptIt, {2011-10-15}
* McsEngl.html5v@cptIt, {2011-10-15}

_DEFINITION:
* What is HTML5?
HTML5 will be the new standard for HTML, XHTML, and the HTML DOM.
The previous version of HTML came in 1999. The web has changed a lot since then.
HTML5 is still a work in progress. However, most modern browsers have some HTML5 support.
[http://www.w3schools.com/html5/html5_intro.asp] 2010-09-30

_RULE:
Some rules for HTML5 were established:
* New features should be based on HTML, CSS, DOM, and JavaScript
* Reduce the need for external plugins (like Flash)
* Better error handling
* More markup to replace scripting
* HTML5 should be device independent
* The development process should be visible to the public
[http://www.w3schools.com/html5/html5_intro.asp] 2010-09-30

Html5v'Element.new

name::
* McsEngl.Html5v'Element.new@cptIt,
* McsEngl.new-html5-elements@cptIt568i,

_DESCRIPTION:
New Elements in HTML5
The internet has changed a lot since HTML 4.01 became a standard in 1999.

Today, some elements in HTML 4.01 are obsolete, never used, or not used the way they were intended to. These elements are deleted or re-written in HTML5.

To better handle today's internet use, HTML5 also includes new elements for better structure, drawing, media content, and better form handling.

New Markup Elements

New elements for better structure:
Tag  Description
<article#ql:htmlelt.article#>  For external content, like text from a news-article, blog, forum, or any other content from an external source
<aside>  For content aside from the content it is placed in. The aside content should be related to the surrounding content
<command>  A button, or a radiobutton, or a checkbox
<details>  For describing details about a document, or parts of a document
<summary>  A caption, or summary, inside the details element
<figure>  For grouping a section of stand-alone content, could be a video
<figcaption>  The caption of the figure section
<footer>  For a footer of a document or section, could include the name of the author, the date of the document, contact information, or copyright information
<header>  For an introduction of a document or section, could include navigation
<hgroup>  For a section of headings, using <h1> to <h6>, where the largest is the main heading of the section, and the others are sub-headings
<mark>  For text that should be highlighted
<meter>  For a measurement, used only if the maximum and minimum values are known
<nav>  For a section of navigation
<progress>  The state of a work in progress
<ruby>  For ruby annotation (Chinese notes or characters)
<rt>  For explanation of the ruby annotation
<rp>  What to show browsers that do not support the ruby element
<section>  For a section in a document. Such as chapters, headers, footers, or any other sections of the document
<time>  For defining a time or a date, or both
<wbr>  Word break. For defining a line-break opportunity.

New Media Elements
HTML 5 provides a new standard for media content:
Tag  Description
<audio>  For multimedia content, sounds, music or other audio streams
<video>  For video content, such as a movie clip or other video streams
<source>  For media resources for media elements, defined inside video or audio elements
<embed>  For embedded content, such as a plug-in

The Canvas Element
The canvas element uses JavaScript to make drawings on a web page.
Tag  Description
<canvas#ql:htmlelt.canvas#>  For making graphics with a script

New Form Elements
HTML5 offers more form elements, with more functionality:
Tag  Description
<datalist>  A list of options for input values
<keygen>  Generate keys to authenticate users
<output>  For different types of output, such as output written by a script
New Input Type Attribute Values

Also, the input element's type attribute has many new values, for better input control before sending it to the server:
Type  Description
tel  The input value is of type telephone number
search  The input field is a search field
url  The input value is a URL
email  The input value is one or more email addresses
datetime  The input value is a date and/or time
date  The input value is a date
month  The input value is a month
week  The input value is a week
time  The input value is of type time
datetime-local  The input value is a local date/time
number  The input value is a number
range  The input value is a number in a given range
color  The input value is a hexadecimal color, like#FF8800

Html5v'Element.absent

name::
* McsEngl.Html5v'Element.absent@cptIt,
* McsEngl.absent-html5-elements@cptIt568i,
* McsEngl.html5v'element.Removed@cptIt,

The following HTML 4.01 elements are removed from HTML5:
<acronym#ql:htmlelt.acronym#>
<applet#ql:htmlelt.applet#>
<basefont#ql:htmlelt.basefont#>
<big#ql:htmlelt.big#>
<center#ql:htmlelt.center#>
<dir#ql:htmlelt.dir#>
<font#ql:htmlelt.font#>
<frame#ql:htmlelt.frame#>
<frameset>
<noframes#ql:htmlelt.frameset#>
<strike#ql:htmlelt.strike#>
<tt#ql:htmlelt.tt#>
<u#ql:htmlelt.u#>
[http://www.w3schools.com/html5/html5_new_elements.asp]

3.5. Absent Elements

The elements in this section are not to be used by authors. User agents will still have to support them and various sections in HTML5 define how. E.g. the obsolete isindex element is handled by the parser section.

The following elements are not in HTML5 because their effect is purely presentational and their function is better handled by CSS:

* basefont
* big
* center
* font
* s
* strike
* tt
* u

The following elements are not in HTML5 because using them damages usability and accessibility:

* frame
* frameset
* noframes

The following elements are not included because they have not been used often, created confusion, or their function can be handled by other elements:

* acronym is not included because it has created a lot of confusion. Authors are to use abbr for abbreviations.
* applet has been obsoleted in favor of object.
* isindex usage can be replaced by usage of form controls.
* dir has been obsoleted in favor of ul.

Finally the noscript element is only conforming in the HTML syntax. It is not included in the XML syntax as its usage relies on an HTML parser.
[http://dev.w3.org/html5/html4-differences/#absent-elements]

Html5v'Organization

name::
* McsEngl.Html5v'Organization@cptIt,

_DESCRIPTION:
HTML5 is a cooperation between the World Wide Web Consortium (W3C) and the Web Hypertext Application Technology Working Group (WHATWG).
[http://www.tutorialspoint.com/html5/html5_overview.htm]

Html5v'Relation-to-Xhtml

name::
* McsEngl.Html5v'Relation-to-Xhtml@cptIt,

_DESCRIPTION:
HTML 5 does not have the same syntax rules as XHTML where we needed lower case tag names, quoting our attributes,an attribute had to have a value and to close all empty elements.

But HTML5 is coming with lots of flexibility and would support the followings -
Uppercase tag names.
Quotes are optional for attributes.
Attribute values are optional.
Closing empty elements are optional.
[http://www.tutorialspoint.com/html5/html5_syntax.htm]

Html5v'Resource

name::
* McsEngl.Html5v'Resource@cptIt,

_SPECIFIC:
* http://www.w3schools.com/html5/default.asp,
* http://www.tutorialspoint.com/html5/index.htm,
* http://html5-demos.appspot.com//
* http://html5doctor.com//

Dive Into HTML5
by Mark Pilgrim
* http://diveintohtml5.org//

_BOOK:
* http://www.htmlgoodies.com/ebooks/47646210/95910/4190310/?&CCID=20240256204365835&QTR=ZZf0Za20240256Zb0Zg64Zw0Zm0Zc204365835,204365835Zs9484Zh107810,107800,107790,107820,107870,107860,107890,95910,97580Zv0ZZ&CLK=923130716012429544&WT.qs_dlk=UeUDGgrIZ2QAAG833j8AAAAi,

Html5v'Specification

name::
* McsEngl.Html5v'Specification@cptIt,
* McsEngl.hml5v'spec@cptIt,

_ADDRESS.WPG:
* living-standard https://html.spec.whatwg.org/multipage//
* https://www.w3.org/TR/html5//
* http://www.w3.org/html/wg/drafts/html/master/Overview.html,
* http://www.w3.org/TR/html51//
* http://dev.w3.org/html5/spec/Overview.html, Editor's Draft:

_DESCRIPTION:
W3C:
HTML5
A vocabulary and associated APIs for HTML and XHTML
Editor's Draft 7 October 2010
* http://dev.w3.org/html5/spec/spec.html

Previous Versions:
http://www.w3.org/TR/2010/WD-html5-20100624/
http://www.w3.org/TR/2010/WD-html5-20100304/
http://www.w3.org/TR/2009/WD-html5-20090825/
http://www.w3.org/TR/2009/WD-html5-20090423/
http://www.w3.org/TR/2009/WD-html5-20090212/
http://www.w3.org/TR/2008/WD-html5-20080610/
http://www.w3.org/TR/2008/WD-html5-20080122/

WHATWG:
* http://www.whatwg.org/specs/web-apps/current-work/multipage//

Html5v'Style

name::
* McsEngl.Html5v'Style@cptIt,

_ADDRESS.WPG:
* https://google.github.io/styleguide/htmlcssguide.html,

Html5v'Syntax

name::
* McsEngl.Html5v'Syntax@cptIt,

HTML5 Syntax:
The HTML 5 language has a "custom" HTML syntax that is compatible with HTML 4 and XHTML1 documents published on the Web, but is not compatible with the more esoteric SGML features of HTML 4.

HTML 5 does not have the same syntax rules as XHTML where we needed lower case tag names, quoting our attributes,an attribute had to have a value and to close all empty elements.

But HTML5 is coming with lots of flexibility and would support the followings:

Uppercase tag names.

Quotes are optional for attributes.

Attribute values are optional.

Closing empty elements are optional.
[http://www.tutorialspoint.com/html5/html5_quick_guide.htm]

Html5v'test

name::
* McsEngl.Html5v'test@cptIt,

_ADDRESS.WPG:
* http://html5test.com//

Html5v.Evoluting

name::
* McsEngl.Html5v.Evoluting@cptIt,

{time.2008-01-23}:
=== HTML5 first spec:
The HTML 5 draft specification was published as a First Public Working Draft on 23 January 2008
[http://www.w3.org/html/wg/]

Html.XHTML.2000

name::
* McsEngl.Html.XHTML.2000@cptIt,
* McsEngl.XHTML@cptIt568i,

_DEFINITION:
What Is XHTML?
* XHTML stands for EXtensible HyperText Markup Language
* XHTML is almost identical to HTML 4.01
* XHTML is a stricter and cleaner version of HTML
* XHTML is HTML defined as an XML application
* XHTML is a W3C Recommendation
[http://www.w3schools.com/xhtml/default.asp]

_DEFINITION:
Since January 2000 all W3C Recommendations for HTML have been based on XML rather than SGML, using the abbreviation XHTML (Extensible HyperText Markup Language). The language specification requires that XHTML Web documents must be well-formed XML documents – this allows for more rigorous and robust documents while using tags familiar from HTML.
One of the most noticeable differences between HTML and XHTML is the rule that all tags must be closed: empty HTML tags such as <br> must either be closed with a regular end-tag, or replaced by a special form: <br /> (the space before the '/' on the end tag is optional, but frequently used because it enables some pre-XML Web browsers to accept the tag). Another is that all attribute values in tags must be quoted. Finally, all tag and attribute names must be lowercase in order to be valid; HTML, on the other hand, was case-insensitive.
[http://en.wikipedia.org/wiki/Markup_language]

_TIME:
XHTML 1.0 became a W3C Recommendation January 26, 2000.
[http://www.w3schools.com/xhtml/default.asp]

The Most Important Differences:
* XHTML elements must be properly nested
* XHTML elements must always be closed
* XHTML elements must be in lowercase
* XHTML documents must have one root element
[http://www.w3schools.com/xhtml/default.asp]

_STANDARD:
* http://www.w3.org/TR/xhtml1//
XHTML™ 1.0 The Extensible HyperText Markup Language (Second Edition)
A Reformulation of HTML 4 in XML 1.0
W3C Recommendation 26 January 2000, revised 1 August 2002

Html.4-01.1999

name::
* McsEngl.Html.4-01.1999@cptIt,
* McsEngl.hml401@cptIt,

Html.4-0.1997

name::
* McsEngl.Html.4-0.1997@cptIt,

A.3 Changes between HTML 3.2 and HTML 4.0 (18 December 1997)

This section describes how the 18 December 1997 specification of HTML 4.0 differs from HTML 3.2 ([HTML32]).

A.3.1 Changes to elements

New elements

The new elements in HTML 4.0 are: ABBR, ACRONYM, BDO, BUTTON, COL, COLGROUP, DEL, FIELDSET, FRAME, FRAMESET, IFRAME, INS, LABEL, LEGEND, NOFRAMES, NOSCRIPT, OBJECT, OPTGROUP, PARAM, S (deprecated), SPAN, TBODY, TFOOT, THEAD, and Q.

Deprecated elements

The following elements are deprecated: APPLET, BASEFONT, CENTER, DIR, FONT, ISINDEX, MENU, S, STRIKE, and U.
[]

Html.3-2.1997

name::
* McsEngl.Html.3-2.1997@cptIt,
* McsEngl.hml401@cptIt,

Το επίπεδο 3 περιλαμβάνει (HTML+) περιλαμβάνει μια πιο εξελιγμένη μορφή εικόνων και μαθηματικά σύμβολα.
Βρίσκεται υπό διαμόρφωση άν και μερικά στοιχεία του αναγνωρίζονται απο δημοφιλείς αναγνώστες.
[COMPUTER GO, OCT. 1996, ΕΝΘΕΤΟ 29]

HTML+
A proposed new standard which will supersede HTML. It is a superset of HTML which is designed to extend the capabilities of the language to incorporate better support for multimedia objects in documents. (27 Oct 1994)
[WWW]

Html.2.1995

name::
* McsEngl.Html.2.1995@cptIt,

Το επιπεδο 2, περιλαμβάνει δυνατότητες μορφοποίησης όπως η δημιουργία φορμών, που μόνο ορισμένοι ΑΝΑΓΝΩΣΤΕΣ αναγνωρίζουν που όμως χρησιμοποιούνται από τη μεγάλη πλειοψηφία.
[COMPUTER GO, OCT. 1996, ΕΝΘΕΤΟ 29]

Html.1.1991

name::
* McsEngl.Html.1.1991@cptIt,

Το επίπεδο 1 (συχνά αποκαλούμενο και βασική HTML), το οποίο και αναγνωρίζουν ανεξαιρέτως όλοι οι web clients.
[COMPUTER GO, OCT. 1996, ΕΝΘΕΤΟ 29]

Html.EVOLUTING#cptCore546.171#

name::
* McsEngl.Html.EVOLUTING@cptIt,

2008-01-23: HTML5 first spec:
The HTML 5 draft specification was published as a First Public Working Draft on 23 January 2008
[http://www.w3.org/html/wg/]

2006: HTML5-START:
HTML5 is a cooperation between the World Wide Web Consortium (W3C) and the Web Hypertext Application Technology Working Group (WHATWG).

WHATWG was working with web forms and applications, and W3C was working with XHTML 2.0. In 2006, they decided to cooperate and create a new version of HTML.
[http://www.w3schools.com/html5/html5_intro.asp]

1999: HTML4.01-STANDARD:
The internet has changed a lot since HTML 4.01 became a standard in 1999.
[http://www.w3schools.com/html5/html5_new_elements.asp] 2010-09-30

1997jul:
HTML 4.0 released.
[Khare-Fiffin 1997jul31]

1990:
http invented.
[http://www.w3.org/Architecture/ 1997aug]

HTML Versions
Since the early days of the web, there have been many versions of HTML:
Version    Year
HTML    1991
HTML 2.0  1995
HTML 3.2  1997
HTML 4.01  1999
XHTML    2000
HTML5    2014
[http://www.w3schools.com/html/html_intro.asp]

lwp.CSS

NAME

name::
* McsEngl.lwp.CSS@cptIt,
* McsEngl.conceptIt576,
* McsEngl.css@cptIt576,
* McsEngl.Cascading-Style-Sheets@cptIt,
* McsEngl.language.style.cascading@cptIt,
* McsEngl.lngWeb.CSS@cptIt,
* McsEngl.lcr.css@cptIt,
* McsEngl.wpg'code'LngCss@cptIt,

* McsEngl.lsc@cptIt,
====== lagoGreek:
* McsElln.ΦΥΛΛΑ-ΕΠΑΛΛΗΛΩΝ-ΣΤΥΛ@cptIt576,

DEFINITION

CSS is a language for describing the rendering of structured documents (such as HTML and XML) on screen, on paper, in speech, etc.
[https://www.w3.org/TR/css-2015/]

Cascading Style Sheets (CSS) is a language for specifying how documents are presented to users. These documents are written in a markup language such as HTML.

A document is a collection of information that is structured using a markup language.

Presenting a document to a user means converting it into a usable form for your audience. Browsers, like Firefox, Chrome or Internet Explorer, are designed to present documents visually, for example, on a computer screen, projector or printer.
[https://developer.mozilla.org/en-US/docs/Web/Guide/CSS/Getting_Started/What_is_CSS]

Cascading Style Sheets (CSS) are a stylesheet language used to describe the presentation of a document written in HTML or XML (including XML dialects like SVG or XHTML).
CSS describes how elements should be rendered on screen, on paper, in speech, or on other media.
[https://developer.mozilla.org/en-US/docs/Web/CSS]

CSS is a formatting language, used to provide more customised web pages and make it easier to make multiple pages use the same style.
[http://www.howtocreate.co.uk/tutorials/css/introduction]

css'GENERIC

_GENERIC:
* style-representation-method#cptIt501.10#
* CSS is a formatting language, used to provide more customised web pages and make it easier to make multiple pages use the same style.
[http://www.howtocreate.co.uk/tutorials/css/introduction]

css'WHOLE

_WHOLE:
* webpage##

css'Archetype

name::
* McsEngl.css'Archetype@cptIt,
* McsEngl.cssarcho@cptIt,
* McsEngl.css'archo@cptIt,

_DESCRIPTION:
CSS can be used to style HTML and XML documents.
[https://www.w3.org/Style/]

cssarcho'Document

name::
* McsEngl.cssarcho'Document@cptIt,
* McsEngl.css'archo-doc@cptIt,
* McsEngl.css'source-document@cptIt,

_DESCRIPTION:
The-document, the-style of which we want to map.

_DESCRIPTION:
Source document
The document to which one or more style sheets apply. This is encoded in some language that represents the document as a tree of elements. Each element consists of a name that identifies the type of element, optionally a number of attributes, and a (possibly empty) content. For example, the source document could be an XML or SGML instance.
[https://www.w3.org/TR/CSS2/conform.html#source-document]

cssarcho'Html-element

name::
* McsEngl.cssarcho'Html-element@cptIt,

_DESCRIPTION:
Document tree
The tree of elements encoded in the source document. Each element in this tree has exactly one parent, with the exception of the root element, which has none.
Child
An element A is called the child of element B if and only if B is the parent of A.
Descendant
An element A is called a descendant of an element B, if either (1) A is a child of B, or (2) A is the child of some element C that is a descendant of B.
Ancestor
An element A is called an ancestor of an element B, if and only if B is a descendant of A.
Sibling
An element A is called a sibling of an element B, if and only if B and A share the same parent element. Element A is a preceding sibling if it comes before B in the document tree. Element B is a following sibling if it comes after A in the document tree.
Preceding element
An element A is called a preceding element of an element B, if and only if (1) A is an ancestor of B or (2) A is a preceding sibling of B.
Following element
An element A is called a following element of an element B, if and only if B is a preceding element of A.
[https://www.w3.org/TR/CSS2/conform.html#doctree]

to-model

* selector#ql:idLscslr#

cssarcho'Centering

name::
* McsEngl.cssarcho'Centering@cptIt,
* McsEngl.css'centering@cptIt,

Text inside div:
a) setting div.margin=auto,
[http://www.w3schools.com/css/tryit.asp?filename=trycss_margin_auto]
b) div.text-align=center
[http://www.w3schools.com/css/tryit.asp?filename=trycss_align_text]

Image:
img {
display: block;
margin: auto;
width: 40%;
}
[http://www.w3schools.com/css/tryit.asp?filename=trycss_align_image]

PSEUDO_ELEMENT:
// HORIZONTAL
.clsIcnTop:before {
width: 100%;
}
.clsIcnTop:before {
magin: auto;
}
===
// VERTICAL
.clsIcnTop:before {
line-height: 26px;
vertical-align: middle;
}

cssarcho'Color

name::
* McsEngl.cssarcho'Color@cptIt,

cssarcho'Font

name::
* McsEngl.cssarcho'Font@cptIt,

_DESCRIPTION:
A font provides a resource containing the visual representation of characters. At the simplest level it contains information that maps character codes to shapes (called glyphs) that represent these characters. Fonts sharing a common design style are commonly grouped into font families classified by a set of standard font properties. Within a family, the shape displayed for a given character can vary by stroke weight, slant or relative width, among others. An individual font face is described by a unique combination of these properties. For a given range of text, CSS font properties are used to select a font family and a specific font face within that family to be used when rendering that text. As a simple example, to use the bold form of Helvetica one could use:
body {
font-family: Helvetica;
font-weight: bold;
}
Font resources may be installed locally on the system on which a user agent is running or downloadable. For local font resources descriptive information can be obtained directly from the font resource. For downloadable font resources (sometimes referred to as web fonts), the descriptive information is included with the reference to the font resource.

Families of fonts typically don't contain a single face for each possible variation of font properties. The CSS font selection mechanism describes how to match a given set of CSS font properties to a single font face.
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#abstract]

cssarcho'Icon

name::
* McsEngl.cssarcho'Icon@cptIt,
* McsEngl.css'icon@cptIt,

_DESCRIPTION:
* icon created with css.

_ADDRESS.WPG:
* Pure CSS GUI icons http://nicolasgallagher.com/pure-css-gui-icons/demo//

cssarcho'Media

name::
* McsEngl.cssarcho'Media@cptIt,
* McsEngl.css'media@cptIt,
* McsEngl.cssmed@cptIt,
* McsEngl.css'media-type@cptIt,

_SPECIFIC:
7.3 Recognized media types
The names chosen for CSS media types reflect target devices for which the relevant properties make sense. In the following list of CSS media types the names of media types are normative, but the descriptions are informative. Likewise, the "Media" field in the description of each property is informative.

all
Suitable for all devices.
braille
Intended for braille tactile feedback devices.
embossed
Intended for paged braille printers.
handheld
Intended for handheld devices (typically small screen, limited bandwidth).
print
Intended for paged material and for documents viewed on screen in print preview mode. Please consult the section on paged media for information about formatting issues that are specific to paged media.
projection
Intended for projected presentations, for example projectors. Please consult the section on paged media for information about formatting issues that are specific to paged media.
screen
Intended primarily for color computer screens.
speech
Intended for speech synthesizers. Note: CSS2 had a similar media type called 'aural' for this purpose. See the appendix on aural style sheets for details.
tty
Intended for media using a fixed-pitch character grid (such as teletypes, terminals, or portable devices with limited display capabilities). Authors should not use pixel units with the "tty" media type.
tv
Intended for television-type devices (low resolution, color, limited-scrollability screens, sound available).
[https://www.w3.org/TR/CSS21/media.html#media-types]

_SPECIFIC:
CSS 2.1 defines the following media groups:
continuous or paged.
visual, audio, speech, or tactile.
grid (for character grid devices), or bitmap.
interactive (for devices that allow user interaction), or static (for those that do not).
all (includes all media types)
[https://www.w3.org/TR/CSS21/media.html#media-groups]

cssmed.all

name::
* McsEngl.cssmed.all@cptIt,

_DESCRIPTION:
all
Suitable for all devices.
[https://www.w3.org/TR/CSS21/media.html#media-types]

cssmed.audio

name::
* McsEngl.cssmed.audio@cptIt,

cssmed.bitmap

name::
* McsEngl.cssmed.bitmap@cptIt,

cssmed.braille

name::
* McsEngl.cssmed.braille@cptIt,

_DESCRIPTION:
braille
Intended for braille tactile feedback devices.
[https://www.w3.org/TR/CSS21/media.html#media-types]

cssmed.continuous

name::
* McsEngl.cssmed.continuous@cptIt,

cssmed.embossed

name::
* McsEngl.cssmed.embossed@cptIt,

_DESCRIPTION:
embossed
Intended for paged braille printers.
[https://www.w3.org/TR/CSS21/media.html#media-types]

cssmed.grid

name::
* McsEngl.cssmed.grid@cptIt,

_DESCRIPTION:
for character grid devices.

cssmed.handheld

name::
* McsEngl.cssmed.handheld@cptIt,

_DESCRIPTION:
handheld
Intended for handheld devices (typically small screen, limited bandwidth).
[https://www.w3.org/TR/CSS21/media.html#media-types]

cssmed.interactive

name::
* McsEngl.cssmed.interactive@cptIt,

cssmed.paged

name::
* McsEngl.cssmed.paged@cptIt,

_DESCRIPTION:
Paged media (e.g., paper, transparencies, pages that are displayed on computer screens, etc.) differ from continuous media in that the content of the document is split into one or more discrete pages. To handle pages, CSS 2.1 describes how page margins are set on page boxes, and how page breaks are declared.
[https://www.w3.org/TR/CSS21/page.html#page-intro]

css'Page-box

name::
* McsEngl.css'Page-box@cptIt,

_DESCRIPTION:
The page box is a rectangular region that contains two areas:
The page area. The page area includes the boxes laid out on that page. The edges of the first page area establish the rectangle that is the initial containing block of the document. The canvas background is painted within and covers the page area.
The margin area, which surrounds the page area. The page margin area is transparent.
[https://www.w3.org/TR/CSS21/page.html#page-box]

cssmed.print

name::
* McsEngl.cssmed.print@cptIt,

_DESCRIPTION:
print
Intended for paged material and for documents viewed on screen in print preview mode. Please consult the section on paged media for information about formatting issues that are specific to paged media.
[https://www.w3.org/TR/CSS21/media.html#media-types]

cssmed.prejection

name::
* McsEngl.cssmed.prejection@cptIt,

_DESCRIPTION:
projection
Intended for projected presentations, for example projectors. Please consult the section on paged media for information about formatting issues that are specific to paged media.
[https://www.w3.org/TR/CSS21/media.html#media-types]

cssmed.screen

name::
* McsEngl.cssmed.screen@cptIt,

_DESCRIPTION:
screen
Intended primarily for color computer screens.
[https://www.w3.org/TR/CSS21/media.html#media-types]

cssmed.speech

name::
* McsEngl.cssmed.speech@cptIt,

_DESCRIPTION:
speech
Intended for speech synthesizers. Note: CSS2 had a similar media type called 'aural' for this purpose. See the appendix on aural style sheets for details.
[https://www.w3.org/TR/CSS21/media.html#media-types]

cssmed.static

name::
* McsEngl.cssmed.static@cptIt,

cssmed.tactile

name::
* McsEngl.cssmed.tactile@cptIt,

cssmed.tty

name::
* McsEngl.cssmed.tty@cptIt,

_DESCRIPTION:
tty
Intended for media using a fixed-pitch character grid (such as teletypes, terminals, or portable devices with limited display capabilities). Authors should not use pixel units with the "tty" media type.
[https://www.w3.org/TR/CSS21/media.html#media-types]

cssmed.tv

name::
* McsEngl.cssmed.tv@cptIt,

_DESCRIPTION:
tv
Intended for television-type devices (low resolution, color, limited-scrollability screens, sound available).
[https://www.w3.org/TR/CSS21/media.html#media-types]

cssmed.visual

name::
* McsEngl.cssmed.visual@cptIt,

css'Stylesheet (model|code|doc)

name::
* McsEngl.css'Stylesheet (model|code|doc)@cptIt,
* McsEngl.css-webpage-part@cptIt, {2016-08-09}
* McsEngl.css'stylesheet@cptIt,
* McsEngl.cssstylesheet@cptIt,
* McsEngl.csscode@cptIt,
* McsEngl.cssdoc@cptIt, {2016-06-15}
* McsEngl.csssts@cptIt, {2016-06-12}
* McsEngl.csssst@cptIt,

* McsEngl.css-webpage-part@cptIt, {2016-08-09}
* McsEngl.css'stylesheet@cptIt,
* McsEngl.cssstylesheet@cptIt,
* McsEngl.csscode@cptIt,
* McsEngl.cssdoc@cptIt, {2016-06-15}
* McsEngl.csssts@cptIt, {2016-06-12}
* McsEngl.csssst@cptIt,

_DESCRIPTION:
A-stylesheet is a-model a-css-archetype, a-rendering of an html or xml document.
A-stylesheet is a-whole-part-tree of css-units.
[hmnSngo.2016-06-12]
===
A CSS document is a series of qualified rules, which are usually style rules that apply CSS properties to elements, and at-rules, which define special processing rules or values for the CSS document.
[https://www.w3.org/TR/2014/CR-css-syntax-3-20140220/#syntax-description]
===
A style sheet consists of a list of rules#ql:css'rule@cptIt#. Each rule or rule-set consists of one or more selectors and a declaration block. A declaration-block consists of a list of declarations in braces. Each declaration itself consists of a property, a colon (:), a value. If there are multiple declarations in a block, a semi-colon (;) must be inserted to separate each declaration.[2]
[http://en.wikipedia.org/wiki/Css]

_CODE.HML:
//html-doc external file
<link href="../../hitp/hitp.css" rel="stylesheet" type="text/css"/>
===
html-style-element#ql:html'style_element#

cssdoc'Browser-compatibility

name::
* McsEngl.cssdoc'Browser-compatibility@cptIt,

cssdoc'UNIT (character)

name::
* McsEngl.cssdoc'UNIT (character)@cptIt,
* McsEngl.cssunit@cptIt,
* McsEngl.css'unit@cptIt,
* McsEngl.css'character@cptIt,
* McsEngl.css'unit@cptIt,
* McsEngl.csscharacter@cptIt,
* McsEngl.cssunit@cptIt,

css'CASE-SENSITIVITY

name::
* McsEngl.css'CASE-SENSITIVITY@cptIt,

Question: Is CSS case sensitive?
Answer:

Cascading Style Sheets (CSS) is not case sensitve. However, font families, URLs to images, and other direct references with the style sheet may be.

The trick is that if you write a document using an XML declaration and an XHTML doctype, then the CSS class names will be case sensitive for some browsers.

It is a good idea to avoid naming classes where the only difference is the case, for example:

div.myclass { ...}
div.myClass { ... }

If the DOCTYPE or XML declaration is ever removed from your pages, even by mistake, the last instance of the style will be used, regardless of case.
[http://webdesign.about.com/od/css/f/blcssfaqcase.htm]

cssdoc'WORD

name::
* McsEngl.cssdoc'WORD@cptIt,
* McsEngl.css'word@cptIt,
* McsEngl.css'keyword@cptIt,
* McsEngl.css'token@cptIt,
* McsEngl.cssword@cptIt,
* McsEngl.css'word@cptIt,

css'identifier

name::
* McsEngl.css'identifier@cptIt,
* McsEngl.cssidentifier@cptIt,
* McsEngl.css'identifier@cptIt,
* McsEngl.cssidentifier@cptIt,

_DESCRIPTION:
An identifier is a sequence of characters conforming to the <ident-token> grammar. [CSS3SYN] Identifiers cannot be quoted; otherwise they would be interpreted as a string.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#textual-values]

_DESCRIPTION:
Property names and at-rule names are always identifiers, which have to start with a letter or a hyphen followed by a letter, and then can contain letters, numbers, hyphens, or underscores. You can include any code point at all, even ones that CSS uses in its syntax, by escaping it.
[https://www.w3.org/TR/2014/CR-css-syntax-3-20140220/#syntax-description]

css'tokenizer-algorithm

name::
* McsEngl.css'tokenizer-algorithm@cptIt,

_DESCRIPTION:
The algorithms defined in this section transform a stream of code points into a stream of tokens.
[https://www.w3.org/TR/css-syntax/#tokenizer-algorithms]

cssdoc'SEMANTIC-UNIT

name::
* McsEngl.cssdoc'SEMANTIC-UNIT@cptIt,

_SPECIFIC:
* declaration##
* selector##
* style##

cssdoc'sut.SELECTOR (slr)

name::
* McsEngl.cssdoc'sut.SELECTOR (slr)@cptIt,
* McsEngl.css'selector@cptIt,
* McsEngl.cssselector@cptIt,
* McsEngl.element-query@cptIt, {2016-06-14}
* McsEngl.css'selector@cptIt,

* McsEngl.cssslr@cptIt,

_DEFINITION:
Selectors are patterns that match against elements in a tree, and as such form one of several technologies that can be used to select nodes in an XML document. Selectors have been optimized for use with HTML and XML, and are designed to be usable in performance-critical code.

CSS (Cascading Style Sheets) is a language for describing the rendering of HTML and XML documents on screen, on paper, in speech, etc. CSS uses Selectors for binding style properties to elements in the document.

This document describes the selectors that already exist in CSS1 [CSS1] and CSS2 [CSS21], and further introduces new selectors for CSS3 and other languages that may need them.

Selectors define the following function:
expression * element -> boolean
That is, given an element and a selector, this specification defines whether that element matches the selector.

These expressions can also be used, for instance, to select a set of elements, or a single element from a set of elements, by evaluating the expression across all the elements in a subtree. STTS (Simple Tree Transformation Sheets), a language for transforming XML trees, uses this mechanism. [STTS3]
[https://www.w3.org/TR/2011/REC-css3-selectors-20110929/]
===
In CSS, selectors are patterns used to select the element(s) you want to style.
[http://www.w3schools.com/cssref/css_selectors.asp]
===
The selector is normally the HTML element you want to style.
[http://www.w3schools.com/css/css_syntax.asp]

_WHOLE:
* css_rule#ql:css'rule#

_CODE.CSS:
selector {declaration;declaration}
p {color:red; text-align:center; }
h1 {color: blue;}

_ADDRESS.WPG:
* http://www.w3schools.com/cssref/css_selectors.asp,

cssslr'resource

name::
* McsEngl.cssslr'resource@cptIt,

_ADDRESS.WPG:
* https://developer.mozilla.org/en-US/Learn/CSS/Introduction_to_CSS/Cascade_and_inheritance,
* TESTER: http://www.w3schools.com/cssref/trysel.asp,

cssslr'spec

name::
* McsEngl.cssslr'spec@cptIt,

cssslr'specificity

name::
* McsEngl.cssslr'specificity@cptIt,
* McsEngl.css'specificity@cptIt,

_ADDRESS.WPG:
* https://developer.mozilla.org/en-US/docs/Web/CSS/Specificity,
* https://www.w3.org/TR/css3-selectors/#specificity,
* https://specificity.keegan.st//

SPECIFIC

* cssslr.specific,
* cssselector.specific,

In CSS, selectors are patterns used to select which element(s) you want to style.

The "CSS" column indicates in which CSS version the property is defined (CSS1 or CSS2).

Selector  Example  Example Selects:  CSS
.class  .intro  All elements with class="intro"  1
#id  #firstname  The element with id="firstname"  1
*  *  All elements  2
[attribute]  [target]  All elements with a target attribute  2
[attribute=value]  [target=_blank]  All elements with a target attribute equal to "_blank"  2
[attribute~=value]  [title=flower]  All elements with a title attribute that contains space separated words, one of which is "flower"  2
[attribute|=language]  [lang|=en]  All elements where the lang attribute's value is "en", even if the value contains a hyphen (-), like "en-us"  2
element  p  All <p> elements  1
element,element  div,p  All <div> elements and all <p> elements  1
element element  div p  All <p> elements inside <div> elements  1
element>element  div>p  All <p> elements where the parent is a <div> element  2
element+element  div+p  All <p> elements placed immediately after a <div> element  2
:active  a:active  Active links  1
:after  p:after  Content will be placed after each <p> element  2
:before  p:before  Content will be placed before each <p> element  2
:first-child  p:first-child  All <p> elements that is the first child of its parent  2
:first-letter  p:first-letter  The first letter of all <p> elements  1
:first-line  p:first-line  The first line of all <p> elements  1
:focus  input:focus  The input element that has focus  2
:hover  a:hover  Links on mouse over  1
:lang(language)  p:lang(it)  All <p> elements with the lang attribute containing "it"  2
:link  a:link  All links (<a> elements with href)  1
:visited  a:visited  All visited links  1
[http://www.w3schools.com/css/css_reference_atoz.asp]

cssslr.AFTER

name::
* McsEngl.cssslr.AFTER@cptIt,
* McsEngl.css'after-selector@cptIt576i,

_DESCRIPTION:
It is an 'INLINE-ELEMENT' needs 'display: block;' in order to work 'line-height', transformation etc.
[http://stackoverflow.com/questions/6596841/css-pseudo-elements-before-and-after-inheriting-width-height-from-original-el]
===
In normal flow, the pseudo element expands the dimensions of the element, and what you see is the underline of the underline of the link itself. Add a:after {text-decoration: line-through;} to verify.

Here's a proposed solution: http://jsfiddle.net/Ronny/Smr38/

Basically, when using position: absolute for the pseudo-elements they no longer affect the dimensions of their parent elements, so the underlines are cut at the right place. You still need to take care of things like pointer events, hover state and focus rings, but I left at least the latter for you to figure out.
[http://stackoverflow.com/a/12709367]

cssslr.BEFORE

name::
* McsEngl.cssslr.BEFORE@cptIt,
* McsEngl.css'before-selector@cptIt576i,

_DESCRIPTION:
It is an 'INLINE-ELEMENT' needs 'display: block;' in order to work 'line-height', transformation etc.
[http://stackoverflow.com/questions/6596841/css-pseudo-elements-before-and-after-inheriting-width-height-from-original-el]
===
Definition and Usage
The :before selector inserts content before the selected element(s).
Use the content property to specify the content to insert.
[http://www.w3schools.com/cssref/sel_before.asp]

_CODE.CSS:
Example

Insert content before every <p> element:

p:before
{
content:"Read this: ";
}
[http://www.w3schools.com/cssref/sel_before.asp]
===

<!DOCTYPE html>
<html>
<head>
<style>
p
{
counter-increment: myIndex;
}

p:before
{
content:counter(myIndex)' - ';
}
</style>
</head>

<body>
<p>First make a variable (myIndex) and make it increase every time a p element occurs.</p>
<p>Then insert the counter in front of all p elements</p>
<p><b>Note:</b> For the counter property to work in IE8, a DOCTYPE must be declared.</p>

</body>
</html>
[http://www.w3schools.com/cssref/tryit.asp?filename=trycss_content_counter]

cssslr.CLASS

name::
* McsEngl.cssslr.CLASS@cptIt,
* McsEngl.cssclass-selector@cptIt,
* McsEngl.css'class-selector@cptIt,
* McsEngl.class-selector-css@cptIt,

_CODE.CSS:
.center {
font-family: Georgia, "Times New Roman", Times, serif;
font-size: 44px;
font-weight: bold;
color:#800000;
padding: 0 0 20px 0; /*top right bottom left*/
margin-top: 20px;
margin-bottom: 20px;
text-align: center;
}

_CODE.HML:
<h1 class="center">
===
multiple classes:
<p class="pullquote btmmargin left">...</p>

cssclass'relation-to-inline-style

name::
* McsEngl.cssclass'relation-to-inline-style@cptIt,

_DESCRIPTION:
There is a simple reason. The point of CSS is to separate the content (HTML) from the presentation (CSS). It's all about accessibility and code reuse.
[http://stackoverflow.com/a/3142741]

_ADDRESS.WPG:
* http://stackoverflow.com/questions/3142710/inline-styles-vs-classes,

cssslr.CHILD

name::
* McsEngl.cssslr.CHILD@cptIt,
* McsEngl.css'selector.decendant@cptIt,

Do you know what the difference between these selectors are?

ul li { margin: 0 0 5px 0; }
ul > li { margin: 0 0 5px 0; }
I'll admit it took me longer than it probably should have (way back when) when I was learning the basics of CSS. In both cases, they are selecting list items that are children of unordered lists. But there is a difference between children and descendants.

The first selector above is a decendant selector. It will select any list items that are anywhere underneath an unordered list in the markup structure. The list item could be buried three levels deep within other nested lists, and this selector will still match it.
The second selector above is a child combinator selector. This means it will only select list items that are direct children of an unordered list. In otherwords, it only looks one level down the markup structure, no deeper. So if there was another unordered list nested deeper, the list item children of it will not be targeted by this selector.
[http://css-tricks.com/child-and-sibling-selectors/]

cssslr.child.ALL

name::
* McsEngl.cssslr.child.ALL@cptIt,

_CODE.CSS:
ul li { margin: 0 0 5px 0; }
==> all decendants.

cssslr.child.NTH

name::
* McsEngl.cssslr.child.NTH@cptIt,
* McsEngl.css'selector.nth-child@cptIt,

ul li { margin: 0 0 5px 0; }

<style>
p:nth-child(odd)
{
background:#ff0000;
}
p:nth-child(even)
{
background:#0000ff;
}
</style>
[http://www.w3schools.com/cssref/sel_nth-child.asp]

cssslr.GROUP

name::
* McsEngl.cssslr.GROUP@cptIt,
* McsEngl.css'group-selector@cptIt,

_CODE.CSS:
h1,h2,p {
color:green;
}
===
Grouping Selectors
In style sheets there are often elements with the same style.

h1 {
color:green;
}
h2 {
color:green;
}
p {
color:green;
}
To minimize the code, you can group selectors.

Separate each selector with a comma.

In the example below we have grouped the selectors from the code above:

Example
h1,h2,p {
color:green;
}
[http://www.w3schools.com/css/css_grouping_nesting.asp]

cssslr.ID

name::
* McsEngl.cssslr.ID@cptIt,
* McsEngl.css'id-selector@cptIt576i,

_CODE.CSS:
#title {
font-family: Georgia, "Times New Roman", Times, serif;
font-size: 44px;
font-weight: bold;
color:#800000;
padding: 0 0 20px 0; /*top right bottom left*/
margin-top: 20px;
margin-bottom: 20px;
text-align: center;
}
onHTML:
<h1 id="title">
===

div#simpleSearch {...

cssslr.IMG

name::
* McsEngl.cssslr.IMG@cptIt,
* McsEngl.css'img-selector@cptIt576i,

_CODE.CSS:
img {
 float: left;
 padding: 0 25px 25px 0;
}
All images of the page.
===================================
img.floating {
 float: left;
 padding: 0 25px 25px 0;
}
only elements with class attribute:
<img class="floating" src="leia.jpg" >

cssslr.NESTING

name::
* McsEngl.cssslr.NESTING@cptIt,
* McsEngl.css'nesting-selector@cptIt,

_CODE.CSS:
.marked p {
color:white;
}
===
It is possible to apply a style for a selector within a selector.

In the example below, one style is specified for all p elements, and a separate style is specified for p elements nested within the "marked" class:
<html>
<head>
<style type="text/css">
p {
color:blue;
text-align:center;
}

.marked {
background-color:blue;
}

.marked p {
color:white;
}
</style>
</head>

<body>
<p>This is a blue, center-aligned paragraph.</p>

<div class="marked">
<p>This p element should not be blue.</p>
</div>

<p>p elements inside a "marked" classed element keeps the alignment style, but has a different text color.</p>
</body>
</html>
[http://www.w3schools.com/css/css_grouping_nesting.asp]

cssslr.EVOLUTION

name::
* McsEngl.cssslr.EVOLUTION@cptIt,

1.3. Changes from CSS2

This section is non-normative.

The main differences between the selectors in CSS2 and those in Selectors are:

the list of basic definitions (selector, group of selectors, simple selector, etc.) has been changed; in particular, what was referred to in CSS2 as a simple selector is now called a sequence of simple selectors, and the term "simple selector" is now used for the components of this sequence
an optional namespace component is now allowed in element type selectors, the universal selector and attribute selectors
a new combinator has been introduced
new simple selectors including substring matching attribute selectors, and new pseudo-classes
new pseudo-elements, and introduction of the "::" convention for pseudo-elements
the grammar has been rewritten
profiles to be added to specifications integrating Selectors and defining the set of selectors which is actually supported by each specification
Selectors are now a CSS3 Module and an independent specification; other specifications can now refer to this document independently of CSS
the specification now has its own test suite
[https://www.w3.org/TR/2011/REC-css3-selectors-20110929/#changesFromCSS2]

cssslr.2015

name::
* McsEngl.cssslr.2015@cptIt,

_SPECIFIC:
Pattern  Meaning  Described in section  First defined in level
*  any element  Universal selector  2
E  an element of type E  Type selector  1
E[foo]  an E element with a "foo" attribute  Attribute selectors  2
E[foo="bar"]  an E element whose "foo" attribute value is exactly equal to "bar"  Attribute selectors  2
E[foo~="bar"]  an E element whose "foo" attribute value is a list of whitespace-separated values, one of which is exactly equal to "bar"  Attribute selectors  2
E[foo^="bar"]  an E element whose "foo" attribute value begins exactly with the string "bar"  Attribute selectors  3
E[foo$="bar"]  an E element whose "foo" attribute value ends exactly with the string "bar"  Attribute selectors  3
E[foo*="bar"]  an E element whose "foo" attribute value contains the substring "bar"  Attribute selectors  3
E[foo|="en"]  an E element whose "foo" attribute has a hyphen-separated list of values beginning (from the left) with "en"  Attribute selectors  2
E:root  an E element, root of the document  Structural pseudo-classes  3
E:nth-child(n)  an E element, the n-th child of its parent  Structural pseudo-classes  3
E:nth-last-child(n)  an E element, the n-th child of its parent, counting from the last one  Structural pseudo-classes  3
E:nth-of-type(n)  an E element, the n-th sibling of its type  Structural pseudo-classes  3
E:nth-last-of-type(n)  an E element, the n-th sibling of its type, counting from the last one  Structural pseudo-classes  3
E:first-child  an E element, first child of its parent  Structural pseudo-classes  2
E:last-child  an E element, last child of its parent  Structural pseudo-classes  3
E:first-of-type  an E element, first sibling of its type  Structural pseudo-classes  3
E:last-of-type  an E element, last sibling of its type  Structural pseudo-classes  3
E:only-child  an E element, only child of its parent  Structural pseudo-classes  3
E:only-of-type  an E element, only sibling of its type  Structural pseudo-classes  3
E:empty  an E element that has no children (including text nodes)  Structural pseudo-classes  3
E:link
E:visited  an E element being the source anchor of a hyperlink of which the target is not yet visited (:link) or already visited (:visited)  The link pseudo-classes  1
E:active
E:hover
E:focus  an E element during certain user actions  The user action pseudo-classes  1 and 2
E:target  an E element being the target of the referring URI  The target pseudo-class  3
E:lang(fr)  an element of type E in language "fr" (the document language specifies how language is determined)  The :lang() pseudo-class  2
E:enabled
E:disabled  a user interface element E which is enabled or disabled  The UI element states pseudo-classes  3
E:checked  a user interface element E which is checked (for instance a radio-button or checkbox)  The UI element states pseudo-classes  3
E::first-line  the first formatted line of an E element  The ::first-line pseudo-element  1
E::first-letter  the first formatted letter of an E element  The ::first-letter pseudo-element  1
E::before  generated content before an E element  The ::before pseudo-element  2
E::after  generated content after an E element  The ::after pseudo-element  2
E.warning  an E element whose class is "warning" (the document language specifies how class is determined).  Class selectors  1
E#myid  an E element with ID equal to "myid".  ID selectors  1
E:not(s)  an E element that does not match simple selector s  Negation pseudo-class  3
E F  an F element descendant of an E element  Descendant combinator  1
E > F  an F element child of an E element  Child combinator  2
E + F  an F element immediately preceded by an E element  Adjacent sibling combinator  2
E ~ F  an F element preceded by an E element  General sibling combinator  3
[https://www.w3.org/TR/css-2015/#selectors]

cssslr.2010

name::
* McsEngl.cssslr.2010@cptIt,

_SPECIFIC:
Pattern  Meaning  Described in section  First defined in level
*  any element  Universal selector  2
E  an element of type E  Type selector  1
E[foo]  an E element with a "foo" attribute  Attribute selectors  2
E[foo="bar"]  an E element whose "foo" attribute value is exactly equal to "bar"  Attribute selectors  2
E[foo~="bar"]  an E element whose "foo" attribute value is a list of whitespace-separated values, one of which is exactly equal to "bar"  Attribute selectors  2
E[foo^="bar"]  an E element whose "foo" attribute value begins exactly with the string "bar"  Attribute selectors  3
E[foo$="bar"]  an E element whose "foo" attribute value ends exactly with the string "bar"  Attribute selectors  3
E[foo*="bar"]  an E element whose "foo" attribute value contains the substring "bar"  Attribute selectors  3
E[foo|="en"]  an E element whose "foo" attribute has a hyphen-separated list of values beginning (from the left) with "en"  Attribute selectors  2
E:root  an E element, root of the document  Structural pseudo-classes  3
E:nth-child(n)  an E element, the n-th child of its parent  Structural pseudo-classes  3
E:nth-last-child(n)  an E element, the n-th child of its parent, counting from the last one  Structural pseudo-classes  3
E:nth-of-type(n)  an E element, the n-th sibling of its type  Structural pseudo-classes  3
E:nth-last-of-type(n)  an E element, the n-th sibling of its type, counting from the last one  Structural pseudo-classes  3
E:first-child  an E element, first child of its parent  Structural pseudo-classes  2
E:last-child  an E element, last child of its parent  Structural pseudo-classes  3
E:first-of-type  an E element, first sibling of its type  Structural pseudo-classes  3
E:last-of-type  an E element, last sibling of its type  Structural pseudo-classes  3
E:only-child  an E element, only child of its parent  Structural pseudo-classes  3
E:only-of-type  an E element, only sibling of its type  Structural pseudo-classes  3
E:empty  an E element that has no children (including text nodes)  Structural pseudo-classes  3
E:link
E:visited  an E element being the source anchor of a hyperlink of which the target is not yet visited (:link) or already visited (:visited)  The link pseudo-classes  1
E:active
E:hover
E:focus  an E element during certain user actions  The user action pseudo-classes  1 and 2
E:target  an E element being the target of the referring URI  The target pseudo-class  3
E:lang(fr)  an element of type E in language "fr" (the document language specifies how language is determined)  The :lang() pseudo-class  2
E:enabled
E:disabled  a user interface element E which is enabled or disabled  The UI element states pseudo-classes  3
E:checked  a user interface element E which is checked (for instance a radio-button or checkbox)  The UI element states pseudo-classes  3
E::first-line  the first formatted line of an E element  The ::first-line pseudo-element  1
E::first-letter  the first formatted letter of an E element  The ::first-letter pseudo-element  1
E::before  generated content before an E element  The ::before pseudo-element  2
E::after  generated content after an E element  The ::after pseudo-element  2
E.warning  an E element whose class is "warning" (the document language specifies how class is determined).  Class selectors  1
E#myid  an E element with ID equal to "myid".  ID selectors  1
E:not(s)  an E element that does not match simple selector s  Negation pseudo-class  3
E F  an F element descendant of an E element  Descendant combinator  1
E > F  an F element child of an E element  Child combinator  2
E + F  an F element immediately preceded by an E element  Adjacent sibling combinator  2
E ~ F  an F element preceded by an E element  General sibling combinator  3
[https://www.w3.org/TR/css-2010/#selectors]

cssdoc'sut.PROPERTY-NAME-VALUE-PAIR (pnv)

name::
* McsEngl.cssdoc'sut.PROPERTY-NAME-VALUE-PAIR (pnv)@cptIt,
* McsEngl.css'property@cptIt,
* McsEngl.css'style-attribute@cptIt,
* McsEngl.css'style-property@cptIt, [https://www.w3.org/TR/2011/REC-css3-selectors-20110929/]
* McsEngl.css'style@cptIt,
* McsEngl.css'property@cptIt,
* McsEngl.css'property-variable@cptIt, {2016-10-16}
* McsEngl.css'property-name-value-pair@cptIt, {2016-10-16}

* McsEngl.csspnv@cptIt,
* McsEngl.cssppt@cptIt,
* McsEngl.cssprpt@cptIt,

_WHOLE:
* css-declaration#ql:css'declaration_cpt#

csspnv'DEFINITION

name::
* McsEngl.csspnv'DEFINITION@cptIt,
* McsEngl.property-definition-table@cptIt,

_DESCRIPTION:
Property
CSS defines a finite set of parameters, called properties, that direct the rendering of a document. Each property has a name (e.g., 'color', 'font', or border') and a value (e.g., 'red', '12pt Times', or 'dotted'). Properties are attached to various parts of the document and to the page on which the document is to be displayed by the mechanisms of specificity, cascading, and inheritance (see the chapter on Assigning property values, Cascading, and Inheritance).
[https://www.w3.org/TR/CSS2/conform.html#property]
===
A declaration is either empty or consists of a property name, followed by a colon (:), followed by a property value.
[https://www.w3.org/TR/CSS2/syndata.html#declaration]
===
Name:      border-collapse
Value:      collapse | separate | inherit
Initial:      separate
Applies to:    'table' and 'inline-table' elements
Inherited:      yes
Percentages:    N/A
Media:      visual
Computed value:  as specified
[https://drafts.csswg.org/css2/tables.html#propdef-border-collapse]
===
Each declaration consists of a property and a value.
The property is the style attribute you want to change. Each property has a value.
CSS declarations always ends with a semicolon, and declaration groups are surrounded by curly brackets:
[http://www.w3schools.com/css/css_syntax.asp]

_CODE.CSS:
{
property-name: property-value;
property-name: property-value;
}

csspnv'PROPERTY-NAME (csspnm)

name::
* McsEngl.csspnv'PROPERTY-NAME (csspnm)@cptIt,
* McsEngl.css'property-name@cptIt,
* McsEngl.cssproperty-name@cptIt,
* McsEngl.csspnv'Name@cptIt,

* McsEngl.csspnm@cptIt,

_WHOLE:
* css-declaration#ql:css'declaration#

_DESCRIPTION:
A declaration is either empty or consists of a property name, followed by a colon (:), followed by a property value. Around each of these there may be white space.
A property name is an identifier.
[https://www.w3.org/TR/CSS2/syndata.html#declaration]
===
In CSS, identifiers (including element names, classes, and IDs in selectors) can contain only the characters [a-zA-Z0-9] and ISO 10646 characters U+00A0 and higher, plus the hyphen (-) and the underscore (_); they cannot start with a digit, two hyphens, or a hyphen followed by a digit. Identifiers can also contain escaped characters and any ISO 10646 character as a numeric code (see next item). For instance, the identifier "B&W?" may be written as "B\&W\?" or "B\26 W\3F".
Note that Unicode is code-by-code equivalent to ISO 10646 (see [UNICODE] and [ISO10646]).
[https://www.w3.org/TR/CSS2/syndata.html#value-def-identifier]
===
Each declaration consists of a property and a value.
The property is the style attribute you want to change. Each property has a value.
CSS declarations always ends with a semicolon, and declaration groups are surrounded by curly brackets:
[http://www.w3schools.com/css/css_syntax.asp]

csspnv'PROPERTY-VALUE (csspvl)

name::
* McsEngl.csspnv'PROPERTY-VALUE (csspvl)@cptIt,
* McsEngl.csspnv.value@cptIt,
* McsEngl.css'code'VALUE@cptIt,
* McsEngl.css'value@cptIt,
* McsEngl.csspnv.value@cptIt,
* McsEngl.value-definition-field@cptIt, [https://www.w3.org/TR/2015/CR-css-values-3-20150611/#keywords]

* McsEngl.csspvl@cptIt, {2016-10-14}
* McsEngl.cssval@cptIt,

_DESCRIPTION:
'Value' they call INSTACES of 'properties'.
[hmnSngo.2013-08-15]
===
A declaration is either empty or consists of a property name, followed by a colon (:), followed by a property value. Around each of these there may be white space.
[https://www.w3.org/TR/CSS2/syndata.html#declaration]
===
Once a user agent has parsed a document and constructed a document tree, it must assign, for every element in the tree, a value to every property that applies to the target media type.

The final value of a property is the result of a four-step calculation: the value is determined through specification (the "specified value"), then resolved into a value that is used for inheritance (the "computed value"), then converted into an absolute value if necessary (the "used value"), and finally transformed according to the limitations of the local environment (the "actual value").
[https://www.w3.org/TR/CSS2/cascade.html#value-stages]

_WHOLE:
* css-declaration#ql:css'declaration#

_SPEC:
* https://www.w3.org/TR/css3-values//
CSS Values and Units Module Level 3
W3C Candidate Recommendation, 11 June 2015

csspvl'Assigning

name::
* McsEngl.csspvl'Assigning@cptIt,
* McsEngl.csspvl'assigning@cptIt,
* McsEngl.csspvl'processing@cptIt,

_DESCRIPTION:
Once a user agent has parsed a document and constructed a document tree, it must assign, to every element in the tree, and correspondingly to every box in the formatting structure, a value to every property that applies to the target media type.

The final value of a CSS property for a given element or box is the result of a multi-step calculation:

First, all the declared values applied to an element are collected, for each property on each element. There may be zero or many declared values applied to the element.
Cascading yields the cascaded value. There is at most one cascaded value per property per element.
Defaulting yields the specified value. Every element has exactly one specified value per property.
Resolving value dependencies yields the computed value. Every element has exactly one computed value per property.
Formatting the document yields the used value. An element only has a used value for a given property if that property applies to the element.
Finally, the used value is transformed to the actual value based on constraints of the display environment. As with the used value, there may or may not be an actual value for a given property on an element.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#value-stages]

csspvl'Spec

name::
* McsEngl.csspvl'Spec@cptIt,

_ADDRESS.WPG:
* https://www.w3.org/TR/2015/CR-css-values-3-20150611//

csspvl'Syntax

name::
* McsEngl.csspvl'Syntax@cptIt,
* McsEngl.csspvl'grammar@cptIt,
* McsEngl.csspvl'definition-syntax@cptIt,
* McsEngl.css-value-definition-syntax@cptIt,
* McsEngl.csspvl'grammar@cptIt,
* McsEngl.csspvl'definition-syntax@cptIt,
* McsEngl.css-value-definition-syntax@cptIt,

_DESCRIPTION:
A formal grammar, the CSS value definition syntax, is used for defining the set of valid values for a CSS property or function. In addition to this syntax, the set of valid values can be further restricted by semantic constraints (like, for a number to be strictly positive).
The definition syntax describes which values are allowed and the interactions between them. A component can be a keyword, some characters considered as a literal, or a value of a given CSS data type or of another CSS property.
[https://developer.mozilla.org/en-US/docs/Web/CSS/Value_definition_syntax]

SPECIFIC
csspvl.1.DECLARED

name::
* McsEngl.csspvl.1.DECLARED@cptIt,
* McsEngl.csspvl.declared@cptIt,
* McsEngl.css'declared-value@cptIt,
* McsEngl.csspvl.declared@cptIt,
* McsEngl.css'declared-value@cptIt,

_DESCRIPTION:
Each property declaration applied to an element contributes a declared value for that property associated with the element. See Filtering Declarations for details.
These values are then processed by the cascade to choose a single “winning value”.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#declared]

_DESCRIPTION:
In order to find the declared values, implementations must first identify all declarations that apply to each element. A declaration applies to an element if:
* It belongs to a style sheet that currently applies to this document.
* It is not qualified by a conditional rule [CSS3-CONDITIONAL] with a false condition.
* It belongs to a style rule whose selector matches the element. [SELECT] (Taking scoping into account, if necessary.)
* It is syntactically valid: the declaration’s property is a known property name, and the declaration’s value matches the syntax for that property.
The values of the declarations that apply form, for each property on each element, a list of declared values. The next section, the cascade, prioritizes these lists.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#filtering]

csspvl.2.CASCATED

name::
* McsEngl.csspvl.2.CASCATED@cptIt,
* McsEngl.csspvl.cascated@cptIt,
* McsEngl.css'cascated-value@cptIt,
* McsEngl.csspvl.cascated@cptIt,
* McsEngl.css'cascated-value@cptIt,

_DESCRIPTION:
The cascaded value represents the result of the-cascade#ql:css'cascade#: it is the declared value that wins the cascade (is sorted first in the output of the cascade). If the output of the cascade is an empty list, there is no cascaded value.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#cascaded]

css'cascading

name::
* McsEngl.css'cascading@cptIt,
* McsEngl.css'cascade@cptIt,
* McsEngl.css'cascading@cptIt,
* McsEngl.css'cascade@cptIt,
* McsEngl.css'cascading@cptIt,

_DESCRIPTION:
Cascading yields the cascaded value. There is at most one cascaded value per property per element.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#value-stages]

_DESCRIPTION:
The cascade takes a unordered list of declared values for a given property on a given element, sorts them by their declaration’s precedence as determined below, and outputs a single cascaded value.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#cascading]

csspvl.3.SPECIFIED

name::
* McsEngl.csspvl.3.SPECIFIED@cptIt,
* McsEngl.csspvl.specified@cptIt,
* McsEngl.css'specified-value@cptIt,
* McsEngl.csspvl.specified@cptIt,
* McsEngl.css'specified-value@cptIt,

_DESCRIPTION:
The specified value the value of a given property that the style sheet authors intended for that element. It is the result of putting the cascaded value through the defaulting processes, guaranteeing that a specified value exists for every property on every element.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#specified]

_DESCRIPTION:
The specified value the value of a given property that the style sheet authors intended for that element. It is the result of putting the cascaded value through the defaulting processes, guaranteeing that a specified value exists for every property on every element.
In many cases, the specified value is the cascaded value. However, if there is no cascaded value at all, the specified value is defaulted. The initial and inherit keywords are handled specially when they are the cascaded value of a property,
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#specified]

css'defaulting

name::
* McsEngl.css'defaulting@cptIt,
* McsEngl.css'defaulting@cptIt,

_DESCRIPTION:
Defaulting yields the specified value. Every element has exactly one specified value per property.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#value-stages]

csspvl.4.COMPUTED

name::
* McsEngl.csspvl.4.COMPUTED@cptIt,
* McsEngl.csspvl.computed@cptIt,
* McsEngl.css'computed-value@cptIt,
* McsEngl.csspvl.computed@cptIt,
* McsEngl.css'computed-value@cptIt,

_DESCRIPTION:
The computed value is the result of resolving the specified value as defined in the “Computed Value” line of the property definition table, generally absolutizing it in preparation for inheritance.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#computed]

_DESCRIPTION:
The computed value is the result of resolving the specified value as defined in the “Computed Value” line of the property definition table, generally absolutizing it in preparation for inheritance.
Note: The computed value is the value that is transferred from parent to child during inheritance. For historical reasons, it is not necessarily the value returned by the getComputedStyle() function.

A specified value can be either absolute (i.e., not relative to another value, as in red or 2mm) or relative (i.e., relative to another value, as in auto, 2em). Computing a relative value generally absolutizes it:
values with relative units (em, ex, vh, vw) must be made absolute by multiplying with the appropriate reference size
certain keywords (e.g., smaller, bolder) must be replaced according to their definitions
percentages on some properties must be multiplied by a reference value (defined by the property)
valid relative URLs must be resolved to become absolute.
See examples (f), (g) and (h) in the table below.

Note: In general, the computed value resolves the specified value as far as possible without laying out the document or performing other expensive or hard-to-parallelize operations, such as resolving network requests or retrieving values other than from the element and its parent.

The computed value exists even when the property does not apply (as defined by the “Applies To” line). However, some properties may change how they determine the computed value based on whether the property applies to the element.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#computed]

csspvl.5.USED

name::
* McsEngl.csspvl.5.USED@cptIt,

_DESCRIPTION.SHORT:
The used value is the result of taking the computed value and completing any remaining calculations to make it the absolute theoretical value used in the layout of the document. If the property does not apply to this element, then the element has no used value for that property.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#used]

name::
* McsEngl.csspvl.used@cptIt,
* McsEngl.css'used-value@cptIt,
* McsEngl.csspvl.used@cptIt,
* McsEngl.css'used-value@cptIt,

_DESCRIPTION:
The used value is the result of taking the computed value and completing any remaining calculations to make it the absolute theoretical value used in the layout of the document. If the property does not apply to this element, then the element has no used value for that property.

For example, a declaration of width: auto can’t be resolved into a length without knowing the layout of the element’s ancestors, so the computed value is auto, while the used value is an absolute length, such as 100px. [CSS21]

As another example, a <div> might have a computed break-before value of auto, but acquire a used break-before value of page by propagation from its first child. [CSS3-BREAK]

Lastly, if a property does not apply to an element, it has no used value; so, for example, the flex property has no used value on elements that aren’t flex items.

[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#used]

csspvl.6.ACTUAL

name::
* McsEngl.csspvl.6.ACTUAL@cptIt,
* McsEngl.csspvl.actual@cptIt,
* McsEngl.css'actual-value@cptIt,
* McsEngl.csspvl.actual@cptIt,
* McsEngl.css'actual-value@cptIt,
* McsEngl.css'winning-value@cptIt,

_DESCRIPTION:
A used value is in principle ready to be used, but a user agent may not be able to make use of the value in a given environment. For example, a user agent may only be able to render borders with integer pixel widths and may therefore have to approximate the used width. Also, the font size of an element may need adjustment based on the availability of fonts or the value of the font-size-adjust property. The actual value is the used value after any such adjustments have been made.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#used]

_DESCRIPTION:
A used value is in principle ready to be used, but a user agent may not be able to make use of the value in a given environment. For example, a user agent may only be able to render borders with integer pixel widths and may therefore have to approximate the used width. Also, the font size of an element may need adjustment based on the availability of fonts or the value of the font-size-adjust property. The actual value is the used value after any such adjustments have been made.
Note: By probing the actual values of elements, much can be learned about how the document is laid out. However, not all information is recorded in the actual values. For example, the actual value of the page-break-after property does not reflect whether there is a page break or not after the element. Similarly, the actual value of orphans does not reflect how many orphan lines there is in a certain element. See examples (j) and (k) in the table below.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#used]

csspvl.COMPONENT

name::
* McsEngl.csspvl.COMPONENT@cptIt,
* McsEngl.csspnv.component@cptIt,
* McsEngl.csspnv.component-type@cptIt,
* McsEngl.csspnv.component@cptIt,

_DESCRIPTION:
Component value types are designated in several ways:
1. keyword values (such as auto, disc, etc.), which appear literally, without quotes (e.g. auto)
2. basic data types, which appear between < and > (e.g., <length>, <percentage>, etc.).
3. types that have the same range of values as a property bearing the same name (e.g., <‘border-width’>, <‘background-attachment’>, etc.). In this case, the type name is the property name (complete with quotes) between the brackets. Such a type does not include CSS-wide keywords such as inherit.
4. non-terminals that do not share the same name as a property. In this case, the non-terminal name appears between < and >, as in <spacing-limit>. Notice the distinction between <border-width> and <‘border-width’>: the latter is defined as the value of the border-width property, the former requires an explicit expansion elsewhere. The definition of a non-terminal is typically located near its first appearance in the specification.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#component-types]

SPECIFIC

_SPECIFIC:

csspvl.combinator

name::
* McsEngl.csspvl.combinator@cptIt,
* McsEngl.csspnv.combinator@cptIt,
* McsEngl.csspvl.combinator@cptIt,
* McsEngl.csspnv.combinator@cptIt,

_DESCRIPTION:
2.2. Component value combinators
Component values can be arranged into property values as follows:
1. Juxtaposing components means that all of them must occur, in the given order.
2. A double ampersand (&&) separates two or more components, all of which must occur, in any order.
3. A double bar (||) separates two or more options: one or more of them must occur, in any order.
4. A bar (|) separates two or more alternatives: exactly one of them must occur.
5. Brackets ([ ]) are for grouping.
Juxtaposition is stronger than the double ampersand, the double ampersand is stronger than the double bar, and the double bar is stronger than the bar. Thus, the following lines are equivalent:

a b | c || d && e f
[ a b ] | [ c || [ d && [ e f ]]]
For re-orderable combinators (||, &&), ordering of the grammar does not matter: components in the same grouping may be interleaved in any order. Thus, the following lines are equivalent:

a || b || c
b || a || c
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#component-combinators]

csspvl.bar |

name::
* McsEngl.csspvl.bar |@cptIt,

_DESCRIPTION:
4. A bar (|) separates two or more alternatives: exactly one of them must occur.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#component-combinators]

csspvl.brackets [ ]

name::
* McsEngl.csspvl.brackets [ ]@cptIt,
* McsEngl.csspvl.group@cptIt,

_DESCRIPTION:
5. Brackets ([ ]) are for grouping.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#component-combinators]

csspvl.double-ampersand &&

name::
* McsEngl.csspvl.double-ampersand &&@cptIt,

_DESCRIPTION:
2. A double ampersand (&&) separates two or more components, all of which must occur, in any order.
Juxtaposition is stronger than the double ampersand, the double ampersand is stronger than the double bar, and the double bar is stronger than the bar.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#component-combinators]

csspvl.double-bar ||

name::
* McsEngl.csspvl.double-bar ||@cptIt,

_DESCRIPTION:
3. A double bar (||) separates two or more options: one or more of them must occur, in any order.
Juxtaposition is stronger than the double ampersand, the double ampersand is stronger than the double bar, and the double bar is stronger than the bar.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#component-combinators]

csspvl.custom-identifier

name::
* McsEngl.csspvl.custom-identifier@cptIt,
* McsEngl.csspnv.custom-identifier@cptIt,
* McsEngl.css'custom-identifier@cptIt,
* McsEngl.csspnv.custom-identifier@cptIt,

_DESCRIPTION:
3.2. Author-defined Identifiers: the <custom-ident> type

Some properties accept arbitrary author-defined identifiers as a component value. This generic data type is denoted by <custom-ident>, and represents any valid CSS identifier that would not be misinterpreted as a pre-defined keyword in that property’s value definition. Such identifiers are fully case-sensitive, even in the ASCII range (e.g. example and EXAMPLE are two different, unrelated user-defined identifiers).

The CSS-wide keywords are not valid <custom-ident>s. The default keyword is reserved and is also not a valid <custom-ident>. Specifications using <custom-ident> must specify clearly what other keywords are excluded from <custom-ident>, if any—for example by saying that any pre-defined keywords in that property’s value definition are excluded. Excluded keywords are excluded in all ASCII case permutations.

When parsing positionally-ambiguous keywords in a property value, a <custom-ident> production can only claim the keyword if no other unfulfilled production can claim it.

For example, the shorthand declaration animation: ease-in ease-out is equivalent to the longhand declarations animation-timing-function: ease-in; animation-name: ease-out;. ease-in is claimed by the <single-timing-function> production belonging to animation-timing-function, leaving ease-out to be claimed by the <custom-ident> production belonging to animation-name.
Note: When designing grammars with <custom-ident>, the <custom-ident> should always be "positionally unambiguous", so that it’s impossible to conflict with any keyword values in the property.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#custom-idents]

csspvl.multiplier

name::
* McsEngl.csspvl.multiplier@cptIt,
* McsEngl.csspnv.multiplier@cptIt,
* McsEngl.csspvl.multiplier@cptIt,
* McsEngl.csspnv.multiplier@cptIt,

_DESCRIPTION:
Every type, keyword, or bracketed group may be followed by one of the following modifiers:
1. An asterisk (*) indicates that the preceding type, word, or group occurs zero or more times.
2. A plus (+) indicates that the preceding type, word, or group occurs one or more times.
3. A question mark (?) indicates that the preceding type, word, or group is optional (occurs zero or one times).
4. A single number in curly braces ({A}) indicates that the preceding type, word, or group occurs A times.
5. A comma-separated pair of numbers in curly braces ({A,B}) indicates that the preceding type, word, or group occurs at least A and at most B times. The B may be omitted ({A,}) to indicate that there must be at least A repetitions, with no upper bound on the number of repetitions.
6. A hash mark (#) indicates that the preceding type, word, or group occurs one or more times, separated by comma tokens (which may optionally be surrounded by white space and/or comments). It may optionally be followed by the curly brace forms, above, to indicate precisely how many times the repetition occurs, like <length>#{1,4}.
An exclamation point (!) after a group indicates that the group is required and must produce at least one value; even if the grammar of the items within the group would otherwise allow the entire contents to be omitted, at least one component value must not be omitted.
For repeated component values (indicated by *, +, or#), UAs must support at least 20 repetitions of the component. If a property value contains more than the supported number of repetitions, the declaration must be ignored as if it were invalid.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#component-multipliers]

csspvl.asterisk *

name::
* McsEngl.csspvl.asterisk *@cptIt,

_DESCRIPTION:
1. An asterisk (*) indicates that the preceding type, word, or group occurs zero or more times.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#component-multipliers]

csspvl.plus +

name::
* McsEngl.csspvl.plus +@cptIt,

_DESCRIPTION:
2. A plus (+) indicates that the preceding type, word, or group occurs one or more times.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#component-multipliers]

csspvl.question-mark ?

name::
* McsEngl.csspvl.question-mark ?@cptIt,

_DESCRIPTION:
3. A question mark (?) indicates that the preceding type, word, or group is optional (occurs zero or one times).
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#component-multipliers]

csspvl.curly-braces-with-single-number {N}

name::
* McsEngl.csspvl.curly-braces-with-single-number {N}@cptIt,

_DESCRIPTION:
4. A single number in curly braces ({A}) indicates that the preceding type, word, or group occurs A times.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#component-multipliers]

csspvl.curly-braces-with-pair-of-numbers {A;B}

name::
* McsEngl.csspvl.curly-braces-with-pair-of-numbers {A;B}@cptIt,

_DESCRIPTION:
5. A comma-separated pair of numbers in curly braces ({A,B}) indicates that the preceding type, word, or group occurs at least A and at most B times. The B may be omitted ({A,}) to indicate that there must be at least A repetitions, with no upper bound on the number of repetitions.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#component-multipliers]

csspvl.hash-mark

name::
* McsEngl.csspvl.hash-mark@cptIt,

_DESCRIPTION:
6. A hash mark (#) indicates that the preceding type, word, or group occurs one or more times, separated by comma tokens (which may optionally be surrounded by white space and/or comments). It may optionally be followed by the curly brace forms, above, to indicate precisely how many times the repetition occurs, like <length>#{1,4}.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#component-multipliers]

csspvl.exclamation-point !

name::
* McsEngl.csspvl.exclamation-point !@cptIt,

_DESCRIPTION:
An exclamation point (!) after a group indicates that the group is required and must produce at least one value; even if the grammar of the items within the group would otherwise allow the entire contents to be omitted, at least one component value must not be omitted.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#component-multipliers]

csspvl.DATATYPE

name::
* McsEngl.csspvl.DATATYPE@cptIt,
* McsEngl.csspnv.datatype@cptIt,
* McsEngl.csspnv.value-type@cptIt,
* McsEngl.csspnv.datatype@cptIt,

_DESCRIPTION:
The value definition field of each CSS property can contain keywords, data types (which appear between < and >), and information on how they can be combined.
Generic data types (<length> being the most widely used) that can be used by many properties are described in this specification, while more specific data types (e.g., <spacing-limit>) are described in the corresponding modules.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#intro]

csspvl.DIMENSION (3px)

name::
* McsEngl.csspvl.DIMENSION (3px)@cptIt,

_GENERIC:
* measure#ql:measure@cptCore979#

name::
* McsEngl.csspnv.dimension@cptIt,
* McsEngl.csspnv.number-with-unit@cptIt,

_DESCRIPTION:
4.4. Numbers with Units: dimensions
A dimension is a <number> immediately followed by a unit identifier. It corresponds to the <dimension-token> production in the CSS Syntax Module [CSS3SYN]. Like keywords, unit identifiers are ASCII case-insensitive.
CSS uses dimensions to specify distances (<length>), durations (<time>), frequencies (<frequency>), resolutions (<resolution>), and other quantities.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#dimensions]

csspvl.dimension'Unit-of-size

name::
* McsEngl.csspvl.dimension'Unit-of-size@cptIt,
* McsEngl.css'Unit-of-size@cptIt,
* McsEngl.css'unit@cptIt,

Meet the Units
“Ems” (em): The “em” is a scalable unit that is used in web document media. An em is equal to the current font-size, for instance, if the font-size of the document is 12pt, 1em is equal to 12pt. Ems are scalable in nature, so 2em would equal 24pt, .5em would equal 6pt, etc. Ems are becoming increasingly popular in web documents due to scalability and their mobile-device-friendly nature.
Pixels (px): Pixels are fixed-size units that are used in screen media (i.e. to be read on the computer screen). One pixel is equal to one dot on the computer screen (the smallest division of your screen’s resolution). Many web designers use pixel units in web documents in order to produce a pixel-perfect representation of their site as it is rendered in the browser. One problem with the pixel unit is that it does not scale upward for visually-impaired readers or downward to fit mobile devices.
Points (pt): Points are traditionally used in print media (anything that is to be printed on paper, etc.). One point is equal to 1/72 of an inch. Points are much like pixels, in that they are fixed-size units and cannot scale in size.
Percent (%): The percent unit is much like the “em” unit, save for a few fundamental differences. First and foremost, the current font-size is equal to 100% (i.e. 12pt = 100%). While using the percent unit, your text remains fully scalable for mobile devices and for accessibility.
...
Generally, 1em = 12pt = 16px = 100%.
[http://kyleschaeffer.com/best-practices/css-font-size-em-vs-px-vs-pt-vs/]

csspvl.dimension.distance (length)

name::
* McsEngl.csspvl.dimension.distance (length)@cptIt,
* McsEngl.csspnv.distance@cptIt,
* McsEngl.csspnv.length@cptIt,
* McsEngl.csspnv.length@cptIt,

* McsEngl.css'length-pvl@cptIt,
* McsEngl.csspvl.distance@cptIt,
* McsEngl.csspvl.length@cptIt,

_DESCRIPTION:
Lengths refer to distance measurements and are denoted by <length> in the property definitions. A length is a dimension. However, for zero lengths the unit identifier is optional (i.e. can be syntactically represented as the <number> 0).

Properties may restrict the length value to some range. If the value is outside the allowed range, the declaration is invalid and must be ignored.

While some properties allow negative length values, this may complicate the formatting and there may be implementation-specific limits. If a negative length value is allowed but cannot be supported, it must be converted to the nearest value that can be supported.

In cases where the used length cannot be supported, user agents must approximate it in the actual value.

There are two types of length units: relative and absolute.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#lengths]

csspvl.length.ABSOLUTE

name::
* McsEngl.csspvl.length.ABSOLUTE@cptIt,

_DESCRIPTION:
The absolute length units are fixed in relation to each other and anchored to some physical measurement. They are mainly useful when the output environment is known. The absolute units consist of the physical units (in, cm, mm, pt, pc, q) and the visual angle unit (px):
unit    name          equivalence
csspvl.cm  csspvl.centimeters      1cm = 96px/2.54
csspvl.mm  csspvl.millimeters      1mm = 1/10th of 1cm
csspvl.q  csspvl.quarter_millimeters  1q = 1/40th of 1cm
csspvl.in  csspvl.inches      1in = 2.54cm = 96px
csspvl.pc  csspvl.picas        1pc = 1/6th of 1in
csspvl.pt  csspvl.points      1pt = 1/72th of 1in
csspvl.px  csspvl.pixels        1px = 1/96th of 1in
h1 { margin: 0.5in } /* inches */
h2 { line-height: 3cm } /* centimeters */
h3 { word-spacing: 4mm } /* millimeters */
h3 { letter-spacing: 1Q } /* quarter-millimeters */
h4 { font-size: 12pt } /* points */
h4 { font-size: 1pc } /* picas */
p { font-size: 12px } /* px */
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#absolute-lengths]

csspvl.length.RELATIVE

name::
* McsEngl.csspvl.length.RELATIVE@cptIt,

_DESCRIPTION:
Relative length units specify a length relative to another length. Style sheets that use relative units can more easily scale from one output environment to another.

The relative units are:
Informative Summary of Relative Units
unit    relative to
csspvl.em    font size of the element
csspvl.ex    x-height of the element’s font
csspvl.ch    width of the "0" (ZERO, U+0030) glyph in the element’s font
csspvl.rem  font size of the root element
csspvl.vw    1% of viewport’s width
csspvl.vh    1% viewport’s height
csspvl.vmin  1% of viewport’s smaller dimension
csspvl.vmax  1% of viewport’s larger dimension
Child elements do not inherit the relative values as specified for their parent; they inherit the computed values.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#relative-lengths]

csspvl.dimension.duration (time)

name::
* McsEngl.csspvl.dimension.duration (time)@cptIt,
* McsEngl.csspvl.time@cptIt,
* McsEngl.csspvl.duration@cptIt,

_DESCRIPTION:
6.2. Duration Units: the <time> type and s, ms units

Time values are dimensions denoted by <time>. The time unit identifiers are:

csspvl.s
Seconds.
csspvl.ms
Milliseconds. There are 1000 milliseconds in a second.
Properties may restrict the time value to some range. If the value is outside the allowed range, the declaration is invalid and must be ignored.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#time]

csspvl.dimension.frequency

name::
* McsEngl.csspvl.dimension.frequency@cptIt,
* McsEngl.csspvl.frequency@cptIt,

_DESCRIPTION:
6.3. Frequency Units: the <frequency> type and Hz, kHz units

Frequency values are dimensions denoted by <frequency>. The frequency unit identifiers are:
csspvl.Hz
Hertz. It represents the number of occurrences per second.
csspvl.kHz
KiloHertz. A kiloHertz is 1000 Hertz.
For example, when representing sound pitches, 200Hz (or 200hz) is a bass sound, and 6kHz (or 6khz) is a treble sound.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#frequency]

csspvl.dimension.resolution

name::
* McsEngl.csspvl.dimension.resolution@cptIt,
* McsEngl.csspvl.resolution@cptIt,

_DESCRIPTION:
6.4. Resolution Units: the <resolution> type and dpi, dpcm, dppx units

Resolution units are dimensions denoted by <resolution>. The resolution unit identifiers are:

csspvl.dpi
dots per inch
csspvl.dpcm
dots per centimeter
csspvl.dppx
dots per px unit
The <resolution> unit represents the size of a single "dot" in a graphical representation by indicating how many of these dots fit in a CSS in, cm, or px. For uses, see e.g. the resolution media query in [MEDIAQ] or the image-resolution property defined in [CSS3-IMAGES].

Note: Note that due to the 1:96 fixed ratio of CSS in to CSS px, 1dppx is equivalent to 96dpi. This corresponds to the default resolution of images displayed in CSS: see image-resolution.

The following @media rule uses Media Queries [MEDIAQ] to assign some special style rules to devices that use two or more device pixels per CSS px unit:
@media (min-resolution: 2dppx) { ... }
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#resolution]

csspvl.dimension.ANGLE

name::
* McsEngl.csspvl.dimension.ANGLE@cptIt,
* McsEngl.csspvl.angle@cptIt,

_DESCRIPTION:
6.1. Angle Units: the <angle> type and deg, grad, rad, turn units

Angle values are dimensions denoted by <angle>. The angle unit identifiers are:

csspvl.deg
Degrees. There are 360 degrees in a full circle.
csspvl.grad
Gradians, also known as "gons" or "grades". There are 400 gradians in a full circle.
csspvl.rad
Radians. There are 2p radians in a full circle.
csspvl.turn
Turns. There is 1 turn in a full circle.
For example, a right angle is 90deg or 100grad or 0.25turn or approximately 1.57rad.

When an angle denotes a direction, it must always be interpreted as a bearing angle, where 0deg is "up" or "north" on the screen, and larger angles are more clockwise (so 90deg is "right" or "east").

For example, in the linear-gradient() function, the <angle> that determines the direction of the gradient is interpreted as a bearing angle.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#angles]

csspvl.FUNCTIONAL

name::
* McsEngl.csspvl.FUNCTIONAL@cptIt,
* McsEngl.css'function-value@cptIt,
* McsEngl.csspvl.function@cptIt,
* McsEngl.csspvl.functional-value@cptIt, [https://www.w3.org/TR/2011/REC-css3-color-20110607/#foreground]
* McsEngl.css'function@cptIt,

_DESCRIPTION:
A functional notation is a type of component value that can represent more complex types or invoke special processing. The syntax starts with the name of the function immediately followed by a left parenthesis (i.e. a <function-token>) followed by the argument(s) to the notation followed by a right parenthesis. White space is allowed, but optional, immediately inside the parentheses. Functions can take multiple arguments, which are formatted similarly to a CSS property value.

Some legacy functional notations, such as rgba(), use commas unnecessarily, but generally commas are only used to separate items in a list, or pieces of a grammar that would be ambiguous otherwise. If a comma is used to separate arguments, whitespace is optional before and after the comma.

background: url(http://www.example.org/image);
color: rgb(100, 200, 50 );
content: counter(list-item) ". ";
width: calc(50% - 2em);
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#functional-notations]

csspvl.function.attr

name::
* McsEngl.csspvl.function.attr@cptIt,
* McsEngl.csspvl.attr-function@cptIt,
* McsEngl.css'attr-function@cptIt,

_DESCRIPTION:
8.3. Attribute References: attr()

The attr() function is allowed as a component value in properties applied to an element or pseudo-element. It returns the value of an attribute on the element. If used on a pseudo-element, it returns the value of the attribute on the pseudo-element’s originating element.

The computed value of the attr() expression is the value of the attribute with the specified name on the element, according to the rules given below.

Note: In CSS2.1 [CSS21], the attr() expression always returns a string. In CSS3, the attr() expression can return many different types. The attr() expression cannot return everything, for example it cannot do counters, named strings, quotes, or keyword values such as auto, nowrap, or baseline. This is intentional, as the intent of the attr() expression is not to make it possible to describe a presentational language’s formatting using CSS, but to enable CSS to take semantic data into account.

The new syntax for the attr() expression is:

attr( <attr-name> <type-or-unit>? [ , <attr-fallback> ]? )
where <attr-name> is a CSS qualified name (the qname production in [CSS3NAMESPACE]) that represents an attribute name. (In the absence of namespacing, this will just be a CSS identifier.)

The optional <type-or-unit> argument is a keyword drawn from the list below that tells the UA how to interpret the attribute value, and defines a type for the attr() expression. If omitted, string is implied.

The optional <attr-fallback> argument represents a fallback value, which is used if the named attribute is missing, or its value cannot be parsed into the given type or is invalid/out-of-range for the property. If it’s absent, the default value for the given <type-or-unit> (from the list below) is implied.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#attr-notation]

csspvl.function.calc

name::
* McsEngl.csspvl.function.calc@cptIt,
* McsEngl.csspvl.calc-function@cptIt,

_DESCRIPTION:
The calc() function allows mathematical expressions with addition (+), subtraction (-), multiplication (*), and division (/) to be used as component values. The calc() expression represents the result of the mathematical calculation it contains, using standard operator precedence rules. It can be used wherever <length>, <frequency>, <angle>, <time>, <number>, or <integer> values are allowed. Components of a calc() expression can be literal values, attr() or calc() expressions, or <percentage> values that resolve to one of the preceding types.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#calc-notation]

csspvl.function.toggle

name::
* McsEngl.csspvl.function.toggle@cptIt,
* McsEngl.csspvl.toggle-function@cptIt,

_DESCRIPTION:
The toggle() expression allows descendant elements to cycle over a list of values instead of inheriting the same value.
The following example makes <em> elements italic in general, but makes them normal if they’re inside something that’s italic:
em { font-style: toggle(italic, normal); }
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#toggle-notation]

csspvl.IMAGE

name::
* McsEngl.csspvl.IMAGE@cptIt,
* McsEngl.css'image-value@cptIt,
* McsEngl.csspvl.image@cptIt,
* McsEngl.css'image@cptIt,

_DESCRIPTION:
In CSS Levels 1 and 2, image values, such as those used in the ‘background-image’ property, could only be given by a single URL value. This module introduces additional ways of representing 2D images, for example as a list of URIs denoting fallbacks, or as a gradient.
[https://www.w3.org/TR/css3-images/#intro]

_SPEC:
* https://www.w3.org/TR/css3-images//

csspvl.INHERITED

name::
* McsEngl.csspvl.INHERITED@cptIt,
* McsEngl.css'inherited-value@cptIt,

_DESCRIPTION:
The inherited value of a property on an element is the computed value of the property on the element’s parent element.
For the root element, which has no parent element, the inherited value is the initial value of the property.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#inheriting]

_DESCRIPTION:
Inheritance propagates property values from parent elements to their children. The inherited value of a property on an element is the computed value of the property on the element’s parent element. For the root element, which has no parent element, the inherited value is the initial value of the property.

(Pseudo-elements inherit according to a fictional tag sequence described for each pseudo-element [SELECT].)

Some properties are inherited properties, as defined in their property definition table. This means that, unless the cascade results in a value, the value will be determined by inheritance.

A property can also be explicitly inherited. See the inherit keyword.

Note: Inheritance follows the document tree and is not intercepted by anonymous boxes, or otherwise affected by manipulations of the box tree.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#inheriting]

csspvl.INITIAL

name::
* McsEngl.csspvl.INITIAL@cptIt,
* McsEngl.css'initial-value@cptIt,

_DESCRIPTION:
Each property has an initial value, defined in the property’s definition table. If the property is not an inherited property, and the cascade does not result in a value, then the specified value of the property is its initial value.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#initial-values]

csspvl.KEYWORD

name::
* McsEngl.csspvl.KEYWORD@cptIt,
* McsEngl.csspvl.keyword@cptIt,

_DESCRIPTION:
The value definition field of each CSS property can contain keywords, data types (which appear between < and >), and information on how they can be combined.
Generic data types (<length> being the most widely used) that can be used by many properties are described in this specification, while more specific data types (e.g., <spacing-limit>) are described in the corresponding modules.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#intro]

csspvl.predefined-keyword

name::
* McsEngl.csspvl.predefined-keyword@cptIt,

_DESCRIPTION:
3.1. Pre-defined Keywords
In the value definition fields, keywords with a pre-defined meaning appear literally. Keywords are CSS identifiers and are interpreted ASCII case-insensitively (i.e., \[a-z] and [A-Z] are equivalent).

For example, here is the value definition for the border-collapse property:
Value: collapse | separate
And here is an example of its use:
table { border-collapse: separate }
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#keywords]

csspvl.css-wide-keyword

name::
* McsEngl.csspvl.css-wide-keyword@cptIt,
* McsEngl.csspvl.keyword.css-wide@cptIt,
* McsEngl.csspvl.css-wide-keyword@cptIt,

_DESCRIPTION:
3.1.1. CSS-wide keywords: initial, inherit and unset

As defined above, all properties accept the CSS-wide keywords, which represent value computations common to all CSS properties.

The initial keyword represents the value specified as the property’s initial value. The inherit keyword represents the computed value of the property on the element’s parent. The unset keyword acts as either inherit or initial, depending on whether the property is inherited or not. All of these keywords are normatively defined in the Cascade module. [CSS3CASCADE]

Other CSS specifications can define additional CSS-wide keywords.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#common-keywords]

csspvl.line-style

name::
* McsEngl.csspvl.line-style@cptIt,
* McsEngl.css'line-style-value@cptIt,
* McsEngl.csspvl.line-style@cptIt,
* McsEngl.css'line-style@cptIt,
* McsEngl.css'line-style-value@cptIt,

_SPECIFIC:
<line-style> = none | hidden | dotted | dashed | solid | double | groove | ridge | inset | outset

csspvl.line-style.dashed

name::
* McsEngl.csspvl.line-style.dashed@cptIt,

_DESCRIPTION:
‘dashed’
A series of square-ended dashes.
[https://www.w3.org/TR/css3-background/#border-style]

csspvl.line-style.dotted

name::
* McsEngl.csspvl.line-style.dotted@cptIt,

_DESCRIPTION:
‘dotted’
A series of round dots.
[https://www.w3.org/TR/css3-background/#border-style]

csspvl.line-style.double

name::
* McsEngl.csspvl.line-style.double@cptIt,

_DESCRIPTION:
‘double’
Two parallel solid lines with some space between them. (The thickness of the lines is not specified, but the sum of the lines and the space must equal ‘border-width’.)
[https://www.w3.org/TR/css3-background/#border-style]

csspvl.line-style.groove

name::
* McsEngl.csspvl.line-style.groove@cptIt,

_DESCRIPTION:
‘groove’
Looks as if it were carved in the canvas. (This is typically achieved by creating a “shadow” from two colors that are slightly lighter and darker than the ‘border-color’.)
[https://www.w3.org/TR/css3-background/#border-style]

csspvl.line-style.hidden

name::
* McsEngl.csspvl.line-style.hidden@cptIt,

_DESCRIPTION:
‘hidden’
Same as ‘none’, but has different behavior in the border conflict resolution rules for border-collapsed tables [CSS21].
[https://www.w3.org/TR/css3-background/#border-style]

csspvl.line-style.inset

name::
* McsEngl.csspvl.line-style.inset@cptIt,

_DESCRIPTION:
‘inset’
Looks as if the content on the inside of the border is sunken into the canvas. Treated as ‘ridge’ in the collapsing border model. [CSS21]
[https://www.w3.org/TR/css3-background/#border-style]

csspvl.line-style.none

name::
* McsEngl.csspvl.line-style.none@cptIt,

_DESCRIPTION:
‘none’
No border. Color and width are ignored (i.e., the border has width 0). Note this means that the initial value of ‘border-image-width’ will also resolve to zero.
[https://www.w3.org/TR/css3-background/#border-style]

csspvl.line-style.outset

name::
* McsEngl.csspvl.line-style.outset@cptIt,

_DESCRIPTION:
‘outset’
Looks as if the content on the inside of the border is coming out of the canvas. Treated as ‘groove’ in the collapsing border model. [CSS21]
[https://www.w3.org/TR/css3-background/#border-style]

csspvl.line-style.ridge

name::
* McsEngl.csspvl.line-style.ridge@cptIt,

_DESCRIPTION:
‘ridge’
Looks as if it were coming out of the canvas.
[https://www.w3.org/TR/css3-background/#border-style]

csspvl.line-style.solid

name::
* McsEngl.csspvl.line-style.solid@cptIt,

_DESCRIPTION:
‘solid’
A single line segment.
[https://www.w3.org/TR/css3-background/#border-style]

csspvl.line-width

name::
* McsEngl.csspvl.line-width@cptIt,
* McsEngl.css'line-width-value@cptIt,
* McsEngl.csspvl.line-width@cptIt,
* McsEngl.css'line-width@cptIt,
* McsEngl.css'line-width-value@cptIt,

_SPECIFIC:
<line-width> = <length#ql:cssppt.length#> | thin | medium | thick
The lengths corresponding to ‘thin’, ‘medium’ and ‘thick’ are not specified, but the values are constant throughout a document and thin = medium = thick. A UA could, e.g., make the thickness depend on the ‘medium’ font size: one choice might be 1, 3 & 5px when the ‘medium’ font size is 17px or less. Negative <length> values are not allowed.
[https://www.w3.org/TR/css3-background/#border-width]

csspvl.NUMERIC

name::
* McsEngl.csspvl.NUMERIC@cptIt,
* McsEngl.css'numeric-value@cptIt,
* McsEngl.csspvl.numeric@cptIt,
* McsEngl.css'numeric@cptIt,
* McsEngl.css'numeric-value@cptIt,

_DESCRIPTION:
4. Numeric Data Types
Properties may restrict numeric values to some range. If the value is outside the allowed range, the declaration is invalid and must be ignored.
CSS theoretically supports infinite precision and infinite ranges for all value types; however in reality implementations have finite capacity. UAs should support reasonably useful ranges and precisions.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#numeric-types]

csspvl.number.INTEGER

name::
* McsEngl.csspvl.number.INTEGER@cptIt,
* McsEngl.css'integer-value@cptIt,
* McsEngl.csspvl.integer@cptIt,
* McsEngl.css'integer@cptIt,
* McsEngl.css'integer-value@cptIt,

_DESCRIPTION:
4.1. Integers: the <integer> type
Integer values are denoted by <integer>. An integer is one or more decimal digits 0 through 9 and corresponds to a subset of the <number-token> production in the CSS Syntax Module [CSS3SYN]. The first digit of an integer may be immediately preceded by - or + to indicate the integer’s sign.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#integers]

csspvl.number.PERCENTAGE

name::
* McsEngl.csspvl.number.PERCENTAGE@cptIt,
* McsEngl.css'percentage-value@cptIt,
* McsEngl.csspvl.percentage@cptIt,
* McsEngl.csspvl'percentages@cptIt,
* McsEngl.csspvl.percentage@cptIt,
* McsEngl.css'percentage@cptIt,
* McsEngl.css'percentage-value@cptIt,

_DESCRIPTION:
4.3. Percentages: the <percentage> type
A percentage value is denoted by <percentage>, and consists of a <number> immediately followed by a percent sign %. It corresponds to the <percentage-token> production in the CSS Syntax Module [CSS3SYN].
Percentage values are always relative to another value, for example a length. Each property that allows percentages also defines the value to which the percentage refers. The value may be that of another property for the same element, a property for an ancestor element, or a value of the formatting context (e.g., the width of a containing block).
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#percentages]

csspvl.number.REAL

name::
* McsEngl.csspvl.number.REAL@cptIt,
* McsEngl.css'real-number-value@cptIt,
* McsEngl.csspvl.real-number@cptIt,
* McsEngl.css'real-number@cptIt,
* McsEngl.css'real-number-value@cptIt,

_DESCRIPTION:
4.2. Real Numbers: the <number> type
Number values are denoted by <number>. A number is either an <integer> or zero or more decimal digits followed by a dot (.) followed by one or more decimal digits and optionally an exponent composed of "e" or "E" and an integer. It corresponds to the <number-token> production in the CSS Syntax Module [CSS3SYN]. As with integers, the first character of a number may be immediately preceded by - or + to indicate the number’s sign.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#numbers]

csspvl.STRING

name::
* McsEngl.csspvl.STRING@cptIt,
* McsEngl.css'string-value@cptIt,
* McsEngl.csspvl.string@cptIt,
* McsEngl.css'quoted-string@cptIt,
* McsEngl.css'string-value@cptIt,

_DESCRIPTION:

_DESCRIPTION:
3.3. Quoted Strings: the <string> type

Strings are denoted by <string> and consist of a sequence of characters delimited by double quotes or single quotes. They correspond to the <string-token> production in the CSS Syntax Module [CSS3SYN].

Double quotes cannot occur inside double quotes, unless escaped (as "\"" or as "\22"). Analogously for single quotes ('\'' or '\27').
content: "this is a 'string'.";
content: "this is a \"string\".";
content: 'this is a "string".';
content: 'this is a \'string\'.'
It is possible to break strings over several lines, for aesthetic or other reasons, but in such a case the newline itself has to be escaped with a backslash (\). The newline is subsequently removed from the string. For instance, the following two selectors are exactly the same:

a[title="a not s\
o very long title"] {/*...*/}
a[title="a not so very long title"] {/*...*/}
Since a string cannot directly represent a newline, to include a newline in a string, use the escape "\A". (Hexadecimal A is the line feed character in Unicode (U+000A), but represents the generic notion of "newline" in CSS.)
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#strings]

csspvl.TEXTUAL

name::
* McsEngl.csspvl.TEXTUAL@cptIt,
* McsEngl.css'textual-value@cptIt,
* McsEngl.csspvl.textual@cptIt,
* McsEngl.css'textual-value@cptIt,

_DESCRIPTION:

_SPECIFIC:
* pre-defined-keyword##
* author-defined-identifier##
* quoted-string##
* URL##

csspvl.URL

name::
* McsEngl.csspvl.URL@cptIt,
* McsEngl.css'url-value@cptIt,
* McsEngl.csspvl.url@cptIt,
* McsEngl.css'resource-locator@cptIt,
* McsEngl.css'url@cptIt,
* McsEngl.css'url-value@cptIt,
* McsEngl.csspvl.url@cptIt,

_DESCRIPTION:

_DESCRIPTION:
3.4. Resource Locators: the <url> type

A URL is a pointer to a resource and is a functional notation denoted by <url>. The syntax of a <url> is:
<url> = url( <string> <url-modifier>* )
Below is an example of a URL being used as a background image:
body { background: url("http://www.example.com/pinkish.gif") }
In addition to the syntax defined above, a <url> can sometimes be written in other ways:

For legacy reasons, a <url> can be written without quotation marks around the URL itself. This syntax is specially-parsed, and produces a <url-token> rather than a function syntactically. [CSS3SYN]
Some CSS contexts, such as @import, allow a <url> to be represented by a <string> instead. This behaves identically to writing a url() function containing that string.
Because these alternate ways of writing a <url> are not functional notations, they cannot accept any <url-modifier>s.

Note: The special parsing rules for the legacy quotation mark-less <url> syntax means that parentheses, whitespace characters, single quotes (') and double quotes (") appearing in a URL must be escaped with a backslash, e.g. url(open\(parens), url(close\)parens). Depending on the type of URL, it might also be possible to write these characters as URL-escapes (e.g. url(open%28parens) or url(close%29parens)) as described in [URL]. (If written as a normal function containing a string, ordinary string escaping rules apply; only newlines and the character used to quote the string need to be escaped.)
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#urls]
===
A URL is a pointer to a resource and is a functional notation denoted by <url>. The syntax of a <url> is:
<url> = url( <string> <url-modifier>* )
Below is an example of a URL being used as a background image:
body { background: url("http://www.example.com/pinkish.gif") }
[https://www.w3.org/TR/css3-values/#urls]

csspvl.url'modifier

name::
* McsEngl.csspvl.url'modifier@cptIt,

_DESCRIPTION:
3.4.2. URL Modifiers
The url() function supports specifying additional <url-modifier>s, which change the meaning or the interpretation of the URL somehow. A <url-modifier> is either an <ident> or a function.
This specification does not define any <url-modifier>s, but other specs may do so.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#url-modifiers]

csspvl.url.relative

name::
* McsEngl.csspvl.url.relative@cptIt,

_DESCRIPTION:
3.4.1. Relative URLs

In order to create modular style sheets that are not dependent on the absolute location of a resource, authors should use relative URLs. Relative URLs (as defined in [URL]) are resolved to full URLs using a base URL. RFC 3986, section 3, defines the normative algorithm for this process. For CSS style sheets, the base URL is that of the style sheet itself, not that of the styled source document. Style sheets embedded within a document have the base URL associated with their container.

When a <url> appears in the computed value of a property, it is resolved to an absolute URL, as described in the preceding paragraph. The computed value of a URL that the UA cannot resolve to an absolute URL is the specified value.

For example, suppose the following rule:
body { background: url("tile.png") }
is located in a style sheet designated by the URL:

http://www.example.org/style/basic.css
The background of the source document’s <body> will be tiled with whatever image is described by the resource designated by the URL:

http://www.example.org/style/tile.png
The same image will be used regardless of the URL of the source document containing the <body>.
[https://www.w3.org/TR/2015/CR-css-values-3-20150611/#relative-urls]

csspnv'Animatability

name::
* McsEngl.csspnv'Animatability@cptIt,

csspnv'Applies-to-element

name::
* McsEngl.csspnv'Applies-to-element@cptIt,

_DESCRIPTION:
To which hml-elements applies.

csspnv'Browser-support

name::
* McsEngl.csspnv'Browser-support@cptIt,

_ADDRESS.WPG:
* http://www.w3schools.com/cssref/css3_browsersupport.asp,

csspnv'Declaration (property-name:property-value)

name::
* McsEngl.csspnv'Declaration (property-name:property-value)@cptIt,
* McsEngl.css'attribute@cptIt,
* McsEngl.css'declaration@cptIt,
* McsEngl.cssdeclaration@cptIt,
* McsEngl.css'declaration@cptIt,
* McsEngl.css'name-value-pair@cptIt, {2016-06-18}
* McsEngl.declaration-css@cptIt,

_WHOLE:
* css-declaration-block#ql:css'declaration_block_cpt#

_DESCRIPTION:
A declaration-block consists of a list of declarations in braces.
Each declaration itself consists of a property, a colon (:), a value.
If there are multiple declarations in a block, a semi-colon (;) must be inserted to separate each declaration.[2]
[http://en.wikipedia.org/wiki/Css]

_PART:
* property#ql:css'property#
* colon (:),
* value#ql:css'value#

csspnv'JavaScript-equivalence#ql:ljsstyle@cptIt#

name::
* McsEngl.csspnv'JavaScript-equivalence@cptIt,

csspnv'Optimization

name::
* McsEngl.csspnv'Optimization@cptIt,

Don't inline CSS attributes
Inlining CSS attributes on HTML elements (e.g., <p style=...>) should be avoided where possible, as this often leads to unnecessary code duplication. Further, inline CSS on HTML elements is blocked by default with Content Security Policy (CSP).
[https://developers.google.com/speed/docs/insights/OptimizeCSSDelivery]

csspnv'Spec

name::
* McsEngl.csspnv'Spec@cptIt,

SPECIFIC

name::
* McsEngl.cssprpt.specific@cptIt,
* McsEngl.css'property.specific@cptIt,
* McsEngl.csspnv.specific@cptIt,
* McsEngl.cssppt.specific@cptIt,

_SPECIFIC:
* http://css-tricks.com/almanac/properties//
* http://www.w3schools.com/cssref/default.asp,
===
* cssstl.align_content#linkL#,
* cssstl.align_items#linkL#,
* cssstl.align_self#linkL#,
* cssstl.animation#linkL#,
* cssstl.animation_delay#linkL#,
* cssstl.animation_direction#linkL#,
* cssstl.animation_duration#linkL#,
* cssstl.animation_fill_mode#linkL#,
* cssstl.animation_iteration_count#linkL#,
* cssstl.animation_name#linkL#,
* cssstl.animation_play_state#linkL#,
* cssstl.animation_timing_function#linkL#,
* cssstl.backface_visibility#linkL#,
* cssstl.background#linkL#,
* cssstl.background_attachment#linkL#,
* cssstl.background_clip#linkL#,
* cssstl.background_color#linkL#,
* cssstl.background_image#linkL#,
* cssstl.background_origin#linkL#,
* cssstl.background_position#linkL#,
* cssstl.background_repeat#linkL#,
* cssstl.background_size#linkL#,
* cssstl.border#linkL#,
* cssstl.border_bottom#linkL#,
* cssstl.border_bottom_color#linkL#,
* cssstl.border_bottom_left_radius#linkL#,
* cssstl.border_bottom_right_radius#linkL#,
* cssstl.border_bottom_style#linkL#,
* cssstl.border_bottom_width#linkL#,
* cssstl.border_collapse#linkL#,
* cssstl.border_color#linkL#,
* cssstl.border_image#linkL#,
* cssstl.border_image_outset#linkL#,
* cssstl.border_image_repeat#linkL#,
* cssstl.border_image_slice#linkL#,
* cssstl.border_image_source#linkL#,
* cssstl.border_image_width#linkL#,
* cssstl.border_left#linkL#,
* cssstl.border_left_color#linkL#,
* cssstl.border_left_style#linkL#,
* cssstl.border_left_width#linkL#,
* cssstl.border_radius#linkL#,
* cssstl.border_right#linkL#,
* cssstl.border_right_color#linkL#,
* cssstl.border_right_style#linkL#,
* cssstl.border_right_width#linkL#,
* cssstl.border_spacing#linkL#,
* cssstl.border_style#linkL#,
* cssstl.border_top#linkL#,
* cssstl.border_top_color#linkL#,
* cssstl.border_top_left_radius#linkL#,
* cssstl.border_top_right_radius#linkL#,
* cssstl.border_top_style#linkL#,
* cssstl.border_top_width#linkL#,
* cssstl.border_width#linkL#,
* cssstl.bottom#linkL#,
* cssstl.box_shadow#linkL#,
* cssstl.box_sizing#linkL#,
* cssstl.caption_side#linkL#,
* cssstl.clear#linkL#,
* cssstl.clip#linkL#,
* cssstl.color#linkL#,
* cssstl.column_count#linkL#,
* cssstl.column_fill#linkL#,
* cssstl.column_gap#linkL#,
* cssstl.column_rule#linkL#,
* cssstl.column_rule_color#linkL#,
* cssstl.column_rule_style#linkL#,
* cssstl.column_rule_width#linkL#,
* cssstl.column_span#linkL#,
* cssstl.column_width#linkL#,
* cssstl.columns#linkL#,
* content#ql:csscontent#,
* cssstl.counter_increment#linkL#,
* cssstl.counter_reset#linkL#,
* cssstl.cursor#linkL#,
* cssstl.direction#linkL#,
* cssstl.display#linkL#,
* cssstl.empty_cells#linkL#,
* cssstl.flex#linkL#,
* cssstl.flex_basis#linkL#,
* cssstl.flex_direction#linkL#,
* cssstl.flex_flow#linkL#,
* cssstl.flex_grow#linkL#,
* cssstl.flex_shrink#linkL#,
* cssstl.flex_wrap#linkL#,
* cssstl.float#linkL#,
* cssstl.font#linkL#,
* cssstl.@font_face#linkL#,
* cssstl.font_family#linkL#,
* cssstl.font_size#linkL#,
* cssstl.font_size_adjust#linkL#,
* cssstl.font_stretch#linkL#,
* cssstl.font_style#linkL#,
* cssstl.font_variant#linkL#,
* cssstl.font_weight#linkL#,
* cssstl.hanging_punctuation#linkL#,
* cssstl.height#linkL#,
* cssstl.icon#linkL#,
* cssstl.justify_content#linkL#,
* cssstl.@keyframes#linkL#,
* cssstl.left#linkL#,
* cssstl.letter_spacing#linkL#,
* cssstl.line_height#linkL#,
* cssstl.list_style#linkL#,
* cssstl.list_style_image#linkL#,
* cssstl.list_style_position#linkL#,
* cssstl.list_style_type#linkL#,
* cssstl.margin#linkL#,
* cssstl.margin_bottom#linkL#,
* cssstl.margin_left#linkL#,
* cssstl.margin_right#linkL#,
* cssstl.margin_top#linkL#,
* cssstl.max_height#linkL#,
* cssstl.max_width#linkL#,
* cssstl.@media#linkL#,
* cssstl.min_height#linkL#,
* cssstl.min_width#linkL#,
* cssstl.nav_down#linkL#,
* cssstl.nav_index#linkL#,
* cssstl.nav_left#linkL#,
* cssstl.nav_right#linkL#,
* cssstl.nav_up#linkL#,
* cssstl.opacity#linkL#,
* cssstl.order#linkL#,
* cssstl.outline#linkL#,
* cssstl.outline_color#linkL#,
* cssstl.outline_offset#linkL#,
* cssstl.outline_style#linkL#,
* cssstl.outline_width#linkL#,
* cssstl.overflow#linkL#,
* cssstl.overflow_x#linkL#,
* cssstl.overflow_y#linkL#,
* cssstl.padding#linkL#,
* cssstl.padding_bottom#linkL#,
* cssstl.padding_left#linkL#,
* cssstl.padding_right#linkL#,
* cssstl.padding_top#linkL#,
* cssstl.page_break_after#linkL#,
* cssstl.page_break_before#linkL#,
* cssstl.page_break_inside#linkL#,
* cssstl.perspective#linkL#,
* cssstl.perspective_origin#linkL#,
* cssstl.position#linkL#,
* cssstl.quotes#linkL#,
* cssstl.resize#linkL#,
* cssstl.right#linkL#,
* cssstl.tab_size#linkL#,
* cssstl.table_layout#linkL#,
* cssstl.text_align#linkL#,
* cssstl.text_align_last#linkL#,
* cssstl.text_decoration#linkL#,
* cssstl.text_decoration_color#linkL#,
* cssstl.text_decoration_line#linkL#,
* cssstl.text_decoration_style#linkL#,
* cssstl.text_indent#linkL#,
* cssstl.text_justify#linkL#,
* cssstl.text_overflow#linkL#,
* cssstl.text_shadow#linkL#,
* cssstl.text_transform#linkL#,
* cssstl.top#linkL#,
* cssstl.transform#linkL#,
* cssstl.transform_origin#linkL#,
* cssstl.transform_style#linkL#,
* cssstl.transition#linkL#,
* cssstl.transition_delay#linkL#,
* cssstl.transition_duration#linkL#,
* cssstl.transition_property#linkL#,
* cssstl.transition_timing_function#linkL#,
* cssstl.unicode_bidi#linkL#,
* cssstl.vertical_align#linkL#,
* cssstl.visibility#linkL#,
* cssstl.white_space#linkL#,
* cssstl.width#linkL#,
* cssstl.word_break#linkL#,
* cssstl.word_spacing#linkL#,
* cssstl.word_wrap#linkL#,
* cssstl.z_index#linkL#,
===
* cssprpt.A
* cssprpt.align_content
* cssprpt.align_items
* cssprpt.align_self
* cssprpt.animation
* cssprpt.appearance
* cssprpt.B
* cssprpt.backface_visibility
* cssprpt.background
* cssprpt.border
* cssprpt.border_collapse
* cssprpt.border_image
* cssprpt.border_radius
* cssprpt.bottom
* cssprpt.box_shadow
* cssprpt.box_sizing
* cssprpt.break_inside
* cssprpt.C
* cssprpt.clear
* cssprpt.clip_path
* cssprpt.color
* cssprpt.column_count
* cssprpt.column_fill
* cssprpt.column_gap
* cssprpt.column_rule
* cssprpt.column_span
* cssprpt.column_width
* cssprpt.columns
* cssprpt.content
* cssprpt.counter_increment
* cssprpt.counter_reset
* cssprpt.cursor
* cssprpt.D
* cssprpt.direction
* cssprpt.display
* cssprpt.F
* cssprpt.filter
* cssprpt.flex
* cssprpt.flex_basis
* cssprpt.flex_direction
* cssprpt.flex_flow
* cssprpt.flex_grow
* cssprpt.flex_shrink
* cssprpt.flex_wrap
* cssprpt.float
* cssprpt.font
* cssprpt.font_family
* cssprpt.font_size
* cssprpt.font_stretch
* cssprpt.font_style
* cssprpt.font_variant
* cssprpt.font_weight
* cssprpt.G
* cssprpt.grid_row / cssprpt.grid_column
* cssprpt.grid_row_align / cssprpt.grid_column_align
* cssprpt.grid_row_span / cssprpt.grid_column_span
* cssprpt.grid_rows / cssprpt.grid_columns
* cssprpt.H
* cssprpt.hanging_punctuation
* cssprpt.height
* cssprpt.hyphens
* cssprpt.J
* cssprpt.justify_content
* cssprpt.L
* cssprpt.left
* cssprpt.letter_spacing
* cssprpt.line_height
* cssprpt.list_style
* cssprpt.M
* cssprpt.margin
* cssprpt.max_height
* cssprpt.max_width
* cssprpt.min_height
* cssprpt.min_width
* cssprpt.O
* cssprpt.opacity
* cssprpt.order
* cssprpt.orphans
* cssprpt.outline
* cssprpt.overflow
* cssprpt.P
* cssprpt.padding
* cssprpt.page_break
* cssprpt.perspective
* cssprpt.perspective_origin
* cssprpt.pointer_events
* cssprpt.position
* cssprpt.Q
* cssprpt.quotes
* cssprpt.R
* cssprpt.resize
* cssprpt.right
* cssprpt.S
* cssprpt.scrollbar
* cssprpt.T
* cssprpt.tab_size
* cssprpt.text_align
* cssprpt.text_decoration
* cssprpt.text_indent
* cssprpt.text_overflow
* cssprpt.text_rendering
* cssprpt.text_shadow
* cssprpt.text_stroke
* cssprpt.text_transform
* cssprpt.top
* cssprpt.transform
* cssprpt.transform_origin
* cssprpt.transform_style
* cssprpt.transition
* cssprpt.transition_delay
* cssprpt.transition_duration
* cssprpt.transition_property
* cssprpt.transition_timing_function
* cssprpt.U
* cssprpt.unicode_bidi
* cssprpt.user_select
* cssprpt.V
* cssprpt.vertical_align
* cssprpt.visibility
* cssprpt.W
* cssprpt.white_space
* cssprpt.widows
* cssprpt.width
* cssprpt.word_break
* cssprpt.word_spacing
* cssprpt.Z
* cssprpt.z_index
* cssprpt.zoom

csspnv.generic.ANIMATABLE

name::
* McsEngl.csspnv.generic.ANIMATABLE@cptIt,
* McsEngl.csspnv.animatable@cptIt,

csspnv.generic.COLOR-RELATED

name::
* McsEngl.csspnv.generic.COLOR-RELATED@cptIt,
* McsEngl.csspnv.color@cptIt,
* McsEngl.css'color@cptIt,
* McsEngl.csscolor@cptIt,

_DESCRIPTION:
CSS beyond level 2 is a set of modules, divided up to allow the specifications to develop incrementally, along with their implementations. This specification is one of those modules.
This module describes CSS properties which allow authors to specify the foreground color and opacity of an element. This module also describes in detail the CSS <color> value type.
It not only defines the color-related properties and values that already exist in CSS1 and CSS2, but also defines new properties and values.
The Working Group doesn't expect that all implementations of CSS3 will implement all properties or values. Instead, there will probably be a small number of variants of CSS3, so-called "profiles". For example, it may be that only the profile for 32-bit color user agents will include all of the proposed color-related properties and values.
[https://www.w3.org/TR/2011/REC-css3-color-20110607/#introduction]

_SPEC:
* http://www.w3.org/TR/css3-color/
* https://www.w3.org/TR/2011/REC-css3-color-20110607//
CSS Color Module Level 3
W3C Recommendation 07 June 2011

SPECIFIC

_SPECIFIC:
* color##

cssclr.color

name::
* McsEngl.cssclr.color@cptIt,
* McsEngl.csspnv.foreground-color@cptIt,
* McsEngl.csspnv.color@cptIt,
* McsEngl.css'color@cptIt,
* McsEngl.csscolor@cptIt,
* McsEngl.csspnv.color@cptIt,

_DESCRIPTION:
This property describes the foreground color of an element's text content.
[https://www.w3.org/TR/2011/REC-css3-color-20110607/#foreground]

_DESCRIPTION:
3.1. Foreground color: the ‘color’ property
Name:    color
Value:    <color> | inherit
Initial:    depends on user agent
Applies to:  all elements
Inherited:  yes
Percentages:  N/A
Media:    visual
Computed value:  
The computed value for basic color keywords, RGB hex values and extended color keywords is the equivalent triplet of numerical RGB values, e.g. six digit hex value or rgb(...) functional value, with an alpha value of 1.
The computed value of the keyword ‘transparent’ is the quadruplet of all zero numerical RGBA values, e.g. rgba(0,0,0,0).
See the definition of the ‘currentColor’ for how its computed value is determined.
For all other values, the computed value is the specified value.
This property describes the foreground color of an element's text content. In addition it is used to provide a potential indirect value (currentColor) for any other properties that accept color values. If the ‘currentColor’ keyword is set on the ‘color’ property itself, it is treated as ‘color: inherit’.
There are different ways to specify lime green:
em { color: lime } /* color keyword */
em { color: rgb(0,255,0) } /* RGB range 0-255 */
[https://www.w3.org/TR/2011/REC-css3-color-20110607/#foreground]

_CODE.CSS:
color: rgb(255,255,204);
color: red; white;
color:#cccccc;
color:#ccc;
color: rgb(255,255,204);
color: rgba(255,255,255,0.8);
color: linear-gradient(to left,#888888,#dddddd 100%);

cssclr.linear-gradient

name::
* McsEngl.cssclr.linear-gradient@cptIt,

Formal grammar: linear-gradient( [ <angle> | to <side-or-corner> ,]? <color-stop> [, <color-stop>]+ )
\---------------------------------/ \----------------------------/
Definition of the gradient line List of color stops

where <side-or-corner> = [left | right] || [top | bottom]
and <color-stop> = <color> [ <percentage> | <length> ]?
linear-gradient( 45deg, blue, red ); /* A gradient on 45deg axis starting blue and finishing red */
linear-gradient( to left top, blue, red); /* A gradient going from the bottom right to the top left starting blue and
finishing red */

linear-gradient( 0deg, blue, green 40%, red ); /* A gradient going from the bottom to top, starting blue, being green after 40%
and finishing red */
[https://developer.mozilla.org/en-US/docs/Web/CSS/linear-gradient#Syntax]

cssclr.value

name::
* McsEngl.cssclr.value@cptIt,

cssclr.value.name

name::
* McsEngl.cssclr.value.name@cptIt,

_SPECIFIC:
AliceBlue  #F0F8FF,
AntiqueWhite  #FAEBD7,
Aqua  #00FFFF,
Aquamarine  #7FFFD4,
Azure  #F0FFFF,
Beige  #F5F5DC,
Bisque  #FFE4C4,
Black  #000000,
BlanchedAlmond  #FFEBCD,
Blue  #0000FF,
BlueViolet  #8A2BE2,
Brown  #A52A2A,
BurlyWood  #DEB887,
CadetBlue  #5F9EA0,
Chartreuse  #7FFF00,
Chocolate  #D2691E,
Coral  #FF7F50,
CornflowerBlue  #6495ED,
Cornsilk  #FFF8DC,
Crimson  #DC143C,
Cyan  #00FFFF,
DarkBlue  #00008B,
DarkCyan  #008B8B,
DarkGoldenRod  #B8860B,
DarkGray  #A9A9A9,
DarkGreen  #006400,
DarkKhaki  #BDB76B,
DarkMagenta  #8B008B,
DarkOliveGreen  #556B2F,
DarkOrange  #FF8C00,
DarkOrchid  #9932CC,
DarkRed  #8B0000,
DarkSalmon  #E9967A,
DarkSeaGreen  #8FBC8F,
DarkSlateBlue  #483D8B,
DarkSlateGray  #2F4F4F,
DarkTurquoise  #00CED1,
DarkViolet  #9400D3,
DeepPink  #FF1493,
DeepSkyBlue  #00BFFF,
DimGray  #696969,
DodgerBlue  #1E90FF,
FireBrick  #B22222,
FloralWhite  #FFFAF0,
ForestGreen  #228B22,
Fuchsia  #FF00FF,
Gainsboro  #DCDCDC,
GhostWhite  #F8F8FF,
Gold  #FFD700,
GoldenRod  #DAA520,
Gray  #808080,
Green  #008000,
GreenYellow  #ADFF2F,
HoneyDew  #F0FFF0,
HotPink  #FF69B4,
IndianRed  #CD5C5C,
Indigo  #4B0082,
Ivory  #FFFFF0,
Khaki  #F0E68C,
Lavender  #E6E6FA,
LavenderBlush  #FFF0F5,
LawnGreen  #7CFC00,
LemonChiffon  #FFFACD,
LightBlue  #ADD8E6,
LightCoral  #F08080,
LightCyan  #E0FFFF,
LightGoldenRodYellow  #FAFAD2,
LightGray  #D3D3D3,
LightGreen  #90EE90,
LightPink  #FFB6C1,
LightSalmon  #FFA07A,
LightSeaGreen  #20B2AA,
LightSkyBlue  #87CEFA,
LightSlateGray  #778899,
LightSteelBlue  #B0C4DE,
LightYellow  #FFFFE0,
Lime  #00FF00,
LimeGreen  #32CD32,
Linen  #FAF0E6,
Magenta  #FF00FF,
Maroon  #800000,
MediumAquaMarine  #66CDAA,
MediumBlue  #0000CD,
MediumOrchid  #BA55D3,
MediumPurple  #9370DB,
MediumSeaGreen  #3CB371,
MediumSlateBlue  #7B68EE,
MediumSpringGreen  #00FA9A,
MediumTurquoise  #48D1CC,
MediumVioletRed  #C71585,
MidnightBlue  #191970,
MintCream  #F5FFFA,
MistyRose  #FFE4E1,
Moccasin  #FFE4B5,
NavajoWhite  #FFDEAD,
Navy  #000080,
OldLace  #FDF5E6,
Olive  #808000,
OliveDrab  #6B8E23,
Orange  #FFA500,
OrangeRed  #FF4500,
Orchid  #DA70D6,
PaleGoldenRod  #EEE8AA,
PaleGreen  #98FB98,
PaleTurquoise  #AFEEEE,
PaleVioletRed  #DB7093,
PapayaWhip  #FFEFD5,
PeachPuff  #FFDAB9,
Peru  #CD853F,
Pink  #FFC0CB,
Plum  #DDA0DD,
PowderBlue  #B0E0E6,
Purple  #800080,
Red  #FF0000,
RosyBrown  #BC8F8F,
RoyalBlue  #4169E1,
SaddleBrown  #8B4513,
Salmon  #FA8072,
SandyBrown  #F4A460,
SeaGreen  #2E8B57,
SeaShell  #FFF5EE,
Sienna  #A0522D,
Silver  #C0C0C0,
SkyBlue  #87CEEB,
SlateBlue  #6A5ACD,
SlateGray  #708090,
Snow  #FFFAFA,
SpringGreen  #00FF7F,
SteelBlue  #4682B4,
Tan  #D2B48C,
Teal  #008080,
Thistle  #D8BFD8,
Tomato  #FF6347,
Turquoise  #40E0D0,
Violet  #EE82EE,
Wheat  #F5DEB3,
White  #FFFFFF,
WhiteSmoke  #F5F5F5,
Yellow  #FFFF00,
YellowGreen  #9ACD32
[http://www.w3schools.com/cssref/css_colornames.asp]

csspnv.generic.FONT-RELATED

name::
* McsEngl.csspnv.generic.FONT-RELATED@cptIt,
* McsEngl.css'font@cptIt,
* McsEngl.webfont@cptIt,
* McsEngl.css'font@cptIt,

_ADDRESS.WPG:
* https://www.fontspring.com/support/installing_webfonts/how-do-i-use-the-webfonts??
* https://developers.google.com/fonts/docs/getting_started,

_CODE.CSS:
font-family: sans-serif;
font-family: Georgia, "Times New Roman", Times, serif;

font-size: 130%;
font-size: x-small;

font-style: italic;

font-weight: bold;

csspnv.font-family

name::
* McsEngl.csspnv.font-family@cptIt,
* McsEngl.css'font-family@cptIt,

_DESCRIPTION:
3.1 Font family: the font-family property
Name:  font-family
Value:  [ <family-name> | <generic-family> ]#
Initial:  depends on user agent
Applies to:  all elements
Inherited:  yes
Percentages:  N/A
Media:  visual
Computed value:  as specified
Animatable:  no
This property specifies a prioritized list of font family names or generic family names. A font family defines a set of faces that vary in weight, width or slope. CSS uses the combination of a family name with other style attributes to select an individual face. Using this selection mechanism, rather than selecting a face via the style name as is often done in design applications, allows some degree of regularity in textual display when fallback occurs.
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#font-family-prop]

_CODE.CSS:
<link href="https://fonts.googleapis.com/css?family=Roboto+Mono" rel="stylesheet">
Specify in CSS
Use the following CSS rules to specify these families:
font-family: 'Roboto Mono', monospace;

_SPECIFIC:
the 'sans-serif' font family which is one of five generic font families which all users agents know.
[https://www.w3.org/TR/CSS2/intro.html#q2.0]

csspnv.font-family.family-name

name::
* McsEngl.csspnv.font-family.family-name@cptIt,

_DESCRIPTION:
<family-name>
The name of a font family of choice such as Helvetica or Verdana in the previous example.
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#family-name-value]

csspnv.font-family.generic-family

name::
* McsEngl.csspnv.font-family.generic-family@cptIt,

_DESCRIPTION:
<generic-family>
The following generic family keywords are defined: ‘serif’, ‘sans-serif’, ‘cursive’, ‘fantasy’, and ‘monospace’. These keywords can be used as a general fallback mechanism when an author's desired font choices are not available. As keywords, they must not be quoted. Authors are encouraged to append a generic font family as a last alternative for improved robustness.
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#generic-family-value]

csspnv.font-family.serif

name::
* McsEngl.csspnv.font-family.serif@cptIt,

_DESCRIPTION:
serif
Serif fonts represent the formal text style for a script. This often means but is not limited to glyphs that have finishing strokes, flared or tapering ends, or have actual serifed endings (including slab serifs). Serif fonts are typically proportionately-spaced. They often display a greater variation between thick and thin strokes than fonts from the ‘sans-serif’ generic font family. CSS uses the term ‘serif’ to apply to a font for any script, although other names may be more familiar for particular scripts, such as Mincho (Japanese), Sung, Song or Kai (Chinese), Batang (Korean). For Arabic, the Naskh style would correspond to ‘serif’ more due to its typographic role rather than its actual design style. Any font that is so described may be used to represent the generic ‘serif’ family.
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#generic-font-families]

csspnv.font-family.sans-serif

name::
* McsEngl.csspnv.font-family.sans-serif@cptIt,

_DESCRIPTION:
sans-serif
Glyphs in sans-serif fonts, as the term is used in CSS, are generally low contrast (vertical and horizontal stems have the close to the same thickness) and have stroke endings that are plain -- without any flaring, cross stroke, or other ornamentation. Sans-serif fonts are typically proportionately-spaced. They often have little variation between thick and thin strokes, compared to fonts from the ‘serif’ family. CSS uses the term ‘sans-serif’ to apply to a font for any script, although other names may be more familiar for particular scripts, such as Gothic (Japanese), Hei (Chinese), or Gulim (Korean). Any font that is so described may be used to represent the generic ‘sans-serif’ family.
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#generic-font-families]

csspnv.font-family.cursive

name::
* McsEngl.csspnv.font-family.cursive@cptIt,

_DESCRIPTION:
cursive
Glyphs in cursive fonts generally use a more informal script style, and the result looks more like handwritten pen or brush writing than printed letterwork. CSS uses the term ‘cursive’ to apply to a font for any script, although other names such as Chancery, Brush, Swing and Script are also used in font names.
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#generic-font-families]

csspnv.font-family.fantasy

name::
* McsEngl.csspnv.font-family.fantasy@cptIt,

_DESCRIPTION:
fantasy
Fantasy fonts are primarily decorative or expressive fonts that contain decorative or expressive representations of characters. These do not include Pi or Picture fonts which do not represent actual characters.
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#generic-font-families]

csspnv.font-family.monospace

name::
* McsEngl.csspnv.font-family.monospace@cptIt,

_DESCRIPTION:
monospace
The sole criterion of a monospace font is that all glyphs have the same fixed width. This is often used to render samples of computer code.
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#generic-font-families]

csspnv.font-weight

name::
* McsEngl.csspnv.font-weight@cptIt,
* McsEngl.css'font-weight@cptIt,

_DESCRIPTION:
3.2 Font weight: the font-weight property
Name:  font-weight
Value:  normal | bold | bolder | lighter | 100 | 200 | 300 | 400 | 500 | 600 | 700 | 800 | 900
Initial:  normal
Applies to:  all elements
Inherited:  yes
Percentages:  N/A
Media:  visual
Computed value:  numeric weight value (see description)
Animatable:  as font weight
The ‘font-weight’ property specifies the weight of glyphs in the font, their degree of blackness or stroke thickness.
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#font-weight-prop]

_SPECIFIC:
Values have the following meanings:

100 to 900
These values form an ordered sequence, where each number indicates a weight that is at least as dark as its predecessor. These roughly correspond to the commonly used weight names below:
100 - Thin
200 - Extra Light (Ultra Light)
300 - Light
400 - Normal
500 - Medium
600 - Semi Bold (Demi Bold)
700 - Bold
800 - Extra Bold (Ultra Bold)
900 - Black (Heavy)
normal
Same as ‘400’.
bold
Same as ‘700’.
bolder
Specifies a bolder weight than the inherited value.
lighter
Specifies a lighter weight than the inherited value.
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#font-weight-prop]

csspnv.font-stretch

name::
* McsEngl.csspnv.font-stretch@cptIt,
* McsEngl.css'font-stretch@cptIt,

_DESCRIPTION:
3.3 Font width: the font-stretch property
Name:  font-stretch
Value:  normal | ultra-condensed | extra-condensed | condensed | semi-condensed | semi-expanded | expanded | extra-expanded | ultra-expanded
Initial:  normal
Applies to:  all elements
Inherited:  yes
Percentages:  N/A
Media:  visual
Computed value:  as specified
Animatable:  as font stretch
The ‘font-stretch’ property selects a normal, condensed, or expanded face from a font family. Absolute keyword values have the following ordering, from narrowest to widest:

ultra-condensed
extra-condensed
condensed
semi-condensed
normal
semi-expanded
expanded
extra-expanded
ultra-expanded
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#font-stretch-prop]

csspnv.font-style

name::
* McsEngl.csspnv.font-style@cptIt,
* McsEngl.css'font-style@cptIt,

_DESCRIPTION:
3.4 Font style: the font-style property
Name:  font-style
Value:  normal | italic | oblique
Initial:  normal
Applies to:  all elements
Inherited:  yes
Percentages:  N/A
Media:  visual
Computed value:  as specified
Animatable:  no
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#font-style-prop]

csspnv.font-size

name::
* McsEngl.csspnv.font-size@cptIt,
* McsEngl.css'font-size@cptIt,

_DESCRIPTION:
3.5 Font size: the font-size property
Name:  font-size
Value:  <absolute-size> | <relative-size> | <length> | <percentage>
Initial:  medium
Applies to:  all elements
Inherited:  yes
Percentages:  refer to parent element's font size
Media:  visual
Computed value:  absolute length
Animatable:  as length
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#font-size-prop]

_CODE.CSS:
p { font-size: 12pt; }
blockquote { font-size: larger }
em { font-size: 150% }
em { font-size: 1.5em }

csspnv.font-size.absolute

name::
* McsEngl.csspnv.font-size.absolute@cptIt,

_DESCRIPTION:
<absolute-size>
An <absolute-size> keyword refers to an entry in a table of font sizes computed and kept by the user agent. Possible values are:
[ xx-small | x-small | small | medium | large | x-large | xx-large ]
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#absolute-size-value]

csspnv.font-size.relative

name::
* McsEngl.csspnv.font-size.relative@cptIt,

_DESCRIPTION:
<relative-size>
A <relative-size> keyword is interpreted relative to the table of font sizes and the computed ‘font-size’ of the parent element. Possible values are:
[ larger | smaller ]
For example, if the parent element has a font size of ‘medium’, a value of ‘larger’ will make the font size of the current element be ‘large’. If the parent element's size is not close to a table entry, the user agent is free to interpolate between table entries or round off to the closest one. The user agent may have to extrapolate table values if the numerical value goes beyond the keywords.
[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#absolute-size-value]

csspnv.font-

name::
* McsEngl.csspnv.font-@cptIt,
* McsEngl.css'font-weight@cptIt,

_DESCRIPTION:

[https://www.w3.org/TR/2013/CR-css-fonts-3-20131003/#font-weight-prop]

csspnv.generic.LAYOUT

name::
* McsEngl.csspnv.generic.LAYOUT@cptIt,
* McsEngl.css'layout@cptIt,
* McsEngl.css'layout-property@cptIt,
* McsEngl.csspnv.layout@cptIt,

csspnv.generic.ALIGN#ql:css'align#

name::
* McsEngl.csspnv.generic.ALIGN@cptIt,

csspnv.vertical-align

name::
* McsEngl.csspnv.vertical-align@cptIt,

_CODE.CSS:
//one line text
line-height: 50px;
===
//row in table
table {
border: 1px solid black;
height: 100px;
}
<table>
<tr>
<td id="myTd" style="vertical-align:middle;">Some example text</td>
</tr>
</table>

csspnv.bottom

name::
* McsEngl.csspnv.bottom@cptIt,
* McsEngl.cssbottom@cptIt,
* McsEngl.css'bottom@cptIt,
* McsEngl.css'property.bottom@cptIt,

_DESCRIPTION:
For absolutely positioned elements, the bottom property sets the bottom edge of an element to a unit above/below the bottom edge of its nearest positioned ancestor. Note: If an absolute positioned element has no positioned ancestors, it uses the document body, and moves along with page scrolling. Note: A "positioned" element is one whose position is anything except static.

For relatively positioned elements, the bottom property sets the bottom edge of an element to a unit above/below its normal position.

Note: If "position:static", the bottom property has no effect.

Default value:  auto
Inherited:  no
Animatable:  yes. Read about animatable Try it
Version:  CSS2
JavaScript syntax:  object.style.bottom="10px"
[http://www.w3schools.com/cssref/pr_pos_bottom.asp]

csspnv.clip

name::
* McsEngl.csspnv.clip@cptIt,

_DESCRIPTION:
What happens if an image is larger than its containing element? - The clip property lets you specify a rectangle to clip an absolutely positioned element. The rectangle is specified as four coordinates, all from the top-left corner of the element to be clipped.

Note: The clip property does not work if "overflow:visible".

Default value:  auto
Inherited:  no
Animatable:  yes. Read about animatable Try it
Version:  CSS2
JavaScript syntax:  object.style.clip="rect(0px,50px,50px,0px)"
[http://www.w3schools.com/cssref/pr_pos_clip.asp]

csspnv.display

name::
* McsEngl.csspnv.display@cptIt,
* McsEngl.cssdisplay@cptIt,
* McsEngl.css'display@cptIt,
* McsEngl.css'property.display@cptIt,

_DESCRIPTION:
display is CSS's most important property for controlling layout. Every element has a default display value depending on what type of element it is. The default for most elements is usually block or inline. A block element is often called a block-level element. An inline element is always just called an inline element.
[http://learnlayout.com/display.html]
===
Definition and Usage
The display property specifies the type of box an element should generate.
Default value:  inline
Inherited:  no
Version:  CSS1
JavaScript syntax:  object.style.display="inline"

_SPECIFIC:
* none      The element will generate no box at all
* block      The element will generate a block box (a line break before and after the element)
* inline      The element will generate an inline box (no line break before or after the element). This is default
* inline-block    The element will generate a block box, laid out as an inline box
* inline-table    The element will generate an inline box (like <table>, with no line break before or after)
* list-item      The element will generate a block box, and an inline box for the list marker
* run-in      The element will generate a block or inline box, depending on context
* table      The element will behave like a table (like <table>, with a line break before and after)
* table-caption    The element will behave like a table caption (like <caption>)
* table-cell    The element will behave like a table cell
* table-column    The element will behave like a table column
* table-column-group  The element will behave like a table column group (like <colgroup>)
* table-footer-group  The element will behave like a table footer row group
* table-header-group  The element will behave like a table header row group
* table-row      The element will behave like a table row
* table-row-group    The element will behave like a table row group
* inherit      Specifies that the value of the display property should be inherited from the parent element

_CODE.CSS:
One way to build a horizontal navigation bar is to specify the <li> elements as inline, in addition to the "standard" code above:
Example
li
{
display:inline;
}

Example explained:
* display:inline; - By default, <li> elements are block elements. Here, we remove the line breaks before and after each list item, to display them on one line
[http://www.w3schools.com/css/css_navbar.asp]

csspnv.display'box-layout

name::
* McsEngl.csspnv.display'box-layout@cptIt,
* McsEngl.css'layout@cptIt,
* McsEngl.css'positioning@cptIt,
* McsEngl.css'box-model@cptIt,
* McsEngl.css'box@cptIt,
* McsEngl.css'code.box@cptIt,

* McsEngl.css'box-layout@cptIt,
* McsEngl.css'box-model@cptIt,

_DESCRIPTION:
Layout: the way in which the parts of something are arranged or laid out.
[google dict]

_ADDRESS.WPG:
* http://learnlayout.com/toc.html,

_SPECIFIC:
CSS 2.1 defined four layout modes — algorithms which determine the size and position of boxes based on their relationships with their sibling and ancestor boxes:
* block layout, designed for laying out documents
* inline layout, designed for laying out text
* table layout, designed for laying out 2D data in a tabular format
* positioned layout, designed for very explicit positioning without much regard for other elements in the document
This module introduces a new layout mode, flex layout, which is designed for laying out more complex applications and webpages.
[http://www.w3.org/TR/css3-flexbox/#intro]

_ADDRESS.WPG:
* https://developer.mozilla.org/en-US/docs/Web/CSS/box_model,

_DESCRIPTION:
Each box has a content area (e.g., text, an image, etc.) and optional surrounding padding, border, and margin areas; the size of each area is specified by properties defined below.
[http://www.w3.org/TR/CSS21/box.html#h5o-1]

cssbox'content-area (0)

name::
* McsEngl.cssbox'content-area (0)@cptIt,
* McsEngl.css'content-area@cptIt,

_DESCRIPTION:
Each box has a content area (e.g., text, an image, etc.) and optional surrounding padding, border, and margin areas; the size of each area is specified by properties defined below.
[http://www.w3.org/TR/CSS21/box.html#h5o-1]

cssbox'padding-area (1)

name::
* McsEngl.cssbox'padding-area (1)@cptIt,

cssbox'border-area (2)

name::
* McsEngl.cssbox'border-area (2)@cptIt,

cssbox'margin-area (3)

name::
* McsEngl.cssbox'margin-area (3)@cptIt,

csspnv.display'relation-to-visibility

name::
* McsEngl.csspnv.display'relation-to-visibility@cptIt,

_DESCRIPTION:
Hide an Element - display:none or visibility:hidden?
Hiding an element can be done by setting the display property to none. The element will be hidden, and the page will be displayed as if the element is not there:
visibility:hidden; also hides an element.
However, the element will still take up the same space as before. The element will be hidden, but still affect the layout:
[http://www.w3schools.com/css/css_display_visibility.asp]

csspnv.display.BLOCK

name::
* McsEngl.csspnv.display.BLOCK@cptIt,
* McsEngl.css'line-box@cptIt,
* McsEngl.css'block-box@cptIt,
* McsEngl.cssbox.BLOCK@cptIt,
* McsEngl.cssbox.line@cptIt,

_DESCRIPTION:
* block  The element will generate a block box (a line break before and after the element)
===
The default for most elements is usually block or inline. A block element is often called a block-level element. An inline element is always just called an inline element.
div is the standard block-level element. A block-level element starts on a new line and stretches out to the left and right as far as it can. Other common block-level elements are p and form, and new in HTML5 are header, footer, section, and more.
[http://learnlayout.com/display.html]

_DESCRIPTION:
The element will generate a block box (a line break before and after the element)
===
In a web page, every element is rendered as a rectangular box. The box model describes how the element’s content, padding, border, and margin determine the space occupied by the element and its relation to other elements in the page.
Depending on the element’s display#ql:cssdisplay# property, its box may be one of two types: a block box or an inline box. The box model is applied differently to these two types. In this article we’ll see how the box model is applied to inline boxes, and how a new feature in the Firefox Developer Tools can help you visualize the box model for inline elements.
[https://hacks.mozilla.org/2015/03/understanding-inline-box-model/]

csspnv.display.FLEX

name::
* McsEngl.csspnv.display.FLEX@cptIt,
* McsEngl.css'flex-layout@cptIt,
* McsEngl.css'flexbox@cptIt,
* McsEngl.CSS-Flexible-Box-Layout-Module@cptIt,

_ADDRESS.WPG:
* http://www.w3.org/TR/css3-flexbox//
* http://umaar.github.io/css-flexbox-demo//
* http://css-tricks.com/old-flexbox-and-new-flexbox//
* http://weblog.bocoup.com/dive-into-flexbox//

_DESCRIPTION:
Flex layout is superficially similar to block layout. It lacks many of the more complex text- or document-centric properties that can be used in block layout, such as floats and columns. In return it gains simple and powerful tools for distributing space and aligning content in ways that webapps and complex web pages often need. The contents of a flex container:

can be laid out in any flow direction (leftwards, rightwards, downwards, or even upwards!)
can have their display order reversed or rearranged at the style layer (i.e., visual order can be independent of source and speech order)
can be laid out linearly along a single (main) axis or wrapped into multiple lines along a secondary (cross) axis
can “flex” their sizes to respond to the available space
can be aligned with respect to their container or each other
can be dynamically collapsed or uncollapsed along the main axis while preserving the container's cross size
[http://www.w3.org/TR/css3-flexbox/#overview]

css'flex-container

name::
* McsEngl.css'flex-container@cptIt,

_DESCRIPTION:
A Flex Container is declared by setting the display property of an element to either flex or inline-flex. With flex the container is a rendered as a block. With inline-flex the container is rendered inline.
[http://weblog.bocoup.com/dive-into-flexbox/#concepts-and-terminology]

_PROPERTY:
* align-content##
* align-items##
* flex-direction##
* flex-flow##
* flex-wrap##
* justify-content##

css'align-content

name::
* McsEngl.css'align-content@cptIt,

css'flex_axis

name::
* McsEngl.css'flex_axis@cptIt,

css'flex'cross_axis:
The axis perpendicular to the main axis is called the cross axis. It extends in the cross dimension.
[http://www.w3.org/TR/css3-flexbox/#box-model]

css'flex'main_axis:
The main axis of a flex container is the primary axis along which flex items are laid out. It extends in the main dimension.
[http://www.w3.org/TR/css3-flexbox/#box-model]
===
horizontal axis.

css'flex_direction

name::
* McsEngl.css'flex_direction@cptIt,

The flex-direction allows you to change the axes of the Flex Container. The default value of flex-direction is row. With this value, Flex Items are laid out in the direction of the writing-mode. Again, that means left-to-right, top-to-bottom by default. The other values are as follows:

row-reverse: The Main Start and Main End are swapped. If the writing-mode is left to right, Flex Items are now laid out right to left.
column: The Main Axis and the Cross Axis are swapped. If the writing system is horizontal, the Flex Items are now laid out vertically.
column-reverse: Same as column, but reversed.
[http://weblog.bocoup.com/dive-into-flexbox/#flex-direction]

css'flex_line

name::
* McsEngl.css'flex_line@cptIt,

Flex Items are positioned inside a Flex Container along a Flex Line. By default there is only one Flex Line per Flex Container.
[http://weblog.bocoup.com/dive-into-flexbox/#flex-lines]

css'flex-item

name::
* McsEngl.css'flex-item@cptIt,

Every child of a Flex Container is a Flex Item. There can be any number of Flex Items. Everything outside a Flex Container and inside a Flex Item is rendered as usual. In short, Flexbox defines how Flex Items are laid out inside of Flex Containers.
[http://weblog.bocoup.com/dive-into-flexbox/#concepts-and-terminology]

_PROPERTY:
* order
* margin
* align-self
* flex
* visibility

css'flex_item_no_effect

name::
* McsEngl.css'flex_item_no_effect@cptIt,

‘float’ and ‘clear’ have no effect on a flex item.
‘vertical-align’ has no effect on a flex item.
[http://www.w3.org/TR/css3-flexbox/#flex-containers]

css'flex_property

name::
* McsEngl.css'flex_property@cptIt,

Now we’re finally going to put the flex in Flexbox. flex specifies how a Flex Item will be prioritized when free space is being distributed on the Main Axis.

Let’s look at each of the common values one at a time.

flex: [number]
This syntax specifies a number that represents the ratio of free space that should be taken by this Flex Item.
.item1 {
-webkit-flex: 2;
flex: 2;
}
[http://weblog.bocoup.com/dive-into-flexbox/#flex]

_VALUE:
?flex: [number]
?flex: initial
?flex: auto
?flex: none
?advanced flex

css'flex_margin

name::
* McsEngl.css'flex_margin@cptIt,

Here we use margin: auto; to achieve the holy grail of CSS layout: true vertical centering:
[http://weblog.bocoup.com/dive-into-flexbox/#margin]

csspnv.display.INLINE

name::
* McsEngl.csspnv.display.INLINE@cptIt,
* McsEngl.css'inline-box@cptIt,
* McsEngl.cssbox.INLINE@cptIt,

_DESCRIPTION:
* inline  The element will generate an inline box (no line break before or after the element). This is default
===
The default for most elements is usually block or inline. A block element is often called a block-level element. An inline element is always just called an inline element.
span is the standard inline element. An inline element can wrap some text inside a paragraph <span> like this </span> without disrupting the flow of that paragraph. The a element is the most common inline element, since you use them for links.
[http://learnlayout.com/display.html]

_DESCRIPTION:
In a web page, every element is rendered as a rectangular box. The box model describes how the element’s content, padding, border, and margin determine the space occupied by the element and its relation to other elements in the page.
Depending on the element’s display property, its box may be one of two types: a block box or an inline box. The box model is applied differently to these two types. In this article we’ll see how the box model is applied to inline boxes, and how a new feature in the Firefox Developer Tools can help you visualize the box model for inline elements.
[https://hacks.mozilla.org/2015/03/understanding-inline-box-model/]

csspnv.display.INLINE-BLOCK

name::
* McsEngl.csspnv.display.INLINE-BLOCK@cptIt,
* McsEngl.csspnv.inline-block@cptIt,

_DESCRIPTION:
blocks one after the other in A-ROW, not one PER row as the-line-blocks.
[hmnSngo.2016-06-18]

_ADDRESS.WPG:
* http://www.w3schools.com/css/tryit.asp?filename=trycss_inline-block,

_DESCIRPTION:
You can create a grid of boxes that fills the browser width and wraps nicely. This has been possible for a long time using float, but now with inline-block it's even easier. inline-block elements are like inline elements but they can have a width and height. Let's look at examples of both approaches.

The Hard Way (using float)
.box {
float: left;
width: 200px;
height: 100px;
margin: 1em;
}
.after-box {
clear: left;
}
You can achieve the same effect using the inline-block value of the display property.

.box2 {
display: inline-block;
width: 200px;
height: 100px;
margin: 1em;
}
[http://learnlayout.com/display.html]

csspnv.display.NONE

name::
* McsEngl.csspnv.display.NONE@cptIt,

_DESCRIPTION:
Another common display value is none. Some specialized elements such as script use this as their default. It is commonly used with JavaScript to hide and show elements without really deleting and recreating them.

This is different from visibility. Setting display to none will render the page as though the element does not exist. visibility: hidden; will hide the element, but the element will still take up the space it would if it was fully visible.
[http://learnlayout.com/display.html]

csspnv.float

name::
* McsEngl.csspnv.float@cptIt,
* McsEngl.css'float@cptIt,

_DESCRIPTION:
Another CSS property used for layout is float. Float is intended for wrapping text around images, like this:
img {
float: right;
margin: 0 0 1em 1em;
}
[http://learnlayout.com/float.html]
===
Elements are floated horizontally, this means that an element can only be floated left or right, not up or down.

A floated element will move as far to the left or right as it can. Usually this means all the way to the left or right of the containing element.

The elements after the floating element will flow around it.

The elements before the floating element will not be affected.

If an image is floated to the right, a following text flows around it, to the left:
[http://www.w3schools.com/css/css_float.asp]

_CODE.CSS:
<style>
.thumbnail
{
float:left;
width:110px;
height:90px;
margin:5px;
}
</style>
==> sets images side by side

csspnv.clear#ql:cssppt.clear-cpt#

name::
* McsEngl.csspnv.clear@cptIt,

csspnv.position

name::
* McsEngl.csspnv.position@cptIt,
* McsEngl.css'property.Position@cptIt,
* McsEngl.css'position-property@cptIt,

_ADDRESS.WPG:
* http://learnlayout.com/position.html,
* http://www.barelyfitz.com/screencast/html-training/css/positioning//

_DESCRIPTION:
The position property is used to position an element.
Default value:    static
Inherited:      no
Version:      CSS2
JavaScript syntax:  object.style.position="absolute"
===
positioned elements (i.e. elements positioned using the position property).
[http://www.quackit.com/css/properties/css_z-index.cfm]

_SPECIFIC:
Value  Description
* fixed  Generates an absolutely positioned element, positioned relative to the browser window. The element's position is specified with the "left", "top", "right", and "bottom" properties
* absolute  Generates an absolutely positioned element, positioned relative to the first parent element that has a position other than static. The element's position is specified with the "left", "top", "right", and "bottom" properties
* relative  Generates a relatively positioned element, positioned relative to its normal position, so "left:20" adds 20 pixels to the element's LEFT position
* static  Default. No position, the element occurs in the normal flow (ignores any top, bottom, left, right, or z-index declarations)
* inherit  Specifies that the value of the position property should be inherited from the parent element

css'position.default (static)

name::
* McsEngl.css'position.default (static)@cptIt,
* McsEngl.css'position.static@cptIt,
* McsEngl.css'static-positioning@cptIt,

_DESCRIPTION:
static is the default value. An element with position: static; is not positioned in any special way. A static element is said to be not positioned and an element with its position set to anything else is said to be positioned.
[http://learnlayout.com/position.html]
===
Static positioned elements are not affected by the top, bottom, left, and right properties.
[http://www.w3schools.com/css/css_positioning.asp]

css'position.ABSOLUTE

name::
* McsEngl.css'position.ABSOLUTE@cptIt,

_DESCRIPTION:
An absolute position element is positioned relative to the first parent element that has a position other than static. If no such element is found, the containing block is <html>:

Example

h2
{
position:absolute;
left:100px;
top:150px;
}

Try it yourself »
Absolutely positioned elements are removed from the normal flow. The document and other elements behave like the absolutely positioned element does not exist.

Absolutely positioned elements can overlap other elements.
[http://www.w3schools.com/css/css_positioning.asp]
absolute is the trickiest position value. absolute behaves like fixed except relative to the nearest positioned ancestor instead of relative to the viewport. If an absolutely-positioned element has no positioned ancestors, it uses the document body, and still moves along with page scrolling. Remember, a "positioned" element is one whose position is anything except static.
[http://learnlayout.com/position.html]

css'position.FIXED

name::
* McsEngl.css'position.FIXED@cptIt,

_DESCRIPTION:
Fixed positioned elements are removed from the normal flow. The document and other elements behave like the fixed positioned element does not exist.
Fixed positioned elements can overlap other elements.
[http://www.w3schools.com/css/css_positioning.asp]
===
A fixed element is positioned relative to the viewport, which means it always stays in the same place even if the page is scrolled. As with relative, the top, right, bottom, and left properties are used.
I'm sure you've noticed that fixed element in the lower-right hand corner of the page. I'm giving you permission to pay attention to it now. Here is the CSS that puts it there:

.fixed {
position: fixed;
bottom: 0;
right: 0;
width: 200px;
background-color: white;
}
A fixed element does not leave a gap in the page where it would normally have been located.

Mobile browsers have surprisingly shaky support for fixed. Learn more about the situation here.
[http://learnlayout.com/position.html]

css'position.RELATIVE

name::
* McsEngl.css'position.RELATIVE@cptIt,

_DESCRIPTION:
A relative positioned element is positioned relative to its normal position.
The content of relatively positioned elements can be moved and overlap other elements, but the reserved space for the element is still preserved in the normal flow.
Relatively positioned elements are often used as container blocks for absolutely positioned elements.
[http://www.w3schools.com/css/css_positioning.asp]
===
relative behaves the same as static unless you add some extra properties.
Setting the top, right, bottom, and left properties of a relatively-positioned element will cause it to be adjusted away from its normal position. Other content will not be adjusted to fit into any gap left by the element.
.relative1 {
position: relative;
}
.relative2 {
position: relative;
top: -20px;
left: 20px;
background-color: white;
width: 500px;
}
[http://learnlayout.com/position.html]

csspnv.z-index

name::
* McsEngl.csspnv.z-index@cptIt,
* McsEngl.css'layer@cptIt,
* McsEngl.css'stacking-order@cptIt,
* McsEngl.css'z-index@cptIt,

_DESCRIPTION:
This confusion occurs because z-index will only work on an element whose position property has been explicitly set to absolute, fixed, or relative.
[http://coding.smashingmagazine.com/2009/09/15/the-z-index-css-property-a-comprehensive-look/]
===
I've found that changing the z-index programmatically with JavaScript to be best, since it minimizes weird interactions with the rest of the page (i.e. set the z-index higher when it is opened, and reset it back to default when it is closed)
[http://stackoverflow.com/questions/1070544/having-trouble-with-absolute-positioning-z-index-with-lists-and-tables-in-ie-6]
===
The z-index property specifies the stack order of an element.
An element with greater stack order is always in front of an element with a lower stack order.
Note: z-index only works on positioned elements (position:absolute, position:relative, or position:fixed).
Default value:  auto
Inherited:  no
Version:  CSS2
JavaScript syntax:  object.style.zIndex="1"

_ADDRESS.WPG:
* http://www.vanseodesign.com/css/css-stack-z-index//

csspnv.generic.LIST-RELATED

name::
* McsEngl.csspnv.generic.LIST-RELATED@cptIt,

_DESCRIPTION.SHORT:

name::
* McsEngl.css'list@cptIt,
* McsEngl.css'list-property@cptIt,

csspnv.list-style

name::
* McsEngl.csspnv.list-style@cptIt,

_CODE.CSS:
//Sets all the properties for a list in one declaration
list-style: none;

csspnv.list-style-image

name::
* McsEngl.csspnv.list-style-image@cptIt,

_CODE.CSS:
// Specifies an image as the list-item marker
list-style-image: url('button.png');

csspnv.list-style-position

name::
* McsEngl.csspnv.list-style-position@cptIt,

_CODE.CSS:
// Specifies if the list-item markers should appear inside or outside the content flow
list-style-position: inside;

csspnv.list-style-type

name::
* McsEngl.csspnv.list-style-type@cptIt,

_CODE.CSS:
// Specifies the type of list-item marker
list-style-type: none;
list-style-type: circle;
list-style-type: square;
list-style-type: upper-roman;
list-style-type: lower-alpha;
===
Value  Description  Play it
disc  Default value. The marker is a filled circle  Play it »
armenian  The marker is traditional Armenian numbering  Play it »
circle  The marker is a circle  Play it »
cjk-ideographic  The marker is plain ideographic numbers  Play it »
decimal  The marker is a number  Play it »
decimal-leading-zero  The marker is a number with leading zeros (01, 02, 03, etc.)  Play it »
georgian  The marker is traditional Georgian numbering  Play it »
hebrew  The marker is traditional Hebrew numbering  Play it »
hiragana  The marker is traditional Hiragana numbering  Play it »
hiragana-iroha  The marker is traditional Hiragana iroha numbering  Play it »
katakana  The marker is traditional Katakana numbering  Play it »
katakana-iroha  The marker is traditional Katakana iroha numbering  Play it »
lower-alpha  The marker is lower-alpha (a, b, c, d, e, etc.)  Play it »
lower-greek  The marker is lower-greek  Play it »
lower-latin  The marker is lower-latin (a, b, c, d, e, etc.)  Play it »
lower-roman  The marker is lower-roman (i, ii, iii, iv, v, etc.)  Play it »
none  No marker is shown  Play it »
square  The marker is a square  Play it »
upper-alpha  The marker is upper-alpha (A, B, C, D, E, etc.)  Play it »
upper-latin  The marker is upper-latin (A, B, C, D, E, etc.)  Play it »
upper-roman  The marker is upper-roman (I, II, III, IV, V, etc.)  Play it »
initial  Sets this property to its default value. Read about initial  Play it »
inherit  Inherits this property from its parent element. Read about inherit  
[http://www.w3schools.com/cssref/pr_list-style-type.asp]

csspnv.generic.SIZE-RELATED

name::
* McsEngl.csspnv.generic.SIZE-RELATED@cptIt,

csspnv.border

name::
* McsEngl.csspnv.border@cptIt,
* McsEngl.cssborder@cptIt,
* McsEngl.css'border@cptIt,
* McsEngl.css'border-area@cptIt,
* McsEngl.css'border@cptIt,

_DESCRIPTION:
Do NOT work on inline-elements.

_ADDRESS.WPG:
* https://developer.mozilla.org/en-US/docs/Web/CSS/CSS_Box_Model/Introduction_to_the_CSS_box_model,

_CODE.CSS:
- border: 1px solid#808080;
- border-left: 0.5em solid#b7e493; /*creates ON THE LEFT of the element a border with color solid */
- border-radius:5px;
===
- moz= mozila firefox
-webkit= chrome.
-moz-border-radius-topright: 1em; /* topright corder radius */
-moz-border-radius-bottomright: 1em;
-webkit-border-bottom-right-radius: 1em;
-webkit-border-top-right-radius: 1em;
border-top-right-radius: 1em;
border-bottom-right-radius: 1em;
===
border-right: 1px solid#C6EC8C;

border-bottom: 1px solid#C6EC8C;

border-bottom-width: 1px;
border-bottom-style: solid;
border-bottom-color:#C6EC8C;

===
border-image: url("border.png") 27 round stretch;
[http://www.w3.org/TR/css3-background/#border-images]

csspnv.border'width

name::
* McsEngl.csspnv.border'width@cptIt,

_DESCRIPTION:
Name:  border-width
Value:  <line-width#ql:cssval.line_width#>{1,4}
Initial:  (see individual properties)
Applies to:  all elements
Inherited:  no
Percentages:  see individual properties
Media:  visual
Computed value:  see individual properties
Animatable:  see individual properties
...
‘Border-width’ is a shorthand that sets the four ‘border-*-width’ properties. If it has four values, they set top, right, bottom and left in that order. If left is missing, it is the same as right; if bottom is missing, it is the same as top; if right is missing, it is the same as top.
[https://www.w3.org/TR/css3-background/#border-width]

_CODE.CSS:
- border-width: 1px;
- border-bottom-width: 1px;
- border: 1px solid#808080;

_SPECIFIC:
none
No border; the computed border width is zero.
hidden
Same as 'none', except in terms of border conflict resolution for table elements.
dotted
The border is a series of dots.
dashed
The border is a series of short line segments.
solid
The border is a single line segment.
double
The border is two solid lines. The sum of the two lines and the space between them equals the value of 'border-width'.
groove
The border looks as though it were carved into the canvas.
ridge
The opposite of 'groove': the border looks as though it were coming out of the canvas.
inset
The border makes the box look as though it were embedded in the canvas.
outset
The opposite of 'inset': the border makes the box look as though it were coming out of the canvas.
[http://www.w3.org/TR/CSS21/box.html]

csspnv.border'style

name::
* McsEngl.csspnv.border'style@cptIt,

_VALUE:
none
No border; the computed border width is zero.
hidden
Same as 'none', except in terms of border conflict resolution for table elements.
dotted
The border is a series of dots.
dashed
The border is a series of short line segments.
solid
The border is a single line segment.
double
The border is two solid lines. The sum of the two lines and the space between them equals the value of 'border-width'.
groove
The border looks as though it were carved into the canvas.
ridge
The opposite of 'groove': the border looks as though it were coming out of the canvas.
inset
The border makes the box look as though it were embedded in the canvas.
outset
The opposite of 'inset': the border makes the box look as though it were coming out of the canvas.
[http://www.w3.org/TR/CSS21/box.html]

csspnv.border'color

name::
* McsEngl.csspnv.border'color@cptIt,

_VALUE:
<color>
Specifies a color value.
transparent
The border is transparent (though it may have width).
[http://www.w3.org/TR/CSS21/box.html]

csspnv.border'image

name::
* McsEngl.csspnv.border'image@cptIt,

_CODE.CSS:
border-image: url("border.png") 27 round stretch;
[http://www.w3.org/TR/css3-background/#border-images]

csspnv.border'radius

name::
* McsEngl.csspnv.border'radius@cptIt,

_CODE.CSS:
- border-radius: 25px;
===
order-radius: 2em 1em 4em / 0.5em 3em;
is equivalent to:
border-top-left-radius: 2em 0.5em;
border-top-right-radius: 1em 3em;
border-bottom-right-radius: 4em 0.5em;
border-bottom-left-radius: 1em 3em;
[http://www.w3schools.com/cssref/css3_pr_border-radius.asp]

csspnv.box-sizing

name::
* McsEngl.csspnv.box-sizing@cptIt,
* McsEngl.csspnv.box-sizing@cptIt,
* McsEngl.css'box-sizing@cptIt,
* McsEngl.csspnv.box-sizing@cptIt,
* McsEngl.css'box-sizing@cptIt,

_DESCRIPTION:
Name:      box-sizing
Value:      content-box | border-box
Initial:      content-box
Applies to:    all elements that accept width or height
Inherited:      no
Percentages:    N/A
Media:      visual
Computed value:  specified value
Animatable:    no
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#box-sizing]
===
Over the generations, people realized that math is not fun, so a new CSS property called box-sizing was created. When you set box-sizing: border-box; on an element, the padding and border of that element no longer increase its width.
Here is the same example as the previous page, but with box-sizing: border-box; on both elements:

.simple {
width: 500px;
margin: 20px auto;
-webkit-box-sizing: border-box;
-moz-box-sizing: border-box;
box-sizing: border-box;
}

.fancy {
width: 500px;
margin: 20px auto;
padding: 50px;
border: solid blue 10px;
-webkit-box-sizing: border-box;
-moz-box-sizing: border-box;
box-sizing: border-box;
}
Since this is so much better, some authors want all elements on all their pages to always work this way. Such authors put the following CSS on their pages:

* {
-webkit-box-sizing: border-box;
-moz-box-sizing: border-box;
box-sizing: border-box;
}
This ensures that all elements are always sized in this more intuitive way.

Since box-sizing is pretty new, you should use the -webkit- and -moz- prefixes for now, as I have in these examples. This technique enables experimental features in specific browsers. Also, keep in mind that this one is IE8+.
[http://learnlayout.com/box-sizing.html]

csspnv.box-sizing.border-box

name::
* McsEngl.csspnv.box-sizing.border-box@cptIt,
* McsEngl.csspnv.box-sizing.border-box@cptIt,
* McsEngl.css'border-box@cptIt,
* McsEngl.css'box-sizing.border-box@cptIt,
* McsEngl.csspnv.border-box@cptIt,
* McsEngl.csspnv.box-sizing.border-box@cptIt,
* McsEngl.css'box-sizing.border-box@cptIt,
* McsEngl.css'border-box@cptIt,

_DESCRIPTION:
border-box
Length and percentages values for width and height (and respective min/max properties) on this element determine the border box of the element. That is, any padding or border specified on the element is laid out and drawn inside this specified width and height. The content width and height are calculated by subtracting the border and padding widths of the respective sides from the specified width and height properties. As the content width and height cannot be negative ([CSS21], section 10.2), this computation is floored at 0. Used values, as exposed for instance through getComputedStyle(), also refer to the border box.
Note: This is the behavior of width and height as commonly implemented by legacy HTML user agents for replaced elements and input elements.
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#valdef-box-sizing-border-box]

csspnv.box-sizing.content-box

name::
* McsEngl.csspnv.box-sizing.content-box@cptIt,
* McsEngl.csspnv.box-sizing.content-box@cptIt,
* McsEngl.css'box-sizing.content-box@cptIt,
* McsEngl.csspnv.box-sizing.content-box@cptIt,
* McsEngl.css'box-sizing.content-box@cptIt,
* McsEngl.csspnv.content-box@cptIt,
* McsEngl.css'content-box@cptIt,

_DESCRIPTION:
content-box
This is the behavior of width and height as specified by CSS2.1. The specified width and height (and respective min/max properties) apply to the width and height respectively of the content box of the element. The padding and border of the element are laid out and drawn outside the specified width and height.
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#valdef-box-sizing-content-box]

csspnv.height

name::
* McsEngl.csspnv.height@cptIt,

_CODE.CSS:
height: calc(100% - 26px);

_Height_100_percent_minus_x_pixels:
position: absolute;
top:65px;
bottom:0px;
[http://stackoverflow.com/questions/1192783/css-how-to-set-div-height-100-minus-npx]

csspnv.margin

name::
* McsEngl.csspnv.margin@cptIt,
* McsEngl.css'margin@cptIt,
* McsEngl.css'margin-area@cptIt,
* McsEngl.cssmargin@cptIt,
* McsEngl.css'margin@cptIt,

_DESCRIPTION:
The margin area extends the border area with an empty area used to separate the element from its neighbors. It is the area inside the margin edge, and its dimensions are the margin-box width and the margin-box height.
The size of the margin area is controlled using the margin-top, margin-right, margin-bottom, margin-left and the shorthand margin CSS properties.
[https://developer.mozilla.org/en-US/docs/Web/CSS/CSS_Box_Model/Introduction_to_the_CSS_box_model]

_DESCRIPTION:
An element has four sides: right, left, top and bottom. The margin is the distance from each side to the neighboring element (or the borders of the document).
[http://html.net/tutorials/css/lesson10.php]

_ADDRESS.WPG:
* https://developer.mozilla.org/en-US/docs/Web/CSS/CSS_Box_Model/Introduction_to_the_CSS_box_model,

_CODE.CSS:
margin: 25px 50px;
// top and bottom margins are 25px
//right and left margins are 50px
===
margin: 0;
margin-top: 50px;
margin-bottom: 20px;
===
margin:25px;
// all four margins are 25px
===
margin:25px 50px 75px 100px;
// top margin is 25px, right margin is 50px, bottom margin is 75px, left margin is 100px
===
margin: 20px auto;
=> Setting the width of a block-level element will prevent it from stretching out to the edges of its container to the left and right. Then, you can set the left and right margins to auto to horizontally center that element within its container. The element will take up the width you specify, then the remaining space will be split evenly between the two margins.
The only problem occurs when the browser window is narrower than the width of your element. The browser resolves this by creating a horizontal scrollbar on the page.
[http://learnlayout.com/margin-auto.html]

csspnv.padding

name::
* McsEngl.csspnv.padding@cptIt,
* McsEngl.css'padding@cptIt,
* McsEngl.css'padding-area@cptIt,

_DESCRIPTION:
It is the area after border-area, before content-area.

_ADDRESS.WPG:
* https://developer.mozilla.org/en-US/docs/Web/CSS/CSS_Box_Model/Introduction_to_the_CSS_box_model,

_CODE.CSS:
padding: 0 0 20px 0; /*top right bottom left*/
padding: 5px;
padding: 5px 5px 5px 5px;
padding: 10px 40px; /* 10 40 10 40 */
padding-bottom: 5px;

csspnv.resize

name::
* McsEngl.csspnv.resize@cptIt,
* McsEngl.csspnv.resize@cptIt,
* McsEngl.css'resize-property@cptIt,
* McsEngl.csspnv.resize@cptIt,
* McsEngl.css'resize-property@cptIt,

_DESCRIPTION:
The resize property allows the author to specify whether or not an element is resizable by the user, and if so, along which axis/axes.
Name:  resize
Value:  none | both | horizontal | vertical
Initial:  none
Applies to:  elements with overflow other than visible
Inherited:  no
Percentages:  N/A
Media:  visual
Computed value:  specified value.
Animatable:  no
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#resize]

csspnv.resize.none

name::
* McsEngl.csspnv.resize.none@cptIt,

_DESCRIPTION:
none
The UA does not present a resizing mechanism on the element, and the user is given no direct manipulation mechanism to resize the element.
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#resize]

csspnv.resize.both

name::
* McsEngl.csspnv.resize.both@cptIt,

_DESCRIPTION:
both
The UA presents a bidirectional resizing mechanism to allow the user to adjust both the height and the width of the element.
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#resize]

csspnv.resize.horizontal

name::
* McsEngl.csspnv.resize.horizontal@cptIt,

_DESCRIPTION:
horizontal
The UA presents a unidirectional horizontal resizing mechanism to allow the user to adjust only the width of the element.
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#resize]

csspnv.resize.vertical

name::
* McsEngl.csspnv.resize.vertical@cptIt,

_DESCRIPTION:
vertical
The UA presents a unidirectional vertical resizing mechanism to allow the user to adjust only the height of the element.
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#resize]

csspnv.width

name::
* McsEngl.csspnv.width@cptIt,
* McsEngl.css'property.WIDTH@cptIt,
* McsEngl.csswidth@cptIt,

_ADDRESS.WPG:
* http://learnlayout.com/box-model.html,

_DESCRIPTION:
Width and Height of an Element
Important: When you specify the width and height properties of an element with CSS, you are just setting the width and height of the content-area#ql:css'content_area#. To know the full size of the element, you must also add the padding, border and margin.

The total width of the element in the example below is 300px:
width:250px;
padding:10px;
border:5px solid gray;
margin:10px;
=>
Let's do the math:
250px (width)
+ 20px (left and right padding)
+ 10px (left and right border)
+ 20px (left and right margin)
= 300px
[http://www.w3schools.com/css/css_boxmodel.asp]

_CODE.CSS:
p {
max-width: 100px;
}

csspnv.generic.SHORTHAND

name::
* McsEngl.csspnv.generic.SHORTHAND@cptIt,

_DESCRIPTION.SHORT:
Some properties are shorthand properties, meaning that they allow authors to specify the values of several properties with a single property. A shorthand property sets all of its longhand sub-properties, exactly as if expanded in place.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#shorthand]

name::
* McsEngl.css'shorthand@cptIt,
* McsEngl.css'shorthand-property@cptIt,

_DESCRIPTION:
Some properties are shorthand properties, meaning that they allow authors to specify the values of several properties with a single property. A shorthand property sets all of its longhand sub-properties, exactly as if expanded in place.
When values are omitted from a shorthand form, unless otherwise defined, each “missing” sub-property is assigned its initial value.

This means that a shorthand property declaration always sets all of its sub-properties, even those that are not explicitly set. Carelessly used, this might result in inadvertently resetting some sub-properties. Carefully used, a shorthand can guarantee a “blank slate” by resetting sub-properties inadvertently cascaded from other sources.
For example, writing background: green rather than background-color: green ensures that the background color overrides any earlier declarations that might have set the background to an image with background-image.

For example, the CSS Level 1 font property is a shorthand property for setting font-style, font-variant, font-weight, font-size, line-height, and font-family all at once. The multiple declarations of this example:
h1 {
font-weight: bold;
font-size: 12pt;
line-height: 14pt;
font-family: Helvetica;
font-variant: normal;
font-style: normal;
}
can therefore be rewritten as

h1 { font: bold 12pt/14pt Helvetica }
As more font sub-properties are introduced into CSS, the shorthand declaration resets those to their initial values as well.

In some cases, a shorthand might have different syntax or special keywords that don’t directly correspond to values of its sub-properties. (In such cases, the shorthand will explicitly define the expansion of its values.)

In other cases, a property might be a reset-only sub-property of the shorthand: Like other sub-properties, it is reset to its initial value by the shorthand when unspecified, but the shorthand might not include syntax to set the sub-property to any of its other values. For example, the border shorthand resets border-image to its initial value of none, but has no syntax to set it to anything else. [CSS3BG]

If a shorthand is specified as one of the CSS-wide keywords [CSS3VAL], it sets all of its sub-properties to that keyword, including any that are reset-only sub-properties. (Note that these keywords cannot be combined with other values in a single declaration, not even in a shorthand.)

Declaring a shorthand property to be !important is equivalent to declaring all of its sub-properties to be !important.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#shorthand]

csspnv.generic.TEXT-RELATED

name::
* McsEngl.csspnv.generic.TEXT-RELATED@cptIt,
* McsEngl.csspnv.text@cptIt,
* McsEngl.css'text@cptIt,

_DESCRIPTION:
Text Properties
The number in the "CSS" column indicates in which CSS version the property is defined
(CSS1 or CSS2).
Property  Description      Values        CSS
color    Sets the color of a text    color        1
direction    Sets the text direction    ltr|rtl        2
line-height  Sets the distance between lines  normal|number|length|%  1
letter-spacing  Increase or decrease the space
   between characters    normal|length      1
text-align  Aligns the text in an element  left|right|center|justify    1
text-decoration  Adds decoration to text    none|underline|overline
           line-through|blink    1
text-indent  Indents the first line of text
   in an element      length|%      1
text-shadow          none|color|length  
text-transform  Controls the letters
   in an element      none|capitalize|uppercase
           lowercase      1
* unicode-bidi   normal  embed bidi-override  2
* vertical-align  Sets the vertical alignment of an element  baseline
sub
super
top
text-top
middle
bottom
text-bottom
length
%  1
* white-space  Sets how white space inside an element is handled  normal
pre
nowrap  1
* word-spacing  Increase or decrease the space between words  normal
length  1
[http://www.w3schools.com/cssref/default.asp#text]

csspnv.letter-spacing

name::
* McsEngl.csspnv.letter-spacing@cptIt,
* McsEngl.css'letter-spacing@cptIt,

_VALUE:
3px, -3px,

csspnv.line-height

name::
* McsEngl.csspnv.line-height@cptIt,
* McsEngl.css'line-height@cptIt,

* McsEngl.css'line-height@cptIt,
* McsEngl.line-height-css@cptIt,

_VALUE:
Value  Description
normal  A normal line height. This is default
number  A number that will be multiplied with the current font size to set the line height
length  A fixed line height in px, pt, cm, etc.
%    A line height in percent of the current font size
initial  Sets this property to its default value.
inherit  Inherits this property from its parent element.
[http://www.w3schools.com/cssref/pr_dim_line-height.asp]

_CODE.CSS:
div {
line-height: initial;
}

csspnv.text-align

name::
* McsEngl.csspnv.text-align@cptIt,
* McsEngl.css'text-align@cptIt,

Value:
Text can be centered, or aligned to the left or right, or justified.

_CODE.CSS:
text-align:center;
===
div {
border: 1px solid black;
padding: 10px;
width: 300px;
height: 200px;
text-align: justify;
}

csspnv.text-decoration

name::
* McsEngl.csspnv.text-decoration@cptIt,
* McsEngl.css'text-decoration@cptIt,

_DESCRIPTION:
The text-decoration property is used to set or remove decorations from text.
The text-decoration property is mostly used to remove underlines from links for design purposes:
Example
a {text-decoration:none;}

_SPECIFIC:
* none;
* blink;
* overline;
* line-through;
* underline;

_CODE.CSS:
h1 {text-decoration:overline;}
h2 {text-decoration:line-through;}
h3 {text-decoration:underline;}
h4 {text-decoration:blink;}

csspnv.text-indent

name::
* McsEngl.csspnv.text-indent@cptIt,
* McsEngl.css'text-indent@cptIt,

_DESCRIPTION:
Text Indentation
The text-indentation property is used to specify the indentation of the first line of a text.
Example
p {text-indent:50px;}

csspnv.text-transform

name::
* McsEngl.csspnv.text-transform@cptIt,
* McsEngl.css'text-transform@cptIt,

_VALUE:
uppercase; lowercase; capitalize;

csspnv.white-space

name::
* McsEngl.csspnv.white-space@cptIt,
* McsEngl.css'white-space@cptIt,
* McsEngl.csswhite-space@cptIt,
* McsEngl.nowrap.css@cptIt,

_CODE.CSS:
white-space: nowrap,

_DESCRIPTION:
Property Values
Value  Description
* normal  Sequences of whitespace will collapse into a single whitespace. Text will wrap when necessary. This is default
* nowrap  Sequences of whitespace will collapse into a single whitespace. Text will never wrap to the next line. The text continues on the same line until a <br /> tag is encountered
* pre  Whitespace is preserved by the browser. Text will only wrap on line breaks Acts like the <pre> tag in HTML
* pre-line  Sequences of whitespace will collapse into a single whitespace. Text will wrap when necessary, and on line breaks
* pre-wrap  Whitespace is preserved by the browser. Text will wrap when necessary, and on line breaks
* inherit  Specifies that the value of the white-space property should be inherited from the parent element
[http://www.w3schools.com/css/pr_text_white-space.asp]

csspnv.word-break

name::
* McsEngl.csspnv.word-break@cptIt,
* McsEngl.css'word-spacing@cptIt,

_DESCRIPTION:
The word-break property specifies line breaking rules for non-CJK scripts.

Tip: CJK scripts are Chinese, Japanese and Korean ("CJK") scripts.

Default value:  normal
Inherited:  yes
Animatable:  no. Read about animatable
Version:  CSS3
JavaScript syntax:  object.style.wordBreak="break-all"
[http://www.w3schools.com/cssref/css3_pr_word-break.asp]

_VALUE:
Value  Description
normal  Default value. Break words according to their usual rules
break-all  Lines may break between any two letters
keep-all  Breaks are prohibited between pairs of letters
initial  Sets this property to its default value. Read about initial
inherit  Inherits this property from its parent element. Read about inherit
[http://www.w3schools.com/cssref/css3_pr_word-break.asp]

csspnv.word-spacing

name::
* McsEngl.csspnv.word-spacing@cptIt,
* McsEngl.css'word-spacing@cptIt,

_VALUE:
10px, -5px,

csspnv.generic.USER-INTERFACE

name::
* McsEngl.csspnv.generic.USER-INTERFACE@cptIt,

_DESCRIPTION:
This specification describes user interface related properties and values that are proposed for CSS level 3 to style HTML and XML (including XHTML). It includes and extends user interface related features from the properties and values of CSS level 2 revision 1. It uses various properties and values to style basic user interface elements in a document.
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/]

_SPEC:
* http://www.w3.org/TR/css-ui-3//
* https://www.w3.org/TR/2015/CR-css-ui-3-20150707/

csspnv.prefix.ASTERISK

name::
* McsEngl.csspnv.prefix.ASTERISK@cptIt,

_DESCRIPTION:
*property: value
Although Internet Explorer 7 corrected its behavior when a property name is prefixed with an underscore or a hyphen, other non-alphanumeric character prefixes are treated as they were in IE6. Therefore, if you add a non-alphanumeric character such as an asterisk (*) immediately before a property name, the property will be applied in IE and not in other browsers. Unlike with the hyphen and underscore method, the CSS specification makes no reservations for the asterisk as a prefix, so use of this hack could result in unexpected behavior as the CSS specifications evolve.

*property: value applies the property value in IE 7 and below. It may or may not work in future versions. Warning: this uses invalid CSS.
[http://www.javascriptkit.com/dhtmltutors/csshacks3.shtml]

csspnv.all

name::
* McsEngl.csspnv.all@cptIt,
* McsEngl.css'all@cptIt,

* McsEngl.css'all-property@cptIt,

_DESCRIPTION:
Name:  all
Value:  initial | inherit | unset
Initial:  See individual properties
Applies to:  See individual properties
Inherited:  See individual properties
Percentages:  See individual properties
Media:  See individual properties
Computed value:  See individual properties
Animatable:  See individual properties
The all property is a shorthand that resets all CSS properties except direction and unicode-bidi. It only accepts the CSS-wide keywords.
[https://www.w3.org/TR/2016/CR-css-cascade-3-20160519/#all-shorthand]

csspnv.animation

name::
* McsEngl.csspnv.animation@cptIt,
* McsEngl.css'animation@cptIt,

* McsEngl.css'animation-property@cptIt,

_DESCRIPTION:
The animation property is a shorthand property for eight of the animation properties:
animation-name
animation-duration
animation-timing-function
animation-delay
animation-iteration-count
animation-direction
animation-fill-mode
animation-play-state
Note: Always specify the animation-duration property, otherwise the duration is 0, and will never be played.

Default value:  none 0 ease 0 1 normal none running
Inherited:  no
Animatable:  no.
Version:  CSS3
JavaScript syntax:  object.style.animation="mymove 5s infinite"
[http://www.w3schools.com/cssref/css3_pr_animation.asp]

_CODE.CSS:
div {
width: 100px;
height: 100px;
background: red;
position: relative;
animation: mymove 5s infinite;
}

@keyframes mymove {
from {left: 0px;}
to {left: 200px;}

csspnv.background

name::
* McsEngl.csspnv.background@cptIt,
* McsEngl.css'background@cptIt,

* McsEngl.css'background@cptIt,

_ADDRESS.WPG:
* spec: https://drafts.csswg.org/css-backgrounds-3//
* http://www.colorzilla.com/gradient-editor//

_DESCRIPTION:
with background you can set all background informations like background-color, background-image, background-repeat, background-position etc. and with background-color you can just specify the background color
background: url(example.jpg) no-repeat center center#fff;
vs.
background-image: url(example.jpg);
background-position: center center;
background-repeat: no-repeat;
background-color:#fff;
[http://stackoverflow.com/a/10205537]
=== reset:
background will supercede all previous background-color, background-image, etc. specifications. It's basically a shorthand, but a reset as well.

I will sometimes use it to overwrite previous background specifications in template customizations, where I would want the following:

background: white url(images/image1.jpg) top left repeat;

to be the following:

background: black;

So, all parameters (background-image, background-position, background-repeat) will reset to their default values.
[http://stackoverflow.com/a/10205535]

_SPECIFIC:
background:transparent;

_CODE.CSS:
background:#999; /* for non-css3 browsers */
filter: progid:DXImageTransform.Microsoft.gradient(startColorstr='#cccccc', endColorstr='#000000'); /* for IE */
background: -webkit-gradient(linear, left top, left bottom, from(#ccc), to(#000)); /* for webkit browsers */
background: -moz-linear-gradient(top, #ccc, #000); /* for firefox 3.6+ */
[http://webdesignerwall.com/tutorials/cross-browser-css-gradient]
===
* background: rgba(255,255,255,0.8);
* background: -webkit-gradient(linear, left top, left bottom, from(rgba(0, 0, 0, 0)), to(rgba(0, 0, 0, 0.3)));
* background: url(header-grad.png) repeat-x bottom;
===
left to right:
background:#cccccc; /* Old browsers */
background: -webkit-gradient(linear, left top, right top, color-stop(17%,#cccccc), color-stop(100%,#ffffff)); /* Chrome,Safari4+ */
background: -webkit-linear-gradient(left, #cccccc 17%,#ffffff 100%); /* Chrome10+,Safari5.1+ */
background: -moz-linear-gradient(left, #cccccc 17%,#ffffff 100%); /* FF3.6+ */
background: -o-linear-gradient(left, #cccccc 17%,#ffffff 100%); /* Opera 11.10+ */
background: -ms-linear-gradient(left, #cccccc 17%,#ffffff 100%); /* IE10+ */
background: linear-gradient(to right, #cccccc 17%,#ffffff 100%); /* W3C */
filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#cccccc', endColorstr='#ffffff',GradientType=1 ); /* IE6-9 */
}
===
internal:
background:#777777; /* Old browsers */
background: -webkit-linear-gradient(left,#777777 0%,#bbbbbb 50%,#777777 100%); /* Chrome10+,Safari5.1+ */
background: -webkit-gradient(linear, left top, right top, color-stop(0%,#777777), color-stop(50%,#bbbbbb), color-stop(100%,#777777)); /* Chrome,Safari4+ */
background: -moz-linear-gradient(left, #777777 0%,#000000 50%,#777777 100%); /* FF3.6+ */
background: -o-linear-gradient(left, #777777 0%,#bbbbbb 50%,#777777 100%); /* Opera 11.10+ */
background: -ms-linear-gradient(left, #777777 0%,#bbbbbb 50%,#777777 100%); /* IE10+ */
background: linear-gradient(to right, #777777 0%,#bbbbbb 50%,#777777 100%); /* W3C */
filter: progid:DXImageTransform.Microsoft.gradient( startColorstr='#777777', endColorstr='#777777',GradientType=1 ); /* IE6-9 */

css'background'attachment

name::
* McsEngl.css'background'attachment@cptIt,

Definition and Usage
The background-attachment property sets whether a background image is fixed or scrolls with the rest of the page.

Default value:  scroll
Inherited:  no
Version:  CSS1
JavaScript syntax:  object.style.backgroundAttachment="fixed"

scroll  The background scrolls along with the element. This is default
fixed  The background is fixed with regard to the viewport
local  The background scrolls along with the element's contents
[http://www.w3schools.com/cssref/pr_background-attachment.asp]

<!DOCTYPE html>
<html>
<head>
<style>
body
{
background-image:url('smiley.gif');
background-repeat:no-repeat;
background-position: top right;
}
</style>
</head>

<body>
<p><b>Note:</b> For this to work in Firefox and Opera, the background-attachment property must be set to "fixed".</p>
</body>
</html>

css'background'clip

name::
* McsEngl.css'background'clip@cptIt,

_DESCRIPTION:
The background-clip property is supported in Internet Explorer 9+, Firefox, Opera, Chrome, and Safari.
Note: The background-clip property is not supported in Internet Explorer 8 and earlier versions.

Definition and Usage
The background-clip property specifies the painting area of the background.
Default value:  border-box
Inherited:  no
Version:  CSS3
JavaScript syntax:  object.style.backgroundClip="content-box"

Syntax
background-clip: border-box|padding-box|content-box;
Value  Description  Play it
border-box  The background is clipped to the border box  Play it »
padding-box  The background is clipped to the padding box  Play it »
content-box  The background is clipped to the content box
[http://www.w3schools.com/cssref/css3_pr_background-clip.asp]

css'background'color

name::
* McsEngl.css'background'color@cptIt,

_CODE.CSS:
background-color:#FFFFE0;/*#F5FFFA;#FDF5E6;#FFF5EE;#eeeccc;*/

css'background'image

name::
* McsEngl.css'background'image@cptIt,

css'background'origin

name::
* McsEngl.css'background'origin@cptIt,

_DESCRIPTION:
Definition and Usage
The background-origin property specifies what the background-position property should be relative to.
Note: If the background-attachment property for the background image is "fixed", this property has no effect.

Default value:  padding-box
Inherited:  no
Version:  CSS3
JavaScript syntax:  object.style.backgroundOrigin="content-box"

Syntax
background-origin: padding-box|border-box|content-box;
Value  Description  Play it
padding-box  The background image is positioned relative to the padding box  Play it »
border-box  The background image is positioned relative to the border box  Play it »
content-box  The background image is positioned relative to the content box

css'background'position

name::
* McsEngl.css'background'position@cptIt,

_SPECIFIC:
* center
* top, right, bottom, left,
* bottom right, top right,

css'background'repeat

name::
* McsEngl.css'background'repeat@cptIt,

_SPECIFIC:
* repeat,
* no-repeat

css'background'size

name::
* McsEngl.css'background'size@cptIt,

_DESCRIPTION:
The background-size property specifies the size of the background images.

Default value:  auto
Inherited:  no
Version:  CSS3
JavaScript syntax:  object.style.backgroundSize="60px 80px"

Syntax
background-size: length|percentage|cover|contain;

Value  Description  Play it
length  Sets the width and height of the background image. The first value sets the width, the second value sets the height. If only one value is given, the second is set to "auto"  Play it »
percentage  Sets the width and height of the background image in percent of the parent element. The first value sets the width, the second value sets the height. If only one value is given, the second is set to "auto"  Play it »
cover  Scale the background image to be as large as possible so that the background area is completely covered by the background image. Some parts of the background image may not be in view within the background positioning area  Play it »
contain  Scale the image to the largest size such that both its width and its height can fit inside the content area
[http://www.w3schools.com/cssref/css3_pr_background-size.asp]

csspnv.box-shandow

name::
* McsEngl.csspnv.box-shandow@cptIt,

_DESCRIPTION:
The box-shadow property attaches one or more shadows to an element.

Default value:  none
Inherited:  no
Animatable:  yes.
Version:  CSS3
JavaScript syntax:  object.style.boxShadow="10px 20px 30px blue"

box-shadow: none|h-shadow v-shadow blur spread color |inset|initial|inherit;
[http://www.w3schools.com/cssref/css3_pr_box-shadow.asp]

_CODE.CSS:
//only right
box-shadow: 5px 0 5px -5px#333;
===
//only bottom
box-shadow: 0 4px 2px -2px gray;
===
//only left
box-shadow: -10px 0px 10px -3px#999;
===
box-shadow: 0px 0px 59px rgba(0,0,0,0.6);
===
box-shadow:0 2px 4px 0 rgba(0,0,0,0.16),0 2px 10px 0 rgba(0,0,0,0.12)!important

csspnv.caret-color

name::
* McsEngl.csspnv.caret-color@cptIt,
* McsEngl.css'caret-color@cptIt,

_DESCRIPTION:
6.2.1. Coloring the insertion caret: caret-color
Name:  caret-color
Value:  auto | <color>
Initial:  auto
Applies to:  elements that accept input
Inherited:  yes
Percentages:  N/A
Media:  interactive
Computed value:  The computed value for auto is auto. For <color> values, the computed value is as defined for the [CSS3COLOR] color property.
Animatable:  as color
auto
User agents should use currentColor. User agents may automatically adjust the color of caret to ensure good visibility and contrast with the surrounding content, possibly based on the currentColor, background, shadows, etc.
<color>
The insertion caret is colored with the specified color.
The caret is a visible indicator of the insertion point in an element where text (and potentially other content) is inserted by the user. This property controls the color of that visible indicator.

Note: caret shape and blinking is outside the scope of this feature and thus unspecified.

Example: a textarea with caret-color:#00aacc;

Note: The caret-color property is at risk.
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#caret-color]

csspnv.clear

name::
* McsEngl.csspnv.clear@cptIt,
* McsEngl.css'clear@cptIt,
* McsEngl.csspnv.clear@cptIt,
* McsEngl.css'clear-property@cptIt,

_ADDRESS.WPG:
* http://learnlayout.com/clear.html,

_DESCRIPTION:
The clear property specifies which sides of an element where other floating elements are not allowed.
Default value:  none
Inherited:  no
Version:    CSS1
JavaScript syntax:  object.style.clear="left"
[http://www.w3schools.com/cssref/pr_class_clear.asp]
===
One more popular uses of setting overflow, strangely enough, is float clearing. Setting overflow doesn't clear the float at the element, it self-clears. This means that the element with overflow applied (auto or hidden), will extend as large as it needs to encompass child elements inside that are floated (instead of collapsing), assuming that the height isn't declared.
[http://css-tricks.com/the-css-overflow-property/]
===
Turning off Float - Using Clear
Elements after the floating element will flow around it. To avoid this, use the clear property.

The clear property specifies which sides of an element other floating elements are not allowed.

Add a text line into the image gallery, using the clear property:

Example

.text_line
{
clear:both;
}

_CODE.CSS:

csspnv.column

name::
* McsEngl.csspnv.column@cptIt,

_DESCRIPTION:
There is a new set of CSS properties that let you easily make multi-column text. Have a look:

.three-column {
padding: 1em;
-moz-column-count: 3;
-moz-column-gap: 1em;
-webkit-column-count: 3;
-webkit-column-gap: 1em;
column-count: 3;
column-gap: 1em;
}
[http://learnlayout.com/column.html]

csspnv.content

name::
* McsEngl.csspnv.content@cptIt,
* McsEngl.csscontent@cptIt,
* McsEngl.css'content@cptIt,
* McsEngl.css'content-property@cptIt,

_DESCRIPTION:
In 'after', 'before' selectors
* accept \25BA (hex characters).

_CODE.CSS:
.menu li > a:after { margin-left: 5px; content: '\25BA'; }
===
a:after {content: " (" attr(href) ")";}
[http://www.w3schools.com/cssref/tryit.asp?filename=trycss_gen_content]
===
//icon fonts
a:before {
font-family: FontAwesome;
content: "\f095";
display: inline-block;
padding-right: 3px;
vertical-align: middle;
}
===
content: url("data:image/png;base64,iVB...");

csspnv.cursor

name::
* McsEngl.csspnv.cursor@cptIt,
* McsEngl.css'cursor@cptIt,

_DESCRIPTION:
6.1.1. cursor property
Name:  cursor
Value:  [ [<url> [<x> <y>]?,]*
[ auto | default | none |
context-menu | help | pointer | progress | wait |
cell | crosshair | text | vertical-text |
alias | copy | move | no-drop | not-allowed | grab | grabbing |
e-resize | n-resize | ne-resize | nw-resize | s-resize | se-resize | sw-resize | w-resize | ew-resize | ns-resize | nesw-resize | nwse-resize | col-resize | row-resize | all-scroll | zoom-in | zoom-out
] ]
Initial:  auto
Applies to:  all elements
Inherited:  yes
Percentages:  N/A
Media:  visual, interactive
Computed value:  as specified, except with any relative URLs converted to absolute
Animatable:  no
This property specifies the type of cursor to be displayed for the pointing device when within the element’s border edge.
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#cursor]

_SPECIFIC:
cursor: pointer;  /* hand */
cursor: e-resize;  /* <--> */
cursor: col-resize;  /* <--||--> */
cursor: help;  /* ? */

csspnv.opacity

name::
* McsEngl.csspnv.opacity@cptIt,
* McsEngl.csspnv.opacity@cptIt,
* McsEngl.css'opacity@cptIt,
* McsEngl.css'opacity-property@cptIt,

_DESCRIPTION:
Creating transparent images with CSS is easy.
Note: The CSS opacity property is a part of the W3C CSS3 recommendation.
[http://www.w3schools.com/css/css_image_transparency.asp]

csspnv.outline

name::
* McsEngl.csspnv.outline@cptIt,
* McsEngl.css'outline@cptIt,

_DESCRIPTION:
Name:      outline
Value:      [ <outline-color> || <outline-style> || <outline-width> ]
Initial:      see individual properties
Applies to:    all elements
Inherited:    no
Percentages:    N/A
Media:      visual
Computed value:  see individual properties
Animatable:    see individual properties
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#outline]

_DESCRIPTION:
An outline is a line that is drawn around elements, outside the border edge, to make the element "stand out".
The outline properties specifies the style, color, and width of an outline.
===
Outlines differ from borders in the following ways:
Outlines do not take up space.
Outlines may be non-rectangular.
UAs often render outlines on elements in the :focus state.
The outline properties control the style of these dynamic outlines.
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#outline-props]
===
All CSS Outline Properties
The number in the "CSS" column indicates in which CSS version the property is defined (CSS1 or CSS2).
Property  Description  Values  CSS
outline  Sets all the outline properties in one declaration  outline-color
outline-style
outline-width
inherit  2
outline-color  Sets the color of an outline  color_name
hex_number
rgb_number
invert
inherit  2
outline-style  Sets the style of an outline  none
dotted
dashed
solid
double
groove
ridge
inset
outset
inherit  2
outline-width  Sets the width of an outline  thin
medium
thick
length
inherit  2

csspnv.outline'offset

name::
* McsEngl.csspnv.outline'offset@cptIt,
* McsEngl.css'outiline'offset@cptIt,
* McsEngl.css'outiline-offset@cptIt,

_DESCRIPTION:
By default, the outline is drawn starting just outside the border edge. However, it is possible to offset the outline and draw it beyond the border edge.
Name:  outline-offset
Value:  <length>
Initial:  0
Applies to:  all elements
Inherited:  no
Percentages:  N/A
Media:  visual
Computed value:  <length> value in absolute units (px or physical).
Animatable:  as length
If the computed value of outline-offset is anything other than 0, then the outline is outset from the border edge by that amount.
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#outline-offset]

csspnv.overflow

name::
* McsEngl.csspnv.overflow@cptIt,
* McsEngl.css'overflow@cptIt,
* McsEngl.cssoverflow@cptIt,

_DESCRIPTION:
The overflow property is a shorthand property that sets the specified values of both overflow-x and overflow-y to the value specified for overflow.
[https://drafts.csswg.org/css-overflow-3/#propdef-overflow]

_SPEC:
* https://drafts.csswg.org/css-overflow//

_DESCRIPTION:
Name:  overflow
Value:  visible | hidden | clip | scroll | auto
Initial:  see individual properties
Applies to:  block containers [CSS21], flex containers [CSS3-FLEXBOX], and grid containers [CSS3-GRID-LAYOUT]
Inherited:  no
Percentages:  N/A
Media:  visual
Computed value:  see individual properties
Animatable:  no
Canonical order:  per grammar
[https://drafts.csswg.org/css-overflow-3/#propdef-overflow]
===
Every single element on a page is a rectangular box. The sizing, positioning, and behavior of these boxes can all be controlled via CSS. By behavior, I mean how the box handles it when the content inside and around it changes. For example, if you don't set the height of a box, the height of that box will grow as large as it needs to be to accommodate the content. But what happens when you do set a specific height or width on a box, and the content inside cannot fit? That is where the CSS overflow property comes in, allowing you to specify how you would like that handled.
...
One more popular uses of setting overflow, strangely enough, is float clearing. Setting overflow doesn't clear the float at the element, it self-clears. This means that the element with overflow applied (auto or hidden), will extend as large as it needs to encompass child elements inside that are floated (instead of collapsing), assuming that the height isn't declared.
[http://css-tricks.com/the-css-overflow-property/]
===
After some serious searching it seems i've found the answer to my question:

from: http://www.brunildo.org/test/Overflowxy2.html

In Gecko, Safari, Opera, ‘visible’ becomes ‘auto’ also when combined with ‘hidden’ (in other words: ‘visible’ becomes ‘auto’ when combined with anything else different from ‘visible’). Gecko 1.8, Safari 3, Opera 9.5 are pretty consistent among them.

also the W3C spec says:

The computed values of ‘overflow-x’ and ‘overflow-y’ are the same as their specified values, except that some combinations with ‘visible’ are not possible: if one is specified as ‘visible’ and the other is ‘scroll’ or ‘auto’, then ‘visible’ is set to ‘auto’. The computed value of ‘overflow’ is equal to the computed value of ‘overflow-x’ if ‘overflow-y’ is the same; otherwise it is the pair of computed values of ‘overflow-x’ and ‘overflow-y’.

Short Version:
If you are using visible for either overflow-x or overflow-y and something other than visible for the other. The visible value is interpreted as auto.
[http://stackoverflow.com/a/6433475]
===
According to the spec ... some combinations with ‘visible’ are not possible: if one is specified as ‘visible’ and the other is ‘scroll’ or ‘auto’, then ‘visible’ is set to ‘auto’ ....
[http://www.brunildo.org/test/Overflowxy2.html]
===
Overflow-x specifies whether or not to clip the left/right edges of the content.
Overflow-y specifies whether or not to clip the top/bottom edges of the content.
===
Definition and Usage
The overflow property specifies what happens if content overflows an element's box.
Default value:  visible
Inherited:  no
Version:  CSS2
JavaScript syntax:  object.style.overflow="scroll"

_SPECIFIC:
Value  Description
* visible  The overflow is not clipped. It renders outside the element's box. This is default
* hidden  The overflow is clipped, and the rest of the content will be invisible
* scroll  The overflow is clipped, but a scroll-bar is added to see the rest of the content
* auto  If overflow is clipped, a scroll-bar should be added to see the rest of the content
* inherit  Specifies that the value of the overflow property should be inherited from the parent element
===
auto. show scrollbars where necessary (horizontal or vertical or both).

csspnv.overflow.visible

name::
* McsEngl.csspnv.overflow.visible@cptIt,

_DESCRIPTION:
visible
There is no special handling of overflow, that is, it may be rendered outside the box. The box is not a scroll container.
[https://drafts.csswg.org/css-overflow-3/#propdef-overflow]

csspnv.overflow.hidden

name::
* McsEngl.csspnv.overflow.hidden@cptIt,

_DESCRIPTION:
hidden
This value indicates that the box’s content is clipped to its padding box and that no scrolling user interface should be provided by the UA to view the content outside the clipping region. However, the content may still be scrolled programatically, for example using the mechanisms defined in [CSSOM-VIEW], and the box is therefore still a scroll container.
[https://drafts.csswg.org/css-overflow-3/#propdef-overflow]

csspnv.overflow.clip

name::
* McsEngl.csspnv.overflow.clip@cptIt,

_DESCRIPTION:
clip
Like hidden, this value indicates that the box’s content is clipped to its padding box and that no scrolling user interface should be provided by the UA to view the content outside the clipping region. In addition, unlike overflow: hidden which still allows programmatic scrolling, overflow: clip forbids scrolling entirely, through any mechanism, and therefore the box is not a scroll container.
[https://drafts.csswg.org/css-overflow-3/#propdef-overflow]

csspnv.overflow.scroll

name::
* McsEngl.csspnv.overflow.scroll@cptIt,

_DESCRIPTION:
scroll
This value indicates that the content is clipped to the padding box, but can be scrolled into view (and therefore the box is a scroll container). Furthermore, if the user agent uses a scrolling mechanism that is visible on the screen (such as a scroll bar or a panner), that mechanism should be displayed whether or not any of its content is clipped. This avoids any problem with scrollbars appearing and disappearing in a dynamic environment. When this value is specified and the target medium is print, overflowing content may be printed.
[https://drafts.csswg.org/css-overflow-3/#propdef-overflow]

csspnv.overflow.auto

name::
* McsEngl.csspnv.overflow.auto@cptIt,

_DESCRIPTION:
auto
This value indicates that the box’s content is clipped to the padding box, but can be scrolled into view (and therefore the box is a scroll container). However, if the user agent uses a scrolling mechanism that is visible on the screen (such as a scroll bar or a panner), that mechanism should only be displayed if there is overflow.
[https://drafts.csswg.org/css-overflow-3/#propdef-overflow]

csspnv.text-overflow

name::
* McsEngl.csspnv.text-overflow@cptIt,

_DESCRIPTION:
5.2. Overflow Ellipsis: the text-overflow property
Name:  text-overflow
Value:  [ clip | ellipsis | <string> ]{1,2}
Initial:  clip
Applies to:  block containers
Inherited:  no
Percentages:  N/A
Media:  visual
Computed value:  as specified
Animatable:  no
This property specifies rendering when inline content overflows its line box edge in the inline progression direction of its block container element ("the block") that has overflow other than visible.
Text can overflow for example when it is prevented from wrapping (e.g. due to white-space: nowrap or a single word is too long to fit).
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#text-overflow]

_DESCRIPTION:
This is a property specifically for text that needs to be clipped. This property allows you to clip the text with or without an ellipsis. This can make it much easier for customers to recognize that the text has been clipped. The default value is clip, but if you use text-overflow: ellipsis; This will add an ellipsis (…) right before the clipping occurs.
[http://webdesign.about.com/od/csstutorial/a/css-overflow.htm]

csspnv.text-overflow.clip

name::
* McsEngl.csspnv.text-overflow.clip@cptIt,

_DESCRIPTION:
clip
Clip inline content that overflows its block container element. Characters may be only partially rendered.
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#text-overflow]

csspnv.text-overflow.elipsis

name::
* McsEngl.csspnv.text-overflow.elipsis@cptIt,

_DESCRIPTION:
ellipsis
Render an ellipsis character (U+2026) to represent clipped inline content. Implementations may substitute a more language, script, or writing-mode appropriate ellipsis character, or three dots "..." if the ellipsis character is unavailable.
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#text-overflow]

csspnv.text-overflow.string

name::
* McsEngl.csspnv.text-overflow.string@cptIt,

_DESCRIPTION:
<string>
Render the given string to represent clipped inline content. The given string is treated as an independent paragraph for bidi purposes.
Note: The <string> value, and the 2-value syntax "{1,2}" and functionality are all at risk.
[https://www.w3.org/TR/2015/CR-css-ui-3-20150707/#text-overflow]

csspnv.transform

name::
* McsEngl.csspnv.transform@cptIt,
* McsEngl.csstransform@cptIt,
* McsEngl.css'transform@cptIt,

* McsEngl.csstransform@cptIt,
* McsEngl.css'transform@cptIt,

_DESCRIPTION:
The transform property applies a 2D or 3D transformation to an element. This property allows you to rotate, scale, move, skew, etc., elements.

Default value:  none
Inherited:  no
Animatable:  yes.
Version:  CSS3
JavaScript syntax:  object.style.transform="rotate(7deg)"
[http://www.w3schools.com/cssref/css3_pr_transform.asp]

_CODE.CSS:
transform: rotate(-5deg);
===
myHero {
display:block;
background-color:#ddd;
padding: 30px;
font-size: 20px;
}
myHero:before {
position: absolute;
margin-top: -33px;
margin-left: -30px;
padding: 0px;
content: "title";
background-color:green;
transform: rotate(-15deg);
}

_VALUE:
Value  Description  Play it
* csspvl.none  Defines that there should be no transformation
* csspvl.matrix(n,n,n,n,n,n)  Defines a 2D transformation, using a matrix of six values
* csspvl.matrix3d
(n,n,n,n,n,n,n,n,n,n,n,n,n,n,n,n)  Defines a 3D transformation, using a 4x4 matrix of 16 values  
* csspvl.translate(x,y)  Defines a 2D translation
* csspvl.translate3d(x,y,z)  Defines a 3D translation  
* csspvl.translateX(x)  Defines a translation, using only the value for the X-axis
* csspvl.translateY(y)  Defines a translation, using only the value for the Y-axis
* csspvl.translateZ(z)  Defines a 3D translation, using only the value for the Z-axis  
* csspvl.scale(x,y)  Defines a 2D scale transformation
* csspvl.scale3d(x,y,z)  Defines a 3D scale transformation  
* csspvl.scaleX(x)  Defines a scale transformation by giving a value for the X-axis
* csspvl.scaleY(y)  Defines a scale transformation by giving a value for the Y-axis
* csspvl.scaleZ(z)  Defines a 3D scale transformation by giving a value for the Z-axis  
* csspvl.rotate(angle)  Defines a 2D rotation, the angle is specified in the parameter
* csspvl.rotate3d(x,y,z,angle)  Defines a 3D rotation  
* csspvl.rotateX(angle)  Defines a 3D rotation along the X-axis
* csspvl.rotateY(angle)  Defines a 3D rotation along the Y-axis
* csspvl.rotateZ(angle)  Defines a 3D rotation along the Z-axis
* csspvl.skew(x-angle,y-angle)  Defines a 2D skew transformation along the X- and the Y-axis
* csspvl.skewX(angle)  Defines a 2D skew transformation along the X-axis
* csspvl.skewY(angle)  Defines a 2D skew transformation along the Y-axis
* csspvl.perspective(n)  Defines a perspective view for a 3D transformed element  
* csspvl.initial  Sets this property to its default value. Read about initial  
* csspvl.inherit  Inherits this property from its parent element. Read about inherit
[http://www.w3schools.com/cssref/css3_pr_transform.asp]

csspnv.user-select

name::
* McsEngl.csspnv.user-select@cptIt,
* McsEngl.cssuser-select@cptIt,
* McsEngl.css'user-select@cptIt,

_CODE.CSS:
-ms-user-select:none;
-webkit-user-select:none;
-moz-user-select: -moz-none;
[http://ie.microsoft.com/TESTdrive/HTML5/msUserSelect/Default.html]

_DESCRIPTION:
This is useful in situations where you want to provide an easier/cleaner copy-paste experience for users (not have them accidentally text-select useless things, like icons or images). However it's a bit buggy. Firefox enforces the fact that any text matching that selector cannot be copied. WebKit still allows the text to be copied if you select elements around it. There is no spec for this property (non-standard) so it's unlikely to change until there is.
[http://css-tricks.com/almanac/properties/u/user-select/]

csspnv.EVOLUTING

name::
* McsEngl.csspnv.EVOLUTING@cptIt,

csspnv.2010sps

name::
* McsEngl.csspnv.2010sps@cptIt,

4.1. Property Index

Name  Values  Initial value  Applies to  Inherited?  Percentages  Media
background-attachment
scroll | fixed | inherit  scroll    no    visual
background-color
<color> | inherit  transparent    no    visual
background-image
<uri> | none | inherit  none    no    visual
background-position
[ [ <percentage> | <length> | left | center | right ] [ <percentage> | <length> | top | center | bottom ]? ] | [ [ left | center | right ] || [ top | center | bottom ] ] | inherit  0% 0%    no  refer to the size of the box itself  visual
background-repeat
repeat | repeat-x | repeat-y | no-repeat | inherit  repeat    no    visual
background
[‘background-color’ || ‘background-image’ || ‘background-repeat’ || ‘background-attachment’ || background-position] | inherit  see individual properties    no  allowed on ‘background-position’  visual
border-collapse
collapse | separate | inherit  separate  ‘table’ and ‘inline-table’ elements  yes    visual
border-color
[ <color> ]{1,4} | inherit  see individual properties    no    visual
border-spacing
<length> <length>? | inherit  0  ‘table’ and ‘inline-table’ elements  yes    visual
border-style
<border-style>{1,4} | inherit  see individual properties    no    visual
border-top
border-right
border-bottom
border-left
[ <border-width> || <border-style> || border-top-color ] | inherit  see individual properties    no    visual
border-top-color
border-right-color
border-bottom-color
border-left-color
<color> | inherit  the value of the ‘color’ property    no    visual
border-top-style
border-right-style
border-bottom-style
border-left-style
<border-style> | inherit  none    no    visual
border-top-width
border-right-width
border-bottom-width
border-left-width
<border-width> | inherit  medium    no    visual
border-width
<border-width>{1,4} | inherit  see individual properties    no    visual
border
[ <border-width> || <border-style> || border-top-color ] | inherit  see individual properties    no    visual
bottom
<length> | <percentage> | auto | inherit  auto  positioned elements  no  refer to height of containing block  visual
caption-side
top | bottom | inherit  top  ‘table-caption’ elements  yes    visual
clear
none | left | right | both | inherit  none  block-level elements  no    visual
clip
<shape> | auto | inherit  auto  absolutely positioned elements  no    visual
color
<color> | inherit  depends on user agent    yes    visual
content
normal | none | [ <string> | <uri> | <counter> | attr(<identifier>) | open-quote | close-quote | no-open-quote | no-close-quote ]+ | inherit  normal  :before and :after pseudo-elements  no    all
counter-increment
[ <identifier> <integer>? ]+ | none | inherit  none    no    all
counter-reset
[ <identifier> <integer>? ]+ | none | inherit  none    no    all
cursor
[ [<uri> ,]* [ auto | crosshair | default | pointer | move | e-resize | ne-resize | nw-resize | n-resize | se-resize | sw-resize | s-resize | w-resize | text | wait | help | progress ] ] | inherit  auto    yes    visual, interactive
direction
ltr | rtl | inherit  ltr  all elements, but see prose  yes    visual
display
inline | block | list-item | inline-block | table | inline-table | table-row-group | table-header-group | table-footer-group | table-row | table-column-group | table-column | table-cell | table-caption | none | inherit  inline    no    all
empty-cells
show | hide | inherit  show  ‘table-cell’ elements  yes    visual
float
left | right | none | inherit  none  all, but see 9.7  no    visual
font-family
[ [ <family-name> | <generic-family> ] [, <family-name>| <generic-family> ]* ] | inherit  depends on user agent    yes    visual
font-size
<absolute-size> | <relative-size> | <length> | <percentage> | inherit  medium    yes  refer to inherited font size  visual
font-style
normal | italic | oblique | inherit  normal    yes    visual
font-variant
normal | small-caps | inherit  normal    yes    visual
font-weight
normal | bold | bolder | lighter | 100 | 200 | 300 | 400 | 500 | 600 | 700 | 800 | 900 | inherit  normal    yes    visual
font
[ [ ‘font-style’ || ‘font-variant’ || ‘font-weight’ ]? ‘font-size’ [ / ‘line-height’ ]? font-family ] | caption | icon | menu | message-box | small-caption | status-bar | inherit  see individual properties    yes  see individual properties  visual
height
<length> | <percentage> | auto | inherit  auto  all elements but non-replaced inline elements, table columns, and column groups  no  see prose  visual
left
<length> | <percentage> | auto | inherit  auto  positioned elements  no  refer to width of containing block  visual
letter-spacing
normal | <length> | inherit  normal    yes    visual
line-height
normal | <number> | <length> | <percentage> | inherit  normal    yes  refer to the font size of the element itself  visual
list-style-image
<uri> | none | inherit  none  elements with ‘display: list-item’  yes    visual
list-style-position
inside | outside | inherit  outside  elements with ‘display: list-item’  yes    visual
list-style-type
disc | circle | square | decimal | decimal-leading-zero | lower-roman | upper-roman | lower-greek | lower-latin | upper-latin | armenian | georgian | lower-alpha | upper-alpha | none | inherit  disc  elements with ‘display: list-item’  yes    visual
list-style
[ ‘list-style-type’ || ‘list-style-position’ || list-style-image ] | inherit  see individual properties  elements with ‘display: list-item’  yes    visual
margin-right
margin-left
<margin-width> | inherit  0  all elements except elements with table display types other than table-caption, table and inline-table  no  refer to width of containing block  visual
margin-top
margin-bottom
<margin-width> | inherit  0  all elements except elements with table display types other than table-caption, table and inline-table  no  refer to width of containing block  visual
margin
<margin-width>{1,4} | inherit  see individual properties  all elements except elements with table display types other than table-caption, table and inline-table  no  refer to width of containing block  visual
max-height
<length> | <percentage> | none | inherit  none  all elements but non-replaced inline elements, table columns, and column groups  no  see prose  visual
max-width
<length> | <percentage> | none | inherit  none  all elements but non-replaced inline elements, table rows, and row groups  no  refer to width of containing block  visual
min-height
<length> | <percentage> | inherit  0  all elements but non-replaced inline elements, table columns, and column groups  no  see prose  visual
min-width
<length> | <percentage> | inherit  0  all elements but non-replaced inline elements, table rows, and row groups  no  refer to width of containing block  visual
opacity
<number> | inherit  1  all  no    visual
orphans
<integer> | inherit  2  block container elements  yes    visual, paged
outline-color
<color> | invert | inherit  invert    no    visual, interactive
outline-style
<border-style> | inherit  none    no    visual, interactive
outline-width
<border-width> | inherit  medium    no    visual, interactive
outline
[ ‘outline-color’ || ‘outline-style’ || outline-width ] | inherit  see individual properties    no    visual, interactive
overflow
visible | hidden | scroll | auto | inherit  visible  block containers  no    visual
padding-top
padding-right
padding-bottom
padding-left
<padding-width> | inherit  0  all elements except table-row-group, table-header-group, table-footer-group, table-row, table-column-group and table-column  no  refer to width of containing block  visual
padding
<padding-width>{1,4} | inherit  see individual properties  all elements except table-row-group, table-header-group, table-footer-group, table-row, table-column-group and table-column  no  refer to width of containing block  visual
page-break-after
auto | always | avoid | left | right | inherit  auto  block-level elements (but see text)  no    visual, paged
page-break-before
auto | always | avoid | left | right | inherit  auto  block-level elements (but see text)  no    visual, paged
page-break-inside
avoid | auto | inherit  auto  block-level elements (but see text)  no    visual, paged
position
static | relative | absolute | fixed | inherit  static    no    visual
quotes
[<string> <string>]+ | none | inherit  depends on user agent    yes    visual
right
<length> | <percentage> | auto | inherit  auto  positioned elements  no  refer to width of containing block  visual
table-layout
auto | fixed | inherit  auto  ‘table’ and ‘inline-table’ elements  no    visual
text-align
left | right | center | justify | inherit  a nameless value that acts as ‘left’ if ‘direction’ is ‘ltr’, ‘right’ if ‘direction’ is ‘rtl’  block containers  yes    visual
text-decoration
none | [ underline || overline || line-through || blink ] | inherit  none    no (see prose)    visual
text-indent
<length> | <percentage> | inherit  0  block containers  yes  refer to width of containing block  visual
text-transform
capitalize | uppercase | lowercase | none | inherit  none    yes    visual
top
<length> | <percentage> | auto | inherit  auto  positioned elements  no  refer to height of containing block  visual
unicode-bidi
normal | embed | bidi-override | inherit  normal  all elements, but see prose  no    visual
vertical-align
baseline | sub | super | top | text-top | middle | bottom | text-bottom | <percentage> | <length> | inherit  baseline  inline-level and ‘table-cell’ elements  no  refer to the ‘line-height’ of the element itself  visual
visibility
visible | hidden | collapse | inherit  visible    yes    visual
white-space
normal | pre | nowrap | pre-wrap | pre-line | inherit  normal    yes    visual
widows
<integer> | inherit  2  block container elements  yes    visual, paged
width
<length> | <percentage> | auto | inherit  auto  all elements but non-replaced inline elements, table rows, and row groups  no  refer to width of containing block  visual
word-spacing
normal | <length> | inherit  normal    yes    visual
z-index
auto | <integer> | inherit  auto  positioned elements  no    visual
[https://www.w3.org/TR/css-2010/#properties]

csspnv.spn21

name::
* McsEngl.csspnv.spn21@cptIt,

_SPECIFIC:
CSS 2.1 has more than 90 properties,
[https://www.w3.org/TR/CSS2/intro.html#q2.0]

cssdoc.sut.MEDIA-FEATURE (mdf)

name::
* McsEngl.cssdoc.sut.MEDIA-FEATURE (mdf)@cptIt,
* McsEngl.css'media-feature@cptIt,
* McsEngl.cssmdf@cptIt, {2016-06-12}

_DESCRIPTION:
Syntactically, media features resemble-CSS-properties#ql:css'property#: they have names and accept certain values. There are, however, several important differences between properties and media features:
* Properties are used in declarations to give information about how to present a document. Media features are used in expressions to describe requirements of the output device.
* Most media features accept optional ‘min-’ or ‘max-’ prefixes to express "greater or equal to" and "smaller or equal to" constraints. This syntax is used to avoid "<" and ">" characters which may conflict with HTML and XML. Those media features that accept prefixes will most often be used with prefixes, but can also be used alone.
* Properties always require a value to form a declaration. Media features, on the other hand, can also be used without a value. For a media feature feature, (feature) will evaluate to true if (feature:x) will evaluate to true for a value x other than zero or zero followed by a unit identifier (i.e., other than 0, 0px, 0em, etc.). Media features that are prefixed by min/max cannot be used without a value. When a media feature prefixed with min/max is used without a value it makes the media query malformed.
* Properties may accept more complex values, e.g., calculations that involve several other values. Media features only accept single values: one keyword, one number, or a number with a unit identifier. (The only exceptions are the ‘aspect-ratio’ and ‘device-aspect-ratio’ media features.)
[https://www.w3.org/TR/2012/REC-css3-mediaqueries-20120619/#media1]

cssmdf'value

name::
* McsEngl.cssmdf'value@cptIt,

cssmdf'applyes-to

name::
* McsEngl.cssmdf'applyes-to@cptIt,

cssmdf'accepts-min-max-prefixes

name::
* McsEngl.cssmdf'accepts-min-max-prefixes@cptIt,

cssmdf.device-width

name::
* McsEngl.cssmdf.device-width@cptIt,
* McsEngl.cssdevice-width@cptIt,
* McsEngl.css'device-width@cptIt,

_DESCRIPTION:
4.3. device-width
Value: <length>
Applies to: visual and tactile media types
Accepts min/max prefixes: yes
The ‘device-width’ media feature describes the width of the rendering surface of the output device. For continuous media, this is the width of the screen. For paged media, this is the width of the page sheet size.

A specified <length> cannot be negative.

@media screen and (device-width: 800px) { … }
In the example above, the style sheet will apply only to screens that currently displays exactly 800 horizontal pixels. The ‘px’ unit is of the logical kind, as described in the Units section.
[https://www.w3.org/TR/2012/REC-css3-mediaqueries-20120619/#device-width]

cssmdf.orientation

name::
* McsEngl.cssmdf.orientation@cptIt,
* McsEngl.cssorientation@cptIt,
* McsEngl.css'orientation@cptIt,

_DESCRIPTION:
4.5. orientation
Value: portrait | landscape
Applies to: bitmap media types
Accepts min/max prefixes: no
The ‘orientation’ media feature is ‘portrait’ when the value of the ‘height’ media feature is greater than or equal to the value of the ‘width’ media feature. Otherwise ‘orientation’ is ‘landscape’.

@media all and (orientation:portrait) { … }
@media all and (orientation:landscape) { … }
[https://www.w3.org/TR/2012/REC-css3-mediaqueries-20120619/#orientation]

cssdoc'PHRASE (phs)

name::
* McsEngl.cssdoc'PHRASE (phs)@cptIt,
* McsEngl.css'phrase@cptIt,
* McsEngl.cssphs@cptIt,

_SPECIFIC:
* declaration-block##

cssdoc'SENTENCE (stc)

name::
* McsEngl.cssdoc'SENTENCE (stc)@cptIt,
* McsEngl.css'statement@cptIt,
* McsEngl.cssstc@cptIt,
* McsEngl.cssrule@cptIt,
* McsEngl.css'rule@cptIt,
* McsEngl.css'style-rule@cptIt,

_SPECIFIC:
* css-at-rule##
* css-rule-set##
* css-comment##

cssstc.RULE-SET (rul)

name::
* McsEngl.cssstc.RULE-SET (rul)@cptIt,
* McsEngl.cssstc.rule@cptIt,
* McsEngl.css'rule@cptIt,
* McsEngl.cssrule@cptIt,
* McsEngl.cssrul@cptIt,

* McsEngl.cssstc.rule@cptIt,
* McsEngl.css'rule@cptIt,
* McsEngl.cssrule@cptIt,
* McsEngl.cssrul@cptIt,

_DEFINITION:
A rule set (also called "rule") consists of a selector followed by a declaration block.
[https://www.w3.org/TR/CSS2/syndata.html#rule-sets]
===
A CSS rule has two main parts: a selector, and one or more declarations:
p {color:red; text-align:center; }
[http://www.w3schools.com/css/css_syntax.asp]

_WHOLE:
* stylesheet#ql:cssstylesheet_cpt#

_PART:
* selector|s,
* declaration-block,
===
A style sheet consists of a list of rules. Each rule or rule-set consists of one or more selectors and a declaration block. A declaration-block consists of a list of declarations in braces. Each declaration itself consists of a property, a colon (:), a value. If there are multiple declarations in a block, a semi-colon (;) must be inserted to separate each declaration.[2]
[http://en.wikipedia.org/wiki/Css]

_CODE.CSS:
/* rule-set */
p {color:red; text-align:center; }

cssrul'declaration-block {declaration;declaration}#ql:css'declaration-block#

name::
* McsEngl.cssrul'declaration-block@cptIt,
* McsEngl.css'code'Declaration-block@cptIt,
* McsEngl.cssrule'declaration-block@cptIt,
* McsEngl.css'declaration-block@cptIt,
* McsEngl.cssdeclaration-block@cptIt,

* McsEngl.css'declaration-block@cptIt,
* McsEngl.css'code'Declaration-block@cptIt,
* McsEngl.cssrule'declaration-block@cptIt,
* McsEngl.cssdeclaration-block@cptIt,

_WHOLE:
* css-rule#ql:css'rule_cpt#

_DEFINITION:
A declaration-block consists of a list of declarations in braces. Each declaration itself consists of a property, a colon (:), a value. If there are multiple declarations in a block, a semi-colon (;) must be inserted to separate each declaration.[2]
[http://en.wikipedia.org/wiki/Css]
===
Each declaration consists of a property and a value.
The property is the style attribute you want to change. Each property has a value.
CSS declarations always ends with a semicolon, and declaration groups are surrounded by curly brackets:
[http://www.w3schools.com/css/css_syntax.asp]

_CODE.CSS:
{property: value; property: value;}
===
html-style-attribute#ql:html'style_attribute#

css'a_link:
a:link { color: rgb(0, 0, 153) }
a:visited { color: rgb(153, 0, 153) }
a:hover { color: rgb(0, 96, 255) }
a:active { color: rgb(255, 0, 102) }

The above CSS will cause your links to change color when someone hovers their mouse pointer over it, instant rollovers with no images! One important note with the above code, is that it is important that the style declarations be in the right order:
“link-visited-hover-active”,

css'background_color:
background-color:#F9F9F9;

css'color: red;#FF0000;
Color in CSS can be expressed in a few ways:
1. In Hex -> for example:#000000 – this is black and this:#FF0000 is red.
2. In rgb -> rgb(204,204,255) is a light purple blue color.
3. With named colors like: ‘red’ or ‘blue’

css'font_family: Verdana, Arial, Helvetica, sans-serif;
"Lucida Grande", Calibri, Arial, sans-serif;

css'font_size: 12pt;
font-size: 14px;
- <absolute-size>
[ xx-small | x-small | small | medium | large | x-large | xx-large ]

css'font_weight: bold;
font-weight: normal;
font-weight: bold;
font-weight: 900;

css'text_align:center;

css'text_decoration:
text-decoration: underline; none;

css'width: 80%;

cssrul'selector#ql:cssselector#

name::
* McsEngl.cssrul'selector@cptIt,

cssrul.important

name::
* McsEngl.cssrul.important@cptIt,
* McsEngl.css'important-rule@cptIt,

_DEFINITION:
CSS rules marked !important take precedence over later rules. Normally in CSS the rules work from top to bottom, so if you assigned a new style to an element further down the style sheet or in a secondary style sheet then the later rule would take precedence. !important ensures that this rule has precedence.
[http://www.electrictoolbox.com/using-important-css/]

_CODE.CSS:
color: red !important;

cssstc.AT-RULE (atr)

name::
* McsEngl.cssstc.AT-RULE (atr)@cptIt,
* McsEngl.cssstc.at-rule@cptIt,
* McsEngl.css'at-rule@cptIt,
* McsEngl.css'rule.at@cptIt,

* McsEngl.cssatr@cptIt,

_DESCRIPTION:
At-rules start with an at-keyword, an '@' character followed immediately by an identifier (for example, '@import', '@page').

An at-rule consists of everything up to and including the next semicolon (;) or the next block, whichever comes first.

CSS 2.1 user agents must ignore any '@import' rule that occurs inside a block or after any non-ignored statement other than an @charset or an @import rule.
[https://www.w3.org/TR/CSS21/syndata.html#at-rules]

cssatr.charset

name::
* McsEngl.cssatr.charset@cptIt,
* McsEngl.cssstc.charset@cptIt,
* McsEngl.csscharset@cptIt,
* McsEngl.css'charset@cptIt,
* McsEngl.csscharset@cptIt,

_DESCRIPTION:
Authors using an @charset rule must place the rule at the very beginning of the style sheet, preceded by no characters. (If a byte order mark is appropriate for the encoding used, it may precede the @charset rule.)
After "@charset", authors specify the name of a character encoding (in quotes). For example:
@charset "ISO-8859-1";
@charset must be written literally, i.e., the 10 characters '@charset "' (lowercase, no backslash escapes), followed by the encoding name, followed by '";'.
[https://www.w3.org/TR/CSS2/syndata.html#charset]

cssatr.font-face {2015snapshot}

name::
* McsEngl.cssatr.font-face {2015snapshot}@cptIt,
* McsEngl.cssstc.font-face@cptIt,
* McsEngl.cssfontface@cptIt,
* McsEngl.css'fontface@cptIt,
* McsEngl.css'font-face-rule@cptIt,
* McsEngl.css'font-face@cptIt,
* McsEngl.font-face-css@cptIt,

_DESCRIPTION:
To use a downloadable font called Gentium:

@font-face {
font-family: Gentium;
src: url(http://example.com/fonts/Gentium.woff);
}

p { font-family: Gentium, serif; }
The user agent will download Gentium and use it when rendering text within paragraph elements. If for some reason the site serving the font is unavailable, the default serif font will be used.
[https://www.w3.org/TR/css-fonts-3/#font-face-rule]

_ADDRESS.WPG:
* https://css-tricks.com/snippets/css/using-font-face//
* http://blog.fontspring.com/2011/02/further-hardening-of-the-bulletproof-syntax//
* http://help.dottoro.com/blog/13-amazing-free-fonts-for-your-website//
* @font-face css-rule http://help.dottoro.com/lcvrccwp.php,

_CODE.CSS:
@font-face {
font-family: 'FntPgmWpg';
src: url('fonts/icomoon.eot');
src: url('fonts/icomoon.eot?#iefix') format('embedded-opentype'),
url('fonts/icomoon.svg#icomoon') format('svg'),
url('fonts/icomoon.woff') format('woff'),
url('fonts/icomoon.ttf') format('truetype');
font-weight: normal;
font-style: normal;
}
===
@font-face {
 font-family: 'MyWebFont';
 src: url('webfont.eot'); /* IE9 Compat Modes */
 src: url('webfont.eot?#iefix') format('embedded-opentype'), /* IE6-IE8 */
  url('webfont.woff') format('woff'), /* Modern Browsers */
  url('webfont.ttf') format('truetype'), /* Safari, Android, iOS */
  url('webfont.svg#svgFontName') format('svg'); /* Legacy iOS */
 }
[http://blog.fontspring.com/2011/02/further-hardening-of-the-bulletproof-syntax/]
===
@font-face {
font-family: Antipasto;
font-style: normal;
font-weight: normal;
src: url(file:///\dAINFO\dirFont\ANTIPAS0.eot);
}
===
@font-face {
font-family: 'Material Icons';
font-style: normal;
font-weight: 400;
src: local('Material Icons'), local('MaterialIcons-Regular'), url(https://fonts.gstatic.com/s/materialicons/v18/2fcrYFNaTjcS6g4U3t-Y5ZjZjT5FdEJ140U2DJYC3mY.woff2) format('woff2');
}

cssatr.import

name::
* McsEngl.cssatr.import@cptIt,
* McsEngl.cssstc.import@cptIt,
* McsEngl.cssimport@cptIt,
* McsEngl.css'import@cptIt,
* McsEngl.cssimport-rule@cptIt,

_DESCRIPTION:
From within a css file the only way to import another css file is to use "@import".

_CODE.CSS:
@import url(http://fonts.googleapis.com/css?family=Noto+Sans:400,700,400italic|Source+Code+Pro);
===
@import "my-styles.css";

cssatr.keyframes

name::
* McsEngl.cssatr.keyframes@cptIt,
* McsEngl.cssstc.keyframes@cptIt,
* McsEngl.cssmedia@cptIt,
* McsEngl.css'keyframes-rule@cptIt,
* McsEngl.cssstc.keyframes@cptIt,
* McsEngl.csskeyframes@cptIt,
* McsEngl.css'keyframes-rule@cptIt,
* McsEngl.keyframes-rule-css@cptIt,

_DESCRIPTION:
The @keyframes rule specifies the animation code.

The animation is created by gradually changing from one set of CSS styles to another.

During the animation, you can change the set of CSS styles many times.

Specify when the style change will happen in percent, or with the keywords "from" and "to", which is the same as 0% and 100%. 0% is the beginning of the animation, 100% is when the animation is complete.

Tip: For best browser support, you should always define both the 0% and the 100% selectors.

Note: Use the animation properties to control the appearance of the animation, and also to bind the animation to selectors.

CSS Syntax
@keyframes animationname {keyframes-selector {css-styles;}}
[http://www.w3schools.com/cssref/css3_pr_animation-keyframes.asp]

_CODE.CSS:
@keyframes mymove {
from {top: 0px;}
to {top: 200px;}
}
===
@keyframes mymove {
0% {top: 0px;}
25% {top: 200px;}
50% {top: 100px;}
75% {top: 200px;}
100% {top: 0px;}
}
===
@keyframes mymove {
0% {top: 0px; left: 0px; background: red;}
25% {top: 0px; left: 100px; background: blue;}
50% {top: 100px; left: 100px; background: yellow;}
75% {top: 100px; left: 0px; background: green;}
100% {top: 0px; left: 0px; background: red;}
}
===
@keyframes mymove {
0% {top: 0px; background: red; width: 100px;}
100% {top: 200px; background: yellow; width: 300px;}
}

cssatr.media

name::
* McsEngl.cssatr.media@cptIt,
* McsEngl.cssstc.media@cptIt,
* McsEngl.cssmedia@cptIt,
* McsEngl.css'media-query@cptIt,
* McsEngl.cssstc.media@cptIt,
* McsEngl.cssmedia@cptIt,
* McsEngl.css'media-query@cptIt,
* McsEngl.css'media-rule@cptIt,

_DESCRIPTION:
Inside a CSS style sheet, one can declare that sections apply to certain media types:
@media screen {
* { font-family: sans-serif }
}
The ‘print’ and ‘screen’ media types are defined in HTML4. The complete list of media types in HTML4 is: ‘aural’, ‘braille’, ‘handheld’, ‘print’, ‘projection’, ‘screen’, ‘tty’, ‘tv’. CSS2 defines the same list, deprecates ‘aural’ and adds ‘embossed’ and ‘speech’. Also, ‘all’ is used to indicate that the style sheet applies to all media types.
Media-specific style sheets are supported by several user agents. The most commonly used feature is to distinguish between ‘screen’ and ‘print’.
[https://www.w3.org/TR/2012/REC-css3-mediaqueries-20120619/#background]

_DESCRIPTION:
A media query is a logical expression that is either true or false. A media query is true if the media type of the media query matches the media type of the device where the user agent is running (as defined in the "Applies to" line), and all expressions in the media query are true.
[https://www.w3.org/TR/2012/REC-css3-mediaqueries-20120619/#media0]

_DESCRIPTION:
Media query is a CSS technique introduced in CSS3.
It uses the @media rule to include a block of CSS properties only if a certain condition is true.
[http://www.w3schools.com/css/css_rwd_mediaqueries.asp]
===
"Responsive Design" is the strategy of making a site that "responds" to the browser and device that it is being shown on... by looking awesome no matter what.

Media queries are the most powerful tool for doing this. Let's take our layout that uses percent widths and have it display in one column when the browser is too small to fit the menu in the sidebar:

@media screen and (min-width:600px) {
nav {
float: left;
width: 25%;
}
section {
margin-left: 25%;
}
}
@media screen and (max-width:599px) {
nav li {
display: inline;
}
}
[http://learnlayout.com/media-queries.html]

_CODE.CSS:
@media screen, print {
body { line-height: 1.2 }
}
===
Orientation: Portrait / Landscape
Media queries can also be used to change layout of a page depending on the orientation of the browser.

You can have a set of CSS properties that will only apply when the browser window is wider than its height, a so called "Landscape" orientation:

Example
The web page will have a lightblue background if the orientation is in landscape mode:

@media only screen and (orientation: landscape) {
body {
background-color: lightblue;
}
}
[http://www.w3schools.com/css/css_rwd_mediaqueries.asp]

cssatr.namespace

name::
* McsEngl.cssatr.namespace@cptIt,
* McsEngl.cssstc.namespace@cptIt,
* McsEngl.css'namespace@cptIt,

_DESCRIPTION:
This CSS Namespaces module defines syntax for using namespaces in CSS. It defines the @namespace rule for declaring a default namespace and for binding namespaces to namespace prefixes. It also defines a syntax for using those prefixes to represent namespace-qualified names. It does not define where such names are valid or what they mean: that depends on their context and is defined by a host language, such as Selectors ([SELECT]), that references the syntax defined in the CSS Namespaces module.
[https://www.w3.org/TR/2014/REC-css-namespaces-3-20140320/]

_CODE.CSS:
@namespace "http://www.w3.org/1999/xhtml";
@namespace svg "http://www.w3.org/2000/svg";
//The first rule declares a default namespace http://www.w3.org/1999/xhtml to be applied to names that have no explicit namespace component.
//The second rule declares a namespace prefix svg that is used to apply the namespace http://www.w3.org/2000/svg where the svg namespace prefix is used.
===
Given the namespace declarations:
@namespace toto "http://toto.example.org";
@namespace "http://example.com/foo";
In a context where the default namespace applies

toto|A
represents the name A in the http://toto.example.org namespace.
|B
represents the name B that belongs to no namespace.
*|C
represents the name C in any namespace, including no namespace.
D
represents the name D in the http://example.com/foo namespace.
[https://www.w3.org/TR/2014/REC-css-namespaces-3-20140320/#css-qnames]

cssatr.page

name::
* McsEngl.cssatr.page@cptIt,
* McsEngl.cssstc.page@cptIt,
* McsEngl.css'page-rule@cptIt,
* McsEngl.csspage@cptIt,
* McsEngl.csspage-rule@cptIt,

_DESCRIPTION:
An @page rule consists of the keyword "@page", followed by an optional page selector, followed by a block containing declarations and at-rules. Comments and white space are allowed, but optional, between the @page token and the page selector and between the page selector and the block. The declarations in an @page rule are said to be in the page context.
Note: CSS level 2 has no at-rules that may appear inside @page, but such at-rules are expected to be defined in level 3.
[https://www.w3.org/TR/CSS21/page.html#page-intro]

_CODE.CSS:
@page :left {
margin-left: 4cm;
margin-right: 3cm;
}

cssatr.2015

name::
* McsEngl.cssatr.2015@cptIt,

_SPECIFIC:
4.3. At-Rule Index
@charset
@font-face
@import
@media
@page
[https://www.w3.org/TR/css-2015/#at-rules]

cssatr.2010

name::
* McsEngl.cssatr.2010@cptIt,

_SPECIFIC:
4.3. At-Rule Index
@charset
@import, with the media list replaced by a media query list
@media, with the media list replaced by a media query list
@page
[https://www.w3.org/TR/css-2010/#at-rules]

cssatr.2007

name::
* McsEngl.cssatr.2007@cptIt,

_SPECIFIC:

cssstc.COMMENT

name::
* McsEngl.cssstc.COMMENT@cptIt,
* McsEngl.csscode.COMMENT@cptIt,
* McsEngl.css'comment@cptIt,

_DEFINITION:
* Comments are used to explain your code, and may help you when you edit the source code at a later date. Comments are ignored by browsers.
A CSS comment begins with "/*", and ends with "*/", like this:
/*This is a comment*/
[http://www.w3schools.com/css/css_syntax.asp]

_DESCRIPTION:
4.1.9 Comments

Comments begin with the characters "/*" and end with the characters "*/". They may occur anywhere outside other tokens, and their contents have no influence on the rendering. Comments may not be nested.

CSS also allows the SGML comment delimiters ("<!--" and "-->") in certain places defined by the grammar, but they do not delimit CSS comments. They are permitted so that style rules appearing in an HTML source document (in the STYLE element) may be hidden from pre-HTML 3.2 user agents. See the HTML 4 specification ([HTML4]) for more information.
[https://www.w3.org/TR/CSS2/syndata.html#comments]

cssdoc'ROOT-TREE

name::
* McsEngl.cssdoc'ROOT-TREE@cptIt,

css'tag

name::
* McsEngl.css'tag@cptIt,

INSIDE <HEAD>:
<style media="screen" type="text/css">
h1 {color: red;}

</style>

SEPARATE-FILE:
<link href="myFirstStyleSheet.css" rel="stylesheet" type="text/css">
The above line of code links your external style sheet called ‘myFirstStyleSheet.css’ to the HTML document. You place this code in between the <head> </head> tags in your web page.

classes:
.myNewStyle {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-weight: bold;
color:#FF0000;
}

.my2ndNewStyle {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-weight: bold;
color:#FF0000;
}

.my3rdNewStyle {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-weight: bold;
font-size: 12pt;
color:#FF0000;
}

applyed as:
<h2 class=”my3rdNewStyle”>My CSS styled text</h2>

div {
background: rgb(204,204,255);
padding: 0.5em;
border: 1px solid#000000;
}
The above CSS code sets that any <div></div> tag will now have a background color of ‘rgb(204,204,255)’ and have a padding of 0.5em and a thin 1 pixel border that is solid black.

cssdoc.SPECIFIC

name::
* McsEngl.cssdoc.SPECIFIC@cptIt,
* McsEngl.css'example@cptIt,
* McsEngl.csscode.EXAMPLE@cptIt,

_ADDRESS.WPG:
* http://www.java2s.com/Code/HTMLCSS/CatalogHTMLCSS.htm,

cssdoc.EXTERNAL

name::
* McsEngl.cssdoc.EXTERNAL@cptIt,
* McsEngl.css'external-stylesheet@cptIt,

_DESCRIPTION:
The css-code is an external file:
We put the element 'link' inside the 'head' element.
<link href="http://synagonism.net/hitp/hitp.css" rel="stylesheet" type="text/css"/>
[hmnSngo.2013-10-22]

cssdoc.INTERNAL

name::
* McsEngl.cssdoc.INTERNAL@cptIt,
* McsEngl.cssstylesheet.internal@cptIt,
* McsEngl.css'internal-stylesheet@cptIt,

_DESCRIPTION:
The css-code is inside the html-element 'style' inside the 'head' element.
[hmnSngo.2013-10-22]

cssdoc.INLINE

name::
* McsEngl.cssdoc.INLINE@cptIt,
* McsEngl.inline-css@cptIt,

_DESCRIPTION:
The css-code is inside the attribute 'style' of any html-element.
[hmnSngo.2013-10-22]

cssdoc.AAj

name::
* McsEngl.cssdoc.AAj@cptIt,

HEADINGS.RAINBOW:
1 Indigo  Treaty
2 Blue  Part
3 Green  Title
4 Yellow  Chapter
5 Orange  Section
6 Red  Article

/* Generic Selectors */

body {
font-family: Georgia, "Times New Roman", Times, serif;
font-size: 16px;
background-color:#FFFFE0;/*#F5FFFA;#FDF5E6;#FFF5EE;#eeeccc;*/
/* margin-left: 0px;*/
}

p {
 text-indent: 3%;
/* margin-left: 0px;*/
}

li {
list-style-type: none;
line-height: 150%;
list-style-image: url(../images/arrowSmall.gif);
}

h1 {
font-family: Georgia, "Times New Roman", Times, serif;
font-size: 20px;
font-weight: bold;
color:#F0FFFF;
background-color: Indigo;
border: 1px solid#111111;
margin-left: 0px;
}

h2 {
font-family: Georgia, "Times New Roman", Times, serif;
font-size: 18px;
font-weight: bold;
color:#F0FFFF;
background-color: Blue;
border: 1px solid#111111;
margin-left: 20px;
}

h3 {
font-family: Georgia, "Times New Roman", Times, serif;
font-size: 16px;
font-weight: bold;
color:#F0FFFF;
background-color: Green;
border: 1px solid#111111;
margin-left: 40px;
}

h4 {
font-family: Georgia, "Times New Roman", Times, serif;
font-size: 14px;
font-weight: bold;
color:#800000;
background-color: Yellow;
border: 1px solid#111111;
margin-left: 60px;
}

h5 {
font-family: Georgia, "Times New Roman", Times, serif;
font-size: 14px;
font-weight: bold;
color:#000000;
background-color: Orange;
border: 1px solid#111111;
margin-left: 80px;
}

h6 {
font-family: Georgia, "Times New Roman", Times, serif;
font-size: 14px;
font-weight: bold;
color:#FFFFFF;
background-color: Red;
border: 1px solid#111111;
margin-left: 100px;
}
/**************** Pseudo classes ****************/

a:link {
color:#0000ff;
text-decoration: underline;
font-weight: bold;
}

a:visited {
color:#00CC00;
text-decoration: underline;
font-weight: bold;
}

a:hover {
color: rgb(0, 96, 255);
padding-bottom: 5px;
font-weight: bold;
text-decoration: underline;
}

a:active {
color: rgb(255, 0, 102);
font-weight: bold;
}

li :link {
color:#00CC00;
text-decoration: none;
font-weight: bold;
}

li a:visited {
color:#00CC00;
text-decoration: none;
font-weight: bold;
}

li a:hover {
display: block;
color: rgb(0, 96, 255);
padding-bottom: 5px;
font-weight: bold;
border-bottom-width: 1px;
border-bottom-style: solid;
border-bottom-color:#C6EC8C;
}

/************************* ID's *************************/

#title {
font-family: Georgia, "Times New Roman", Times, serif;
font-size: 44px;
font-weight: bold;
color:#800000;
padding: 0 0 20px 0; /*top right bottom left*/
margin-top: 20px;
margin-bottom: 20px;
text-align: center;
}

cssdoc.ALIGN-MANAGEMENT

name::
* McsEngl.cssdoc.ALIGN-MANAGEMENT@cptIt,
* McsEngl.css'align@cptIt,
* McsEngl.css'alignment@cptIt,

_CODE.CSS:
text-align: center;

_ADDRESS.WPG:
* http://phrogz.net/css/vertical-align/index.html,

cssdoc.align.Horizontal

name::
* McsEngl.cssdoc.align.Horizontal@cptIt,
* McsEngl.css'Horizontal-alignment@cptIt,

_CODE.CSS:
margin-left:auto;
margin-right:auto;
width:70%;
[http://www.w3schools.com/css/css_align.asp]

cssdoc.align.VERTICAL

name::
* McsEngl.cssdoc.align.VERTICAL@cptIt,
* McsEngl.css'vertical-alignment@cptIt,

_CODE.CSS:
===
// p inside div
p.clsButonCloseOpen {
position: relative;
top: 33%;
}
[\File1a\WebsiteSngm\hitp\hitp.css]

cssdoc.CHILD first-child (psuedo-class)

name::
* McsEngl.cssdoc.CHILD first-child (psuedo-class)@cptIt,

Definition and Usage
The :first-child pseudo-class adds a style to an element that is the first child of another element.

_CODE.CSS:
In the example below, the selector matches any p element that is the first child of another element (here, the first p element is the first child of the body element):
<html>
<head>
<style type="text/css">
p:first-child {color:blue}
</style>
</head>

<body>
<p>This is some text.</p>
<p>This is some text.</p>
</body>
</html>

cssdoc.FRAME

name::
* McsEngl.cssdoc.FRAME@cptIt,
* McsEngl.css'frame@cptIt,

_ADDRESS.WPG:
* http://www.dynamicdrive.com/style/layouts/category/C11//
* http://www.webpelican.com/web-tutorials/css-frames-tutorial/
* http://www.clearlyadvanced.com/css-frames.php

_CODE.CSS:
#content {
position: fixed;
width: 80%;
right: 0px;      /* Distance from right-side */
top: 64px;      /* Distance from top */
bottom: 0px;      /* Distance from bottom */
background-color:#ccccff;
overflow: auto;      /* create scroll-bars */
}

cssdoc.FRAMEWORK

name::
* McsEngl.cssdoc.FRAMEWORK@cptIt,
* McsEngl.css'framework@cptIt,

_DESCRIPTION:
Because CSS layout is so tricky, there are CSS frameworks out there to help make it easier. Here are a few if you want to check them out. Using a framework is only good idea if the framework really does what you need your site to do. They're no replacement for knowing how CSS works.
[http://learnlayout.com/frameworks.html]

cssdoc.HEIGHT#ql:cssppt.height#

name::
* McsEngl.cssdoc.HEIGHT@cptIt,
* McsEngl.css'height@cptIt,

cssdoc.HIDING

name::
* McsEngl.cssdoc.HIDING@cptIt,
* McsEngl.css'hiding@cptIt,

_ADDRESS.WPG:
* http://jsfiddle.net/rR8Hh//

_CODE.HML:
visibility: hidden;
===
display: none;
===
font-size:0:
.standfirst {
font-size: 0;
}

.standfirst .byline {
font-size: 16px;
}
<p class="standfirst">
<span class="article-info"><em class="byline">Rory Callinan</em></span>
<span class='content'>A FORMER nightwatchman at the Port Macquarie company accused of dumping contaminated waste.</span>
</p>
==> DISPLAYES only Rory Callinam
[http://jsfiddle.net/NUYK2/]

cssdoc.LINK

name::
* McsEngl.cssdoc.LINK@cptIt,
* McsEngl.css'ex.link@cptIt,

css'link_not_working:
* z-index, is wrong
* line-length, makes underline invisible,

cssdoc.MENU

name::
* McsEngl.cssdoc.MENU@cptIt,
* McsEngl.css'ex.menu@cptIt,
* McsEngl.css'menu-example@cptIt,

_ADDRESS.WPG:
* http://webdesignerwall.com/tutorials/css3-dropdown-menu, beutiful.

cssdoc.TAB

name::
* McsEngl.cssdoc.TAB@cptIt,
* McsEngl.css'frame@cptIt,

_ADDRESS.WPG:
* http://www.brainjar.com/css/tabs/demo.html,
* http://htmldog.com/articles/tabs/

css'UNOBTRUSIVE

name::
* McsEngl.css'UNOBTRUSIVE@cptIt,

Lately, though, there has been a lot of emphasis being placed on what has been called Unobtrusive JavaScript. Read on.

Unobtrusive JavaScript
Current web development trends point to greater separation between content, style, and behavior. What that means is removing as much as possible scripts from the HTML markup and placing them exclusively in external files.
[http://www.learn-javascript-tutorial.com/Production-Grade-JS.cfm]

css'BINARY-CODE

name::
* McsEngl.css'BINARY-CODE@cptIt,

css'code-point

name::
* McsEngl.css'code-point@cptIt,

code point
A Unicode code point. [UNICODE] Any value in the Unicode codespace; that is, the range of integers from 0 to (hexadecimal) 10FFFF.
next input code point
The first code point in the input stream that has not yet been consumed.
current input code point
The last code point to have been consumed.
reconsume the current input code point
Push the current input code point back onto the front of the input stream, so that the next time you are instructed to consume the next input code point, it will instead reconsume the current input code point.
EOF code point
A conceptual code point representing the end of the input stream. Whenever the input stream is empty, the next input code point is always an EOF code point.
digit
A code point between U+0030 DIGIT ZERO (0) and U+0039 DIGIT NINE (9).
hex digit
A digit, or a code point between U+0041 LATIN CAPITAL LETTER A (A) and U+0046 LATIN CAPITAL LETTER F (F), or a code point between U+0061 LATIN SMALL LETTER A (a) and U+0066 LATIN SMALL LETTER F (f).
uppercase letter
A code point between U+0041 LATIN CAPITAL LETTER A (A) and U+005A LATIN CAPITAL LETTER Z (Z).
lowercase letter
A code point between U+0061 LATIN SMALL LETTER A (a) and U+007A LATIN SMALL LETTER Z (z).
letter
An uppercase letter or a lowercase letter.
non-ASCII code point
A code point with a value equal to or greater than U+0080 <control>.
name-start code point
A letter, a non-ASCII code point, or U+005F LOW LINE (_).
name code point
A name-start code point, A digit, or U+002D HYPHEN-MINUS (-).
non-printable code point
A code point between U+0000 NULL and U+0008 BACKSPACE, or U+000B LINE TABULATION, or a code point between U+000E SHIFT OUT and U+001F INFORMATION SEPARATOR ONE, or U+007F DELETE.
newline
U+000A LINE FEED. Note that U+000D CARRIAGE RETURN and U+000C FORM FEED are not included in this definition, as they are converted to U+000A LINE FEED during preprocessing.
whitespace
A newline, U+0009 CHARACTER TABULATION, or U+0020 SPACE.
surrogate code point
A code point between U+D800 and U+DFFF inclusive.
maximum allowed code point
The greatest code point defined by Unicode: U+10FFFF.
identifier
A portion of the CSS source that has the same syntax as an <ident-token>. Also appears in <at-keyword-token>, <function-token>, <hash-token> with the "id" type flag, and the unit of <dimension-token>.
[https://www.w3.org/TR/css-syntax/#tokenizer-definitions]

css'Human

name::
* McsEngl.css'Human@cptIt,

csshmn.AUTHOR

name::
* McsEngl.csshmn.AUTHOR@cptIt,

_DESCRIPTION:
Author
An author is a person who writes documents and associated style sheets. An authoring tool is a User Agent that generates style sheets.
User
A user is a person who interacts with a user agent to view, hear, or otherwise use a document and its associated style sheet. The user may provide a personal style sheet that encodes personal preferences.
[https://www.w3.org/TR/CSS2/conform.html#author]

csshmn.CREATOR

name::
* McsEngl.csshmn.CREATOR@cptIt,

Hakon_Wium_Lie:
"There is important work left to be done for layout," Ha*kon Wium Lie, who is also Opera's chief technology officer, said in an interview here. The new CSS3 under development now can handle multi-column text arrangements, "but you couldn't replicate a printed newspaper in CSS."
Lie, who worked with Web creator Tim Berners-Lee at CERN, was the founder of CSS in the 1990s.
[http://news.cnet.com/8301-30685_3-20019705-264.html?tag=topStories3#ixzz12Uuczpj0]

csshmn.SOFTWARE-MAKER

name::
* McsEngl.csshmn.SOFTWARE-MAKER@cptIt,

_DESCRIPTION:
For software makers, there is an easy way to know what parts of CSS should be implemented and what parts not yet. Since 2007, the working group publishes so called snapshots, which explain exactly that. Much of the text of this article is in fact taken from the 2010 snapshot.
[https://www.w3.org/Style/2011/CSS-process]

csshmn.USER

name::
* McsEngl.csshmn.USER@cptIt,

_DESCRIPTION:
User
A user is a person who interacts with a user agent to view, hear, or otherwise use a document and its associated style sheet. The user may provide a personal style sheet that encodes personal preferences.
[https://www.w3.org/TR/CSS2/conform.html#author]
===
For users of CSS, the situation is unfortunately less clear. Even if some part of CSS becomes a standard (i.e., a W3C Recommendation), it only means that that part has been correctly implemented in a certain number of implementations. It does not mean that all implementations of CSS support it. Trial and error, and fallback solutions, remain necessary.
[https://www.w3.org/Style/2011/CSS-process]

css'Organization

name::
* McsEngl.css'Organization@cptIt,

CSS-WG

name::
* McsEngl.CSS-WG@cptIt,

_DESCRIPTION:
The CSS working group discusses all technical matters on a public mailing list, www-style@w3.org. See “If you want to help” for more about that list.
The current draft CSS specifications are listed and explained on the “current work” page. In March 2008, the group started using Tracker to keep lists of issues, actions and group members. See also the working group's charter (version 2014–2016).
The group also maintains a blog…
… and if you want to know what it is like to be a member, read Fantasai's “about:csswg.”
[https://www.w3.org/Style/CSS/members]

_ADDRESS.WPG:
* https://www.w3.org/Style/CSS/members,
* http://fantasai.inkedblade.net/weblog/2011/inside-csswg//
* https://www.w3.org/blog/CSS//

css'Preprocessor.LESS

name::
* McsEngl.css'Preprocessor.LESS@cptIt,
* McsEngl.less-language@cptIt,

_DESCRIPTION:
Less is a CSS pre-processor, meaning that it extends the CSS language, adding features that allow variables, mixins, functions and many other techniques that allow you to make CSS that is more maintainable, themable and extendable.
Less runs inside Node, in the browser and inside Rhino. There are also many 3rd party tools that allow you to compile your files and watch for changes.
[http://lesscss.org/]
===
Less (sometimes stylized as LESS) is a dynamic style sheet language that can be compiled into Cascading Style Sheets (CSS) and run on the client side or server side.[2] Designed by Alexis Sellier, Less is influenced by Sass and has influenced the newer "SCSS" syntax of Sass, which adapted its CSS-like block formatting syntax.[3] Less is open source. Its first version was written in Ruby; however, in the later versions, use of Ruby has been deprecated and replaced by JavaScript. The indented syntax of Less is a nested metalanguage, as valid CSS is valid Less code with the same semantics. Less provides the following mechanisms: variables, nesting, mixins, operators and functions; the main difference between Less and other CSS precompilers being that Less allows real-time compilation via less.js by the browser.[2][4]
[https://en.wikipedia.org/wiki/Less_(stylesheet_language)]

less'color-functions

name::
* McsEngl.less'color-functions@cptIt,

_CODE.LESS:
// LESS provides a variety of functions which
// transform colors. Colors are first
// converted to the HSL color-space, and then
// manipulated at the channel level.

// In the following examples we set
// @new-color to the result of a
// transformation on @color

@color:#444;

// Lighter or darker colors
// (using percentages):
@new-color: lighten(@color, 10%);
@new-color: darken(@color, 10%);

// More or less saturated colors
// (using percentages)
@new-color: saturate(@color, 10%);
@new-color: desaturate(@color, 10%);

// Less or more transparent colors
// (using percentages)
@new-color: fadein(@color, 10%);
@new-color: fadeout(@color, 10%);

// Larger or smaller hue
// (using degrees)
@new-color: spin(@color, 10);
@new-color: spin(@color, -10);


// You can also extract color information:
@hue: hue(@color);
@saturnation: saturation(@color);
@lightness: lightness(@color);

// Which is useful if you want to create a
// new colour using one or more properties
// from the old colour.

// Create @new-color with @color's hue, and
// its own saturation and lightness.
@new-colour: hsl(hue(@color), 45%, 90%);


// Using the functions to set a property
// works as expected:
@base:#f04615;

.class {
color: saturate(@base, 5%);
background-color: lighten(spin(@base, 8), 25%);
}

less'comments

name::
* McsEngl.less'comments@cptIt,

_CODE.LESS:
// CSS-style comments are preserved by LESS,
// LESS-style comments are 'silent', they
// don't show up in the compiled CSS output.

/* Hello, I'm a CSS-style comment */
// Hi, I'm a silent comment, I won't show up
// in your CSS
.class { color: black }
===
//css
/* Hello, I'm a CSS-style comment */
.class {
color:#000000;
}

less'escaping

name::
* McsEngl.less'escaping@cptIt,

_CODE.LESS:
// Sometimes you might need to output a CSS
// value which is either not valid CSS syntax,
// or uses propriatery syntax which LESS
// doesn't recognize.

// To output such value, we place it inside a
// string prefixed with ~, for example:

.class {
filter: ~"progid:DXImageTransform.Microsoft.AlphaImageLoader(src='image.png')";
}
===
//css
.class {
filter: progid:DXImageTransform.Microsoft.AlphaImageLoader(src='image.png');
}

less'importing

name::
* McsEngl.less'importing@cptIt,

_CODE.LESS:
// You can import .less files, and all the
// variables and mixins in them will be made
// available to the main file. The .less
// extension is optional, so both of these are
// valid:

// @import "lib.less";
// @import "lib";

// If you want to import a CSS file, and don't
// want LESS to process it, just use the .css
// extension:

// @import "lib.css";


// And to show that it works we import the
// winLESS.org LESS file:
@import "/style/less/main";

less'lessc

name::
* McsEngl.less'lessc@cptIt,

_INSTALL:
npm install less -g

_RUN:
Examples

# compile bootstrap.less to bootstrap.css
$ lessc bootstrap.less bootstrap.css

# compile bootstrap.less to bootstrap.css and minify (compress) the result
$ lessc -x bootstrap.less bootstrap.css

less'mixin

name::
* McsEngl.less'mixin@cptIt,

_CODE.LESS:
// Mixins allow you to reuse the contents
// of a certain ruleset in another ruleset

// The bordered class
.bordered {
border-top: dotted 1px black;
border-bottom: solid 2px black;
}

// We reuse the contents of the bordered class
// in#menu a and .post a
#menu a {
color:#111;
.bordered;
}
.post a {
color: red;
.bordered;
}
===
//CSS
.bordered {
border-top: dotted 1px black;
border-bottom: solid 2px black;
}
#menu a {
color:#111;
border-top: dotted 1px black;
border-bottom: solid 2px black;
}
.post a {
color: red;
border-top: dotted 1px black;
border-bottom: solid 2px black;
}

less'mixin.parametric

name::
* McsEngl.less'mixin.parametric@cptIt,
* McsEngl.less'parametric-mixin@cptIt,

_CODE.LESS:
// LESS has a special type of ruleset which
// acts sort of like a function: the
// parametric mixin

//The parametric mixin '.border-radius'
.border-radius (@radius) {
border-radius: @radius;
-moz-border-radius: @radius;
-webkit-border-radius: @radius;
}

// Which can be used like this:
#header {
.border-radius(4px);
}
.button {
.border-radius(6px);
}


// A parametric mixin with a default value:
.border-radius-with-default(@radius: 5px) {
border-radius: @radius;
-moz-border-radius: @radius;
-webkit-border-radius: @radius;
}

// Which can be used like this:
#content {
.border-radius-with-default;
}

// You can also use a parametric mixin
// without any parameters. This is useful if
// you don't want the original mixin itself
// in the css output
.wrap () {
text-wrap: wrap;
white-space: pre-wrap;
white-space: -moz-pre-wrap;
word-wrap: break-word;
}
pre {
.wrap;
}
===
//CSS
#header {
border-radius: 4px;
-moz-border-radius: 4px;
-webkit-border-radius: 4px;
}
.button {
border-radius: 6px;
-moz-border-radius: 6px;
-webkit-border-radius: 6px;
}
#content {
border-radius: 5px;
-moz-border-radius: 5px;
-webkit-border-radius: 5px;
}
pre {
text-wrap: wrap;
white-space: pre-wrap;
white-space: -moz-pre-wrap;
word-wrap: break-word;
}

less'namespace

name::
* McsEngl.less'namespace@cptIt,

_CODE.LESS:
// In LESS you can use namespaces. This can
// help you to organize your code, and it
// offers you encapsulation.

// We declare the '.button'-mixin in the
// '#myNamespace' namespace.
#myNamespace {
.button () {
display: block;
border: 1px solid black;
background-color: grey;
&:hover {
background-color: white;
}
}
}

// Using the '.button'-mixin:
#header a {
color: red;
#myNamespace > .button();
}
===
//css
#header a {
color: red;
display: block;
border: 1px solid black;
background-color: grey;
}
#header a:hover {
background-color: white;
}

less'nested-rule

name::
* McsEngl.less'nested-rule@cptIt,

_CODE.LESS:
// In LESS you can nest your rulesets.
// This is a very important feature because:
// -You don't have to write out repeating long
// selectors
// -It helps to structurize your code

#content {
width: 500px;

a {
color: white;

// You can use the '&'-selector to
// apply a nested selector to the
// parent selector:
&:hover {
color: blue;
}

&.selected {
color: yellow
}
}
}
===
//CSS
#content {
width: 500px;
}
#content a {
color: white;
}
#content a:hover {
color: blue;
}
#content a.selected {
color:#ffff00;
}

less'operation

name::
* McsEngl.less'operation@cptIt,

_CODE.LESS:
// In LESS you can operate on any number,
// color or variable.

// Basic operations
@base: 200px;
@height: @base * 2;
@min-width: @base + 100;
@max-width: (@min-width - 50) * 2;

.basic_operations {
height: @height;
min-width: @min-width;
max-width: @max-width;
}

// Operating on colors:
@base-color:#444;

.color_operations {
color: @base-color / 4;
background-color: @base-color +#111;
}
===
//css
.basic_operations {
height: 400px;
min-width: 300px;
max-width: 500px;
}
.color_operations {
color:#111111;
background-color:#555555;
}

less'resource

name::
* McsEngl.less'resource@cptIt,

_ADDRESS.WPG:
* http://lesscss.org//
* http://winless.org/online-less-compiler,

less'scope

name::
* McsEngl.less'scope@cptIt,

_CODE.LESS:
// Scope in LESS is very similar to that of
// programming languages. Variables and mixins
// are first looked up locally, and if they
// aren't found, the compiler will look in the
// parent scope, and so on.

@var: red;

#page {
@var: white;
#header {
color: @var; // white
}
}

#footer {
color: @var; // red
}
===
//css
#page#header {
color:#ffffff;
}
#footer {
color:#ff0000;
}

less'string-interpolation

name::
* McsEngl.less'string-interpolation@cptIt,

_CODE.LESS:
// Variables can be embeded inside strings in
// a similar way to ruby or PHP, with the
// @{name} construct:

@base-url: "http://assets.fnord.com";
.container {
background-image: url("@{base-url}/images/bg.png");
}
===
//css
.container {
background-image: url("http://assets.fnord.com/images/bg.png");
}

less'variable

name::
* McsEngl.less'variable@cptIt,

_CODE.LESS:
// Declaring variables
@border-width: 1px;
@red:#842210;

// Using variables
div#header {
border: @border-width solid @red;
}
=== CSS
div#header {
border: 1px solid#842210;
}

css'preprocessor.SASS

name::
* McsEngl.css'preprocessor.SASS@cptIt,
* McsEngl.SASS-lag@cptIt,
* McsEngl.Sass-(Syntactically-Awesome-Stylesheets)@cptIt,

_DESCRIPTION:
Since the creation of Sass nearly 5 years ago, it has been plagued by many levels of controversy. It billed itself as "a better CSS" and added brand new features unheard of to CSS authors such as variables, nesting and mixins. Sass also introduced an entirely different indentation-oriented syntax and a brand new perspective on how to author CSS.
[http://thesassway.com/editorial/sass-vs-scss-which-syntax-is-better]
===
The original syntax, called "the indented syntax", uses a syntax similar to Haml.[4] It uses indentation to separate code blocks and newline characters to separate rules. The newer syntax, "SCSS", uses block formatting like that of CSS. It uses braces to denote code blocks and semicolons to separate lines within a block. The indented syntax and SCSS files are traditionally given the extensions .sass and .scss, respectively.
[https://en.wikipedia.org/wiki/Sass_(stylesheet_language)]

css'preprocessor.SCSS

name::
* McsEngl.css'preprocessor.SCSS@cptIt,
* McsEngl.Sassy-CSS@cptIt,
* McsEngl.SCSS-lag@cptIt,

_DESCRIPTION:
SCSS to the rescue!
In version 3 of Sass, the SCSS (Sassy CSS) syntax was introduced as "the new main syntax" for Sass and builds on the existing syntax of CSS. It uses brackets and semi-colons just like CSS. It doesn't care about indentation levels or white-space. In fact, Sass's SCSS syntax is a superset of CSS – which means SCSS contains all the features of CSS, but has been expanded to include the features of Sass as well. In layman's terms, any valid CSS is valid SCSS. And in the end, SCSS has the exact same features as the Sass syntax, minus the opinionated syntax.

Those who are new to Sass have less to learn. And as for Sass detractors, well, they can no longer complain about the syntax. As far as I'm concerned, SCSS is the new CSS.
[http://thesassway.com/editorial/sass-vs-scss-which-syntax-is-better]

css'Tool

name::
* McsEngl.css'Tool@cptIt,
* McsEngl.css'tool@cptIt,
* McsEngl.csstool@cptIt,

csstool.EDITOR

name::
* McsEngl.csstool.EDITOR@cptIt,

_ADDRESS.WPG:
* http://www.hongkiat.com/blog/top-css-editors-reviewed//

csstool.Generator

name::
* McsEngl.csstool.Generator@cptIt,

_ADDRESS.WPG:
* http://css3generator.com//

csstool.Optimizer

name::
* McsEngl.csstool.Optimizer@cptIt,

_ADDRESS.WPG:
* https://github.com/afelix/csso,
* http://css.github.io/csso/csso.html,

csstool.User-agent

name::
* McsEngl.csstool.User-agent@cptIt,

_DESCRIPTION:
A user agent is any program that interprets a document written in the document language and applies associated style sheets according to the terms of this specification. A user agent may display a document, read it aloud, cause it to be printed, convert it to another format, etc.
An HTML user agent is one that supports one or more of the HTML specifications. A user agent that supports XHTML [XHTML], but not HTML is not considered an HTML user agent for the purpose of conformance with this specification.
[https://www.w3.org/TR/CSS2/conform.html#author]

css'Specification (spn)

name::
* McsEngl.css'Specification (spn)@cptIt,
* McsEngl.css'spec@cptIt,
* McsEngl.cssspn@cptIt,

_ADDRESS.WPG:
* https://www.w3.org/Style/CSS/current-work, ALL,
* https://www.w3.org/TR/CSS//
* https://www.w3.org/TR/css-2015// This document collects together into one definition all the specs that together form the current state of Cascading Style Sheets (CSS) as of 2015. The primary audience is CSS implementers, not CSS authors, as this definition includes modules by specification stability, not Web browser adoption rate.
* https://www.w3.org/standards/techs/css#w3c_all,
* http://www.w3.org/Style/CSS/specs,

SPECIFIC

_SPECIFIC:
Module and snapshot are two kinds of documents. The CSS working group uses those names as explained above, but other working groups may use them in different ways. On the other hand, to indicate the stability of each document, W3C has a vocabulary that all working groups share:
WD, LC|LCWD, CR, PR, REC.
[https://www.w3.org/Style/2011/CSS-process]

{cssspn.2016-10-13}:
* cssspn.snapshot.2015:
* https://www.w3.org/TR/2015/NOTE-css-2015-20151013//
CSS Snapshot 2015
W3C Working Group Note, 13 October 2015

{cssspn.2013-11-07}:
* cssspn.style_attributes.2013-11-07:
* https://www.w3.org/TR/2013/REC-css-style-attr-20131107//
CSS Style Attributes
W3C Recommendation 07 November 2013

{cssspn.2012-06-19.media_queries}:
* cssspn.media_queries.2012-06-19
* https://www.w3.org/TR/2012/REC-css3-mediaqueries-20120619/#h5o-1/
Media Queries
W3C Recommendation 19 June 2012

{cssspn.2011-09-29}:
{cssspn.2011-09-29.selectors}:
* cssspn.selectors.2011-09-29:
* https://www.w3.org/TR/2011/REC-css3-selectors-20110929//
Selectors Level 3
W3C Recommendation 29 September 2011
===
{cssspn.2011-09-29.namespaces}:
* cssspn.namespaces.2011-09-29:
* https://www.w3.org/TR/2014/REC-css-namespaces-3-20140320//
CSS Namespaces Module Level 3
W3C Recommendation 29 September 2011, edited in place 20 March 2014

{cssspn.2011-06-07}:
* cssspn.level2.2011-06-07:
* https://www.w3.org/TR/CSS2//
Cascading Style Sheets Level 2 Revision 1 (CSS 2.1) Specification
W3C Recommendation 07 June 2011,
===
* cssspn.color.level3.2011-06-07:
* https://www.w3.org/TR/2011/REC-css3-color-20110607//
CSS Color Module Level 3
W3C Recommendation 07 June 2011

{cssspn.1996-12-17.level1}:
* cssspn.level1.1996-12-17:
* https://www.w3.org/TR/CSS1//
Cascading Style Sheets, level 1
W3C Recommendation 17 Dec 1996, revised 11 Apr 2008

cssspn.RECOMMENDATION (REC)

name::
* McsEngl.cssspn.RECOMMENDATION (REC)@cptIt,

{cssspn.REC.2013-11-07}:
* cssspn.REC.style_attributes.2013-11-07:
* https://www.w3.org/TR/2013/REC-css-style-attr-20131107//
CSS Style Attributes
W3C Recommendation 07 November 2013

{cssspn.REC.2012-06-19.media_queries}:
* cssspn.REC.media_queries.2012-06-19
* https://www.w3.org/TR/2012/REC-css3-mediaqueries-20120619/#h5o-1/
Media Queries
W3C Recommendation 19 June 2012

{cssspn.REC.2011-09-29}:
{cssspn.REC.2011-09-29.selectors}:
* cssspn.selectors.2011-09-29:
* https://www.w3.org/TR/2011/REC-css3-selectors-20110929//
Selectors Level 3
W3C Recommendation 29 September 2011
===
{cssspn.REC.2011-09-29.namespaces}:
* cssspn.namespaces.2011-09-29:
* https://www.w3.org/TR/2014/REC-css-namespaces-3-20140320//
CSS Namespaces Module Level 3
W3C Recommendation 29 September 2011, edited in place 20 March 2014

{cssspn.REC.2011-06-07}:
* cssspn.REC.level2.2011-06-07:
* https://www.w3.org/TR/CSS2//
Cascading Style Sheets Level 2 Revision 1 (CSS 2.1) Specification
W3C Recommendation 07 June 2011,
===
* cssspn.REC.color.level3.2011-06-07:
* https://www.w3.org/TR/2011/REC-css3-color-20110607//
CSS Color Module Level 3
W3C Recommendation 07 June 2011

{cssspn.REC.1996-12-17.level1}:
* cssspn.REC.level1.1996-12-17:
* https://www.w3.org/TR/CSS1//
Cascading Style Sheets, level 1
W3C Recommendation 17 Dec 1996, revised 11 Apr 2008

cssspn.PROPOSED-RECOMMENDATION (PR)

name::
* McsEngl.cssspn.PROPOSED-RECOMMENDATION (PR)@cptIt,

cssspn.CANDIDATE-RECOMMENDATION (CR)

name::
* McsEngl.cssspn.CANDIDATE-RECOMMENDATION (CR)@cptIt,

cssspn.LAST-CALL (CR)

name::
* McsEngl.cssspn.LAST-CALL (CR)@cptIt,

cssspn.WORKING-DRAFT (WD)

name::
* McsEngl.cssspn.WORKING-DRAFT (WD)@cptIt,

cssspn.LEVEL

name::
* McsEngl.cssspn.LEVEL@cptIt,

_DESCRIPTION:
Cascading Style Sheets does not have versions in the traditional sense; instead it has levels.
Each level of CSS builds on the previous, refining definitions and adding features.
The feature set of each higher level is a superset of any lower level, and the behavior allowed for a given feature in a higher level is a subset of that allowed in the lower levels.
A user agent conforming to a higher level of CSS is thus also conformant to all lower levels.
[https://www.w3.org/Style/2011/CSS-process]

cssspn.SNAPSHOT (sps)

name::
* McsEngl.cssspn.SNAPSHOT (sps)@cptIt,
* McsEngl.csssnapshot@cptIt,
* McsEngl.csssps@cptIt,

_DESCRIPTION:
For software makers, there is an easy way to know what parts of CSS should be implemented and what parts not yet. Since 2007, the working group publishes so called snapshots, which explain exactly that.
...
A separate document, the CSS snapshot, defines the current scope and state of CSS. It includes only modules that the working group considers stable and for which there is enough implementation experience to be sure of that stability.
Specifications listed in the snapshot are not completely frozen, though. They include W3C Candidate Recommendations (see below). But even the listed W3C Recommendations (standards) may still receive errata.
[https://www.w3.org/Style/2011/CSS-process]

cssspn.CURRENT

name::
* McsEngl.cssspn.CURRENT@cptIt,

_ADDRESS.WPG:
* https://www.w3.org/Style/CSS/current-work,

cssspn.2015snapshot

name::
* McsEngl.cssspn.2015snapshot@cptIt,

2. Cascading Style Sheets (CSS) — The Official Definition

As of 2015, Cascading Style Sheets (CSS) is defined by the following specifications.

* http://www.w3.org/TR/CSS2//
CSS Level 2, latest revision (including errata) [CSS2]
This defines the core of CSS, parts of which are overridden by later specifications. We recommend in particular reading Chapter 2, which introduces some of the basic concepts of CSS and its design principles.

* http://www.w3.org/TR/css-syntax-3//
CSS Syntax Level 3 [CSS-SYNTAX-3]
Replaces CSS2§4.1, CSS2§4.1, CSS2§4.2, CSS2§4.4, and CSS2§G, defining how CSS is parsed.

* http://www.w3.org/TR/css-style-attr//
CSS Style Attributes [CSS-STYLE-ATTR]
Defines how CSS declarations can be embedded in markup attributes.

* http://www.w3.org/TR/css3-mediaqueries/
Media Queries Level 3 [CSS3-MEDIAQUERIES]
Replaces CSS2§7.3 and expands on the syntax for media-specific styles.

* http://www.w3.org/TR/css3-conditional/
CSS Conditional Rules Level 3 [CSS3-CONDITIONAL]
Replaces CSS2§7.2, updating the definition of @media rules to allow nesting, and introduces @supports rules for feature-support queries.

* http://www.w3.org/TR/css3-namespace/
CSS Namespaces [CSS3-NAMESPACE]
Introduces an @namespace rule to allow namespace-prefixed selectors.

* http://www.w3.org/TR/css3-selectors/
Selectors Level 3 [SELECT]
Replaces CSS2§5 and CSS2§6.4.3, defining an extended range of selectors.

* http://www.w3.org/TR/css3-cascade/
CSS Cascading and Inheritance Level 3 [CSS-CASCADE-3]
Replaces CSS2§1.4.3 and CSS2§6

* http://www.w3.org/TR/css3-values/
CSS Values and Units Level 3 [CSS-VALUES-3]
Replaces CSS2§1.4.2.1, CSS2§4.3, and CSS2§A.2.1–3, defining CSS’s property definition syntax and expanding its set of units.

* http://www.w3.org/TR/css3-color/
CSS Color Level 3 [CSS3-COLOR]
Replaces CSS2§4.3.6, CSS2§14.1, and CSS2§18.2, defining an extended range of color values. Also introduces the opacity property.

* http://www.w3.org/TR/css3-background/
CSS Backgrounds and Borders Level 3 [CSS3-BACKGROUND]
Replaces CSS2§8.5 and CSS2§14.2, providing more control of backgrounds and borders, including layered background images, image borders, and drop shadows.

* http://www.w3.org/TR/css3-images/
CSS Image Values and Replaced Content Level 3 [CSS3-IMAGES]
Provides a new foundation text for the sizing of replaced elements (such as images), adds additional controls to their sizing and orientation, and introduces syntax for gradients as images in CSS.

* http://www.w3.org/TR/css-fonts-3/
CSS Fonts Level 3 [CSS-FONTS-3]
Replaces https://www.w3.org/TR/CSS2/fonts.html#q15.0 and provides more control over font choice and feature selection.

* http://www.w3.org/TR/css3-multicol//
CSS Multi-column Layout Level 1 [CSS3-MULTICOL]
Introduces multi-column flows to CSS layout.

* http://www.w3.org/TR/css3-ui/
CSS User Interface Module Level 3 [CSS-UI-3]
Replaces CSS2§18.1 and CSS2§18.4, defining cursor, outline, and several new CSS features that also enhance the user interface.

* http://www.w3.org/TR/compositing-1/
CSS Compositing and Blending Level 1 [COMPOSITING]
Defines the compositing and blending of overlaid content and introduces features to control their modes.
Add will-change once it’s pushed to CR

The following modules are widely deployed with rough interoperability, but the details are not fully worked out and they need more testing and bugfixing.
CSS Transitions Level 1 [CSS3-TRANSITIONS] and CSS Animations Level 1 [CSS3-ANIMATIONS]
Define mechanisms for transitioning the computed values of CSS properties over time.
CSS Flexible Box Module Level 1 [CSS-FLEXBOX-1]
Introduces a flexible linear layout model for CSS.
CSS Transforms Level 1 [CSS3-TRANSFORMS]
Introduces graphical transformations to CSS.
The following modules have completed design work, and are fairly stable, but have not received much testing and implementation experience yet:
CSS Counter Styles Level 3 [CSS-COUNTER-STYLES-3]
Expands the possible values of <counter-style> and provides an @counter-style syntax for customized counter styles.
CSS Masking Level 1 [CSS-MASKING-1]
Replaces CSS2§11.1.2 and introduces more powerful ways of clipping and masking content.
CSS Shapes Module Level 1 [CSS-SHAPES-1]
Extends floats to effect non-rectangular wrapping shapes.
CSS Text Decoration Level 3 [CSS-TEXT-DECOR-3]
Replaces CSS2§16.3, providing more control over text decoration lines and adding the ability to specify text emphasis marks and text shadows.
CSS Speech Module Level 1 [CSS3-SPEECH]
Replaces CSS2§A, overhauling the (non-normative) speech rendering chapter.
We hope to incorporate them into a future snapshot.

A list of all CSS modules, stable and in-progress, and their statuses can be found at the CSS Current Work page.
[https://www.w3.org/TR/CSS/#css]

cssspn.2010snapshot

name::
* McsEngl.cssspn.2010snapshot@cptIt,

_ADDRESS.WPG:
* https://www.w3.org/TR/css-2010//
Cascading Style Sheets (CSS) Snapshot 2010
W3C Working Group Note 12 May 2011

_DESCRIPTION:
As of 2010, Cascading Style Sheets (CSS) is defined by the following specifications.
CSS Level 2 Revision 1 (including errata)
CSS Style Attributes
Media Queries Level 3
CSS Namespaces
Selectors Level 3
CSS Color Level 3
[https://www.w3.org/TR/css-2010/#css]

cssspn.2007snapshot

name::
* McsEngl.cssspn.2007snapshot@cptIt,

_DESCRIPTION:
3. Cascading Style Sheets Definition
As of 2007, Cascading Style Sheets (CSS) is defined by the following specifications.
CSS Level 2 Revision 1 (including errata)
CSS Style Attributes
CSS Namespaces
Selectors Level 3
CSS Color Level 3
[https://www.w3.org/TR/css-beijing/#css]

cssspn.MODULE

name::
* McsEngl.cssspn.MODULE@cptIt,

_DESCRIPTION:
The CSS working group chose to adopt a modular approach for CSS beyond level 2, where each module defines a part of CSS, rather than to write a single monolithic specification. This breaks the specification into more manageable chunks and allows more immediate, incremental improvement to CSS.
[https://www.w3.org/Style/2011/CSS-process]

cssspn.COLOR {2007sps}

name::
* McsEngl.cssspn.COLOR {2007sps}@cptIt,

cssspn.FONTS

name::
* McsEngl.cssspn.FONTS@cptIt,

_ADDRESS.WPG:
* cssspn.fonts.3.2013-10-03,
* https://www.w3.org/TR/2013/CR-css-fonts-3-20131003//
CSS Fonts Module Level 3
W3C Candidate Recommendation 3 October 2013

cssspn.MEDIA-QUERIES {2010sps}

name::
* McsEngl.cssspn.MEDIA-QUERIES {2010sps}@cptIt,

_ADDRESS.WPG:
* cssspn.media_queries.2012-06-19
* https://www.w3.org/TR/2012/REC-css3-mediaqueries-20120619/#h5o-1/
Media Queries
W3C Recommendation 19 June 2012

cssspn.NAMESPACES {2007sps}

name::
* McsEngl.cssspn.NAMESPACES {2007sps}@cptIt,

cssspn.SELECTORS {2007sps}

name::
* McsEngl.cssspn.SELECTORS {2007sps}@cptIt,

_ADDRESS.WPG:
* https://www.w3.org/TR/2011/REC-css3-selectors-20110929//
Selectors Level 3, W3C Recommendation 29 September 2011

cssspn.STYLE-ATTRIBUTES {2007sps}

name::
* McsEngl.cssspn.STYLE-ATTRIBUTES {2007sps}@cptIt,

* http://www.w3.org/TR/css-style-attr//
CSS Style Attributes [CSS-STYLE-ATTR]
Defines how CSS declarations can be embedded in markup attributes.
===
CSS Style Attributes
W3C Recommendation 07 November 2013

cssspn.SYNTAX {2015sps}

name::
* McsEngl.cssspn.SYNTAX {2015sps}@cptIt,

* http://www.w3.org/TR/css-syntax-3//
CSS Syntax Level 3 [CSS-SYNTAX-3]
Replaces CSS2§4.1, CSS2§4.1, CSS2§4.2, CSS2§4.4, and CSS2§G, defining how CSS is parsed.

cssspn.LEVEL3

name::
* McsEngl.cssspn.LEVEL3@cptIt,

_DESCRIPTION:
CSS Level 3 builds on level 2 module by module. Each module adds functionality to, and replaces part of, the CSS 2.1 specification. The working group intends that the CSS modules will not contradict the CSS 2.1 specification; only that they will add functionality and refine definitions. Modules develop at different speeds, depending on their complexity and the working group's priorities. For example, Selectors level 3 is already a Recommendation and there is even a first draft of Selectors level 4, while the CSS Line module level 3 is still at its first draft.
[https://www.w3.org/Style/2011/CSS-process]

cssspn.LEVEL2

name::
* McsEngl.cssspn.LEVEL2@cptIt,

_DESCRIPTION:
Although the old CSS2 specification is technically a W3C Recommendation, it passed into the Recommendation stage before the W3C had defined the Candidate Recommendation stage.
Over time, implementation experience and further review has brought to light many problems in the CSS2 specification, so, instead of expanding an already unwieldy errata list, the CSS working group chose to define CSS Level 2 Revision 1 (CSS 2.1).
In case of any conflict between the two specifications, CSS 2.1 contains the definitive definition.
Features in CSS2 that were dropped from CSS 2.1 should be considered to be at the Candidate Recommendation stage.
But, note that many of these have been or will be pulled into a CSS Level 3 working draft, which will, once it reaches CR, obsolete the definitions in CSS2.
[https://www.w3.org/Style/2011/CSS-process]

* https://www.w3.org/TR/CSS22//
Cascading Style Sheets Level 2 Revision 2 (CSS 2.2) Specification
W3C First Public Working Draft 12 April 2016

cssspn.LEVEL1

name::
* McsEngl.cssspn.LEVEL1@cptIt,

_DESCRIPTION:
The CSS Working Group considers the CSS1 specification to be obsolete.
CSS Level 1 is in practice defined as all the features of the CSS1 specification (properties, values, at-rules, etc), but using the syntax and definitions in the CSS 2.1 specification.
CSS Style Attributes defines its inclusion in element-specific style attributes.
[https://www.w3.org/Style/2011/CSS-process]

css'Relation-to-xsl

name::
* McsEngl.css'Relation-to-xsl@cptIt,
* McsEngl.css-relation-to-xsl@cptIt,
* McsEngl.xsl-relation-to-css@cptIt,

_DESCRIPTION:
WHY TWO STYLE SHEET LANGUAGES?
The fact that W3C has developed XSL in addition to CSS has caused some confusion. Why develop a second style sheet language when implementors haven't even finished the first one? The answer can be found in the table below:
         CSS  XSL
Can be used with HTML?  yes  no
Can be used with XML?  yes  yes
Transformation language?  no  yes
Syntax        CSS  XML
The unique features are that CSS can be used to style HTML & XML documents. XSL, on the other hand, is able to transform documents. For example, XSL can be used to transform XML data into HTML/CSS documents on the Web server. This way, the two languages complement each other and can be used together.
Both languages can be used to style XML documents.
CSS and XSL use the same underlying formatting model and designers therefore have access to the same formatting features in both languages. W3C will work hard to ensure that interoperable implementations of the formatting model are available.
A W3C Note on "Using XSL and CSS together" is available.
[https://www.w3.org/Style/]

_ADDRESS.WPG:
* https://www.w3.org/Style/CSS-vs-XSL,

css'Resource

name::
* McsEngl.css'Resource@cptIt,
* McsEngl.css'source@cptIt,

_ADDRESS.WPG:
* https://developer.mozilla.org/en-US/docs/Web/CSS,
* tutorial: http://www.w3schools.com/css/default.asp,
* reference: http://www.w3schools.com/cssref/default.asp,
* http://www.csstutorial.net/
* animation: http://www.codeproject.com/Articles/760609/Animation-on-your-webpages-with-CSS,

_BOOK:
* http://book.mixu.net/css/single-page.html,

SPECIFIC

name::
* McsEngl.css.specific@cptIt,

css.2015snapshot#ql:cssspn.2015snapshot#

name::
* McsEngl.css.2015snapshot@cptIt,

css.2010snapshot#ql:cssspn.2010snapshot#

name::
* McsEngl.css.2010snapshot@cptIt,

css.2007snapshot#ql:cssspn.2007snapshot#

name::
* McsEngl.css.2007snapshot@cptIt,

css.CSS4-modules

name::
* McsEngl.css.CSS4-modules@cptIt,

_DESCRIPTION:
There is no single, integrated CSS4 specification,[27] since it is split into separate modules. However, there are "level 4" modules.[28]

Since CSS3 split the CSS language's definition into modules, the modules have been allowed to level independently. Most modules are level 3 - they build on things from CSS 2.1. A few level 4 modules exist (such as Image Values, Backgrounds & Borders, or Selectors), which build on the functionality of a preceding level 3 module. Others define entirely new functionality, such as Flexbox.

So, while there is no monolithic "CSS4" that will be worked on after "CSS3" is finished completely, the level 4 modules can collectively be referred to as "CSS4".
[http://en.wikipedia.org/wiki/CSS#CSS_4] {2013-08-11}

css.CSS3-modules

name::
* McsEngl.css.CSS3-modules@cptIt,
* McsEngl.css3@cptIt576i,

_DESCRIPTION:
Unlike CSS 2, which is a large single specification defining various features, CSS 3 is divided into several separate documents called "modules". Each module adds new capabilities or extends features defined in CSS 2, over preserving backward compatibility. Work on CSS level 3 started around the time of publication of the original CSS 2 recommendation. The earliest CSS 3 drafts were published in June 1999.[24]

Due to the modularization, different modules have different stability and statuses.[25] As of June 2012, there are over fifty CSS modules published from the CSS Working Group.,[24] and four of these have been published as formal recommendations:

2012-06-19 : Media Queries
2011-09-29 : Namespaces
2011-09-29 : Selectors Level 3
2011-06-07 : Color
Some modules (including Backgrounds and Borders and Multi-column Layout among others) have Candidate Recommendation (CR) status and are considered moderately stable. At CR stage, implementations are advised to drop vendor prefixes.[26]
[http://en.wikipedia.org/wiki/CSS#CSS_3] {2013-08-11}

css3-animation

Today’s HTML5 applications can provide awesome experiences thanks to the new CSS3 specifications. One of them is CSS3 Animations. It can help you building rich animations on HTML elements. This can provide interesting feedbacks to the users and enables fast & fluid UIs. As those new animations are most of time hardware accelerated by the GPU, they definitely raise up the quality bar of the new generation of HTML5 applications.
[http://html5center.sourceforge.net/Build-Awesome-Apps-with-CSS3-Animations]

css.CSS2.1

_CREATED: {2011-06-07.W3C-REC}

name::
* McsEngl.css.CSS2.1@cptIt,
* McsEngl.css2@cptIt576i,

* https://www.w3.org/TR/CSS2//
Cascading Style Sheets Level 2 Revision 1 (CSS 2.1) Specification
W3C Recommendation 07 June 2011,

_DESCRIPTION:
CSS level 2 specification was developed by the W3C and published as a recommendation in May 1998. A superset of CSS 1, CSS 2 includes a number of new capabilities like absolute, relative, and fixed positioning of elements and z-index, the concept of media types, support for aural style sheets and bidirectional text, and new font properties such as shadows.
The W3C no longer maintains the CSS 2 recommendation.[21]
[http://en.wikipedia.org/wiki/CSS#CSS_2] {2013-08-11}

css.CSS1 {1996}

name::
* McsEngl.css.CSS1 {1996}@cptIt,
* McsEngl.css1@cptIt576i,

_DESCRIPTION:
The first CSS specification to become an official W3C Recommendation is CSS level 1, published in December 1996.[19] Among its capabilities are support for

Font properties such as typeface and emphasis
Color of text, backgrounds, and other elements
Text attributes such as spacing between words, letters, and lines of text
Alignment of text, images, tables and other elements
Margin, border, padding, and positioning for most elements
Unique identification and generic classification of groups of attributes
The W3C no longer maintains the CSS 1 Recommendation.[20]
[http://en.wikipedia.org/wiki/CSS#CSS_1] {2013-08-11}

css.PROFILE

name::
* McsEngl.css.PROFILE@cptIt,
* McsEngl.css.variant@cptIt,

_DESCRIPTION:
The Working Group doesn't expect that all implementations of CSS3 will implement all properties or values. Instead, there will probably be a small number of variants of CSS3, so-called "profiles".
[https://www.w3.org/TR/2011/REC-css3-color-20110607/#introduction]

lwp.LJB (browser-javascript)#cptIt554.11#

lwp.MathML (lmm)

name::
* McsEngl.conceptIt441: idLmm,
* McsEngl.computer-language.MathML,
* McsEngl.lcr.MathML,
* McsEngl.MathML@cptIt441,
* McsEngl.mathematical-markup-language@cptIt441,
* McsEngl.lmm, {2016-06-02}

lmm'DEFINITION

Mathematical Markup Language (MathML) is an application of XML for describing mathematical notations and capturing both its structure and content. It aims at integrating mathematical formulae into World Wide Web documents. It is a recommendation of the W3C math working group.
[http://en.wikipedia.org/wiki/Mathml]

lmm'GENERIC

_GENERIC:
* XML_BASED_LANGUAGE#cptIt439#
* XML_BASED_LANGUAGE

SGML (ISO_8879_1986)#cptIt133#

lmm'Program

name::
* McsEngl.lmm'Program@cptIt,

* http://www.w3.org/Math/Software/mathml_software_cat_editors.html

lmm'Resource

name::
* McsEngl.lmm'Resource@cptIt,

* WEB#ql::dezigneptero.nfo:http.mathml#:

lmm'SPECIFICATION

name::
* McsEngl.lmm'SPECIFICATION@cptIt,

2010: version 3.0

1998:
MathML was first published as a W3C Recommendation in 1998,

lmm'TOOL

name::
* McsEngl.lmm'TOOL@cptIt,

lmm'tool.READER

name::
* McsEngl.lmm'tool.READER@cptIt,
* McsEngl.mathml'reader@cptIt,
* McsEngl.lmm'reader@cptIt,

* MathJax#ql:mathjax@cptIt#

lmm'tool.EDITOR

name::
* McsEngl.lmm'tool.EDITOR@cptIt,
* McsEngl.mathml'editor@cptIt,
* McsEngl.lmm'editor@cptIt,

* http://sharemath.com//
The easiest way to create, share and remix equations.

* https://code.google.com/p/mathmleditor//

[Peter Bergstrom] > I'm trying to find software that works with MathML, especially > browsers for the display part of the language. Can someone please > point me at something?

>From _World Wide Web Journal_, Volume 2, Issue 4, "XML: Principles, Tools, and Techniques", p. 85 "HTML-Math":
   There are already two early rendering prototypes:
   o WebEQ, a Java development, from the Geometry Center at the      University of Minnesota
   o An inclusion in the Techexplorer product from the Interactive      Document labs of IBM
HTH, Chris --
<!NOTATION SGML.Geek PUBLIC "-//Anonymous//NOTATION SGML Geek//EN"> <!ENTITY crism PUBLIC "-//O'Reilly//NONSGML Christopher R. Maden//EN" "<URL>http://www.oreilly.com/people/staff/crism/ <TEL>+1.617.499.7487 <USMAIL>90 Sherman Street, Cambridge, MA 02140 USA" NDATA SGML.Geek>

lmm'tool.TRANSLATOR

name::
* McsEngl.lmm'tool.TRANSLATOR@cptIt,
* McsEngl.mathml'converter@cptIt,
* McsEngl.lmm'converter@cptIt,
* McsEngl.lmm'translator@cptIt,

TeX/LaTeX to MathML Online Translator:
* http://www.orcca.on.ca/MathML/texmml/textomml.html,

LaTeX to MathML:
* http://www.mathtowebonline.com//

* https://www.maths.nottingham.ac.uk/personal/drw/lm.html,

lwp.HTML+CSS (lhc)

name::
* McsEngl.lwp.HTML+CSS (lhc)@cptIt,
* McsEngl.lhc@cptIt,

_SPECIFIC:
* http://www.w3schools.com/w3css/default.asp,

lwp.HTML+CSS+LJB (lhcj)

name::
* McsEngl.lwp.HTML+CSS+LJB (lhcj)@cptIt,
* McsEngl.lhcj@cptIt,
* McsEngl.lhcjb@cptIt,

_SPECIFIC:
* bootstrap-wpglag,
* hitp#ql:hitp@cptIt#

lwp.lhcj.Bootstrap

name::
* McsEngl.lwp.lhcj.Bootstrap@cptIt,
* McsEngl.Bootstrap@cptIt,

_DESCRIPTION:
Sleek, intuitive, and powerful mobile first front-end framework for faster and easier web development.
[http://getbootstrap.com/]

_ADDRESS.WPG:
* http://getbootstrap.com//

lwp.lhcj.HITP (HTML5.ID.TOC.PREVIEW)

_CREATED: {2012-02-12}

name::
* McsEngl.lwp.lhcj.HITP (HTML5.ID.TOC.PREVIEW)@cptIt,

hitp'DESCRIPTION

name::
* McsEngl.hitp'DESCRIPTION@cptIt,

_DESCRIPTION:
HITP (html5.id.toc.preview) is a-WEBPAGE-HTML-CSS-JS-DIALECT (format|method|framework) for publishing WEBPAGES of title-content-tree structured-documents with these advantages:
1) Html5: no need for special programs to read them, as all machines have the needed browser (= html reader). Also html5-elements structure the-text for humans and machines.
2) Id: anyone can-refer to ANY PART of them, because all their html-elements have IDs.
3) Toc: automatically created expandable table-of-contents makes reading EASY.
4) Preview: same domain link-preview makes reading FAST.
[http://synagonism.net/hitp/#idDescriptionH1]

NAME

name::
* McsEngl.hidtoc@cptIt, {2013-05-18}
* McsEngl.hit@cptIt,
* McsEngl.hitp@cptIt, {2013-06-27}
* McsEngl.hitp-dialect@cptIt,
* McsEngl.hitp-html-css-javascript-dialect@cptIt, {2017-03-23}
* McsEngl.hitp-language@cptIt,
* McsEngl.hitp-webpage-dialect@cptIt, {2017-03-23}
* McsEngl.html5.id.toc.preview@cptIt, {2013-06-27}
* McsEngl.html5id@cptIt,
* McsEngl.html5IdToc@cptIt, {2013-04-07}
* McsEngl.html5IdTocPreview@cptIt, {2013-06-28}
* McsEngl.htmlid@cptIt,
* McsEngl.idhtml5@cptIt,
* McsEngl.idhtml5-proposal@cptIt,
* McsEngl.lhitp@cptIt, {2016-08-25}

hitp'GENERIC

_GENERIC:
* lhcj#ql:lhcj@cptIt#

hitp'Archetype (archo)

name::
* McsEngl.hitp'Archetype (archo)@cptIt,

_DEFINITION.RECURSIVE:
start-condition:
An-archetype is a-whole-part-tree of 1) a-title and 2) an order-set of values and subtrees.
end-condition:
Ending-subtrees consist of 1) a-title and 2) an order-set of values.
[hmnSngo.2016-06-04]

name::
* McsEngl.hitp'doc@cptIt,

hitparcho'Root

name::
* McsEngl.hitparcho'Root@cptIt,

_DEFINITION:
* Root is the outermost title.
[hmnSngo.2016-06-04]

hitparcho'Subtree

name::
* McsEngl.hitparcho'Subtree@cptIt,

_DEFINITION:
A-subtree is a-tree PART OF another tree.

hitparcho'sut.TITLE

name::
* McsEngl.hitparcho'sut.TITLE@cptIt,

_DESCRIPTION:
* Title is text describing a-value, a-name or a-phrase.
[hmnSngo.2016-06-04]

hitparcho'sut.VALUE

name::
* McsEngl.hitparcho'sut.VALUE@cptIt,

_DEFINITION:
A-value is
- one sentence,
- one subparagraph (an order set of sentences).
- one paragraph (an order set of suparagraphs).
- one paragraph and nontext.
- nontext: image, audio, video, ol, ul, table, tree.

hitp'Webpage (Model | doc)

name::
* McsEngl.hitp'Webpage (Model | doc)@cptIt,
* McsEngl.hitpwpg@cptIt,
* McsEngl.generic-specific-pair--webpage@cptIt, {2013-09-01}
* McsEngl.generic-specific-pair-webpage@cptIt,
* McsEngl.hitp-language@cptIt,
* McsEngl.hitp-ebook@cptIt,
* McsEngl.hitp-webpage@cptIt, {2013-08-18}
* McsEngl.html5.id.toc-digital-book@cptIt, {2013-05-18}
* McsEngl.html5.id.toc-digital-text@cptIt, {2013-05-18}

_GENERIC:
* dynamic-webpage##
* digital-book#cptItsoft266#

hitpwpg'directory

name::
* McsEngl.hitpwpg'directory@cptIt,

_DESCRIPTION:
Every hitp-page contains one hitp-html-file and an optional directory with extra needed files such as images, css, js, etc.
[hmnSngo.2013-08-26]

hitpwpg'link

name::
* McsEngl.hitpwpg'link@cptIt,

_TODO.hitp:
A-preview-link to display preview AFTER some seconds.
[hmnSngo.2016-03-29]
===
A-preview-link to have
- different color
- one click = preview
- double click = goes to destination.
[hmnSngo.2016-03-29]

hitpwpg'name

name::
* McsEngl.hitpwpg'name@cptIt,

_NOTATION:
* site/category/subcategory/filename.html
=== CATEGORY:
* book
* law
* standard
=== SUBCATEGORY:
* subject (economy, techInfo, )

hitpwpg'code

name::
* McsEngl.hitpwpg'code@cptIt,

_SPECIFIC:
* css-code##
* html-code##
* JavaScript-code##

hitp'code.GitHub

name::
* McsEngl.hitp'code.GitHub@cptIt,
* McsEngl.hitp'github@cptIt,
* McsEngl.hitpgh@cptIt,

_ADDRESS.WPG:
* https://github.com/synagonism/hitp,
* http://synagonism.github.io/hitp/hitp.html,

_DESCRIPTION:
GitHub contains the-code.
The-project-pages contain the latest code.
Old versions are on synagonism.net.
[hmnSngo.2016-02-14]
===
LOCAL:
* github-repository: \dAGitHub\hitp
- this dir displays master or pages in relation to GitHub desktop app
* \xampp\htdocs\dWstSgm\hitp\gh-pages
* \xampp\htdocs\dWstSgm\hitp\gh-master
* \xampp\htdocs\dWstSgm\hitp\ old 'hide' class

hitp'FILE_with_github_code:
* \xampp\htdocs\dWstSgm\index.html: ok
* \xampp\htdocs\dWstSgm\book\economy\keynes.1936.general-theory.html: ok
* http://synagonism.net/book/society/engels.1884.origin.html
* \xampp\htdocs\dWstSgm\dPgm\dPgmWpg\dDoc\index.html:
* \xampp\htdocs\dWstSgm\hitp\index.html: ok
* \xampp\htdocs\dWstSgm\hitp\index.2016-01-25.15.html:
* \xampp\htdocs\dWstSgm\hitp\hitp.html:
* \xampp\htdocs\dWstSgm\hitp\hitp.github.html:
* \xampp\htdocs\dWstSgm\dirMcs\dirStn\dirHitp\HitpStnStd000.last.html
* \xampp\htdocs\dWstSgm\worldview\edu\gym.informatics.2007.html: ok

hitpwpg'writing-style

name::
* McsEngl.hitpwpg'writing-style@cptIt,

_NOTATION:
No spaces inside names and http://synagonism.net/#idNotation.

_DEFINITION-LINKS:
Preview-link connect the-names with their definitions.

_SENTENCES:
Every sentence begins in a new line.

_TIME:
{} denote time.

hitpwpg'CSS

name::
* McsEngl.hitpwpg'CSS@cptIt,
* McsEngl.hitp'css-code@cptIt,
* McsEngl.hitpcss@cptIt,

_ADDRESS.WPG:
* http://synagonism.github.io/hitp/hitp.css,
* http://synagonism.net/hitp/hitp.css,

_DESCRIPTION:
I use some 'classes' with style.
BUT we can use and the style attribute with any specific style:
<p style="text-align:center;font-size:18pt;font-weight:bold;">

_CODE.CSS:
/*
* version: 2011-01-31
* style for id-HTML5-texts
*/

body {
 background-color:#FFFFFA;
 font-family: "Times New Roman", Dialog, Georgia, Times, serif;
 font-size: 16px;
}

/*********** HEADING-ELEMENTS ***********************/
header {
 background-color:#F6FFFF;
 border-top: 3px solid#000000;
}

header > h1 {
 background-color:#CDEFFF;
 border-top: 0px solid#000000;
 color:#000000;
 font-family: "Times New Roman", Georgia, Times, serif;
 font-size: 26px;
 font-weight: bold;
 margin-bottom: 20px;
 margin-top: 12px;
 padding: 0 0 10px 0; /*top right bottom left*/
 text-align: center;
}

h1 {
 background-color:#CDEFFF;
 border-top: 2px solid#000000;
 color:#000000;
 font-family: Georgia, "Times New Roman", Times, serif;
 font-size: 18px;
 font-weight: bold;
 margin-left: 3px;
}

h2 {
 background-color:#F2F2F2;
 border-top: 1px solid#424242;
 color:#000000;
 font-family: Georgia, "Times New Roman", Times, serif;
 font-size: 16px;
 font-weight: bold;
 margin-left: 3px;
}

h3 {
 background-color:#F2F2F2;
 border-top: 1px solid#424242;
 color:#000000;
 font-family: Georgia, "Times New Roman", Times, serif;
 font-size: 14px;
 font-weight: bold;
 margin-left: 15px;
}

h4 {
 background-color:#F2F2F2;
 border-top: 1px solid#424242;
 color:#000000;
 font-family: Georgia, "Times New Roman", Times, serif;
 font-size: 14px;
 font-weight: bold;
 margin-left: 25px;
}

h5 {
 background-color:#F2F2F2;
 border-top: 1px solid#424242;
 color:#000000;
 font-family: Georgia, "Times New Roman", Times, serif;
 font-size: 14px;
 font-weight: bold;
 margin-left: 35px;
}

h6 {
 background-color:#F2F2F2;
 border-top: 1px solid#424242;
 color:#000000;
 font-family: Georgia, "Times New Roman", Times, serif;
 font-size: 14px;
 font-weight: bold;
 margin-left: 45px;
 /*text-align: center;*/
}

p.h7 {
 background-color:#F2F2F2;
 border-top: 1px solid#424242;
 color:#000000;
 font-family: Georgia, "Times New Roman", Times, serif;
 font-size: 14px;
 font-weight: bold;
 margin-left: 55px;
 text-indent: 0px;
}
p.h8 {
 background-color:#F2F2F2;
 border-top: 1px solid#424242;
 color:#000000;
 font-family: Georgia, "Times New Roman", Times, serif;
 font-size: 14px;
 font-weight: bold;
 margin-left: 65px;
 text-indent: 0px;
}

/************ FOOTER-ELEMENTS ********************/

footer {
 background-color:#CDEFFF;
 border-bottom: 3px solid#000000;
 color:#000000;
 font-family: serif;
 font-size: 16px;
 margin-left: 0px;
}
footer > p {
 font-size: 16px;
}
footer > p.center {
 font-size: 16px;
 text-align: center;
}
footer > address {
 font-size: 16px;
}
footer > table {
 margin-left:auto;
 margin-right:auto;
}
footer > td {
 border: none!important;
}


/************ PARAGRAPH-ELEMENTS ********************/

code {
 background:#FFFFFF;
 color:#000000;
 border: 1px solid#98AFC7;
 font-size: 14px;
}

p {
 text-indent: -25px;
 margin-left: 25px;
}
p.center {
 text-align: center;
 text-indent: 0px;
}
p.font12 {
 font-size: 12px;
}
p.indent {
 text-indent: 0px;
 margin-left: 25px;
}
p.right {
 text-align: right;
}

table {
 border-collapse:collapse;
 margin-left: 25px;
 padding-left:5px;
}

td {
 border: 1px solid black;
 padding-left:5px;
 white-space:wrap;
}
td.footer {
 border: none;
}
td.center {
 text-align: center;
}
td.clrBgTurq {
 background-color:#00FFFF;/* Turquoise */
 text-align: center;
}
td.noborder {
 border: none;
 padding-left:5px;
 white-space:wrap;
}


/************* INLINE text-content ***************************/
/* a, dfn, br, b, span */

span.attr-bu {
 font-weight: bold;
 text-decoration: underline;
}
span.u {
 text-decoration: underline;
}

span.font-gr-ext {
 font-family: "Palatino Linotype";
}
span.font-grmg {
 font-family: MgPolNewTimes;
 font-size: 16px;
}
span.font-serif {
 font-family: Serif, "Times New Roman", Georgia;
}
span.font-sansserif {
 font-family: SansSerif, "Microsoft Sans Serif", Arial, Dialog, Tahoma;
}
span.font-monospaced {
 font-family: Monospaced, "Courier New", Courier;
}
span.font-script {
 font-family: Script "Monotype Corsiva";
}
span.font-decorative {
 font-family: Wingdings;
}

span.color-green-bg {
 background-color:#008000; /* Green; */
}
span.color-red {
 color:#FF0000;/* Red */
}
span.color-yellow-bg {
 background-color:#FFFF00; /* Yellow; */
}

span.size-x-small {
 font-size: x-small;
}
span.size-small {
 font-size: small;
}
span.size-medium {
 font-size: large;
}
span.size-large {
 font-size: large;
 font-weight: bold;
}
span.size-x-large {
 font-size: x-large;
 font-weight: bold;
}

span.source {
 background-color:#F6E3CE;
 font-size: 12px;
}

/* hide-class: a-element */
h1 > a.hide,
h2 > a.hide,
h3 > a.hide,
h4 > a.hide,
h5 > a.hide,
h6 > a.hide,
p > a.hide,
address > a.hide,
span > a.hide
{
 display: none;
}

h1:hover > a.hide,
h2:hover > a.hide,
h3:hover > a.hide,
h4:hover > a.hide,
h5:hover > a.hide,
h6:hover > a.hide,
p:hover > a.hide,
address:hover > a.hide,
span:hover > a.hide
{
 display: inline;
 color: gray;
 text-decoration:none;
}

a:link { color:#0000FF }
a:visited { color:#0000FF }

hitp'css'class

name::
* McsEngl.hitp'css'class@cptIt,
* McsEngl.hitp'class@cptIt,
* McsEngl.hitpcls@cptIt,

hitpcls.bold-underline

name::
* McsEngl.hitpcls.bold-underline@cptIt,

hitpcls.clsB {
font-weight: bold;
}

hitpcls.clsBU {
font-weight: bold;
text-decoration: underline;
}

hitpcls.clsU {
text-decoration: underline;
}

hitpcls.center

name::
* McsEngl.hitpcls.center@cptIt,

* hitpclsCenter,

hitpcls.clsCenter {
text-align: center;
}

hitpcls.clsCenterBlock {
display: block;
margin-left: auto;
margin-right: auto;
}

hitpcls.clsCenterInline {
display: block;
text-align: center;
}

hitpcls.color

name::
* McsEngl.hitpcls.color@cptIt,

hitpcls.clsColorBlue {
color:#0000ff;
}

hitpcls.clsColorGreen {
color:#008000;
}

hitpcls.clsColorGreenBg {
background-color:#008000;
}

hitpcls.clsColorRed {
color:#ff0000;
}

hitpcls.clsColorYellow {
color:#FFFF00;
}

hitpcls.clsColorYellowBg {
background-color:#FFFF00;
}

.color-red {
color:#FF0000;/* Red */
}

hitpcls.font

name::
* McsEngl.hitpcls.font@cptIt,
* McsEngl.hitp'font@cptIt,
* McsEngl.hitp'font@cptIt,

.clsFontGrExt {font-family: "Palatino Linotype";}
.clsFontGrMg {font-family: MgPolNewTimes; font-size: 16px;}
.clsFontSerif {font-family: Serif, "Times New Roman", Georgia;}
.clsFontSansserif {font-family: SansSerif, "Microsoft Sans Serif", Arial, Dialog, Tahoma;}
.clsFontMonospaced {font-family: Monospaced, "Courier New", Courier;}
.clsFontScript {font-family: Script "Monotype Corsiva";}
.clsFontDecorative {font-family: Wingdings;}

hitpcls.size

name::
* McsEngl.hitpcls.size@cptIt,

hitpclsSize:
.clsSizeSmall
.clsSizeSmallX
.clsSizeMedium
.clsSizeLarge
.clsSizeLarge

_CODE.HITP:
.clsSizeSmall {
font-size: small;
}
.clsSizeSmallX {
font-size: x-small;
}
.clsSizeMedium {
font-size: large;
}
.clsSizeLarge {
font-size: large;
font-weight: bold;
}
.clsSizeLargeX {
font-size: x-large;
font-weight: bold;
}

_SPECIFIC:
* size-large,
* size-medium,
* size-small,
* size-x-large,
* size-x-small,

hitpcls.style

name::
* McsEngl.hitpcls.style@cptIt,

deprecated

.style-b {
font-weight: bold;
}

_SPECIFIC:
* style-b
* style-u

hitpwpg'HTML

name::
* McsEngl.hitpwpg'HTML@cptIt,
* McsEngl.hitp'html@cptIt,
* McsEngl.hitphml@cptIt,

hitp'document-html

name::
* McsEngl.hitp'document-html@cptIt,
* McsEngl.hitp'file@cptIt,
* McsEngl.hitp'hmldoc@cptIt,
* McsEngl.hitp'html-file@cptIt,


_CODE.HITP:
<!DOCTYPE HTML>
<html>
<meta charset="utf-8"/>
<title>index english A</title>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.3/jquery.min.js"></script>
<script src="http://cdn.mathjax.org/mathjax/latest/MathJax.js?config=TeX-AMS-MML_HTMLorMML"></script>
<script src="http://synagonism.net/hit/toc.js"></script>
<link href="http://synagonism.net/hit/css.html5.id.toc.css" rel="stylesheet" type="text/css"/>
<script>
$(document).ready(function() {
funTocMake_toc();
});
</script>
</head>

<body>
<header id="idHeader">
<p></p>
<h1 id="idHeaderH1">HTML5-Text with IDs</h1>
<p id="idHeaderP1">In this ... L-text that basically anyone can refer to ANY PART of it.
<a class="hide" href="#idHeaderP1">¶</a></p>
</header>

<section id="idProposal">
<h1 id="idProposal">The Proposal
<a class="hide" href="#idProposal">¶</a></h1>

<section id="idProposalID">
<h2 id="idProposalID">The IDs
<a class="hide" href="#idProposalID">¶</a></h2>
<p id="idProposalIDP1">The core ... HTML text.
<br/>For example:
<br/><code><h1 id="idXxxx">...</code>
<br/><code><p id="idYyyy">...</code>
<br/>That's all. Now we can refer to any part of the document!!!
<a class="hide" href="#idProposalIDP1">¶</a></p>
<p id="idProposalIDP2">The IDs must be unique.
<br/>You can use as ID whatever you want. We sugest to begin with "id" in order to be distinguished from other words in the text and do not contain spaces. For example:
<br/><code>idProposal, idHeader, idIndex-income, ...</code>
<a class="hide" href="#idProposalIDP2">¶</a></p>
<p id="idProposalIDP3"><b>The IDs must be visible to the reader</b>.
<br/>The reader, in order to refer to any part of the document, must know the ID of this part of the file. This can be done by adding a hidden element in this part of the file that will be visible when the mouse is over this text. But if this
<br/><code><h1 id="idXxxx">...
<br/>  <a class="hide" href="#idXxxx">¶</a></h1></code>
<br/>or
<br/><code><p id="idYyyy">...
<br/>  <a class="hide" href="#idYyyy">¶</a></p></code>
<br/>With this code, when the reader has the mouse over an HTML-element (a part text), at the end appears the ¶ symbol. Putting the mouse over this symbol, s|he can see the ID of this text and clicking on this symbol he can copy from the
<a class="hide" href="#idProposalIDP3">¶</a></p>
<p id="idProposalIDP4">ID Patterns.
<br/>If the author of a doc uses patterns to write the IDs of a text-file, it helps the reader to quickly identifies the parts of the file. Example:
<br/>- idA4 (article)
<br/>- idA4P2 (paragraph)
<br/>- idP2 (Part)
<br/>- idP2T1 (Title)
<br/>- idP2T1C2 (Chapter)
<br/>- idP2T1C2S2 (Section)
<a class="hide" href="#idProposalIDP4">¶</a></p>
</section>

<section id="idProposalHtml5">
<h2 id="idProposalHtml5">HTML5
<a class="hide" href="#idProposalHtml5">¶</a></h2>
<p id="idProposalHtml5P1">HTML5 ...heading-elements alone.
<a class="hide" href="#idProposalHtml5P1">¶</a></p>
</section>

<section id="idProposalExample">
<h2 id="idProposalExample">The Examples
<a class="hide" href="#idProposalExample">¶</a></h2>
<p id="idProposalExampleP1">The site ... we are proposing.
<a class="hide" href="#idProposalExampleP1">¶</a></p>
</section>
</section>

<section id="idLaw">
<h1 id="idLaw">Law-Text
<a class="hide" href="#idLaw">¶</a></h1>
<p>see <a href="../law/index-en.html">law-page</a>.</p>
</section>

<section id="idStandard">
<h1 id="idStandard">Standard-Text
<a class="hide" href="#idStandard">¶</a></h1>

<section id="idStandardEconomy">
<h2 id="idStandardEconomy">Economy-Standard
<a class="hide" href="#idStandardEconomy">¶</a></h2>
<p id="idStandardEconomy"><a href="SNA2008.html">UN-SNA-2008</a>:
<br/>The System of National Accounts (SNA) is the internationally agreed standard set of recommendations on how to compile measures of economic activity. The SNA describes a coherent, consistent and integrated set of macroeconomic accounts in the context of a set of internationally agreed concepts, definitions, classifications and accounting rules.(<a href="http://unstats.un.org/unsd/nationalaccount/sna.asp">http://unstats.un.org/unsd/nationalaccount/sna.asp</a>)
<a class="hide" href="#idStandardEconomy">¶</a></p>
</section>

<section id="idStandardInfoTech">
<h2 id="idStandardInfoTech">InfoTech-Standard
<a class="hide" href="#idStandardInfoTech">¶</a></h2>
<p id="idStandardInfoTech">
<a class="hide" href="#idStandardInfoTech">¶</a></p>
</section>
</section>

<footer id="idFooter">
<p id="idFooterP1">email:
<br/><img src="http://synagonism.net/misc/img/mail.png" />
<a class="hide" href="#idFooterP1">¶</a></p>
</footer>

<section id="idMeta">
<h1 id="idMetaH1">Meta Info
<a class="hide" href="#idMetaH1">¶</a></h1>
<p id="idMetaVersion">VERSIONS:
<br/>• version.last: index.html (2013-06-01 minor 2013-06-02)
<br/>• version.this: <a href="index.html">index.2013-06-01.html</a> (last synagonism.net)
<br/>• version.previous: <a href="http://gym-eleous.ioa.sch.gr/textid/index.2013-05-29.html">(gym-eleous.ioa.sch.gr) index.2013-05-29.html</a> (concept-index)
<br/>• version.previous: <a href="http://gym-eleous.ioa.sch.gr/textid/index.2013-05-15.html">(gym-eleous.ioa.sch.gr) index.2013-05-15.html</a> (math)
<br/>• version.published: <a href="http://gym-eleous.ioa.sch.gr/textid/index.2011-02-17.html">(gym-eleous.ioa.sch.gr) index.2011-02-17.html</a>
<br/>• Created: 2011-02-15
<a class="hide" href="#idMetaVersion">¶</a></p>
<!-- the content of page-path paragraph is displayed as it is on top of toc -->
<p id="idMetaWebpage_path" class="classTocExpand"><span class="style-b">Page-path</span>:
html5.id.toc text-format
? <a class="popupTrigger" href="http://synagonism.net/#idHeader">synagonism.net</a>
</p>
</section>

</body>
</html>

hitp'hmlwpg'content

name::
* McsEngl.hitp'hmlwpg'content@cptIt,

_DESCRIPTION:
It is comprised of a ordered-set of title-value-pairs.
[hmnSngo.2013-08-26]

hitp'hmlwpg'structure

name::
* McsEngl.hitp'hmlwpg'structure@cptIt,

_STRUCTURE:
<!DOCTYPE html>
<html>
 <head>
 </head>
 <body>
   <div id="idSpliterDiv">
     <div id="idSpliterLeftDiv">
     </div>
     <div id="idSpliterRightDiv">
     </div>
   </div>
 </body>
</html>

hitp'hmldoc.DYNAMIC

name::
* McsEngl.hitp'hmldoc.DYNAMIC@cptIt,

hitp'hmldoc.STATIC

name::
* McsEngl.hitp'hmldoc.STATIC@cptIt,

hitp'hmldoc.Version

name::
* McsEngl.hitp'hmldoc.Version@cptIt,

Every document evolves over time.
Version is the document in a specific time-point.
[hmnSngo.2012-02-19]

_Notation:
The last part of the name of a document contains the time-point created, except of the current version which contains the time-point only inside in the footer-element.
[hmnSngo.2012-02-19]

hitp'element-html

name::
* McsEngl.hitp'element-html@cptIt,
* McsEngl.hitp'elt@cptIt,
* McsEngl.hitp'helement@cptIt,

_Notation:
<section id="">
<h1 id...
<p id...
</section>

<section id="">
<h1 id...
<p id...
</section>
[hmnSngo.2012-02-19]

hitp'elt.content.DIV

name::
* McsEngl.hitp'elt.content.DIV@cptIt,

_DESCRIPTION:
I am using div to GROUP content elements eg: p, table, ul, ... to form one node.

hitp'elt.FOOTER

name::
* McsEngl.hitp'elt.FOOTER@cptIt,
* McsEngl.hitp'footer@cptIt,

_GENERIC:
* sectioning-element,

VERSIONS:
* Current: 2012-02-19
* Previous: 2011-02-21
* Published: 2011-02-17
* Created: 2011-02-15

_CODE.HITP:
<footer id="idFooter">
<p id="idFooterP1" class="center">Αθήνα, 27 Ιουνίου 2008
<a class="hide" href="#idFooterP1" title="idFooterP1">¶</a></p>
</footer>

hitp'elt.generic.CONTENT

name::
* McsEngl.hitp'elt.generic.CONTENT@cptIt,
* McsEngl.hitp'content-element@cptIt,

_SPECIFIC:
* p,
* ul,
* ol,
* dl,
* table#ql:hitp'element.table#
* pre,
* img,
* span,
* div##

hitp'elt.generic.HEADING

name::
* McsEngl.hitp'elt.generic.HEADING@cptIt,
* McsEngl.hitp'heading@cptIt,

_SPECIFIC:
* h1,
* h2,
* h3,
* h4,
* h5,
* h6,

_CODE.HITP:
<section id="idAC6">
..<h1 id="idAC6">Annex to chapter 6: Separating output due to storage from holding gains and losses
....<a class="hide" href="#idAC6">¶</a></h1>

..<section id="id.-">
..<h2 id="id.-">
....<a class="hide" href="#id.-">¶</a></h2>
..<p id="idPxxx">....
....<a class="hide" href="#idPxxx">¶</a></p>
..</section>
</section>

hitp'elt.generic.SECTIONING

name::
* McsEngl.hitp'elt.generic.SECTIONING@cptIt,
* McsEngl.hitp'sectioning@cptIt,

_SPECIFIC:
* section,
* header,
* footer,

_Section:
Contain:
- one heading
- one or many content
- zero or many sub-sections.
[hmnSngo.2012-02-14]
===
Notation:
* every section starts in the begining of a line with a blank line before.
* every element inside a section starts with a tab.
[hmnSngo.2012-02-14]

hitp'elt.HEAD

name::
* McsEngl.hitp'elt.HEAD@cptIt,
* McsEngl.hitp'head@cptIt,

_CODE.HITP:
<head>
<meta charset="utf-8"/>
<meta name="keywords" content="free book, Keynes, general-theory, html5.id.toc.preview, synagonism">
<title>Keynes, 1936, "The General Theory of Employment, Interest, and Money" (complete-book in html5.id.toc.preview)</title>
<link href="../../hitp/hitp.css" rel="stylesheet" type="text/css"/>
</head>

hitp'elt.HEADER

name::
* McsEngl.hitp'elt.HEADER@cptIt,
* McsEngl.hitp'header@cptIt,

_CODE.HITP:
<header id="idHeaderH1">
<h1 id="idHeaderH1" class="center">YNTAΓMA THΣ EΛΛAΔAΣ
<a class="hide" href="#idHeaderH1" title="idHeaderH1">¶</a></h1>
<p id="idHeaderP7" class="center">Eις τo όνoμα της Aγίας καιιρέτoυ Tριάδoς</p>
</header>
===
<header id="idHeader">
<p></p>
<h1 id="idHeaderH1" class="clsCenter">The General Theory of Employment, Interest, and Money
</h1>
<p class="center size-large">
<br/>John Maynard Keynes
<br/><br/>
<a class="hide" href="#idHeaderH1">¶</a></p>
<p class="center size-large">1935
<br/><br/><br/>
</p>
</header>

hitp'elt.LIST

name::
* McsEngl.hitp'elt.LIST@cptIt,

_DESCRIPTION:
'table', 'ul', 'ol' are parts or form 'content-paragraphs'.
Html does not allow these elements inside 'p'.
We place next with similar ids.
[hmnSngo.2016-02-14]

_CODE.HITP:
<p id="idP38">Καλούμε τους ευρωπαίους που συμφωνούν με τις αρχές αυτές να συστρατευτούν στο πανευρωπαϊκό κίνημα που ονομάσαμε DiEM25 ώστε:
<a class="clsHide" href="#idP38"></a></p>

<ul id="idP38ul">
<li>item</li>
<li>item</li>
<a class="clsHide" href="#idP38ul"></a></ul>

<ol id="idP38ol">
<li>item</li>
<li>item</li>
<a class="clsHide" href="#idP38ol"></a></ol>

hitp'elt.PARAGRAPH

name::
* McsEngl.hitp'elt.PARAGRAPH@cptIt,
* McsEngl.hitp'paragraph@cptIt,

_CODE.HITP:
<p id="idP19-26">19.26 An acquirer shall disclose a reconciliation of the carrying amount of goodwill at the beginning and end of the reporting period, showing separately:
<br/>
<br/><span id="idP19-26a">(a) changes arising from new business combinations.</span>
<br/>
<br/><span id="idP19-26b">(b) impairment losses.</span>
<br/>
<br/><span id="idP19-26c">(c) disposals of previously acquired businesses.</span>
<br/>This reconciliation need not be presented for prior periods.
<a class="hide" href="#idP19-26">¶</a></p>

hitp'elt.POSITION

name::
* McsEngl.hitp'elt.POSITION@cptIt,
* McsEngl.hitp'position-element@cptIt,

_DESCRIPTION:
Element to denote position in the text.

_PAGE_OF_TEXTBOOK_POSITION:
inside html_p: <span class="pbPage" id="idPageX">Page X</span>

.pbPage {
/* paperbookPage */
display: block;
text-align: right;
color:#FF0000;/* Red */
}

hitp'elt.SECTION

name::
* McsEngl.hitp'elt.SECTION@cptIt,
* McsEngl.hitp'section@cptIt,

_CODE.HITP:
<section id="idName2">
<h2 id="idName2H2">Title2
</h2>
<p>Sentence1.
Sentence2.
</p>

<section id="idName3">
<h3 id="idName3H3">Title3
</h3>
<p>Sentence1.
Sentence2.
</p>
</section>
</section>

hitp'elt.STYLE

name::
* McsEngl.hitp'elt.STYLE@cptIt,
* McsEngl.hitp'style-element@cptIt,

<strong>
bold

<em>
Italics

<span class="clsU">
Underline

hitp'elt.TABLE

name::
* McsEngl.hitp'elt.TABLE@cptIt,
* McsEngl.hitp'table@cptIt,

_GENERIC:
* content-element#ql:hitp'element.content#

_DESCRIPTION:
'table', 'ul', 'ol' are parts or form 'content-paragraphs'.
Html does not allow these elements inside 'p'.
We place next with similar ids.
[hmnSngo.2016-02-14]

_CODE.HITP:
<table>
<tr>
<td colspan="4">VALUE PRODUCED PER ACRE</td></tr>
<tr>
<td>Seed</td>
<td>£1 9s. 0d.</td>
<td>Tithes, Rates, and taxes,</td>
<td>£1 1s. 0d.</td></tr>
<tr>
= creates table with border.
===
<table>
<tr>
<td class="borderNo center">Working day I.</td>
<td class="borderNo center">Working day II.</td>
<td class="borderNo center">Working day III.</td></tr>
<tr>
= creates table with no border and cell centered.

hitp'HTML5

name::
* McsEngl.hitp'HTML5@cptIt,

_DESCRIPTION:
We use HTML5-elements to create the structure of a hitp-page. Every hitp-page contains an ordered-set of title-value-pairs which are implemented with 1 header, 1 optional footer, and many section html5-elements.
• The header-element is the first body-element with 1 h1-element that serves the title of the document.
• The optional footer-element is the before last element without a heading-element.
• Every section-element includes 1 heading-element and other non heading-elements, mainly p-elements. Also a section-element includes other sections-elements with ordered-headings in the form h1, h2, h3, ... The last section-element has a h1-element with content 'Meta Info'.

hitp'ID

name::
* McsEngl.hitp'ID@cptIt,

_ID_CHAR:
* letter english
* number
* . _ ' -
* NOT: space

hitp'problem.id:
* firefox: char (') does NOT work on 'preview'. I use 'ATT' (ATtribuTe) instead.
[hmnSngo.2015-10-22]
===
* 'idPopup' FREEZES the popup. Do not use this id.
[2013-08-23]

_SPECIFIC:
* custom
* numeric
* h1-custom-rest-numeric
* paragraph-numeric (sna)
* article-numeric
* name (idNameXxxx)
* concept (idCptXxxx)
* heading-content (idH1.2.1C1.2.1) //Content
* heading-content (idH1.2.1P1.2.1) //Paragraph {2015-07-22}

_Generic: Heading-Content:
* h1 id="idh1">
* h2 id="idh1-1">
* h3 id="idh1-1-1">
* p id="idh1-1-1c2">
* p id="idh1-1-1c2">

_Law_text:
<h1 id="idM1">
<h2 id="idM1T1">
<h4 id="idA1">
<p id="idA1P1">
<p id="idA1P2">

_ID.INDEX:
* idCptXXX
* idNameXXX

_Version_ID:
The IDs of the form idHn.n.nCn.n.n are unique per version of the document and are created automatically.
[hmnSngo.2012-02-19]

_Permanent_ID:
Because heading and content elements change in the evolution of a document, we can use span-elements just after the start-tags with permanent ids in the form "idParaContent-
[hmnSngo.2012-02-19]

_INSIDE_PARAGRAPH:
<br/><span id="idP2-39a"></span>(a)

hitp'titleNo (value)

_CREATED: {2013-05-25}

name::
* McsEngl.hitp'titleNo (value)@cptIt,
* McsEngl.hitp'data@cptIt, {2013-08-26}
* McsEngl.hitp'titleNo@cptIt,
* McsEngl.hitp'titleNo-part@cptIt,
* McsEngl.hitp'value@cptIt, {2013-08-26}

_DESCRIPTION:
A hidtoc-doc is comprised of title-parts and titleNo-parts using the 'paragraph', 'span', 'table', 'ol', 'ul' html-elements in this part-order:
- paragraph,
- subparagraph, table, list,
- sentence, image,
[hmnSngo.2013-05-25]

hitp'value.PARAGRAPH

name::
* McsEngl.hitp'value.PARAGRAPH@cptIt,
* McsEngl.hitp'paragraph-value@cptIt,
====== lagoGreek:
* McsElln.παράγραφος-κειμένου,

_ADDRESS.WPG:
* http://synagonism.net/law/gr/s.2008.html#idIndexPara4,

_DESCRIPTION:

hitp'value.TEXT.SUBPARAGRAPH

name::
* McsEngl.hitp'value.TEXT.SUBPARAGRAPH@cptIt,
* McsEngl.hitp'value.SUMPARAGRAPH@cptIt,
* McsEngl.hitp'subparagraph@cptIt,
====== lagoGreek:
* McsElln.υποπαράγραφος-κειμένου,

_NOTATION:
<br/>
<br/><span id="idA8P1-2">Δικαστικές επιτροπές και έκτακτα δικαστήρια, με οποιοδήποτε όνομα, δεν επιτρέπεται να συσταθούν.</span>

_WHOLE:
* paragraph,

hitp'value.SENTENCE

name::
* McsEngl.hitp'value.SENTENCE@cptIt,
* McsEngl.hitp'sentence@cptIt,

_NOTATION:
===
<br/><span id="idA8P1-2-1">Δικαστικές επιτροπές και έκτακτα δικαστήρια, με οποιοδήποτε όνομα, δεν επιτρέπεται να συσταθούν.</span>
===
every sentence begins in a new line.
[hmnSngo.2013-10-20]

_WHOLE:
* subparagraph,

hitp'value.TEXT.UNIT

name::
* McsEngl.hitp'value.TEXT.UNIT@cptIt,
* McsEngl.hitp'value.TEXT-UNIT@cptIt,
* McsEngl.text-unit.hitp@cptIt,
====== lagoGreek:
* McsElln.μονάδα-κειμένου,

_DESCRIPTION:

hitp'title-value-pair (tvp)

name::
* McsEngl.hitp'title-value-pair (tvp)@cptIt,
* McsEngl.generic-specific-pair.hitp@cptIt,
* McsEngl.title-value-pair.hitp@cptIt,
* McsEngl.type-value-pair.hitp@cptIt, {2013-09-09}

_ADDRESS.WPG:
* http://synagonism.net/hitp/index.html#idHitptvp,

_WHOLE:
* hitp-content##

_PART:
* hitp-title##
* hitp-value##

hitp'title

_CREATED: {2013-05-25}

name::
* McsEngl.hitp'title@cptIt,
* McsEngl.hitp'name-part@cptIt, {2013-08-26}
* McsEngl.hitp'title@cptIt,
* McsEngl.hitp'title-part@cptIt,

_DESCRIPTION:
A hidtoc-doc is comprised of title-parts using the 'section' and 'header' html-elements.
[hmnSngo.2013-05-25]

_SPECIFIC:
* header-title##
* paragraph-title##
* section-title##

SPECIFIC
hitptvp.SECTION

name::
* McsEngl.hitptvp.SECTION@cptIt,

_DESCRIPTION:
title: heading-element,
value: p-elements or div-clsP,

hitp'title.H1.H2.H3.H4.H5.H6

name::
* McsEngl.hitp'title.H1.H2.H3.H4.H5.H6@cptIt,

hitptvp.P

_CREATED: {2013-08-26}

name::
* McsEngl.hitptvp.P@cptIt,
* McsEngl.hitp'paragraph-tvp@cptIt,

_DESCRIPTION:
<p id="idP">title:
text
</p>
[hmnSngo.2016-06-05]
===
The first name of a paragraph, if exists, that begins with '_' is the paragraph's-title.
[hmnSngo.2013-08-26]

hitptvp.DIV

name::
* McsEngl.hitptvp.DIV@cptIt,

_DESCRIPTION:
<div id="idP2" class="clsP">
<p>title:
text
</p>
<ul>...
</ul>
<table>
</table>
</div>
[2016-06-04]

hitptvp.HEADER

name::
* McsEngl.hitptvp.HEADER@cptIt,

_DESCRIPTION:
Text, part of the content, at the end of content.

hitp'title.HEADER

name::
* McsEngl.hitp'title.HEADER@cptIt,

hitptvp.FOOTER

name::
* McsEngl.hitptvp.FOOTER@cptIt,

_DESCRIPTION:
Text, part of the content, at the end of content.

hitptvp.META

name::
* McsEngl.hitptvp.META@cptIt,

_DESCRIPTION:
Text, NOT part of the content, visible to reader, with information about the text.

_IMPLEMENTATION:
- aside-html5-element#ql:html'elm.aside#,
- idMeta.

hitp'title.Meta-Info

name::
* McsEngl.hitp'title.Meta-Info@cptIt,

hitp'title.COMMENTS

name::
* McsEngl.hitp'title.COMMENTS@cptIt,

hitpwpg'Javascript

name::
* McsEngl.hitpwpg'Javascript@cptIt,
* McsEngl.hitp'js@cptIt,
* McsEngl.hitpjs@cptIt,

_FILE:
* hitp.js#pl:\File1a\WebsiteSngm\hitp\hitp.js#

_DESCRIPTION:
It takes the html-file and adds functionality:
- splits the original and adds the toc.
- adds sitemenu
- adds linkpreview functionality.

hitpjs'oHitp

name::
* McsEngl.hitpjs'oHitp@cptIt,
* McsEngl.hipt'oHitp@cptIt,
* McsEngl.oHitp@cptIt,

oHitp.member:
* bFirefox: false
* fSplit: (oEltIn)
* fEvtTocTriToggleNode: (oEvtIn, sIdLiIn)
* fTocMake: ()
* fTocTriCollapseAll: (sIdTocTri)
* fTocTreeCreate: ()
* fTocTriExpandAll: (sIdTocTri)
* fTocTriExpandFirst: (sIdTocTri)
* fTocTriExpandParent: (oEltIn)
* fTocTriHighlightNode: (oEltDivSpliterLeft, oElm)
* fTocTriInit: ()
* nCfgPosSplitPrev: 242
* nTocTriIdLi:
* sCfgPathMenuLocal: "/dWstSgm/hitpmenuLocal.html"
* sCfgPathMenuOnline: "/hitpmenu.html"

oHitp'bFirefox

name::
* McsEngl.oHitp'bFirefox@cptIt,

_DESCRIPTION:
The program runs on firefox or not?

oHitp'fTocMake

name::
* McsEngl.oHitp'fTocMake@cptIt,

step: eltSpliterDiv
on original 'body' adds the most whole container 'eltSpliterDiv'.

step: eltSpliterRightDiv
* adds the original content on 'eltSpliterRightDiv'
* appends eltSpliterRightDiv on eltSpliterDiv

step: eltSpliterLeftDiv
* insert ul with headings on eltSpliterLeftDiv
* insert collapse-button before first-child of eltSpliterLeftDiv
* insert exand-button before first-child of eltSpliterLeftDiv
* insert pagepath-paragraph before first-child of eltSpliterLeftDiv
* insert eltHitpmenu before first-child of eltSpliterLeftDiv
* append note-paragraph on eltSpliterLeftDiv
* on each a-element of toc sets functionality
* on each id-element of eltSpliterRightDiv sets functionality a) to go to that id and b) highlight this id on toc.
* insert eltSpliterLeftDiv before first-child of eltSpliterDiv.

step: fctSplit

step: eltPopupcontainer
* appends eltPopupcontainer on eltSpliterRightDiv
* sets functionality on a-elements with class 'popupTrigger'

step: tree initialization

step: right-div focus

hitpjs'fcnCreate-ul-with-headings()

name::
* McsEngl.hitpjs'fcnCreate-ul-with-headings()@cptIt,

hitpwpg'Content

name::
* McsEngl.hitpwpg'Content@cptIt,
* McsEngl.hitp'info-of-wpg@cptIt,
* McsEngl.hitp'content-of-wpg@cptIt,

hitpwpg'Style

name::
* McsEngl.hitpwpg'Style@cptIt,
* McsEngl.hitp'format@cptIt,
* McsEngl.hitp'style@cptIt,

hitp'Bold_style:
<strong>...</strong>

hitp'Italics_style:
<em>...</em>

hitp'Quote:
span.clsQuote {
background-color:#ededed;
display: inline-block;
text-indent: 0px;
}

hitpwpg'Link

name::
* McsEngl.hitpwpg'Link@cptIt,
* McsEngl.hitp'link@cptIt,

_CODE.HITP:
<a class="clsPreview" href="#idLjsombr">Member</a>

hitpwpg'Table

name::
* McsEngl.hitpwpg'Table@cptIt,
* McsEngl.hitp'table@cptIt,

_CODE.HITP:
<div id="idTitle2bP1">
<p>Content2b1: TABLE-INFO:
</p>
<table>
<tr>
<td>row11</td>
<td>row12</td>
</tr>
<tr>
<td>row21</td>
<td>row22</td>
</tr>
</table>
<a class="clsHide" href="#idTitle2bP1"></a></div>

hitpwpg'Tree

name::
* McsEngl.hitpwpg'Tree@cptIt,
* McsEngl.hitp'tree@cptIt,

_DESCRIPTION:
Our information is full of generic-specific and whole-part trees.
Now hitp support collapsible trees, easily readable.

HOW:
You create the-tree as an-html-unordered-list (UL).
Then you add the-class 'clsTreeUl' on the first element.
That's it, the-rest is done by the javascript code of the-page.
[http://synagonism.net/hitp/#idTree]

hitpwpg'Image

name::
* McsEngl.hitpwpg'Image@cptIt,
* McsEngl.hitp'image@cptIt,

hitpwpg'Source-code

name::
* McsEngl.hitpwpg'Source-code@cptIt,
* McsEngl.hitp'code@cptIt,

code {
display: inline-block;
background-color:#f9f9f9;
color:#000000;
border: 1px solid#98AFC7;
border-left: 3px solid#98AFC7;
font-size: 16px;
padding: 0 3px 0 3px;
text-indent: 0px;
}

hitpwpg'Structure

name::
* McsEngl.hitpwpg'Structure@cptIt,
* McsEngl.hitp'structure@cptIt,

hitp'path

name::
* McsEngl.hitp'path@cptIt,

PathIn_site (sitepath, PathPage):
The-path of the-page in site structure (site-toc).

PathIn_page (pagepath, PathContent):
The-path of the-content we are-reading in page structure (page-toc).

hitp'toc#ql:hitp'toc#

name::
* McsEngl.hitp'toc@cptIt,

hitpwpg.ModelConcept

name::
* McsEngl.hitpwpg.ModelConcept@cptIt,

hitp'index

name::
* McsEngl.hitp'index@cptIt,

hitp'index.NAME

name::
* McsEngl.hitp'index.NAME@cptIt,
* McsEngl.hitp'name-index@cptIt,
* McsEngl.html5idtoc'name-index@cptIt,

hitp'index.CONCEPT

name::
* McsEngl.hitp'index.CONCEPT@cptIt,
* McsEngl.hitp'concept-index@cptIt,
* McsEngl.html5idtoc'concept-index@cptIt,

_DESCRIPTION:
The concept-index is a new method of representation of information other than TEXT.
[hmnSngo.2013-05-25]
===
An index of concepts of the text. The importance is not the index per se, but the RELATIONS between the concepts.
[hmnSngo.2013-05-18]

_NOTATION:
Concept_name:
- name2: name3
- definition = text, reference.
- generic-concept = reference
- whole-concept = reference.
===
- attribute1:
- attribute2:
===
• specific-concept1: reference.
• specific-concept2: reference.

hitp'Problem

name::
* McsEngl.hitp'Problem@cptIt,
* McsEngl.hitp'bug@cptIt,
* McsEngl.hitp'issue@cptIt,

_SCROLL_elmSpliterRightDiv_PAGEDOWN:
* Now we have to click on right-div to scroll down with pagedown-key.
[2013-06-04]
===
If we make div focused, works BUT sets around the 'focus' contour.

_SPECIFIC:
* FIREFOX-problem##
* id-problem#linkL#

jsproblem.CHROME

name::
* McsEngl.jsproblem.CHROME@cptIt,

jsproblem.FIREFOX

name::
* McsEngl.jsproblem.FIREFOX@cptIt,

history.back() does not work:
I can solve it with:
window.addEventListener('hashchage', function (event) {
location.href = event.newURL;
};
this code CRASHES chrome!!!
[2015-10-25]

TOC does not expand/collapse by clicking on icons:
- addon 'Easy Translate' adds
<span id="transmark"></span>
inside the icon span element
===
SOLVED:
instead of matching innerHTML, I match for the indexOf(char) inside innerHTML.
[2015-10-25]

hitp'Resource

name::
* McsEngl.hitp'Resource@cptIt,

_ADDRESS.WPG:
* http://synagonism.net/hitp/index.html,
* https://github.com/synagonism/hitp//
* http://www.readability.com/developers/guidelines, on presentation.

hitp'Tool

name::
* McsEngl.hitp'Tool@cptIt,

hitp'tool.Manager-program (pmh)

name::
* McsEngl.hitp'tool.Manager-program (pmh)@cptIt,
* McsEngl.hitp-program@cptIt,
* McsEngl.hitppgm@cptIt,
* McsEngl.hpp@cptIt, {2016-10-30}
* McsEngl.pgmHitp@cptIt,
* McsEngl.pmh@cptIt, {2016-11-23}

* McsEngl.editHit@cptIt, {2013-06-12}
* McsEngl.hitp-manager@cptIt, {2013-07-03}
* McsEngl.hitp-program@cptIt,
* McsEngl.hitppgm@cptIt,
* McsEngl.hpp@cptIt,
* McsEngl.html5idtoc'editor@cptIt,
* McsEngl.manager.hitp@cptIt, {2013-07-03}
* McsEngl.manager.html5.id.toc.preview@cptIt, {2013-07-03}
* McsEngl.managerHitp@cptIt, {2013-07-03}
* McsEngl.mrHp@cptIt, {2013-07-03}
* McsEngl.mngrHitp@cptIt, {2013-07-03}

_GENERIC:
* program.web#cptIt580#ql:cptit580##

pmh'Name-index

name::
* McsEngl.pmh'Name-index@cptIt,

_DESCRIPTION:
With a key inserts a name included in index FROM a list of a worldview-names (with info on what to store in name index).
[hmnSngo.2013-06-12]

pmh'Sentence-analysis

name::
* McsEngl.pmh'Sentence-analysis@cptIt,

_DESCRIPTION:
On every sentence to find the included NAMES and to add them in the NAME-INDEX of the doc.
[hmnSngo.2013-05-19]

pmh.EVOLUTING

name::
* McsEngl.pmh.EVOLUTING@cptIt,

pmh.0.2016-10-30.start:
I forked my PgmWpg.0-89-x.2016-09-10#ql:pgmwpg@cptIt#, which started as a-fork of tinymce.4-0-7.2013-10-02.

hitp'tool.API-doc (PgmHitpApidocLjs-phajs)

name::
* McsEngl.hitp'tool.API-doc (PgmHitpApidocLjs-phajs)@cptIt,
* McsEngl.hitp-apidoc@cptIt,
* McsEngl.hitp-js-apidoc@cptIt,
* McsEngl.pgmApidocJsHitp@cptIt,
* McsEngl.pgmHitpApidocJs@cptIt,
* McsEngl.pgmHitpApidocLjs@cptIt,
* McsEngl.phaj@cptIt,
* McsEngl.phal@cptIt, {2017-01-03}
* McsEngl.phaljs@cptIt, {2017-01-10}

* McsEngl.phaljs@cptIt,

phajs'Synopsis

name::
* McsEngl.phajs'Synopsis@cptIt,

_DESCRIPTION:
> node moEntryCli
Commands:
cmdBuild [input..] Build documentation
cmdLint [input..] check for common style and uniformity mistakes
cmdServe [input..] generate, update, and display HTML documentation
cmdReadme [input..] inject documentation into your README.md

Options:
--version Show version number [boolean]
--help Show help [boolean]
===
> node filMoMainCli.js cmdBuild -f html -o docs\API

phajs'cmdBuild

name::
* McsEngl.phajs'cmdBuild@cptIt,

filMoMainCli cmdBuild [input..]

Options:
--version Show version number [boolean]
--help Show help [boolean]
--theme, -t specify a theme: this must be a valid theme module
--name project name. by default, inferred from package.json
--watch, -w watch input files and rebuild documentation when they
change [boolean]
--project-version project version. by default, inferred from package.json
--shallow shallow mode turns off dependency resolution, only
processing the specified files (or the main script
specified in package.json) [boolean] [default: false]
--config, -c configuration file. an array defining explicit sort order
--external a string / glob match pattern that defines which external
modules will be whitelisted and included in the generated
documentation. [default: null]
--extension, -e only input source files matching this extension will be
parsed, this option can be used multiple times.
--polyglot polyglot mode turns off dependency resolution and enables
multi-language support. use this to document c++[boolean]
--private, -p generate documentation tagged as private
[boolean] [default: false]
--access, -a Include only comments with a given access level, out of
private, protected, public, undefined. By default,
public, protected, and undefined access levels are
included
[array] [choices: "public", "private", "protected", "undefined"]
--github, -g infer links to github in documentation [boolean]
--infer-private Infer private access based on the name. This is a regular
expression that is used to match the name [string]
--document-exported Generate documentation for all exported bindings and
members even if there is no JSDoc for them
[boolean] [default: false]
--sort-order The order to sort the documentation
[choices: "source", "alpha"] [default: "source"]
--output, -o output location. Omit for stdout, otherwise is a filename
for single-file outputs and a directory name for
multi-file outputs like html [default: "stdout"]
--format, -f [choices: "json", "md", "remark", "html"] [default: "json"]

>node moEntryCli cmdBuild --shallow file.js -o dirApi
moEntryCli cmdBuild [input..]

Options:
--version Show version number [boolean]
--help Show help [boolean]
--theme, -t specify a theme: this must be a valid theme module
--name project name. by default, inferred from package.json
--watch, -w watch input files and rebuild documentation when they
change [boolean]
--project-version project version. by default, inferred from package.json
--shallow shallow mode turns off dependency resolution, only
processing the specified files (or the main script
specified in package.json) [boolean] [default: false]
--config, -c configuration file, an array defining explicit sort order
--external a string / glob match pattern that defines which external
modules will be whitelisted and included in the generated
documentation. [default: null]
--extension, -e only input source files matching this extension will be
parsed, this option can be used multiple times.
--polyglot polyglot mode turns off dependency resolution and enables
multi-language support. use this to document c++[boolean]
--private, -p generate documentation tagged as private
[boolean] [default: false]
--access, -a Include only comments with a given access level, out of
private, protected, public, undefined. By default,
public, protected, and undefined access levels are
included
[array] [choices: "public", "private", "protected", "undefined"]
--github, -g infer links to github in documentation [boolean]
--infer-private Infer private access based on the name. This is a regular
expression that is used to match the name [string]
--document-exported Generate documentation for all exported bindings and
members even if there-is no JSDoc for them
[boolean] [default: false]
--sort-order The order to sort the documentation
[choices: "source", "alpha"] [default: "source"]
--output, -o output location. Omit for stdout, otherwise is a filename
for single-file outputs and a directory name for
multi-file outputs like html [default: "stdout"]
--format, -f [choices: "json", "md", "remark", "html"] [default: "json"]

Input file file.js not found!

\xampp\htdocs\dWstSgm\dirPgm\dirHitp\node_modules\phajs>node moEntryCli cmdBuild file.js -o dirApi
moEntryCli cmdBuild [input..]

Options:
--version Show version number [boolean]
--help Show help [boolean]
--theme, -t specify a theme: this must be a valid theme module
--name project name. by default, inferred from package.json
--watch, -w watch input files and rebuild documentation when they
change [boolean]
--project-version project version. by default, inferred from package.json
--shallow shallow mode turns off dependency resolution, only
processing the specified files (or the main script
specified in package.json) [boolean] [default: false]
--config, -c configuration file, an array defining explicit sort order
--external a string / glob match pattern that defines which external
modules will be whitelisted and included in the generated
documentation. [default: null]
--extension, -e only input source files matching this extension will be
parsed, this option can be used multiple times.
--polyglot polyglot mode turns off dependency resolution and enables
multi-language support. use this to document c++[boolean]
--private, -p generate documentation tagged as private
[boolean] [default: false]
--access, -a Include only comments with a given access level, out of
private, protected, public, undefined. By default,
public, protected, and undefined access levels are
included
[array] [choices: "public", "private", "protected", "undefined"]
--github, -g infer links to github in documentation [boolean]
--infer-private Infer private access based on the name. This is a regular
expression that is used to match the name [string]
--document-exported Generate documentation for all exported bindings and
members even if there-is no JSDoc for them
[boolean] [default: false]
--sort-order The order to sort the documentation
[choices: "source", "alpha"] [default: "source"]
--output, -o output location. Omit for stdout, otherwise is a filename
for single-file outputs and a directory name for
multi-file outputs like html [default: "stdout"]
--format, -f [choices: "json", "md", "remark", "html"] [default: "json"]

Input file file.js not found!

phajs'cmdServe

name::
* McsEngl.phajs'cmdServe@cptIt,

>node moEntryCli.js cmdServe --help
moEntryCli.js cmdServe [input..]

Options:
--version Show version number [boolean]
--help Show help [boolean]
--theme, -t specify a theme: this must be a valid theme module
--name project name. by default, inferred from package.json
--watch, -w watch input files and rebuild documentation when they
change [boolean]
--project-version project version. by default, inferred from package.json
--shallow shallow mode turns off dependency resolution, only
processing the specified files (or the main script
specified in package.json) [boolean] [default: false]
--config, -c configuration file. an array defining explicit sort order
--external a string / glob match pattern that defines which external
modules will be whitelisted and included in the generated
documentation. [default: null]
--extension, -e only input source files matching this extension will be
parsed, this option can be used multiple times.
--polyglot polyglot mode turns off dependency resolution and enables
multi-language support. use this to document c++[boolean]
--private, -p generate documentation tagged as private
[boolean] [default: false]
--access, -a Include only comments with a given access level, out of
private, protected, public, undefined. By default,
public, protected, and undefined access levels are
included
[array] [choices: "public", "private", "protected", "undefined"]
--github, -g infer links to github in documentation [boolean]
--infer-private Infer private access based on the name. This is a regular
expression that is used to match the name [string]
--document-exported Generate documentation for all exported bindings and
members even if there-is no JSDoc for them
[boolean] [default: false]
--sort-order The order to sort the documentation
[choices: "source", "alpha"] [default: "source"]
--port port for the local server [number] [default: 4001]

phajs'option

name::
* McsEngl.phajs'option@cptIt,

phajs'access_option, phajs'a_option:
// Include only comments with a given access level, out of private, protected, public, undefined.
// By default, public, protected, and undefined access levels are included.
// choices: ['public', 'private', 'protected', 'undefined'],
> cmdBuild fixture/internal.input.js -a public
> cmdBuild --shallow fixture/internal.input.js -a private -a public
> cmdBuild --shallow fixture/internal.input.js -a private public

phajs'config_option:
// configuration file, an array defining explicit sort order

phajs'document_exported_option:
type: 'boolean',
describe: 'Generate documentation for all exported bindings and members even if there-is no JSDoc for them',

phajs'extention_option:
// only input source files matching this extension will be parsed, this option can be used multiple times.
> cmdBuild fixture/extension/index.otherextension --extension=otherextension

phajs'external_option:
//a string / glob match pattern that defines which external modules will be whitelisted and included in the generated documentation.
> cmdBuild fixture/external.input.js --external=ext

phajs'format_option, phajs'f_option:
// choices: ['json', 'md', 'remark', 'html']
> cmdBuild -f html fixture/internal.input.js -o dirAPI
> cmdBuild fixture/internal.input.js -f html -o dirAPI
===
> node moEntryCli.js cmdBuild moEntryCli.js --shallow -f -o API
< Invalid values:
Argument: format, Given: true, Choices: "json", "md", "remark", "html"

phajs'github_option:
// infer links to github in documentation

phajs'infer_private_option:
//Infer private access based on the name.
//This is a regular expression that is used to match the name
> cmdBuild fixture/infer-private.input.js --infer-private ^_

phajs'polyglot_option:
> cmdBuild fixture/polyglot/blend.cpp --polyglot

phajs'private_option:
// generate documentation tagged as private
> cmdBuild fixture/internal.input.js --private

phajs'shallow_option:
// avoid dependency parsing
> node moEntryCli.js cmdBuild --shallow moEntryCli.js -f html -o API
> node moEntryCli.js cmdBuild moEntryCli.js --shallow -f html -o API

phajs'sort_order_option:
// The order to sort the documentation.
// choices: ['source', 'alpha'],
/// default: 'source'

phajs'theme_option, phajs't_option:
// specify a theme: this must be a valid theme module

phajs'Comment (phajscmt)

name::
* McsEngl.phajs'Comment (phajscmt)@cptIt,

phajscmt: {
description: { type: 'root', children: [Object], position: [Object] },
tags: [ [Object] ],
loc: { start: [Object], end: [Object] },
context: { loc: [Object], file: undefined, sortKey: 'undefined 00000001' },

name: 'simple.input',
namespace: 'simple.input',
kind: 'function',
members: { instance: [Object], static: [Object], events: [Object] },
params: [ {name: 'foo', lineNumber: 0, type: { type: 'NameExpression', name: 'object' }} ],
path: [ { name: 'Class', kind: 'class' } ],
returns: [ [Object] ],
}

phajscmt'description_object:
description: { type: 'root', children: [Object], position: [Object] },
===
phajscmt'description.children_array:
children: [ { type: 'paragraph', children: [Object], position: [Object] } ],
===
phajscmt'description.position_object:
position:
{ start: { line: 1, column: 1, offset: 0 },
end: { line: 1, column: 4, offset: 3 }
}

phajscmt'tags_array:
tags: [ [Object] ],

phajscmt'loc_object:
loc: { start: [Object], end: [Object] },

phajscmt'context_object:
context:
{ loc: [Object],
file: '\\xampp\\htdocs\\dWstSgm\\dirPgm\\dirHitp\\node_modules\\hitp-apidoc-js\\dirTest\\fixture\\simple.input.js' },
===
context: { loc: [Object], file: undefined, sortKey: 'undefined 00000001' },

===
phajscmt'context.file_string:

===
phajscmt'context.loc_object:

===
phajscmt'context.sortKey_string:

phajscmt'returns_array:
returns: [ [Object] ],

phajscmt'name_string:
name: 'simple.input',
//* @name Class

phajscmt'kind_string:
kind: 'function',
kind: 'class', //* @class
//* @kind event

phajscmt'members_object:
members: { instance: [], static: [] },
members: { instance: [Object], static: [Object], events: [Object] },

phajscmt'params_array:
[ {
name: 'foo',
lineNumber: 0,
type: { type: 'NameExpression', name: 'object' }
} ]

===
phajscmt'params.properties_array:
//@param {object} foo * @param {string} foo.bar * @param {string} foo.baz
[ {
name: 'foo.bar',
lineNumber: 2,
type: { type: 'NameExpression', name: 'string' }
},
{ name: 'foo.baz',
lineNumber: 3,
type: { type: 'NameExpression', name: 'string' } } ]

phajscmt'path_array:
path: [ { name: 'Class', kind: 'class' } ]

phajscmt'namespace_string:
namespace: 'simple.input'

phajs'API (phajs'moEntryCli)

name::
* McsEngl.phajs'API (phajs'moEntryCli)@cptIt,

Package:
Name ¦ Package Version ¦ Installed Version ¦ Status ¦ Locked ¦
¦ ansi-html ¦ 0.0.6 ¦ 0.0.6 ¦ Matching ¦ Locked ¦
¦ babel-generator ¦ 6.19.0 ¦ 6.19.0 ¦ Matching ¦ Locked ¦
¦ babel-plugin-system-import-transformer ¦ 2.4.0 ¦ 2.4.0 ¦ Matching ¦ Locked ¦
¦ babel-plugin-transform-decorators-legacy ¦ 1.3.4 ¦ 1.3.4 ¦ Matching ¦ Locked ¦
¦ babel-preset-es2015 ¦ 6.16.0 ¦ 6.18.0 ¦ Mismatch ¦ Locked ¦
¦ babel-preset-react ¦ 6.16.0 ¦ 6.16.0 ¦ Matching ¦ Locked ¦
¦ babel-preset-stage-0 ¦ 6.16.0 ¦ 6.16.0 ¦ Matching ¦ Locked ¦
¦ babel-traverse ¦ 6.16.0 ¦ 6.19.0 ¦ Mismatch ¦ Locked ¦
¦ babel-types ¦ 6.16.0 ¦ 6.19.0 ¦ Mismatch ¦ Locked ¦
¦ babelify ¦ 7.3.0 ¦ 7.3.0 ¦ Matching ¦ Locked ¦
¦ babylon ¦ 6.11.4 ¦ 6.14.1 ¦ Mismatch ¦ Locked ¦
¦ chalk ¦ 1.1.1 ¦ 1.1.3 ¦ Mismatch ¦ Locked ¦
¦ chokidar ¦ 1.2.0 ¦ 1.6.1 ¦ Mismatch ¦ Locked ¦
¦ concat-stream ¦ 1.5.0 ¦ 1.5.2 ¦ Mismatch ¦ Locked ¦
¦ debounce ¦ 1.0.0 ¦ 1.0.0 ¦ Matching ¦ Locked ¦
¦ disparity ¦ 2.0.0 ¦ 2.0.0 ¦ Matching ¦ Locked ¦
¦ doctrine ¦ 2.0.0 ¦ 2.0.0 ¦ Matching ¦ Locked ¦
¦ extend ¦ 3.0.0 ¦ 3.0.0 ¦ Matching ¦ Locked ¦
¦ get-comments ¦ 1.0.1 ¦ 1.0.1 ¦ Matching ¦ Locked ¦
¦ git-url-parse ¦ 6.0.1 ¦ 6.1.0 ¦ Mismatch ¦ Locked ¦
¦ github-slugger ¦ 1.1.1 ¦ 1.1.1 ¦ Matching ¦ Locked ¦
¦ globals-docs ¦ 2.2.0 ¦ 2.2.0 ¦ Matching ¦ Locked ¦
¦ highlight.js ¦ 9.1.0 ¦ 9.8.0 ¦ Mismatch ¦ Locked ¦
¦ js-yaml ¦ 3.3.1 ¦ 3.7.0 ¦ Mismatch ¦ Locked ¦
¦ lodash ¦ 4.11.1 ¦ 4.17.2 ¦ Mismatch ¦ Locked ¦
¦ mdast-util-inject ¦ 1.1.0 ¦ 1.1.0 ¦ Matching ¦ Locked ¦
¦ micromatch ¦ 2.1.6 ¦ 2.3.11 ¦ Mismatch ¦ Locked ¦
¦ mime ¦ 1.3.4 ¦ 1.3.4 ¦ Matching ¦ Locked ¦
¦ module-deps-sortable ¦ 4.0.6 ¦ 4.0.6 ¦ Matching ¦ Locked ¦
¦ parse-filepath ¦ 0.6.3 ¦ 0.6.3 ¦ Matching ¦ Locked ¦
¦ remark ¦ 6.0.1 ¦ 6.2.0 ¦ Mismatch ¦ Locked ¦
¦ remark-html ¦ 5.0.1 ¦ 5.0.1 ¦ Matching ¦ Locked ¦
¦ remark-toc ¦ 3.0.0 ¦ 3.1.0 ¦ Mismatch ¦ Locked ¦
¦ remote-origin-url ¦ 0.4.0 ¦ 0.4.0 ¦ Matching ¦ Locked ¦
¦ resolve ¦ 1.1.6 ¦ 1.1.7 ¦ Mismatch ¦ Locked ¦
¦ standard-changelog ¦ 0.0.1 ¦ 0.0.1 ¦ Matching ¦ Locked ¦
¦ stream-array ¦ 1.1.0 ¦ 1.1.2 ¦ Mismatch ¦ Locked ¦
¦ strip-json-comments ¦ 2.0.0 ¦ 2.0.1 ¦ Mismatch ¦ Locked ¦
¦ tiny-lr ¦ 1.0.3 ¦ 1.0.3 ¦ Matching ¦ Locked ¦
¦ unist-builder ¦ 1.0.0 ¦ 1.0.2 ¦ Mismatch ¦ Locked ¦
¦ unist-util-visit ¦ 1.0.1 ¦ 1.1.1 ¦ Mismatch ¦ Locked ¦
¦ vfile ¦ 2.0.0 ¦ 2.0.0 ¦ Matching ¦ Locked ¦
¦ vfile-reporter ¦ 3.0.0 ¦ 3.0.0 ¦ Matching ¦ Locked ¦
¦ vfile-sort ¦ 2.0.0 ¦ 2.0.0 ¦ Matching ¦ Locked ¦
¦ vinyl ¦ 2.0.0 ¦ 2.0.1 ¦ Mismatch ¦ Locked ¦
¦ vinyl-fs ¦ 2.3.1 ¦ 2.4.4 ¦ Mismatch ¦ Locked ¦
¦ yargs ¦ 6.0.0 ¦ 6.4.0 ¦ Mismatch ¦ Locked ¦
¦ chdir ¦ 0.0.0 ¦ 0.0.0 ¦ Matching ¦ Locked ¦
¦ cz-conventional-changelog ¦ 1.2.0 ¦ 1.2.0 ¦ Matching ¦ Locked ¦
¦ documentation-schema ¦ 0.0.1 ¦ 0.0.1 ¦ Matching ¦ Locked ¦
¦ eslint ¦ 3.1.0 ¦ 3.10.2 ¦ Mismatch ¦ Locked ¦
¦ fs-extra ¦ 1.0.0 ¦ 1.0.0 ¦ Matching ¦ Locked ¦
¦ glob ¦ 7.0.0 ¦ 7.1.1 ¦ Mismatch ¦ Locked ¦
¦ json-schema ¦ 0.2.3 ¦ 0.2.3 ¦ Matching ¦ Locked ¦
¦ mock-fs ¦ 3.5.0 ¦ 3.12.1 ¦ Mismatch ¦ Locked ¦
¦ tap ¦ 8.0.0 ¦ 8.0.1 ¦ Mismatch ¦ Locked ¦
¦ tmp ¦ 0.0.29 ¦ 0.0.29 ¦ Matching ¦ Locked

phajs'moCmdBuild PublicNo CustomInternal

name::
* McsEngl.phajs'moCmdBuild PublicNo CustomInternal@cptIt,

phajs'builder-object Public CustomInternal

name::
* McsEngl.phajs'builder-object Public CustomInternal@cptIt,

phajs'command-string Public CustomInternal

name::
* McsEngl.phajs'command-string Public CustomInternal@cptIt,

phajs'describe-string Public CustomInternal

name::
* McsEngl.phajs'describe-string Public CustomInternal@cptIt,

phajs'handler-function Public CustomInternal

name::
* McsEngl.phajs'handler-function Public CustomInternal@cptIt,

phajs'moFs Public CustomNo

name::
* McsEngl.phajs'moFs Public CustomNo@cptIt,

phajs'moEntry PublicNo CustomInternal

name::
* McsEngl.phajs'moEntry PublicNo CustomInternal@cptIt,

phajs'fEntryBuild Public CustomInternal

name::
* McsEngl.phajs'fEntryBuild Public CustomInternal@cptIt,

phajs'fEntryBuildSync Public CustomInternal

name::
* McsEngl.phajs'fEntryBuildSync Public CustomInternal@cptIt,

phajs'fEntryLint Public CustomInternal

name::
* McsEngl.phajs'fEntryLint Public CustomInternal@cptIt,

phajs'oEntryFormats Public CustomInternal

name::
* McsEngl.phajs'oEntryFormats Public CustomInternal@cptIt,

phajs'oEntryUtil Public CustomInternal

name::
* McsEngl.phajs'oEntryUtil Public CustomInternal@cptIt,

phajs'moOptionsShared PublicNo CustomInternal

name::
* McsEngl.phajs'moOptionsShared PublicNo CustomInternal@cptIt,

phajs'mfDebounce PublicNo CustomInternalNo#ql:ljnm.debounce#

name::
* McsEngl.phajs'mfDebounce PublicNo CustomInternalNo@cptIt,

phajs'mfExtend PublicNo CustomInternalNo#ql:ljnm.extend#

name::
* McsEngl.phajs'mfExtend PublicNo CustomInternalNo@cptIt,

phajs'mfStream-array PublicNo CustomInternalNo#ql:ljnm.stream-array#

name::
* McsEngl.phajs'mfStream-array PublicNo CustomInternalNo@cptIt,

phajs'moChokidar PublicNo CustomInternalNo#ql:ljnm.chokidar#

name::
* McsEngl.phajs'moChokidar PublicNo CustomInternalNo@cptIt,

phajs'moVinyl-fs PublicNo CustomInternalNo#ql:ljnm.vinyl-fs#

name::
* McsEngl.phajs'moVinyl-fs PublicNo CustomInternalNo@cptIt,

phajs'moCmdLint PublicNo CustomInternal

name::
* McsEngl.phajs'moCmdLint PublicNo CustomInternal@cptIt,

phajs'moCmdReadme PublicNo CustomInternal

name::
* McsEngl.phajs'moCmdReadme PublicNo CustomInternal@cptIt,

phajs'moCmdServe PublicNo CustomInternal

name::
* McsEngl.phajs'moCmdServe PublicNo CustomInternal@cptIt,

phajs'mfYargs PublicNo CustomInternalNo

name::
* McsEngl.phajs'mfYargs PublicNo CustomInternalNo@cptIt,

>node moEntryCli.js cmdBuild --shallow moEntryCli.js -f html -o API
{
_: [ 'cmdBuild', 'moEntryCli.js' ],
'$0': 'moEntryCli.js',
access: undefined,
config: undefined,
'document-exported': false,
documentExported: false,
example: undefined
extension: undefined,
external: null,
f: 'html',
format: 'html',

g: false,
github: false,
help: false,
'infer-private': undefined,
name: undefined,
o: 'API',
output: 'API',
p: false,
polyglot: false,
private: false,
'project-version': undefined,
shallow: true,
'sort-order': 'source',
sortOrder: 'source',
theme: undefined,
version: false,
w: false,
watch: false,
}

>node moEntryCli --shallow file.js -o dirApi
{ _: [],
version: false,
help: false,
shallow: 'file.js',
o: 'dirApi',
'$0': 'moEntryCli' }

>node moEntryCli -o dirApi
{ _: [],
version: false,
help: false,
o: 'dirApi',
'$0': 'moEntryCli' }

hitp'DOING

name::
* McsEngl.hitp'DOING@cptIt,

hitp'ToC-highlighting

name::
* McsEngl.hitp'ToC-highlighting@cptIt,

_TODO:
To highlight the reading position not by clicking on text BUT when hovering a text_fragment.
[hmnSngo.2013-11-27]

hitp'Searching

name::
* McsEngl.hitp'Searching@cptIt,

_GOOGLE_SEARCHING:

_ID_SEARCHING:

_TITLE_SEARCHING:
For every name in a hitp-page to store its section-title and paragraph-title if exist:

_TITLE_VALUE_SEARCHING:
With 2 input-fields.
[hmnSngo.2013-08-29]

hitp'SUGGESTING

name::
* McsEngl.hitp'SUGGESTING@cptIt,

Modern PDF books resemble the earliest “airplanes” with movable wings, like birds.

ADVANTANGES:
* access: from anywhere to any related AND anywhere.
* quality content:
* integrated content:
* life-long learning: any time, from everywhere.
* multilingual names.

CHALLENGES:
* content improvement mechanism.

SMART-EDUCATION-ECOSYSTEM:
* access: from anywhere to any related AND anywhere.
* detects its incosistencies
* AI-assisted learning, video-courses, VR-tools are good but not enough. WE need reliable knowledge with easy access.
* support lifelong learning, not just student stage, anytime in life access, when we forget or don't know.
* if we trein AI with consistent conceptual-systems we can rely on it.

Chinese MOE:
As a foreign educator, you can submit your suggestions to China’s Ministry of Education (MOE), but there is no dedicated public portal for unsolicited international proposals. However, here are the most effective ways to share your web-book method:

### **1. Official MOE Contact Channels**
- **General Inquiries Email**:
- `international@moe.edu.cn` (for international cooperation-related matters)
- `kjs@moe.edu.cn` (Department of Science and Technology, which oversees digital education initiatives)
- Subject line: *"Proposal for Open Web-Book Method in Digital Education"* (in English or Chinese)

- **Ministry of Education Website**:
- [http://www.moe.gov.cn](http://www.moe.gov.cn) ? Look for "????" (Public Messages) or "????" (Feedback Solicitation) sections.
- Use machine translation (DeepL/Google) to submit in Chinese for higher visibility.

### **2. Alternative Pathways (Higher Success Rate)**
- **Partner with a Chinese University**:
- Contact international offices at top Chinese universities (e.g., Peking, Tsinghua, ECNU) that collaborate with the MOE on ed-tech projects. They can help pitch your method.
- **Submit via Provincial Education Departments**:
- Cities like Beijing, Shanghai, or Guangdong pilot reforms first. Find their "Education Commission" websites (e.g., ?????) and submit locally.
- **Leverage Joint Programs**:
- If your institution has ties to Sino-foreign education initiatives (e.g., British Council, US-China Strong Foundation), use those networks.

### **3. Key Tips for Your Proposal**
- **Highlight Alignment with MOE Priorities**:
- Frame your web-books as supporting:
- **"Digital Education 2.0"** (????????)
- **Rural education equity** (???????)
- **"Double Reduction" Policy** (????) by reducing textbook costs.
- **Include Evidence**:
- Pilot results, cost savings, or compatibility with existing platforms like "National Smart Education Platform" (???????????).
- **Offer Collaboration**:
- Propose a free trial or training for Chinese teachers.

### **4. Realistic Expectations**
- Unsolicited proposals rarely get direct MOE responses, but persistence through multiple channels helps.
- Consider presenting at conferences like **China International Education Exhibition (CIEET)** or publishing in Chinese journals (e.g., *China Educational Technology*).

Would you like help drafting a template email in Chinese for your submission? I can assist with culturally appropriate phrasing.

=======================
Here’s a polished, culturally appropriate email template in Chinese that you can send to the MOE or partner institutions. I’ve included key phrasing to align with China’s educational priorities:

---


### **Key Notes**:
1. **Attachments**: Include a 1-page summary in **Chinese** (even if machine-translated) with:
- **Data** (e.g., "???????,???????30%").
- **Visuals** (e.g., web-book vs traditional textbook comparison).

2. **Follow-Up**: If no reply in 4 weeks, resend via:
- Provincial education departments (e.g., ????? jw@shec.edu.cn).
- Universities (e.g., ?????????? cie@admin.ecnu.edu.cn).

3. **Cultural Nuance**:
- Avoid claiming "superiority" — frame it as a **humble contribution** (e.g., “???” / "????").
- Cite MOE policies (e.g., “?????????”) to show alignment.

Would you like me to refine any part further (e.g., add a specific policy reference)?


===================
Here’s a polished, culturally appropriate email template in English that you can send to the MOE or partner institutions, followed by key submission tips:

---
**Subject:** Proposal for Collaboration: Open Web-Book Method to Support China's Digital Education Goals

Dear Ministry of Education Leaders,

Greetings from [Your Institution/Country]. I am [Your Name], a [Your Position, e.g., "Professor of Education Technology at XYZ University"] with [X years] of experience in digital learning solutions. I am writing to respectfully share an innovative open web-book development method that may support China's visionary education modernization efforts.

**Key Advantages of Our Approach:**
1?? **Cost-Effective Digital Transition**
- Reduces reliance on physical textbooks (aligned with "Double Reduction" policy goals)
- Particularly suitable for rural schools through low-bandwidth adaptive design

2?? **Interactive & Teacher-Empowering**
- Enables embedded assessments and localized content creation
- Supports the "National Smart Education Platform" ecosystem

3?? **Globally Validated**
- Successfully piloted in [Country/Institution] with [Quantifiable Results, e.g., "30% improvement in student engagement"]

We would be honored to:
• Provide a free demonstration for your technical team
• Collaborate on pilot implementation with a Chinese partner institution
• Adapt the system to complement existing digital education initiatives

Attached please find:
1. Executive summary (Chinese translation included)
2. Case studies from other education systems
3. Technical compatibility analysis

As China continues to lead in educational innovation, we believe this method could meaningfully contribute to your ????????? (Education Digitalization Strategy). I would be delighted to discuss this further at your convenience.

Respectfully,
[Your Full Name]
[Position]
[Institution]
[Email] | [Phone] | [Website]
[Date]

---

### **Strategic Submission Tips**
1. **Dual-Language Attachments**
- Include both English and Chinese versions (even machine-translated) of your 1-page summary
- Highlight sections that explicitly reference:
• ???? (Double Reduction Policy)
• ??????????? (National Smart Education Platform)

2. **Follow-Up Protocol**
- If no response in 3 weeks, resend with subject line: **"Follow-Up: Open Web-Book Proposal for Rural Education Equity"**
- Simultaneously contact:
• Provincial bureaus (e.g., Guangdong Education Department)
• MOE-affiliated organizations like National Center for Educational Technology (NCET)

3. **Cultural Nuances to Strengthen Impact**
- **Avoid**: Direct criticism of existing systems
- **Emphasize**:
• Technology transfer willingness
• Adaptability to "Socialism with Chinese Characteristics in Education"
• Potential for international recognition of China's education leadership

4. **Alternative Pathways**
- Present at the **China International Education Annual Conference (CIEAC)**
- Publish in **Journal of Educational Technology in China** (if academic)

Would you like me to:
a) Draft the Chinese version of this email?
b) Suggest specific Chinese institutions for partnership?
c) Prepare a slide deck for virtual presentations to MOE affiliates?

This approach balances professional rigor with cultural awareness, significantly improving your proposal's reception likelihood.
[https://chat.deepseek.com/a/chat/s/67b7b0d7-11d1-41ae-8054-0be0c18d55ee]

Guangdong Education Department:
Here’s a targeted approach to contact the **Guangdong Provincial Department of Education** (??????) with your open web-book proposal, including direct contact information and strategic recommendations:

---

### **1. Official Contact Information for Guangdong Education Department**
**Website**: [http://edu.gd.gov.cn](http://edu.gd.gov.cn)
**Email**:
- General Office: **gdjy@gdedu.gov.cn**
- International Cooperation Office (for foreign proposals): **gdiec@gdedu.gov.cn**
- Department of Science and Technology (for digital education): **gdjykjc@gdedu.gov.cn**

**Phone**: +86-20-3762-8114 (International Office)
**Address**:
??????????723?
??:510080

---

### **2. Recommended Email Template (English + Chinese)**
**Subject**: ????????????????? | Proposal for Open Web-Book Collaboration

**Body (English)**:
Dear Guangdong Education Department,

I am [Your Name], a [Your Position] at [Your Institution]. We have developed an **open web-book platform** that aligns with Guangdong’s leadership in digital education innovation. Our method offers:
- **Low-cost digital textbooks** (supporting rural education equity)
- **Interactive features** (embedded quizzes, teacher collaboration tools)
- **Pilot success**: Improved engagement by [X%] in [Country/Institution]

We propose a **free pilot program** with Guangdong schools or teacher training colleges. Attached are:
1. Project summary (Chinese/English)
2. Technical documentation
3. Case studies

We would be honored to discuss how this could support Guangdong’s ???? (Smart Education) initiatives.

**Chinese Version (??????)**:
???????????:
??!???????????????????:
1. ???????,??????????
2. ????(????????????)
3. ??[??/??]????,???????[X%]
????????????????????????????,?????

??
[????]

---

### **3. Strategic Tips for Guangdong Outreach**
- **Highlight Local Priorities**:
- Mention Guangdong’s **"1+1+9" Digital Education Plan** (2023)
- Align with **Pearl River Delta education modernization** goals

- **Target Key Cities**:
- Suggest piloting in **Shenzhen** (tech hub) or **Shaoguan** (rural focus)
- CC: Relevant municipal bureaus (e.g., Shenzhen Education Bureau: **szjyj@sz.edu.cn**)

- **Follow-Up**:
- If no reply in 2 weeks, call the International Office (+86-20-3762-8114) during Beijing work hours (9-11 AM)
- Leverage connections through **Guangdong universities** (e.g., South China Normal University’s education technology faculty)

- **Cultural Note**:
- Guangdong is China’s **most internationally engaged** province – emphasize:
• **"Gateway for global education innovation"**
• **"Pilot for nationwide scaling"**

---

### **4. Alternative Pathways in Guangdong**
1. **Guangdong Education Technology Center** (?????????)
- Email: **gdjszx@gdedu.gov.cn**
- Focus: Digital resource development

2. **Guangdong Teacher Training Colleges**
- Contact **Guangdong Second Normal University** (teacher training base)

3. **Shenzhen-Hong Kong Collaborations**
- Submit to **Shenzhen Education Bureau**’s international division (foreign-friendly)

Would you like me to:
a) Draft a full Chinese version of your proposal?
b) Provide talking points for a follow-up call?
c) Identify specific schools in Guangdong for pilot outreach?

Guangdong is one of the **best testbeds** for foreign education innovations in China – your web-book method has high potential here.
[deepseek]

Here are key **MOE-affiliated organizations** in China that could be strategic partners for your open web-book proposal, along with their focus areas and contact information:

---

### **1. National Center for Educational Technology (NCET | ???????)**
**Role**: Implements digital education infrastructure (e.g., National Smart Education Platform)
**Contact**:
- Website: [http://www.ncet.edu.cn](http://www.ncet.edu.cn)
- Email: **ncet@moe.edu.cn**
**Relevance**: Ideal for technical integration of your web-books into China’s official platforms.

---

### **2. National Institute of Education Sciences (NIES | ?????????)**
**Role**: Conducts policy research and pilots experimental reforms.
**Contact**:
- Website: [http://www.nies.edu.cn](http://www.nies.edu.cn)
- Email: **office@nies.edu.cn** (cc: International Office **intoff@nies.edu.cn**)
**Relevance**: Propose a joint research project to evaluate your method’s impact.

---

### **3. China Education Association for International Exchange (CEAIE | ??????????)**
**Role**: Manages MOE’s foreign collaborations.
**Contact**:
- Website: [http://www.ceaie.edu.cn](http://www.ceaie.edu.cn)
- Email: **info@ceaie.edu.cn**
**Relevance**: Best channel for foreign-initiated proposals; organizes **CIEEC** (annual education expo).

---

### **4. National Open University (NOU | ??????)**
**Role**: Leads distance education and digital resource development.
**Contact**:
- Website: [http://www.ouchn.edu.cn](http://www.ouchn.edu.cn)
- Email: **dangban@ouchn.edu.cn**
**Relevance**: Potential to co-develop web-books for lifelong learners.

---

### **5. China Educational Technology Association (CETA | ????????)**
**Role**: Industry association for edtech companies/innovators.
**Contact**:
- Website: [http://www.etr.com.cn](http://www.etr.com.cn)
- Email: **ceta@etr.com.cn**
**Relevance**: Networking with Chinese edtech firms that can commercialize your method.

---

### **Submission Strategy**
1. **Prioritize NCET or CEAIE** for fastest traction (both handle foreign digital education proposals).
2. **Frame as a "Technology Contribution"** (?? "reform" rhetoric):
- *"Supporting China’s ????????? (Education Digitalization Strategy)"*
- *"Bridging international best practices with local needs"*
3. **Attach a Chinese White Paper** covering:
- Data privacy compliance (align with China’s PIPL law)
- Localization plan (e.g., integration with WeChat/??)

**Template Email Subject**:
«????????????»| Proposal for Open Web-Book Technology Contribution

**Follow-Up**:
- If no reply in 3 weeks, contact through **provincial branches** (e.g., Guangdong’s Education Technology Center).
- Attend **MOE-affiliated events**:
- **China International Education Exhibition & Conference (CIEEC)**
- **Global Education Technology Summit** (hosted by CETA)

Would you like me to draft a formal white paper outline tailored to these organizations?

hitp'doing.CONVERTING

name::
* McsEngl.hitp'doing.CONVERTING@cptIt,
* McsEngl.fv-to-hitp@cptIt,
* McsEngl.fv2Hitp@cptIt,
* McsEngl.hitp'conversion@cptIt,
* McsEngl.hitp'converting@cptIt,
* McsEngl.fv2hitp-cpt@cptIt,
* McsEngl.hitp-from-fv-cpt@cptIt,
* McsEngl.pfv2hitp-cpt@cptIt,

_GENERIC:
* pfv-to-hml#ql:idPfv2hml#

_SPECIFIC:
* From-FV-to-HitpMcs#ql:idMcsHitpdngCvtg#

hitp'converting.FROM-FolioViews-TO-HmlOwn

name::
* McsEngl.hitp'converting.FROM-FolioViews-TO-HmlOwn@cptIt,
* McsEngl.hitp'from-FolioViews@cptIt,

_DESCRIPTION:
First is converted to HtmlOwn.
I use jEdit macros (hitp/fv-htmlOwn.bsh)

<SO+><SO>: strike,

hitp'converting.FROM-HmlOwn

name::
* McsEngl.hitp'converting.FROM-HmlOwn@cptIt,
* McsEngl.hitp'from-HmlOwn@cptIt,

_ORDER:
//CASE: H1 ids custom, next numerical:
1. SET h1-sections and IDs (htmlOwn-hitp-1.bsh, once)
clear.
2. set clsHide for /h1 (htmlOwn-hitp-2.bsh, once)
3. set FIRST h2 sections and IDs (htmlOwn-hitp-3.bsh many)
4. sets the REST IDs of h2 elements: idH1name.2|3..., one per running.

* set _NAME: ===> Name:

One-H1-with-customid-children

{2016-07-03}:
1. create H1-section by hand.
2. create H2-sections
3. remove first </section> and add it to the end.
4. manually set ids by search-and-replace id => idName

5. create h3-section
6. manually search for <h2 and REMOVE </section before <h3 and ADD before <h2 if last <h3
7. manually add ids
...
8. Check sections with sidekick

9. create clsHide for headings

10. set first P ids
11. set rest P ids

12: _NAME: _DESCRIPTION: _GENERIC: _WHOLE: _SPECIFIC:
_ABBREVIATION: _ADDRESS.WPG:

head#ql:hitp'head#
structure: headings and content

_CONTENT_ELEMENT:
* <p>
* <ul>
* <table>

_INLINE_ELEMENT:
* <i> ==> <em> = emphasis
* <u> ==> style-u
* <b> ==> style-b
* <span>
* <strong> = importance
* <img src="marx.1887-1867.capital-i.files/chr1Table1.png"/>

_SECTION:
1. First put h1-sections:
</section>

<section id="idPrt4">
<h1 id="idPrt4H1">Part 4: Production of Relative Surplus Value</h1>
=> check with jEdit sidekick the structure
========================================================

2. h2-sections:
</section>

<section id="idChr12">
<h2 id="idChr12H2">Chapter 12: The Concept of Relative Surplus Value</h2>
=> remove section from: '</h1>\n </section>'
=> add ' </section>' in previous h1-section.
==========================================================

3. h3-sections:
java program SetH3Section_and_id_prev (at \File1a\WebsiteSngmLocal\program\ids\SetH3Section_and_id_prev.java)
=> missing h2-closing-sections. see from browser and add (crxToc test if it is ok)
==========================================================

3. h4-sections:

2. IDs

_NOTATION:
The ids are the FIRST attribute of element.
[hmnSngo.2013-08-07]

_UNIQUENESS_PER_CHAPTER:
* idChr3, idChr3H1, idChr3P1

_UNIQUENESS_PER_PARAGRAPH:
* idP1, idP2, ...idP111.

_ID.NON_HEADER:
* \File1a\WebsiteSngmLocal\program\ids\SetHitpIdContent.java,
* IF you change the content, you can remove the ids and run again the program.

Page-of-paperbook

name::
* McsEngl.hitp'page@cptIt,

_CODE.HITP:
<span id="idPage59" class="clsPagePb">page 59</span>
//inside a-paragraph or section

SPECIFIC

_SPECIFIC:
* hitp.Mcs#ql:idMcsHitplag#

hitp.EVOLUTING#cptCore546.171#

name::
* McsEngl.hitp.EVOLUTING@cptIt,

_ADDRESS.WPG:
* http://synagonism.net/hitp/#idEvn,

hitp'versioning

name::
* McsEngl.hitp'versioning@cptIt,

_DESCRIPTION:
* version.last.dynamic: index.html (redirect to last)
* version.6.working: index.6.working.html (v.5-23-2.2017-04-26 dynamic)
* version.5.2016-12-12.html (previous static)
[hmnSngo.2017-04-26]
===
• version.4-1.2016-10-30.dynamic: index.html
• version.4.2015-08-20.people: (3-12): index.4.2015-08-20.html
• version.3.2015-02-17.view (2-44): index.3.2015-02-17.html
{hmnSngo.2016-10-30}
===
• version.4.last.minor: index.html (2016-04-27.4-22)
• version.4.last.minorNo (3-12): index.2015-08-20.4.html (people vs capital).
• version.3.previous (2-44): index.2015-02-17.3.html (conceptual-view).
{hmnSngo.2016-04-27}
===
version.last: name.html (date1 minor date2 changeDate1)
version.previous: name.date1_of_previous_last.

_NEW_LAST:
1) time: when we consider (subjectively) that a MAJOR change happend and we must have stored the previous state of the file.
2) the EXISTING-LAST 'name.html' ==> name.date1.html with:
 version.last: name.html
 version.previous: name.date1.html (changeDate1)
3) the NEW-LAST is name.html with:
 version.last: name.html (date3 minor date3 changeDate3
 version.previous: name.date1.html (changeDate1)
[hmnSngo.2013-06-29]

lwp.HTML+LJS (lhj)

name::
* McsEngl.lwp.HTML+LJS (lhj)@cptIt,
* McsEngl.lhj@cptIt,

lwp.HTML+LJB (lhjb)

name::
* McsEngl.lwp.HTML+LJB (lhjb)@cptIt,
* McsEngl.lhjb@cptIt,

lwp.HTML+LJB-templates

name::
* McsEngl.lwp.HTML+LJB-templates@cptIt,

lwp.HTML+LJN (lhjn)

name::
* McsEngl.lwp.HTML+LJN (lhjn)@cptIt,

_SPECIFIC:
* Electron-lag,
* NW.js,

lwp.lhjn.ELECTRON (Ljel)

_CREATED: {2016-08-28}

name::
* McsEngl.lwp.lhjn.ELECTRON (Ljel)@cptIt,
* McsEngl.Atom-Shell@cptIt,
* McsEngl.electron-language@cptIt,
* McsEngl.lagEln@cptIt,
* McsEngl.leln@cptIt,
* McsEngl.Ljel@cptIt, {2017-07-09}
* McsEngl.lwp.electron@cptIt,
* McsEngl.lwpEln@cptIt,

_DESCRIPTION:
Electron is an open source library developed by GitHub for building cross-platform desktop applications with HTML, CSS, and JavaScript. Electron accomplishes this by combining Chromium and Node.js into a single runtime and apps can be packaged for Mac, Windows, and Linux.
[https://electron.atom.io/docs/tutorial/about/]
===
Electron is an open source project written by Cheng Zhao AKA zcbenz, an engineer who works for GitHub in Beijing on the Atom text editor team. It combines Chromium and Node into a single runtime suitable for building custom desktop web applications that also have access to Node for things that web browsers normally can't do.
[http://maxogden.com/electron-fundamentals.html]

_GENERIC:
* Desktop-javascript#ql:idLjd#

Ljel'Archetype

name::
* McsEngl.Ljel'Archetype@cptIt,

Ljel'Model (algo)

name::
* McsEngl.Ljel'Model (algo)@cptIt,

Ljelalgo'UNIT

name::
* McsEngl.Ljelalgo'UNIT@cptIt,

Ljelalgo'WORD

name::
* McsEngl.Ljelalgo'WORD@cptIt,

Ljelalgo'NAME

_CREATED: {2016-08-28}

name::
* McsEngl.Ljelalgo'NAME@cptIt,
* McsEngl.Ljel'semantic-unit@cptIt,

Ljelalgo'name.MODULE.CORE.NO

name::
* McsEngl.Ljelalgo'name.MODULE.CORE.NO@cptIt,

Ljelmdl.electron-config

name::
* McsEngl.Ljelmdl.electron-config@cptIt,

_DESCRIPTION:
Electron Config is a module that permits simple storage and fetching of user data as a JSON file in a simple way - with eight total commands. From prototyping an idea to large-scale applications, this is an instant configuration tool that’s quick and easy to learn.
[https://nodesource.com/blog/fifteen-essential-packages-to-get-started-with-electron/]

_ADDRESS.WPG:
* https://github.com/sindresorhus/electron-config,

Ljelalgo'name.API (Ljelapi)

name::
* McsEngl.Ljelalgo'name.API (Ljelapi)@cptIt,
* McsEngl.Ljelapi@cptIt,

_DESCRIPTION:
Electron apps require is already defined along with process and all of the other Node globals as well as window, document and all of the browser globals. Again, this is because Electron combines a Node JS context with a Chromium JS context. Anything you can do in Node and/or Chromium you can do in Electron.
[http://maxogden.com/electron-fundamentals.html]

Ljelapi'global

name::
* McsEngl.Ljelapi'global@cptIt,
* McsEngl.Ljel-global-object@cptIt,
* McsEngl.Ljel-oglobal@cptIt,

//Ljel-1.6.11 from main.js
//console.log(Object.getOwnPropertyNames(global).sort())
[ 'Array', 'ArrayBuffer', 'Boolean', 'Buffer', 'ByteLengthQueuingStrategy', 'CountQueuingStrategy', 'DataView', 'Date', 'Error', 'EvalError', 'Float32Array', 'Float64Array', 'Function', 'GLOBAL', 'Infinity', 'Int16Array', 'Int32Array', 'Int8Array', 'Intl', 'JSON', 'Map', 'Math', 'NaN', 'Number', 'Object', 'Promise', 'Proxy', 'RangeError', 'ReadableStream', 'ReferenceError', 'Reflect', 'RegExp', 'Set', 'String', 'Symbol', 'SyntaxError', 'TypeError', 'URIError', 'Uint16Array', 'Uint32Array', 'Uint8Array', 'Uint8ClampedArray', 'WeakMap', 'WeakSet', 'clearImmediate', 'clearInterval', 'clearTimeout', 'console', 'decodeURI', 'decodeURIComponent', 'encodeURI', 'encodeURIComponent', 'escape', 'eval', 'global', 'isFinite', 'isNaN', 'parseFloat', 'parseInt', 'process', 'root', 'setImmediate', 'setInterval', 'setTimeout', 'undefined', 'unescape' ]

Object.getOwnPropertyNames(global).sort()
Array[714]
0 "Ljel'AnalyserNode", 1 "Ljel'AnimationEvent", 2 "Ljel'AppBannerPromptResult", 3 "Ljel'ApplicationCache", 4 "Ljel'ApplicationCacheErrorEvent", 5 "Ljel'Array", 6 "Ljel'ArrayBuffer", 7 "Ljel'Attr", 8 "Ljel'Audio", 9 "Ljel'AudioBuffer", 10 "Ljel'AudioBufferSourceNode", 11 "Ljel'AudioContext", 12 "Ljel'AudioDestinationNode", 13 "Ljel'AudioListener", 14 "Ljel'AudioNode", 15 "Ljel'AudioParam", 16 "Ljel'AudioProcessingEvent", 17 "Ljel'BarProp", 18 "Ljel'BatteryManager", 19 "Ljel'BeforeInstallPromptEvent", 20 "Ljel'BeforeUnloadEvent", 21 "Ljel'BiquadFilterNode", 22 "Ljel'Blob", 23 "Ljel'BlobEvent", 24 "Ljel'Boolean", 25 "Ljel'Buffer", 26 "Ljel'ByteLengthQueuingStrategy", 27 "Ljel'CDATASection", 28 "Ljel'CSS", 29 "Ljel'CSSFontFaceRule", 30 "Ljel'CSSGroupingRule", 31 "Ljel'CSSImportRule", 32 "Ljel'CSSKeyframeRule", 33 "Ljel'CSSKeyframesRule", 34 "Ljel'CSSMediaRule", 35 "Ljel'CSSNamespaceRule", 36 "Ljel'CSSPageRule", 37 "Ljel'CSSRule", 38 "Ljel'CSSRuleList", 39 "Ljel'CSSStyleDeclaration", 40 "Ljel'CSSStyleRule", 41 "Ljel'CSSStyleSheet", 42 "Ljel'CSSSupportsRule", 43 "Ljel'CSSViewportRule", 44 "Ljel'Cache", 45 "Ljel'CacheStorage", 46 "Ljel'CanvasCaptureMediaStreamTrack", 47 "Ljel'CanvasGradient", 48 "Ljel'CanvasPattern", 49 "Ljel'CanvasRenderingContext2D", 50 "Ljel'ChannelMergerNode", 51 "Ljel'ChannelSplitterNode", 52 "Ljel'CharacterData", 53 "Ljel'ClientRect", 54 "Ljel'ClientRectList", 55 "Ljel'ClipboardEvent", 56 "Ljel'CloseEvent", 57 "Ljel'Comment", 58 "Ljel'CompositionEvent", 59 "Ljel'ConvolverNode", 60 "Ljel'CountQueuingStrategy", 61 "Ljel'Credential", 62 "Ljel'CredentialsContainer", 63 "Ljel'Crypto", 64 "Ljel'CryptoKey", 65 "Ljel'CustomEvent", 66 "Ljel'DOMError", 67 "Ljel'DOMException", 68 "Ljel'DOMImplementation", 69 "Ljel'DOMParser", 70 "Ljel'DOMStringList", 71 "Ljel'DOMStringMap", 72 "Ljel'DOMTokenList", 73 "Ljel'DataTransfer", 74 "Ljel'DataTransferItem", 75 "Ljel'DataTransferItemList", 76 "Ljel'DataView", 77 "Ljel'Date", 78 "Ljel'DelayNode", 79 "Ljel'DeviceMotionEvent", 80 "Ljel'DeviceOrientationEvent", 81 "Ljel'Document", 82 "Ljel'DocumentFragment", 83 "Ljel'DocumentType", 84 "Ljel'DragEvent", 85 "Ljel'DynamicsCompressorNode", 86 "Ljel'Element", 87 "Ljel'Error", 88 "Ljel'ErrorEvent", 89 "Ljel'EvalError", 90 "Ljel'Event", 91 "Ljel'EventSource", 92 "Ljel'EventTarget", 93 "Ljel'FederatedCredential", 94 "Ljel'File", 95 "Ljel'FileError", 96 "Ljel'FileList", 97 "Ljel'FileReader", 98 "Ljel'Float32Array", 99 "Ljel'Float64Array",

100 "Ljel'FocusEvent", 101 "Ljel'FontFace", 102 "Ljel'FormData", 103 "Ljel'Function", 104 "Ljel'GLOBAL", 105 "Ljel'GainNode", 106 "Ljel'Gamepad", 107 "Ljel'GamepadButton", 108 "Ljel'GamepadEvent", 109 "Ljel'HTMLAllCollection", 110 "Ljel'HTMLAnchorElement", 111 "Ljel'HTMLAreaElement", 112 "Ljel'HTMLAudioElement", 113 "Ljel'HTMLBRElement", 114 "Ljel'HTMLBaseElement", 115 "Ljel'HTMLBodyElement", 116 "Ljel'HTMLButtonElement", 117 "Ljel'HTMLCanvasElement", 118 "Ljel'HTMLCollection", 119 "Ljel'HTMLContentElement", 120 "Ljel'HTMLDListElement", 121 "Ljel'HTMLDataListElement", 122 "Ljel'HTMLDetailsElement", 123 "Ljel'HTMLDialogElement", 124 "Ljel'HTMLDirectoryElement", 125 "Ljel'HTMLDivElement", 126 "Ljel'HTMLDocument", 127 "Ljel'HTMLElement", 128 "Ljel'HTMLEmbedElement", 129 "Ljel'HTMLFieldSetElement", 130 "Ljel'HTMLFontElement", 131 "Ljel'HTMLFormControlsCollection", 132 "Ljel'HTMLFormElement", 133 "Ljel'HTMLFrameElement", 134 "Ljel'HTMLFrameSetElement", 135 "Ljel'HTMLHRElement", 136 "Ljel'HTMLHeadElement", 137 "Ljel'HTMLHeadingElement", 138 "Ljel'HTMLHtmlElement", 139 "Ljel'HTMLIFrameElement", 140 "Ljel'HTMLImageElement", 141 "Ljel'HTMLInputElement", 142 "Ljel'HTMLKeygenElement", 143 "Ljel'HTMLLIElement", 144 "Ljel'HTMLLabelElement", 145 "Ljel'HTMLLegendElement", 146 "Ljel'HTMLLinkElement", 147 "Ljel'HTMLMapElement", 148 "Ljel'HTMLMarqueeElement", 149 "Ljel'HTMLMediaElement", 150 "Ljel'HTMLMenuElement", 151 "Ljel'HTMLMetaElement", 152 "Ljel'HTMLMeterElement", 153 "Ljel'HTMLModElement", 154 "Ljel'HTMLOListElement", 155 "Ljel'HTMLObjectElement", 156 "Ljel'HTMLOptGroupElement", 157 "Ljel'HTMLOptionElement", 158 "Ljel'HTMLOptionsCollection", 159 "Ljel'HTMLOutputElement", 160 "Ljel'HTMLParagraphElement", 161 "Ljel'HTMLParamElement", 162 "Ljel'HTMLPictureElement", 163 "Ljel'HTMLPreElement", 164 "Ljel'HTMLProgressElement", 165 "Ljel'HTMLQuoteElement", 166 "Ljel'HTMLScriptElement", 167 "Ljel'HTMLSelectElement", 168 "Ljel'HTMLShadowElement", 169 "Ljel'HTMLSourceElement", 170 "Ljel'HTMLSpanElement", 171 "Ljel'HTMLStyleElement", 172 "Ljel'HTMLTableCaptionElement", 173 "Ljel'HTMLTableCellElement", 174 "Ljel'HTMLTableColElement", 175 "Ljel'HTMLTableElement", 176 "Ljel'HTMLTableRowElement", 177 "Ljel'HTMLTableSectionElement", 178 "Ljel'HTMLTemplateElement", 179 "Ljel'HTMLTextAreaElement", 180 "Ljel'HTMLTitleElement", 181 "Ljel'HTMLTrackElement", 182 "Ljel'HTMLUListElement", 183 "Ljel'HTMLUnknownElement", 184 "Ljel'HTMLVideoElement", 185 "Ljel'HashChangeEvent", 186 "Ljel'Headers", 187 "Ljel'History", 188 "Ljel'IDBCursor", 189 "Ljel'IDBCursorWithValue", 190 "Ljel'IDBDatabase", 191 "Ljel'IDBFactory", 192 "Ljel'IDBIndex", 193 "Ljel'IDBKeyRange", 194 "Ljel'IDBObjectStore", 195 "Ljel'IDBOpenDBRequest", 196 "Ljel'IDBRequest", 197 "Ljel'IDBTransaction", 198 "Ljel'IDBVersionChangeEvent", 199 "Ljel'IIRFilterNode",

200 "Ljel'IdleDeadline", 201 "Ljel'Image", 202 "Ljel'ImageBitmap", 203 "Ljel'ImageData", 204 "Ljel'Infinity", 205 "Ljel'InputDeviceCapabilities", 206 "Ljel'Int16Array", 207 "Ljel'Int32Array", 208 "Ljel'Int8Array", 209 "Ljel'IntersectionObserver", 210 "Ljel'IntersectionObserverEntry", 211 "Ljel'Intl", 212 "Ljel'JSON", 213 "Ljel'KeyboardEvent", 214 "Ljel'Location", 215 "Ljel'MIDIAccess", 216 "Ljel'MIDIConnectionEvent", 217 "Ljel'MIDIInput", 218 "Ljel'MIDIInputMap", 219 "Ljel'MIDIMessageEvent", 220 "Ljel'MIDIOutput", 221 "Ljel'MIDIOutputMap", 222 "Ljel'MIDIPort", 223 "Ljel'Map", 224 "Ljel'Math", 225 "Ljel'MediaDevices", 226 "Ljel'MediaElementAudioSourceNode", 227 "Ljel'MediaEncryptedEvent", 228 "Ljel'MediaError", 229 "Ljel'MediaKeyMessageEvent", 230 "Ljel'MediaKeySession", 231 "Ljel'MediaKeyStatusMap", 232 "Ljel'MediaKeySystemAccess", 233 "Ljel'MediaKeys", 234 "Ljel'MediaList", 235 "Ljel'MediaQueryList", 236 "Ljel'MediaQueryListEvent", 237 "Ljel'MediaRecorder", 238 "Ljel'MediaSource", 239 "Ljel'MediaStreamAudioDestinationNode", 240 "Ljel'MediaStreamAudioSourceNode", 241 "Ljel'MediaStreamEvent", 242 "Ljel'MediaStreamTrack", 243 "Ljel'MessageChannel", 244 "Ljel'MessageEvent", 245 "Ljel'MessagePort", 246 "Ljel'MimeType", 247 "Ljel'MimeTypeArray", 248 "Ljel'MouseEvent", 249 "Ljel'MutationEvent", 250 "Ljel'MutationObserver", 251 "Ljel'MutationRecord", 252 "Ljel'NaN", 253 "Ljel'NamedNodeMap", 254 "Ljel'Navigator", 255 "Ljel'Node", 256 "Ljel'NodeFilter", 257 "Ljel'NodeIterator", 258 "Ljel'NodeList", 259 "Ljel'Notification", 260 "Ljel'Number", 261 "Ljel'Object", 262 "Ljel'OfflineAudioCompletionEvent", 263 "Ljel'OfflineAudioContext", 264 "Ljel'Option", 265 "Ljel'OscillatorNode", 266 "Ljel'PageTransitionEvent", 267 "Ljel'PasswordCredential", 268 "Ljel'Path2D", 269 "Ljel'Performance", 270 "Ljel'PerformanceEntry", 271 "Ljel'PerformanceMark", 272 "Ljel'PerformanceMeasure", 273 "Ljel'PerformanceNavigation", 274 "Ljel'PerformanceObserver", 275 "Ljel'PerformanceObserverEntryList", 276 "Ljel'PerformanceResourceTiming", 277 "Ljel'PerformanceTiming", 278 "Ljel'PeriodicWave", 279 "Ljel'PermissionStatus", 280 "Ljel'Permissions", 281 "Ljel'Plugin", 282 "Ljel'PluginArray", 283 "Ljel'PopStateEvent", 284 "Ljel'Presentation", 285 "Ljel'PresentationAvailability", 286 "Ljel'PresentationConnection", 287 "Ljel'PresentationConnectionAvailableEvent", 288 "Ljel'PresentationConnectionCloseEvent", 289 "Ljel'PresentationRequest", 290 "Ljel'ProcessingInstruction", 291 "Ljel'ProgressEvent", 292 "Ljel'Promise", 293 "Ljel'PromiseRejectionEvent", 294 "Ljel'Proxy", 295 "Ljel'PushManager", 296 "Ljel'PushSubscription", 297 "Ljel'RTCCertificate", 298 "Ljel'RTCIceCandidate", 299 "Ljel'RTCSessionDescription",

300 "Ljel'RadioNodeList", 301 "Ljel'Range", 302 "Ljel'RangeError", 303 "Ljel'ReadableStream", 304 "Ljel'ReferenceError", 305 "Ljel'Reflect", 306 "Ljel'RegExp", 307 "Ljel'Request", 308 "Ljel'Response", 309 "Ljel'SVGAElement", 310 "Ljel'SVGAngle", 311 "Ljel'SVGAnimateElement", 312 "Ljel'SVGAnimateMotionElement", 313 "Ljel'SVGAnimateTransformElement", 314 "Ljel'SVGAnimatedAngle", 315 "Ljel'SVGAnimatedBoolean", 316 "Ljel'SVGAnimatedEnumeration", 317 "Ljel'SVGAnimatedInteger", 318 "Ljel'SVGAnimatedLength", 319 "Ljel'SVGAnimatedLengthList", 320 "Ljel'SVGAnimatedNumber", 321 "Ljel'SVGAnimatedNumberList", 322 "Ljel'SVGAnimatedPreserveAspectRatio", 323 "Ljel'SVGAnimatedRect", 324 "Ljel'SVGAnimatedString", 325 "Ljel'SVGAnimatedTransformList", 326 "Ljel'SVGAnimationElement", 327 "Ljel'SVGCircleElement", 328 "Ljel'SVGClipPathElement", 329 "Ljel'SVGComponentTransferFunctionElement", 330 "Ljel'SVGCursorElement", 331 "Ljel'SVGDefsElement", 332 "Ljel'SVGDescElement", 333 "Ljel'SVGDiscardElement", 334 "Ljel'SVGElement", 335 "Ljel'SVGEllipseElement", 336 "Ljel'SVGFEBlendElement", 337 "Ljel'SVGFEColorMatrixElement", 338 "Ljel'SVGFEComponentTransferElement", 339 "Ljel'SVGFECompositeElement", 340 "Ljel'SVGFEConvolveMatrixElement", 341 "Ljel'SVGFEDiffuseLightingElement", 342 "Ljel'SVGFEDisplacementMapElement", 343 "Ljel'SVGFEDistantLightElement", 344 "Ljel'SVGFEDropShadowElement", 345 "Ljel'SVGFEFloodElement", 346 "Ljel'SVGFEFuncAElement", 347 "Ljel'SVGFEFuncBElement", 348 "Ljel'SVGFEFuncGElement", 349 "Ljel'SVGFEFuncRElement", 350 "Ljel'SVGFEGaussianBlurElement", 351 "Ljel'SVGFEImageElement", 352 "Ljel'SVGFEMergeElement", 353 "Ljel'SVGFEMergeNodeElement", 354 "Ljel'SVGFEMorphologyElement", 355 "Ljel'SVGFEOffsetElement", 356 "Ljel'SVGFEPointLightElement", 357 "Ljel'SVGFESpecularLightingElement", 358 "Ljel'SVGFESpotLightElement", 359 "Ljel'SVGFETileElement", 360 "Ljel'SVGFETurbulenceElement", 361 "Ljel'SVGFilterElement", 362 "Ljel'SVGForeignObjectElement", 363 "Ljel'SVGGElement", 364 "Ljel'SVGGeometryElement", 365 "Ljel'SVGGradientElement", 366 "Ljel'SVGGraphicsElement", 367 "Ljel'SVGImageElement", 368 "Ljel'SVGLength", 369 "Ljel'SVGLengthList", 370 "Ljel'SVGLineElement", 371 "Ljel'SVGLinearGradientElement", 372 "Ljel'SVGMPathElement", 373 "Ljel'SVGMarkerElement", 374 "Ljel'SVGMaskElement", 375 "Ljel'SVGMatrix", 376 "Ljel'SVGMetadataElement", 377 "Ljel'SVGNumber", 378 "Ljel'SVGNumberList", 379 "Ljel'SVGPathElement", 380 "Ljel'SVGPatternElement", 381 "Ljel'SVGPoint", 382 "Ljel'SVGPointList", 383 "Ljel'SVGPolygonElement", 384 "Ljel'SVGPolylineElement", 385 "Ljel'SVGPreserveAspectRatio", 386 "Ljel'SVGRadialGradientElement", 387 "Ljel'SVGRect", 388 "Ljel'SVGRectElement", 389 "Ljel'SVGSVGElement", 390 "Ljel'SVGScriptElement", 391 "Ljel'SVGSetElement", 392 "Ljel'SVGStopElement", 393 "Ljel'SVGStringList", 394 "Ljel'SVGStyleElement", 395 "Ljel'SVGSwitchElement", 396 "Ljel'SVGSymbolElement", 397 "Ljel'SVGTSpanElement", 398 "Ljel'SVGTextContentElement", 399 "Ljel'SVGTextElement",

400 "Ljel'SVGTextPathElement", 401 "Ljel'SVGTextPositioningElement", 402 "Ljel'SVGTitleElement", 403 "Ljel'SVGTransform", 404 "Ljel'SVGTransformList", 405 "Ljel'SVGUnitTypes", 406 "Ljel'SVGUseElement", 407 "Ljel'SVGViewElement", 408 "Ljel'SVGViewSpec", 409 "Ljel'SVGZoomEvent", 410 "Ljel'Screen", 411 "Ljel'ScreenOrientation", 412 "Ljel'ScriptProcessorNode", 413 "Ljel'SecurityPolicyViolationEvent", 414 "Ljel'Selection", 415 "Ljel'ServiceWorker", 416 "Ljel'ServiceWorkerContainer", 417 "Ljel'ServiceWorkerMessageEvent", 418 "Ljel'ServiceWorkerRegistration", 419 "Ljel'Set", 420 "Ljel'ShadowRoot", 421 "Ljel'SharedWorker", 422 "Ljel'SiteBoundCredential", 423 "Ljel'SourceBuffer", 424 "Ljel'SourceBufferList", 425 "Ljel'SpeechSynthesisEvent", 426 "Ljel'SpeechSynthesisUtterance", 427 "Ljel'Storage", 428 "Ljel'StorageEvent", 429 "Ljel'String", 430 "Ljel'StyleSheet", 431 "Ljel'StyleSheetList", 432 "Ljel'SubtleCrypto", 433 "Ljel'Symbol", 434 "Ljel'SyncManager", 435 "Ljel'SyntaxError", 436 "Ljel'Text", 437 "Ljel'TextDecoder", 438 "Ljel'TextEncoder", 439 "Ljel'TextEvent", 440 "Ljel'TextMetrics", 441 "Ljel'TextTrack", 442 "Ljel'TextTrackCue", 443 "Ljel'TextTrackCueList", 444 "Ljel'TextTrackList", 445 "Ljel'TimeRanges", 446 "Ljel'Touch", 447 "Ljel'TouchEvent", 448 "Ljel'TouchList", 449 "Ljel'TrackEvent", 450 "Ljel'TransitionEvent", 451 "Ljel'TreeWalker", 452 "Ljel'TypeError", 453 "Ljel'UIEvent", 454 "Ljel'URIError", 455 "Ljel'URL", 456 "Ljel'URLSearchParams", 457 "Ljel'Uint16Array", 458 "Ljel'Uint32Array", 459 "Ljel'Uint8Array", 460 "Ljel'Uint8ClampedArray", 461 "Ljel'VTTCue", 462 "Ljel'ValidityState", 463 "Ljel'WaveShaperNode", 464 "Ljel'WeakMap", 465 "Ljel'WeakSet", 466 "Ljel'WebGLActiveInfo", 467 "Ljel'WebGLBuffer", 468 "Ljel'WebGLContextEvent", 469 "Ljel'WebGLFramebuffer", 470 "Ljel'WebGLProgram", 471 "Ljel'WebGLRenderbuffer", 472 "Ljel'WebGLRenderingContext", 473 "Ljel'WebGLShader", 474 "Ljel'WebGLShaderPrecisionFormat", 475 "Ljel'WebGLTexture", 476 "Ljel'WebGLUniformLocation", 477 "Ljel'WebKitAnimationEvent", 478 "Ljel'WebKitCSSMatrix", 479 "Ljel'WebKitMutationObserver", 480 "Ljel'WebKitTransitionEvent", 481 "Ljel'WebSocket", 482 "Ljel'WebView", 483 "Ljel'WheelEvent", 484 "Ljel'Window", 485 "Ljel'Worker", 486 "Ljel'XMLDocument", 487 "Ljel'XMLHttpRequest", 488 "Ljel'XMLHttpRequestEventTarget", 489 "Ljel'XMLHttpRequestUpload", 490 "Ljel'XMLSerializer", 491 "Ljel'XPathEvaluator", 492 "Ljel'XPathExpression", 493 "Ljel'XPathResult", 494 "Ljel'XSLTProcessor", 495 "Ljel'__dirname", 496 "Ljel'__filename", 497 "Ljel'alert", 498 "Ljel'applicationCache", 499 "Ljel'atob",

500 "Ljel'blur", 501 "Ljel'btoa", 502 "Ljel'caches", 503 "Ljel'cancelAnimationFrame", 504 "Ljel'cancelIdleCallback", 505 "Ljel'captureEvents", 506 "Ljel'clearImmediate", 507 "Ljel'clearInterval", 508 "Ljel'clearTimeout", 509 "Ljel'clientInformation", 510 "Ljel'close", 511 "Ljel'closed", 512 "Ljel'confirm", 513 "Ljel'console", 514 "Ljel'createImageBitmap", 515 "Ljel'crypto", 516 "Ljel'decodeURI", 517 "Ljel'decodeURIComponent", 518 "Ljel'defaultStatus", 519 "Ljel'defaultstatus", 520 "Ljel'devicePixelRatio", 521 "Ljel'document", 522 "Ljel'encodeURI", 523 "Ljel'encodeURIComponent", 524 "Ljel'escape", 525 "Ljel'eval", 526 "Ljel'event", 527 "Ljel'fetch", 528 "Ljel'find", 529 "Ljel'focus", 530 "Ljel'frameElement", 531 "Ljel'frames", 532 "Ljel'getComputedStyle", 533 "Ljel'getMatchedCSSRules", 534 "Ljel'getSelection", 535 "Ljel'global", 536 "Ljel'history", 537 "Ljel'indexedDB", 538 "Ljel'innerHeight", 539 "Ljel'innerWidth", 540 "Ljel'isFinite", 541 "Ljel'isNaN", 542 "Ljel'isSecureContext", 543 "Ljel'length", 544 "Ljel'localStorage", 545 "Ljel'location", 546 "Ljel'locationbar", 547 "Ljel'matchMedia", 548 "Ljel'menubar", 549 "Ljel'module", 550 "Ljel'moveBy", 551 "Ljel'moveTo", 552 "Ljel'name", 553 "Ljel'navigator", 554 "Ljel'offscreenBuffering", 555 "Ljel'onabort", 556 "Ljel'onanimationend", 557 "Ljel'onanimationiteration", 558 "Ljel'onanimationstart", 559 "Ljel'onbeforeunload", 560 "Ljel'onblur", 561 "Ljel'oncancel", 562 "Ljel'oncanplay", 563 "Ljel'oncanplaythrough", 564 "Ljel'onchange", 565 "Ljel'onclick", 566 "Ljel'onclose", 567 "Ljel'oncontextmenu", 568 "Ljel'oncuechange", 569 "Ljel'ondblclick", 570 "Ljel'ondevicemotion", 571 "Ljel'ondeviceorientation", 572 "Ljel'ondeviceorientationabsolute", 573 "Ljel'ondrag", 574 "Ljel'ondragend", 575 "Ljel'ondragenter", 576 "Ljel'ondragleave", 577 "Ljel'ondragover", 578 "Ljel'ondragstart", 579 "Ljel'ondrop", 580 "Ljel'ondurationchange", 581 "Ljel'onemptied", 582 "Ljel'onended", 583 "Ljel'onerror", 584 "Ljel'onfocus", 585 "Ljel'onhashchange", 586 "Ljel'oninput", 587 "Ljel'oninvalid", 588 "Ljel'onkeydown", 589 "Ljel'onkeypress", 590 "Ljel'onkeyup", 591 "Ljel'onlanguagechange", 592 "Ljel'onload", 593 "Ljel'onloadeddata", 594 "Ljel'onloadedmetadata", 595 "Ljel'onloadstart", 596 "Ljel'onmessage", 597 "Ljel'onmousedown", 598 "Ljel'onmouseenter", 599 "Ljel'onmouseleave",

600 "Ljel'onmousemove", 601 "Ljel'onmouseout", 602 "Ljel'onmouseover", 603 "Ljel'onmouseup", 604 "Ljel'onmousewheel", 605 "Ljel'onoffline", 606 "Ljel'ononline", 607 "Ljel'onpagehide", 608 "Ljel'onpageshow", 609 "Ljel'onpause", 610 "Ljel'onplay", 611 "Ljel'onplaying", 612 "Ljel'onpopstate", 613 "Ljel'onprogress", 614 "Ljel'onratechange", 615 "Ljel'onrejectionhandled", 616 "Ljel'onreset", 617 "Ljel'onresize", 618 "Ljel'onscroll", 619 "Ljel'onsearch", 620 "Ljel'onseeked", 621 "Ljel'onseeking", 622 "Ljel'onselect", 623 "Ljel'onshow", 624 "Ljel'onstalled", 625 "Ljel'onstorage", 626 "Ljel'onsubmit", 627 "Ljel'onsuspend", 628 "Ljel'ontimeupdate", 629 "Ljel'ontoggle", 630 "Ljel'ontransitionend", 631 "Ljel'onunhandledrejection", 632 "Ljel'onunload", 633 "Ljel'onvolumechange", 634 "Ljel'onwaiting", 635 "Ljel'onwebkitanimationend", 636 "Ljel'onwebkitanimationiteration", 637 "Ljel'onwebkitanimationstart", 638 "Ljel'onwebkittransitionend", 639 "Ljel'onwheel", 640 "Ljel'open", 641 "Ljel'openDatabase", 642 "Ljel'opener", 643 "Ljel'outerHeight", 644 "Ljel'outerWidth", 645 "Ljel'pageXOffset", 646 "Ljel'pageYOffset", 647 "Ljel'parent", 648 "Ljel'parseFloat", 649 "Ljel'parseInt", 650 "Ljel'performance", 651 "Ljel'personalbar", 652 "Ljel'postMessage", 653 "Ljel'print", 654 "Ljel'process", 655 "Ljel'prompt", 656 "Ljel'releaseEvents", 657 "Ljel'requestAnimationFrame", 658 "Ljel'requestIdleCallback", 659 "Ljel'require", 660 "Ljel'resizeBy", 661 "Ljel'resizeTo", 662 "Ljel'root", 663 "Ljel'screen", 664 "Ljel'screenLeft", 665 "Ljel'screenTop", 666 "Ljel'screenX", 667 "Ljel'screenY", 668 "Ljel'scroll", 669 "Ljel'scrollBy", 670 "Ljel'scrollTo", 671 "Ljel'scrollX", 672 "Ljel'scrollY", 673 "Ljel'scrollbars", 674 "Ljel'self", 675 "Ljel'sessionStorage", 676 "Ljel'setImmediate", 677 "Ljel'setInterval", 678 "Ljel'setTimeout", 679 "Ljel'speechSynthesis", 680 "Ljel'status", 681 "Ljel'statusbar", 682 "Ljel'stop", 683 "Ljel'styleMedia", 684 "Ljel'toolbar", 685 "Ljel'top", 686 "Ljel'undefined", 687 "Ljel'unescape", 688 "Ljel'webkitAudioContext", 689 "Ljel'webkitCancelAnimationFrame", 690 "Ljel'webkitCancelRequestAnimationFrame", 691 "Ljel'webkitIDBCursor", 692 "Ljel'webkitIDBDatabase", 693 "Ljel'webkitIDBFactory", 694 "Ljel'webkitIDBIndex", 695 "Ljel'webkitIDBKeyRange", 696 "Ljel'webkitIDBObjectStore", 697 "Ljel'webkitIDBRequest", 698 "Ljel'webkitIDBTransaction", 699 "Ljel'webkitIndexedDB",

700 "Ljel'webkitMediaStream", 701 "Ljel'webkitOfflineAudioContext", 702 "Ljel'webkitRTCPeerConnection", 703 "Ljel'webkitRequestAnimationFrame", 704 "Ljel'webkitRequestFileSystem", 705 "Ljel'webkitResolveLocalFileSystemURL", 706 "Ljel'webkitSpeechGrammar", 707 "Ljel'webkitSpeechGrammarList", 708 "Ljel'webkitSpeechRecognition", 709 "Ljel'webkitSpeechRecognitionError", 710 "Ljel'webkitSpeechRecognitionEvent", 711 "Ljel'webkitStorageInfo", 712 "Ljel'webkitURL", 713 "Ljel'window"
length: 714

Ljelapi'electron-object

name::
* McsEngl.Ljelapi'electron-object@cptIt,
* McsEngl.Ljel-electron-object@cptIt,
* McsEngl.Ljel-oElectron@cptIt,

_MEMBER:
> const electron = require('electron')
> Object.getOwnPropertyNames(electron).sort()
["CallbacksRegistry", "clipboard", "crashReporter", "deprecate", "deprecations", "desktopCapturer", "ipcRenderer", "isPromise", "nativeImage", "remote", "screen", "shell", "webFrame"]
> Object.getOwnPropertyNames(electron.__proto__)
["__defineGetter__", "__defineSetter__", "hasOwnProperty", "__lookupGetter__", "__lookupSetter__", "constructor", "toString", "toLocaleString", "valueOf", "isPrototypeOf", "propertyIsEnumerable", "__proto__"]

Ljelapi'electron.remote

name::
* McsEngl.Ljelapi'electron.remote@cptIt,

_MEMBER:
// Object.getOwnPropertyNames(electron.remote).sort()
["BrowserWindow", "CallbacksRegistry", "Menu", "MenuItem", "NavigationController", "Tray", "app", "autoUpdater", "clipboard", "contentTracing", "crashReporter", "createFunctionWithReturnValue", "deprecate", "deprecations", "dialog", "getBuiltin", "getCurrentWebContents", "getCurrentWindow", "getGlobal", "getGuestWebContents", "globalShortcut", "ipcMain", "isPromise", "nativeImage", "powerMonitor", "powerSaveBlocker", "process", "protocol", "require", "screen", "session", "shell", "systemPreferences", "webContents"]

Ljel-api'electron.remote.app

name::
* McsEngl.Ljel-api'electron.remote.app@cptIt,
* McsEngl.Ljel-app@cptIt,

app.getVersion()

app.on('ready', () => {
win = new BrowserWindow({width: 800, height: 600})
win.loadURL('https://github.com')
})

Ljelapi'electron.remote.BrowserWindow-function

name::
* McsEngl.Ljelapi'electron.remote.BrowserWindow-function@cptIt,
* McsEngl.Ljel'BrowserWindow@cptIt,
* McsEngl.Ljel-BrowserWindow@cptIt,

_DESCRIPTION:
Create and control browser windows.
// In the main process.
const {BrowserWindow} = require('electron')

// Or use `remote` from the renderer process.
// const {BrowserWindow} = require('electron').remote

let win = new BrowserWindow({width: 800, height: 600})
win.on('closed', () => {
win = null
})

// Load a remote URL
win.loadURL('https://github.com')

// Or load a local HTML file
win.loadURL(`file://${__dirname}/app/index.html`)
[http://electron.atom.io/docs/api/browser-window/]

_MEMBER:
// Object.getOwnPropertyNames(electron.remote.BrowserWindow).sort()
["addDevToolsExtension", "fromDevToolsWebContents", "fromId", "fromWebContents", "getAllWindows", "getDevToolsExtensions", "getFocusedWindow", "length", "name", "prototype", "removeDevToolsExtension"]

Ljelapi'module-object

name::
* McsEngl.Ljelapi'module-object@cptIt,

_MEMBER:
// Object.getOwnPropertyNames(module).sort()
["children", "exports", "filename", "id", "loaded", "parent", "paths"]
// Object.getOwnPropertyNames(module.__proto__).sort()
["_compile", "constructor", "load", "require"]
// Object.getOwnPropertyNames(module.__proto__.__proto__).sort()["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljelapi'process-object

name::
* McsEngl.Ljelapi'process-object@cptIt,

_MEMBER:
// Object.getOwnPropertyNames(process).sort()
["EventEmitter", "NativeModule", "_debugEnd", "_debugPause", "_debugProcess", "_events", "_eventsCount", "_exiting", "_fatalException", "_getActiveHandles", "_getActiveRequests", "_kill", "_linkedBinding", "_maxListeners", "_needImmediateCallback", "_noBrowserGlobals", "_promiseRejectEvent", "_rawDebug", "_setupDomainUse", "_startProfilerIdleNotifier", "_stopProfilerIdleNotifier", "_tickCallback", "_tickDomainCallback", "abort", "activateUvLoop", "arch", "argv", "assert", "atomBinding", "binding", "chdir", "config", "cpuUsage", "crash", "cwd", "debugPort", "dlopen", "domain", "emitWarning", "env", "execArgv", "execPath", "exit", "features", "getProcessMemoryInfo", "getRenderProcessPreferences", "getSystemMemoryInfo", "hang", "helperExecPath", "hrtime", "kill", "log", "mainModule", "memoryUsage", "moduleLoadList", "nextTick", "openStdin", "pid", "platform", "reallyExit", "release", "resourcesPath", "stderr", "stdin", "stdout", "title", "type", "umask", "uptime", "version", "versions"]
// Object.getOwnPropertyNames(process.__proto__).sort()
["constructor"]
// Object.getOwnPropertyNames(process.__proto__.__proto__).sort()
["_events", "_maxListeners", "addListener", "constructor", "domain", "emit", "eventNames", "getMaxListeners", "listenerCount", "listeners", "on", "once", "prependListener", "prependOnceListener", "removeAllListeners", "removeListener", "setMaxListeners"]
// Object.getOwnPropertyNames(process.__proto__.__proto__.__proto__).sort()["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljelalgo'GUI

name::
* McsEngl.Ljelalgo'GUI@cptIt,
* McsEngl.Ljel'gui@cptIt,

Ljelalgo.SECURITY

name::
* McsEngl.Ljelalgo.SECURITY@cptIt,
* McsEngl.electron-security@cptIt,
* McsEngl.elnp@cptIt,
* McsEngl.Ljelapp@cptIt,
* McsEngl.Ljelpgm@cptIt,
* McsEngl.peln@cptIt,

_DESCRIPTION:
When working with Electron, it is important to understand that Electron is not a web browser. It allows you to build feature-rich desktop applications with familiar web technologies, but your code wields much greater power. JavaScript can access the filesystem, user shell, and more. This allows you to build high quality native applications, but the inherent security risks scale with the additional powers granted to your code.
[http://electron.atom.io/docs/tutorial/security/]

Checklist
This is not bulletproof, but at the least, you should attempt the following:
Only display secure (https) content
Disable the Node integration in all renderers that display remote content (using webPreferences)
Do not disable webSecurity. Disabling it will disable the same-origin policy.
Define a Content-Security-Policy , and use restrictive rules (i.e. script-src 'self')
Override and disable eval , which allows strings to be executed as code.
Do not set allowDisplayingInsecureContent to true.
Do not set allowRunningInsecureContent to true.
Do not enable experimentalFeatures or experimentalCanvasFeatures unless you know what you’re doing.
Do not use blinkFeatures unless you know what you’re doing.
WebViews: Set nodeintegration to false
WebViews: Do not use disablewebsecurity
WebViews: Do not use allowpopups
WebViews: Do not use insertCSS or executeJavaScript with remote CSS/JS.
Again, this list merely minimizes the risk, it does not remove it. If your goal is to display a website, a browser will be a more secure option.
[http://electron.atom.io/docs/tutorial/security/]

Ljelalgo.PROGRAM (Ljel-p)

name::
* McsEngl.Ljelalgo.PROGRAM (Ljel-p)@cptIt,
* McsEngl.electron-app@cptIt,
* McsEngl.electron-program@cptIt,
* McsEngl.Ljel-p@cptIt,
* McsEngl.Ljelapp@cptIt,
* McsEngl.Ljelp@cptIt,
* McsEngl.Ljelpgm@cptIt,
* McsEngl.peln@cptIt,

Ljel-p'Directory

name::
* McsEngl.Ljel-p'Directory@cptIt,

Ljel-p'doing.EXECUTING

name::
* McsEngl.Ljel-p'doing.EXECUTING@cptIt,
* McsEngl.Ljel-p'executing@cptIt,

_DESCRIPTION:
electron path/to/app
===
1) \Users\synagonism\AppData\Roaming\npm\node_modules\electron\dist\electron.exe path-to-your-app
===
2) from app-dir
> npm start
// if "scripts": { "start": "electron ." }, exists in package.json,

Ljel-p'doing.DISTRIBUTING

name::
* McsEngl.Ljel-p'doing.DISTRIBUTING@cptIt,

_DESCRIPTION:
There is one other important thing to do to make your app ready for end users. You need to package it into an executable that can be started with a double click on users' machines. Since Electron apps can work on multiple operating systems and every OS is different, there need to be separate distributions for Windows, for OS X and for Linux
[https://tutorialzine.com/2015/12/creating-your-first-desktop-app-with-html-js-and-electron]
===
To distribute your app with Electron, the folder containing your app should be named app and placed under Electron’s resources directory (on macOS it is Electron.app/Contents/Resources/ and on Linux and Windows it is resources/), like this:

On macOS:
electron/Electron.app/Contents/Resources/app/
+-- package.json
+-- main.js
+-- index.html

On Windows and Linux:
electron/resources/app
+-- package.json
+-- main.js
+-- index.html
Then execute Electron.app (or electron on Linux, electron.exe on Windows), and Electron will start as your app. The electron directory will then be your distribution to deliver to final users.
[http://electron.atom.io/docs/tutorial/application-distribution/]

Ljel-p'doing.PACKAGING

name::
* McsEngl.Ljel-p'doing.PACKAGING@cptIt,

_DESCRIPTION:
To mitigate issues around long path names on Windows, slightly speed up require and conceal your source code from cursory inspection, you can choose to package your app into an asar archive with little changes to your source code.
[http://electron.atom.io/docs/tutorial/application-packaging/]

Ljel-p'doing.PUBLISHING

name::
* McsEngl.Ljel-p'doing.PUBLISHING@cptIt,
* McsEngl.Ljel-p'publishing@cptIt,

_DESCRIPTION:
* github,
* npm-puckage,

_ADDRESS.WPG:
* http://blog.soulserv.net/building-a-package-featuring-electron-as-a-stand-alone-application//

Ljel-p'packaging-tool#ql:leln'tool.packager#

name::
* McsEngl.Ljel-p'packaging-tool@cptIt,

Ljel-p'File

name::
* McsEngl.Ljel-p'File@cptIt,

_SPECIFIC:
* index.html
* main.js
* package.json,

Ljel-pfil.INDEX.HTML

name::
* McsEngl.Ljel-pfil.INDEX.HTML@cptIt,

_EXAMPLE:
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
<title>Hello World!</title>
</head>
<body>
<h1>Hello World!</h1>
<!-- All of the Node.js APIs are available in this renderer process. -->
We are using node <script>document.write(process.versions.node)</script>,
Chromium <script>document.write(process.versions.chrome)</script>,
and Electron <script>document.write(process.versions.electron)</script>.
</body>

<script>
// You can also require other files to run in this process
require('./renderer.js')
</script>
</html>

Ljel-pfil.MAIN.JS

name::
* McsEngl.Ljel-pfil.MAIN.JS@cptIt,
* McsEngl.Ljel-p'main-file@cptIt,

_DESCRIPTION:
Electron takes a main file defined in your package.json file and executes it. main file (usually named main.js)
[https://medium.com/developers-writing/building-a-desktop-application-with-electron-204203eeb658#.ek8b39sxt]

Ljel-pfil.package.json

name::
* McsEngl.Ljel-pfil.package.json@cptIt,
* McsEngl.Ljel-p'package.json-file@cptIt,
* McsEngl.Ljel'package.json@cptIt,
* McsEngl.Ljelpkgjsn@cptIt,

_DESCRIPTION:
The format of package.json is exactly the same as that of Node’s modules, and the script specified by the main field is the startup script of your app, which will run the main process. An example of your package.json might look like this:
{
"name" : "your-app",
"version" : "0.1.0",
"main" : "main.js"
}
Note: If the main field is not present in package.json, Electron will attempt to load an index.js.
[http://electron.atom.io/docs/tutorial/quick-start/#write-your-first-electron-app]
===
Electron takes a main file defined in your package.json file and executes it.
[https://medium.com/developers-writing/building-a-desktop-application-with-electron-204203eeb658#.ek8b39sxt]

Ljel_ppkgjsn.main:
The entry-point of the-program.
===
Note: If the main field is not present in package.json, Electron will attempt to load an index.js.
[http://electron.atom.io/docs/tutorial/quick-start/#write-your-first-electron-app]

Ljel-p'GUI

name::
* McsEngl.Ljel-p'GUI@cptIt,
* McsEngl.Ljel-GUI@cptIt,

Ljel-p'Resource

name::
* McsEngl.Ljel-p'Resource@cptIt,

_ADDRESS.WPG:
* https://blog.avocode.com/blog/4-must-know-tips-for-building-cross-platform-electron-apps,

Ljel-p'Structure

name::
* McsEngl.Ljel-p'Structure@cptIt,

_DESCRIPTION:
Generally, an Electron app is structured like this:
your-app/
+-- package.json
+-- main.js
+-- index.html
[http://electron.atom.io/docs/tutorial/quick-start/#write-your-first-electron-app]

Ljel-p.SPECIFIC

name::
* McsEngl.Ljel-p.SPECIFIC@cptIt,

_SPECIFIC:
* http://electron.atom.io/apps//
* WYSIWYG Markdown Text Editor Desktop Application. https://github.com/timurtu/markup,
* https://www.npmjs.com/package/electron-markdown-editor,
* https://fromscratch.rocks// (note taken)

Ljelalgo.PACKAGE

name::
* McsEngl.Ljelalgo.PACKAGE@cptIt,

Ljel'Human

name::
* McsEngl.Ljel'Human@cptIt,

Cheng_Zhao:
Electron is an open source project written by Cheng Zhao AKA zcbenz, an engineer who works for GitHub in Beijing on the Atom text editor team. It combines Chromium and Node into a single runtime suitable for building custom desktop web applications that also have access to Node for things that web browsers normally can't do.
[http://maxogden.com/electron-fundamentals.html]

Ljel'npm-package

name::
* McsEngl.Ljel'npm-package@cptIt,

_SPECIFIC:
* GLOBAL:
* elementary-electron@1.3.6,

Ljel'Relation-to-nw.js

name::
* McsEngl.Ljel'Relation-to-nw.js@cptIt,

_DESCRIPTION:
Before starting Electron zcbenz contributed heavily to the node-webkit (now called nw.js) project. Electron is conceptually similar to nw.js but has some important technical differences which are explained here. A key difference is that Electron uses Googles Chromium Content Module to bring in Chromium functionality vs nw.js which uses a forked version of Chromium itself.
[http://maxogden.com/electron-fundamentals.html]

Technical Differences Between Electron and NW.js (formerly node-webkit)

Note: Electron was previously named Atom Shell.

Like NW.js, Electron provides a platform to write desktop applications with JavaScript and HTML and has Node integration to grant access to the low level system from web pages.

But there are also fundamental differences between the two projects that make Electron a completely separate product from NW.js:

1. Entry of Application
In NW.js the main entry point of an application is a web page. You specify a main page URL in the package.json and it is opened in a browser window as the application's main window.

In Electron, the entry point is a JavaScript script. Instead of providing a URL directly, you manually create a browser window and load an HTML file using the API. You also need to listen to window events to decide when to quit the application.

Electron works more like the Node.js runtime. Electron's APIs are lower level so you can use it for browser testing in place of PhantomJS.

2. Build System
In order to avoid the complexity of building all of Chromium, Electron uses libchromiumcontent to access Chromium's Content API. libchromiumcontent is a single shared library that includes the Chromium Content module and all of its dependencies. Users don't need a powerful machine to build Electron.

3. Node Integration
In NW.js, the Node integration in web pages requires patching Chromium to work, while in Electron we chose a different way to integrate the libuv loop with each platform's message loop to avoid hacking Chromium. See the node_bindings code for how that was done.

4. Multi-context

If you are an experienced NW.js user, you should be familiar with the concept of Node context and web context. These concepts were invented because of how NW.js was implemented.

By using the multi-context feature of Node, Electron doesn't introduce a new JavaScript context in web pages.

Note: NW.js has optionally supported multi-context since 0.13.
[https://github.com/electron/electron/blob/master/docs/development/atom-shell-vs-node-webkit.md]

Ljel'Tool

name::
* McsEngl.Ljel'Tool@cptIt,

_SPECIFIC:

Ljel'tool.DEBUGGER

name::
* McsEngl.Ljel'tool.DEBUGGER@cptIt,

Ljel'devtron

name::
* McsEngl.Ljel'devtron@cptIt,

_DESCRIPTION:
An Electron DevTools Extension http://electron.atom.io/devtron
[https://github.com/electron/devtron]
===
Electron’s adaption of the Chrome DevTools web inspector and debugger. It has some nice extra, Electron-specific debugging tools added on top of DevTools.

These include a require graph that provides a visual way to understand an Electron app’s dependencies, an IPC monitor that enables tracking of messages sent between the renderer and the main processes of the Electron application, an Event Inspector that displays events and listeners attached to the Electron core APIs, and an App Linter that checks the Electron application for problems and functionality, with suggested code snippets for the problems it encounters.
[https://nodesource.com/blog/fifteen-essential-packages-to-get-started-with-electron/]

Ljel'tool.electron-builder

name::
* McsEngl.Ljel'tool.electron-builder@cptIt,
* McsEngl.electron-builder@cptIt,

_DESCRIPTION:
A complete solution to package and build a ready for distribution Electron app for MacOS, Windows and Linux with "auto update" support out of the box.
[https://github.com/electron-userland/electron-builder]

_ADDRESS.WPG:
* https://github.com/electron-userland/electron-builder,

Ljel'tool.Packager

name::
* McsEngl.Ljel'tool.Packager@cptIt,
* McsEngl.electron-packager@cptIt,

_DESCRIPTION:
Electron Packager is a command line tool and Node.js library that bundles Electron-based application source code with a renamed Electron executable and supporting files into folders ready for distribution.
Note that packaged Electron applications can be relatively large. A zipped barebones OS X Electron application is around 40MB.
[https://github.com/electron-userland/electron-packager]

_DESCRIPTION:
Packaging Your Application
What’s the use of an application which you can’t let people download and use?Packaging

Packaging your application for all platforms is easy using electron-packager. In a nutshell, electron-packager abstracts away all work going into wrapping your app with Electron and generates all platforms for which you’re going to publish.

It can be used as a CLI application or as part of a build process. Building a more complicated build scenario is not in the scope of this article, but we’ll leverage the power ofnpm scripts to make packaging easier. Using electron-packager is trivial, the general form when packaging an application is:

electron-packager <location of project> <name of project> <platform> <architecture> <electron version> <optional options>
Where:
Location of project points to the folder where your project is,
Name of project defines the name of your project,
Platform decides for which platforms to build (all to build for Windows, Mac and Linux),
Architecture decides for which architectures to build (x86 or x64, all for both) and
Electron version lets you choose which Electron version to use.
The first package is going to take a while because all the binaries for all platforms have to be downloaded. Subsequent packages are much faster.

I package the sound machine typically like this (on a Mac):

electron-packager ~/Projects/sound-machine SoundMachine --all --version=0.30.2 --out=~/Desktop --overwrite --icon=~/Projects/sound-machine/app/img/app-icon.icns
The new options included in the command are self-explanatory. To get a nice icon, you’ll first have to convert it to .icns (for Mac) and/or .ico (for Windows). Just search for a tool to convert your PNG file to these formats like this one (be sure to download the file with the .icnsextension and not .hqx). If packaging for Windows from a non-Windows OS, you’ll need wine on your path (Mac users can use brew, while Linux users can use apt-get).

It doesn’t make sense to run that big command every time. We can add another script to ourpackage.json. First of all, install electron-packager as a development dependency:
npm install --save-dev electron-packager
Now we can add a new script to our package.json file:
"scripts": {
"start": "electron .",
"package": "electron-packager ./ SoundMachine --all --out ~/Desktop/SoundMachine --version 0.30.2 --overwrite --icon=./app/img/app-icon.icns"
}
And then run the following in CLI:
npm run-script package
The package command starts the electron-packager, looks in the current directory and build to Desktop. The script should be changed if you are using Windows, but that is trivial.

The sound machine in its current state ends up weighing a whopping 100 MB. Don’t worry, once you archive it (zip or an archive type of your choice), it’ll lose more than half its size.

If you really want to go to town, take a look at electron-builder which takes the packages produced by electron-packager and creates automated installers.
[https://dzone.com/articles/building-a-desktop-application-with-electron#1c2d]

_ADDRESS.WPG:
* https://github.com/electron-userland/electron-packager,

electron-builder

name::
* McsEngl.electron-builder@cptIt,

_DESCRIPTION:
A complete solution to package and build a ready for distribution Electron app for MacOS, Windows and Linux with "auto update" support out of the box.
[https://github.com/electron-userland/electron-builder]
===
Electron Builder is a slightly more complex and complete solution to building and packaging Electron applications.

It includes native Node.js module compilation, code signing on a CI server, auto update ready application packaging, eleven target platforms across Windows, OS X, and Linux, and publishing artifacts for GitHub releases.

Electron Builder provides a wide array of tools to make a highly functional, redistributable desktop applications for target platforms out of a pure Electron application.
[https://nodesource.com/blog/fifteen-essential-packages-to-get-started-with-electron/]

Ljel'tool.TEST

name::
* McsEngl.Ljel'tool.TEST@cptIt,

_ADDRESS.WPG:
* http://electron.atom.io/spectron//

Ljel'tool.RUNTIME (Ljel-rt)

name::
* McsEngl.Ljel'tool.RUNTIME (Ljel-rt)@cptIt,
* McsEngl.electron-runtime@cptIt,
* McsEngl.elnr@cptIt,
* McsEngl.Ljelr@cptIt,
* McsEngl.Ljelrtm@cptIt,

_DESCRIPTION:
Electron is a JavaScript runtime that bundles Node.js and Chromium.
[https://github.com/electron-userland/electron-prebuilt]
===
Electron is a runtime, just like node. This means instead of running node app.js you run electron app.js.
[http://maxogden.com/electron-fundamentals.html]

_GENERIC:
* http://synagonism.net/dMiw/dTchInf/filMcsLjs.html#idLjstolEgn,

Ljel-rt'code'Structure

name::
* McsEngl.Ljel-rt'code'Structure@cptIt,

Structure of Source Code
Electron
+-- atom/ - C++ source code.
| +-- app/ - System entry code.
| +-- browser/ - The frontend including the main window, UI, and all of the
| | main process things. This talks to the renderer to manage web pages.
| | +-- ui/ - Implementation of UI stuff for different platforms.
| | | +-- cocoa/ - Cocoa specific source code.
| | | +-- win/ - Windows GUI specific source code.
| | | +-- x/ - X11 specific source code.
| | +-- api/ - The implementation of the main process APIs.
| | +-- net/ - Network related code.
| | +-- mac/ - Mac specific Objective-C source code.
| | +-- resources/ - Icons, platform-dependent files, etc.
| +-- renderer/ - Code that runs in renderer process.
| | +-- api/ - The implementation of renderer process APIs.
| +-- common/ - Code that used by both the main and renderer processes,
| including some utility functions and code to integrate node's message
| loop into Chromium's message loop.
| +-- api/ - The implementation of common APIs, and foundations of
| Electron's built-in modules.
+-- chromium_src/ - Source code that copied from Chromium.
+-- default_app/ - The default page to show when Electron is started without
| providing an app.
+-- docs/ - Documentations.
+-- lib/ - JavaScript source code.
| +-- browser/ - Javascript main process initialization code.
| | +-- api/ - Javascript API implementation.
| +-- common/ - JavaScript used by both the main and renderer processes
| | +-- api/ - Javascript API implementation.
| +-- renderer/ - Javascript renderer process initialization code.
| +-- api/ - Javascript API implementation.
+-- spec/ - Automatic tests.
+-- electron.gyp - Building rules of Electron.
+-- common.gypi - Compiler specific settings and building rules for other
components like `node` and `breakpad`.
[http://electron.atom.io/docs/development/source-code-directory-structure/]

Ljel-rt'dependencies

name::
* McsEngl.Ljel-rt'dependencies@cptIt,

+-- electron@1.3.5
| +-- electron-download@2.1.2
| | +-- debug@2.2.0
| | | `-- ms@0.7.1
| | +-- home-path@1.0.3
| | +-- minimist@1.2.0
| | +-- mkdirp@0.5.1
| | | `-- minimist@0.0.8
| | +-- mv@2.1.1
| | | +-- ncp@2.0.0
| | | `-- rimraf@2.4.5
| | | `-- glob@6.0.4
| | | +-- inflight@1.0.5
| | | | `-- wrappy@1.0.2
| | | +-- minimatch@3.0.3
| | | | `-- brace-expansion@1.1.6
| | | | +-- balanced-match@0.4.2
| | | | `-- concat-map@0.0.1
| | | +-- once@1.4.0
| | | `-- path-is-absolute@1.0.0
| | +-- nugget@1.6.2
| | | +-- pretty-bytes@1.0.4
| | | | +-- get-stdin@4.0.1
| | | | `-- meow@3.7.0
| | | | +-- camelcase-keys@2.1.0
| | | | | `-- camelcase@2.1.1
| | | | +-- decamelize@1.2.0
| | | | +-- loud-rejection@1.6.0
| | | | | +-- currently-unhandled@0.4.1
| | | | | | `-- array-find-index@1.0.1
| | | | | `-- signal-exit@3.0.0
| | | | +-- map-obj@1.0.1
| | | | +-- normalize-package-data@2.3.5
| | | | | +-- hosted-git-info@2.1.5
| | | | | +-- is-builtin-module@1.0.0
| | | | | | `-- builtin-modules@1.1.1
| | | | | +-- semver@5.3.0
| | | | | `-- validate-npm-package-license@3.0.1
| | | | | +-- spdx-correct@1.0.2
| | | | | | `-- spdx-license-ids@1.2.2
| | | | | `-- spdx-expression-parse@1.0.3
| | | | +-- object-assign@4.1.0
| | | | +-- read-pkg-up@1.0.1
| | | | | +-- find-up@1.1.2
| | | | | | `-- path-exists@2.1.0
| | | | | `-- read-pkg@1.1.0
| | | | | +-- load-json-file@1.1.0
| | | | | | +-- graceful-fs@4.1.6
| | | | | | +-- parse-json@2.2.0
| | | | | | | `-- error-ex@1.3.0
| | | | | | | `-- is-arrayish@0.2.1
| | | | | | +-- pify@2.3.0
| | | | | | `-- strip-bom@2.0.0
| | | | | | `-- is-utf8@0.2.1
| | | | | `-- path-type@1.1.0
| | | | +-- redent@1.0.0
| | | | | +-- indent-string@2.1.0
| | | | | | `-- repeating@2.0.1
| | | | | | `-- is-finite@1.0.1
| | | | | | `-- number-is-nan@1.0.0
| | | | | `-- strip-indent@1.0.1
| | | | `-- trim-newlines@1.0.0
| | | +-- progress-stream@1.2.0
| | | | +-- speedometer@0.1.4
| | | | `-- through2@0.2.3
| | | | +-- readable-stream@1.1.14
| | | | | `-- isarray@0.0.1
| | | | `-- xtend@2.1.2
| | | | `-- object-keys@0.4.0
| | | +-- request@2.74.0
| | | | +-- aws-sign2@0.6.0
| | | | +-- aws4@1.4.1
| | | | +-- bl@1.1.2
| | | | | `-- readable-stream@2.0.6
| | | | | `-- isarray@1.0.0
| | | | +-- caseless@0.11.0
| | | | +-- combined-stream@1.0.5
| | | | | `-- delayed-stream@1.0.0
| | | | +-- extend@3.0.0
| | | | +-- forever-agent@0.6.1
| | | | +-- form-data@1.0.1
| | | | | `-- async@2.0.1
| | | | | `-- lodash@4.15.0
| | | | +-- har-validator@2.0.6
| | | | | +-- chalk@1.1.3
| | | | | | +-- ansi-styles@2.2.1
| | | | | | +-- escape-string-regexp@1.0.5
| | | | | | +-- has-ansi@2.0.0
| | | | | | | `-- ansi-regex@2.0.0
| | | | | | +-- strip-ansi@3.0.1
| | | | | | `-- supports-color@2.0.0
| | | | | +-- commander@2.9.0
| | | | | | `-- graceful-readlink@1.0.1
| | | | | +-- is-my-json-valid@2.13.1
| | | | | | +-- generate-function@2.0.0
| | | | | | +-- generate-object-property@1.2.0
| | | | | | | `-- is-property@1.0.2
| | | | | | +-- jsonpointer@2.0.0
| | | | | | `-- xtend@4.0.1
| | | | | `-- pinkie-promise@2.0.1
| | | | | `-- pinkie@2.0.4
| | | | +-- hawk@3.1.3
| | | | | +-- boom@2.10.1
| | | | | +-- cryptiles@2.0.5
| | | | | +-- hoek@2.16.3
| | | | | `-- sntp@1.0.9
| | | | +-- http-signature@1.1.1
| | | | | +-- assert-plus@0.2.0
| | | | | +-- jsprim@1.3.0
| | | | | | +-- extsprintf@1.0.2
| | | | | | +-- json-schema@0.2.2
| | | | | | `-- verror@1.3.6
| | | | | `-- sshpk@1.10.0
| | | | | +-- asn1@0.2.3
| | | | | +-- assert-plus@1.0.0
| | | | | +-- bcrypt-pbkdf@1.0.0
| | | | | | `-- tweetnacl@0.14.3
| | | | | +-- dashdash@1.14.0
| | | | | | `-- assert-plus@1.0.0
| | | | | +-- ecc-jsbn@0.1.1
| | | | | +-- getpass@0.1.6
| | | | | | `-- assert-plus@1.0.0
| | | | | +-- jodid25519@1.0.2
| | | | | +-- jsbn@0.1.0
| | | | | `-- tweetnacl@0.13.3
| | | | +-- is-typedarray@1.0.0
| | | | +-- isstream@0.1.2
| | | | +-- json-stringify-safe@5.0.1
| | | | +-- mime-types@2.1.11
| | | | | `-- mime-db@1.23.0
| | | | +-- node-uuid@1.4.7
| | | | +-- oauth-sign@0.8.2
| | | | +-- qs@6.2.1
| | | | +-- stringstream@0.0.5
| | | | +-- tough-cookie@2.3.1
| | | | `-- tunnel-agent@0.4.3
| | | +-- single-line-log@0.4.1
| | | `-- throttleit@0.0.2
| | +-- path-exists@1.0.0
| | `-- rc@1.1.6
| | +-- deep-extend@0.4.1
| | +-- ini@1.3.4
| | +-- strip-json-comments@1.0.4
| `-- extract-zip@1.5.0
| +-- concat-stream@1.5.0
| | +-- inherits@2.0.1
| | +-- readable-stream@2.0.6
| | | +-- core-util-is@1.0.2
| | | +-- isarray@1.0.0
| | | +-- process-nextick-args@1.0.7
| | | +-- string_decoder@0.10.31
| | | `-- util-deprecate@1.0.2
| | `-- typedarray@0.0.6
| +-- debug@0.7.4
| +-- mkdirp@0.5.0
| | `-- minimist@0.0.8
| `-- yauzl@2.4.1
| `-- fd-slicer@1.0.1
| `-- pend@1.2.0

Ljel-rt'doing.BUILDING

name::
* McsEngl.Ljel-rt'doing.BUILDING@cptIt,

_DESCRIPTION:

Ljel-rt'doing.INSTALLING

name::
* McsEngl.Ljel-rt'doing.INSTALLING@cptIt,
* McsEngl.electron-installing@cptIt,
* McsEngl.Ljel-rt'installing@cptIt,

_DESCRIPTION:
Note As of version 1.3.1, this package is published to npm under two names: electron and electron-prebuilt. You can currently use either name, but electron is recommended, as the electron-prebuilt name is deprecated, and will only be published until the end of 2016.

Download and install the latest build of Electron for your OS and add it to your project's package.json as a devDependency:
npm install electron --save-dev
This is the preferred way to use Electron, as it doesn't require users to install Electron globally.
You can also use the -g flag (global) to symlink it into your PATH:
npm install -g electron
If that command fails with an EACCESS error you may have to run it again with sudo:
sudo npm install -g electron
Now you can just run electron to run electron:
electron
[https://github.com/electron-userland/electron-prebuilt#installation]

Ljel-rt'doing.UPGRADING

name::
* McsEngl.Ljel-rt'doing.UPGRADING@cptIt,

npm install electron -g

Ljel-rt.VERSION

name::
* McsEngl.Ljel-rt.VERSION@cptIt,

_DESCRIPTION:
Due to the hard dependency on Node.js and Chromium, Electron is in a tricky versioning position and does not follow semver. You should therefore always reference a specific version of Electron. Read more about Electron’s versioning or see the versions currently in use.
[http://electron.atom.io/docs/tutorial/about/#versioning]

Ljel'Resource (Ljelrsc)

name::
* McsEngl.Ljel'Resource (Ljelrsc)@cptIt,

_ADDRESS.WPG:
* http://electron.atom.io//
* https://github.com/sindresorhus/awesome-electron,
* https://nodesource.com/blog/fifteen-essential-packages-to-get-started-with-electron//

_PROGRAM:
* https://medium.com/developers-writing/building-a-desktop-application-with-electron-204203eeb658, sound machine,

Ljel'Docs

name::
* McsEngl.Ljel'Docs@cptIt,

_ADDRESS.WPG:
* http://electron.atom.io/docs//

Ljel.EVOLUTING

name::
* McsEngl.Ljel.EVOLUTING@cptIt,

{time.2016}:
August 2016  Windows Store support for Electron apps.
May 2016  Electron releases v1.0.0.
May 2016  Electron apps compatible with Mac App Store.

{time.2015}:
April 2015  Atom Shell is re-named Electron.

{time.2014}:
=== open-source:
Electron began in 2013 as the framework on which Atom, GitHub’s hackable text editor, would be built. The two were open sourced in the Spring of 2014.
[http://electron.atom.io/docs/tutorial/about/]
===
May 2014  Atom Shell is open sourced.

{time.2013}
=== begining:
Electron began in 2013 as the framework on which Atom, GitHub’s hackable text editor, would be built. The two were open sourced in the Spring of 2014.
[http://electron.atom.io/docs/tutorial/about/]
===
April 2013  Atom Shell is started.

Ljel.release

name::
* McsEngl.Ljel.release@cptIt,

_DESCRIPTION:
Electron releases frequently. We release when there are significant bug fixes, new APIs or are updating versions of Chromium or Node.js.
[http://electron.atom.io/docs/tutorial/about/#releases]

lnw.lhjn.NW.js (Ljnw)

_CREATED: {2014-05-23}

name::
* McsEngl.lnw.lhjn.NW.js (Ljnw)@cptIt,
* McsEngl.Ljnw@cptIt, {2017-07-08}
* McsEngl.node-webkit@cptIt,
* McsEngl.NW.js@cptIt,
* McsEngl.lnw@cptIt,
* McsEngl.nwk@cptIt,

_OVERVIEW:
NW.js is an app runtime based on Chromium and node.js. You can write native apps in HTML and JavaScript with NW.js. It also lets you call Node.js modules directly from the DOM and enables a new way of writing native applications with all Web technologies.
[https://github.com/nwjs/nw.js#introduction]
===
NW.js (previously known as node-webkit) lets you call all Node.js modules directly from DOM and enables a new way of writing applications with all Web technologies.
[http://nwjs.io/]

_DESCRIPTION:
node-webkit is an app runtime based on Chromium and node.js. You can write native apps in HTML and JavaScript with node-webkit. It also lets you call Node.js modules directly from the DOM and enables a new way of writing native applications with all Web technologies.
It's created and developed in the Intel Open Source Technology Center.
[https://github.com/rogerwang/node-webkit]
===
The library combines WebKit engine and Node.js in a unique way. Both WebKit and Node share the same context, allowing you to write your code like it's meant to be executed in a browser, but with the addition of all Node's features.
The list of uses is endless. You can create business apps, text and image editors, games, presentations, admin panels, etc. Just name the desktop app that you would like to create, and I can assure you that it will be possible with node-webkit.
[http://code.tutsplus.com/tutorials/introduction-to-html5-desktop-apps-with-node-webkit--net-36296]

Ljnwalgo'sut.API

name::
* McsEngl.Ljnwalgo'sut.API@cptIt,
* McsEngl.Ljnwapi@cptIt,

Ljnwapi'global-object

name::
* McsEngl.Ljnwapi'global-object@cptIt,

_MEMBER:
// Ljnw.0-16-1
> Object.getOwnPropertyNames(global).sort()
Array[730],
0:"Ljnw'AnalyserNode", 1:"Ljnw'AnimationEvent", 2:"Ljnw'AppBannerPromptResult", 3:"Ljnw'AppView", 4:"Ljnw'ApplicationCache", 5:"Ljnw'ApplicationCacheErrorEvent", 6:"Ljnw'Array", 7:"Ljnw'ArrayBuffer", 8:"Ljnw'Attr", 9:"Ljnw'Audio", 10:"Ljnw'AudioBuffer", 11:"Ljnw'AudioBufferSourceNode", 12:"Ljnw'AudioContext", 13:"Ljnw'AudioDestinationNode", 14:"Ljnw'AudioListener", 15:"Ljnw'AudioNode", 16:"Ljnw'AudioParam", 17:"Ljnw'AudioProcessingEvent", 18:"Ljnw'BarProp", 19:"Ljnw'BatteryManager", 20:"Ljnw'BeforeInstallPromptEvent", 21:"Ljnw'BeforeUnloadEvent", 22:"Ljnw'BiquadFilterNode", 23:"Ljnw'Blob", 24:"Ljnw'BlobEvent", 25:"Ljnw'Boolean", 26:"Ljnw'Buffer", 27:"Ljnw'ByteLengthQueuingStrategy", 28:"Ljnw'CDATASection", 29:"Ljnw'CSS", 30:"Ljnw'CSSFontFaceRule", 31:"Ljnw'CSSGroupingRule", 32:"Ljnw'CSSImportRule", 33:"Ljnw'CSSKeyframeRule", 34:"Ljnw'CSSKeyframesRule", 35:"Ljnw'CSSMediaRule", 36:"Ljnw'CSSNamespaceRule", 37:"Ljnw'CSSPageRule", 38:"Ljnw'CSSRule", 39:"Ljnw'CSSRuleList", 40:"Ljnw'CSSStyleDeclaration", 41:"Ljnw'CSSStyleRule", 42:"Ljnw'CSSStyleSheet", 43:"Ljnw'CSSSupportsRule", 44:"Ljnw'CSSViewportRule", 45:"Ljnw'Cache", 46:"Ljnw'CacheStorage", 47:"Ljnw'CanvasCaptureMediaStreamTrack", 48:"Ljnw'CanvasGradient", 49:"Ljnw'CanvasPattern", 50:"Ljnw'CanvasRenderingContext2D", 51:"Ljnw'ChannelMergerNode", 52:"Ljnw'ChannelSplitterNode", 53:"Ljnw'CharacterData", 54:"Ljnw'ClientRect", 55:"Ljnw'ClientRectList", 56:"Ljnw'ClipboardEvent", 57:"Ljnw'CloseEvent", 58:"Ljnw'Comment", 59:"Ljnw'CompositionEvent", 60:"Ljnw'ConvolverNode", 61:"Ljnw'CountQueuingStrategy", 62:"Ljnw'Credential", 63:"Ljnw'CredentialsContainer", 64:"Ljnw'Crypto", 65:"Ljnw'CryptoKey", 66:"Ljnw'CustomEvent", 67:"Ljnw'DOMError", 68:"Ljnw'DOMException", 69:"Ljnw'DOMImplementation", 70:"Ljnw'DOMParser", 71:"Ljnw'DOMStringList", 72:"Ljnw'DOMStringMap", 73:"Ljnw'DOMTokenList", 74:"Ljnw'DataTransfer", 75:"Ljnw'DataTransferItem", 76:"Ljnw'DataTransferItemList", 77:"Ljnw'DataView", 78:"Ljnw'Date", 79:"Ljnw'DelayNode", 80:"Ljnw'DeviceMotionEvent", 81:"Ljnw'DeviceOrientationEvent", 82:"Ljnw'Document", 83:"Ljnw'DocumentFragment", 84:"Ljnw'DocumentType", 85:"Ljnw'DragEvent", 86:"Ljnw'DynamicsCompressorNode", 87:"Ljnw'Element", 88:"Ljnw'Error", 89:"Ljnw'ErrorEvent", 90:"Ljnw'EvalError", 91:"Ljnw'Event", 92:"Ljnw'EventSource", 93:"Ljnw'EventTarget", 94:"Ljnw'ExtensionOptions", 95:"Ljnw'ExtensionView", 96:"Ljnw'FederatedCredential", 97:"Ljnw'File", 98:"Ljnw'FileError", 99:"Ljnw'FileList",
100:"Ljnw'FileReader", 101:"Ljnw'Float32Array", 102:"Ljnw'Float64Array", 103:"Ljnw'FocusEvent", 104:"Ljnw'FontFace", 105:"Ljnw'FormData", 106:"Ljnw'Function", 107:"Ljnw'GLOBAL", 108:"Ljnw'GainNode", 109:"Ljnw'Gamepad", 110:"Ljnw'GamepadButton", 111:"Ljnw'GamepadEvent", 112:"Ljnw'HTMLAllCollection", 113:"Ljnw'HTMLAnchorElement", 114:"Ljnw'HTMLAreaElement", 115:"Ljnw'HTMLAudioElement", 116:"Ljnw'HTMLBRElement", 117:"Ljnw'HTMLBaseElement", 118:"Ljnw'HTMLBodyElement", 119:"Ljnw'HTMLButtonElement", 120:"Ljnw'HTMLCanvasElement", 121:"Ljnw'HTMLCollection", 122:"Ljnw'HTMLContentElement", 123:"Ljnw'HTMLDListElement", 124:"Ljnw'HTMLDataListElement", 125:"Ljnw'HTMLDetailsElement", 126:"Ljnw'HTMLDialogElement", 127:"Ljnw'HTMLDirectoryElement", 128:"Ljnw'HTMLDivElement", 129:"Ljnw'HTMLDocument", 130:"Ljnw'HTMLElement", 131:"Ljnw'HTMLEmbedElement", 132:"Ljnw'HTMLFieldSetElement", 133:"Ljnw'HTMLFontElement", 134:"Ljnw'HTMLFormControlsCollection", 135:"Ljnw'HTMLFormElement", 136:"Ljnw'HTMLFrameElement", 137:"Ljnw'HTMLFrameSetElement", 138:"Ljnw'HTMLHRElement", 139:"Ljnw'HTMLHeadElement", 140:"Ljnw'HTMLHeadingElement", 141:"Ljnw'HTMLHtmlElement", 142:"Ljnw'HTMLIFrameElement", 143:"Ljnw'HTMLImageElement", 144:"Ljnw'HTMLInputElement", 145:"Ljnw'HTMLKeygenElement", 146:"Ljnw'HTMLLIElement", 147:"Ljnw'HTMLLabelElement", 148:"Ljnw'HTMLLegendElement", 149:"Ljnw'HTMLLinkElement", 150:"Ljnw'HTMLMapElement", 151:"Ljnw'HTMLMarqueeElement", 152:"Ljnw'HTMLMediaElement", 153:"Ljnw'HTMLMenuElement", 154:"Ljnw'HTMLMetaElement", 155:"Ljnw'HTMLMeterElement", 156:"Ljnw'HTMLModElement", 157:"Ljnw'HTMLOListElement", 158:"Ljnw'HTMLObjectElement", 159:"Ljnw'HTMLOptGroupElement", 160:"Ljnw'HTMLOptionElement", 161:"Ljnw'HTMLOptionsCollection", 162:"Ljnw'HTMLOutputElement", 163:"Ljnw'HTMLParagraphElement", 164:"Ljnw'HTMLParamElement", 165:"Ljnw'HTMLPictureElement", 166:"Ljnw'HTMLPreElement", 167:"Ljnw'HTMLProgressElement", 168:"Ljnw'HTMLQuoteElement", 169:"Ljnw'HTMLScriptElement", 170:"Ljnw'HTMLSelectElement", 171:"Ljnw'HTMLShadowElement", 172:"Ljnw'HTMLSourceElement", 173:"Ljnw'HTMLSpanElement", 174:"Ljnw'HTMLStyleElement", 175:"Ljnw'HTMLTableCaptionElement", 176:"Ljnw'HTMLTableCellElement", 177:"Ljnw'HTMLTableColElement", 178:"Ljnw'HTMLTableElement", 179:"Ljnw'HTMLTableRowElement", 180:"Ljnw'HTMLTableSectionElement", 181:"Ljnw'HTMLTemplateElement", 182:"Ljnw'HTMLTextAreaElement", 183:"Ljnw'HTMLTitleElement", 184:"Ljnw'HTMLTrackElement", 185:"Ljnw'HTMLUListElement", 186:"Ljnw'HTMLUnknownElement", 187:"Ljnw'HTMLVideoElement", 188:"Ljnw'HashChangeEvent", 189:"Ljnw'Headers", 190:"Ljnw'History", 191:"Ljnw'IDBCursor", 192:"Ljnw'IDBCursorWithValue", 193:"Ljnw'IDBDatabase", 194:"Ljnw'IDBFactory", 195:"Ljnw'IDBIndex", 196:"Ljnw'IDBKeyRange", 197:"Ljnw'IDBObjectStore", 198:"Ljnw'IDBOpenDBRequest", 199:"Ljnw'IDBRequest",
200:"Ljnw'IDBTransaction", 201:"Ljnw'IDBVersionChangeEvent", 202:"Ljnw'IIRFilterNode", 203:"Ljnw'IdleDeadline", 204:"Ljnw'Image", 205:"Ljnw'ImageBitmap", 206:"Ljnw'ImageData", 207:"Ljnw'Infinity", 208:"Ljnw'InputDeviceCapabilities", 209:"Ljnw'Int16Array", 210:"Ljnw'Int32Array", 211:"Ljnw'Int8Array", 212:"Ljnw'IntersectionObserver", 213:"Ljnw'IntersectionObserverEntry", 214:"Ljnw'Intl", 215:"Ljnw'JSON", 216:"Ljnw'KeyboardEvent", 217:"Ljnw'Location", 218:"Ljnw'MIDIAccess", 219:"Ljnw'MIDIConnectionEvent", 220:"Ljnw'MIDIInput", 221:"Ljnw'MIDIInputMap", 222:"Ljnw'MIDIMessageEvent", 223:"Ljnw'MIDIOutput", 224:"Ljnw'MIDIOutputMap", 225:"Ljnw'MIDIPort", 226:"Ljnw'Map", 227:"Ljnw'Math", 228:"Ljnw'MediaDevices", 229:"Ljnw'MediaElementAudioSourceNode", 230:"Ljnw'MediaEncryptedEvent", 231:"Ljnw'MediaError", 232:"Ljnw'MediaKeyMessageEvent", 233:"Ljnw'MediaKeySession", 234:"Ljnw'MediaKeyStatusMap", 235:"Ljnw'MediaKeySystemAccess", 236:"Ljnw'MediaKeys", 237:"Ljnw'MediaList", 238:"Ljnw'MediaQueryList", 239:"Ljnw'MediaQueryListEvent", 240:"Ljnw'MediaRecorder", 241:"Ljnw'MediaSource", 242:"Ljnw'MediaStreamAudioDestinationNode", 243:"Ljnw'MediaStreamAudioSourceNode", 244:"Ljnw'MediaStreamEvent", 245:"Ljnw'MediaStreamTrack", 246:"Ljnw'MessageChannel", 247:"Ljnw'MessageEvent", 248:"Ljnw'MessagePort", 249:"Ljnw'MimeType", 250:"Ljnw'MimeTypeArray", 251:"Ljnw'MouseEvent", 252:"Ljnw'MutationEvent", 253:"Ljnw'MutationObserver", 254:"Ljnw'MutationRecord", 255:"Ljnw'NaN", 256:"Ljnw'NamedNodeMap", 257:"Ljnw'Navigator", 258:"Ljnw'Node", 259:"Ljnw'NodeFilter", 260:"Ljnw'NodeIterator", 261:"Ljnw'NodeList", 262:"Ljnw'Notification", 263:"Ljnw'Number", 264:"Ljnw'Object", 265:"Ljnw'OfflineAudioCompletionEvent", 266:"Ljnw'OfflineAudioContext", 267:"Ljnw'Option", 268:"Ljnw'OscillatorNode", 269:"Ljnw'PageTransitionEvent", 270:"Ljnw'PasswordCredential", 271:"Ljnw'Path2D", 272:"Ljnw'Performance", 273:"Ljnw'PerformanceEntry", 274:"Ljnw'PerformanceMark", 275:"Ljnw'PerformanceMeasure", 276:"Ljnw'PerformanceNavigation", 277:"Ljnw'PerformanceObserver", 278:"Ljnw'PerformanceObserverEntryList", 279:"Ljnw'PerformanceResourceTiming", 280:"Ljnw'PerformanceTiming", 281:"Ljnw'PeriodicWave", 282:"Ljnw'PermissionStatus", 283:"Ljnw'Permissions", 284:"Ljnw'Plugin", 285:"Ljnw'PluginArray", 286:"Ljnw'PopStateEvent", 287:"Ljnw'Presentation", 288:"Ljnw'PresentationAvailability", 289:"Ljnw'PresentationConnection", 290:"Ljnw'PresentationConnectionAvailableEvent", 291:"Ljnw'PresentationConnectionCloseEvent", 292:"Ljnw'PresentationRequest", 293:"Ljnw'ProcessingInstruction", 294:"Ljnw'ProgressEvent", 295:"Ljnw'Promise", 296:"Ljnw'PromiseRejectionEvent", 297:"Ljnw'Proxy", 298:"Ljnw'PushManager", 299:"Ljnw'PushSubscription",
300:"Ljnw'RTCCertificate", 301:"Ljnw'RTCIceCandidate", 302:"Ljnw'RTCSessionDescription", 303:"Ljnw'RadioNodeList", 304:"Ljnw'Range", 305:"Ljnw'RangeError", 306:"Ljnw'ReadableStream", 307:"Ljnw'ReferenceError", 308:"Ljnw'Reflect", 309:"Ljnw'RegExp", 310:"Ljnw'Request", 311:"Ljnw'Response", 312:"Ljnw'SVGAElement", 313:"Ljnw'SVGAngle", 314:"Ljnw'SVGAnimateElement", 315:"Ljnw'SVGAnimateMotionElement", 316:"Ljnw'SVGAnimateTransformElement", 317:"Ljnw'SVGAnimatedAngle", 318:"Ljnw'SVGAnimatedBoolean", 319:"Ljnw'SVGAnimatedEnumeration", 320:"Ljnw'SVGAnimatedInteger", 321:"Ljnw'SVGAnimatedLength", 322:"Ljnw'SVGAnimatedLengthList", 323:"Ljnw'SVGAnimatedNumber", 324:"Ljnw'SVGAnimatedNumberList", 325:"Ljnw'SVGAnimatedPreserveAspectRatio", 326:"Ljnw'SVGAnimatedRect", 327:"Ljnw'SVGAnimatedString", 328:"Ljnw'SVGAnimatedTransformList", 329:"Ljnw'SVGAnimationElement", 330:"Ljnw'SVGCircleElement", 331:"Ljnw'SVGClipPathElement", 332:"Ljnw'SVGComponentTransferFunctionElement", 333:"Ljnw'SVGCursorElement", 334:"Ljnw'SVGDefsElement", 335:"Ljnw'SVGDescElement", 336:"Ljnw'SVGDiscardElement", 337:"Ljnw'SVGElement", 338:"Ljnw'SVGEllipseElement", 339:"Ljnw'SVGFEBlendElement", 340:"Ljnw'SVGFEColorMatrixElement", 341:"Ljnw'SVGFEComponentTransferElement", 342:"Ljnw'SVGFECompositeElement", 343:"Ljnw'SVGFEConvolveMatrixElement", 344:"Ljnw'SVGFEDiffuseLightingElement", 345:"Ljnw'SVGFEDisplacementMapElement", 346:"Ljnw'SVGFEDistantLightElement", 347:"Ljnw'SVGFEDropShadowElement", 348:"Ljnw'SVGFEFloodElement", 349:"Ljnw'SVGFEFuncAElement", 350:"Ljnw'SVGFEFuncBElement", 351:"Ljnw'SVGFEFuncGElement", 352:"Ljnw'SVGFEFuncRElement", 353:"Ljnw'SVGFEGaussianBlurElement", 354:"Ljnw'SVGFEImageElement", 355:"Ljnw'SVGFEMergeElement", 356:"Ljnw'SVGFEMergeNodeElement", 357:"Ljnw'SVGFEMorphologyElement", 358:"Ljnw'SVGFEOffsetElement", 359:"Ljnw'SVGFEPointLightElement", 360:"Ljnw'SVGFESpecularLightingElement", 361:"Ljnw'SVGFESpotLightElement", 362:"Ljnw'SVGFETileElement", 363:"Ljnw'SVGFETurbulenceElement", 364:"Ljnw'SVGFilterElement", 365:"Ljnw'SVGForeignObjectElement", 366:"Ljnw'SVGGElement", 367:"Ljnw'SVGGeometryElement", 368:"Ljnw'SVGGradientElement", 369:"Ljnw'SVGGraphicsElement", 370:"Ljnw'SVGImageElement", 371:"Ljnw'SVGLength", 372:"Ljnw'SVGLengthList", 373:"Ljnw'SVGLineElement", 374:"Ljnw'SVGLinearGradientElement", 375:"Ljnw'SVGMPathElement", 376:"Ljnw'SVGMarkerElement", 377:"Ljnw'SVGMaskElement", 378:"Ljnw'SVGMatrix", 379:"Ljnw'SVGMetadataElement", 380:"Ljnw'SVGNumber", 381:"Ljnw'SVGNumberList", 382:"Ljnw'SVGPathElement", 383:"Ljnw'SVGPatternElement", 384:"Ljnw'SVGPoint", 385:"Ljnw'SVGPointList", 386:"Ljnw'SVGPolygonElement", 387:"Ljnw'SVGPolylineElement", 388:"Ljnw'SVGPreserveAspectRatio", 389:"Ljnw'SVGRadialGradientElement", 390:"Ljnw'SVGRect", 391:"Ljnw'SVGRectElement", 392:"Ljnw'SVGSVGElement", 393:"Ljnw'SVGScriptElement", 394:"Ljnw'SVGSetElement", 395:"Ljnw'SVGStopElement", 396:"Ljnw'SVGStringList", 397:"Ljnw'SVGStyleElement", 398:"Ljnw'SVGSwitchElement", 399:"Ljnw'SVGSymbolElement",
400:"Ljnw'SVGTSpanElement", 401:"Ljnw'SVGTextContentElement", 402:"Ljnw'SVGTextElement", 403:"Ljnw'SVGTextPathElement", 404:"Ljnw'SVGTextPositioningElement", 405:"Ljnw'SVGTitleElement", 406:"Ljnw'SVGTransform", 407:"Ljnw'SVGTransformList", 408:"Ljnw'SVGUnitTypes", 409:"Ljnw'SVGUseElement", 410:"Ljnw'SVGViewElement", 411:"Ljnw'SVGViewSpec", 412:"Ljnw'SVGZoomEvent", 413:"Ljnw'Screen", 414:"Ljnw'ScreenOrientation", 415:"Ljnw'ScriptProcessorNode", 416:"Ljnw'SecurityPolicyViolationEvent", 417:"Ljnw'Selection", 418:"Ljnw'ServiceWorker", 419:"Ljnw'ServiceWorkerContainer", 420:"Ljnw'ServiceWorkerMessageEvent", 421:"Ljnw'ServiceWorkerRegistration", 422:"Ljnw'Set", 423:"Ljnw'ShadowRoot", 424:"Ljnw'SharedWorker", 425:"Ljnw'SiteBoundCredential", 426:"Ljnw'SourceBuffer", 427:"Ljnw'SourceBufferList", 428:"Ljnw'SpeechSynthesisEvent", 429:"Ljnw'SpeechSynthesisUtterance", 430:"Ljnw'Storage", 431:"Ljnw'StorageEvent", 432:"Ljnw'String", 433:"Ljnw'StyleSheet", 434:"Ljnw'StyleSheetList", 435:"Ljnw'SubtleCrypto", 436:"Ljnw'Symbol", 437:"Ljnw'SyncManager", 438:"Ljnw'SyntaxError", 439:"Ljnw'Text", 440:"Ljnw'TextDecoder", 441:"Ljnw'TextEncoder", 442:"Ljnw'TextEvent", 443:"Ljnw'TextMetrics", 444:"Ljnw'TextTrack", 445:"Ljnw'TextTrackCue", 446:"Ljnw'TextTrackCueList", 447:"Ljnw'TextTrackList", 448:"Ljnw'TimeRanges", 449:"Ljnw'Touch", 450:"Ljnw'TouchEvent", 451:"Ljnw'TouchList", 452:"Ljnw'TrackEvent", 453:"Ljnw'TransitionEvent", 454:"Ljnw'TreeWalker", 455:"Ljnw'TypeError", 456:"Ljnw'UIEvent", 457:"Ljnw'URIError", 458:"Ljnw'URL", 459:"Ljnw'URLSearchParams", 460:"Ljnw'Uint16Array", 461:"Ljnw'Uint32Array", 462:"Ljnw'Uint8Array", 463:"Ljnw'Uint8ClampedArray", 464:"Ljnw'VTTCue", 465:"Ljnw'ValidityState", 466:"Ljnw'WaveShaperNode", 467:"Ljnw'WeakMap", 468:"Ljnw'WeakSet", 469:"Ljnw'WebGLActiveInfo", 470:"Ljnw'WebGLBuffer", 471:"Ljnw'WebGLContextEvent", 472:"Ljnw'WebGLFramebuffer", 473:"Ljnw'WebGLProgram", 474:"Ljnw'WebGLRenderbuffer", 475:"Ljnw'WebGLRenderingContext", 476:"Ljnw'WebGLShader", 477:"Ljnw'WebGLShaderPrecisionFormat", 478:"Ljnw'WebGLTexture", 479:"Ljnw'WebGLUniformLocation", 480:"Ljnw'WebKitAnimationEvent", 481:"Ljnw'WebKitCSSMatrix", 482:"Ljnw'WebKitMutationObserver", 483:"Ljnw'WebKitTransitionEvent", 484:"Ljnw'WebSocket", 485:"Ljnw'WebView", 486:"Ljnw'WheelEvent", 487:"Ljnw'Window", 488:"Ljnw'Worker", 489:"Ljnw'XMLDocument", 490:"Ljnw'XMLHttpRequest", 491:"Ljnw'XMLHttpRequestEventTarget", 492:"Ljnw'XMLHttpRequestUpload", 493:"Ljnw'XMLSerializer", 494:"Ljnw'XPathEvaluator", 495:"Ljnw'XPathExpression", 496:"Ljnw'XPathResult", 497:"Ljnw'XSLTProcessor", 498:"Ljnw'__dirname", 499:"Ljnw'__nw_initwindow",
500:"Ljnw'__nw_ondestruct", 501:"Ljnw'__nw_ondocumentcreated", 502:"Ljnw'__nw_record_event", 503:"Ljnw'__nw_removeOuterEventCB", 504:"Ljnw'__nw_remove_all_listeners", 505:"Ljnw'__nw_require", 506:"Ljnw'__nw_windows", 507:"Ljnw'alert", 508:"Ljnw'applicationCache", 509:"Ljnw'atob", 510:"Ljnw'blur", 511:"Ljnw'btoa", 512:"Ljnw'caches", 513:"Ljnw'cancelAnimationFrame", 514:"Ljnw'cancelIdleCallback", 515:"Ljnw'captureEvents", 516:"Ljnw'chrome", 517:"Ljnw'clearImmediate", 518:"Ljnw'clearInterval", 519:"Ljnw'clearTimeout", 520:"Ljnw'clientInformation", 521:"Ljnw'close", 522:"Ljnw'closed", 523:"Ljnw'confirm", 524:"Ljnw'console", 525:"Ljnw'createImageBitmap", 526:"Ljnw'crypto", 527:"Ljnw'decodeURI", 528:"Ljnw'decodeURIComponent", 529:"Ljnw'defaultStatus", 530:"Ljnw'defaultstatus", 531:"Ljnw'devicePixelRatio", 532:"Ljnw'document", 533:"Ljnw'encodeURI", 534:"Ljnw'encodeURIComponent", 535:"Ljnw'escape", 536:"Ljnw'eval", 537:"Ljnw'event", 538:"Ljnw'external", 539:"Ljnw'fetch", 540:"Ljnw'find", 541:"Ljnw'focus", 542:"Ljnw'frameElement", 543:"Ljnw'frames", 544:"Ljnw'getComputedStyle", 545:"Ljnw'getMatchedCSSRules", 546:"Ljnw'getSelection", 547:"Ljnw'global", 548:"Ljnw'history", 549:"Ljnw'indexedDB", 550:"Ljnw'innerHeight", 551:"Ljnw'innerWidth", 552:"Ljnw'isFinite", 553:"Ljnw'isNaN", 554:"Ljnw'isSecureContext", 555:"Ljnw'length", 556:"Ljnw'localStorage", 557:"Ljnw'location", 558:"Ljnw'locationbar", 559:"Ljnw'manifest", 560:"Ljnw'matchMedia", 561:"Ljnw'menubar", 562:"Ljnw'module", 563:"Ljnw'moveBy", 564:"Ljnw'moveTo", 565:"Ljnw'name", 566:"Ljnw'navigator", 567:"Ljnw'nw", 568:"Ljnw'offscreenBuffering", 569:"Ljnw'onabort", 570:"Ljnw'onanimationend", 571:"Ljnw'onanimationiteration", 572:"Ljnw'onanimationstart", 573:"Ljnw'onbeforeunload", 574:"Ljnw'onblur", 575:"Ljnw'oncancel", 576:"Ljnw'oncanplay", 577:"Ljnw'oncanplaythrough", 578:"Ljnw'onchange", 579:"Ljnw'onclick", 580:"Ljnw'onclose", 581:"Ljnw'oncontextmenu", 582:"Ljnw'oncuechange", 583:"Ljnw'ondblclick", 584:"Ljnw'ondevicemotion", 585:"Ljnw'ondeviceorientation", 586:"Ljnw'ondeviceorientationabsolute", 587:"Ljnw'ondrag", 588:"Ljnw'ondragend", 589:"Ljnw'ondragenter", 590:"Ljnw'ondragleave", 591:"Ljnw'ondragover", 592:"Ljnw'ondragstart", 593:"Ljnw'ondrop", 594:"Ljnw'ondurationchange", 595:"Ljnw'onemptied", 596:"Ljnw'onended", 597:"Ljnw'onerror", 598:"Ljnw'onfocus", 599:"Ljnw'onhashchange",
600:"Ljnw'oninput", 601:"Ljnw'oninvalid", 602:"Ljnw'onkeydown", 603:"Ljnw'onkeypress", 604:"Ljnw'onkeyup", 605:"Ljnw'onlanguagechange", 606:"Ljnw'onload", 607:"Ljnw'onloadeddata", 608:"Ljnw'onloadedmetadata", 609:"Ljnw'onloadstart", 610:"Ljnw'onmessage", 611:"Ljnw'onmousedown", 612:"Ljnw'onmouseenter", 613:"Ljnw'onmouseleave", 614:"Ljnw'onmousemove", 615:"Ljnw'onmouseout", 616:"Ljnw'onmouseover", 617:"Ljnw'onmouseup", 618:"Ljnw'onmousewheel", 619:"Ljnw'onoffline", 620:"Ljnw'ononline", 621:"Ljnw'onpagehide", 622:"Ljnw'onpageshow", 623:"Ljnw'onpause", 624:"Ljnw'onplay", 625:"Ljnw'onplaying", 626:"Ljnw'onpopstate", 627:"Ljnw'onprogress", 628:"Ljnw'onratechange", 629:"Ljnw'onrejectionhandled", 630:"Ljnw'onreset", 631:"Ljnw'onresize", 632:"Ljnw'onscroll", 633:"Ljnw'onsearch", 634:"Ljnw'onseeked", 635:"Ljnw'onseeking", 636:"Ljnw'onselect", 637:"Ljnw'onshow", 638:"Ljnw'onstalled", 639:"Ljnw'onstorage", 640:"Ljnw'onsubmit", 641:"Ljnw'onsuspend", 642:"Ljnw'ontimeupdate", 643:"Ljnw'ontoggle", 644:"Ljnw'ontransitionend", 645:"Ljnw'onunhandledrejection", 646:"Ljnw'onunload", 647:"Ljnw'onvolumechange", 648:"Ljnw'onwaiting", 649:"Ljnw'onwebkitanimationend", 650:"Ljnw'onwebkitanimationiteration", 651:"Ljnw'onwebkitanimationstart", 652:"Ljnw'onwebkittransitionend", 653:"Ljnw'onwheel", 654:"Ljnw'open", 655:"Ljnw'openDatabase", 656:"Ljnw'opener", 657:"Ljnw'options", 658:"Ljnw'outerHeight", 659:"Ljnw'outerWidth", 660:"Ljnw'pageXOffset", 661:"Ljnw'pageYOffset", 662:"Ljnw'parent", 663:"Ljnw'parseFloat", 664:"Ljnw'parseInt", 665:"Ljnw'performance", 666:"Ljnw'personalbar", 667:"Ljnw'postMessage", 668:"Ljnw'print", 669:"Ljnw'process", 670:"Ljnw'prompt", 671:"Ljnw'releaseEvents", 672:"Ljnw'requestAnimationFrame", 673:"Ljnw'requestIdleCallback", 674:"Ljnw'require", 675:"Ljnw'resizeBy", 676:"Ljnw'resizeTo", 677:"Ljnw'root", 678:"Ljnw'screen", 679:"Ljnw'screenLeft", 680:"Ljnw'screenTop", 681:"Ljnw'screenX", 682:"Ljnw'screenY", 683:"Ljnw'scroll", 684:"Ljnw'scrollBy", 685:"Ljnw'scrollTo", 686:"Ljnw'scrollX", 687:"Ljnw'scrollY", 688:"Ljnw'scrollbars", 689:"Ljnw'self", 690:"Ljnw'sessionStorage", 691:"Ljnw'setImmediate", 692:"Ljnw'setInterval", 693:"Ljnw'setTimeout", 694:"Ljnw'speechSynthesis", 695:"Ljnw'status", 696:"Ljnw'statusbar", 697:"Ljnw'stop", 698:"Ljnw'styleMedia", 699:"Ljnw'title",
700:"Ljnw'toolbar", 701:"Ljnw'top", 702:"Ljnw'undefined", 703:"Ljnw'unescape", 704:"Ljnw'webkitAudioContext", 705:"Ljnw'webkitCancelAnimationFrame", 706:"Ljnw'webkitCancelRequestAnimationFrame", 707:"Ljnw'webkitIDBCursor", 708:"Ljnw'webkitIDBDatabase", 709:"Ljnw'webkitIDBFactory", 710:"Ljnw'webkitIDBIndex", 711:"Ljnw'webkitIDBKeyRange", 712:"Ljnw'webkitIDBObjectStore", 713:"Ljnw'webkitIDBRequest", 714:"Ljnw'webkitIDBTransaction", 715:"Ljnw'webkitIndexedDB", 716:"Ljnw'webkitMediaStream", 717:"Ljnw'webkitOfflineAudioContext", 718:"Ljnw'webkitRTCPeerConnection", 719:"Ljnw'webkitRequestAnimationFrame", 720:"Ljnw'webkitRequestFileSystem", 721:"Ljnw'webkitResolveLocalFileSystemURL", 722:"Ljnw'webkitSpeechGrammar", 723:"Ljnw'webkitSpeechGrammarList", 724:"Ljnw'webkitSpeechRecognition", 725:"Ljnw'webkitSpeechRecognitionError", 726:"Ljnw'webkitSpeechRecognitionEvent", 727:"Ljnw'webkitStorageInfo", 728:"Ljnw'webkitURL", 729:"Ljnw'window"

Ljnwapi'nw-object

name::
* McsEngl.Ljnwapi'nw-object@cptIt,
* McsEngl.Ljnwnw-cpt@cptIt,
* McsEngl.nw.gui-cpt@cptIt,

> var oNw = require('nw.gui')
undefined
> Object.getOwnPropertyNames(oNw).sort() ["App", "Buffer", "Clipboard", "Menu", "MenuItem", "Obj", "Screen", "Shell", "Shortcut", "Tray", "Window", "__dirname", "__filename", "global", "process", "require", "test"]

_MEMBER:
// Ljnw.0-16-1
> Object.getOwnPropertyNames(nw).sort()
["App", "Buffer", "Clipboard", "Menu", "MenuItem", "Obj", "Screen", "Shell", "Shortcut", "Tray", "Window", "__dirname", "__filename", "global", "process", "require", "test"]

_GENERIC:
* Object.prototype
// Object.getOwnPropertyNames(nw.App.__proto__).sort()
["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljnwnw.App-object

name::
* McsEngl.Ljnwnw.App-object@cptIt,

_MEMBER:
// Ljnw.0-16-1
// Object.getOwnPropertyNames(nw.App).sort()
["addOriginAccessWhitelistEntry", "argv", "clearAppCache", "clearCache", "closeAllWindows", "crashBrowser", "crashRenderer", "dataPath", "filteredArgv", "fullArgv", "getArgvSync", "getDataPath", "getProxyForURL", "manifest", "on", "onOpen", "onReopen", "once", "quit", "registerGlobalHotKey", "removeAllListeners", "removeListener", "removeOriginAccessWhitelistEntry", "setProxyConfig", "unregisterGlobalHotKey"]

_GENERIC:
* Object.prototype
// Object.getOwnPropertyNames(nw.App.__proto__).sort()
["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljnwnw.Buffer-function

name::
* McsEngl.Ljnwnw.Buffer-function@cptIt,

_MEMBER:
// Ljnw.0-16-1
// Object.getOwnPropertyNames(nw.Buffer).sort()
["alloc", "allocUnsafe", "allocUnsafeSlow", "byteLength", "compare", "concat", "from", "isBuffer", "isEncoding", "length", "name", "poolSize", "prototype"]
// typeof nw.Buffer"function"
//Object.getOwnPropertyNames(nw.Buffer.prototype).sort()
["asciiSlice", "asciiWrite", "base64Slice", "base64Write", "binarySlice", "binaryWrite", "compare", "constructor", "copy", "equals", "fill", "hexSlice", "hexWrite", "includes", "indexOf", "inspect", "lastIndexOf", "offset", "parent", "readDoubleBE", "readDoubleLE", "readFloatBE", "readFloatLE", "readInt16BE", "readInt16LE", "readInt32BE", "readInt32LE", "readInt8", "readIntBE", "readIntLE", "readUInt16BE", "readUInt16LE", "readUInt32BE", "readUInt32LE", "readUInt8", "readUIntBE", "readUIntLE", "slice", "swap16", "swap32", "swap64", "toJSON", "toString", "ucs2Slice", "ucs2Write", "utf8Slice", "utf8Write", "write", "writeDoubleBE", "writeDoubleLE", "writeFloatBE", "writeFloatLE", "writeInt16BE", "writeInt16LE", "writeInt32BE", "writeInt32LE", "writeInt8", "writeIntBE", "writeIntLE", "writeUInt16BE", "writeUInt16LE", "writeUInt32BE", "writeUInt32LE", "writeUInt8", "writeUIntBE", "writeUIntLE"]
// Object.getOwnPropertyNames(nw.Buffer.prototype.__proto__).sort()
["BYTES_PER_ELEMENT", "constructor"]
//Object.getOwnPropertyNames(nw.Buffer.prototype.__proto__.__proto__).sort()
["__nw_is_gta", "buffer", "byteLength", "byteOffset", "constructor", "copyWithin", "entries", "every", "fill", "filter", "find", "findIndex", "forEach", "includes", "indexOf", "join", "keys", "lastIndexOf", "length", "map", "reduce", "reduceRight", "reverse", "set", "slice", "some", "sort", "subarray", "toLocaleString", "toString", "values"]
//Object.getOwnPropertyNames(nw.Buffer.prototype.__proto__.__proto__.__proto__).sort()
["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljnwnw.Clipboard-function

name::
* McsEngl.Ljnwnw.Clipboard-function@cptIt,

_MEMBER:
// Ljnw.0-16-1
// Object.getOwnPropertyNames(nw.Clipboard).sort()
["get", "length", "name", "prototype"]
// Object.getOwnPropertyNames(nw.Clipboard.prototype).sort()
["clear", "constructor", "get", "readAvailableTypes", "set"]
//Object.getOwnPropertyNames(nw.Clipboard.prototype.__proto__).sort()["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljnwnw.Menu-function

name::
* McsEngl.Ljnwnw.Menu-function@cptIt,

_MEMBER:
// Ljnw.0-16-1
// Object.getOwnPropertyNames(nw.Menu).sort()
["getNSStringFWithFixup", "getNSStringWithFixup", "length", "name", "prototype"]
// Object.getOwnPropertyNames(nw.Menu.prototype).sort()
["append", "constructor", "createMacBuiltin", "insert", "items", "popup", "remove", "removeAt"]
// Object.getOwnPropertyNames(nw.Menu.prototype.__proto__).sort()
["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljnwnw.MenuItem-function

name::
* McsEngl.Ljnwnw.MenuItem-function@cptIt,

_MEMBER:
// Ljnw.0-16-1
// Object.getOwnPropertyNames(nw.MenuItem).sort()
["length", "name", "prototype", "super_"]
// Object.getOwnPropertyNames(nw.MenuItem.prototype).sort()
["checked", "constructor", "enabled", "handleGetter", "handleSetter", "icon", "iconIsTemplate", "key", "label", "modifiers", "native", "submenu", "tooltip", "type"]
// Object.getOwnPropertyNames(nw.MenuItem.prototype.__proto__).sort()
["_events", "_maxListeners", "addListener", "constructor", "domain", "emit", "eventNames", "getMaxListeners", "listenerCount", "listeners", "on", "once", "prependListener", "prependOnceListener", "removeAllListeners", "removeListener", "setMaxListeners"]
// Object.getOwnPropertyNames(nw.MenuItem.prototype.__proto__.__proto__).sort()
["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljnwnw.Obj-object

name::
* McsEngl.Ljnwnw.Obj-object@cptIt,

_MEMBER:
// Ljnw.0-16-1
// Object.getOwnPropertyNames(nw.Obj).sort()
["allocateId", "callObjectMethod", "callObjectMethodAsync", "callObjectMethodSync", "create", "destroy"]
// Object.getOwnPropertyNames(nw.Obj.__proto__).sort()["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljnwnw.Screen-object

name::
* McsEngl.Ljnwnw.Screen-object@cptIt,

_MEMBER:
// Ljnw.0-16-1
// Object.getOwnPropertyNames(nw.Screen).sort()
["DesktopCaptureMonitor", "Init", "_events", "_eventsCount", "_maxListeners", "cancelChooseDesktopMedia", "chooseDesktopMedia", "domain", "screens"]
// Object.getOwnPropertyNames(nw.Screen.__proto__).sort()
["_events", "_maxListeners", "addListener", "constructor", "domain", "emit", "eventNames", "getMaxListeners", "listenerCount", "listeners", "on", "once", "prependListener", "prependOnceListener", "removeAllListeners", "removeListener", "setMaxListeners"]
// Object.getOwnPropertyNames(nw.Screen.__proto__.__proto__).sort()["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljnwnw.Shell-object

name::
* McsEngl.Ljnwnw.Shell-object@cptIt,

_MEMBER:
// Ljnw.0-16-1
// Object.getOwnPropertyNames(nw.Shell).sort()
["openExternal", "openItem", "showItemInFolder"]
// Object.getOwnPropertyNames(nw.Shell.__proto__).sort()["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljnwnw.Shortcut-function

name::
* McsEngl.Ljnwnw.Shortcut-function@cptIt,

_MEMBER:
// Ljnw.0-16-1
// Object.getOwnPropertyNames(nw.Shortcut).sort()
["length", "name", "prototype", "registerGlobalHotKey", "super_", "unregisterGlobalHotKey"]
// Object.getOwnPropertyNames(nw.Shortcut.prototype).sort()
["constructor"]
// Object.getOwnPropertyNames(nw.Shortcut.prototype.__proto__).sort()
["_events", "_maxListeners", "addListener", "constructor", "domain", "emit", "eventNames", "getMaxListeners", "listenerCount", "listeners", "on", "once", "prependListener", "prependOnceListener", "removeAllListeners", "removeListener", "setMaxListeners"]
// Object.getOwnPropertyNames(nw.Shortcut.prototype.__proto__.__proto__).sort()["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljnwnw.Tray-function

name::
* McsEngl.Ljnwnw.Tray-function@cptIt,

_MEMBER:
// Ljnw.0-16-1
// Object.getOwnPropertyNames(nw.Tray).sort()["length", "name", "prototype", "super_"]
// Object.getOwnPropertyNames(nw.Tray.prototype).sort()["alticon", "constructor", "handleGetter", "handleSetter", "icon", "iconsAreTemplates", "menu", "remove", "title", "tooltip"]
// Object.getOwnPropertyNames(nw.Tray.prototype.__proto__).sort()["_events", "_maxListeners", "addListener", "constructor", "domain", "emit", "eventNames", "getMaxListeners", "listenerCount", "listeners", "on", "once", "prependListener", "prependOnceListener", "removeAllListeners", "removeListener", "setMaxListeners"]

Ljnwnw.Window-object

name::
* McsEngl.Ljnwnw.Window-object@cptIt,

_MEMBER:
// Ljnw.0-16-1
// Object.getOwnPropertyNames(nw.Window).sort()["LoadingStateChanged", "get", "onClose", "onDocumentEnd", "onDocumentStart", "onNavigation", "onNewWinPolicy", "onZoom", "open"]
// Object.getOwnPropertyNames(nw.Window.__proto__).sort()["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

_ADDRESS.WPG:
* https://github.com/nwjs/nw.js/wiki/window,

Ljnwnw.--dirname

name::
* McsEngl.Ljnwnw.--dirname@cptIt,

_MEMBER:
// Ljnw.0-16-1
// "\dirLjn\dirNw\nw-sample-apps\menus"
// Object.getOwnPropertyNames(nw.__dirname).sort()["0", "1", "10", "11", "12", "13", "14", "15", "16", "17", "18", "19", "2", "20", "21", "22", "23", "24", "25", "26", "27", "28", "29", "3", "30", "31", "32", "33", "34", "35", "4", "5", "6", "7", "8", "9", "length"]

Ljnwnw.--filename

name::
* McsEngl.Ljnwnw.--filename@cptIt,

_MEMBER:
// Ljnw.0-16-1
// "\dirLjn\dirNw\nw-sample-apps\menus/index.html"

Ljnwnw.global

name::
* McsEngl.Ljnwnw.global@cptIt,

_MEMBER:
// Ljnw.0-16-1
// same with window
// Object.getOwnPropertyNames(nw.global).sort() Array[730]

Ljnwnw.process-object

name::
* McsEngl.Ljnwnw.process-object@cptIt,

_MEMBER:
// Ljnw.0-16-1
// Object.getOwnPropertyNames(nw.process).sort()["EventEmitter", "__nwjs", "_debugEnd", "_debugPause", "_debugProcess", "_events", "_eventsCount", "_exiting", "_fatalException", "_getActiveHandles", "_getActiveRequests", "_kill", "_linkedBinding", "_maxListeners", "_needImmediateCallback", "_promiseRejectEvent", "_rawDebug", "_setupDomainUse", "_startProfilerIdleNotifier", "_stopProfilerIdleNotifier", "_tickCallback", "_tickDomainCallback", "abort", "arch", "argv", "assert", "binding", "chdir", "config", "cpuUsage", "cwd", "debugPort", "dlopen", "domain", "emitWarning", "env", "execArgv", "execPath", "exit", "features", "hrtime", "kill", "mainModule", "memoryUsage", "moduleLoadList", "nextTick", "openStdin", "pid", "platform", "reallyExit", "release", "stderr", "stdin", "stdout", "title", "umask", "uptime", "version", "versions"]
// Object.getOwnPropertyNames(nw.process.__proto__).sort()
["constructor"]
// Object.getOwnPropertyNames(nw.process.__proto__.__proto__).sort()["_events", "_maxListeners", "addListener", "constructor", "domain", "emit", "eventNames", "getMaxListeners", "listenerCount", "listeners", "on", "once", "prependListener", "prependOnceListener", "removeAllListeners", "removeListener", "setMaxListeners"]
// Object.getOwnPropertyNames(nw.process.__proto__.__proto__.__proto__).sort()["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljnwnw.require-function

name::
* McsEngl.Ljnwnw.require-function@cptIt,

_MEMBER:
// Ljnw.0-16-1
// Object.getOwnPropertyNames(nw.require).sort()["arguments", "cache", "caller", "extensions", "length", "name", "prototype", "resolve"]
// Object.getOwnPropertyNames(nw.require.prototype).sort()["constructor"]
// Object.getOwnPropertyNames(nw.require.prototype.__proto__).sort()["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljnwnw.test-object

name::
* McsEngl.Ljnwnw.test-object@cptIt,

_MEMBER:
// Ljnw.0-16-1
// Object.getOwnPropertyNames(nw.test).sort()
["assert", "crashRenderer", "done", "fail"]
// Object.getOwnPropertyNames(nw.test.__proto__).sort()["__defineGetter__", "__defineSetter__", "__lookupGetter__", "__lookupSetter__", "__proto__", "constructor", "hasOwnProperty", "isPrototypeOf", "propertyIsEnumerable", "toLocaleString", "toString", "valueOf"]

Ljnwapi'Resource

name::
* McsEngl.Ljnwapi'Resource@cptIt,

_ADDRESS.WPG:
* https://github.com/nwjs/nw.js/wiki/API-Overview-and-Notices,

Ljnwalgo.PROGRAM (Ljnwp)

name::
* McsEngl.Ljnwalgo.PROGRAM (Ljnwp)@cptIt,
* McsEngl.node-webkit-program@cptIt,
* McsEngl.nwk'application@cptIt,
* McsEngl.nwp@cptIt,

Ljnwp'executing

name::
* McsEngl.Ljnwp'executing@cptIt,

1) zipped:
* zip the program files into: 'app.nw'
* put the zip on nw dir.
* run nw app.nw

2) zippedNo:
In app dir '\nw\nw .'
===
* put nw.exe on same dir with program.
* run nw app.html

Ljnwp'file

name::
* McsEngl.Ljnwp'file@cptIt,

Ljnwp'file.PACKAGE.JSON

name::
* McsEngl.Ljnwp'file.PACKAGE.JSON@cptIt,
* McsEngl.Ljnw'manifest-file@cptIt,
* McsEngl.Ljnw'package.json@cptIt,

_ADDRESS.WPG:
* https://github.com/nwjs/nw.js/wiki/Manifest-format,

Ljnwp'package.json:
* put it on root dir.
"name": "simple-text-editor",
"main": "index.html",
"window": {
"toolbar": false //hide address bar
"icon":"static/img/logo.png",  
"position": "center",
"width": 1000,
"height": 800
}

nwp'program.html, nwp'main.html, nwp'index.html:
As with a conventional single page application, the “main” HTML file must include necessary JavaScript and CSS.
[http://strongloop.com/strongblog/creating-desktop-applications-with-node-webkit/]

nwp'program.js:

Ljnwp'nodejs-functionality

name::
* McsEngl.Ljnwp'nodejs-functionality@cptIt,

_DESCRIPTION:
node-webkit can include any module in your application’s node_modules directory by using a “require” statement, as the example below shows.
<!DOCTYPE html>
<html>
<head>

</head>
<body>
<script>
var markdown = require('markdown').markdown;
document.write(markdown.toHTML("Hello **World**!"));
</script>
</body>
</html>
[http://strongloop.com/strongblog/creating-desktop-applications-with-node-webkit/]

Ljnwp'packaging

name::
* McsEngl.Ljnwp'packaging@cptIt,

SPECIFIC

Ljnwp.specific,

_SPECIFIC:
* https://github.com/zcbenz/nw-sample-apps,
* http://www.codeproject.com/Articles/996558/Node-Webkit-NW-js-tutorial-creating-a-Markdown-edi,

Ljnw'Human

name::
* McsEngl.Ljnw'Human@cptIt,

Wang.Roger

name::
* McsEngl.Wang.Roger@cptIt,
* McsEngl.human.Wang.Roger@cptIt,
* McsEngl.Roger-Wang@cptIt,

_DESCRIPTION:
Roger Wang, the creator of node-webkit ... The node-webkit project currently has almost 15000 Stars and over 1600 Forks on GitHub and it’s a very popular open source project built by a Chinese developer.
[http://yedingding.com/2014/08/01/node-webkit-intro-en.html]

_ADDRESS.WPG:
* https://twitter.com/wwr,

Ljnw'Resource

name::
* McsEngl.Ljnw'Resource@cptIt,

_ADDRESS.WPG:
* http://nwjs.io//
* https://github.com/nwjs,
* http://docs.nwjs.io/en/latest//
===
* https://github.com/rogerwang/node-webkit,

Ljnw'Tool

name::
* McsEngl.Ljnw'Tool@cptIt,

Ljnw'tool'Runtime (Ljnwr)

name::
* McsEngl.Ljnw'tool'Runtime (Ljnwr)@cptIt,

_OVERVIEW:
NW.js is an app runtime based on Chromium and node.js. You can write native apps in HTML and JavaScript with NW.js. It also lets you call Node.js modules directly from the DOM and enables a new way of writing native applications with all Web technologies.
[https://github.com/nwjs/nw.js#introduction]

_ADDRESS.WPG:
* https://www.npmjs.com/package/nw,

Ljnw.EVOLUTING

name::
* McsEngl.Ljnw.EVOLUTING@cptIt,

{time.2011}
===
The node-webkit project was started in 2011. It is an app runtime that allows developers to use Web technologies (i.e. HTML5, CSS and JavaScript) to develop native apps. As developers, we only need to maintain one codebase which can be compiled to Windows, Mac and Linux native apps.
[http://yedingding.com/2014/08/01/node-webkit-intro-en.html]

FvMcs.stmCmr.COMPUTER-MACHINE-(cmr)

name::
* McsEngl.conceptIt227,
* McsEngl.COMPUTER,
* McsEngl.computer,
* McsEngl.stmCmr.COMPUTER-MACHINE-(cmr)@cptIt,
* McsEngl.FvMcs.stmCmr.COMPUTER-MACHINE-(cmr)@cptIt,
* McsEngl.cmpr@cptIt, {2013-03-25}
* McsEngl.cmr@cptIt, {2013-07-17}
* McsEngl.computational-system@cptIt,
* McsEngl.computer@cptIt,
* McsEngl.computer-machine@cptIt,
* McsEngl.computer-system.machine@cptIt,
* McsEngl.computer-system.networkNo@cptIt,
* McsEngl.computer-system.stand-alone@cptIt,
* McsEngl.data-machine@cptIt, {2007-12-03}
* McsEngl.entity.whole.system.it.hard-soft.computer@cptIt, {2012-07-21}
* McsEngl.information-machine@cptIt, {2014-02-02}
* McsEngl.Information-machine-system@cptIt,
* McsEngl.informational-machine@cptIt,
* McsEngl.sysHardSoftComp@cptIt, {2011-09-07}
* McsEngl.systemHardawreSoftwareComputer@cptIt, {2011-09-07}
* McsEngl.the-machine-that-changed-the-world@cptIt,
====== lagoSinago:
* McsEngl.masnofo@lagoSngo, {2014-02-02}
* McsEngl.datocino@lagoSngo, {2007-12-03}
====== lagoGreek:
* McsElln.ΥΠΟΛΟΓΙΣΤΗΣ@cptIt227,
* McsElln.υπολογιστικό-σύστημα@cptIt,
* McsElln.Η/Υ@cptIt,
* McsElln.ΚΟΜΠΙΟΥΤΕΡ@cptIt227,
* McsElln.ΠΛΗΡΟΦΟΡΙΑΚΗ-ΜΗΧΑΝΗ@cptIt,
====== lagoEsperanto:
* McsEngl.komputero@lagoEspo,
* McsEspo.komputero@cptIt,
====== lagoChinese:
dian1nao3; computer,
dian1; electric; electricity; electrical,
nao3; brain,

COMPUTER-SYSTEM: i'm gonna use this name which denotes a functional-entity and
COMPUTER: for the hardware part of a computer-system.
[nikos, 1997jul]

Πιο σωστό όνομα για τα "computer" θα ήταν: φορείς-πληροφορίας-precessing-machines. Γιατί ο φορέας πληροφορίας μπορεί να είναι σύμβολα, ήχος, εικόνα.
[ΝΙΚΟΣ, ΑΠΡ 1990]

cmr'DEFINITION

DATOCINO is a MACHINE#cptCore444# that process DATA.
[KasNik, 2007-12-03]

A computer is a machine which manipulates data according to a list of instructions.
[http://en.wikipedia.org/wiki/Computer] 2008-01-06

COMPUTER or STAND-ALONE SYSTEM is an INFORMATION-MACHINE-SYSTEM#cptIt453# whose the information-machine is a STAND-ALONE#cptIt455# one, not a network.
[NIKOS, 24 SEP. 1994]

sythetic

COMPUTER is ΟΝΕ (independent) machine of software and hardware that process information
[NIKOS, oct 1993]

It is a machine that process human information.

cmr'WHOLE

_WHOLE:
* system.it_human#cptItsoft180#
* network.computer#cptIt21#

cmr'whole.SYSTEM-HUMAN

_CREATED: {2011-09-08}

name::
* McsEngl.cmr'whole.SYSTEM-HUMAN@cptIt,
* McsEngl.conceptIt227.9,
* McsEngl.sysDataComp@cptIt227.9, {2011-09-08}
* McsEngl.sysDataComputer@cptIt227.9, {2011-09-08}
* McsEngl.systemComputer@cptIt227.9, {2011-09-08}

_GENERIC:
* entity.whole.system.it_human#cptItsoft180#

_DESCRIPTION:
It is a computer plus the humans who related to it.
[hmnSngo.2011-09-08]

cmr'ENVIRONMENT#cptCore756#

name::
* McsEngl.cmr'ENVIRONMENT@cptIt,

computer system & CAPITALISM

ΠΛΗΡΟΦΟΡΙΑΚΕΣ ΜΗΧΑΝΕΣ, είναι οι "παραγωγικές δυνάμεις" που θα σπάσουν τα δεσμά των καπιταλιστικών "παραγωγικών σχέσεων".
[ΝΙΚΟΣ, 13 ΜΑΙΟΥ 1988]

cmr'PART

_PART:
* HARDWARE:
* battery#ql:computer_battery_cp*#
* box#cptItsoft983#
* bus#cptItsoft71#
* DISPLAY#cptItsoft42#
* extention-card#cptItsoft979#
* keyboard#cptItsoft980#
* MOTHERBOARD#cptItsoft984#
 battery#cptItsoft409#
 bios#cptIt998#
 clock#cptItsoft229#
 slot#cptItsoft985#
* PROCESSOR/CPU#cptIt13#
* RAM#cptItsoft140#
* power-supply-unit#cptItsoft527#
* STORAGE#cptIt14#
===
COMPUTER MEMORY#cptItsoft999#:
* MAIN MEMORY (RAM)#cptIt140#
* CACHE-MEMORY#cptIt89#
* SECODARY MEMORY (STORAGE)#cptIt14#
* VIDEO MEMORY#cptIt510#
===
SOFTWARE#cptIt64#
===
ΣΥΝΔΕΣΜΟΛΟΓΙΑ:
* το κόκκινο μέρος από τα καλώδια cd πάνε δεξιά. Η τροφοδοσία επίσης δεξιά το κόκκινο.

cmr'part.ARCHITECTURE

_CREATED: {2007-12-29}

NAME

name::
* McsEngl.cmr'part.ARCHITECTURE@cptIt,
* McsEngl.conceptIt417,
* McsEngl.cmr'architecture@cptIt,
* McsEngl.architecture-of-computer-system@cptIt417, {2007-12-29}
* McsEngl.computer-architecture@cptIt417,

_TIME:
The term “architecture” in computer literature can be traced to the work of Lyle R. Johnson, Muhammad Usman Khan and Frederick P. Brooks, Jr., members in 1959 of the Machine Organization department in IBM’s main research center.
[http://en.wikipedia.org/wiki/Computer_architecture]

DEFINITION

_DESCRIPTION:
In computer science and engineering, computer architecture is a set of disciplines that describes a computer system by specifying its parts and their relations.

For example, at a high level, computer architecture may be concerned with how the central processing unit (CPU) acts and how it uses computer memory. Some fashionable (2011) computer architectures include cluster computing and Non-Uniform Memory Access.

Computer architects use computers to design new computers. Emulation software can run programs written in a proposed instruction set. While the design is very easy to change at this stage, compiler designers often collaborate with the architects, suggesting improvements in the instruction set. Modern emulators may measure time in clock cycles: estimate energy consumption in joules, and give realistic estimates of code size in bytes. These affect the convenience of the user, the life of a battery, and the size and expense of the computer's largest physical part: its memory. That is, they help to estimate the value of a computer design.
[http://en.wikipedia.org/wiki/Computer_architecture]

_DESCRIPTION:
In computer engineering, computer architecture is the conceptual design and fundamental operational structure of a computer system. It is a blueprint and functional description of requirements (especially speeds and interconnections) and design implementations for the various parts of a computer — focusing largely on the way by which the central processing unit (CPU) performs internally and accesses addresses in memory.
It may also be defined as the science and art of selecting and interconnecting hardware components to create computers that meet functional, performance and cost goals.
[http://en.wikipedia.org/wiki/Computer_architecture]

cmrarc'GENERIC

_GENERIC:
* architecture#cptCore765.3#

cmrarc'WHOLE

_WHOLE:
* science.computer#cptCore478#

cmrarc'PART

Computer architecture comprises at least three main subcategories[1]

* Instruction set architecture, or ISA, is the abstract image of a computing system that is seen by a machine language (or assembly language) programmer, including the instruction set, memory address modes, processor registers, and address and data formats.

* Microarchitecture, also known as Computer organization is a lower level, more concrete, description of the system that involves how the constituent parts of the system are interconnected and how they interoperate in order to implement the ISA.[2] The size of a computer's cache for instance, is an organizational issue that generally has nothing to do with the ISA.

* System Design which includes all of the other hardware components within a computing system such as:
1. system interconnects such as computer buses and switches
2. memory controllers and hierarchies
3. CPU off-load mechanisms such as direct memory access
4. issues like multi-processing.
[http://en.wikipedia.org/wiki/Computer_architecture]

cmrarc'ISAql:processor_architecture-*##

name::
* McsEngl.cmrarc'ISAql:processor_architecture-*@cptIt,

cmrarc'design

name::
* McsEngl.cmrarc'design@cptIt,

cmrarc'implementation

name::
* McsEngl.cmrarc'implementation@cptIt,

SPECIFIC

There are many types of computer architectures:
Quantum computer vs Chemical computer
Scalar processor vs Vector processor
Non-Uniform Memory Access (NUMA) computers
Register machine vs Stack machine
Harvard architecture vs von Neumann architecture
Cellular architecture
Majorly there are only two types of architecture Von Neumann and non-Von Neumann architecture.
[http://en.wikipedia.org/wiki/Computer_architecture]

cmrarc.VON-NEUMANN-ARCHITECTURE

name::
* McsEngl.cmrarc.VON-NEUMANN-ARCHITECTURE@cptIt,

The von Neumann architecture is a computer design model that uses a processing unit and a single separate storage structure to hold both instructions and data. It is named after mathematician and early computer scientist John von Neumann. Such a computer implements a universal Turing machine, and the common "referential model" of specifying sequential architectures, in contrast with parallel architectures. The term "stored-program computer" is generally used to mean a computer of this design, although as modern computers are usually of this type, the term has fallen into disuse.
[http://en.wikipedia.org/wiki/Von_Neumann_architecture]

cmrarc.HARVARD-ARCHITECTURE

name::
* McsEngl.cmrarc.HARVARD-ARCHITECTURE@cptIt,

Harvard architecture is a computer architecture with physically separate storage and signal pathways for instructions and data. The term originated from the Harvard Mark I relay-based computer, which stored instructions on punched tape (24 bits wide) and data in electro-mechanical counters (23 digits wide). These early machines had limited data storage, entirely contained within the data processing unit, and provided no access to the instruction storage as data, making loading and modifying programs an entirely offline process.
[http://en.wikipedia.org/wiki/Harvard_architecture]

cmrarc.RECONFIGURABLE-COMPUTING

name::
* McsEngl.cmrarc.RECONFIGURABLE-COMPUTING@cptIt,

Reconfigurable computing is a computing paradigm combining some of the flexibility of software with the high performance of hardware by processing with very flexible high speed computing fabrics like FPGAs. The principal difference when compared to using ordinary microprocessors is the ability to make substantial changes to the data path itself in addition to the control flow. On the other hand, the main difference with custom hardware (ASICs) is the possibility to adapt the hardware during runtime by "loading" a new circuit on the reconfigurable fabric.
[http://en.wikipedia.org/wiki/Reconfigurable_Computing]

cmr'part.BOX

NAME

name::
* McsEngl.cmr'part.BOX@cptIt,
* McsEngl.conceptIt983,
* McsEngl.computer's-box@cptIt,
* McsEngl.computer'box@cptIt983,
====== lagoGreek:
* McsElln.ΚΟΥΤΙ-ΥΠΟΛΟΓΙΣΤΗ@cptIt,

DEFINITION

MOTHERBOARD#cptIt984#

Motherboard#cptIt984: attPar#

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt983#

ATX box

Η ποιότητα του κουτιού αυτού, με ATX μητρική, είναι ανεβασμένη σε σχέση με το κλασσικό, είναι πιό ακριβό και δεν υπάρχει συμβατότητα.

cmr'part.BUS

NAME

name::
* McsEngl.cmr'part.BUS@cptIt,
* McsEngl.conceptIt71,
* McsEngl.computer's-bus@cptIt71,
* McsEngl.BUS@cptIt,
* McsEngl.bus@cptIt71,
====== lagoGreek:
* McsElln.ΑΡΤΗΡΙΑ@cptIt,
* McsElln.ΚΑΝΑΛΙ-ΔΕΔΟΜΕΝΩΝ@cptIt,
* McsElln.ΔΙΑΥΛΟΣ-ΔΕΔΟΜΕΝΩΝ@cptIt,

DEFINITION

In computer architecture, a bus is a subsystem that transfers data between computer components inside a computer or between computers. Unlike a point-to-point connection, a bus can logically connect several peripherals over the same set of wires. Each bus defines its set of connectors to physically plug devices, cards or cables together.
Early computer buses were literally parallel electrical buses with multiple connections, but the term is now used for any physical arrangement that provides the same logical functionality as a parallel electrical bus. Modern computer buses can use both parallel and bit-serial connections, and can be wired in either a multidrop (electrical parallel) or daisy chain topology, or connected by switched hubs, as in the case of USB.
[http://en.wikipedia.org/wiki/Computer_bus]

Μέσα στον υπολογιστη τα χαμηλής ισχύος ηλεκτρικα σήματα που αντιπροσωπεύουν ψηφιακά δεδομένα κινούνται μεσα σε 8, 16, ή 32 παράλληλους αγωγούς που ονομάζοντα μαζί ΔΙΑΥΛΟΣ ΔΕΔΟΜΕΝΩΝ, DATA BUS.

BUS-ΑΡΤΗΡΙΑ. ΚΥΚΛΩΜΑΤΑ ΠΟΥ ΠΑΡΕΧΟΥΝ ΕΝΑ ΔΙΑΔΡΟΜΟ ΜΕΤΑΞΥ ΔΥΟ ή ΠΕΡΙΣΣΟΤΕΡΩΝ ΣΥΝΙΣΤΩΣΩΝ ΤΟΥ ΥΠΟΛΟΓΙΣΤΗ ΟΠΩΣ ΓΙΑ ΠΑΡΑΔΕΙΓΜΑ ΜΕΤΑΞΥ ΚΕΝΤΡΙΚΗΣ ΜΟΝΑΔΑΣ ΕΠΕΞΕΡΓΑΣΙΑΣ, ΚΥΡΙΑΣ ΜΝΗΜΗΣ ΚΑΙ ΠΕΡΙΦΕΡΕΙΑΚΩΝ.

bus'GENERIC

_GENERIC:
* device##

bus'ENVIRONMENT#cptCore756#

name::
* McsEngl.bus'ENVIRONMENT@cptIt,

bus'env.VESA

name::
* McsEngl.bus'env.VESA@cptIt,

ΕΝΩΣΗ ΟΛΩΝ ΤΩΝ ΚΑΤΑΣΚΕΥΑΣΤΩΝ ΗΛΕΚΤΡΟΝΙΚΩΝ ΓΙΑ ΕΙΚΟΝΑ.

bus'cable

name::
* McsEngl.bus'cable@cptIt,

bus'cable-length

name::
* McsEngl.bus'cable-length@cptIt,

USB:
The maximum length of a standard USB cable is 5.0 meters (16.4 ft).
[http://en.wikipedia.org/wiki/USB]

bus'connector

name::
* McsEngl.bus'connector@cptIt,

male (plug) and female (receptacle)

bus'external-internal

name::
* McsEngl.bus'external-internal@cptIt,

bus'frequency

name::
* McsEngl.bus'frequency@cptIt,

bus'hot-plugging

name::
* McsEngl.bus'hot-plugging@cptIt,

bus'transfre-rate

name::
* McsEngl.bus'transfre-rate@cptIt,
* McsEngl.Bandwidth@cptIt,
* McsEngl.capacity@cptIt,
* McsEngl.performance@cptIt,
* McsEngl.communication-rate@cptIt,

USB: 12 or 480 Mbit/s

SATA: 1.5 Gbit/s, 3.0 Gbit/s

ATA: 16 MB/s originally later 33, 66, 100 and 133 MB/s

bus'usage

name::
* McsEngl.bus'usage@cptIt,

What they connect:
* STORAGE_DEVICE & MOTHERBOARD
* EXTENSION_CARD & MOTHERBOARD

WHAT THEY CARRY:
* DATA_BUS
* ADDRESS_BUS
* CONTROL_BUS

bus'width (PARALLEL-SERIAL-STYLE)

name::
* McsEngl.bus'width (PARALLEL-SERIAL-STYLE)@cptIt,

SPECIFIC

* bus.specific,

bus.SPECIFIC-DIVISION.BIT

name::
* McsEngl.bus.SPECIFIC-DIVISION.BIT@cptIt,


* 16_BIT_BUS
* 32_BIT_BUS
* 64_BIT_BUS

bus.SPECIFIC-DIVISION.PARALLEL-SERIAL

name::
* McsEngl.bus.SPECIFIC-DIVISION.PARALLEL-SERIAL@cptIt,


* PARALLEL_BUS:
* SERIAL_BUS:

bus.SPECIFIC-DIVISION.INTERNAL-EXTERNAL

name::
* McsEngl.bus.SPECIFIC-DIVISION.INTERNAL-EXTERNAL@cptIt,


* INTERNAL_BUS:
Parallel
* ASUS Media Bus proprietary, used on some ASUS Socket 7 motherboards
* CAMAC for instrumentation systems
* Extended ISA or EISA
* Industry Standard Architecture or ISA
* Low Pin Count or LPC
* MicroChannel or MCA
* MBus
* Multibus for industrial systems
* NuBus or IEEE 1196
* OPTi local bus used on early Intel 80486 motherboards.
* Peripheral Component Interconnect or PCI
* S-100 bus or IEEE 696, used in the Altair and similar microcomputers
* SBus or IEEE 1496
* VESA Local Bus or VLB or VL-bus
* VMEbus, the VERSAmodule Eurocard bus
* STD Bus for 8- and 16-bit microprocessor systems
* Unibus
* Q-Bus
Serial
* 1-Wire
* HyperTransport
* I²C
* PCI Express or PCIe
* Serial Peripheral Interface Bus or SPI bus
* FireWire i.Link or IEEE 1394


* EXTERNAL_BUS:
Serial
* USB Universal Serial Bus, used for a variety of external devices
* Serial Attached SCSI and other serial SCSI buses
* serial ATA
* Controller Area Network ("CAN bus")
* EIA-485
* FireWire
Parallel
* Advanced Technology Attachment or ATA (aka PATA, IDE, EIDE, ATAPI, etc.) disk/tape peripheral attachment bus
(the original ATA is parallel, but see also the recent serial ATA)
* HIPPI HIgh Performance Parallel Interface
* IEEE-488 (aka GPIB, General-Purpose Instrumentation Bus, and HPIB, Hewlett-Packard Instrumentation Bus)
* PC card, previously known as PCMCIA, much used in laptop computers and other portables, but fading with the introduction of USB and built-in network and modem connections
* SCSI Small Computer System Interface, disk/tape peripheral attachment bus

bus.ALPHABETICALLY

name::
* McsEngl.bus.ALPHABETICALLY@cptIt,


* PCI_EXPRESS
* PCI
* AGP
* USB
* ISA
* EISA
*

bus.PCI-EXPRESS

name::
* McsEngl.bus.PCI-EXPRESS@cptIt,
* McsEngl.pci-express@cptIt71i,
* McsEngl.pci-e@cptIt71i,
* McsEngl.pcie@cptIt71i,

_DEFINITION:
PCI Express, officially abbreviated as PCI-E or PCIe, is a computer expansion card interface format introduced by Intel in 2004. It was designed to replace the general-purpose PCI expansion bus, the high-end PCI-X bus and the AGP graphics card interface. Unlike previous PC expansion interfaces, rather than being a bus it is structured around point-to-point full duplex serial links called lanes. In PCIe 1.1 (the most common version as of 2007) each lane carries 250 MB/s (250 million bytes per second) in each direction. PCIe 2.0 doubles this and PCIe 3.0 doubles it again.
[http://en.wikipedia.org/wiki/PCI_Express]

bus.PCI (PERIPHERAL COMPONENT INTERFACE)

name::
* McsEngl.bus.PCI (PERIPHERAL COMPONENT INTERFACE)@cptIt,
* McsEngl.pci@cptIt71i,

_DEFINITION:
* Η ΚΑΙΝΟΥΡΓΙΑ ΠΡΟΔΙΑΓΡΑΦΗ ΤΗΣ INTEL ME ΣΚΟΠΟ ΤΗ ΔΗΜΙΟΥΡΓΙΑ ΕΝΟΣ ΓΡΗΓΟΡΟΥ ΤΡΟΠΟΥ ΜΕΤΑΦΟΡΑΣ ΤΩΝ ΔΕΔΟΜΕΝΩΝ ΜΕ 32 bits ΠΛΑΤΟΣ ΚΑΙ 33 MHz, ΩΣΤΕ ΟΙ ΕΠΕΡΧΟΜΕΝΕΣ ΕΦΑΡΜΟΓΕΣ MULTIMEDIA ΝΑ ΜΗΝ ΚΑΘΥΣΤΕΡΟΥΝΤΑΙ ΑΠΟ ΤΟΝ ΠΕΡΙΟΡΙΣΜΟ ΠΟΥ ΘΕΤΕΙ ΤΟ ΧΑΜΗΛΩΝ ΤΑΧΥΤΗΤΩΝ, ΜΕΧΡΙ ΣΗΜΑΡΑ, BUS.
[COMPUTER ΓΙΑ ΟΛΟΥΣ, ΦΕΒ 1993, 17]

3 ΟΙΚΟΓΕΝΕΙΕΣ ΕΠΕΞΕΡΓΑΣΤΩΝ ΕΧΟΥΝ ΑΝΑΚΟΙΝΩΣΕΙ ΟΤΙ ΤΟ ΥΠΟΣΤΗΡΙΖΟΥΝ. PowerPC, DEC Alpha, Intel. ΕΤΙΣ ΜΙΑ ΚΑΡΤΑ ΟΘΟΝΗΣ ΘΑ ΜΠΟΡΕΙ ΝΑ ΜΠΕΙ ΣΕ MAC, DEC etc.
- ΓΙΑ ΣΥΣΤΗΜΑΤΑ Pentium H INTEL ΚΥΚΛΟΦΟΡΙΣΕ ΤΣΙΠΣΕΤ ΕΠΙΚΟΙΝΩΝΙΑΣ ΣΤΑ 64bit.
[RAM, SEP 1993, 31]

ΕΝΑ ΜΕΓΑΛΟ ΠΛΕΟΝΕΚΤΗΜΑ ΕΙΝΑΙ Η ΑΥΤΟΜΑΤΗ ΕΓΚΑΤΑΣΤΑΣΗ. ΚΑΘΕ ΚΑΡΤΑ ΕΧΕΙ ΑΠΟΘΗΚΕΥΜΕΝΕΣ ΤΙΣ ΑΠΑΡΑΙΤΗΤΕΣ ΠΛΗΡΟΦΟΡΙΕΣ ΓΙΑ ΤΗΝ ΕΓΚΑΤΑΣΤΑΣΗ ΤΗΣ.
[CHIP, JAN 1994, 86]

ΤΑΧΥΤΗΤΑ: 132Mbps. ΣΕ ΣΥΝΕΧΗ ΡΟΗ 80Mbps.
[CHIP, JAN 1994, 86]

Year created:  July 1993
Created by:  Intel
Superseded by:  PCI Express (2004)
Width:  32 bits
Number of devices:  1 per slot
Capacity  133 MB/s
Style:  Parallel
Hotplugging?  no
External?  no
[http://en.wikipedia.org/wiki/Peripheral_Component_Interconnect]

bus.AGP (Accelerated Graphics Port)

name::
* McsEngl.bus.AGP (Accelerated Graphics Port)@cptIt,

Θα το υποστηρίζουν οι μελλοντικοι P6 και η αποδοσή τους θα αυξηθεί κατά 50%
[ΡΑΜ, ΟΚΤ. 1996, 26]

bus.ISA (Industry Standard Architecture)

name::
* McsEngl.bus.ISA (Industry Standard Architecture)@cptIt,
* McsEngl.ISA-bus@cptIt71i,
* McsElln.ΓΝΩΣΤΟΣ-ΚΑΙ-AT-BUS@cptIt,

_DEFINITION:
Industry Standard Architecture (in practice almost always shortened to ISA) was a computer bus standard for IBM compatible computers.
[http://en.wikipedia.org/wiki/Industry_Standard_Architecture]

Year created:    1981
Created by:  IBM
Superseded by:  PCI (1993)
Width:    8 or 16 bits
Number of devices:  1 per slot
Capacity    8 MHz
Style:    Parallel
Hotplugging?  no
External?    no
[http://en.wikipedia.org/wiki/Industry_Standard_Architecture]

ΤΩΡΑ ΜΠΟΡΕΙ ΝΑ ΑΝΑΓΝΩΡΙΖΟΝΤΑΙ ΑΥΤΟΜΑΤΑ ΤΑ IRQ.

ΤΑΧΥΤΗΤΑ:
Η ΜΕΓΙΣΤΗ ΜΕΤΑΞΥ 4-8Mbps.

bus.EISA (Extended Industry Standard Architecture)

name::
* McsEngl.bus.EISA (Extended Industry Standard Architecture)@cptIt,

Συμβατή με IBM AT.
Η μέγιστη ταχύτητα είναι 33MBps.
ΕΙΝΑΙ 32ΜΠΙΤΟΣ.
1988 ΠΡΩΤΟΕΜΦΑΝΙΣΗ.

bus.LOCAL

name::
* McsEngl.bus.LOCAL@cptIt,

ΝΕΑ ΤΕΧΝΟΛΟΓΙΑ. Ο ΕΠΕΞΕΡΓΑΣΤΗΣ ΜΙΛΑ ΚΑΤ'ΕΥΘΕΙΑΝ ΣΤΑ ΠΕΡΙΦΕΡΕΙΑΚΑ.

bus.MCA (Micro Channel Architecture)

name::
* McsEngl.bus.MCA (Micro Channel Architecture)@cptIt,

ΙΒΜ

bus.USB (Universal Serial Bus)

name::
* McsEngl.bus.USB (Universal Serial Bus)@cptIt,
* McsEngl.USB@cptIt71i,

_DEFINITION:
Universal Serial Bus (USB) is a serial bus standard to interface devices. USB was designed to allow peripherals to be connected using a single standardized interface socket and to improve plug-and-play capabilities by allowing devices to be connected and disconnected without rebooting the computer (hot swapping). Other convenient features include providing power to low-consumption devices without the need for an external power supply and allowing many devices to be used without requiring manufacturer specific, individual device drivers to be installed.
...
Year created:  January 1996
Width:    1 bit
Number of devices:  127 per host controller
Capacity    12 or 480 Mbit/s
Style:    Serial
Hotplugging?  Yes
External?    Yes
[http://en.wikipedia.org/wiki/USB]

Μελλοντική υποστήριξη
[RAM, OKT. 1996, 26]

bus.16bit

name::
* McsEngl.bus.16bit@cptIt,

ISA

bus.32bit

name::
* McsEngl.bus.32bit@cptIt,

EISA,

PCI,

bus.64bit

name::
* McsEngl.bus.64bit@cptIt,

PCI,

bus.SATA

name::
* McsEngl.bus.SATA@cptIt,
* McsEngl.SATA@cptIt71i,
* McsEngl.serial-ATA@cptIt71i,

_DEFINITION:
Serial Advanced Technology Attachment (SATA, IPA: /?se?t?/ or /?s?t?/) is a computer bus primarily designed for transfer of data between a computer and storage devices (like hard disk drives or optical drives).
The main benefits are faster transfers, ability to remove or add devices while operating (hot swapping), thinner cables that let air cooling work more efficiently, and more reliable operation with tighter data integrity checks than the older Parallel ATA interface.
...
Year created:  2003
Number of devices:  1
Capacity    1.5 Gbit/s, 3.0 Gbit/s
Style:    Serial
Hotplugging?  Yes
External?    No, except eSATA
[http://en.wikipedia.org/wiki/Serial_ATA]

bus.IDE (ATA)

name::
* McsEngl.bus.IDE (ATA)@cptIt,
* McsEngl.PATA@cptIt71i,
* McsEngl.parallel-ATA@cptIt71i,
* McsEngl.ATA@cptIt71i,
* McsEngl.IDE.bus@cptIt71i,

_DEFINITION:
Advanced Technology Attachment (ATA) is a standard interface for connecting storage devices such as hard disks and CD-ROM drives inside personal computers.

The standard is maintained by X3/INCITS committee T13. Many synonyms and near-synonyms for ATA exist, including abbreviations such as IDE and ATAPI. Also, with the market introduction of Serial ATA in 2003, the original ATA was retroactively renamed Parallel ATA (PATA).

In line with the original naming, this article covers only Parallel ATA.

Parallel ATA standards allow cable lengths up to only 18 inches (46 centimeters) although cables up to 36 inches (91 cm) can be readily purchased. Because of this length limit, the technology normally appears as an internal computer storage interface. It provides the most common and the least expensive interface for this application.
...
Type    Internal storage device connector
Production history
Designer    Western Digital
Designed    1986
Superseded by  Serial ATA (2003)
Specifications
Hot pluggable  no
External    no
Width    16 bits
Bandwidth    16 MB/s originally later 33, 66, 100 and 133 MB/s
Max devices  2 (master/slave)
Protocol    Parallel
Cable    40 wire ribbon cable
Pins    40
[http://en.wikipedia.org/wiki/Integrated_Drive_Electronics]

ULTRA ATA/UDMA

EIDE

FAST ATA-2

bus.SCSI

name::
* McsEngl.bus.SCSI@cptIt,
* McsEngl.SCSI@cptIt71i,

O ελεγκτής πρέπει να αγοραστεί επιπλέον.

ULTRA SCSI

ULTRA SCSI-3

FAST WIDE SCSI-3

ULTRA FASTSCSI-3

cmr'part.EXTENTION-CARD

NAME

name::
* McsEngl.cmr'part.EXTENTION-CARD@cptIt,
* McsEngl.conceptIt979,
* McsEngl.card.extention@cptIt979,
* McsEngl.extention-card@cptIt,
* McsEngl.extention'card@cptIt979,
* McsElln.ΚΑΡΤΑ-ΕΠΕΚΤΑΣΗΣ@cptIt,
* McsElln.ΚΑΡΤΑ'ΕΠΕΚΤΑΣΗΣ@cptIt979,

GENERIC

_GENERIC:
* entity.economic.satisfierWorking.techInfo.hardware#cptItsoft1#

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt979#:
* AUDIO-CARD
* GRAPHICS-CARD
* NETWORK-CARD
* TV-CARD

TV-CARD {2003-02-22}

name::
* McsEngl.conceptIt979.1,
* McsEngl.tv'card@cptIt979.1,

SPECIFIC:
* PINACLE, good, €150 2003.02,

extcard.AUDIO

name::
* McsEngl.extcard.AUDIO@cptIt,
* McsEngl.conceptIt977,
* McsEngl.audio'card@cptIt977,
* McsEngl.audio-card@cptIt,
* McsEngl.sound-card@cptIt,
* McsElln.ΚΑΡΤΑ-ΗΧΟΥ@cptIt,

ΕΞΑΡΤΗΜΑΤΑ ΣΤΙΣ ΚΑΡΤΕΣ ΗΧΟΥ

CDROM CONTROLLER:
Οι καρτες αυτες ΕΙΝΑΙ ΠΟΛΥ ΠΡΑΚΤΙΚΕΣ ΓΙΑΤΙ ΜΠΟΡΟΥΜΕ ΝΑ ΕΧΟΥΜΕ ΤΟ CD DRIVE, ΧΩΡΙΣ ΤΗ ΔΙΚΙΑ ΤΟΥ ΚΑΡΤΑ.

CD port,

game port,

MIDI interface,

sequencer,

ΕΝΙΣΧΥΤΗΣ:
1-6 watt.

ΜΕΙΚΤΗΣ:

CD-AUDIO CONNECTOR

Ειδική θύρα που βρίσκεται στην κάρτα ήχου και χρησιμοποιείται για τη σύνδεση με το CDROM που βρίσκεται στον υπολογιστή σας. Επιτρέπει να ακούμε τα AUDIO-CD μέσω της κάρτας ήχου (από το speaker out) και να χειριζόμαστε όλες τις λειτουργίες από το περιβάλλον των windows.
[COMPUTER GO, APR. 1996, 183]

LINE-OUT

Ειδικός connector που βρίσκεται επάνω στις περισσότερες κάρτες ήχου και αναλαμβάνει να συνδέσει την κάρτα σας με ενισχυτές Hi-Fi. Το σήμα της εξόδου του line-out εχει διαφορετικό voltage από το σήμα που "βγαίνει" από την έξοδο speaker out.
[COMPUTER GO, APR. 1996, 183]

MIDI-INTERFACE#cptIt158#

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt977#

AUDIOMAN:
ΜΙΚΡΟΦΩΝΟ ΗΧΕΙΟ ΑΠΟ ΤΗ Logitech -altec 55000 drx.

16bit CARDS maker classification

Ad Lib:
πιο διαδεδωμένη απο Soundblaster.

AZI LABS:
MULTIMEDIA PRO 16:
MAKER: AZI labs.
VENDOR: INFOTRUST.
PRICE: 49000 +FPA (MAY 1994).

CARDINAL TECHNOLOGIES:
Digital Sound Pro, συμβατή με AdLib and SoundBlaster,
47000 +φπα δεκ.1994.
VENDOR: HARD&SOFT

COMPUMAN:
16 DSP:
VENDOR: HARD & SOFT.
PRICE: 47.000 +FPA, (MAY 1994). Διαθετει δικο της signal processor και ακριβα προγραμματα (αποκλειεται να κανεται λαθος. Κομπιουτερ για ολους)

CREATIVE LABS:
SOUNDBLASTER SCSI 16-2:
VENDOR: ΠΟΥΛΙΑΔΗΣ.
PRICE: 59000 +FPA (MAY 1994)

SOUNDBLASTER: 16 VALUE
VENDOR: ΠΟΥΛΙΑΔΗΣ
43000 δρχ + φπα δεκ.1994

SOUND BLASTER AWE 32

MALIFAX COMPUTERS:
SOUND VISION 16 AISP:
VENDOR: LIM CORPORATION.
PRICE: 38.500+FPA. Αριστη επιλογή. Κομπιουτερ για ολους.

MEDIA VISION:
audioport (external for notebooks)

MEDIA VISION 16 BASIC:
VENDOR: πουλιαδης.
PRICE: 47000 +FPA (MAY 1994)

MICROSOFT Windows Sound System:
16 bit, $290,

TURTLE BEACH SYSTEMS:
MONTE CARLO
VENDOR: ΠΟΥΛΙΑΔΗΣ
55000 δρχ +φπα δεκ.1994.

MONTEREY

MULTISOUND:
300,000 δρχ.. 2 κανάλια 140,000 drx(1992) ΠΟΥΛΙΑΔΗΣ.

QTRONIX STRATOS SOUND CARD:
VENDOR: DATAMICRO
PRICE: 39000 +FPA (may 1994)

ROLAND:

TRACK BLASTER:

YAMAHA SYSTEMS:

WAVE TABLE SYNTHETIC

Are the best

CREATIVE LABS
1. SoundBlaster AWE32 Pnp, 74500+ apr.1996
2. SoundBlaster 32 PnP, 50000+ apr.1996

YAMAHA
Sound Edge SW20-PC, 39000+ APR.1996

FM SYNTHETIC

MY CARD

SOUND BLASTER 32 PnP:
** 32voice wave-table synthesis
** www.creativelabs.com/ www.soundblaster.com

extcard.GRAPHICS

name::
* McsEngl.extcard.GRAPHICS@cptIt,
* McsEngl.conceptIt992,
* McsEngl.display-adapter@cptIt,
* McsEngl.graphics-board@cptIt,
* McsEngl.graphics'card@cptIt992,
* McsEngl.graphics-circuit@cptIt,
* McsEngl.graphics'circuit@cptIt992,
* McsEngl.video-adapter@cptIt,
* McsEngl.Video-card@cptIt,
* McsElln.ΕΠΙΤΑΧΥΝΤΗΣ-ΓΡΑΦΙΚΩΝ@cptIt,
* McsElln.ΚΑΡΤΑ-ΟΘΟΝΗΣ@cptIt,
* McsElln.ΚΑΡΤΑ-ΓΡΑΦΙΚΩΝ@cptIt,
* McsElln.ΚΑΡΤΑ-ΟΘΟΝΗΣ@cptIt,
* McsElln.ΚΥΚΛΩΜΑ-ΓΡΑΦΙΚΩΝ@cptIt,
* McsElln.ΠΡΟΣΑΡΜΟΓΕΑΣ-ΓΡΑΦΙΚΩΝ@cptIt,
* McsElln.ΠΡΟΣΑΡΜΟΣΤΗΣ-ΓΡΑΦΙΚΩΝ@cptIt,
* McsElln.ΠΡΟΣΑΡΜΟΣΤΗΣ-ΕΙΚΟΝΑΣ@cptIt,
* McsElln.ΠΡΟΣΑΡΜΟΣΤΗΣ-ΟΘΟΝΗΣ@cptIt,

DEFINITION

Το ΚΥΚΛΩΜΑ ΓΡΑΦΙΚΩΝ φροντίζει για τη μεταφορά στην οθόνη της εικόνας που βλέπουμε κάθε στιγμή και για την ανανέωσή της. Χειρίζεται όλες τις σχετικές λειτουργίες και η απόδοσή του έχει σοβαρή επίπτωση στη συνολική απόδοση του υπολογιστή.

Βρίσκεται ΕΙΤΕ ενσωματωμένο στη motherboard ΕΙΤΕ -συνηθέστερα- σε κάποια κάρτα που καταλαμβάνει μια από τις υποδοχές επέκτασης.

Η απόδοση της κάρτας στηρίζεται α) στις επιδόσεις του τσιπ επιτάχυνσης και β) στο είδος και την ποσότητα της μνήμης που διαθέτει.
[ΚΟΜΠΙΟΥΤΕΡ ΓΟ, ΔΕΚ. 1995, ΕΝΘΕΤΟ 29]

AGP

The biggest change in PC system architecture this year will be the arrival of the Advanced Graphics Port. AGP provides a separate, dedicated connection for the graphics controller, enabling the processor to send commands to the graphics chip faster and allowing the graphics controller to transfer data from main memory at a much higher rate. This latter feature will make it more practical to store memory-intensive 3-D texture maps in main memory, instead of requiring additional memory as part of the graphics subsystem. AGP in essence is an enhanced version of PCI that supports much higher transfer speeds. It allows only a single device to be connected, however, so it supplements, and does not replace, PCI.
To promote the transition to Slot 1, Intel does not plan to support AGP in its Pentium chip sets or motherboards. This presents Cyrix and AMD with a new challenge: Today, Intel chip sets predominate--even in systems using Cyrix and AMD CPUs. To move into the AGP era, system designers will have to depend on non-Intel chip sets to accompany non-Intel CPUs.
Several chip set makers have committed to producing AGP chip sets for Socket 7 processors. Implementing AGP is complex, however, and it remains to be seen whether these chip sets will deliver performance comparable to Intel's LX chip set for Pentium II systems. To help ensure that competitive AGP chips sets are available for the K6, AMD has gone into the chip set business itself. AGP chip sets from Intel and others are due this fall.
[http://www8.zdnet.com/pcmag/features/cpu/cpu4.htm, 1997aug]

COLOR

Η κάρτα πρέπει να έχει τη δυνατότητα απεικόνισης εκατομυρίων χρωμάτων.
[COMPUTER GO, JAN. 1996, ΕΝΘΕΤΟ 17]

EVOLUTION#cptCore546.171#

GRAPHICS-CHIP#cptIt967#

chip#cptIt967: attPar#

MEMORY CHIP#cptIt990#

Η μνήμη που μπορεί να χρησιμοποιήσει μια κάρτα είναι τύπου VRAM (videoRAM), DRAM (dynamicRAM), ή η πλέον σύγχρονη WRAM (windowRAM).
Η κύρια λειτουργική διαφορά ανάμεσα στους δυο πρώτους τύπους είναι ότι η μνήμη DRAM δεν επιτρεπει ταυτόχρονη πρόσβαση στα δεδομένα της από τον επεξεργαστή γραφικών και τον RAM-DAC (το μετατροπέα αλλαγής σήματος από ψηφιακό σε αναλογικό, κατάλληλο για την οθόνη), ενώ η VRAM το επιτρέπει. Η WRAM επιτρέπει ταυτόχρονη επικοινωνία αλλά έχει και ειδικές λειτουργίες υποστήριξης του επεξεργαστή γραφικών. Το αποτέλεσμα είναι ότι η διακίνηση των δεδομένων γίνεται ταχύτερα στη VRAM και τη WRAM και οι χρόνοι ανανέωσης της οθόνης που επιτυγχάνουν οι κάρτες γραφικών που βασίζονται σε αυτές είναι καλύτεροι από τους αντίστοιχους των καρτών που βασίζονται σε DRAM.
[ΚΟΜΠΙΟΥΤΕΡ ΓΟ, ΔΕΚ. 1995, ΕΝΘΕΤΟ 31]

Είναι πιό ακριβότερη από την 'κεντρική μνήμη'.
Ολα τα τσιπάκια της κάρτας πρέπει να είναι ίδιας μορφής (DRAM, VRAM)
[COMPUTER GO, APR. 1996, ΕΝΘΕΤΟ 40]

RESOLUTION

Η κάρτα πρέπει να απεικονίζει υψηλές αναλύσεις.
[COMPUTER GO, JAN. 1996, ΕΝΘΕΤΟ 17]

ΕΠΙΛΟΓΗ ΚΑΡΤΑΣ

Δώστε ιδιαίτερη προσοχή στην κάρτα γραφικών που θα οδηγήσει το monitor που επιλέξατε. Μία πολύ καλή καρτα με υψηλό refresh rate είναι άχρηστη άν το monitor που χρησιμοποιείται δεν μπορεί να σταθεί αξιοπρεπως πάνω απο 60Hz.
[COMPUTER GO, JUL. 1994, 95]

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt992#

COMPANY SPECIFIC-DIVISION

DIAMOND:
* 3D 2000, πολύ καλή.

Matrox Millennium:
* είχε το mmx computer of Dell

GENOA:
* PHANDOM 3D, S3 Virge chip, 4MB EDO RAM, 45000+ ΔΡΧ, Point Computers, okt.1996

TECH SPECIFIC-DIVISION


3270 PC  graphics adapter
AT&T 400-line graphics adapter
CGA,  {color graphics adapter} 16 COLORS
EGA,  {enhanced graphics adapter} IBM 1984 64 COLORS
HERCULES, graphic adapter (monochrome graphics) 1982
IBM 8514  graphics adapter
MCGA,  {multi color graphics adapter}
MDA,  IBM PC 1981 ΤΟ ΣΗΜΑ ΕΙΝΑΙ ΨΗΦΙΑΚΟ
SUPER VGA, 1988 ΑΠΟ VESA
VGA,  {video graphics array} IBM 1987 262 COLORS ΤΟ ΣΗΜΑ ΕΙΝΑΙ ΑΝΑΛΟΓΙΚΟ,
XGA  IBM 1991 ΤΑΥΤΟΧΡΟΝΑ ΓΙΝΕΤΑΙ ΜΕΛΟΣ ΤΟΥ VESA

Υπάρχει ειδική κατηγορία ΚΑΡΤΩΝ, οι accelerators, που φέρουν εξειδικευμένο επεξεργαστή που επιταχύνει τις λειτουργίες τους.
[COMPUTER GO, JAN. 1996, ΕΝΘΕΤΟ 17]

IBM PC του πέτρου

Του αγόρασα την Super VGA CARD, with trident TVGA 9000 chip. Manuals κουτι 10, μαζί με την παλιά κάρτα.

extcard.VIDEO

name::
* McsEngl.extcard.VIDEO@cptIt,
* McsEngl.conceptIt988,
* McsEngl.video-card@cptIt,
* McsElln.ΒΙΝΤΕΟΚΑΡΤΑ@cptIt,
* McsElln.ΚΑΡΤΑ-ΒΙΝΤΕΟ@cptIt,
* McsElln.ΚΑΡΤΑ-ΒΙΝΤΕΟΕΙΚΟΝΑΣ@cptIt,

Doing#cptCore475#

Σήμερα οι κάρτες βιντεοεικόνας για PC δρουν σε 3 επίπεδα:
1. παρουσίαση βιντεοεικόνας στην οθόνη
2. σύλληψη ακίνητων εικόνων από βίντεο και εγγραφή στο σκληρό δίσκο.
3. σύλληψη και εγγραφή βιντεοεικόνας στο σκληρό δίσκο.
[RAM, 1997FEB, 100]

resourceInfHmn#cptResource843#

1997feb:
RAM page100.

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt988#

VGA2TV M2100: (Genoa) DI-MICRO 340 Kifisias Ave., GR-15233 Chalendri, Athens tel 6844546
* AVA PRO, TVM.
* Screen Machine: 215.000 drx. fast hellas AE, Κηφισίας 196 Ψυχικό, 15452 Αθήνα, τηλ. 685.5689. Η FAST ειναι γερμανική εταιρία.
- SCREEN MACHINE II: (1993) ΕΙΝΑΙ Η ΠΡΩΤΗ ΚΑΡΤΑ overlay ΠΟΥ ΕΝΣΩΜΑΤΩΝΕΙ ΖΩΝΤΑΝΟ ΒΙΝΤΕΟ ΣΕ ΠΡΑΓΜΑΤΙΚΟ ΧΡΩΜΑ ΚΑΙ ΣΕ ΠΛΗΡΗ ΑΝΑΛΥΣΗ PAL.
ΥΠΟΣΤΗΡΙΖΕΙ ΤΗΝ MS-VIDEO FOR WINDOWS.
* VIDEO BLASTER: creative technology.
* VIDEO MACHINE, FAST, 700.000 DRX, PAL SECAM NTSC.

DIGITAL CARDS:
* ActionMedia II: intel
* Digital Machine: FAST, Χρησιμοποιεί τον i750 video processor of Intel.

Οι περισσότερες καρτες ΔΕΝ ψηφιοποιούν το video, αλλά είναι σε θέση να το μεταφέρουν από το VCR στην οθόνη του υπολογιστη.

Η ψηφιακή τεχνολογία της Intel and IBM που σημπιέζουν βίντεο σε πραγματικό χρόνο και αποθηκεύουν 72 λεπτά σε ένα CD.
Η ποιότητα του ψηφιακού ήχου ΔΕΝ ΦΤΑΝΕΙ τον αναλογικό.

TELEVISION ADAPTER

Win/tv, Hauppauge Computer Works tel 516-4341600...$500

cmr'part.KEYBOARD

NAME

name::
* McsEngl.cmr'part.KEYBOARD@cptIt,
* McsEngl.conceptIt980,
* McsEngl.keyboard@cptIt980,
* McsElln.ΠΛΗΚΤΡΟΛΟΓΙΟ@cptIt980,

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt980#

MY KEYBOARD (K6)

EKB-804, 15.340 {1997-09-09} Δρούγκας

cmr'part.MOTHERBOARD

NAME

name::
* McsEngl.cmr'part.MOTHERBOARD@cptIt,
* McsEngl.conceptIt984,
* McsEngl.motherboard@cptIt984,
* McsElln.ΜΗΤΡΙΚΗ-ΠΛΑΚΕΤΑ@cptIt,

DEFINITION

GENERIC

_GENERIC:
* entity.economic.satisfierWorking.techInfo.hardware#cptItsoft1#

WHOLE

_WHOLE:
computer box#cptIt983#

ACPI

Advance Configuration and Power Interface
Πρότυπο των καινούργιων μητρικών. Επεκτείνει το χαρακτηριστικό της άμεσης εγκατάστασης και λειτουργίας ενσωματώνοντας νέες δηνατότητες κάτω από την διαχείριση του λειτουργικού συστήματος και όχι του BIOS.
[RAM 1999sep]

BIOS#cptIt998#

BIOS#cptIt998: attPar#

BUS#cptIt71#

bus#cptIt71: attPar#

CHIPSET

Τσιπ Υποστήριξης

Intel 82430VX or 82430HX

Η καλύτερη μητρική στο τεστ ΡΑΜ 1997ΦΕΒ είχε το intel 82430HX.

INTEL

430LX:
ΚΥΡΙΑΚΗ 24 ΑΥΓΟΥΣΤΟΥ 1997
Intel στις τρείς διαστάσεις
Μετά και από την πρόσφατη διείσδυση της στην αγορά των chip γραφικών, η Intel ανακοινώΝει μια νέα μητρική (motherboard chipset), την 440LX.
Το νέο chipset υλοποιεί την τεχνολογία τριδιάστατης βελτιστοποίησης AGP, την οποία ανέπτυξε η ίδια η Intel. Το πρότυπο AGP (Accelerated Graphics Port) ανοίγει έναν ταχύτατο δίαυλο δεδομένων επικοινωνίας μεταξύ του προσαρμογέα γραφικών (video adapter) και της κύριας μνήμης του υπολογιστή (RAM). Eπιτρέπει έτσι την υποκατάσταση της ακριβής ειδικής μνήμης που χρησιμοποιούν σήμερα οι κάρτες γραφικών, με φθηνότερη κοινή RAM, δίνοντας τη δυνατότητα υψηλής απόδοσης γραφικών, με ευκολότερη επεξεργασία και δυναμική εμφάνιση πολύγωνικών τριδιάστατων εικόνων.
[Internet]

430TX: 1997
Intel will shortly introduce a core logic chip set, the 430TX, that will boost the performance of MMX PCs, with support for faster hard drives, improved power management, and synchronous DRAM (SDRAM) capabilities, according to industry observers.
will be introduced Feb. 18, according to sources close to Intel.
[InfoWorld, 1997jan12]

440FX

PROCESSOR#cptIt13#

processor#cptIt13: attPar#

Είναι καλό μία μητρική να υποστηρίζει ΠΟΙΚΙΛΙΑ επεξεργαστών.

RAM#cptIt140#

ram#cptIt140: attPar#

structure#cptCore515#

Οι καινούργιες ενσωματώνουν τσιπάκια παραγωγής ήχου.
Σε αρκετές αναφέρεται το ενδεχόμενο ενσωμάτωσης κάρτας γραφικών, αλλά δεν το είδαμε.
[ΡΑΜ, ΟΚΤ. 1996, 110]

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt984#

AT

name::: BAT, baby AT,

The old type

ATX

COMPANY SPECIFIC-DIVISION

ASUSTEK:

INTEL:
* MARL, for pentium, άριστη αγορα ΡΑΜ ΟΚΤ.1996 45000ΔΡΧ
* VENUS

SOYO:
5VX2, κορυφαία επιδοση, ΡΑΜ ΟΚΤ.1996 53000ΔΡΧ

PROCESSOR SPECIFIC-DIVISION

cmr'part.motherboard.BIOS

NAME

name::
* McsEngl.cmr'part.motherboard.BIOS@cptIt,
* McsEngl.conceptIt998,
* McsEngl.BIOS@cptIt998,
* McsEngl.basic-input-output-system@cptIt,

DEFINITION

To BIOS είναι ΠΡΟΓΡΑΜΜΑ γραμμένο σε μία EPROM, ένα ολοκληρωμένο κύκλωμα που βρίσκεται πάνω στη μητρική πλακέτα του υπολογιστή. Το τσιπάκι αυτό περιέχει το πρόγραμμα εκκίνησης κάθε συστήματος και, φυσικά, όλες τις παραμέτρους που καθορίζουν τη συμπεριφορά ενός υπολογιστή.
[RAM, ΟΚΤ. 1996, ΕΝΘΕΤΟ 4]

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt998#

BIOS-AMI#cptItsoft535: attSpe#

cmr'part.motherboard.CLOCK

NAME

name::
* McsEngl.cmr'part.motherboard.CLOCK@cptIt,
* McsEngl.conceptIt229,
* McsEngl.computer'clock@cptIt229,
* McsEngl.electronic-clock-of-a-computer-system@cptIt,

DEFINITION

Clock
A computer's clock is an internal timing device, often referred to as the system clock. The clock speed is determined by a quartz crystal.
Every computer system utilizes a quartz crystal to regulate the system clock. When the machine is turned on, electric current causes the precisely cut sliver of quartz crystal to deform or vibrate, at a constant rate, millions of times per second. A voltage pulse is emitted with each vibration which, along with other signals, controls the pace of action and ensures that the circuits do not get out of phase.
The system clock speed is measured in megahertz, MHz.
[SOURCE: PC-GLOSSARY 1993]

Emits millions of regularly spaced ELECTRIC PULSES each second that synchronized operations.

QUARTZ CRYSTAL

Quartz crystal
Quartz is a mineral, silicon dioxide, occurring in abundance. It is a brilliant, hexagonally shaped crystalline mineral.
For use in electronics, a quartz crystal is created by accurately grinding and finishing a thin plate or rod of quartz. When an electrical current is applied, the quartz crystal vibrates at a particular frequency.
Every computer system utilizes a quartz crystal to regulate the system clock. When the machine is turned on, electric current causes the precisely cut sliver of quartz crystal to deform or vibrate, at a constant rate, millions of times per second. A voltage pulse is emitted with each vibration which, along with other signals, controls the pace of action and ensures that the circuits do not get out of phase.
[SOURCE: PC-GLOSSARY 1993]

SPEED

The speed with which an instruction is executed is directly related to the computer's built-in CLOCK SPEED - that is the number of pulses produced each second.
This clock speed is measured in megahertz, where mega means million and HERTZ means TIMES per second.

cmr'part.motherboard.BATTERY

NAME

name::
* McsEngl.cmr'part.motherboard.BATTERY@cptIt,
* McsEngl.conceptIt409,
* McsEngl.Computer's-Battery-Backup@cptIt,
* McsEngl.Computer'Battery-Backup@cptIt409,

DEFINITION

Battery backup
There are electronic components on printed circuit boards of most microcomputers that need a constant supply of electrical energy in order to retain their stored information.
One such component is the clock/calendar.
It is kept active with dry cell batteries or with coin-shaped lithium batteries.
When these batteries deteriorate and lose their power, the system clock fails to keep the correct time and date.
Rather than input the correct time and date when the system is booted, it would be easier to simply replace the batteries.
When this system set-up and timing information is retained by the use of a small battery inside the computer, the computer is said to have 'battery backup'.
[SOURCE: PC-GLOSSARY 1993]

cmr'part.motherboard.SLOT

NAME

name::
* McsEngl.cmr'part.motherboard.SLOT@cptIt,
* McsEngl.conceptIt985,
* McsEngl.slot@cptIt985,
* McsElln.ΥΠΟΔΟΧΗ-ΕΠΕΚΤΑΣΗΣ@cptIt,

cmr'part.POWER-SUPPLY-UNIT

_CREATED: {1999-03-02}

NAME

name::
* McsEngl.cmr'part.POWER-SUPPLY-UNIT@cptIt,
* McsEngl.conceptIt527,
* McsEngl.computer-psu@cptIt527,
* McsEngl.computer-power-supply-unit@cptIt527,
* McsEngl.PSU@cptIt527,
* McsEngl.power-supply-of-computer@cptIt,
* McsEngl.power'supply@cptIt527,
====== lagoGreek:
* McsElln.ΤΡΟΦΟΔΟΤΙΚΟ@cptIt,

DEFINITION

The PC can't use the standard current that comes out of the wall outlet. The power supply is an electrical device in your system unit that takes the current from the wall outlet (standard voltage: 115-120 volts of alternating current) and turns it into the low voltage (5-12 volts of direct current) that your PC needs to operate. Power supplies are rated in watts. The amount of current a power supply can supply is rated in amps, or amperes. The fan within the Power supply is also used to cool the entire system unit, so it is very important that it is not blocked in any way. A word to the wise: within the power supply are several powerful capacitors, which can shock you (even when the power supply is unplugged).
[PC Insight]

psu'CONNECTOR

name::
* McsEngl.psu'CONNECTOR@cptIt,

P4-1700:
Linkworld LPH6-250W
20pin+4pin to motherboard
4x4pin + 2 for HD and Floppy

psu'FUN

name::
* McsEngl.psu'FUN@cptIt,

H PC Power and Cooling έχει εντελώς αθόρυβο τροφοδοτικό.

Η checkmate International εισάγει αθόρυβα ΑΝΕΜΙΣΤΗΡΑΚΙΑ για επεξεργαστές και σκληρούς δίσκους.
[ΡΑΜ, 1999μαρ, 14 Δήμου]

Αν θέλετε ησυχία από τον υπολογιστή σας (λόγω cooler) πάρτε τηλέφωνο στον κύριο Αθανασακόπουλο 7470520 - fax 7470184 για να ησυχάσετε.
[http://users.forthnet.gr/ath/syrona/]

psu'WATTAGE

name::
* McsEngl.psu'WATTAGE@cptIt,

Wattage
Computer power supplies are rated based on their maximum output power. Typical power ranges are from 300 W to 500 W (lower than 300W for Small form factor systems), although units used by gamers and enthusiasts usually range from 500 W to 1000 W, with the highest end units going up to 2 kW for extreme performance computers with multiple processors and graphics cards (ATI CrossFire or NVIDIA SLI).
[http://en.wikipedia.org/wiki/Computer_power_supply]

psu'WHOLE

_WHOLE:
* stmIt.computer.machine#cptItsoft227#

SPECIFIC

* psu'specific,

psu.FANLESS

name::
* McsEngl.psu.FANLESS@cptIt,

_ADDRESS.WPG:
* 2016-01-10, 82€, GEMBIRD CCC-PSU4X-S ULTRA LOW-NOISE FANLESS ATX/BTX 400W,

cmr'part.RAM

NAME

name::
* McsEngl.cmr'part.RAM@cptIt,
* McsEngl.conceptIt140,
* McsEngl.RAM@cptIt,
* McsEngl.main-memory.computer@cptIt,
* McsEngl.primary-memory.computer@cptIt,
* McsEngl.radom-access-memory@cptIt,
* McsElln.ΚΕΝΤΡΙΚΗ-ΜΝΗΜΗ@cptIt,
* McsElln.ΚΥΡΙΑ-ΜΝΗΜΗ@cptIt,
* McsElln.ΜΟΝΑΔΑ-ΜΝΗΜΗΣ@cptIt,
* McsElln.ΠΡΩΤΕΥΟΝΤΑ-ΜΝΗΜΗ@cptIt,

Κύρια μνήμη = μονάδα μνήμης.
[Παπακωνσταντίνου κα, Τεχνολογία Υπολογιστικών... Γ' Ε. Λυκείου, 1999 α' έκδοση, 91]

DEFINITION

Random Access Memory is the type of semiconductor-based memory on a chip in which any location can be accessed directly without having to follow a sequence of storage locations. RAM is volatile, that is, when the power is turned-off, the data is lost.
'Random access' refers to the ability to call up any location in memory in the same access time, regardless of which memory location was last accessed. Although the data stored in ROM memory chips can also be retrieved in a random fashion, ROM chips retain their data even after the power is off.
The term RAM is generally understood to refer to volatile memory, in which data can be written as well as read.
[SOURCE: PC-GLOSSARY 1993]

Η κεντρική μνήμη RAM είναι αυτή στην οποία ο υπολογιστής αποθηκεύει δεδομένα και προγράμματα που χρησιμοποιεί όταν βρίσκεται σε λειτουργία.
[COMPUTER GO, DEC 1995, ΕΝΘΕΤΟ 26]

ram'GENERIC

_GENERIC:
Memory Chip#cptIt990#

ram'ADDRESS#cptCore925.15#

name::
* McsEngl.ram'ADDRESS@cptIt,

Address
Each location in computer memory is numbered consecutively. The number is referred to as the location's address.
After a computer program is written and compiled or assembled into machine language, it can be loaded into the computer's memory where it references actual addresses.
[SOURCE: PC-GLOSSARY 1993]

ram'BANK

name::
* McsEngl.ram'BANK@cptIt,

Bank είναι οι υποδοχές μνήμης που είναι χωρισμένες σε 0 και 1. Η 0 πρέπει να είναι οπωσδήποτε συμπληρωμένη.
[COMPUTER GO, DEC 1995, ΕΝΘΕΤΟ 28]

ram'CAPACITY#cptIt14.1#

name::
* McsEngl.ram'CAPACITY@cptIt,

Η χωρητικότητα της μνήμης μετριέται σε bytes.

ram'FREQUENCY#cptCore1013: attPar#

name::
* McsEngl.ram'FREQUENCY@cptIt,
* McsElln.ταχύτητα@cptIt,

ΜΟΝΑΔΑ ΜΕΤΡΗΣΗΣ:
MHz

ram'SIMM/DIMM

name::
* McsEngl.ram'SIMM/DIMM@cptIt,

Δεν έχουν να κάνουν με κάποιο τύπο μνήμης, αλλά με τις ΠΛΑΚΕΤΕΣ πάνω στις οποίες βρίσκονται τα τσίπς της μνήμης.
Τα simm είναι τα γηραιότερα και προσφέρουν ένα δίαυλο δεδομένων 32bit.
Τα dimm έχουν δίαυλο 64bit
[RAM 1998feb, 215]

SIMMs ονομάζονται μικρές πλακέτες πάνω στις οποίες είναι τοποθετημένη η μνήμη.

ram'resourceInfHmn#cptResource843#

name::
* McsEngl.ram'resourceInfHmn@cptIt,

Η μητρική κάρτα ΑΛΚΗΣ ΓΑΛΔΑΔΑΣ
(Εικόνα μεγέθους : 49786 bytes)
Cache Memory L1 και L2, SIMM, DIMMO Τι γίνεται εδώ, πώς έγιναν τόσο δύσκολα τα πράγματα; Αποφασίζοντας σήμερα να αγοράσει κάποιος ακόμη και το πιο απλό υπολογιστικό σύστημα φαίνεται να μπαίνει σε ένα λαβύρινθο όρων και αντικειμένων. Ας γνωρίσουμε λοιπόν την βασικότερη κάρτα που συναντούμε σε κάθε κομπιούτερ
Αυτή την εποχή της εσωστρέφειας και των αλλαγών η συζήτηση συχνά πηγαίνει στο ποιον κομπιούτερ να αγοράσω τώρα ή πώς να «δυναμώσω» τον παλιό μου, όπως πολύ χαριτωμένα το είχε εκφράσει κάποιος συνομιλητής μου που δεν του ερχόταν το ρήμα αναβαθμίζω, η κατάλληλη γι' αυτή την περίπτωση λέξη. Οι πονεμένες ιστορίες είναι πολλές. Ο ένας είδε στις δοκιμές έγκυρου περιοδικού ένα σούπερ συνδυασμό αλλά όταν τηλεφώνησε σε αυτούς που τον πουλούσαν έμαθε πόσο άτυχος ήταν. Του είπαν ότι αυτό δεν υπήρχε πλέον. Μόλις, μα μόλις πριν από λίγο είχε φύγει το τελευταίο κομμάτι αλλά μπορούσαν φυσικά να του δώσουν κάτι άλλο, κατά τη γνώμη τους (εννοείται, πολύ) καλύτερο. Ο άλλος μετά από καιρό διαπίστωσε ότι του είχαν βάλει δίσκο πολύ μικρότερης χωρητικότητας από ό,τι είχε πληρώσει. Τέτοια κατάντια. Δυστυχώς λοιπόν η καλύτερη άμυνα για όλα είναι μόνο το να έχει ο υποψήφιος αγοραστής μερικά βασικά στοιχεία υπόψη του μήπως μπορέσει και επιβιώσει στην κινούμενη αυτή άμμο των προσωπικών υπολογιστικών συστημάτων. Να ξέρει τι θέλει και να ζητήσει αυτό να περιέχεται στο σύστημά του.
Στον λαβύρινθο της motherboard
Προσεδαφιζόμαστε στην πιο βασική από τις κάρτες που συγκροτούν το υπολογιστικό μας σύστημα, τη μητρική, γνωστή στους Ελληνες πιο πολύ ως motherboard ή και system-board. Κάνουμε μια πρώτη κατόπτευση στο καταπράσινο περιβάλλον προσπαθώντας να αναγνωρίσουμε όσο μπορούμε περισσότερα από τα βασικά στοιχεία της. Στη μία άκρη ξεχωρίζει, σαν σε ύψωμα, η θέση όπου τοποθετείται ο επεξεργαστής. Κοιτάζουμε λίγο καλύτερα και προσπαθούμε να καταλάβουμε αν πρόκειται για καινούργια ή παλιά ιστορία. Αν είναι ένα λευκό τετράγωνο όπου εκεί χωρίς δυσκολία, χάρη στις ανέσεις της τεχνικής ZIF (Zero Insertion Force), μπαίνει και βγαίνει το τσιπ του επεξεργαστή χωρίς την παραμικρή χρήση βίας, με το πάτημα ενός μοχλού μόνο, πρόκειται για Socket 7, που σημαίνει ή παλαιότερος Pentium ή κάποιος ανταγωνιστής της Intel. Αντίθετα η μακρόστενη υποδοχή Socket 1 μπορούμε να πούμε ότι μας επιβεβαιώνει την παρουσία του πιο καινούργιου Pentium ΙΙ, της γνωστής και διάσημης οικογενείας Intel.
Το τοπίο συμπληρώνουν οι υποδοχές για τα κομμάτια της μνήμης RAM, της Cache Memory, γνωστής και ως Λανθάνουσας Μνήμης, το BIOS, το ρολόι του συστήματος που είναι διαφορετικό από το άλλο το πιο θεαματικό στην οθόνη των Windows, οι υποδοχές για τις κάρτες ήχου και γραφικών.
Η «απληστία» της RAM
Παρακολουθώντας τις απαιτήσεις των κατασκευαστών διαφόρων πακέτων να επιβάλουν όλο και περισσότερη μνήμη RAM για να δουλέψουν τα προγράμματά τους, αναρωτιέσαι αν τελικά δεν είναι κάτι σαν τη σοκολάτα: όσο του δίνεις στον κομπιούτερ, τόσο περισσότερη ζητάει! Και όπως γίνεται με τις σοκολάτες υπάρχουν διάφορα είδη μνήμης RAM, ακόμη και μεO ονοματεπώνυμο.
Για να διαβάσει το περιεχόμενο μιας θέσης στη μνήμη ή για να γράψει σε μια θέση στη μνήμη ο επεξεργαστής χρειάζεται να προσδιορίσει τη διεύθυνση της θέσης αυτής. Υπάρχει ένας δίαυλος διευθύνσεων που επιτρέπει στον επεξεργαστή να κυκλοφορεί εκεί μέσα τη διεύθυνση της συγκεκριμένης θέσης κάθε φορά και ένας δίαυλος δεδομένων όπου εκεί μέσα διακινούνται τα δεδομένα από και προς τη μνήμη. Εννοείται ότι η RAM αντιστοιχεί σε μια προσωρινή μνήμη. Το περιεχόμενό της με το κλείσιμο του διακόπτη θα εκμηδενιστεί. Κάτι σαν τον πίνακα στην τάξη όπου γράφοντας με την κιμωλία ξέρουμε ότι τα όσα γράψαμε δεν μπορούν να μείνουν μόνιμα εκεί επάνω. Πολύ γρήγορα και πολύ εύκολα θα εξαφανιστούν.
Αυτό που ένας υποψήφιος αγοραστής θα συναντήσει όταν πάει να αγοράσει μνήμη είναι τα SIMM και τα DIMM. Ετσι μπορεί και να νομίσει ότι αυτά είναι η μνήμη, ενώ στην πραγματικότητα πρόκειται για τις μικρές πλακέτες επάνω στις οποίες βρίσκονται κουρνιασμένα τα ολοκληρωμένα κυκλώματα που συνηθίσαμε να λέμε «τσιπ μνήμης».
Τα SIMM, από τα αρχικά των λέξεων Single In-Line Memory Modules, είναι τα παλαιότερα στην αγορά και προσφέρουν ένα δίαυλο δεδομένων εύρους 32 θέσεων. Επειδή όμως ο Pentium σχεδιάστηκε για να διαχειρίζεται ακόμη και 64 θέσεων δίαυλο, τα «σιμάκια», όπως τα λένε μερικοί χαϊδευτικά, πρέπει να αγοράζονται και να χρησιμοποιούνται σε ζευγάρια. Τα DIMM, από τα αρχικά των λέξεων Dual In-Line Memory Modules, είναι πιο πρόσφατα αποκτήματα και προσφέρουν δίαυλο δεδομένων εύρους 64 θέσεων. Τώρα που τα 64 Mbyte μνήμης RAM είναι κοντά στο σχεδόν απαραίτητο αρκεί ένα μόνο από αυτά για το υπολογιστικό μας σύστημα. Και αυτό του δίνει ευελιξία, όσο και αν φαίνεται παράξενο.
Μπαίνοντας στην καθαυτό μνήμη RAM πιο συχνά θα συναντήσουμε την ακροστιχίδα DRAM. Διότι οι πληροφορίες στη μνήμη αποθηκεύονται σε πυκνωτές με τη μορφή φορτίου. Αλλά οι πυκνωτές είναι δεξαμενές φορτίου που παρουσιάζουν διαρροές, άρα χρειάζεται ηλεκτρικό ρεύμα έστω και από μπαταρία, που κάθε τόσο φρεσκάρει το περιεχόμενό τους, αποτελώντας μια συνεχή και δυναμική παρέμβαση αφήνοντας τα σημάδια της και με το D (Dynamic) στην προσωνυμία DRAM. Η RAM δηλαδή πρέπει να ανανεώνεται ώστε να διατηρεί τα δεδομένα της.
Οι αγοραστές όμως δεν ξεμπερδεύουν όταν εξοικειωθούν με τα SIMM, DIMM, DRAM, διότι θα συναντήσουν ακόμη και άλλα οκτώ διαφορετικά είδη μνήμης που πρέπει να ξέρουν τι περίπου τους έβαλαν στο μηχάνημά τους.
L2 Cache: ό,τι καλύτερο
Ακόμη και με τις μητρικές τελευταίας τεχνολογίας που υποστηρίζουν δίαυλο των 100 Mhz οι συχνότητες λειτουργίας των επεξεργαστών είναι από διπλάσιες ως και τετραπλάσιες. Αυτό έχει ως συνέπεια ο επεξεργαστής να περιμένει αρκετές φορές όταν ο πιο αργός δίαυλος είναι γεμάτος από δεδομένα που διακινούνται προς διάφορες κατευθύνσεις. Ετσι οι σχεδιαστές των επεξεργαστών σκέφθηκαν κάτι που ήταν στα χαρτιά πολύ απλό. Να έχουν κάπου μια ταχύτατη στις αντιδράσεις της βοηθητική μνήμη που να κρατάει ό,τι χρησιμοποιείται μια δεδομένη στιγμή πιο συχνά από τον επεξεργαστή και να του το προσφέρει μόλις το έχει ανάγκη χωρίς να μπλέκουν τα δεδομένα αυτά με την υπόλοιπη διακίνηση στον δίαυλο. Μην ξεχνούμε εδώ ότι μέσα σε έναν επεξεργαστή δεν υπάρχουν τόσοι πολλοί δρόμοι όσοι σε μια πόλη για να διαλέγουν οι πιο έξυπνοι διάφορες παρακαμπτήριες οδούς. Ετσι από κάποια στιγμή και μετά οι επεξεργαστές εφοδιάστηκαν με μια μικρή λανθάνουσα μνήμη πρώτου επιπέδου (L1) αλλά αυτό δεν έφθασε όταν αυξήθηκαν οι ανάγκες. Ετσι υπάρχει τώρα στους περισσότερους επεξεργαστές μια μνήμη δεύτερου επιπέδου, η γνωστή ως L2 (Level 2), που κυμαίνεται από 256 kbyte ως 2Mbyte, και ο αγοραστής πρέπει να τη ζητάει μετά μανίας, ειδικά αν πρόκειται να ασχοληθεί και με το Internet.
Μια λανθάνουσα μνήμη δευτέρου επιπέδου έστω και στα χλωμά 512 kbyte μπορεί να κάνει τη δουλειά μιας RAM των 64 Mbyte!!! Πώς συμβαίνει αυτό; Την απάντηση τη βρίσκουμε και μόνοι μας, αν κάποιος έμπειρος προγραμματιστής βρεθεί να μας πληροφορήσει για μια μεγάλη αλήθεια σχετικά με τη λειτουργία των κομπιούτερ και των προγραμμάτων τους. Οτι σε ένα πρόγραμμα υπάρχουν μικρά τμήματα σε σχέση με το όλο μέγεθός του που ο επεξεργαστής περνάει περισσότερη ώρα για να εκτελεί τις εντολές τους. Υπάρχει δηλαδή περίπτωση να εκτελεστούν εκατοντάδες χιλιάδες φορές οι ίδιες εντολές προτού πάμε παρακάτω στις εντολές ενός προγράμματος. Αρα αν αυτές τις εντολές, αντί να «τρέχει» να τις βρίσκει από τη RAM ή ακόμη χειρότερα από τον σκληρό δίσκο, τις γράφει την πρώτη φορά στην ταχύτατης ανταπόκρισης λανθάνουσα μνήμη και μετά ψάχνει πρώτα μήπως βρίσκονται εκεί, ο επεξεργαστής θα κερδίζει πολύτιμο χρόνο.
Η λανθάνουσα μνήμη δευτέρου επιπέδου αποτελείται από δύο τμήματα: την αποθήκη δεδομένων και τη μνήμη διευθύνσεων (Tag RAM). Στην αποθήκη δεδομένων αποθηκεύεται ό,τι πρόκειται να αναζητηθεί από τον επεξεργαστή στην επόμενη προσπέλαση, ενώ στο δεύτερο τμήμα καταγράφεται από ποιο μέρος της μνήμης προέρχονται τα δεδομένα που βρίσκονται στην αποθήκη.
Θα λέγαμε χωρίς πολλούς δισταγμούς ότι η μνήμη στον κομπιούτερ είναιO μισή αρχοντιά και δεν αξίζει να κάνουμε εκεί τις οικονομίες μας. Οι περισσότεροι κατασκευαστές πακέτων προσπαθούν στις διαφημίσεις τους να γράφουν ότι τα προϊόντα τους χρειάζονται ελάχιστη μνήμη RAM και γι' αυτό ο κανόνας είναι σε αυτό που ισχυρίζονται να πρέπει ο υποψήφιος αγοραστής να διαθέτει ακριβώς το διπλάσιο για να έχει το κεφάλι του ήσυχο ότι το πακέτο θα τρέξει φυσιολογικά. Για παράδειγμα, όταν γράφουν ότι τα Windows 98 χρειάζονται 16 Mhz, καλύτερα να διαθέτουμε 32 προτού επιχειρήσουμε την εγκατάστασή τους. Το ίδιο ανοιχτοχέρηδες αξίζει να είμαστε και στην περίπτωση της λανθάνουσας μνήμης.
Και υπομονή, θα έλθει η ώρα, στη συνέχεια αυτών των άρθρων, που θα αναφερθούμε σε άλλες δυνατότητες περικοπών.
Οι μνήμες της αγοράς Το πιο σημαντικό μέγεθος για να κρίνουμε την απόδοση της μνήμης είναι ο χρόνος προσπέλασης που αναφέρεται στο πόσα δισεκατομμυριοστά του δευτερολέπτου (ns, nanoseconds) περνούν για να στείλει ο επεξεργαστής την κλήση στη μνήμη ζητώντας να διαβάσει το περιεχόμενο κάποιας θέσης της ώσπου να το παραλάβει.
FPM RAM (Fast Page Mode RAM)
Από τα 120 nanoseconds χρόνο προσπέλασης φθάσαμε στα 60· επειδή όμως ο Pentium επιτρέπει τη διέλευση των δεδομένων με συχνότητα 66 Mhz, η FPM δεν ανταποκρίνεται σε αυτούς τους ρυθμούς και έτσι δεν είναι η καλύτερη επιλογή.
EDO RAM (Extended Data Out RAM)
Πολυδιαφημισμένη μνήμη αλλά ο τρόπος λειτουργίας της επιτρέπει να είναι αποδοτική ως συχνότητα διαύλου 66 Mhz, αλλά από εκεί και πέρα καλύτερα είναι να καταφύγουμε στις υπηρεσίες μιας BEDO RAM.
BEDO RAM (Burst Extended Data Out RAM)
Εδώ μεγάλα συγκροτήματα δεδομένων στέλνονται και υφίστανται επεξεργασία κατά ριπάς, όπου κάθε ριπή περιέχει μικρότερες ομάδες δεδομένων. Η μνήμη BEDO μπορεί να διαχειρίζεται τέσσερα στοιχεία σε μία ριπή και αυτό σημαίνει ότι τελειώνοντας είναι έτοιμα και τα υπόλοιπα τρία εκτός από το πρώτο και δεν χρειάζεται να περιμένουν για την επεξεργασία τους.
SD RAM (Synchronous Dynamic RAM)
Επιτρέπει σε δύο σελίδες της μνήμης να ανοίγουν ταυτόχρονα. Μπορεί να διαχειριστεί συχνότητες διαύλου ως και 100 Mhz. Αρα είναι αποδεκτή στις περισσότερες περιπτώσεις.
SRAM (Static Random Access Memory)
Αποθηκεύει τα δεδομένα χωρίς να χρειάζεται αυτόματη ανανέωση των φορτίων της. Ανανέωση γίνεται μία φορά μόνο, όταν εκτελείται εντολή εγγραφής στη μνήμη. Φθάνει σε χρόνο προσπέλασης τα 12 nanoseconds, που είναι τέσσερις φορές καλύτερος από αυτόν της BEDO. Μακάρι να έχεις τέτοια μνήμη στον κομπιούτερ σου, αλλά τη βάζουν σε δευτέρου επιπέδου λανθάνουσα μνήμη.
Async SRAM (Asynchronous SRAM)
Ο χρονισμός της μνήμης δεν συμβαδίζει με αυτόν του ρολογιού συστήματος και γι' αυτόν τον λόγο ο επεξεργαστής πρέπει να περιμένει για τα δεδομένα που έχουν ζητηθεί από τη μνήμη. Είναι καλύτερη από την DRAM.
Sync SRAM (Synchronous Burst SRAM)
Αποκλείεται να τη συναντήσουμε πολύ εύκολα. Φθάνει να έχει τον καταπληκτικό χρόνο προσπέλασης των 8,5 nanoseconds, είναι συγχρονισμένη με το ρολόι του συστήματος, δεν παράγεται όμως σε ικανοποιητικές ποσότητες.

ΡΒ SRAM (Pipeline Burst SRAM)
Είναι ειδικά σχεδιασμένη για συχνότητα διαύλου 75 Mhz και έτσι οι αγοραστές θα θέλουν να τις χρησιμοποιήσουν όταν θα έχουν στον κομπιούτερ τους επεξεργαστή Pentium ΙΙ, ίσως και καλύτερο (;).


ΤΟ ΒΗΜΑ, 18-10-1998 Κωδικός άρθρου: B12503C151

ram'SPEED

name::
* McsEngl.ram'SPEED@cptIt,

70 ns.

ram'structure#cptCore515#

name::
* McsEngl.ram'structure@cptIt,

ΜΟΝΑΔΑ ΜΝΗΜΗΣ (ΚΥΡΙΑ ΜΝΗΜΗ):
* Στη μονάδα μνήμης αποθηκεύονται προσωρινά οι εντολές του προγράμματος, τα δεδομένα εισόδου και εξόδου καθώς και τα ενδιάμεσα αποτελέσματα.

* Διαιρείται σε 'θέσεις μνήμης' που λεγονται ΛΕΞΕΙΣ, ένα σύνολο δυαδικών ψηφίων.
Μήκος λέξης είναι το πλήθος των μπιτ που την αποτελούν.
ΜΕΓΕΘΟΣ της μονάδας μνήμης ονομάζουν το πλήθος των λέξεών της και είναι δύναμη του 2.

* Αποτελείται από:
- κυκλώματα για την αποθήκευση των πληροφοριών (θέσεις/λέξεις)
- τους καταχωρητές δεδομένων και διευθύνσεων
- κυκλώματα για τον έλεγχο της λειτουργίας της και της επικοινωνίας της με τις άλλες μονάδες.

* Στην εγγραφή, η τιμή της θέσης της μονάδας-μνήμης γράφεται στον MDR και τη διεύθυνσή της στον MAR. Μετά με την ενεργοποίηση την μονάδας-μνήμης γίνεται η μεταφορά στην αντίστοιχη θέση/λέξη.
* Στην ανάγνωση μιάς θέσης της μονάδας-μνήμης γράφεται πρώτα η διεύθυνσή της στον MAR. Μετά με την ενεργοποίηση την μονάδας-μνήμης γίνεται η μεταφορά της τιμής της θέσης στον MDR για να χρησιμοποιηθεί από κάποια άλλη μονάδα.
[Γ Λυκείου Τεχνολογία ΥΣ & ΛΣ]

ram'WORD

name::
* McsEngl.ram'WORD@cptIt,

A computer word is a storage unit of information, consisting of a number of bits that comprise one storage location in main memory.
Large computers may have 32, 36, 48, or 64 bits in each word.
Often microcomputers, personal computers, will have 16-bit words.
When speaking of an IBM PC or compatible, 'word' can refer to 16 bits or 8 bits, depending on whether the point of reference is the computer's 8-bit data bus or its 16-bit internal processing.
[SOURCE: PC-GLOSSARY 1993]

ram.SPECIFIC

name::
* McsEngl.ram.SPECIFIC@cptIt,

Specific_concepts (level 3) =

Σήμερα μπορούμε να χρησιμοποιήσουμε:
SDRAM, DDR-SDRAM, RDRAM,
[RAM 2001.09, 125]

ram.RDRAM (RAMBUS)

name::
* McsEngl.ram.RDRAM (RAMBUS)@cptIt,

ΕΥΡΟΣ:
16 bit

ΣΥΧΝΟΤΗΤΑ ΛΕΙΤΟΥΡΓΙΑΣ:
μέχρι 400MHz DDR

ΜΕΓΙΣΤΗ ΔΙΑΜΕΤΑΓΩΓΗ:
3,2 GB/sec.

ΚΟΣΤΟΣ:
30.000 δρχ (μαζί με φπα) για 123ΜΒ.
[ΡΑΜ 2001.09, 125]

ram.DDR-SDRAM

name::
* McsEngl.ram.DDR-SDRAM@cptIt,

ΜΕΓΙΣΤΗ ΔΙΑΜΕΤΑΓΩΓΗ:
2,1 GB/sec (RDRAM=3,2)

ΚΟΣΤΟΣ:
14000 Δρχ (με το φπα) το άρθρωμα των 128 ΜΒ.
[RAM 2001.09, 125]

Μεταδίδει διπλάσια δεδομένα ανά κύκλο ρολογιού.

ram.SDRAM

name::
* McsEngl.ram.SDRAM@cptIt,
* McsEngl.Synchronous-Dynamic-RAM@cptIt,

Μπορεί να διαχειριστεί συχνότητες διαύλου μέχρι και 100MHz. Η τεχνολογία της επιτρέπει σε 2 σελίδες της μνήμης να ανοίγουν ταυτόχρονα.
Εχει αναπτυχθεί και η SLDRAM που αναμένεται να πέξει πρωτεύοντα ρόλο τα επόμενα χρόνια.
[RAM 1998feb, 216]

==================================================================

ram.CONVENTIONAL/DOS MEMORY

name::
* McsEngl.ram.CONVENTIONAL/DOS MEMORY@cptIt,

On mosts PCs this is the first 640K bytes.

DRAM#cptIt87: attSpe#

ram.EDO RAM

name::
* McsEngl.ram.EDO RAM@cptIt,
* McsEngl.Extended-Data-Oout-RAM@cptIt,

Σύγχρονος τύπος γρηγορότερη από τη συμβατική και ακριβότερη.
[COMPUTER GO, DEC 1995, ΕΝΘΕΤΟ 29]

ΔΕΝ διαφέρει και πολύ από την FPM-RAM. Έχει βελτίωση στην απόδοση για διαύλους με συχνότητα μέχρι 66MHz.
[RAM 1998feb, 216]

ram.EXPANDED MEMORY

name::
* McsEngl.ram.EXPANDED MEMORY@cptIt,

EXPANDED/EMS MEMORY: Hardware/software standard (Lotus-Intel-Microsoft) that allows programs to access large amounts of memory outside of standard DOS memory or extended memory.
* It was introduced before EXTENDED MEMORY
* It can be slower than extended memory.
* EMM386.EXE is a device driver that use extended memory to simulate expanded memory.

ram.EXTENDED/XMS MEMORY

name::
* McsEngl.ram.EXTENDED/XMS MEMORY@cptIt,

Any memory above the 1 MB of DOS. MS-DOS includes the HIMEM.SYS extended memory management driver.
Extended memory is the best choice for windows.
16MB on a 286, 4GB on a 386.
To be able to directly access the extended memory the processor must be in a special mode called protected mode.
*** H EXPANDED ΑΝΑΦΕΡΕΤΑΙ ΣΕ 8088 ΕΝΩ Η EXTENDED ΣΕ 286/386.

XMS MEMORY: A software METHOD (specification) for accesing extended memory. Generally requires Microsoft's HIMEM.SYS device driver.

ram.FLAT MEMORY MODEL

name::
* McsEngl.ram.FLAT MEMORY MODEL@cptIt,

FLAT MEMORY MODEL:
ΕΠΙΤΡΕΠΕΙ ΣΥΝΕΧΕΙΣ ΔΙΕΥΘΥΝΣΕΙΣ ΑΠΟ ΤΟ 0 ΜΕΧΡΙ ΤΟ ΜΕΓΙΣΤΟ ΤΗΣ ΜΝΗΜΗΣ. ΜΕ ΤΟ ΤΡΟΠΟ ΑΥΤΟ ΞΕΠΕΡΝΙΕΤΑΙ ΤΟ ΦΡΑΓΜΑ ΤΩΝ 640 ΜΒ.

ram.FPM

name::
* McsEngl.ram.FPM@cptIt,
* McsEngl.Fast-Page-Mode-RAM@cptIt,

Η συμβατική. Δεν πρεπει να αναμειχθεί με την καινούργια στην ίδια bank.
[COMPUTER GO, DEC 1995, ΕΝΘΕΤΟ 29]

ΣΥΧΝΟΤΗΤΑ (ΤΑΧΥΤΗΤΑ):
Η ταχύτητά της ΔΕΝ ξεπερνά τα 30MHz και επομένως δέν αρκούσε στους επεξεργαστές pentium που επιτρέπουν τη διέλευση των δεδομένων σε δίαυλο με συχνότητα 66MHz.
[RAM 1998feb, 216]

ram.HMA (High Memory Area)

name::
* McsEngl.ram.HMA (High Memory Area)@cptIt,

HMA High Memory Area: A 64K chunk of memory, just above 1,024K.
* UPPER MEMORY BLOCKS are called the unused parts of it.
* This area is normally reserved for running system's hardware.

ram.UMA

name::
* McsEngl.ram.UMA@cptIt,
* McsEngl.UPPER-MEMORY-AREA@cptIt,

A 384K of space. It is not considered part of the total memory because programs cannot store information in this area. Normaly reserved for running system's hardware.

ram.SRAM

name::
* McsEngl.ram.SRAM@cptIt,
* McsEngl.Static-RAM@cptIt,

Η στατική μνήμη αποθηκεύει τα δεδομένα ΧΩΡΙΣ αυτόματη ανανέωση ρεύματος, γιαυτό και το όνομά της 'στατική'. Η μόνη φορά που γίνεται ανανέωση, είναι όταν εκτελείται μία εντολή εγγραφής.
Το πλεονέκτημά της είναι η ΤΑΧΥΤΗΤΑ, 12ns.
Το κοστος της είναι απαγορευτικό για ευρεία χρήση, έτσι χρησιμοπειείται για L2 cache.
[RAM 1998feb, 216]

cmr'part.SPEAKER

NAME

name::
* McsEngl.cmr'part.SPEAKER@cptIt,
* McsEngl.conceptIt460,
* McsEngl.computer's-speaker@cptIt,
* McsEngl.monitor-loudspeaker@cptIt,
* McsEngl.sound-box@cptIt,
* McsElln.ΗΧΕΙΟ-ΥΠΟΛΟΓΙΣΤΗ@cptIt,

SPECIFIC

Specific_concepts (level 3) =

ΤΕΧΝΟΛΟΓΙΚΗ ΣΥΣΤΗΜΑΤΩΝ

Σύστημα ηχείων της Sony, Μπαίνει κάτω απο την οθόνη.

cmr'Computer-language#ql:computer-language#

name::
* McsEngl.cmr'Computer-language@cptIt,

cmr'byte

name::
* McsEngl.cmr'byte@cptIt,
* McsEngl.byte@cptIt,

_DESCRIPTION:
A byte is a sequence of eight bits, represented as a double-digit hexadecimal number in the range 0x00 to 0xFF.
[http://encoding.spec.whatwg.org/]
===
Hexadecimal numerals are widely used by computer system designers and programmers.
As each hexadecimal digit represents four binary digits (bits), it allows a more human-friendly representation of binary-coded values.
One hexadecimal digit represents a nibble (4 bits), which is half of an octet or byte (8 bits).
For example, a single byte can have values ranging from 00000000 to 11111111 in binary form, but this may be more conveniently represented as 00 to FF in hexadecimal.
In a non-programming context, a subscript is typically used to give the radix, for example the decimal value 10,995 would be expressed in hexadecimal as 2AF316.
Several notations are used to support hexadecimal representation of constants in programming languages, usually involving a prefix or suffix.
The prefix "0x" is used in C and related languages, where this value might be denoted as 0x2AF3.
0hex  =  0dec  =  0oct  0  0  0  0
1hex  =  1dec  =  1oct  0  0  0  1
2hex  =  2dec  =  2oct  0  0  1  0
3hex  =  3dec  =  3oct  0  0  1  1
4hex  =  4dec  =  4oct  0  1  0  0
5hex  =  5dec  =  5oct  0  1  0  1
6hex  =  6dec  =  6oct  0  1  1  0
7hex  =  7dec  =  7oct  0  1  1  1
8hex  =  8dec  =  10oct  1  0  0  0
9hex  =  9dec  =  11oct  1  0  0  1
Ahex  =  10dec  =  12oct  1  0  1  0
Bhex  =  11dec  =  13oct  1  0  1  1
Chex  =  12dec  =  14oct  1  1  0  0
Dhex  =  13dec  =  15oct  1  1  0  1
Ehex  =  14dec  =  16oct  1  1  1  0
Fhex  =  15dec  =  17oct  1  1  1  1
[https://en.wikipedia.org/wiki/Hexadecimal]

cmr'Data ::this.part#cptIt242#

name::
* McsEngl.cmr'Data ::this.part@cptIt,

cmr'evaluation#cptCore546.107#

name::
* McsEngl.cmr'evaluation@cptIt,

Benchmark
A benchmark is a process or program that can be executed to measure and compare the performance of one system against another.
Testing the relative performance of microcomputer systems must deal with the problem of different CPUs, different FPUs, and different operating systems. Benchmark tests should be designed on some sort of common ground so that the results present a true measure of system performance even across brandnames and architectures.
There should be low-level tests to measure floating point operations and application-level tests to measure things like the speed of spreadsheet re-calculations.
[SOURCE: PC-GLOSSARY 1993]

cmr'Health

name::
* McsEngl.cmr'Health@cptIt,

Οι υπολογιστές και τα μάτια μας  
Τι ΔΕΝ προκαλεί ο υπολογιστής μας;
Λόγω της μεγάλης απήχησης που έχουν τα computers στην εποχή που ζούμε, όχι μόνο στο γραφείο αλλά και στο σπίτι, έχει δημιουργηθεί η άποψη ότι οι υπολογιστές μας είναι μηχανήματα βλαβερά για τα μάτια μας. Πολλοί άνθρωποι καταφεύγουν στον οφθαλμίατρό τους, κάνοντας παράπονα για ενοχλήσεις και κούραση στα μάτια τους μετά από παρατεταμένη και συνεχή χρήση του υπολογιστή τους.

Θα πρέπει όμως, να γίνει κατανοητό ότι, πολλές έρευνες που έχουν γίνει στον τομέα αυτό, σε όλα τα προηγμένα κράτη, έδειξαν ότι τα video terminals δεν βλάπτουν τα μάτια μας. Κι αυτό διότι αποδείχτηκε ότι τα video terminals εκπέμπουν πολύ λίγη ή καθόλου βλαβερή ακτινοβολία, όπως ακτίνες-Χ ή υπεριώδη ακτινοβολία. Επομένως, με απλά λόγια, τα μάτια μας δεν κινδυνεύουν μακροπρόθεσμα από την οθόνη του υπολογιστή μας.

Τι προκαλεί ο υπολογιστής μας;

Ωστόσο, πολλοί παραπονιούνται για ενοχλήσεις που έχουν στα μάτια τους μετά από πολλές ώρες μπροστά στο monitor. Τα μάτια μπορεί να είναι ελαφρά ερεθισμένα (δηλ. ελαφρώς κόκκινα), να υπάρχει η αίσθηση ξένου σώματος και βάρους στους βολβούς, να δακρύζουν ενώ η όραση να θολώνει. Ολα αυτά είναι συχνά φαινόμενα και απολύτως πραγματικά. Ας δούμε όμως τι συμβαίνει.

Η συνεχής προσείλωση στην οθόνη, μας κάνει να ανοιγοκλείνουμε αντανακλαστικά τα μάτια μας όλο και λιγότερο. Αυτό έχει ως συνέπεια το δακρυικό φίλμ, που καλύπτει τα μάτια μας να εξατμίζεται πιο εύκολα και να δημιουργείται μια κατάσταση ελαφράς ξηροφθαλμίας. Αυτό επιδεινώνεται αν το μικροκλίμα στο οποίο βρισκόμαστε δεν είναι καλό (ξηρασία περιβάλλοντος, air condition ή πολύ ζέστη, κακός φωτισμός). Τα συμπτώματα που ακολουθούν είναι τα παραπάνω που αναφέραμε.

Πολλές φορές έχουμε και πονοκεφάλους ή ζαλάδες. Αυτό οφείλεται στην στάση που παίρνουμε μπροστά στην οθόνη του υπολογιστή μας. Μια συνεχής και σταθερή στάση, ειδικά αν ο κομπιούτερ βρίσκεται πιο ψηλά από το επίπεδο της κεφαλής μας, προκαλεί τάσεις στον αυχένα μας με συνέπεια να υπάρξουν μυοτασικές κεφαλαλγίες και ζαλάδες.

Επίσης, τα μάτια μας βρίσκονται σε μια διαρκή αλλαγή εστίας σε κοντινή απόσταση (στο πληκτρολόγιο, στην οθόνη, στα έγγραφά μας). Και αυτό το γεγονός κουράζει τους μυς των ματιών μας με αποτέλεσμα πονοκέφαλο, βάρος στους βολβούς, ζαλάδα.

Τι πρέπει να κάνετε



Οι διάφοροι ερευνητές συνιστούν να μην ξεπερνούμε τις 4 συνεχείς ώρες εργασίας μπροστά από τον υπολογιστή κάνοντας διαλείμματα των 10-15 λεπτών.

Κρατήστε μια απόσταση μπροστά από τον υπολογιστή γύρω στα 40 εκατοστά.

Η οθόνη θα πρέπει να είναι ελαφρά πιο κάτω από το επίπεδο των ματιών μας.

Έχετε τον σωστό φωτισμό και στη οθόνη και γύρω σας έτσι ώστε να να αποφεύγετε ενοχλητικές ανακλάσεις. Τα ειδικά φίλτρα δεν έχουν ιδιαίτερα αποτελέσματα παρά μόνο στην μείωση των ανακλάσεων.

Οι οθόνες TFT, LCD έχουν πολύ καλύτερη ανάλυση ενώ δεν υπάρχει το τρεμοπαίξιμο (flickering) της οθόνης του καθοδικού σωλήνα που κουράζει τα μάτια. Επίσης, οι ανακλάσεις στις οθόνες αυτές είναι πολύ λιγότερες.

Εφόσον έχετε πονοκέφαλο, ένα ελαφρύ μασάζ στον αυχένα βοηθάει στον να χαλαρώσουν οι μυς της περιοχής.

Αν αισθάνεστε σαν να έχεται άμμο στα μάτια σας, ρίξτε τους κρύο νερό ή χρησιμοποιείστε τεχνητά δάκρυα. Είναι αποτελεσματικά, ακίνδυνα και μπορείτε να τα χρησιμοποιείτε όσες φορές θέλετε.

Χρησιμοποιήστε μόνο τα γυαλιά που σας έδωσε ο οφθαλμίατρός σας και εφόσον υπάρχει συνταγή διόρθωσης. Υπάρχουν ειδικά γυαλιά για computers που έχουν ειδικές επιστρώσεις για την μείωση των ανακλάσεων και 10% σκουρότητα για την αντιμετώπιση της φωτεινότητας της οθόνης. Προσφέρουν πιο ξεκούραστη όραση. Συμβουλευθείτε τον οφθαλμίατρό σας για τα γυαλιά αυτά ή για εκείνα με διόρθωση που πρέπει να χρησιμοποιείτε.

Αν τα συμπτώματα εξακολουθούν να σας ενοχλούν, επισκεφθείτε τον οφθαλμίατρό σας, ο οποίος είναι και ο μόνος ο οποίος μπορεί να σας δώσει συμβουλές και ειδική θεραπεία αν χρειαστεί.

Συμπέρασμα


Θα πρέπει να γίνει κατανοητό ότι, τα computers δεν είναι βλαβερά για τα μάτια μας. Ευθύνονται, ωστόσο, για κάποια συμπτώματα τα οποία όμως δεν προκαλούν μόνιμες βλάβες στα μάτια μας παρά μόνο ενοχλήσεις οι οποίες μπορούν να περιοριστούν αν ακολουθήσουμε τις συμβουλές των ειδικών.

Νίκος Γ. Τσιούμας, M.D.
Χειρουργός Οφθαλμίατρος
URL : http://www.iatronet.gr/users/defaultGreek.htm

Επικοινωνία
gtsioumas@hotmail.com και
eyelife@otenet.gr
[http://www.teicrete.gr/users/kutrulis/Igiini_Asfalia/Ergonomia.htm]

11 hours a day in front of a screen. This is what it's doing to your eyes
An illustration picture shows a woman looking at the Facebook website on a computer in Munich February 2, 2012. Our bodies and eyes aren't designed for modern digital lifestyles and workplaces. Image: REUTERS/Michael Dalder
Written by
Roy Hessel
President and CEO, Coastal
Published
Thursday 1 September 2016
Share

Latest Articles

As Singapore reports Zika cases, a look at how the virus is spreading
Joe Myers 1 Sep 2016

10 questions to find real meaning at work
Regular Author
Paolo Gallo
1 Sep 2016

These multi-billion dollar projects have been cancelled because of a lack of water
Brett Walton 1 Sep 2016
More on the agenda Further reading arrow
Your mom warned you sitting too close to the TV wasn’t a good idea. It turns out she wasn’t entirely off the mark.

“Digital eye strain” is now a real condition, defined as the physical eye discomfort felt after two or more hours in front of a digital screen. As screen time increases - at home and in the office - so do symptoms like blurred vision, burning eyes, headaches and disrupted sleep. In total, nearly two thirds of American adults now experience symptoms of digital eye strain due to prolonged use of electronic devices like computers, tablets and cell phones.

It’s not hard to see why. For many of us, the glow of a phone’s screen is the first thing we see when we wake and the last thing we see before sleep. In between, we fill the hours bathed in LED light, staring first at documents and emails, then Facebook updates and Netflix. One of the biggest eye-burn culprits, not surprisingly, is the office, where being planted in front of a screen is often a requirement of the job. Our bodies and eyes just weren’t designed for modern digital lifestyles and workplaces.


I’ve spent my career in the optical industry, following these trends. Along the way, I’ve seen mountains of studies and reports and also tracked the efforts of doctors and scientists trying to fight what may be a hidden epidemic. The harm we’re doing to our vision, it turns out, could be very real and may even be getting worse. But it is preventable.

Online, all the time

Technology has completely transformed the demands on our eyes. TV is no longer the main culprit (though household viewing hours have more than doubled since the 1950s). Screen time is expanding far more quickly outside the living room. Ratings agency Nielsen reports Americans aged 18 and older now spend 11 hours per day in total using electronic media like TV, smartphones, and computers.

Always on: Americans spend 11 hours a day looking at screens
Image: REUTERS/Regis Duvignau
Modern workplaces are piling onto this trend. We’ve grown accustomed to mobile devices that push emails to us everywhere. Now apps like Slack and Facebook at Work are opening up entirely new avenues to communicate digitally. Physical facetime has given way to Apple Facetime and virtual group chats. The trend only stands to get worse: Citrix reports that by 2020, employees will access their work using an average of six different computing devices per day.

Not so easy on the eyes

All that time in front of computers, phones and tablets is affecting people’s health. The majority of Americans now report symptoms of digital eye strain, including neck, shoulder and back pain (36%), eye strain (35%), headaches (25%), blurred vision (25%) and dry eyes (24%). Worryingly, the percentage of sufferers is greater among young people. Some 73% of adults under 30 now experience these symptoms, suggesting a generational trend.

One growing source of potential concern is the kind of light most digital devices emit. We all know about the invisible dangers of ultraviolet or UV light, but fewer people are aware of the potential risks of high energy light that we can see: blue light. Light on the blue end of the visual light spectrum contains more energy than warm colours like oranges and reds, and is known as high energy visual light (HEV).

Rainbow over Tokyo
Light brings both pleasure and peril
Image: REUTERS/Toru Hanai
Blue light is everywhere, including in sunlight. However, digital screens and fluorescent and LED office lighting have drastically increased our exposure. It’s not all bad - blue light’s abundance in daylight boosts alertness. But when we’re bathing ourselves in HEV light constantly, the sustained exposure may well add up, preventing our bodies from settling into healthy sleep.

And unlike with UV light, human eyes do a poor job of filtering out blue light. Most worryingly, recent studies suggest HEV light can contribute to retinal damage and macular degeneration - an irreversible loss of vision. Research on this subject is just beginning, but early signs point to an association between long-term exposure and serious consequences.

Light at the end of the tunnel

Thankfully, there are ways to reduce the harm from our digital lifestyles. The challenge, however, is getting people to pay attention and actually change their ways - on the job and off.

Simple lifestyle adjustments - while decidedly low-tech - can make a dramatic difference. The easiest fix is to just take a break. I actively promote the 20-20-20 rule in our office at Clearly: take a 20-second break every 20 minutes to look at something 20 feet away. It’s also worth reminding yourself to blink more often (sounds silly, but actually makes a difference). Staring at screens often reduces how often people blink, making their eyes drier. You can also adjust the size of the type or the brightness of your display and sit farther from your screen.

Then there are technological solutions. Mobile devices running recent versions of Apple’s iOS have a feature called Night Shift, which shifts the display colors towards the warmer end of the visual spectrum. F.lux is a downloadable app available on many platforms that does this too.

Specialized eyewear is also starting to catch up to the threat, though many people are still unaware of their options. Anti-reflective lenses decrease reflection from overhead lights and improve contrast. The latest generation of lenses can even block out blue light. We recently partnered with social media startup Hootsuite to provide their hundreds of employees with glasses featuring KODAK’s BlueReflect lenses, which have a special coating that selectively absorbs part of the blue light, preventing it from entering the cornea and reaching the back of the eye. Results thus far have been positive, with workers reporting fewer headaches, irritated eyes and other symptoms of digital eye strain.

Technology has irreversibly changed how people live and work. But vision health has lagged dangerously behind. For today’s digital workforce, awareness of dangers - and solutions - is critical. Technology may be evolving rapidly, but we still only get one set of eyes.

Roy Hessel is president and CEO of Clearly and Coastal.
[https://www.weforum.org/agenda/2016/09/staring-down-the-dangers-of-the-digital-workplace]

cmr'human

name::
* McsEngl.cmr'human@cptIt,

_SPECIFIC:
Sabeer Bhatia borned in Chandigarh, India and co-founded first free email service site Hotmail.com with Jack Smith.

Tim Berners-Lee is the inventor of the World Wide Web and Director of the World Wide Web Consortium (W3C).

Larry Page is co-founder of the Google internet search engine, now Google Inc.

Sergey Brin is co-founder of the Google internet search engine, now Google Inc. He co-founded google with Larry Page.

Charles Babbage is known as the father of computer.

Larry Wall is the inventor of Perl, rn,patch, and many other wonderful things. He is the language designer for Perl 6, and has staked out the perl5 to perl6 translator as his own project.

Rasmus Lerdorf is father of PHP.Here is Rasmus pictured in the ship's exotic Greek ballroom at the conclusion of an hour's question and answer session.

James Gosling is a famous software developer, best known as the father of the Java programming language.

Dennis Ritchie is an American computer scientist notable for his influence on ALTRAN, B, BCPL, C, Multics, and Unix.

Bjarne Stroustrup designed and implemented the C++ programming language. He is the College of Engineering Professor in Computer Science at Texas A&M University.

Bill Gates founded Microsoft with Paul Allen

Michael Dell Michael Saul Dell (born February 23, 1965, in Houston, Texas) is an American businessman and the founder and CEO of Dell, Inc.

Mark Elliot Zuckerberg Mark Elliot Zuckerberg co-founding Facebook in 2004; world's 2nd youngest self-made billionaire (2012)
[http://www.tutorialspoint.com/computer_whoiswho.htm]

cmr'power-consumption

name::
* McsEngl.cmr'power-consumption@cptIt,

_DESCRIPTION:
Power consumption is another measurement that is important in modern computers. Power efficiency can often be traded for speed or lower cost. The typical measurement in this case is MIPS/W (millions of instructions per second per watt).
Modern circuits have less power per transistor as the number of transistors per chip grows. Therefore, power efficiency has increased in importance. Recent processor designs such as the Intel Core 2 put more emphasis on increasing power efficiency. Also, in the world of embedded computing, power efficiency has long been and remains an important goal next to throughput and latency.
[http://en.wikipedia.org/wiki/Computer_architecture]

cmr'radiation

name::
* McsEngl.cmr'radiation@cptIt,

_DESCRIPTION:
Microcomputers emit radiation that can interfere with television reception, emergency communications, air traffic control, and other services using electronic devices.
The Federal Communications Commission (FCC) is trying to regulate the computer industry and protect the electromagnetic spectrum.
The most potent source of Radio Frequency Interference from a microcomputer is the crystal that controls the microprocessor's clock speed. But other components of a computer can cause RFI, such as, the monitor, the keyboard, and the power supply.
[SOURCE: PC-GLOSSARY 1993]

cmr'reliability (αξιοπιστία)

name::
* McsEngl.cmr'reliability (αξιοπιστία)@cptIt,

cmr'resource

name::
* McsEngl.cmr'resource@cptIt,

cmr'The-machine-that-changed-the-world {1992}

name::
* McsEngl.cmr'The-machine-that-changed-the-world {1992}@cptIt,

_DESCRIPTION:
The Machine That Changed the World (1992) (broadcast under the alternative title "The Dream Machine" in the UK, with different narration) is a 5-episode television series on the history of electronic digital computers. It was written and directed by Nancy Linde, and produced by WGBH Television of Boston, Massachusetts, and the British Broadcasting Corporation. Backers included the Association for Computing Machinery, the National Science Foundation, and the UNISYS Corporation.

The first three episodes deal with the history of fully electronic general-purpose digital computers from the ENIAC through desktop microcomputers. The pre-history of such machines is examined in the first episode ("Giant Brains"), and includes a discussion of the contributions of Charles Babbage, Ada Lovelace, Alan Turing, and others.
The fourth episode ("The Thinking Machine") explores the topic of artificial intelligence.
The fifth episode ("The World at Your Fingertips") explores the then-newly-emerging worldwide networking of computers. All episodes begin and end with a song by Peter Howell, "Stellae matutinae radius exoritur" ("The morning star's ray arises") and are narrated by long-time Frontline narrator Will Lyman.
[http://en.wikipedia.org/wiki/The_Machine_That_Changed_the_World_(TV_miniseries)]

Giant Brains:
* http://waxy.org/2008/06/the_machine_that_changed_the_world//

cmr'sector

name::
* McsEngl.cmr'sector@cptIt,
* McsEngl.sector.computer@cptIt,

_GENERIC:
* sector-of-economy#cptEconomy7.116#

_ADDRESS.WPG:
* https://www.weforum.org/agenda/2016/04/4-charts-that-explain-the-decline-of-the-pc??

cmr'security

name::
* McsEngl.cmr'security@cptIt,

NSA reportedly using radio waves to tap offline computers
Spy agency uses covert channel of radio waves to access and alter data on non-Internet-connected computers, the New York Times reports.

by Steven Musil January 14, 2014 6:45 PM PST

The National Security Agency is using secret wireless technology that allows it to access and alter data on computers, even when they are not connected to the Internet, according to a New York Times report.
Since 2008, the agency has been increasingly using "a covert channel of radio waves" that can transmit from hardware installed in the computers, according to NSA documents and experts interviewed by the Times. Signals can then be sent to briefcase-size relay stations miles away, according to the report.
The NSA has also installed surveillance software on nearly 100,000 computers around the world, according to the Times. The newspaper said the Chinese Army was a frequent target of such technology but said there was no evidence that the agency used either technology inside the US.
[http://news.cnet.com/8301-13578_3-57617244-38/nsa-reportedly-using-radio-waves-to-tap-offline-computers/]

cmr'speed

name::
* McsEngl.cmr'speed@cptIt,
* McsEngl.computer'speed@cptIt,

_SPECIFIC:
* SPEED-in-communication#cptIt68: attSpe#
* SPEED-in-information-processing#cptIt217: attPar#

{time.2018}:
For the first time in five years, the world's fastest computer is American
Summit holds the world record of 200 quadrillion [=USA 10^15 peta] calculations per second
[https://www.weforum.org/agenda/2018/06/america-now-has-the-fastest-supercomputer-in-the-world-here-s-why-that-actually-matters?]

{time.2014}:
Με επεξεργαστική ισχύ 33,86 petaflop/s
Στην Κίνα ο ισχυρότερος υπερυπολογιστής
Ο «Τιανχέ-2», που ανήκει στην κινεζική κυβέρνηση και είναι εγκατεστημένος στο Εθνικό Πανεπιστήμιο Αμυντικής Τεχνολογίας, ανακηρύχθηκε Νο 1 για το πρώτο εξάμηνο του 2014 στον κατάλογο των 500 ταχύτερων ηλεκτρονικών υπολογιστών διεθνώς. Διαθέτει επεξεργαστική ισχύ 33,86 petaflop/s (τετράκις εκατομμύρια υπολογισμοί ανά δευτερόλεπτο).
Στην κορυφή ο κινεζικός υπερυπολογιστής «Tianhe-2»
Στην κορυφή ο κινεζικός υπερυπολογιστής «Tianhe-2»
Ο πρωταθλητής «Τιανχέ-2» χρησιμοποιείται για ερευνητικούς και εκπαιδευτικούς σκοπούς.

Η σχετική λίστα «Top 500» ανανεώνεται δύο φορές ετησίως. Από την προηγούμενη φορά, η Κίνα έχει 20% περισσότερους υπερυπολογιστές στο «Top 500», ενώ οι ΗΠΑ 15% λιγότερους.

Πάντως, οι ΗΠΑ παραμένουν η κυρίαρχη δύναμη με 233 υπολογιστές μεταξύ των 500 ισχυρότερων παγκοσμίως, έναντι 76 της Κίνας, 30 της Βρετανίας, 27 της Γαλλίας και 23 της Γερμανίας.

Ο πλήρης κατάλογος του «Top 500», που άρχισε να συντάσσεται το 1993 και αποτελεί«βαρόμετρο» για την υπολογιστική ισχύ κάθε κράτους, θα δημοσιοποιηθεί την ερχόμενη Δευτέρα στη Λειψία της Γερμανίας, σύμφωνα με το BBC.

Όλα μαζί τα μηχανήματα του «Top 500» έχουν επεξεργαστική ισχύ περίπου 274 petaflop ανά δευτερόλεπτο.

Το φράγμα του ενός petaflop έσπασε πριν πέντε χρόνια ο υπερ-υπολογιστής Roadrunner της αμερικανικής εταιρείας ΙΒΜ, ο οποίος το 2013 «βγήκε στη σύνταξη» λόγω υπερβολικής κατανάλωσης ηλεκτρικής ενέργειας.
[http://www.enet.gr/?i=news.el.article&id=436701]

{time.2013}:
Κινεζικός ο ταχύτερος υπερ-υπολογιστής στον κόσμο
Από: Sigmalive/AΠΕ Ημερομηνία: Ιούνιος 17, 2013 18:26
Ένας κινεζικός υπερ-υπολογιστής, ο Τιανχέ-2, ξαναπαίρνει τον επίζηλο τίτλο του ταχύτερου στον κόσμο, αφήνοντας στη δεύτερη θέση τον αμερικανικό «Τιτάν». Η Κίνα ήταν παγκόσμιος «πρωταθλητής» μεταξύ Νοεμβρίου 2010 και Ιουνίου 2011, αλλά έκτοτε είχε χάσει την πρωτοκαθεδρία της.

Ο Τιανχέ-2 (σημαίνει «Γαλαξίας-2»), που δημιουργήθηκε από το Εθνικό Πανεπιστήμιο Αμυντικής Τεχνολογίας της Κίνας, σύμφωνα με το BBC, βρίσκεται στη Νο 1 θέση της λίστας των 500 ισχυρότερων υπολογιστών διεθνώς, την οποία καταρτίζει μια διεθνής ομάδα αναλυτών με επικεφαλής τον καθηγητή Χανς Μόιερ του γερμανικού πανεπιστημίου του Μανχάιμ. Μεταξύ των 500 ισχυρότερων υπολογιστών, οι 252 είναι αμερικανικοί, οι 66 κινεζικοί, οι 30 ιαπωνικοί, οι 29 βρετανικοί, οι 23 γαλλικοί και οι 19 γερμανικοί.

Η αναρρίχηση του κινεζικού υπολογιστή στην κορυφή αποτελεί έκπληξη, επειδή το εν λόγω σύστημα δεν αναμενόταν να είναι έτοιμο πριν το 2015. Την πρώτη πεντάδα των ταχύτερων σούπερ-υπολογιστών συμπληρώνουν κατά σειρά οι «Σεκόγια» (ΗΠΑ), Υπολογιστής Κ (Ιαπωνία) και Μίρα (ΗΠΑ).

Ο Τιανχέ-2 «τρέχει» στα 33,86 petaflop ανά δευτερόλεπτο, δηλαδή κάνει 33.860 τρισεκατομμύρια υπολογισμούς ανά δευτερόλεπτο, αν και θεωρητικά θα μπορούσε να αυξήσει περαιτέρω την απόδοσή του στα 54,9 petaflop ανά δευτερόλεπτο. Συγκριτικά, ο δεύτερος αμερικανικός «Τιτάν» έχει πραγματική απόδοση 17,59 petaflop/sec και θεωρητική απόδοση 27,11 petaflop/sec, δηλαδή περίπου τη μισή σε σχέση με τον κινεζικό «γίγαντα».

Το κινεζικό μηχάνημα χρησιμοποιεί συνολικά 3,13 εκατομμύρια πυρήνες επεξεργαστών και πολλά από τα εξαρτήματά του είναι καθαρά κινεζικής κατασκευής, μεταξύ των οποίων το λειτουργικό σύστημα Kylin (η ονομασία του μυθικού κινεζικού μονόκερου), που βασίζεται στο σύστημα Linux.

Η ανάπτυξη του Τιανχέ-2 εντάσσεται στο φιλόδοξο πρόγραμμα υψηλής τεχνολογίας της κινεζικής κυβέρνησης, που αποσκοπεί στο να κάνει πιο ανταγωνιστική την Κίνα και λιγότερο εξαρτημένη τεχνολογικά από άλλες χώρες. Οι ΗΠΑ δεν αναμένεται να αποκτήσουν κάποιον ισχυρότερο υπερ-υπολογιστή από τον «Τιτάνα» πριν το 2015.
[http://www.sigmalive.com/news/scitech/51049]

cmr'useful-life

name::
* McsEngl.cmr'useful-life@cptIt,

Η ΧΡΗΣΙΜΗ ΖΩΗ ΕΝΟΣ ΥΠΟΛΟΓΙΣΤΙΚΟΥ ΣΥΣΤΗΜΑΤΟΣ ΥΠΟΛΟΓΙΖΕΤΑΙ ΣΗΜΕΡΑ ΣΤΑ 4 ΜΕ 5 ΧΡΟΝΙΑ.
[RAM, ΜΑΡΤ 1993, ΕΝΘΕΤΟ 4]

cmr'user

name::
* McsEngl.cmr'user@cptIt,

Eurostat: Σε χαμηλά επίπεδα η χρήση Η/Υ στην Ελλάδα
Μόνο το 59% του συνολικού πληθυσμού έχει χρησιμοποιήσει υπολογιστή

Ενα από τα χαμηλότερα ποσοστά χρήσης ηλεκτρονικών υπολογιστών στην ΕΕ καταγράφει η Ελλάδα, στις ηλικίες 16- 74 ετών, σύμφωνα με τα τελευταία διαθέσιμα στοιχεία της Eurostat.

Για το 2011, μόνο το 59% του πληθυσμού της Ελλάδας, από 16 ως 74 ετών, έχει χρησιμοποιήσει ηλεκτρονικό υπολογιστή. Το ποσοστό αυτό είναι το τρίτο χαμηλότερο στην ΕΕ, μετά τη Ρουμανία (50%) και τη Βουλγαρία (55%). Τα υψηλότερα ποσοστά καταγράφονται στη Σουηδία (96%) και ακολούθως στη Δανία, στο Λουξεμβούργο και στην Ολλανδία (94%). Το αντίστοιχο ποσοστό στην «ΕΕ των 27» είναι 78%.

Σε ό,τι αφορά τη χρήση υπολογιστών από τους νέους ηλικίας 16- 24 ετών, η Ελλάδα καταγράφει ποσοστό 97%, έναντι 96% που είναι ο ευρωπαϊκός μέσος όρος. Στο 100% ανέρχεται η χρήση ηλεκτρονικών υπολογιστών για τους νέους στην Ολλανδία, την Αυστρία, το Λουξεμβούργο, τη Σουηδία, τη Φινλανδία και τη Μ. Βρετανία. Τα χαμηλότερα ποσοστά καταγράφονται στη Ρουμανία (81%), στη Βουλγαρία (87%) και στην Ιταλία (90%).

Σε ό,τι αφορά τις δεξιότητες των νέων ηλικίας 16- 24 ετών, που χρησιμοποιούν ηλεκτρονικούς υπολογιστές στην Ελλάδα, το 88% έχει αντιγράψει ή μεταφέρει ηλεκτρονικό αρχείο (έναντι 89% στην ΕΕ), το 65% έχει χρησιμοποιήσει βασικές αριθμητικές φόρμουλες σε φύλλα εργασίας (έναντι 67% στην ΕΕ) και το 17% έχει γράψει πρόγραμμα ηλεκτρονικού υπολογιστή (έναντι 20% στην ΕΕ).

Τέλος, στην Ελλάδα, το 4,2% των απόφοιτων τριτοβάθμιας εκπαίδευσης διαθέτει πτυχίο πληροφορικής, έναντι 3,4% στην ΕΕ των 27.
[http://www.tovima.gr/society/article/?aid=450322&h1=true, 2012-03-26]

cmr'User-interface

name::
* McsEngl.cmr'User-interface@cptIt,

US researchers take step toward telepathic communication from people to robots
FT Breaking News <FT@newsletters.ft.com> Unsubscribe
5:06 PM (43 minutes ago) {2017-03-06}

FINANCIAL TIMES - Breaking News
US researchers take step toward telepathic communication from people to robots
US researchers have taken a step toward telepathic communication from people to robots, by developing a mind-reading device that allows humans to correct a machine instantly with nothing more than brainwaves.

The prototype brain-computer interface developed by Massachusetts Institute of Technology allows a human observer to transmit an immediate error message to a robot, telling it to fix a mistake when it does something wrong.

Technology that enables humans to interact with robots intuitively through their thoughts could have a range of industrial and medical applications, from robotic limbs to self-driving vehicles.

cmr'doing#cptCore475#

name::
* McsEngl.cmr'doing@cptIt,
* McsEngl.computing@cptIt,

_DESCRIPTION:
Computing is any goal-oriented activity requiring, benefiting from, or creating computers. For example, computing includes designing, developing and building hardware and software systems; processing, structuring, and managing various kinds of information; doing scientific research on and with computers; making computer systems behave intelligently; creating and using communications and entertainment media etc. Sub-disciplines of computing include computer engineering, software engineering, computer science, information systems, and information technology.
[http://en.wikipedia.org/wiki/Computing] {2013-08-08}

_SPECIFIC:
* information processing#cptIt#

cmr'doing.assemblage

name::
* McsEngl.cmr'doing.assemblage@cptIt,
* McsEngl.cmr'assemblage@cptIt,

_ADDRESS.WPG:
* https://www.youtube.com/watch?v=SBHqymEUg0s,

cmr'buying

name::
* McsEngl.cmr'buying@cptIt,
====== lagoGreek:
* McsElln.ΕΠΙΛΟΓΗ-ΣΥΣΤΗΜΑΤΟΣ@cptIt,

1. Η ΕΠΙΛΟΓΗ ΓΙΝΕΤΑΙ ΓΙΑ ΝΑ ΚΑΛΥΦΘΟΥΝ ΣΥΓΚΕΚΡΙΜΕΝΕΣ ΑΝΑΓΚΕΣ, ΟΠΩΣ ΑΥΤΕΣ ΠΟΥ ΥΠΑΡΧΟΥΝ ΗΔΗ ή ΔΙΑΓΡΑΦΟΝΤΑΙ ΓΙΑ ΤΟ ΕΓΓΥΣ ΜΕΛΛΟΝ.

2. Η ΕΠΙΛΟΓΗ ΜΠΟΡΕΙ ΝΑ ΓΙΝΕΙ ΕΤΣΙ ΩΣΤΕ ΝΑ ΜΗΝ ΥΠΑΡΧΕΙ ΜΕΓΑΛΗ ΔΕΣΜΕΥΣΗ ΣΤΙΣ ΜΕΛΛΟΝΤΙΚΕΣ ΜΑΣ ΕΠΙΛΟΓΕΣ.

3. Η ΕΠΙΛΟΓΗ ΔΕΝ ΕΙΝΑΙ ΑΙΩΝΙΑ...ΧΡΗΣΙΜΟΠΟΙΟΥΜΕ, ΛΟΙΠΟΝ, ΣΗΜΕΡΑ ΤΗΝ ΤΕΧΝΟΛΟΓΙΑ ΠΟΥ ΚΑΛΥΠΤΕΙ ΤΙΣ ΑΝΑΓΚΕΣ ΜΑΣ ΚΑΤΑ ΤΟΝ ΚΑΛΥΤΕΡΟ ΔΥΝΑΤΟ ΤΡΟΠΟ ΚΑΙ ΜΕΤΑ ΑΠΟ ΜΕΡΙΚΑ ΧΡΟΝΙΑ ΠΡΟΓΡΑΜΜΑΤΙΖΟΥΜΕ ΜΙΑ ΡΙΖΙΚΗ ΑΝΑΘΕΩΡΗΣΗ ΤΟΥ ΥΠΟΛΟΓΙΣΤΙΚΟΥ ΜΑΣ ΣΥΣΤΗΜΑΤΟΣ, ΠΟΥ ΘΑ ΜΑΣ ΕΠΙΤΡΕΨΕΙ ΝΑ ΧΡΗΣΙΜΟΠΟΙΗΣΟΥΜΕ ΤΗΝ ΤΕΧΝΟΛΟΓΙΑ ΠΟΥ ΒΡΙΣΚΕΤΑΙ ΤΟΤΕ ΣΤΗΝ ΑΙΧΜΗ ΤΩΝ ΕΞΕΛΙΞΕΩΝ.
[RAM, ΜΑΡΤ 1993, ΕΝΘΕΤΟ 4]

cmr'GENERIC

_GENERIC:
* entity.whole.system.it.computer#cptItsoft453#
* MACHINE#cptCore444#

SPECIFIC

name::
* McsEngl.cmr.specific@cptIt,
* McsEngl.computer.specific@cptIt,

_SPECIFIC: cmr.alphabetically:
* computer.analog#cptItsoft9#
* computer.Apple#cptItsoft48#
* computer.calculator#cptItsoft423#
* computer.portable#cptItsoft252#
* computer.book#cptItsoft316#
* computer.database,
* computer.desktop#cptItsoft251#
* computer.dictionary#cptItsoft81#
* computer.fault_tolerant-
* computer.home_entertainment-#cptItsoft273#
* computer.IBM#cptItsoft54#
* computer.intel_processor-
* computer.laptop
* computer.large
* computer.mainframe#cptItsoft268#
* computer.middle
* computer.mini
* computer.molecule
* computer.multimedia
* computer.multiprocessor
* computer.netbook
* computer.neuro#cptItsoft479#
* computer.notebooke
* computer.optical#cptItsoft314#
* computer.organizer
* computer.personal
* computer.pocket
* computer.quantum#ql:computer.quantum@cptIt227i#
* computer.small
* computer.smartphone
* computer.supercomputer#cptItsoft85#
* computer.tablet
* computer.translator#cptItsoft422#

cmr.SPECIFIC-DIVISION.processing-power

name::
* McsEngl.cmr.SPECIFIC-DIVISION.processing-power@cptIt,

_SPECIFIC:
* computer.super##
* computer.middle#cptItsoft122#
* computer.small#cptItsoft232#

cmr.SPECIFIC-DIVISION.processor

name::
* McsEngl.cmr.SPECIFIC-DIVISION.processor@cptIt,

_SPECIFIC:
MULTIPROCESSOR
RISC
 Alpha
 MIPS
 RS-6000
 SPARK
CISC,
 INTEL
   386
   486
   PENTIUM
NEUROCHIP

cmr.SPECIFIC-DIVISION.evolution

name::
* McsEngl.cmr.SPECIFIC-DIVISION.evolution@cptIt,

_SPECIFIC:
* computer.generation1
* computer.generation2
* computer.generation3
* computer.generation4
* computer.generation5

cmr.SPECIFIC-DIVISION.size

name::
* McsEngl.cmr.SPECIFIC-DIVISION.size@cptIt,

_SPECIFIC:
* computer.big-size
* computer.desktop
* computer.small-size

cmr.AGGREGATE (quantity)#cptCore88#

name::
* McsEngl.cmr.AGGREGATE (quantity)@cptIt,

Η αλλαγή στην αντιμετώπιση είναι βέβαια ένα διεθνές φαινόμενο, που ξεκίνησε από την Αμερική, στην οποία ήδη το 50% των σπιτιών έχει PC (σε σύγκριση με το 95% της TV και το 85% του βίντεο).
[βημα 1997δεκε14]

Στις ΗΠΑ αντιστοιχούν 34 υπολογιστές ανά 100 κατοίκους. Στην ευρώπη αντιστοιχούν 10/100 σύμφωνα με την επιτροπή Μπάνγκεμαν.
[ΒΗΜΑ, 3 ΙΟΥΛ. 1994, Ε4]

cmr.architecture.ABSTRACT-MACHINE (cmrAbt)#ql:abstract-computer#

name::
* McsEngl.cmr.architecture.ABSTRACT-MACHINE@cptIt,
* McsEngl.abstract-computer@cptIt,
* McsEngl.abstract-machine@cptIt, {2007-12-30}
* McsEngl.cmrAbt@cptIt,
* McsEngl.computation-model@cptIt,
* McsEngl.model-of-computation@cptIt,

_DEFINITION:
An abstract machine, also called an abstract computer, is a theoretical model of a computer hardware or software system used in Automata theory. Abstraction of computing processes is used in both the computer science and computer engineering disciplines and usually assumes discrete time paradigm.

In the theory of computation, abstract machines are often used in thought experiments regarding computability or to analyze the complexity of algorithms (see computational complexity theory). A typical abstract machine consists of a definition in terms of input, output, and the set of allowable operations used to turn the former into the latter. The best-known example is the Turing machine.

More complex definitions create abstract machines with full instruction sets, registers and models of memory. One popular model more similar to real modern machines is the RAM model, which allows random access to indexed memory locations. As the performance difference between different levels of cache memory grows, cache-sensitive models such as the external-memory model and cache-oblivious model are growing in importance.

An abstract machine can also refer to a microprocessor design which has yet to be (or is not intended to be) implemented as hardware. An abstract machine implemented as a software simulation, or for which an interpreter exists, is called a virtual machine.

Through the use of abstract machines it is possible to compute the amount of resources (time, memory, etc.) necessary to perform a particular operation without having to construct an actual system to do it.
[http://en.wikipedia.org/wiki/Abstract_machine]

cmrAbt'Input

name::
* McsEngl.cmrAbt'Input@cptIt,

cmrAbt'Output

name::
* McsEngl.cmrAbt'Output@cptIt,

cmrAbt'Instruction

name::
* McsEngl.cmrAbt'Instruction@cptIt,
* McsEngl.cmrAbt'operation@cptIt,

SPECIFIC

_SPECIFIC:
An abstract machine is a model of a computer system (considered either as hardware or software) constructed to allow a detailed and precise analysis of how the computer system works. Such a model usually consists of input, output, and operations that can be preformed (the operation set), and so can be thought of as a processor. Turing machines are the best known abstract machines, but there exist many other machines as well such as cellular automata.

Abstract machines that model software are usually thought of as having very high-level operations. For example, an abstract machine that models a banking system can have operations like "deposit," "withdraw," "transfer," etc.

An abstract machine implemented in software is termed a virtual machine, and one implemented in hardware is called simply a "machine."
[http://mathworld.wolfram.com/AbstractMachine.html]

cmrAbt.REGISTER-MACHINE

name::
* McsEngl.cmrAbt.REGISTER-MACHINE@cptIt,

_DEFINITION:
In mathematical logic and theoretical computer science a register machine is a generic class of abstract machines used in a manner similar to a Turing machine. All the models are Turing equivalent.
[http://en.wikipedia.org/wiki/Register_machine]

EVOLUTION:
In the late 1960's and early 1970's researchers expanded the counter machine model into the register machine, a close cousins to the modern notion of the computer.
[http://en.wikipedia.org/wiki/Church-Turing_thesis]

cmrAbt.COUNTER-MACHINE

name::
* McsEngl.cmrAbt.COUNTER-MACHINE@cptIt,

A computational model used in formal logic and theoretical computer science, the counter machine is the most primitive sub-class of the generic register machine models. It consists of no more than
(i) a sequence of one or more (uniquely-) named unbounded "registers" (a register can contain a single unbounded positive integer),
(ii) objects called "counters" to put into or remove from the registers, and
(iii) a list of (usually-sequential) arithmetic and control instructions for "the computer" (man or machine) to follow.
[http://en.wikipedia.org/wiki/Counter_machine]

cmrAbt.RANDOM-ACCESS-MACHINE

name::
* McsEngl.cmrAbt.RANDOM-ACCESS-MACHINE@cptIt,
* McsEngl.ram-abstract-machine@cptIt,

_DESCRIPTION:
In computer science, random access machine (RAM) is an abstract machine in the general class of register machines. The RAM is very similar to the counter machine but with the added capability of 'indirect addressing' of its registers. Like the counter machine the RAM has its instructions in the finite-state portion of the machine (the so-called Harvard architecture).
[http://en.wikipedia.org/wiki/RAM_model]

cmrAbt.RANDOM-ACCESS-STORED-PROGRAM-MACHINE

name::
* McsEngl.cmrAbt.RANDOM-ACCESS-STORED-PROGRAM-MACHINE@cptIt,
* McsEngl.rasp-machine-model@cptIt,
* McsEngl.radom-access-stored-program-abstract-machine@cptIt,

_DESCRIPTION:
In theoretical computer science the Random Access Stored Program (RASP) machine model is an abstract machine used for the purposes of algorithm development and algorithm complexity theory.
The RASP is a Random Access Machine (RAM) model that, unlike the RAM, has its program in its "registers" together with its input. The registers are unbounded (infinite in capacity); whether the number of registers is finite is model-specific. Thus the RASP is to the RAM as the Universal Turing machine is to the Turing machine. The RASP is an example of the von Neumann architecture whereas the RAM is an example of the Harvard architecture.
[http://en.wikipedia.org/wiki/Random_access_stored_program_machine]

cmrAbt.TURING-MACHINE {1936}

name::
* McsEngl.cmrAbt.TURING-MACHINE {1936}@cptIt,
* McsEngl.turing-machine@cptIt, {2007-12-31}

_DEFINITION:
A Turing machine is a machine capable of simulating and running any computer algorithm.
[https://blog.chronobank.io/what-is-a-decentralised-application-and-how-it-works-625514e207eb]
===
Turing machines are extremely basic abstract symbol-manipulating devices which, despite their simplicity, can be adapted to simulate the logic of any computer that could possibly be constructed. They were described in 1936 by Alan Turing. Though they were intended to be technically feasible, Turing machines were not meant to be a practical computing technology, but a thought experiment about the limits of mechanical computation; thus they were not actually constructed. Studying their abstract properties yields many insights into computer science and complexity theory.
A Turing machine that is able to simulate any other Turing machine is called a Universal Turing machine (UTM, or simply a universal machine). A more mathematically-oriented definition with a similar "universal" nature was introduced by Alonzo Church, whose work on lambda calculus intertwined with Turing's in a formal theory of computation known as the Church-Turing thesis. The thesis states that Turing machines indeed capture the informal notion of effective method in logic and mathematics, and provide a precise definition of an algorithm or 'mechanical procedure'.
[http://en.wikipedia.org/wiki/Turing_machine]

These are the most powerful computational machines. They possess an infinite memory in the form of a tape, and a head which can read and change the tape, and move in either direction along the tape. Turing machines are equivalent to algorithms, and are the theoretical basis for modern computers. Turing machines decide recursive languages and recognize the recursively enumerable languages.
[http://en.wikipedia.org/wiki/Automata_theory]
===
Turing machines are not physical objects but mathematical ones. We require neither soldering irons nor silicon chips to build one. The architecture is simply described, and the actions that may be carried out by the machine are simple and unambiguously specified. Turing recognized that it is not necessary to talk about how the machine carries out its actions, but merely to take as given the twin ideas that the machine can carry out the specified actions, and that those actions may be uniquely described.
... A Turing machine is a kind of state machine. At any time the machine is in any one of a finite number of states. Instructions for a Turing machine consist in specified conditions under which the machine will transition between one state and another.
[Barker-Plummer, David, "Turing Machines", The Stanford Encyclopedia of Philosophy (Winter 2007 Edition), Edward N. Zalta (ed.), URL = <http://plato.stanford.edu/archives/win2007/entries/turing-machine/>.]

turmac'TAPE:
A Turing machine has an infinite one-dimensional tape divided into cells. Traditionally we think of the tape as being horizontal with the cells arranged in a left-right orientation. The tape has one end, at the left say, and stretches infinitely far to the right. Each cell is able to contain one symbol, either ‘0’ or ‘1’.
[Barker-Plummer, David, "Turing Machines", The Stanford Encyclopedia of Philosophy (Winter 2007 Edition), Edward N. Zalta (ed.), URL = <http://plato.stanford.edu/archives/win2007/entries/turing-machine/>.]

They possess an infinite memory in the form of a tape, and a head which can read and change the tape, and move in either direction along the tape.
[http://en.wikipedia.org/wiki/Automata_theory]

turmac'HEAD:
They possess an infinite memory in the form of a tape, and a head which can read and change the tape, and move in either direction along the tape.
[http://en.wikipedia.org/wiki/Automata_theory]

turmac'TRANSITION_RULE:
turmac'INSTRUCTION:
Each transition rule is a 4-tuple:
< State0, Symbol, Statenext, Action >
which can be read as saying “if the machine is in state State0 and the current cell contains Symbol then move into state Statenext taking Action”.
... a table of transition rules, which serve as the "program" for the machine.
[Barker-Plummer, David, "Turing Machines", The Stanford Encyclopedia of Philosophy (Winter 2007 Edition), Edward N. Zalta (ed.), URL = <http://plato.stanford.edu/archives/win2007/entries/turing-machine/>.]

turmac'ACTION:
The action of a Turing machine is determined completely by
(1) the current state of the machine
(2) the symbol in the cell currently being scanned by the head and
(3) a table of transition rules, which serve as the “program” for the machine.
... The actions available to a Turing machine are either to write a symbol on the tape in the current cell (which we will denote with the symbol in question), or to move the head one cell to the left or right, which we will denote by the symbols « and » respectively.
... If the machine reaches a situation in which there is not exactly one transition rule specified, i.e., none or more than one, then the machine halts.
[Barker-Plummer, David, "Turing Machines", The Stanford Encyclopedia of Philosophy (Winter 2007 Edition), Edward N. Zalta (ed.), URL = <http://plato.stanford.edu/archives/win2007/entries/turing-machine/>.]

_GENERIC:
* COMPUTATION_MODEL#ql:computation_model-*###
* AUTOMATON##

turmac'AND'PROGRAMING-LANGUAGE

name::
* McsEngl.turmac'AND'PROGRAMING-LANGUAGE@cptIt,
* McsEngl.turing-machine-and-programing-langauge@cptCore364i,
* McsEngl.programing-langauge-and-turing-machine@cptCore364i,

_DESCRIPTION:
The lambda calculus can be thought of as an idealized, minimalistic programming language.
It is a close cousin of the Turing machine, another minimalist abstraction capable of expressing any algorithm.
The difference between the two is that the lambda calculus takes a functional view of algorithms, while the original Turing machine takes an imperative view.
That is, a Turing machine maintains 'state' - a 'notebook' of symbols that can change from one instruction to the next.
The imperative paradigm can be seen in programming languages like C or BASIC.
By contrast, the lambda calculus is stateless, it deals exclusively with functions which accept and return data (including other functions), but produce no side effects in 'state' and do not make alterations to incoming data (immutability.)
The functional paradigm can be seen in modern languages like Lisp, Scheme and Haskell.
[http://en.wikipedia.org/wiki/Lambda_calculus]

cmrAbt.UNIVERSAL-TURING-MACHINE

name::
* McsEngl.cmrAbt.UNIVERSAL-TURING-MACHINE@cptIt,
* McsEngl.universal-turing-machine@cptIt,

_DEFINITION:
Alan Turing's "universal computing machine" (alternately "universal machine", "machine U", "U") is the name given by him (1936-1937) to his model of an all-purpose "a-machine" (computing machine) that could "run" any arbitrary (but well-formed) sequence of instructions called "quintuples".
This model is considered by some (e.g., Davis (2000)) to be the origin of the "stored program computer" -- used by John von Neumann (1946) for his "Electronic Computing Instrument" that now bears von Neumann's name: the von Neumann architecture.
This machine as a model of computation is now called the "Universal Turing machine".
[http://en.wikipedia.org/wiki/Universal_Turing_machine]

cmr.architecture.REGISTER-MACHINE

name::
* McsEngl.cmr.architecture.REGISTER-MACHINE@cptIt,
* McsEngl.register-machine@cptIt,
* McsEngl.cmr.register-machine@cptIt,
* McsEngl.register-machine@cptIt,
* McsEngl.register-machine-in-automataTheory@cptCore364i,

_DESCRIPTION:
The common alternatives to stack machines are register machines, in which each instruction explicitly names specific registers for its operands and result.
[https://en.wikipedia.org/wiki/Stack_machine]
===
In mathematical logic and theoretical computer science a register machine is a generic class of abstract machines used in a manner similar to a Turing machine. All the models are Turing equivalent.
[https://en.wikipedia.org/wiki/Register_machine]
===
The register machine gets its name from its use of one or more "registers". In contrast to the tape and head used by a Turing machine, the model uses multiple, uniquely addressed registers, each of which holds a single positive integer.

There are at least 4 sub-classes found in literature, here listed from most primitive to the most like a computer:

Counter machine – the most primitive and reduced theoretical model of a computer hardware. Lacks indirect addressing. Instructions are in the finite state machine in the manner of the Harvard architecture.
Pointer machine – a blend of counter machine and RAM models. Less common and more abstract than either model. Instructions are in the finite state machine in the manner of the Harvard architecture.
Random access machine (RAM) – a counter machine with indirect addressing and, usually, an augmented instruction set. Instructions are in the finite state machine in the manner of the Harvard architecture.
Random-access stored-program machine model (RASP) – a RAM with instructions in its registers analogous to the Universal Turing machine; thus it is an example of the von Neumann architecture. But unlike a computer, the model is idealized with effectively infinite registers (and if used, effectively infinite special registers such as an accumulator). Unlike a computer or even a RISC, the instruction set is much reduced in number.
Any properly defined register machine model is Turing equivalent. Computational speed is very dependent on the model specifics.

In practical computer science, a similar concept known as a virtual machine is sometimes used to minimise dependencies on underlying machine architectures. Such machines are also used for teaching. The term "register machine" is sometimes used to refer to a virtual machine in textbooks.[1]
[http://en.wikipedia.org/wiki/Register_machine]

cmr.architecture.STACK-MACHINE

name::
* McsEngl.cmr.architecture.STACK-MACHINE@cptIt,
* McsEngl.cmrStk@cptIt,
* McsEngl.stack-machine@cptIt,

* McsEngl.cmr.stack-machine@cptIt,
* McsEngl.stack-machine@cptIt,

_DESCRIPTION:
A "Stack machine" is a computer that uses a Last-in, First-out stack to hold short-lived temporary values.
Most of its instructions assume that operands will be from the stack, and results placed in the stack.
...
In computer science, computer engineering and programming language implementations, a stack machine is a type of computer. In some cases, the term refers to a software scheme that simulates a stack machine. The main difference from other computers is that most of its instructions operate on a pushdown stack of numbers rather than numbers in registers. A stack computer is programmed with a reverse Polish notation instruction set. A stack machine must be a computer, and therefore must be Turing complete, unlike a pushdown automaton. Most computer systems implement a stack in some form to pass parameters and link to subroutines. This does not make these computers "stack machines."
The common alternatives to stack machines are register machines, in which each instruction explicitly names specific registers for its operands and result.
[https://en.wikipedia.org/wiki/Stack_machine]

cmrStk'Evaluation

name::
* McsEngl.cmrStk'Evaluation@cptIt,

_DESCRIPTION:
Stack machines have much smaller instructions than the other styles of machines. Loads and stores to memory are separate and so stack code requires roughly twice as many instructions as the equivalent code for register machines.
The total code size (in bytes) is still less for stack machines.
[https://en.wikipedia.org/wiki/Stack_machine]

cmrStk'Instruction

name::
* McsEngl.cmrStk'Instruction@cptIt,

cmrStk'Opcode

name::
* McsEngl.cmrStk'Opcode@cptIt,

cmrStk'Operand

name::
* McsEngl.cmrStk'Operand@cptIt,

cmrStk'Stack

name::
* McsEngl.cmrStk'Stack@cptIt,

cmrStk'Stack-oriented-programing-language

name::
* McsEngl.cmrStk'Stack-oriented-programing-language@cptIt,

cmrStk'Tool.Compiler

name::
* McsEngl.cmrStk'Tool.Compiler@cptIt,

_DESCRIPTION:
Compilers for stack machines are simpler and quicker to build than compilers for other machines. Code generation is trivial and independent of prior or subsequent code.
[https://en.wikipedia.org/wiki/Stack_machine]

cmr.emulation.VIRTUAL-MACHINE (vmcn)

_CREATED: {2017-03-09}

name::
* McsEngl.cmr.emulation.VIRTUAL-MACHINE (vmcn)@cptIt,
* McsEngl.virtual-computer@cptIt,
* McsEngl.virtual-machine@cptIt,
* McsEngl.vmcn@cptIt,

_DESCRIPTION:
In computing, a virtual machine (VM) is an emulation of a computer system. Virtual machines are based on computer architectures and provide functionality of a physical computer. Their implementations may involve specialized hardware, software, or a combination.
There are different kinds of virtual machines, each with different functions:
System virtual machines (also termed full virtualization VMs) provide a substitute for a real machine. They provide functionality needed to execute entire operating systems. A hypervisor uses native execution to share and manage hardware, allowing for multiple environments which are isolated from one another, yet exist on the same physical machine. Modern hypervisors use hardware-assisted virtualization, virtualization-specific hardware, primarily from the host CPUs.
Process virtual machines are designed to execute computer programs in a platform-independent environment.
Some virtual machines, such as QEMU, are designed to also emulate different architectures and allow execution of software applications and operating systems written for another CPU or architecture. Operating-system-level virtualization allows the resources of a computer to be partitioned via the kernel's support for multiple isolated user space instances, which are usually called containers and may look and feel like real machines to the end users.
[https://en.wikipedia.org/wiki/Virtual_machine]

vmcn.PROCESS

name::
* McsEngl.vmcn.PROCESS@cptIt,
* McsEngl.process-virtual-machine@cptIt,
* McsEngl.vmcn.process@cptIt,

_DESCRIPTION:
Process virtual machines arose originally as abstract platforms for an intermediate language used as the intermediate representation of a program by a compiler; early examples date to around 1966.
An early 1966 example was the O-code machine, a virtual machine which executes O-code (object code) emitted by the front end of the BCPL compiler.
This abstraction allowed the compiler to be easily ported to a new architecture by implementing a new back end that took the existing O-code and compiled it to machine code for the underlying physical machine.
The Euler language used a similar design, with the intermediate language named P (portable).
This was popularized around 1970 by Pascal, notably in the Pascal-P system (1973) and Pascal-S compiler (1975), in which it was termed p-code and the resulting machine as a p-code machine.
This has been influential, and virtual machines in this sense have been often generally called p-code machines.
In addition to being an intermediate language, Pascal p-code was also executed directly by an interpreter implementing the virtual machine, notably in UCSD Pascal (1978); this influenced later interpreters, notably the Java virtual machine (JVM).
Another early example was SNOBOL4 (1967), which was written in the SNOBOL Implementation Language (SIL), an assembly language for a virtual machine, which was then targeted to physical machines by transpiling to their native assembler via a macro assembler.
Macros have since fallen out of favor, however, so this approach has been less influential.
Significant advances occurred in the implementation of Smalltalk-80, particularly the Deutsch/Schiffmann implementation which pushed just-in-time (JIT) compilation forward as an implementation approach that uses process virtual machine.
Later notable Smalltalk VMs were VisualWorks, the Squeak Virtual Machine and Strongtalk.
A related language that produced a lot of virtual machine innovation was the Self programming language, which pioneered adaptive optimization and generational garbage collection.
These techniques proved commercially successful in 1999 in the HotSpot Java virtual machine.
Other innovations include having a register-based virtual machine, to better match the underlying hardware, rather than a stack-based virtual machine, which is a closer match for the programming language; in 1995, this was pioneered by the Dis virtual machine for the Limbo language.
[https://en.wikipedia.org/wiki/Virtual_machine#History]

vmcn.SYSTEM

name::
* McsEngl.vmcn.SYSTEM@cptIt,
* McsEngl.system-virtual-machine@cptIt,
* McsEngl.vmcn.system@cptIt,

_DESCRIPTION:
System virtual machines (also termed full virtualization VMs) provide a substitute for a real machine.
They provide functionality needed to execute entire operating systems.
A hypervisor uses native execution to share and manage hardware, allowing for multiple environments which are isolated from one another, yet exist on the same physical machine.
Modern hypervisors use hardware-assisted virtualization, virtualization-specific hardware, primarily from the host CPUs.
[https://en.wikipedia.org/wiki/Virtual_machine]

vmcn.REGISTER

name::
* McsEngl.vmcn.REGISTER@cptIt,
* McsEngl.register-virtual-machine@cptIt,
* McsEngl.vmcn.register@cptIt,

_DESCRIPTION:
Other innovations include having a register-based virtual machine, to better match the underlying hardware, rather than a stack-based virtual machine, which is a closer match for the programming language; in 1995, this was pioneered by the Dis virtual machine for the Limbo language.
[https://en.wikipedia.org/wiki/Virtual_machine#History]

vmcn.STACK

name::
* McsEngl.vmcn.STACK@cptIt,
* McsEngl.stack-virtual-machine@cptIt,
* McsEngl.vmcn.stack@cptIt,

_DESCRIPTION:
Other innovations include having a register-based virtual machine, to better match the underlying hardware, rather than a stack-based virtual machine, which is a closer match for the programming language; in 1995, this was pioneered by the Dis virtual machine for the Limbo language.
[https://en.wikipedia.org/wiki/Virtual_machine#History]

cmr.emulation.PHYSICAL-MACHINE

_CREATED: {2017-03-09}

name::
* McsEngl.cmr.emulation.PHYSICAL-MACHINE@cptIt,

cmr.doing.GENERAL-PURPOSE

name::
* McsEngl.cmr.doing.GENERAL-PURPOSE@cptIt,

cmr.doing.SPECIAL-PURPOSE

NAME

name::
* McsEngl.cmr.doing.SPECIAL-PURPOSE@cptIt,
* McsEngl.conceptIt488,
* McsEngl.computer.special@cptIt488,
* McsEngl.special-computer@cptIt488,
* McsEngl.cmr.doing.SPECIFIC-PURPOSE@cptIt,
* McsEngl.computer.specific-purpose@cptIt,
* McsEngl.specific-purpose-computer@cptIt,

_SPECIFIC:
* calculator-computer#cptItsoft423#
* book-computer#cptItsoft316#
* database-computer,
* dictionary-computer#cptItsoft81#
* home-entertainment--computer#cptItsoft273#
* organizer-computer
* translator-computer#cptItsoft422#

cmr.doing.CALCULATOR

NAME

name::
* McsEngl.cmr.doing.CALCULATOR@cptIt,
* McsEngl.conceptIt423,
* McsEngl.calculator@cptIt423,
* McsEngl.computer.calculator@cptIt423,
* McsElln.ΑΡΙΘΜΟΜΗΧΑΝΗ@cptIt,
* McsElln.ΚΟΜΠΙΟΥΤΕΡΑΚΙ@cptIt,

DEFINITION

Ειδικής χρήσης κομπιουτερ για υπολογισμούς.

GENERIC

_GENERIC:
* stmIt.computer.machine#cptItsoft227#

SPECIFIC

Specific_concepts (level 3) =

HP-19BII BUSINESS CONSULTANT II:
Βρίσκεται στην τσάντα του κομπιουτερ.

cmr.doing.BOOK

NAME

name::
* McsEngl.cmr.doing.BOOK@cptIt,
* McsEngl.conceptIt316,
* McsEngl.computer'book@cptIt316,
* McsEngl.book.electronic@cptIt,
* McsEngl.electronic-book-ITS@cptIt,

* McsElln.ΒΙΒΛΙΟ-ΗΛΕΚΤΡΟΝΙΚΟ-ΠΛΗΡΟΦΟΡΙΑΚΟ-ΣΥΣΤΗΜΑ@cptIt,

DEFINITION

ΗΛΕΚΤΡΟΝΙΚΟ ΠΛΗΡΟΦΟΡΙΑΚΟ ΣΥΣΤΗΜΑ ΒΙΒΛΙΟΥ ονομάζω το 'ΗΠΣ#cptIt180#' που περιέχει οτιδήποτε πληροφορίες, όπως και ένα ΧΑΡΤΙΝΟ ΒΙΒΛΙΟ.
[ΝΙΚΟΣ, ΙΟΥΝ 1994.]

GENERIC

_GENERIC:
* stmIt.computer.machine#cptItsoft227#

ACCESS

ELEMENT


 the PROGRAM#cptIt327@cptIt316.2: attPar#
 the INFORMATION,
 the PEOPLE,
 the INFORMATION MACHINE SYSTEM,

EVALUATION#cptCore546.107#

ADVANTAGES

ΕΝΑ ΒΙΒΛΙΟ ΓΡΑΜΕΝΟ ΣΕ ΠΛΗΡΟΦΟΡΙΑΚΗ-ΜΗΧΑΝΗ ΜΠΟΡΕΙ ΝΑ ΔΩΣΕΙ ΤΟ ΘΕΜΑ ΑΠΟ ΠΟΛΕΣ ΑΠΟΨΕΙΣ ΕΤΣΙ ΩΣΤΕ ΝΑ ΤΟ ΣΥΛΑΒΕΙ ΚΑΛΙΤΕΡΑ Ο ΑΝΑΓΝΩΣΤΗΣ. ΑΥΤΕΣ ΤΙΣ ΔΥΝΑΤΟΤΗΤΕΣ ΠΡΕΠΕΙ ΣΗΜΕΡΑ ΝΑ ΕΚΜΕΤΑΛΕΥΤΟΥΜΕ.
[ΝΙΚΟΣ, 4 ΑΠΡΙ 1989]

DISADVANTAGES#cptIt468#

ΓΛΩΣΣΑ:
"Η ΜΕΤΑΒΑΣΗ ΑΠΟ ΤΗΝ ΚΟΥΛΤΟΥΡΑ ΤΟΥ ΒΙΒΛΙΟΥ, ΣΤΗΝ ΗΛΕΚΤΡΟΝΙΚΗ ΚΟΥΛΤΟΥΡΑ" ΥΠΟΣΤΗΡΙΖΕΙ Ο ΚΟΙΝΩΝΙΟΛΟΓΟΣ ΣΒΕΝ ΜΠΙΡΚΕΡΤΣ, "Θ'ΑΛΛΑΞΕΙ ΤΟΝ ΤΡΟΠΟ ΠΟΥ ΧΡΗΣΙΜΟΠΟΙΟΥΜΕ ΤΗ ΓΛΩΣΣΑ. Η ΑΚΡΙΒΕΙΑ ΚΑΙ Ο ΠΛΟΥΤΟΣ ΤΟΥ ΓΡΑΠΤΟΥ ΛΟΓΟΥ, Θ'ΑΝΤΙΚΑΤΑΣΤΑΘΟΥΝ ΑΠΟ ΜΙΑ ΠΙΟ "ΑΠΛΗ" ΓΛΩΣΣΑ ΜΕ ΠΕΡΙΟΡΙΣΜΕΝΟ ΛΕΞΙΛΟΓΙΟ, ΑΝΥΠΑΡΚΤΟ ΣΥΝΤΑΚΤΙΚΟ ΚΑΙ ΕΛΑΧΙΣΤΗ ΦΑΝΤΑΣΙΑ"
[ΝΕΑ, 5 ΝΟΕΜ 1993]

Doing#cptCore475#

ENVIRONMENT#cptCore756#

ENVIRONMENT: PAPER BOOK#cptIt316, cptIt241#

name::
* McsEngl.ENVIRONMENT: PAPER BOOK@cptIt,

ΚΑΘΕ <ΣΧΕΣΗ> (σύνδεσμος μεταξύ στοιχείων) είναι ΧΑΡΑΚΤΗΡΙΣΤΙΚΟ και των δύο στοιχείων. Το ΣΥΣΤΗΜΑ, των στοιχειων και της σχεσης του έχει και τα τρία πράγματα σαν χαρακτηριστικα.
[ΝΙΚΟΣ, 18 ΣΕΠΤ, 1994]

Electronic documents should not be imitations of paper documents. They bring major new types of benefits. The first cars were called "horseless carrieges" and looked as though they were designed to be pulled by a horse. It took many years to realize that a good shape for a car is quite different... Similarly "paperless books" should have little resemblance to books in the way they are designed.
[Martin, 1990, 9#cptResource134]#

systemItHuman

name::
* McsEngl.conceptIt316.1,

USER INTERFACE

Πως ο ΧΡΗΣΤΗΣ επικοινωνεί με το hard-soft system.

SPECIFIC

Specific_concepts (level 3) =

_SPECIFIC:
* SSS#cptIt356# {science support system} ITS = THE FUTURE
* ΑΡΧΕΛΟΓΟΣ#cptIt367#

ΑΡΧΕΛΟΓΟΣ

name::
* McsEngl.conceptIt367,
* McsEngl.archelogos@cptIt,
* McsElln.ΑΡΧΕΛΟΓΟΣ@cptIt,

DEFINITION

_DESCRIPTION:
The Archelogos Project is the principal project of the Archelogos team and the basis of all the other projects. The Archelogos Project aims at constructing an electronic database which will contain all the philosophical arguments found in the works of Plato and Aristotle.
The philosophical arguments of Plato and Aristotle are represented in Archelogos according to a method which makes explicit their logical interconnection. The database also includes information about how scholars have understood the philosophical arguments of Plato and Aristotle throughout the ages.
The Archelogos database is designed for use as a research tool for specialists in classical philosophy and advanced students. It can also be used for teaching purposes.
[http://www.archelogos.com/archelogos/]
===
Ο ΑΡΧΕΛΟΓΟΣ ΕΙΝΑΙ ΜΙΑ ΚΑΙΝΟΥΡΓΙΑ ΙΔΕΑ ΓΙΑ ΤΗΝ ΕΡΕΥΝΑ ΤΗΣ ΑΡΧΑΙΑΣ ΕΛΛΗΝΙΚΗΣ ΣΚΕΨΗΣ ΤΟΥ ΕΛΛΗΝΑ ΚΑΘΗΓΗΤΗ ΤΗΣ ΦΙΛΟΣΟΦΙΑΣ ΣΤΟ ΠΑΝΕΠΙΣΤΗΜΙΟ ΤΟΥ ΕΔΙΜΒΟΥΡΓΟΥ, ΔΡ. ΘΕΟΔΩΡΟΥ ΣΚΑΛΤΣΑ.
ΠΡΟΚΕΙΤΑΙ ΓΙΑ ΤΗΝ ΕΝΝΟΙΟΛΟΓΙΚΗ ΑΝΑΛΥΣΗ ΟΛΩΝ ΑΡΧΑΙΩΝ ΕΛΛΗΝΙΚΩΝ ΦΙΛΟΣΟΦΙΚΩΝ ΚΕΙΜΕΝΩΝ, ΚΑΙ ΟΧΙ ΑΠΛΩΣ ΓΙΑ ΤΗΝ ΚΑΤΑΓΡΑΦΗ ΤΟΥΣ...ΔΕ ΧΡΗΣΙΜΟΠΟΙΕΙ, ΔΗΛΑΔΗ, ΤΟ ΚΕΙΜΕΝΟ ΩΣ ΔΟΜΙΚΗ ΜΟΝΑΔΑ ΑΛΛΑ ΤΟ ΦΙΛΟΣΟΦΙΚΟ ΕΠΙΧΕΙΡΗΜΑ.
"ΟΤΑΝ ΟΛΟΚΛΗΡΩΘΕΙ ΤΟ ΕΡΓΟ ΣΕ ΜΙΑ ΔΕΚΑΕΤΙΑ", ΛΕΕΙ ΣΤΗΝ ΚΑΘΗΜΕΡΙΝΗ Ο ΔΡ. Θ. ΣΚΑΛΤΣΑΣ, "ΘΑ ΕΧΕΙ ΣΥΜΠΕΡΙΛΑΒΕΙ ΟΛΟ ΤΟ ΦΑΣΜΑ ΤΗΣ ΕΡΜΗΝΕΙΑΣ ΤΗΣ ΑΡΧΑΙΑΣ ΕΛΛΗΝΙΚΗΣ ΦΙΛΟΣΟΦΙΑΣ, ΟΡΓΑΝΩΜΕΝΟ ΚΑΤΑ ΕΠΙΧΕΙΡΗΜΑΤΑ ΚΑΙ ΥΠΟ-ΕΠΙΧΕΙΡΗΜΑΤΑ, ΣΥΜΦΩΝΑ ΜΕ ΤΙΣ ΕΝΑΛΛΑΚΤΙΚΕΣ ΕΡΜΗΝΕΙΕΣ..."
[ΚΑΘΗΜΕΡΙΝΗ, 5 ΙΑΝΟ 1993, 15]

GENERIC

_GENERIC:
BOOK ITS# #cptIt316##

EVALUATION#cptCore546.107#

ΚΑΙΝΟΤΟΜΟ στοιχείο του συστήματος είναι η "ΑΝΑΛΥΣΗ ΕΠΙΧΕΙΡΗΜΑΤΟΣ". Ετσι η ΑΝΑΖΗΤΗΣΗ δε γίνεται με λέξεις κλειδια, αλλα με έννοιες. Δομική μονάδα είναι το επιχείρημα.
[ΚΑΘΗΜΕΡΙΝΗ, 11 ΣΕΠΤ. 1994, 14]

EVOLUTION#cptCore546.171#

ΠΙΛΟΤΙΚΗ ΦΑΣΗ
τώρα ολοκληρώνεται.
[ΚΑΘΗΜΕΡΙΝΗ, 11 ΣΕΠΤ. 1994, 14]

Η συγγραφική φάση θα διαρκεσει 8 χρονια.
[ΚΑΘΗΜΕΡΙΝΗ, 11 ΣΕΠΤ. 1994, 14]

INFORMATION

ΕΙΝΑΙ ΣΗΜΑΝΤΙΚΟ ΟΤΙ ΤΟ ΠΡΟΓΡΑΜΜΑ ΑΥΤΟ ΔΕΝ ΠΕΡΙΟΡΙΖΕΤΑΙ ΚΑΤ'ΑΝΑΓΚΗ ΣΤΗΝ ΑΡΧΑΙΑ ΦΙΛΟΣΟΦΙΑ ΟΥΤΕ ΚΑΝ ΣΤΗ ΦΙΛΟΣΟΦΙΑ, ΑΠΛΩΣ ΑΥΤΗ ΕΙΝΑΙ ΤΟ ΠΡΩΤΟ ΠΕΔΙΟ ΕΦΑΡΜΟΓΗΣ ΤΟΥ. Ο ΑΡΧΕΛΟΓΟΣ ΘΑ ΜΠΟΡΕΙ ΝΑ ΧΡΗΣΙΜΟΠΟΙΗΘΕΙ ΓΙΑ ΤΗΝ ΑΝΑΛΟΓΗ ΕΝΝΟΙΟΛΟΓΙΚΗ ΑΝΑΛΥΣΗ ΤΩΝ ΚΟΙΝΩΝΙΚΩΝ ΕΠΙΣΤΗΜΩΝ, ΓΙ'ΑΥΤΟ ΚΑΙ ΤΟ ΕΝΔΙΑΦΕΡΟΝ ΤΗΣ ΔΙΕΘΝΟΥΣ ΑΚΑΔΗΜΑΙΚΗΣ ΚΟΙΝΟΤΗΤΑΣ ΕΙΝΑΙ ΣΟΒΑΡΟ.
[ΚΑΘΗΜΕΡΙΝΗ, 5 ΙΑΝΟ 1993, 15]

PEOPLE

ΑΜΕΣΟΙ ΣΥΝΕΡΓΑΤΕΣ ΤΟΥ Θ. ΣΚΑΛΤΣΑ, ΠΟΥ ΕΙΝΑΙ Ο ΔΙΕΥΘΥΝΤΗΣ ΜΕΛΕΤΗΣ, ΕΙΝΑΙ ΟΙ ΚΑΘΗΓΗΤΕΣ
ΒΑΣΙΛΗΣ ΚΑΡΑΣΜΑΝΗΣ (ΕΜΠ),
DAVID FURLEY (ΠΡΙΝΣΤΟΝ) ΚΑΙ
ΑΛΕΞΑΝΔΡΟΣ ΜΟΥΡΕΛΑΤΟΣ (ΠΑΝ. ΤΕΧΑΣ).
ΣΤΟ ΣΧΕΔΙΟ ΑΡΧΕΛΟΓΟΣ ΕΧΕΙ ΕΠΙΣΗΣ ΣΥΝΑΨΕΙ ΣΥΣΤΗΜΑΤΙΚΗ ΣΥΝΕΡΓΑΣΙΑ ΜΕ ΤΗΝ ΕΡΕΥΝΗΤΙΚΗ ΟΜΑΔΑ "ΠΕΡΣΕΥΣ" ΤΟΥ ΠΑΝΕΠΙΣΤΗΜΙΟΥ ΤΟΥ ΧΑΡΒΑΡΝΤ ΓΙΑ ΤΗΝ ΗΛΕΚΤΡΟΝΙΚΗ ΚΩΔΙΚΟΠΟΙΗΣΗ ΚΕΙΜΕΝΩΝ.
[ΚΑΘΗΜΕΡΙΝΗ, 5 ΙΑΝΟ 1993, 15]

PRICE#cptEconomy541.44#

Χρηματοδότες για την πιλοτική φάση ήταν Γ. ΛΙΒΑΝΟΣ "Ceres shipping" και Γ. ΔΑΥΙΒ της 3Ε. Επίσης ο σκηνοθέτης Μ. ΚΑΚΟΓΙΑΝΗΣ. Επίσης απο το 2ο ΚΠΣ

SCIENCE THAT USES

Χρησιμοποιεί τη ΔΥΝΑΜΙΚΗ ΤΗΣ ΛΟΓΙΚΗΣ σ'ενα απτο εργαλείο για εννοιολογικη ανάλυση και σχολιασμό κειμένων.
[ΚΑΘΗΜΕΡΙΝΗ, 11 ΣΕΠΤ. 1994, 14]

INFORMATION SPECIFIC-DIVISION

ELECTRONIC DICTIONARY

FRANKLIN

TRANSLATORS

BOOKMARK

Nathaniel Lande ... has formed o company, Booklink, to develop a device he calls bookmark. Mr Lande said he hopes to show publishers a prototype early next year. Composed of a large flat screen and three buttons for turning pages... The words themselves will be encoded on a small mangetic storage device, about the size of a credit card, called a Smartcard.
[Markoff, John "Is the Electronic Book Closer Than You Think?" THE NEW YORK TIMES (Dec. 29, 1991):E5]

DATA PRESS

Electronic book player of Matsushita electric. KX-EBP2. Διαθέτει 16bit επεξεργαστή. Τα βιβλία που διαβάζει είναι σε CDROMs 3 ιντσών. Κοστίζει $398.
[MULTIMEDIA & CD-ROM, Jun. 1994, 30.]

SONY DATADISCMAN

Συσκευή που παρουσιάζει πληροφορίες σε CDROM.

cmr.doing.DICTIONARY

NAME

name::
* McsEngl.cmr.doing.DICTIONARY@cptIt,
* McsEngl.conceptIt81,
* McsEngl.computer.dictionary@cptIt81,
* McsEngl.DICTIONARY-COMPUTER-SYSTEM@cptIt,

* McsElln.ΚΟΜΠΙΟΥΤΕΡ-ΛΕΞΙΚΟ@cptIt,

DEFINITION

DICTIONARY COMPUTER SYSTEM είναι ειδικά κομπιούτερ που κάνουν μόνο μία λειτουργία, είναι ηλεκτρονικά λεξικά.

GENERIC

_GENERIC:
* stmIt.computer.machine#cptItsoft227#

SPECIFIC

Specific_concepts (level 3) =

FRANKLIN LANGUAGE MASTER LM-6000

ΑΓΟΡΑ: ΑΝΟΙΞΗ 1992.

FRANKLIN LANGUAGE MASTER 2200

ΑΓΟΡΑ: Sept 5,1991
FRANKLIN ELECTRONIC PUBLISHERS,INC
ATTENTION:SERVICE DEPARTMENT
122 BURRS ROAD
MT.HOLLY, NEW JERSEY 08060
TEL 609-261-4800

cmr.doing.HOME-ENTERTAINMENT

NAME

name::
* McsEngl.cmr.doing.HOME-ENTERTAINMENT@cptIt,
* McsEngl.conceptIt273,
* McsEngl.computer.home-entertainment@cptIt273,
* McsEngl.home-learning-systems@cptIt,
* McsEngl.htpc@cptIt273,

DEFINITION

GENERIC

_GENERIC:
* stmIt.computer.machine#cptItsoft227#

Program#cptIt59#

_Program:
* MediaPortal: Turn your PC into a very advanced MediaCenter/HTPC http://sourceforge.net/projects/mediaportal,

SPECIFIC

Specific_concepts (level 3) =

CD-I#cptIt155: attSpe# {combact dist-interrctive} Philips

CDTV , commodore

VIS {Video information system}, Tandy

cmr.doing.TRANSLATOR

NAME

name::
* McsEngl.cmr.doing.TRANSLATOR@cptIt,
* McsEngl.conceptIt422,
* McsEngl.computer.translator@cptIt422,
* McsEngl.translator-computer-system@cptIt,
* McsElln.ΕΙΔΙΚΟ-ΚΟΜΠΙΟΥΤΕΡ-ΜΕΤΑΦΡΑΣΤΗΣ@cptIt,

DEFINITION

GENERIC

_GENERIC:
* stmIt.computer.machine#cptItsoft227#

SPECIFIC

Specific_concepts (level 3) =

HEXAGLOT:
Dictiomatic, Model T150. (κουτι 10)

SII Seiko Instruments European translator:
και αριθμομηχανη, βρίσκεται στην τσάντα του κομπιουτερ.

cmr.EMBEDDED

name::
* McsEngl.cmr.EMBEDDED@cptIt,
* McsEngl.embedded-computer@cptIt,

cmr.EMBEDDED.NO

name::
* McsEngl.cmr.EMBEDDED.NO@cptIt,
* McsEngl.embeddedNo-computer@cptIt,

cmr.Neural-Turing-Machine

name::
* McsEngl.cmr.Neural-Turing-Machine@cptIt,
* McsEngl.Neural-Turing-Machine@cptIt,

_DESCRIPTION:
Google: Ετοιμάζει Η/Υ, που θα αυτο-προγραμματίζεται
ΑΘΗΝΑ 31/10/2014
Οι προγραμματιστές όλου του κόσμου ίσως, θα έπρεπε να ανησυχούν για τις μελλοντικές επαγγελματικές προοπτικές τους, οι οποίες σήμερα είναι θαυμάσιες.

Η μυστικοπαθής νεοσύστατη βρετανική εταιρεία τεχνητής νοημοσύνης Deep Mind (Βαθύς Νους), την οποία ίδρυσε πριν λίγα χρόνια ο ελληνοκυπριακής καταγωγής νεαρός ιδιοφυής Βρετανός νευροεπιστήμονονας Ντέμης Χασάμπης και την εξαγόρασε η Google φέτος τον Ιανουάριο, αντί 400 εκατ. δολαρίων, έκανε γνωστό ότι εργάζεται πυρετωδώς για την ανάπτυξη ενός υπολογιστή που θα είναι τόσο έξυπνος, ώστε θα μπορεί να προγραμματίζεται μόνος του.

Ο υπολογιστής, με την ονομασία "Neural Turing Machine" (Νευρωνική Μηχανή Τιούρινγκ), συνδυάζει τον τρόπο που δουλεύει ένας συμβατικός υπολογιστής, με τον ευπροσάρμοστο και συνεχώς εξελισσόμενο τρόπο που «δουλεύει» (σκέπτεται) ο ανθρώπινος εγκέφαλος. Το υβριδικό μηχάνημα, σύμφωνα με το "New Scientist" και τη βρετανική «Ντέιλι Μέιλ», μαθαίνει καθώς αποθηκεύει νέες μνήμες και στη συνέχεια ανατρέχει σε αυτές για να εκτελέσει λογικές διεργασίες πέρα από αυτές για τις οποίες έχει ήδη προγραμματιστεί.

Όπως δείχνουν τα πρώτα πειράματα, ο υβριδικός νευρο-υπολογιστής καταφέρνει να δημιουργεί μόνος του τους δικούς του -κατ’ αρχήν απλούς- αλγόριθμους προγραμματισμού, τους οποίους είναι σε θέση να χρησιμοποιήσει στη συνέχεια για να κάνει ταξινομήσεις και συσχετισμούς δεδομένων.

H Google, συνεχώς εντείνει τις προσπάθειές της στο πεδίο της τεχνητής νοημοσύνης και της μηχανικής μάθησης. Προ εβδομάδος, ο αμερικανικός κολοσσός ξεκίνησε συνεργασία -μέσω της λονδρέζικης Deep Mind- με δύο ερευνητικές ομάδες τεχνητής νοημοσύνης του βρετανικού Πανεπιστημίου της Οξφόρδης (στα αντίστοιχα Τμήματα της Επιστήμης Υπολογιστών και της Μηχανικής), με στόχο να βοηθήσει τους υπολογιστές -και γενικότερα τις ηλεκτρονικές συσκευές- να καταλαβαίνουν καλύτερα τους χρήστες.

Επίσης, η εταιρεία εργάζεται για την ανάπτυξη πολύ γρήγορων κβαντικών «τσιπ» με μοντέλο τον ανθρώπινο εγκέφαλο, έτσι ώστε οι αναζητήσεις και το σχετικό λογισμικό να αποκτήσουν μεγαλύτερη «διαίσθηση» και ικανότητα πρόβλεψης. Για τον λόγο αυτό, η Google ξεκίνησε συνεργασία με τον Τζον Μαρτίνη, καθηγητή του Πανεπιστημίου της Καλιφόρνια - Σάντα Μπάρμπαρα.

Είχε προηγηθεί, το 2012, η πρόσληψη του ακραίου οραματιστή μηχανικού Ρέι Κουρτσβέιλ ως τεχνολογικού διευθυντή της Google. Μεταξύ άλλων, ο Ρέι Κουρτσβέιλ, συγγραφέας αρκετών βιβλίων, προβλέπει ότι, μέσα σε 30 χρόνια το πολύ, οι άνθρωποι θα μπορούν να «ανεβάσουν» (upload) όλο το νου τους σε έναν υπολογιστή και έτσι να γίνουν ψηφιακά αθάνατοι, ενώ ως το 2100 θα έχουν ξεφορτωθεί κάθε βιολογικό μέρος του σώματός τους, για να το αντικαταστήσουν με μηχανικά και ηλεκτρονικά μέρη.

Διάφοροι επιστήμονες, έχουν εκφράσει ανησυχίες ότι η εκρηκτική πρόοδος της τεχνητής νοημοσύνης μπορεί να γυρίσει «μπούμερανγκ», καθώς αν οι υπολογιστές αποκτήσουν ευρείες αυτόνομες δυνατότητες προγραμματισμού, δράσης και ελέγχου, κανείς δεν μπορεί να αποκλείσει το ενδεχόμενο κάτι να πάει στραβά και να ξεφύγει από τον ανθρώπινο έλεγχο. Για μερικούς, η τεχνητή νοημοσύνη δυνητικά συνιστά πιο σοβαρή απειλή και από τα πυρηνικά όπλα.

Αναγνωρίζοντας τον πιθανό κίνδυνο, η Google ανακοίνωσε ότι δημιούργησε μια ειδική επιτροπή ηθικής, για να εποπτεύσει όλη την έρευνα της εταιρίας στο πεδίο της τεχνητής νοημοσύνης, έτσι ώστε να διασφαλίσει ότι δεν θα υπάρξει κάποια δυνητικά επικίνδυνη κατάχρηση. Η κοινή αυτή επιτροπή της Google - Deep Mind θα θέσει μια σειρά από περιοριστικούς κανόνες στην χρήση της σχετικής τεχνολογίας. Το ερώτημα είναι αν αυτοί οι περιορισμοί θα είναι αρκετά καθησυχαστικοί για το μέλλον.

Πηγή: ΑΠΕ/ΜΠΕ
[http://www.nooz.gr/tech/google-etoimazei-iu-pou-8a-auto-programmatizetai]

cmr.info.MULTIMEDIA

name::
* McsEngl.cmr.info.MULTIMEDIA@cptIt,

COMPAQ
PRESARIO 510 CDS, ενσωματομενα ηχεια, encarta, PC SYSTEMS, 466000 dec.1994

PRESARIO 625 CDS, MICROPOLIS, 388000 dec.1994

THE CHOICE COMPUTERS:
multimedia case. Computer Trade Center ΑΒΕΕ.

cmr.org.APPLE

NAME

name::
* McsEngl.cmr.org.APPLE@cptIt,
* McsEngl.conceptIt48,
* McsEngl.apple-computer-system@cptIt,
* McsEngl.computer.apple@cptIt48,

DEFINITION

ΣΥΣΤΗΜΑΤΑ ΥΠΟΛΟΓΙΣΤΩΝ της Apple computer.

GENERIC

_GENERIC:
* stmIt.computer.machine#cptItsoft227#

SPECIFIC

Specific_concepts (level 3) =

Macintosh IIci

Macintosh IIsi

Macintosh IIvi

Macintosh IIvx

Macintosh Classic II

Macintosh LC

Macintosh LC II: best seller.

Macintosh LC III: (1993) 68030 32BIT, 25MHz, $1350

Macintosh Centris 610: (1993) 68040 $1850

Macintosh Centris 650: (1993) 68040 $2670

Macintosh Duo Dock station: (1993)

NEWTON:

Performa 200 (Classic II): 68030 16MHz, 4RAM, 80MB, SuperDrive, 9"B&W.

Performa 400 (LC II): 68030 16MHz, 4RAM, 80MB, SuperDrive, 13/14" COLOR EXT.

Performa 600: 68030 32MHz,

Performa 600 CD:

PowerBook 140: 68030 16MHz,

PowerBook 145: 68030 25MHz,

PowerBook 165c: (1993) color, passive matrix, $3400

PowerBook 170:

Quadra 800: (1993) $4680

Quadra 900, 68040 25MXz 4RAM 160MB

Quadra 950, 68040 33MXz 8RAM 230MB

SE/30

SERVER 95, (1993) UP TO 200 USERS

POWER MACINTOSH

Με το SoftWindows τρεχει τις περισοτερες MSDOS, WINDOWS εφαρμογες.

Power Macintosh 6100/60: 1993.850000 drh. Τρεχει DOS WINDOWS. Processor PowerPC 601.

power Macintosh 7100/66:

power Macintosh 8100/80:

cmr.org.IBM

NAME

name::
* McsEngl.cmr.org.IBM@cptIt,
* McsEngl.conceptIt54,
* McsEngl.computer.ibm@cptIt54,

DEFINITION

SPECIFIC

Specific_concepts (level 3) =

360

To 1964 ριχνει στην αγορα τον εκπληκτικα πετυχημενο 360.
[JARRET, 1987, 145#cptResource117]

650

1953: Its first computer. Less powerfull than univac but better suitable to old equipment and with better sellforce. [video]

AS/400

* Στα καινούργια συμπεριλαμβάνεται συνδεσιμότητα με ΜΑC.
* 1993: ΤΗΝ 4η ΑΝΑΒΑΘΜΙΣΗ ΜΕΣΑ ΣΕ ΠΕΝΤΕ ΧΡΟΝΙΑ ΤΩΝ MINI AS/400 ΠΡΟΧΩΡΗΣΕ Η IBM. Η ΝΕΑ ΣΕΙΡΑ ΕΧΕΙ ΤΟΝ ΚΩΔΙΚΟ F.
[RAM, ΜΑΡΤ 1993, 24]
* ΕΧΕΙ ΠΟΥΛΗΣΕΙ ΠΑΝΩ ΑΠΟ 200.000 ΣΥΣΤΗΜΑΤΑ
[COMPUTER ΓΟ, ΜΑΡΤ 1993, 77]

ES/9000

ΓΕΝΙΚΩΝ ΚΑΘΗΚΟΝΤΩΝ
* ΑΝΑΚΟΙΝΩΣΕ 18 ΝΕΑ ΜΟΝΤΕΛΑ, 10 ΥΔΡΟΨΥΚΤΑ 8 ΑΕΡΟΨΥΚΤΑ.
- Ο 982 Ο ΙΣΧΥΡΟΤΕΡΟΣ ΓΕΝΙΚΩΝ ΚΑΘΗΚΟΝΤΩΝ.
[COMPUTER ΓΟ, ΜΑΡΤ 1993, 40]

MAINFRAMES

ΑΝΤΙΠΡΟΣΩΠΕΥΟΥΝ ΠΕΡΙΣΣΟΤΕΡΟ ΑΠΟ ΤΟ 50% ΤΩΝ ΕΣΟΔΩΝ ΤΗΣ.
[COMPUTER ΓΟ, ΜΑΡΤ 1993, 77]

PS/VP

PS/VP 433DX-M20; 33MHz; 410.000 DRX NO MONITOR (1993)

name::
* McsEngl.PS/VP 433DX-M20; 33MHz; 410.000 DRX NO MONITOR (1993)@cptIt,

RISC SYSTEM/6000

RS/6000 UNIX WORKSTATION

SERVERS

SP1: 8 GPFLOPS

POWER-station M20

POWER statios 355; 365; 375

POWER Network Dataserver

S/38

S/360

S/370

S/390 (SYSTEM/390)

ΣΤΗΡΙΖΕΤΑΙ ΣΤΗΝ ΠΑΡΑΛΛΗΛΗ ΕΠΕΞΕΡΓΑΣΙΑ

THIKPAD

cmr.processing.MAINFRAME

NAME

name::
* McsEngl.cmr.processing.MAINFRAME@cptIt,
* McsEngl.conceptIt268,
* McsEngl.computer.mainframe@cptIt268,
* McsEngl.mainframe@cptIt268,
* McsEngl.MAINFRAME-computer-system@cptIt,

DEFINITION

measure#cptCore88#

ΘΑ ΠΑΡΟΥΣΙΑΣΤΕΙ ΖΗΤΗΣΗ ΣΕ MAINFRAMES ΚΑΘΟΤΙ ΠΑΡΑΤΗΡΕΙΤΑΙ ΜΕΓΑΛΗ ΕΛΛΕΙΨΗ ΣΕ ΘΕΜΑΤΑ ΜΗΧΑΝΟΓΡΑΦΗΣΗΣ ΒΑΣΙΚΩΝ ΤΟΜΕΩΝ ΥΠΟΔΟΜΗΣ.
- ΤΑ ΜΕΓΑΛΑ ΣΥΣΤΗΜΑΤΑ ΚΑΤΑΛΑΜΒΑΝΟΥΝ ΤΟ 10% ΕΠΙ ΤΗΣ ΑΞΙΑΣ ΤΩΝ ΕΓΚΑΤΑΣΤΗΜΕΝΩΝ Η/Υ, ΚΑΤΕΧΟΥΝ ΟΜΩΣ ΚΑΤΩ ΤΟΥ 1% ΤΩΝ ΑΝΤΙΣΤΟΙΧΩΝ ΣΥΝΟΛΙΚΩΝ ΜΟΝΑΔΩΝ.
ΤΑ ΜΕΣΑΙΑ ΣΥΣΤΗΜΑΤΑ ΑΠΟΤΕΛΟΥΝ ΤΟ 1,5% ΤΟΥ ΣΥΝΟΛΟΥ ΤΩΝ ΕΓΚΑΤΑΣΤΗΜΕΝΩΝ, ΑΝΤΙΠΡΟΣΩΠΕΥΟΥΝ ΟΜΩΣ ΤΟ 28% ΤΗΣ ΣΥΝΟΛΙΚΗΣ ΑΞΙΑΣ.
- ΤΟ ΔΗΜΟΣΙΟ ΚΑΤΑΛΑΜΒΑΝΕΙ ΤΟ 50% ΤΗΣ ΑΓΟΡΑΣ ΤΩΝ ΜΕΓΑΛΩΝ ΣΥΣΤΗΜΑΤΩΝ ΚΑΙ ΤΟ 24% ΤΩΝ ΜΕΣΑΙΩΝ.
Ο ΟΙΚΟΝΟΜΙΚΟΣ ΚΛΑΔΟΣ ΤΟ 44% ΚΑΙ 35% ΑΝΤΙΣΤΟΙΧΑ.
- 1992. ΠΑΡΑΤΗΡΗΘΗΚΕ ΜΙΑ ΣΧΕΤΙΚΗ ΑΝΟΔΟΣ ΤΟΥ ΡΥΘΜΟΥ ΠΩΛΗΣΕΩΝ ΤΩΝ ΜΕΣΑΙΩΝ ΣΥΣΤΗΜΑΤΩΝ, ΑΛΛΑ ΤΑΥΤΟΧΡΟΝΑ ΚΑΙ ΜΙΑ ΜΤΩΣΗ ΤΟΥ ΑΝΤΙΣΤΟΙΧΟΥ ΡΥΘΜΟΥ ΤΩΝ ΜΕΓΑΛΩΝ.
Ο ΣΥΝΟΛΙΚΟΣ ΑΡΙΘΜΟΣ ΤΩΝ ΜΕΣΑΙΩΝ ΣΥΣΤΗΜΑΤΩΝ ΞΕΠΕΡΑΣΕ ΤΑ 4000, ΕΝΩ ΤΑ ΜΕΓΑΛΑ ΤΑ 220. (ΠΑΛΙΓΓΙΝΗΣ, SIEMENS/NIXDORF)
[RAM, MAR 1993, 36]

FUTURE

ΕΝΑΣ ΑΠΟ ΤΟΥΣ ΣΗΜΑΝΤΙΚΟΤΕΡΟΥΣ ΡΟΛΟΥΣ ΠΟΥ ΕΡΧΕΤΑΙ ΝΑ ΠΑΙΞΕΙ ΤΟ mainframe ΕΙΝΑΙ ΕΚΕΙΝΟΣ ΤΟΥ server ΣΕ ΔΙΑΦΟΡΕΤΙΚΑ ΠΕΡΙΒΑΛΛΟΝΤΑ, ΜΕ ΔΙΑΦΟΡΕΤΙΚΟΥΣ ΣΕ ΚΑΘΕ ΠΕΡΙΠΤΩΣΗ clients. (Χαμψας IBM)
[RAM, MAR 1993, 39]

ΕΠΕΞΕΡΓΑΣΤΕΣ

ΑΝΤΙ ΓΙΑ ΤΑ ΕΙΔΙΚΑ ΤΣΙΠ TTL ΣΤΗΝ ΕΠΕΞΕΡΓΑΣΙΑ, ΘΑ ΧΡΗΣΙΜΟΠΟΙΗΘΟΥΝ ΣΕ ΠΑΡΑΛΛΗΛΙΑ ΤΣΙΠ CMOS ΓΕΝΙΚΗΣ ΧΡΗΣΗΣ, ΣΑΝ ΚΙ ΑΥΤΑ ΠΟΥ ΠΑΡΑΓΟΝΤΑΙ ΚΑΤΑ ΕΚΑΤΟΜΜΥΡΙΑ ΓΙΑ ΤΑ PC ΚΑΙ ΤΟΥΣ ΣΤΑΘΜΟΥΣ ΕΡΓΑΣΙΑΣ. ΕΤΣΙ ΘΑ ΜΕΙΩΘΕΙ ΤΟ ΚΟΣΤΟΣ, ΘΑ ΚΑΤΑΡΓΗΘΕΙ Η ΥΓΡΗ ΨΥΞΗ ΚΑΙ ΘΑ ΠΕΣΕΙ 5 ΜΕ 10 ΦΟΡΕΣ Ο ΟΓΚΟΣ. ΟΠΩΣ ΑΝΑΚΟΙΝΩΣΕ Ο NICK DONOFRIO, ΔΙΕΥΘΥΝΤΗΣ ΤΩΝ ENTERPRISE SYSTEMS OF IBM, ΟΙ ΤΙΜΕΣ ΑΠΟ ΤΟ ΕΠΙΠΕΔΟ ΤΟΥ 1 ΕΚ. ΔΟΛ. ΘΑ ΠΕΣΟΥΝ ΣΤΟ 1/10, ΔΗΛΑΔΗ ΣΤΗΝ ΠΕΡΙΟΧΗ ΤΩΝ 100.000 ΔΟΛ.
[RAM, SEP 1993, 194]

cmr.processing.MIDDLE

NAME

name::
* McsEngl.cmr.processing.MIDDLE@cptIt,
* McsEngl.conceptIt122,
* McsEngl.computer.middle@cptIt122,
* McsEngl.middle-computer-system@cptIt,
* McsEngl.minicomputer@cptIt,

DEFINITION

Τυπικα είναι ένας υπολογιστης#cptIt227.1# που έχει ένα λειτουργικό σύστημα πολλών χρηστων και δέν έχει τη δυνατότητα να χρησιμοποιήσει εφαρμογές DOS or OS/2.

GENERIC

_GENERIC:
* stmIt.computer.machine#cptItsoft227#

SPECIFIC

Specific_concepts (level 3) =

MISC SPECIFIC-DIVISION

workstations#cptIt146: attSpe#

mips

COMPANY SPECIFIC-DIVISION

DEC

H DEC καθιερώθηκε σαν ο κύριος κατασκευαστης.

HEWLETT-PACKARD

ΜΗΧΑΝΕΣ:
HP 9000; servers 800, unix workstations 700

SILICON GRAPHICS

SERVERS:
ΠΡΟΣΦΑΤΑ ΑΝΑΚΟΙΝΩΣΕ ΜΙΑ ΣΕΙΡΑ ΝΕΩΝ ΠΡΟΙΟΝΤΩΝ ΟΠΩΣ
POWER CHALLENGE SUPERCOMPUTING SERVERS, THN POWER CHALLENGE L KAI THN POWER CHALLENGE XL, ME TFP ΕΠΕΞΕΡΓΑΣΤΕΣ, ΜΕ ΜΕΓΙΣΤΗ ΑΠΟΔΟΣΗ 1,8 GFLOPS.
- ΕΠΙΣΗΣ ΤΗ ΣΕΙΡΑ ΣΥΜΜΕΤΡΙΚΩΝ multiprocessing servers Challenge, ΚΑΘΕΝΑΣ ΑΠΟ ΤΟΥΣ ΟΠΟΙΟΥΣ ΜΠΟΡΕΙ ΝΑ ΣΥΜΠΕΡΙΛΑΒΕΙ ΜΕΧΡΙ 36 R4400 MIPS RISC PROCESSORS.
[COMPUTER ΓΟ, ΜΑΡΤ 1993, 17]

cmr.processing.SMALL

NAME

name::
* McsEngl.cmr.processing.SMALL@cptIt,
* McsEngl.conceptIt232,
* McsEngl.computer.small@cptIt232,
* McsEngl.small-computer@cptIt232,
* McsEngl.personal-computer@cptIt,
* McsEngl.PC@cptIt,
* McsEngl.conceptIt232,
* McsElln.ΠΡΟΣΩΠΙΚΟΣ-ΥΠΟΛΟΓΙΣΤΗΣ@cptIt,
====== lagoChinese:
* McsEngl.ge4ren2dian1nao3; personal computer; PC@cptIt,
* McsEngl.dian1nao3; computer@cptIt,
* McsEngl.dian1; electric; electricity; electrical@cptIt,
* McsEngl.nao3; brain@cptIt,

DEFINITION

GENERIC

_GENERIC:
* stmIt.computer.machine#cptItsoft227#

measure#cptCore88#

Στις ΗΠΑ 32% των ΝΟΙΚΟΚΥΡΙΩΝ διαθέτουν PC, έναντι
22% στη Βρετανια και
16% στη Γερμανία
[ΚΑΘΗΜΕΡΙΝΗ, 27 ΝΟΕΜ. 1994, 63]

SPECIFIC

Specific_concepts (level 3) =

_SPECIFIC:
* desktop##
* PORTABLE#cptIt252#

cmr.processing.SUPER

name::
* McsEngl.cmr.processing.SUPER@cptIt,

_SPECIFIC:
* mainframe-computer#cptItsoft268#
* supercomputer#cptItsoft85#

cmr.processing.PARALLEL

_CREATED: {2007-12-29}

NAME

name::
* McsEngl.cmr.processing.PARALLEL@cptIt,
* McsEngl.conceptIt505,
* McsEngl.computer-system.parallel@cptIt505,
* McsEngl.parallel-computer@cptIt505,
* McsEngl.parallel-computer-system@cptIt505,

DEFINITION

Parallel computing is a form of computing in which many instructions are carried out simultaneously.[1] Parallel computing operates on the principle that large problems can almost always be divided into smaller ones, which may be carried out concurrently ("in parallel"). Parallel computing exists in several different forms: bit-level parallelism, instruction level parallelism, data parallelism, and task parallelism. It has been used for many years, mainly in high performance computing, but interest in it has become greater in recent years due to physical constraints preventing frequency scaling. Parallel computing has recently become the dominant paradigm in computer architecture, mainly in the form of multicore processors.[2]
[http://en.wikipedia.org/wiki/Parallel_architecture]

GENERIC

_GENERIC:
* systemComputer#cptItsoft453#

SPECIFIC

3.2 Classes of parallel computers
3.2.1 Multicore computing
3.2.2 Symmetric multiprocessing
3.2.3 Distributed computing
o 3.2.3.1 Cluster computing
o 3.2.3.2 Massive parallel processing
o 3.2.3.3 Grid computing
3.2.4 Specialized parallel computers
[http://en.wikipedia.org/wiki/Parallel_architecture]

DISTRIBUTED-COMPUTER

name::
* McsEngl.distributed-memory-multiprocessor@cptIt505i,

_DEFINITION:
A distributed computer (also known as a distributed memory multiprocessor) is a distributed memory computer system where the processing elements are connected by a network. Distributed computers are highly scalable.

Cluster computing
Main article: Computer cluster
A cluster is a group of loosely coupled computers that work together closely so that in many respects they can be viewed as though they are a single computer.[23] Clusters are composed of multiple standalone machines connected by a network. While machines in a cluster do not have to be symmetric, load balancing is more difficult if they are not.
The most common type of cluster is the Beowulf cluster, which is a cluster implemented on multiple identical commercial off-the-shelf computers connected with a TCP/IP Ethernet local area network.[24] Beowulf technology was originally developed by Thomas Sterling and Donald Becker.
The vast majority of the TOP500 supercomputers are clusters.[25]

Massive parallel processing
Main article: Massive parallel processing
A cabinet from Blue Gene/L, ranked as the fastest supercomputer in the world according to the TOP500 rankings. Blue Gene/L is a massively parallel processor.
A cabinet from Blue Gene/L, ranked as the fastest supercomputer in the world according to the TOP500 rankings. Blue Gene/L is a massively parallel processor.
A massively parallel processor (MPP) is a single computer with a very large number of networked processors. MPPs have many of the same characteristics as clusters, but they are usually larger, typically having "far more" than 100 processors.[26] In an MPP, "each CPU contains its own memory and copy of the operating system and application. Each subsystem communicates with the others via a high-speed interconnect."[27]
Blue Gene/L, the fastest supercomputer in the world according to the TOP500 ranking, is an MPP.

Grid computing
Main article: Grid computing
Grid computing is the most distributed form of parallel computing. Grid computing makes use of computers many miles apart, connected by the Internet, to work on a given problem. Because of the low bandwidth and extremely high latency available on the Internet, typically grid computing deals only with embarrassingly parallel problems. Many grid computing applications have been created, of which SETI@home and Folding@Home are best known examples.
Most grid computing applications use middleware—software that operates between the operating system and the application, which manages network resources and standardizes the software interface for grid computing applications. The most common grid computing middleware is the Berkeley Open Infrastructure for Network Computing (BOINC). Often, grid computing software makes use of "spare cycles", doing computations at times when a computer is idling.
[http://en.wikipedia.org/wiki/Parallel_architecture#Distributed_computing]

cmr.processing.INTEL

name::
* McsEngl.cmr.processing.INTEL@cptIt,

486DX-66

SMART SYSTEMS
GRD.289000(JUL 1994), 4 RAM, 210HD, COLOR SVGA, 200W

PENTIUM 60 MHz

TEST COMPUTERS
4RAM, 420HD, LR,NI display, 471000 dec.1994

cmr.processing.PENTIUM-SYSTEM

name::
* McsEngl.cmr.processing.PENTIUM-SYSTEM@cptIt,
* McsEngl.conceptIt225,
* McsEngl.computer.pentium@cptIt225,
* McsEngl.pentium-system@cptIt,

ETERIES#ql:[Group pentium.systems]:IT-COMP.NFO# illp# {PENTIUM.SYSTEMS}

measure#cptCore88#

ΜΕΧΡΙ ΤΕΛΟΣ ΤΟΥ ΧΡΟΝΟΥ ΑΝΑΜΕΝΕΤΑΙ ΝΑ ΔΙΑΤΕΘΟΥΝ 150.000 ΣΥΣΤΗΜΑΤΑ
[COMPUTER GO, JUN 1993, 21]

SPECIFIC

Specific_concepts (level 3) =

AMBRA:
60MHz, 8RAM, 540HD, PCI/IDE, SVGA, USD.(APR 1994)

AST:
Manhattan SMP, MULTIPROCESSOR, USD.32000 [JUN 1993]
Premium SE P/60, SERVER, 128RAM $7,500 [JUN 1993]
PREMMIA P/60, PERSONAL.COMPUTER, USD.5500 [JUN 1993]

DELL:
4560/XE, SERVER, USD. [JUNE 1993]

cmr.processing.NETWORK-COMPUTER

NAME

name::
* McsEngl.cmr.processing.NETWORK-COMPUTER@cptIt,
* McsEngl.conceptIt997,
* McsEngl.NETWORK-COMPUTER@cptIt,
* McsEngl.network'computer@cptIt997,
* McsEngl.nc@cptIt997,
* McsElln.ΔΙΚΤΥΑΚΟΣ-ΥΠΟΛΟΓΙΣΤΗΣ@cptIt,

DEFINITION

Java computers, known as Network Computers, would be launched soon, which McNealy likened to the launch of the car. The Network Computer is the third wave in the evolution of the computer, McNealy [Sun chairman] said. The first was the mainframe, with the second wave being the personal computer, he said.
[http://beta.yahoo.com/headlines/961011/tech/stories/sun_2.html, 14 okt. 1996]

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt997#

JavaStation (SUN)

NEW YORK (Oct 30, 1996 00:18 a.m. EST EST) - Sun Microsystems Inc. Tuesday [OKT 29] introduced its first network computer, the JavaStation, in a direct challenge to Microsoft and Intel, the dominant players in the industry.

On Oct. 29, 1996, Sun plans to unveil JavaStation, a major new entry in the race to develop ''network computers,'' a new concept touted since last year by Oracle Corp.

Still, it's far from certain that Sun is brewing up a major success. For now, JavaStations run only programs using Sun's Java programming language, which are few and largely untested.

PRICE: Less than $1,000
TARGET MARKET: Hotel reservation systems, bank teller networks, auto rental desks, and the like
WHAT'S INCLUDED: Sun SPARC microprocessor, 8 megabytes of memory, a graphics chip and network connector, a 14-inch monitor, keyboard, and mouse
WHAT'S NOT INCLUDED: Disk drives, software
DATA: COMPANY REPORTS

NetPC (MICROSOFT-INTEL)

Microsoft, Intel unveil network computer
Microsoft Corp. reversed course on Monday [okt. 28, 1996] and outlined its vision of a low-cost network computer, or NC.
Not many months ago the software company said the world didn't want an inexpensive device just to cruise the Internet.
Now Microsoft, teamed up with Intel Corp., has unveiled a blueprint for a no-frills computer to tap the Internet for information and software applications.
[http://cnn.com/TECH/index.html]

cmr.processing.SUPERCOMPUTER

NAME

name::
* McsEngl.cmr.processing.SUPERCOMPUTER@cptIt,
* McsEngl.conceptIt85,
* McsEngl.computer.supercomputer@cptIt85,
* McsEngl.supercomputer@cptIt85,

DEFINITION

GENERIC

_GENERIC:
* stmIt.computer.machine#cptItsoft227#

PRICE#cptEconomy541.44#

36.000.000 δολάρια κοστίζει ο υπερυπολογιστης της Cray. [Kαθημερινή 92]

SPEED

10.000.000 MIPS από IBM
Το Υπουργείο Ενέργειας των ΗΠΑ ανέθεσε στην ΙΒΜ την κατασκευή και εγκατάσταση ενός υπερυπολογιστή που θα έχει τη δυνατότητα να πραγματοποιεί 10 τρισεκατομμύρια υπολογισμούς ανά δεπτερόλεπτο, αρκετούς αιώνες ταχύτερα από ένα κοινό PC. Πρόκειται φυσικά για το ταχύτερο σύστημα στον κόσμο, το οποίο, όταν παραδοθεί στο Υπουργείο σε δύο χρόνια, θα αναλάβει το βαρύ έργο του συντονισμού και του ελέγχου απόδοσης του πυρηνικού οπλοστασίου των ΗΠΑ.
[1998feb]

SPECIFIC

Specific_concepts (level 3) =

societyGREECE

_ADDRESS.WPG:
* http://www.nooz.gr/tech/akoma-pio-isxuros-o-e8nikos-uperupologistis-aris, {2015}

USA2025

Υπολογιστής-τέρας made in USA με εντολή Ομπάμα
31.07.2015 ΤΕΧΝΟΛΟΓΙΑ
Υπολογιστής-τέρας made in USA με εντολή Ομπάμα  

Η γνωστή μανία των Αμερικανών, για τις πρωτιές και τα υψηλά ρεκόρ, χτύπησε και στο χώρο των ηλεκτρονικών υπολογιστών. Οι ΗΠΑ δεν μπορούσαν να χωνέψουν ότι από τον Ιούνιο του 2013, ο ισχυρότερος υπερ-υπολογιστής στον κόσμο είναι κινεζικός και μάλιστα με διαφορά από τον δεύτερο αμερικανικό. Έτσι, ο πρόεδρος Ομπάμα υπέγραψε μια ειδική διαταγή, με την οποία οι αρμόδιες αρχές της χώρας του θα κατασκευάσουν τον ταχύτερο υπολογιστή του κόσμου έως το 2025.

Στόχος των ΗΠΑ είναι φτιάξουν ένα μηχάνημα που θα είναι έως 30 φορές ταχύτερο από τον σημερινό παγκόσμιο «πρωταθλητή», τον υπερυπολογιστή Τιανχέ-2 της Κίνας και θα μπορεί να κάνει ένα δισεκατομμύριο δισεκατομμυρίων υπολογισμούς το δευτερόλεπτο#ql:flops# (1 exaflop ή 1.000 petaflops). Για κάτι τέτοιο όμως, ο υπολογιστής θα πρέπει να καταναλώνει τουλάχιστον 540 μεγαβάτ#ql:watt@cptCore747.1# ηλεκτρικής ενέργειας, δηλαδή όσο παράγει ένα πυρηνικό εργοστάσιο ηλεκτροπαραγωγής!

Η απόφαση Ομπάμα πρέπει να επικυρωθεί από τη Βουλή και τη Γερουσία των ΗΠΑ, κάτι που αναμένεται να συμβεί όμως, καθώς τόσο οι Ρεπουμπλικάνοι όσο και οι Δημοκρατικοί στηρίζουν το σχέδιο για λόγους εθνικού γοήτρου και εθνικού συμφέροντος. Το κόστος του επενδυτικού προγράμματος παραμένει ακόμη άγνωστο.

ΠΗΓΗ : ΑΠΕ-ΜΠΕ
[http://www.ert.gr/ipologistis-teras-made-in-usa-me-entoli-ompama/]

ΤΙΑΝΧΕ-2 {2014}

{time.2014}:
Με επεξεργαστική ισχύ 33,86 petaflop/s
Στην Κίνα ο ισχυρότερος υπερυπολογιστής
Ο «Τιανχέ-2», που ανήκει στην κινεζική κυβέρνηση και είναι εγκατεστημένος στο Εθνικό Πανεπιστήμιο Αμυντικής Τεχνολογίας, ανακηρύχθηκε Νο 1 για το πρώτο εξάμηνο του 2014 στον κατάλογο των 500 ταχύτερων ηλεκτρονικών υπολογιστών διεθνώς. Διαθέτει επεξεργαστική ισχύ 33,86 petaflop/s (τετράκις εκατομμύρια υπολογισμοί ανά δευτερόλεπτο).
Στην κορυφή ο κινεζικός υπερυπολογιστής «Tianhe-2»
Στην κορυφή ο κινεζικός υπερυπολογιστής «Tianhe-2»
Ο πρωταθλητής «Τιανχέ-2» χρησιμοποιείται για ερευνητικούς και εκπαιδευτικούς σκοπούς.

Η σχετική λίστα «Top 500» ανανεώνεται δύο φορές ετησίως. Από την προηγούμενη φορά, η Κίνα έχει 20% περισσότερους υπερυπολογιστές στο «Top 500», ενώ οι ΗΠΑ 15% λιγότερους.

Πάντως, οι ΗΠΑ παραμένουν η κυρίαρχη δύναμη με 233 υπολογιστές μεταξύ των 500 ισχυρότερων παγκοσμίως, έναντι 76 της Κίνας, 30 της Βρετανίας, 27 της Γαλλίας και 23 της Γερμανίας.

Ο πλήρης κατάλογος του «Top 500», που άρχισε να συντάσσεται το 1993 και αποτελεί«βαρόμετρο» για την υπολογιστική ισχύ κάθε κράτους, θα δημοσιοποιηθεί την ερχόμενη Δευτέρα στη Λειψία της Γερμανίας, σύμφωνα με το BBC.

Όλα μαζί τα μηχανήματα του «Top 500» έχουν επεξεργαστική ισχύ περίπου 274 petaflop ανά δευτερόλεπτο.

Το φράγμα του ενός petaflop έσπασε πριν πέντε χρόνια ο υπερ-υπολογιστής Roadrunner της αμερικανικής εταιρείας ΙΒΜ, ο οποίος το 2013 «βγήκε στη σύνταξη» λόγω υπερβολικής κατανάλωσης ηλεκτρικής ενέργειας.
[http://www.enet.gr/?i=news.el.article&id=436701]

CRAY T34

CS-2

Κατασκευάστηκε μέσα στα πλαίσια του ευρωπαϊκού προγράμματος ESPRIT, απο το CERN.
Η κατασκευή ξεκίνησε το 1991. Τέλειωσε το 1994.
Ξεπερνα σε επιδόσεις αμερικά και ευρωπαικα μηχανήματα.
[ΒΗΜΑ, 25 ΣΕΠΤ. 1994]

IBM SP2

cmr.program.STORED

_CREATED: {2014-01-17}

name::
* McsEngl.cmr.program.STORED@cptIt,
* McsEngl.stored-program-computer@cptIt,

_DESCRIPTION:
A stored-program computer is one which stores program instructions in electronic memory.[1] Often the definition is extended with the requirement that the treatment of programs and data in memory be interchangeable or uniform.[2][3][4]

A computer with a Von Neumann architecture stores program data and instruction data in the same memory; a computer with a Harvard architecture has separate memories for storing program and data.[5][6]

Stored-program computer is sometimes used as a synonym for von Neumann architecture,[7][8] however Professor Jack Copeland considers that it is "historically inappropriate, to refer to electronic stored-program digital computers as 'von Neumann machines'".[9] Hennessy and Patterson write that the early Harvard machines were regarded as "reactionary by the advocates of stored-program computers".[10]

The stored-program computer idea can be traced back to the 1936 theoretical concept of a universal Turing machine.[11] Von Neumann was aware of this paper, and he impressed it on his collaborators as well.[12]

Many early computers, such as the Atanasoff–Berry Computer, were not reprogrammable. They executed a single hardwired program. As there were no program instructions, no program storage was necessary. Other computers, though programmable, stored their programs on punched tape which was physically fed into the machine as needed.

In 1936 Konrad Zuse also anticipated in two patent applications that machine instructions could be stored in the same storage used for data[13][14].

The University of Manchester's Small-Scale Experimental Machine (SSEM)[15] is generally recognized as world's first electronic computer that ran a stored program—an event that occurred on 21 June 1948.[16][17] However the SSEM was not regarded as full-fledged computer, more a proof of concept that was built on to produce the Manchester Mark 1 computer, which was first put to research work in April 1949. On 6 May 1949 the EDSAC in Cambridge ran its first program, and due to this event, some consider it "the first complete and fully operational regular electronic digital stored-program computer".[18] It is sometimes claimed that the IBM SSEC, operational in January 1948, was the first stored-program computer;[19] this claim is controversial, not least because of the hierarchical memory system of the SSEC, and because some aspects of its operations, like access to relays or tape drives, were determined by plugging.[20]
[http://en.wikipedia.org/wiki/Stored-program_computer]

cmr.size.BIG

_CREATED: {2015-08-29}

name::
* McsEngl.conceptIt227.10,
* McsEngl.big-size-computer@cptIt227.10,

cmr.size.DESKTOP

name::
* McsEngl.conceptIt251,
* McsEngl.computer.desktop@cptIt251,
* McsEngl.DESKTOP COMPUTER SYSTEM,
* McsEngl.desktop-computer@cptIt251,
* McsEngl.microcomputer,
* McsEngl.PERSONAL COMPUTER,
* McsEngl.pc.desktop@cptIt251,
* McsEngl.cmr.desktop,
* McsElln.ΕΠΙΤΡΑΠΕΖΙΟ ΣΥΣΤΗΜΑ,
* McsElln.ΕΠΙΤΡΑΠΕΖΙΟΣ ΥΠΟΛΟΓΙΣΤΗΣ,
* McsElln.ΜΙΚΡΟΥΠΟΛΟΓΙΣΤΗΣ,

desktop'DEFINITION

desktop'GENERIC

_GENERIC:
Personal Computer#cptIt232#

desktop'EVOLUTION#cptCore546.171#

name::
* McsEngl.desktop'EVOLUTION@cptIt,

1972: INTEL:
Ο πρώτος Μ/Υ 8bit.
[JARRET, 1987, 80#cptResource117]

1975: ALTAIR:
Ο πρώτος δημοφιλής προσωπικός υπολογιστής.
[JARRET, 1987, 80#cptResource117]

1978: 16bit microcomputer:
Κάνει την εμφάνισή του πρώτα με τον intel 8086 και στη συνέχεια με το Zilog S-8000 και Motorola M68000
[JARRET, 1987, 75#cptResource117]

1980: Singlair:
Ο πρώτος Μ/Υ σε τιμή προσιτή στον πολύ κόσμο.
[JARRET, 1987, 80#cptResource117]

1981, AYG: IBM/PC:
H IBM αναγγέλει ένα χαμηλού κόστους επιχειρηματικό κομπιούτερ. Ως το τέλος του 1983 είχε πουλήσει 300.000 κομάτια... Διέδωσε τα 16bit στην υπολογιστική των επιχειρήσεων.[80]
[JARRET, 1987, 76#cptResource117]

desktop.SPECIFIC

name::
* McsEngl.desktop.SPECIFIC@cptIt,

Specific_concepts (level 3) =

desktop.SPECIFIC-DIVISION.COMPANY

name::
* McsEngl.desktop.SPECIFIC-DIVISION.COMPANY@cptIt,

TOSHIBA:
10 SEP 1996 παρουσίασε τη σειρά INFINIA, multimedia
[RAM, OKT. 1996, 30]

desktop.my AMD386DX

name::
* McsEngl.desktop.my AMD386DX@cptIt,

BUYING: July 1991
COST:  $2000 with modem.
COMPANY:
ICS COMPUTERS
6531C Little River Tnpk
Alexandria VA 22312
703-658-1335
Fax 703-658-6413

SPECIFICATIONS:
RAM:
on may 1994 added 4MB RAM, goldstar GM71C4400AJ60. 44000 δρχ απο CONPET, δεν πληρωσα φπα.
Μάλλον οι παλιες είναι 80ns, ενώ οι καινουργιες 60ns.
Μου είπε ότι μόνο 486 κομπιουτερ χρησιμοποιει τοσο γρηγορη μνήμη.

desktop.SPECIFIC-DIVISION.PROCESSOR

name::
* McsEngl.desktop.SPECIFIC-DIVISION.PROCESSOR@cptIt,

desktop.processor.PENTIUMPRO

name::
* McsEngl.desktop.processor.PENTIUMPRO@cptIt,

SMM
500.000+, RAM αριστη αγορα, οκτ.1996

desktop.processor.386DX-40

name::
* McsEngl.desktop.processor.386DX-40@cptIt,

ΧΩΡΙΣ ΣΚΛΗΡΟ ΔΙΣΚΟ


135000  QUALITY, ΧΩΡΙΣ ΟΘΟΝΗ
149000  COSMODATA
154000  ALFA MIRO
155000  IMAGE, ΑΝΑΒΑΘΜΙΖΟΜΕΝΟ
159000  ΠΛΑΙΣΙΟ
160000  SALCOM, ΜΕ 4RAM
179000  ROM ΨΗΦΙΑΚΗ, 2RAM

ΜΕ ΣΚΛΗΡΟ ΔΙΣΚΟ

195000  RAM SHOP, 80MB HD

desktop.SPECIFIC.DIVISION.COUNTRY

name::
* McsEngl.desktop.SPECIFIC.DIVISION.COUNTRY@cptIt,

desktop.society.Greece#cptCore18#

name::
* McsEngl.desktop.society.Greece@cptIt,

1985:
αποτελούσαν το 96,2% του συνολικού αριθμού των συστημάτων που εγκαταστάθηκαν.
[ΕΠΙΣΤΗΜΟΝΙΚΗ ΣΚΕΨΗ, 39, 25]

cmr.size.SMALL

NAME

name::
* McsEngl.cmr.size.SMALL@cptIt,
* McsEngl.conceptIt252,
* McsEngl.cmr.size.portable@cptIt,
* McsEngl.compMobile@cptIt252, {2011-09-07}
* McsEngl.compPortable@cptIt252, {2011-09-07}
* McsEngl.computer.portable@cptIt252,
* McsEngl.mobile-computer@cptIt252,
* McsEngl.pc.portable@cptIt252,
* McsEngl.PORTABLE-COMPUTER@cptIt,
* McsEngl.portable-computer@cptIt252,

* McsElln.ΦΟΡΗΤΟΣ@cptIt,
* McsEngl.portable-small-stand-alone-ims@cptIt,

DEFINITION

GENERIC

_GENERIC:
* stmIt.computer.machine#cptItsoft227#

SPECIFIC

Specific_concepts (level 3) =


 laptop,
 notebooks#cptIt271: attSpe#
 pen'notebook,
 subnotebooks,
   PDA#cptIt269: attSpe#
   palmtop#cptIt34: attSpe#
   NotePhone,

PDA

name::
* McsEngl.conceptIt252.1, (old 269)
* McsEngl.PDA@cptIt269,
* McsEngl.PERSONAL-DIGITAL-ASSISTANT@cptIt,
* McsEngl.PERSONAL-COMMUNICATORS@cptIt,

_SPECIFIC:
* MIO P560#cptIt571#

GENERAL MAGIC

Η ΑΜΕΡΙΚΑΝΙΚΗ ΑΥΤΗ ΕΤΑΙΡΙΑ ΠΑΡΟΥΣΙΑΣΕ ΤΑ
α) TELESCRIPT, ΠΟΥ ΠΙΣΤΕΥΕΙ ΟΤΙ ΘΑ ΚΑΘΙΕΡΩΘΕΙ ΣΑΝ STANDARD INTERFACE
b) MAGIC CAP, ΛΕΙΤΟΥΡΓΙΚΟ ΣΥΣΤΗΜΑ
[COMPUTER ΓΟ, ΜΑΡΤ 1993, 16]

ENVOY

of Motorola (1994). USD.. built in faxmodem & wireless modem.

NEWTON

NEWTON is the PDA of APPLE.

cmr.size.small.FABLET

_CREATED: {2013-10-22}

name::
* McsEngl.cmr.size.small.FABLET@cptIt,
* McsEngl.conceptIt227.3,
* McsEngl.fablet@cptIt,

_DESCRIPTION:
Phablet (/'fζbl?t/) is a smartphone form factor describing devices with a screen between 5 to 6.9 inches (130 to 180 mm) in size,[1] designed to combine or straddle the functionalities of a smartphone and tablet, eliminating the need for two devices.[2] In early 2013, The Wall Street Journal described the devices as "typically hybrids of smartphones and small tablets with a screen size of five to seven inches."[3] The term itself, a portmanteau of the words phone and tablet[4] appeared as early as 2012.

The phablet's larger screen can complement screen-intensive activity such as mobile web browsing and multimedia viewing — and the device may include, as with Samsung's Galaxy Note, software optimized for an integral self-storing stylus to facilitate sketching, note-taking and annotation.[5] While Samsung's Galaxy Note (5.3-inch) is largely credited with pioneering the worldwide phablet market when launched in 2011,[6] international markets now include larger phablets such as the dust-proof water-resistant pencil-compatible Sony Xperia Z Ultra (6.44 inch), and Asus FonePad (7 inch).

In January 2013, IHS reported that 25.6 million phablet devices were sold in 2012 and estimated that these figures would grow to 60.4 million in 2013, and 146 million by 2016.[dead link][7][8] Barclays projected sales of phablets rising from 27 million in 2012 to 230 million in 2015.[9] In September 2013 International Data Corporation (IDC) reported that its research indicated that phablet size smartphones "overtook shipments of both laptops and tablets in Asia in the second quarter of 2013."[10]

In a 2013 analysis, Engadget identified dropping screen prices, increasing screen power efficiency, increasing battery life and the evolving importance of multimedia viewing as critical factors in the popularity of the phablet.[11] In 2012, Forbes Magazine noted that while most clothing cannot hold a typical tablet computer, men's clothing in particular could and may well adapt to accommodate phablets.[12] Doug Conklyn, vice president of global design for Dockers told Fox News that the company reworked the size of its pants pockets "to accommodate the growing size of smartphones."[13]

Reuters called 2013 the "Year of the Phablet."[14]
[http://en.wikipedia.org/wiki/Phablet] {2013-10-22}

cmr.size.small.NOTEBOOK (laptop)

NAME

name::
* McsEngl.cmr.size.small.NOTEBOOK (laptop)@cptIt,
* McsEngl.conceptIt271,
* McsEngl.cmr.laptop@cptIt,
* McsEngl.computer.notebook@cptIt271,
* McsEngl.notebook@cptIt271,
====== lagoGreek:
* McsElln.ΣΗΜΕΙΩΜΑΤΑΡΙΟ@cptIt,

GENERIC

_GENERIC:
* stmIt.computer.machine#cptItsoft227#

SPECIFIC

Specific_concepts (level 3) =

BEST'BUY:
Acer Note Nuovo, 10 hours batery (infoquest) 1997may

CANON notebook

NoteJet 486. Εχει ενσωματομένο εκτυπωτή.

IBM notebook

THINKPAD 550BJ: IBM JAPAN & CANON ΚΑΙ ΕΚΤΥΠΩΤΗΣ ΜΑΖΙ $2400-4200, 80486SLC

TOSHIBA notebook

T1800 (1993) i386SX ΑΝΤΙΠΡΟΣΩΠΟΣ INTEAL
T1850 (1993) i386SX
T1850 (1993) i386SX

T4500 (1993) 3,3V 486SX 20MHz, PCIMCA, ASYRMATO TRACKBALL
T4500C (1993) 3,3V 486SX 20MHz, PCIMCA, ASYRMATO TRACKBALL

MITAC notebook 3026E

BUY:
ΝΟΕΜΒΡΙΟΣ 1992

power ADAPTER
21.12.1993  ΑΓΟΡΑ ΚΑΙΝΟΥΡΓΙΟΥ DRX 25.960 ΕΜΕ.

BATERY:
15660 DRX, SEP 20, 1993, EME.

COMPANY:
MITAC INTERNATIONAL CORP.

COST:
$1200

DISPLAY:
Δέχεται και CRT. Με το πρόγραμμα SWITCHN που βρίσκεται στα utilities γίνεται εναλαγή μεταξύ των οθονών.

MEMORY:
4 RAM CARD: 87000 DRX, SEPT 20 1993 EME.

SERVICE:
ΕΜΕ ΑΕ: ΠΑΤΗΣΙΩΝ 267, ΤΗΛ 202.3475.

SPECIFICATIONS
BATTERY: 6 cells, nominal capacity 2800 mAh, 7.2V DC.
CPU: Intel 80386SX-20
DISPLAY: Monochrome VGA LCD, 640X480 resolution, 16 levels of gray scale
MODEL: 3026E MITAC
RAM: 2MB + 4 =6ΜΒ.
ROM: 128KB
VGA Controller: Cirrus Logic

cmr.size.small.PALMTOP

NAME

name::
* McsEngl.cmr.size.small.PALMTOP@cptIt,
* McsEngl.conceptIt34,
* McsEngl.handheld-pc@cptIt,
* McsEngl.palmtop-computer@cptIt,
* McsEngl.palmtop@cptIt34,
* McsEngl.palmtop'computer@cptIt34,
* McsEngl.personal-digital-assistan@cptIt,
* McsEngl.pdi@cptIt,
* McsEngl.subnotebook@cptIt,

SPECIFIC

Specific_concepts (level 3) =

HEWLETT-PACKARD:
HP 100LX
2MB RAM(1994)

HP 100LX
(1993) 300gr, PCMCIA, 50$ faster than 95LX, $750 (250.000 drx jul 1993)

HP 200LX
2/1 MB RAM. With Pocket Quiken, Lotus cc:Mail, Lotus 1-2-3. [COMPUTER GO, OCT 1994]

cmr.size.small.Raspberry-Pi (cmrRbp)

name::
* McsEngl.cmr.size.small.Raspberry-Pi (cmrRbp)@cptIt,
* McsEngl.Raspberry-Pi-computer@cptIt,

* McsEngl.cmrRbp@cptIt,
* McsEngl.computer.Raspberry-Pi@cptIt,
* McsEngl.Raspberry-Pi-computer@cptIt,

_DESCRIPTION:
Raspberry Pi ($35 computer)

is a small, single-board computer that was originally developed for computer science education and has since been popularized by digital hobbyists and makers of Internet of Things (IoT) devices. Raspberry PI, whose basic model costs $35 is about the size of a credit card, has a 64-bit quad-core ARMv8 processor and uses a Raspbian distribution of Linux for its default operating system (OS).

The Raspberry Pi computer is essentially a wireless Internet capable system-on-a-chip (SoC) with 1 GB RAM, connection ports, a Micro SD card slot, camera and display interfaces and an audio/video jack. The Raspberry Pi Foundation offers several versions of Raspberry Pi, including the Raspberry Pi Zero, a $5 model which was released in 2015.

A United Kingdom (UK) charitable organization called the Raspberry Pi Foundation developed the device after noticing a decline in Cambridge University’s Computer Science undergraduate degree in the early 2000’s. The organization's stated mission is "to put the power of digital making into the hands of people all over the world." Since the first Rasperry Pi product was launched in 2012, the foundation has sold over eight million Raspberry Pi computers.

This was last updated in June 2016
Posted by: Margaret Rouse
[http://whatis.techtarget.com/definition/Raspberry-Pi-35-computer]

cmrRbp'GPIO

name::
* McsEngl.cmrRbp'GPIO@cptIt,

_DESCRIPTION:
The Raspberry Pi is also has bunch of GPIO (General Purpose Input Output) pins that are open / exposed, so that we can use it to build circuits using sensors. The GPIO pins are easy to configure and control and you can write program to read the sensor data coming from the GPIO pins and send back data to the GPIOs pins after processing.
[http://www.codeproject.com/Articles/1147234/Getting-Started-with-Raspberry-Pi-Part-I]

cmrRbp'OS

name::
* McsEngl.cmrRbp'OS@cptIt,

_DESCRIPTION:
There are different OS (Windows, MAC, Linux version) that can be installed and run on a Raspberry Pi, the recommended OS is a Linux flavor OS called Raspbian (by Raspberry foundation maker of Raspberry).
[http://www.codeproject.com/Articles/1147234/Getting-Started-with-Raspberry-Pi-Part-I]

cmrRbp'Processor

name::
* McsEngl.cmrRbp'Processor@cptIt,

_DESCRIPTION:
As mentioned above the size of Raspberry Pi is of a credit card, it a single board that has a Broadcom processor (SOC – system on chip) made by ARM, it’s similar to the processors that is found on mobile phone. The ARM processor is fast and light weight.
[http://www.codeproject.com/Articles/1147234/Getting-Started-with-Raspberry-Pi-Part-I]

cmrRbp'Resource

name::
* McsEngl.cmrRbp'Resource@cptIt,

_ADDRESS.WPG:
* http://www.codeproject.com/Articles/1147234/Getting-Started-with-Raspberry-Pi-Part-I,

cmrRbp'Startup-kit

name::
* McsEngl.cmrRbp'Startup-kit@cptIt,

_DESCRIPTION:
You can purchase these boards as an individual or as part of Startup kits (recommended for beginners). Startup Kits contain the Raspberry Pi board, 8 GB SD card with pre- installed OS, Raspberry Pi Case, power cables, Breadboard, Wi-Fi dongle and other most essential items like the sensors (Temperature, Color, light etc.), jumper cables, capacitor, resistors, LED’s (red, blue and Green), push buttons etc. These startup kits are best way to start doing some popular IOT projects.
Note: I would recommend a starter kit from Adafruit the Microsoft IoT kit. (https://www.adafruit.com/products/2733)
[http://www.codeproject.com/Articles/1147234/Getting-Started-with-Raspberry-Pi-Part-I]

cmrRbp'Storage

name::
* McsEngl.cmrRbp'Storage@cptIt,

_DESCRIPTION:
Hard Disk - Raspberry Pi does not has its own hard disk, you will need to use micro SD cards in place of the Hard disk, and the OS will be installed on these micro SD cards. (Minimum 2 GB micro SD cards is recommended for installing the OS and running normal functionality on the Raspberry Pi). The benefit of using micro SD card is you can easily swap this computer (Raspberry pi) with different OS's on different SD cards. There is a micro SD card slot at the underside / bottom of the Pi board
[http://www.codeproject.com/Articles/1147234/Getting-Started-with-Raspberry-Pi-Part-I]

cmr.size.small.SING-BOARD-COMPUTER

_CREATED: {2016-08-23}

name::
* McsEngl.cmr.size.small.SING-BOARD-COMPUTER@cptIt,
* McsEngl.Single-board-computer@cptIt,
* McsEngl.SBC@cptIt,
* McsEngl.Single-board-computer@cptIt,
* McsEngl.SBC@cptIt,

_DESCRIPTION:
A single-board computer (SBC) is a complete computer built on a single circuit board, with microprocessor(s), memory, input/output (I/O) and other features required of a functional computer. Single-board computers were made as demonstration or development systems, for educational systems, or for use as embedded computer controllers. Many types of home computer or portable computer integrated all their functions onto a single printed circuit board.
Unlike a desktop personal computer, single board computers often do not rely on expansion slots for peripheral functions or expansion. Some single-board computers are made to plug into a backplane for system expansion. Single board computers have been built using a wide range of microprocessors. Simple designs, such as built by computer hobbyists, often use static RAM and low-cost 8 or 16 bit processors. Other types, such as blade servers, include all the memory and processor performance of a server computer in a compact space-saving format.
[https://en.wikipedia.org/wiki/Single-board_computer]

cmrSbd'resource

name::
* McsEngl.cmrSbd'resource@cptIt,

_ADDRESS.WPG:
* https://en.wikipedia.org/wiki/Comparison_of_single-board_computers#Physical_and_electrical_comparison,

cmr.size.small.SMARTPHONE

_CREATED: {2013-11-24}

name::
* McsEngl.cmr.size.small.SMARTPHONE@cptIt,
* McsEngl.smartphone@cptIt,
* McsEngl.cmr.smartphone@cptIt,
* McsEngl.mobile-computer@cptIt,
* McsEngl.sfn@cptIt, {2016-07-27}
* McsEngl.smtphn@cptIt, {2013-11-27}

sfn'health

name::
* McsEngl.sfn'health@cptIt,

_ADDRESS.WPG:
* https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4350886/,

sfn'SAR

name::
* McsEngl.sfn'SAR@cptIt,
* McsEngl.SAR.smartphone@cptIt,
* McsEngl.specific-absorption-rate@cptIt,
* McsElln.ειδικός-ρυθμός-απορρόφησης-ακτινοβολίας@cptIt,

_DESCRIPTION:
Ένα από τα πολύ σημαντικά χαρακτηριστικά ενός smartphone, το οποίο όμως συνηθίζουμε να παραβλέπουμε είναι ο ειδικός ρυθμός απορρόφησης ακτινοβολίας ή SAR όπως είναι ευρύτερα γνωστός.
Δεν είναι κάτι που το βλέπεις με γυμνό μάτι, όπως μία όμορφη 2K οθόνη, αλλά είναι ιδιαίτερα σημαντικός για την υγεία μας, ειδικά αν στο μέλλον αποδειχτεί ότι την επηρεάζει αρνητικά.

_ADDRESS.WPG:
* https://www.fcc.gov/consumers/guides/specific-absorption-rate-sar-cell-phones-what-it-means-you,
* https://www.gearbest.com/blog/how-to/how-to-reduce-the-sar-value-of-your-cell-phone-2272,

_SPECIFIC:
           HEAD    BODY
Samsung Galaxy A8 (2018) Dual  0.241    1.25
Samsung Galaxy J7 (2017) Duos  0.567    1.33
Redmi 5 Plus        1.013W/kg  1.470W/kg
Microsoft Lumia 950      1.09 W/Kg  0.9 W/Kg

sfn'application

name::
* McsEngl.sfn'application@cptIt,
* McsEngl.sfn'program@cptIt,

EARTHQUAKE-SENSOR

_DESCRIPTION:
Smartphones could become the earthquake sensors of the future
Reuters
Sebastien Malo, Reuters
1h  15
NEW YORK (Thomson Reuters Foundation) - Smartphones could become the makeshift quake detectors of the future, thanks to a new app launched Friday designed to track tremors and potentially save the lives of its users.

MyShake, available on Android, links users to become an all-in-one earthquake warning system; it records quake-type rumblings, ties a critical number of users to a location, and could eventually provide a countdown to the start of shaking.

Its inventors say the app, released by the University of California, Berkeley, could give early warning of a quake to populations without their own seismological instruments.

"MyShake cannot replace traditional seismic networks like those run by the U.S. Geological Survey," said Richard Allen, leader of the app project and director of the Berkeley Seismological Laboratory.

"But we think MyShake can make earthquake early warning faster and more accurate in areas that have a traditional seismic network, and can provide life-saving early warning in countries that have no seismic network."

Earthquake-prone countries in the developing world with poor ground-based seismic network or early warning systems include Nepal, Peru, Pakistan, Turkmenistan and Iran, he said.

The algorithm behind MyShake, developed by a handful of Silicon Valley programmers, relies on the same technology smartphone gamers depend on to sense the phone's orientation, known as the accelerometer, in order to measure movement caused by quakes.

alaska earthquakeAP
Cereal boxes fell to the floor in a grocery store during a 6.8-magnitude earthquake that hit southern Alaska.

What smartphones lack in sensitivity - they can only record earthquakes above magnitude 5 within 10 kilometers (6 miles) - they make up for in ubiquity.

Currently, 300 smartphones equipped with MyShake within a 110-km square area are enough to estimate a quake's location, magnitude and origin time.

There were some 3.4 billion smartphone subscriptions worldwide in 2015, according to the Ericsson Mobility Report, so the app's creators hope to build a seismic network covering the globe.

"We want to make this a killer app, where you put it on your phone and allow us to use your accelerometer, and we will deliver earthquake early warning," Allen said.

Sophisticated early-warning systems can warn of coming quakes as much as a few minutes before they begin, but cannot stop them causing death and destruction on a large scale.

Nepal is still rebuilding after two separate earthquakes in April and May 2015 that killed 9,000 people, injured more than 22,000 and damaged or destroyed nearly 900,000 houses.

(Editing by Tim Pearce. Please credit the Thomson Reuters Foundation, the charitable arm of Thomson Reuters, that covers humanitarian news, women's rights, trafficking, corruption and climate change. Visit http://news.trust.org)
[http://www.businessinsider.com/r-app-shakes-up-earthquake-science-by-turning-users-into-sensors-2016-2]

sfn'battery

name::
* McsEngl.sfn'battery@cptIt,

sfn'camera

name::
* McsEngl.sfn'camera@cptIt,

sfn'display

name::
* McsEngl.sfn'display@cptIt,

sfn'GPS

name::
* McsEngl.sfn'GPS@cptIt,

sfn'NFC

name::
* McsEngl.sfn'NFC@cptIt,
* McsEngl.NFC@cptIt,

_DESCRIPTION:
Near field communication, abbreviated NFC, is a form of contactless communication between devices like smartphones or tablets. Contactless communication allows a user to wave the smartphone over a NFC compatible device to send information without needing to touch the devices together or go through multiple steps setting up a connection.
[http://nearfieldcommunication.org//]

sfn'OS

name::
* McsEngl.sfn'OS@cptIt,

sfn'phone

name::
* McsEngl.sfn'phone@cptIt,

sfn'processor

name::
* McsEngl.sfn'processor@cptIt,

sfn'RAM

name::
* McsEngl.sfn'RAM@cptIt,

sfn'storage

name::
* McsEngl.sfn'storage@cptIt,

sfn'weight

name::
* McsEngl.sfn'weight@cptIt,

sfn'sensor

name::
* McsEngl.sfn'sensor@cptIt,

Accelerometer, Hall, Light Sensor, Proximity, Βαρόμετρο, Γυροσκόπιο, Πυξίδα

sfn'accelerometer

name::
* McsEngl.sfn'accelerometer@cptIt,

sfn'proximity

name::
* McsEngl.sfn'proximity@cptIt,

SPECIFIC

sfn.os.ANDROID

name::
* McsEngl.sfn.os.ANDROID@cptIt,

sfn.os.WINDOWS

name::
* McsEngl.sfn.os.WINDOWS@cptIt,

sfn.AGGREGATE

name::
* McsEngl.sfn.AGGREGATE@cptIt,

{time.2015}:
Συνολικά, έως το 2020 αναμένεται να υπάρχουν στην παγκόσμια αγορά 5,8 δισ. smartphones από 2,6 δισ. στα τέλη του 2015.
[http://www.naftemporiki.gr/story/1070220/ta-34-tou-pagkosmiou-plithusmou-sundedemena-se-diktua-kinitis-tilefonias-to-2020]

sfn.HTC-T-Mobile-G1

name::
* McsEngl.sfn.HTC-T-Mobile-G1@cptIt,
* McsEngl.conceptIt557,
* McsEngl.G1-TMobile@cptIt557,
* McsEngl.TMobile-G1@cptIt557,

EVALUATION

HTC Dream T-Mobile G1 (black)
Product summary

The good:
The T-Mobile G1 features a full QWERTY keyboard, 3G support, Wi-Fi, GPS, and Bluetooth. The Google Android operating system offers good integration with Google applications as well as access to the Amazon MP3 Store and YouTube. As more applications become available, the G1 will also become a more powerful smartphone for all types of users.

The bad:
The G1 doesn't include a standard headphone jack and lacks stereo Bluetooth and Microsoft Exchange support. There are some annoying design quirks that make the smartphone uncomfortable to hold and difficult to use. The GPS tracking was disappointing, and speakerphone quality wasn't the greatest.

The bottom line:
While we're not in love with the design and would have liked some additional features, the real beauty of the T-Mobile G1 is the Google Android platform, as it has the potential to make smartphones more personal and powerful. That said, it's not quite there yet, so for now, the G1 is best suited for early adopters and gadget hounds, rather than consumers and business users.

Specifications:
OS provided: Android; Installed RAM: 192 MB; Processor: QUALCOMM 528 MHzMSM7201A; ; See full specs

cmr.size.small.SMARTWATCH

name::
* McsEngl.cmr.size.small.SMARTWATCH@cptIt,
* McsEngl.smartwatch@cptIt,

smartwatch'resource

name::
* McsEngl.smartwatch'resource@cptIt,

_ADDRESS.WPG:
* {2018-05-30} Experiment: How easy is it to spy on a smartwatch wearer?
https://www.kaspersky.com/blog/smart-watch-research/22536/

cmr.size.small.SUBNOTEBOOK

name::
* McsEngl.conceptIt26,
* McsEngl.computer.subnotebook,
* McsEngl.subnotebook@cptIt26,
* McsElln.ΥΠΟΣΗΜΕΙΩΜΑΤΑΡΙΟ,

SPECIFIC

Specific_concepts (level 3) =

COMPAQ:
contura aero:
4/25 m84 (1994): 486sx, 25MHz, 4RAM, 84HD, PMCIA2,$1400.
4/25 m170:

HEWLETT PACKARD:
OmniBook 430: 4 μπαταρίες λιθιου ΑΑ ή επαναφορτιζόμενη μπαταρία.

TOSHIBA:
potege T3400(nov 1993): απεσπασε τις καλύτερες κριτικες.

cmr.size.small.TABLET

_CREATED: {2012-03-17}

name::
* McsEngl.conceptIt194,
* McsEngl.cmr.tablet,
* McsEngl.computer.tablet@cptIt194,
* McsEngl.tablet@cptIt194,
* McsEngl.tablet-pc@cptIt194,
* McsEngl.cmrTbt@cptIt194, {2013-09-20}
* McsEngl.cprTbt@cptIt194, {2013-09-10}

cmrTbt'DEFINITION

cmrTbt'battery

name::
* McsEngl.cmrTbt'battery@cptIt,

cmrTbt'camera

name::
* McsEngl.cmrTbt'camera@cptIt,

cmrTbt'GPS

name::
* McsEngl.cmrTbt'GPS@cptIt,

cmrTbt'OS

name::
* McsEngl.cmrTbt'OS@cptIt,

cmrTbt'phone

name::
* McsEngl.cmrTbt'phone@cptIt,

cmrTbt'screen-resolution

name::
* McsEngl.cmrTbt'screen-resolution@cptIt,

cmrTbt'size

name::
* McsEngl.cmrTbt'size@cptIt,

cmrTbt'storage

name::
* McsEngl.cmrTbt'storage@cptIt,

cmrTbt'weight

name::
* McsEngl.cmrTbt'weight@cptIt,

SPECIFIC

_cmrTbt.specific

cmrTbt.iPad

name::
* McsEngl.cmrTbt.iPad@cptIt,
* McsEngl.conceptIt194.1,
* McsEngl.iPad-194.1@cptIt,
* McsEngl.tablet.iPad@cptIt,

_ATTRIBUTE:
 iPad  iPad 2  iPad (third generation)
Screen  1,024x768 pixels  1,024x768 pixels  2,048x1,536 pixels
Thickness  0.5  0.34  0.37
Weight  1.5 pounds  1.33 pounds  1.44 pounds
Processor  A4 1GHz  A5 1GHz (dual-core)  A5X (dual-core, w/ quad-core graphics)
Front camera  N/A  VGA  VGA
Rear camera  n/a  0.7 megapixel/720p  5 megapixels/1080p
Stabilization  N/A  No  Yes
Face detection  N/A  No  Yes
FaceTime  No  Yes  Yes
Siri  No  No  Dictation only
Gestures*  Yes  Yes  Yes
Cellular  3G (AT&T)  3G (Verizon, AT&T)  4G (Verizon, AT&T)
Video out  Limited  HD mirroring  HD mirroring
Bluetooth  2.1+EDR  2.1+EDR  4.0
*Multifinger gesture support, such as four-finger swipe to toggle apps, or five-finger pinch to close apps.
[http://reviews.cnet.com/tablets/apple-ipad-march-2012/4505-3126_7-35159646.html?autoplay=true&tag=mncol;cnetRiver]

cmrTbt.LenovoIdeaTab.A2107 159€

name::
* McsEngl.cmrTbt.LenovoIdeaTab.A2107 159€@cptIt,

_ADDRESS.WPG:
* http://www.public.gr/product/tablets/syskeyes-tablet/lenovo-ideatab-a2107/prod3810095pp/

cprTbt.LenovoIdeaTabA300

name::
* McsEngl.cprTbt.LenovoIdeaTabA300@cptIt,

249€:
Περιγραφή προϊόντος  Lenovo IdeaTab A3000 - 7" - 3G - Λευκό
Κατασκευαστής  LENOVO
Σειρά προϊόντων  IdeaTab
Μοντέλο  A3000
Τύπος  Tablet PC
Προτεινόμενη χρήση  Εργασία & Ψυχαγωγία
Οθόνη  7" LED backlight TFT 1024 x 600
Λειτουργικό σύστημα  Google Android 4.2
Επεξεργαστής  MTK 8389/8319 Quad-Core 1.2GHz
Μνήμη  1 GB RAM
Συσκευή εισόδου  Οθόνη αφής
Κάμερα  Ενσωματωμένη - 0.3 Megapixel
Κάμερα 2η  Ενσωματωμένη - 5 Megapixel
Ενσύρματο δίκτυο  Μη διαθέσιμη πληροφορία
Ασύρματο δίκτυο  Wi-Fi 802.11b/g/n
Ασύρματη επικοινωνία  Bluetooth 4.0
Ασύρματη σύνδεση (WWAN)  WCDMA, HSPA+, GSM, EDGE
Ειδικές λειτουργίες  Όχι
Τεχνολογία 3G-4G  3G
Συχνότητα  WCDMA/HSPA+ 850/900/1900/2100 MHz, GSM/EDGE 850/900/1800/1900 MHz
GPS Navigation  A-GPS
Θύρα FireWire  Όχι
Θύρα USB  1 x Micro USB
Θύρα eSata  Όχι
Θύρα HDMI  Όχι
Θύρα μικροφώνου  Ενσωματωμένη
Θύρα ακουστικών  Ενσωματωμένη
Ηχείο(α)  1 ηχείο
Αναγνώστης μνήμης  Μονάδα ανάγνωσης καρτών μνήμης
Κάρτες μνήμης  Κάρτα μνήμης microSD
Πρόσθετα χαρακτηριστικά  Όχι
Εγγραφή βίντεο  Μη διαθέσιμη πληροφορία
Πρότυπα βίντεο  WMV, MP4, Flash Video FLV, DivX, XviD, MPEG-4. H.263, H.264
Πρότυπα ήχου  AAC, MP3
Πρότυπα εικόνας  GIF, JPEG, PNG
Πρότυπα κειμένου  TXT, DOC
Αισθητήρας  Αισθητήρας φωτός
Παρεχόμενο λογισμικό  Όχι
Μπαταρία  Li-Po 3500 mAh
Χρόνος λειτουργίας (έως)  8 ώρες
Περιβαλλοντικά πρότυπα  RoHS
Διαστάσεις (ΠxΒxΥ)  12 cm x 1.1 cm x 19.4 cm
Γλώσσα  Αγγλικά
Βάρος  345 g
Χρώμα  Λευκό
Πηγή τροφοδοσίας  AC 110/220 V ( 50/60 Hz )
Σκληρός δίσκος  16GB
[http://www.public.gr/product/tablets/syskeyes-tablet/lenovo-ideatab-a3000-7-3g-leyko/prod4950291pp/?utm_source=Public.gr+Latest+News&utm_campaign=f5bca78d56-New_Tablet_Concept9_10_2013&utm_medium=email&utm_term=0_60275397ff-f5bca78d56-19592797] 2013-09-10

cmr.society.USSR

name::
* McsEngl.cmr.society.USSR@cptIt,

ΕΣΣΔ

Το 85% της υπολογιστικής δύναμης και το 70% της γενικής χρήσης Η/Υ είναι σοβιετικής κατασκευής.
[ΡΙΖ. 25 ΝΟΕΜ. 1987]

cmr.tech.ANALOG

_CREATED: {2012-07-21}

NAME

name::
* McsEngl.cmr.tech.ANALOG@cptIt,
* McsEngl.conceptIt9,
* McsEngl.entity.whole.system.it.hard-soft.computer.analog@cptIt9, {2012-07-21}
* McsEngl.analog-computer@cptIt9, {2012-07-21}

DEFINITION

_DESCRIPTION:
An analog computer is a form of computer that uses the continuously-changeable aspects of physical phenomena such as electrical, mechanical, or hydraulic quantities to model the problem being solved. In contrast, digital computers represent varying quantities incrementally, as their numerical values change.
Mechanical analog computers were very important in gun fire control in World War II, The Korean War and well past the Vietnam War; they were made in significant numbers. The development of transistors made electronic analog computers practical, and until digital computers had developed sufficiently, they continued to be commonly used in science and industry.
Analog computers can have a very wide range of complexity. Slide rules and nomographs are the simplest, while naval gunfire control computers and large hybrid digital/analog computers were among the most complicated.
... Although digital computation is extremely popular, some research in analog computation is still being done. A few universities still use analog computers to teach control system theory. The American company Comdyna manufactures small analog computers.[15] At Indiana University Bloomington, Jonathan Mills has developed the Extended Analog Computer based on sampling voltages in a foam sheet. At the Harvard Robotics Laboratory, analog computation is a research topic. Lyric Semiconductor's error correction circuits use analog probabilistic signals.
[http://en.wikipedia.org/wiki/Analogue_computer] {2012-07-21}

cmr.tech.ANALOG.NO

_CREATED: {2019-07-04}

name::
* McsEngl.cmr.tech.ANALOG.NO@cptIt,
* McsEngl.computer.digital@cptIt,
* McsEngl.digital-computer@cptIt,

cmr.tech.BINARY

name::
* McsEngl.cmr.tech.BINARY@cptIt,
* McsEngl.computer.binary@cptIt,
* McsEngl.binary-computer@cptIt,
* McsEngl.cmrBnr@cptIt,

cmr.tech.TRINARY

name::
* McsEngl.cmr.tech.TRINARY@cptIt,

cmr.tech.CARBON-NANOTUBE

name::
* McsEngl.cmr.tech.CARBON-NANOTUBE@cptIt,

{time.2013-09-26}:
Επεξεργαστής υπολογιστή από νανοσωλήνες άνθρακα
Πέμπτη, 26 Σεπτεμβρίου 2013 11:46 UPD:11:46
STANFORD/NOBERT VON DER GROEBEN
Ο επεξεργαστής αποτελείται από 142 τρανζίστορ, το καθένα εκ των οποίων περιέχει νανοσωλήνες άνθρακα μήκους που κυμαίνεται από 10 έως 200 νανόμετρα.
Έναν υπολογιστή του οποίου ο κεντρικός επεξεργαστής βασίζεται εξολοκλήρου σε νανοσωλήνες άνθρακα κατασκεύασαν ερευνητές του Stanford University. Αν και το σύστημα είναι αργό και απλό όσον αφορά στις επιδόσεις του, η σημασία του εν λόγω επιτεύγματος είναι μεγάλη, καθώς αποδεικνύεται ότι οι νανοσωλήνες άνθρακα – που παρουσιάζουν αξιοσημείωτες ηλεκτρονικές ιδιότητες- θα μπορέσουν να αντικαταστήσουν κάποια στιγμή το πυρίτιο.
Όπως αναφέρει στο ΜΙΤ Technology Review ο Σουμπχασίς Μίτρα, ένας εκ των επικεφαλής του προγράμματος, ο συγκεκριμένος επεξεργαστής είναι δυνατοτήτων ανάλογων του Intel 4004, του πρώτου μικροεπεξεργαστή της εταιρείας, ο οποίος είχε κυκλοφορήσει το 1971. Ο υπολογιστής «τρέχει» ένα απλό σετ οδηγιών λογισμικού, ονόματι MIPS, το οποίο μπορεί να κάνει κάποιες απλές εργασίες (αριθμητικούς υπολογισμούς) και να μεταφέρει δεδομένα από και προς μια εξωτερική μνήμη.
Το paper στο οποίο αναλύεται πλήρως το σύστημα δημοσιεύτηκε στο Nature. Ο επεξεργαστής αποτελείται από 142 τρανζίστορ, το καθένα εκ των οποίων περιέχει νανοσωλήνες άνθρακα μήκους που κυμαίνεται από 10 έως 200 νανόμετρα. Η ομάδα των ερευνητών αναφέρει ότι έχει φτιάξει έξι εκδόσεις υπολογιστών νανοσωλήνων άνθρακα, μεταξύ των οποίων και μία που μπορεί να συνδεθεί με ένα αριθμητικό πληκτρολόγιο.
Όπως έχει αποδειχθεί από ερευνητές του Watson Research Center της ΙΒΜ, υπό τον Άαρον Φράνκλιν, τα τρανζίστορ νανοσωλήνων άνθρακα είναι ταχύτερα και πιο οικονομικά από πλευράς κατανάλωσης ενέργειας σε σχέση με αυτά από άλλα υλικά (περιλαμβανομένου του πυριτίου). Σε θεωρητικό επίπεδο εκτιμάται ότι ένας τέτοιος υπολογιστής θα ήταν πολύ λιγότερο ενεργοβόρος από τους κορυφαίους υπολογιστές πυριτίου, ενώ παράλληλα θα σημείωνε και πολύ χαμηλότερες θερμοκρασίες- κάτι το οποίο σημαίνει ότι θα μπορούσε να «πιάσει» πολύ υψηλές ταχύτητες χωρίς να υπάρχει κίνδυνος υπερθέρμανσης.
Το τέλος της εποχής του πυριτίου για τους ηλεκτρονικούς υπολογιστές είναι κάτι το οποίο συζητείται εδώ και καιρό: τον προηγούμενο μήνα, σε συνδιάσκεψη στο Stanford, ο Ρόμπερτ Κόλγουελ, διευθυντής του τμήματος τεχνολογίας μικροσυστημάτων της DARPA και πρώην στέλεχος της Intel, μίλησε ανοικτά για το τέλος των ηλεκτρονικών πυριτίου, σημειώνοντας ότι κάπου κατά το 2020 η βιομηχανία ηλεκτρονικών υπολογιστών δεν θα είναι σε θέση να συνεχίσει τις βελτιώσεις όσον αφορά στις επιδόσεις και το κόστος των συστημάτων που βασίζονται σε τεχνολογία πυριτίου.

cmr.tech.CLUSTER

_CREATED: {2014-01-18}

name::
* McsEngl.cmr.tech.CLUSTER@cptIt,
* McsEngl.cluster-computer@cptIt,
* McsEngl.cmr.cluster@cptIt,
* McsEngl.computer.cluster@cptIt,

_DESCRIPTION:
A computer cluster consists of a set of loosely connected or tightly connected computers that work together so that in many respects they can be viewed as a single system.

The components of a cluster are usually connected to each other through fast local area networks ("LAN"), with each node (computer used as a server) running its own instance of an operating system. Computer clusters emerged as a result of convergence of a number of computing trends including the availability of low cost microprocessors, high speed networks, and software for high performance distributed computing.

Clusters are usually deployed to improve performance and availability over that of a single computer, while typically being much more cost-effective than single computers of comparable speed or availability.[1]

Computer clusters have a wide range of applicability and deployment, ranging from small business clusters with a handful of nodes to some of the fastest supercomputers in the world such as IBM's Sequoia.[2]
[http://en.wikipedia.org/wiki/Cluster_computing]

cmr.tech.MOLECULE

name::
* McsEngl.cmr.tech.MOLECULE@cptIt,
* McsEngl.conceptIt227.3,
* McsEngl.molecule-computer@cptIt227,

* McsElln.ΜΟΡΙΑΚΟΣ-ΥΠΟΛΟΓΙΣΤΗΣ@cptIt,

Μοριακός υπολογιστής μιμείται τον εγκέφαλο
Τετάρτη 28 Απριλίου 2010
ΝΕΑ ΥΟΡΚΗ Διεθνής ομάδα ερευνητών ανέπτυξε έναν μοριακό υπολογιστή- με πάχος ανάλογο με αυτό δύο μορίων- ο οποίος μπορεί να λύνει πολύπλοκα προβλήματα, αλλά κυρίως μπορεί να εξελίσσεται ώστε να έχει τη δυνατότητα να εκτελεί πολλές λειτουργίες ταυτόχρονα. Επιπλέον ο μοριακός αυτός υπολογιστής μπορεί να επιδιορθώνει μόνος του τις δυσλειτουργίες ή ζημιές που εμφανίζονται. Τον μοριακό υπολογιστή ανέπτυξαν ερευνητές από την Ιαπωνία και τις ΗΠΑ και, όπως αναφέρουν, μιμείται τη λειτουργία του ανθρώπινου εγκεφάλου. Σήμερα έχουμε καταφέρει να κατασκευάσουμε ταχύτατους υπολογιστές που εκτελούν τρισ. υπολογισμούς ανά δευτερόλεπτο, αλλά κατά βάση εκτελούν τις εργασίες διαδοχικά, δηλαδή μία κάθε φορά.

Οι ερευνητές οι οποίοι ανέπτυξαν τον υπολογιστή χρησιμοποίησαν ως δομικό υλικό ένα οργανικό συστατικό, τη δικυανοβενζοκινόνη (DDQ), που μπορεί να μεταβάλλεται ανάμεσα σε τέσσερις διαφορετικές ηλεκτρικά αγώγιμες καταστάσεις. Ο υπολογιστής αποτελείται από 300 μόρια, το καθένα εκ των οποίων μπορεί να επικοινωνεί ασύρματα με τα γειτονικά του μέσω ηλεκτρικών πεδίων και να μεταδίδουν συνεχώς πληροφορίες το ένα στο άλλο σε μια διαδικασία που προσομοιάζει με το δυαδικό σύστημα λειτουργίας των μικροτσίπ.

Θεωρητικώς ο συγκεκριμένος υπολογιστής θα μπορούσε να λύσει προβλήματα που οι συμβατικοί υπολογιστές δεν μπορούν να επιλύσουν, και μάλιστα σε συγκεκριμένο χρόνο. Η ερευνητική ομάδα συνεχίζει την προσπάθειά της, έχοντας βάλει στόχο τη δημιουργία ενός μοριακού υπολογιστή ο οποίος να αποτελείται από 1.000 άτομα.
[http://www.tovima.gr/default.asp?pid=2&ct=33&artId=328502&dt=28/04/2010]

cmr.tech.NEURO

NAME

name::
* McsEngl.cmr.tech.NEURO@cptIt,
* McsEngl.conceptIt479,
* McsEngl.computer.neuro@cptIt479,
* McsEngl.NEUROCOMPUTER@cptIt,
* McsEngl.conceptIt479,
====== lagoGreek:
* McsElln.ΝΕΥΡΩΝΙΚΟΣ-ΥΠΟΛΟΓΙΣΤΗΣ@cptIt,

DEFINITION

Τα νευρωνικά δίκτυα είναι συστήματα επεξεργασίας πληροφοριών, που αποτελούνται από ένα σύνολο απλών, όμοιων βασικών μονάδων, των νευρώνων, διατεταγμένων σε τρείς στρώσεις, που η κάθε μια περιλαμβάνει από έναν ως κάποιες εκατοντάδες νευρώνες.
[ΚΑΘΗΜΕΡΙΝΗ, 21 ΜΑΙΟΥ 1995, 31 Γ. ΡΙΖΟΠΟΥΛΟΣ]

GENERIC

_GENERIC:
* stmIt.computer.machine#cptItsoft227#

SPECIFIC

CRIS:
Τον χρησιμοποιεί η VISA για να εντοπίσει τις ύποπτες κάρτες για κλοπή ή πλαστογραφία.
[ΚΑΘΗΜΕΡΙΝΗ, 21 ΜΑΙΟΥ 1995, 31 Γ. ΡΙΖΟΠΟΥΛΟΣ]

SYNAPSE 1:
Τον παρουσίασε η Siemens Nixdorf στην πρόσφατη έκθεση CeBIT και προβλέπει τις κινήσεις χρηματιστηρίου.
[ΚΑΘΗΜΕΡΙΝΗ, 21 ΜΑΙΟΥ 1995, 31 Γ. ΡΙΖΟΠΟΥΛΟΣ]

cmr.tech.OPTICAL

NAME

name::
* McsEngl.cmr.tech.OPTICAL@cptIt,
* McsEngl.conceptIt314,
* McsEngl.computer.optical@cptIt314,
* McsEngl.OPTICAL'COMPUTER@cptIt314,
* McsEngl.optical-computer@cptIt,
* McsElln.ΟΠΤΙΚΟΣ-ΥΠΟΛΟΓΙΣΤΗΣ@cptIt,

DEFINITION

A university of Colorado (Boulder) research team has built what it believes is the first general-purpose optical computer that stores its machine instructions in optical memory... it is a not marketable product.
[BYTE, MAY 1993, 28]

TO CNN ΕΔΕΙΞΕ ΕΝΑ ΤΕΤΟΙΟ ΜΗΧΑΝΗΜΑ ΣΤΑ ΕΡΓΑΣΤΗΡΙΑ. ΠΡΩΤΕΣ ΕΦΑΡΜΟΓΕΣ ΣΤΙΣ ΤΗΛΕΠΙΚΟΙΝΩΝΙΕΣ. ΣΕ 5 ΧΡΟΝΙΑ ΣΤΗΝ ΑΓΟΡΑ.
[CNN, 20 JUN 1993]

SPEED

Οπως λέει ο ακαδημαιϊκός Γιούρι Γκουλιάεφ αυτοί οι υπολογιστές μπορούν να λειτουργούν με ταχύτητα χιλιάδες φορές μεγαλύτερη απ'ότι οι καλύτεροι σύγχρονοι υπολογιστές. Επίσης οι ακτίνες φωτός δεν επηρεάζουν η μία την άλλη -όπως οι ροές ηλεκτρονίων- και δεν επηρεάζονται από παρεμβολές. Οι "οπτικοί υπολογιστές" όπως ονομάστηκαν, ανοίγουν προοπτικές για τη δημιουργία υπολογιστικών μηχανών που δεν θα επεξάργονται τις πληροφορίες βήμα-βήμα, όπως οι σημερινοί Η/Υ, αλλά παράλληλα, αυξάνοντας κατακόρυφα την ταχύτητα.
[ΡΙΖΟΣΠΑΣΤΗΣ, 25 ΟΚΤ 1987]

SPECIFIC

ΕΣΣΔ

Σε μια άλλη πολύ σοβαρή τεχνολογική εξέλιξη, Σοβιετικοί επιστήμονες ΕΧΟΥΝ ΗΔΗ ΚΑΤΑΣΚΕΥΑΣΕΙ σε πειραματικό στάδιο λειτουργικά μοντέλα μιας νέας γενιας Η/Υ που λειτουργεί με ακτίνες φωτός αντί για ροή ηλεκτρονίων (ηλεκτρικό ρεύμα).
[ΡΙΖΟΣΠΑΣΤΗΣ, 25 ΟΚΤ 1987]

cmr.tech.QUANTUM (cmrQtm)

name::
* McsEngl.cmr.tech.QUANTUM (cmrQtm)@cptIt,
* McsEngl.cmrQuantum@cptIt,
* McsEngl.cmr.quantum@cptIt,
* McsEngl.computer.quantum@cptIt227i,
* McsEngl.quantum-computer@cptIt227i,

* McsEngl.cmrQtm@cptIt,
* McsEngl.qcmr@cptIt, {2015-06-21}
====== lagoGreek:
* McsElln.κβαντουπολογιστης@cptIt227i,

_DESCRIPTION:
A quantum computer is a device for computation that makes direct use of quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data. Quantum computers are different from digital computers based on transistors. Whereas digital computers require data to be encoded into binary digits (bits), quantum computation utilizes quantum properties to represent data and perform operations on these data.[1] A theoretical model is the quantum Turing machine, also known as the universal quantum computer. Quantum computers share theoretical similarities with non-deterministic and probabilistic computers, like the ability to be in more than one state simultaneously. The field of quantum computing was first introduced by Richard Feynman in 1982.[2]

Although quantum computing is still in its infancy, experiments have been carried out in which quantum computational operations were executed on a very small number of qubits (quantum bits). Both practical and theoretical research continues, and many national government and military funding agencies support quantum computing research to develop quantum computers for both civilian and national security purposes, such as cryptanalysis.[3]

Large-scale quantum computers could be able to solve certain problems much faster than any classical computer by using the best currently known algorithms, like integer factorization using Shor's algorithm or the simulation of quantum many-body systems. There exist quantum algorithms, such as Simon's algorithm, which run faster than any possible probabilistic classical algorithm.[4] Given unlimited resources, a classical computer can simulate an arbitrary quantum algorithm so quantum computation does not violate the Church–Turing thesis.[5] However, in practice infinite resources are never available and the computational basis of 500 qubits, for example, would already be too large to be represented on a classical computer because it would require 2500 complex values to be stored.[6] (For comparison, a terabyte of digital information stores only 243 discrete on/off values) Nielsen and Chuang point out that "Trying to store all these complex numbers would not be possible on any conceivable classical computer." [6]
[http://en.wikipedia.org/wiki/Quantum_computing]
===
Με σάρκα και οστά πλέον ο κβάντο-υπολογιστής
ΑΘΗΝΑ 05/09/2009

Ερευνητές δημιούργησαν ένα μικροσκοπικό υπολογιστή που χρησιμοποιεί φωτόνια για να εκτελεί τον αλγόριθμο του Shor -μια γνωστή μέθοδο της κβαντομηχανικής- και να λύνει ένα μαθηματικό πρόβλημα.

Ο αλγόριθμος υπολογίζει τους δύο αριθμούς των οποίων το γινόμενο δίνει ένα συγκεκριμένο αριθμό. Αν και απλό πρόβλημα, η λύση του απαιτούσε τεράστιους οπτικούς υπολογιστές. Η νέα τεχνολογία όμως το συρρίκνωσε σε τσιπ στο μέγεθος ενός νομίσματος.

Η συγκεκριμένη έρευνα θα επιτρέψει την δημιουργία οπτικών υπολογιστών που μπορούν να πραγματοποιούν υπολογισμούς με ταχύτητα πολύ μεγαλύτερη από τους "παραδοσιακούς" υπολογιστές με τα τσίπ σιλικόνης. Πρώτη εφαρμογή θεωρούνται η αλγόριθμοι κρυπτογραφίας για την ασφάλεια των συναλλαγών μας.
[http://www.nooz.gr/page.ashx?pid=9&aid=316385&cid=185] 2009-09-26

The researchers, from Xerox Corp., the University of Barcelona in Spain and the City College of New York, plan to announce the creation of a microscopic magnet, one molecule in size, derived from a special combination of manganese, oxygen, carbon and hydrogen.

The behavior of the material also holds out the more remarkable possibility that the new molecule might one day become the basic building block underlying an approach to computing known as quantum computing, which until now has been discussed only in theoretical terms.

While today's digital computers are based on systems composed of millions of switches capable only of being in "on" and "off" states, scientists have since the early 1980s speculated about a new kind of computing based on a radically different kind of physics derived from the world of quantum mechanics.

Used to describe interactions in the microscopic world of atomic structures, quantum physics might one day help create a computer in which a single atom switching between many different quantum states could simultaneously perform different operations, thereby speeding up computations to a hitherto unthinkable scale.
[N.Y. Times News Service Jan 27, 1997]

cmrQtm'quantum-algorithm

name::
* McsEngl.cmrQtm'quantum-algorithm@cptIt,

cmrQtm'quantum-information

name::
* McsEngl.cmrQtm'quantum-information@cptIt,

cmrQtm'qubit

name::
* McsEngl.cmrQtm'qubit@cptIt,
* McsEngl.qubit@cptIt,

_DESCRIPTION:
As with a classical bit, the term qubit is used, slightly confusingly, to refer both to the mathematical value recorded and the element of the computer doing the recording. Quantum uncertainty means that, until it is examined, the value of a qubit can be described only in terms of probability. Its possible states, zero and one, are, in the jargon, superposed—meaning that to some degree the qubit is in one of these states, and to some degree it is in the other. Those superposed probabilities can, moreover, rise and fall with time.
[http://www.economist.com/news/science-and-technology/21654566-after-decades-languishing-laboratory-quantum-computers-are-attracting]

_ADDRESS.WPG:
* https://docs.microsoft.com/en-us/quantum/quantum-concepts-4-qubit?view=qsharp-preview,

cmrQtm'superposition

name::
* McsEngl.cmrQtm'superposition@cptIt,
* McsEngl.cmrQtm'superposition@cptIt,

_DESCRIPTION:
"“Superposition,” a related concept, is the other key to quantum computing.
Whereas bits, the building blocks of classical computing, are limited to representing information as “zeroes” and “ones,” qubits can assume any combination of gradations between zero and one.
Think of this as the difference between a coin at rest on a table, displaying heads or tails, vs. one spinning, ballerina-like, on its edge. The result: Superposition allows qubits to store vast amounts of data compared with regular bits."
[https://fortune.com/longform/business-quantum-computing/ {2019-05-21}]

cmrQtm'resource

name::
* McsEngl.cmrQtm'resource@cptIt,

_ADDRESS.WPG:
* https://fortune.com/2019/09/20/google-claims-quantum-supremacy/,
* {2019-05-21} Robert-Hackett, Business Bets on a Quantum Leap, https://fortune.com/longform/business-quantum-computing/,
* https://blogs.microsoft.com/ai/2017/12/11/future-quantum-microsoft-releases-free-preview-quantum-development-kit/,
* {2017-12-16} https://cointelegraph.com/news/breaking-researchers-reveal-first-ever-complete-quantum-chip-architecture,
* {2017-09-06} on silicon: http://www.reuters.com/article/us-australia-computing-quantum/australia-researchers-say-find-new-way-to-build-quantum-computers-idUSKCN1BH13X?,
* https://www.quora.com/What-are-some-good-books-for-learning-quantum-computation,
* https://www.weforum.org/agenda/2016/05/have-you-ever-wanted-to-try-a-quantum-computer-now-you-can//
* https://www.weforum.org/agenda/2016/04/could-this-make-building-quantum-computers-much-easier//
* http://www.economist.com/news/science-and-technology/21654566-after-decades-languishing-laboratory-quantum-computers-are-attracting,

cmrQtm'EVOLUTING

name::
* McsEngl.cmrQtm'EVOLUTING@cptIt,

{time.1995}::
=== RSA-encryption:
"In 1995, Peter Shor, a mathematician then at Bell Labs in New Jersey, proved that a fully functional quantum computer could do something remarkable: It could crack RSA encryption, a popular means of securing private communications. He showed that his quantum algorithm could do in minutes what might take a regular computer the lifetime of the universe to unravel. A year later, Lov Grover, also a Bell Labs scientist, came up with a quantum algorithm that would allow people to swiftly search unstructured databases. Scientists piled into the field, and advances in hardware soon followed the breakthroughs in code."
[https://fortune.com/longform/business-quantum-computing/]

{time.1980s}:
=== quantum-computer-proposal::
Quantum computers were proposed in the 1980s by Richard Feynman and Yuri Manin.
[https://docs.microsoft.com/en-us/quantum/quantum-concepts-1-intro?view=qsharp-preview]

{time.1900-1925}:
=== quantum-mechanis::
quantum mechanics was developed between 1900 and 1925
[https://docs.microsoft.com/en-us/quantum/quantum-concepts-1-intro?view=qsharp-preview]

cmrQtm.SPECIFIC

name::
* McsEngl.cmrQtm.SPECIFIC@cptIt,

_SPECIFIC:
* "The ion-trap method is only one of more than half a dozen approaches to quantum computing
...
7 ways to win the quantum race
There are multiple ways that quantum computing could work. Here’s a guide to which companies are backing which tech.

Superconducting uses an electrical current, flowing through special semiconductor chips cooled to near absolute zero, to produce computational “qubits.” Google, IBM, and Intel are pursuing this approach, which has so far been the front-runner.

Ion trap relies on charged atoms that are manipulated by lasers in a vacuum, which helps to reduce noisy interference that can contribute to errors. Industrial giant Honeywell is betting on this technique. So is IonQ, a startup with backing from Alphabet.

Neutral Atom Similar to the ion-trap method, except it uses, you guessed it, neutral atoms. Physicist Mikhail Lukin’s lab at Harvard is a pioneer.

Annealing designed to find the lowest-energy (and therefore speediest) solutions to math problems. Canadian firm D-Wave has sold multimillion-dollar machines based on the idea to Google and NASA. They’re fast, but skeptics question whether they qualify as “quantum.”

Silicon spin uses single electrons trapped in transistors. Intel is hedging its bets between the more mature superconducting qubits and this younger, equally semiconductor-friendly method.

Topological uses exotic, highly stable quasi-particles called “anyons.” Microsoft deems this unproven moonshot as the best candidate in the long run, though the company has yet to produce a single one.

Photonics uses light particles sent through special silicon chips. The particles interact with one another very little (good), but can scatter and disappear (bad). Three-year-old stealth startup Psi Quantum is tinkering away on this idea."
[https://fortune.com/longform/business-quantum-computing/ {2019-01-09}]

cmr.EVOLUTING

name::
* McsEngl.cmr.EVOLUTING@cptIt,

_ADDRESS.WPG:
* http://www.lifo.gr/articles/technology_articles/92547,

{time.1997}:
=== 1997may11: Deep Blue humbles chess master:
The supercomputer makes history by defeating Garry Kasparov, the first time a computer has beaten a reigning world chess champion.
[c/net May 11, 5:20 p.m. PT]

{time.1992}:
=== NOV: 64Bit ALPHA.
H DEC ΠΑΡΟΥΣΙΑΣΕ ΤΑ ΠΡΩΤΑ ΣΥΣΤΗΜΑΤΑ ΜΕ ΤΟΝ 64ΒΙΤ RISC MICROPROCESSOR

{time.1990}:
=== RISC System 6000:
H IBM ΜΕ ΑΥΤΑ ΤΑ ΜΗΧΑΝΗΜΑΤΑ ΘΕΤΕΙ ΝΕΑ ΠΡΟΤΥΠΑ ΣΤΟ ΧΩΡΟ ΤΩΝ ΣΤΑΘΜΩΝ ΕΡΓΑΣΙΑΣ ΓΙΑ ΤΕΧΝΙΚΕΣ ΕΦΑΡΜΟΓΕΣ.
[COMPUTER GO, MAY 1993, 122]

{time.1984}:
=== MACINTOCH:
Introduced. It used a user friedly operating system

{time.1982}:
=== PORTABLE:
ΣΤΙΣ 17 ΑΠΡΙΛΙΟΥ Ο David Kline ΜΕΤΕΔΩΣΕ ΑΠΟ ΤΟ ΑΦΓΑΝΙΣΤΑΝ ΜΕ MODEM, ΤΟ ΥΛΙΚΟ ΠΟΥ ΕΙΧΕ ΣΥΓΚΕΝΤΡΩΣΕΙ ΣΤΟ ΦΟΡΗΤΟ ΤΟΥ, Osborne 1, 2 ΒΔΟΜΑΔΕΣ ΣΤΑ ΒΟΥΝΑ ΜΕ ΤΟΥΣ ΑΝΤΑΡΤΕΣ. ΕΓΙΝΕ Ο ΠΡΩΤΟΣ ΑΝΘΡΩΠΟΣ ΠΟΥ ΧΡΗΣΙΜΟΠΟΙΗΣΕ ΕΝΑ ΦΟΡΗΤΟ ΜΙΚΡΟΥΠΟΛΟΓΙΣΤΗ ΓΙΑ ΜΙΑ ΤΕΤΙΑ ΔΟΥΛΕΙΑ.
[COMPUTER ΓΟ, ΜΑΡΤ 1993, 18]

{time.1981}:
=== ΙΒΜ/PC:
Πρωτος Μ/Υ που διεδωσε το 16bit στην υπολογιστικη των επιχειρησεων.
[JARRET, 1987, 80#cptResource117]
ΕΙΧΕ ΤΟ CHIP i8088 ΜΕ 8bit data bus.

{time.1970}:
=== DEC: PDP-11:
Introduced its new PDP-11 computer.

{time.1969}:
=== THE SMALLEST COMPUTER
were built with integrated circuits for the moon mission. [video]
===
How Much Computing Power Was Used For the Apollo 11 Moon Landing?
Today’s pocket calculator has more computing power than the computers used for the Apollo 11 Moon landing.
The amount of computing power used for the Apollo 11 moon landing on 20
July 1969 was 0.043 MHz, or less than that of a pocket calculator, a thumb
drive or even a modern toaster. A computer system known as the Apollo
Guidance Computer (AGC) was created at the Massachusetts Institute of
Technology and allowed the astronauts to control the spacecraft by typing
simple commands of nouns and verbs. Astronauts Neil Armstrong and Buzz
Aldrin were able to land on the moon because of the AGC’s ability to
navigate distance of about 221,208 miles (356,000 km).
Read More: http://www.wisegeek.com/how-much-computing-power-was-used-for-the-apollo-11-moon-landing.htm?m, {2014-04-13}

{time.1965}:
=== ΜΙΝΙCOMPUTER.
Ο πρωτος εμφανιζεται στην αγορα. Ειναι ο PDP-8 της DEC.
[ΘΕΟΔΩΡΟΥ,Γ.Β.. ΥΠΟΛΟΓΙΣΤΕΣ. ΑΘΗΝΑ 1986, 18]

{time.1964}:
=== IBM-360:
Ριχνει στην αγορα τον εκπληκτικα πετυχημενο 360.
[JARRET, 1987, 145#cptResource117]

{time.1959}:
=== PDP-1.
Ηταν ο πρώτος μινιυπολογιστης της DEC. Μια βασικη καινοτομια του ήταν η ενσωματωμένη οθόνη στο συστημα.

{time.1954}:
=== IBM 650.
It sold 1000 computers.
[video]

{time.1953}:
=== UNIVAC.
3 were installed.
[video]

=== IBM 650.
Its first computer. Less powerfull than univac but better suitable to old equipment and with better sellforce.
[video]

{time.1951}:
=== LEO.
The british company Lyons completed its first computer for business use.
[video]

=== UNIVAC:
Σχεδιάστηκε απο τους Eckert & Mauchly για τη στατιστική υπηρεσία των ΗΠΑ. Είναι ο πρώτος εμπορικός υπολογιστής που εφάρμοσε το σύστημα της τράπεζας πληροφοριών.
[ΔΗΜΗΤΡΙΟΥ 5, 1986, 266#cptResource168]

{time.1950}:
=== ΕΣΣΔ-ΜΕΣΜ:
Στην Ακαδημία επιστημών της Ουκρανίας υπο την καθοδήγηση του Σ. Α. Λέμπεντεφ, κατασκευάστηκε η πρώτη ηλεκτρονική υπολογιστική μηχανή.
[Ριμπνικοφ, 93]

{time.1949}:
=== EDSAC:
Electronic Delay Storage Automatic Calculator (EDSAC) was an early British computer (one of the first computers to be created). The machine, having been inspired by John von Neumann's seminal EDVAC report, was constructed by Professor Sir Maurice Wilkes and his team at the University of Cambridge Mathematical Laboratory in England.
EDSAC was the world's first practical stored program electronic computer, although not the first stored program computer (that honor goes to the Small-Scale Experimental Machine).
The project was supported by J. Lyons & Co. Ltd., a British firm, who were rewarded with the first commercially applied computer, LEO I, based on the EDSAC design. EDSAC ran its first programs on 1949-05-06, calculating a table of squares[1] and a list of prime numbers.
[http://en.wikipedia.org/wiki/EDSAC]

{time.1948}:
=== FIRST STORED PROGRAMEBLE COMPUTER.
Was built by Fredy Williams, UK.
[video]

{time.1946}:
=== ENIAC {Electronic Numerical Integrator and Calculator}.
Η κατασκευή του άρχισε το 1943. Θα χρησιμοποιούσε αποκλειστικά ηλεκτρονικά κυκλώματα. Ηταν το πιο μεγάλο και πιο πολύπλοκο μηχάνημα στον κόσμο. Κυριώτερο μειονέκτημα ο μεγάλος χρόνος για την εκτέλεση καινούργιου προγράμματος.
[ΑΛΕΞΑΝΔΡΙΔΗΣ Η/Υ, 1979, 21]

Κατασκευάστηκε από τους John Mauchly and Presper Eckart του πανεπιστημίου της Pennsylvania. Είχε βάρος 30 τόνους και ήταν 2000 φορές ταχύτερος απο τον Mark I. Ηταν ο πρώτος πραγματικά ηλεκτρονικός υπολογιστής.
[Ευκλείδης α, 4 1985]

It cost $3 million in 1992 dollars.
It made 5000 additions per sec.
[video]

έφτασε τις 300 πράξεις το 1 δευτ.
[ΔΗΜΗΤΡΙΟΥ 5, 1986, 185#cptResource168]

{time.1944}:
=== ΜΑRK-1:
Ολοκληρώθηκε η κατασκευή του που ειχε αρχισει το 1939 σε συνεργασια με IBM. Ηταν ηλεκτρομηχανικος υπολογιστης, δηλαδη δεν περιείχε ηλεκτρονικα κυκλωματα...
Η προσθεση ή αφαιρεση δυο αριθμων εκτελειτο σε 0,3 δευτ., ενω ο πολ/μος ή διαίρεση σε 4 ή 10 δευτ αντιστοιχως.
[ΑΛΕΞΑΝΔΡΙΔΗΣ Η/Υ, 1979, 19]

Τον κατασκεύασε ο Howard Aiken του πανεπιστημιου του Harward.
[EME]

{time.1943}:
=== COLOSSUS:
** During World War II a team of scientists and mathematicians, working at Bletchley Park, north of London, created one of the first all-electronic digital computers: Colossus. By December 1943, Colossus, which incorporated 1,500 vacuum tubes, was operational. It was used by the team headed by Alan Turing, in the largely successful attempt to crack enciphered German radio messages.
"Computer," Microsoft(R) Encarta(R) 97 Encyclopedia. (c) 1993-1996 Microsoft Corporation. All rights reserved.
** A code braking machine operated in UK. It was the first computer used not for computations.
[video]

{time.1941}:
=== ZUSE:
The German K. Zuse completed a programmable general purpose computer. It used electrical relays and the binary arithmetic system.
2-3 sec was the time for a multiplication.
[video]

{time.1939}:
=== ABC:
Independently of this, in the United States, a prototype electronic machine had been built as early as 1939, by John Atanasoff and Clifford Berry at Iowa State College. This prototype and later research was completed quietly and later overshadowed by the development of the Electronic Numerical Integrator And Computer (ENIAC) in 1945. ENIAC was granted a patent, which was overturned decades later, in 1973, when the machine was revealed to be highly derivative of the Atanasoff-Berry Computer (ABC).
"Computer," Microsoft(R) Encarta(R) 97 Encyclopedia. (c) 1993-1996 Microsoft Corporation. All rights reserved.

1890: ΕΠΕΞΕΡΓΑΣΙΑ ΠΛΗΡΟΦΟΡΙΩΝ ΣΕ ΔΙΑΤΡΗΤΑ ΔΕΛΤΙΑ:
Ο αμερικανός στατιστικολόγος H. Hollrith σχεδίασε μια μηχανή που επεξεργαζόταν στοιχεία που βρίσκονταν πάνω σε διάτρητα δελτία. Με τη μηχανή του όλα τα στοιχεία της απογραφής του 1890 τελείωσαν σε 3 χρόνια με πληθυσμό 63 εκατ. Η απογραφή του 1880 με πληθυσμό 50 εκατ. χρειάστηκε 7 χρόνια.
[ΒΑΤΙΚΙΩΤΗΣ, 27#cptResource709]

1851-1900: ΑΡΙΘΜΟΜΗΧΑΝΕΣ:
Γίνεται μια σειρά βελτιώσεών τους.
- 1850 η μηχανή του D. D. Parmalee.
- 1868 η αθροιστική μηχανή του Webb.
- 1879 ο λογαριθμικός κανόνας του Fuller,
- 1885 η υπολογιστική μηχανή πολλαπλών πλήκτρων του D. E. Felt και τέλος
- 1890 η αθροιστική επιτραπέζια αριθμομηχανή του W W Burroughs που αποτέλεσε την αρχή της βιομηχανίας κατασκευής επιτραπέζιων αριθμομηχανών το 1914.
- 1891 ΗΛΕΚΤΡΟΜΗΧΑΝΙΚΗ ΥΠΟΛΟΓΙΣΤΙΚΗ ΜΗΧΑΝΗ:
Ο Herman Hollerith κατασκεύασε την πρώτη ηλεκτρομηχανικη υπολογιστικη μηχανη. Η αρχη της βιομηχανικης επεξεργασιας δεδομενων ηταν πλεον γεγονος.
[ΑΛΕΞΑΝΔΡΙΔΗΣ Η/Υ, 1979, 18]

1834-35: BABBAGE ΑΝΑΛΥΤΙΚΗ ΜΗΧΑΝΗ:
Ο Αγγλος καθητητης του Cambridge, Ch. Baggage, σχεδίασε την "αναλυτική μηχανή", συνδυασμός της αριθμομηχανής του Pascal και της διάτρητης κάρτας του Falcon, που είναι πρόδρομος των σημερινών ψηφιακών υπολογιστών.
[ΔΗΜΗΤΡΙΟΥ 5, 1986, 180#cptResource168]

1820: ΑΡΙΘΜΟΜΗΧΑΝΗ:
Ο αγγλος Thomas κατασκεύασε τη μηχανή του Pascal σε μεγάλες ποσότητες.
[ΔΗΜΗΤΡΙΟΥ 5, 1986, 185#cptResource168]
o Charles Thomas κατασκεύασε την πρώτη μηχανή που εκτελούσε ικανοποιητικά και τις 4 πράξεις. Ονομάστηκε Αριθμόμετρο.
[ΑΛΕΞΑΝΔΡΙΔΗΣ Η/Υ, 1979, 14]

1673 LEIBNIZ
Eπινοει μηχανη, που κατασκεύασε στα 1770 ο Hann και εκτελουσε και τις 4 αριθμητικες πράξεις.
[ΔΗΜΗΤΡΙΟΥ 5, 1986, 184#cptResource168]

1642 PASCAL
επινοει την πρωτη υπολογιστικη μηχανη.
[ΔΗΜΗΤΡΙΟΥ 5, 1986, 184#cptResource168]

-3000: ΑΒΑΚΙΟ
H kατασκευή του αναγεται στην Κινα. Αποτελει την πρωτη τεχνοσυσκευή της πληροφορικης.
[ΔΗΜΗΤΡΙΟΥ-5, 1986, 53#cptResource168]

cmr'FORCAST#cptCore395#

name::
* McsEngl.cmr'FORCAST@cptIt,

ΠΑΓΚΟΣΜΙΟΤΗΤΑ ΤΩΝ ΥΠΟΛΟΓΙΣΤΩΝ:
Μια από τις πολύ μεγάλες υποσχέσεις της τεχνολογίας των υπολογιστών είναι ότι θα καταργήσουν τους φραγμούς της γλώσσας στην επικοινωνία των ανθρώπων μεταξύ τους. όπως και στην εργασία τους με τον υπολογιστή, στην αναζήτηση στοιχείων και γενικά στην πρόσληψη των πληροφοριών. Και όταν λέμε 'κατάργηση των φραγμών της γλώσσας' δεν εννοούμε να δουλεύει όλος ο κόσμος στα αγγλικά, όπως μπορεί να γίνεται σήμερα για μια μικρή ελίτ μορφωμένων κατοίκων του πλανήτη. Οι φραγμοί θα πέφτουν πραγματικά όταν οι υπολογιστές θα 'ΜΙΛΑΝΕ' όλες τις γλώσσες του κόσμου.
... αυτό αντιληφθήκαμε από μια πρόσφατη επίσκεψη στη Microsoft... είδαμε ένα κλιμακωτό σενάρια εξέλιξης των προγραμμάτων της το οποίο στο τέλος καταλήγει στην πλήρη επικοινωνία με τη μηχανή μέσω της γλώσσας που μιλάμε καθημερινά.
Το ευχάριστο είναι ότι από την αρχή του το σχέδιο αντιμετωπίζει ΟΛΕΣ τις γλώσσες του πλανήτη...
Η λογική που ακολουθεί η έρευνα είναι ΑΠΛΗ αλλά και θαυμαστή: αν μπορέσουμε να φτιάξουμε ένα σύνολο καθαρών ΕΝΝΟΙΩΝ και σχέσεων, θα έχουμε μέσα στον υπολογιστή μας μια καθαρή κατανόηση της ομιλίας μας. Μιλώντας για έννοιες και σχέσεις, και όχι για ΛΕΞΕΙΣ, καταργούμε τη γλώσσα: πχ η φράση "το παιδί παίζει" περνάει στον υπολογιστή σαν μια ΕΝΝΟΙΑ, του παιδιού, που κάνει μια ενέργεια, παίζει...
Νωρίτερα ή αργότερα λοιπόν η παγκοσμιότητα των υπολογιστών θα γίνει απτή πραγματικότητα.
[ΒΗΜΑ, 1997μαιο11, Θ. ΣΠΙΝΟΥΛΑΣ]

cmr.time.1951.MESM

name::
* McsEngl.cmr.time.1951.MESM@cptIt,
* McsEngl.computer.MESM@cptIt,
* McsEngl.MESM-computer@cptIt,

_DESCRIPTION:
The third stored-program computer to be built, and the first one in continental Europe, was the MESM, completed in the Soviet Union in 1951.
[https://en.wikipedia.org/wiki/Stored-program_computer]

cmr.time.1949.05.EDSAC

name::
* McsEngl.cmr.time.1949.05.EDSAC@cptIt,
* McsEngl.computer.EDSAC@cptIt,
* McsEngl.EDSAC@cptIt,

_DESCRIPTION:
On 6 May 1949 the EDSAC in Cambridge ran its first program, making it arguably "the first complete and fully operational regular electronic digital stored-program computer".
[https://en.wikipedia.org/wiki/Stored-program_computer]
===
Επιχείρηση επανεκκίνησης του υπολογιστή EDSAC ηλικίας 65 ετών
BY GEORGE POLYZOS • ON 28-11-2014 • AT 5:50 PM

Στη Βρετανία το Εθνικό Μουσείο Υπολογιστών πέτυχε την επιτυχή διαδικασία επανεκκίνησης του υπολογιστή EDSAC που τέθηκε για πρώτη φορά σε λειτουργία το 1949.

Ο Electronic Delay Storage Automatic Calculator (EDSAC) κατέχει ιδιαίτερη θέση στην ιστορία των υπολογιστών αφού στη σχεδίασή του βασίστηκε ο LEO, ένας βρετανικός επιχειρηματικός υπολογιστής αντίστοιχος του S/360 της αμερικανικής IBM.

Αρχική αποστολή του EDSAC ήταν η παροχή «βοήθειας» σε επιστημονικό και ερευνητικό προσωπικό, ενώ σύμφωνα με το The Register, η υπολογιστική του ικανότητα βοήθησε στην κατάκτηση ενός τουλάχιστον Βραβείου Νομπέλ.

Φυσικά, τα τεχνικά του χαρακτηριστικά δεν μπορούν να συγκριθούν ούτε στο ελάχιστο με τα σημερινά δεδομένα: λειτουργούσε στα 500 KHz, διέθετε μνήμη 2 KB και μπορούσε να επεξεργαστεί 650 εντολές ανά δευτερόλεπτο. Αξίζει να σημειωθεί ότι τον ρόλο των μνημών είχαν στήλες υδραργύρου…

Παρά τα «αδύναμα» τεχνικά του χαρακτηριστικά διέθετε εξαιρετικό εκτόπισμα αφού είχε ύψος άνω των δύο μέτρων και κατελάμβανε έκταση περίπου 20 τετραγωνικών μέτρων. Η μερική αποκατάσταση του μουσειακού εκθέματος και η επίτευξη της επανεκκίνησής του απαίτησε εργασία δύο χρόνων και την εθελοντική εργασία είκοσι τεχνικών. Για την πλήρη και λειτουργική αποκατάστασή του θα απαιτηθεί εργασία τουλάχιστον ενός ακόμη χρόνου.
[http://www.pestaola.gr/epixeirisi-epanekkinisi-tou-ypologisti-edsac-ilikias-65-etwn/]

cmr.time.1948.06.SSEM

name::
* McsEngl.cmr.time.1948.06.SSEM@cptIt,
* McsEngl.computer.SSEM@cptIt,
* McsEngl.SSEM@cptIt,

_DESCRIPTION:
The University of Manchester's Small-Scale Experimental Machine (SSEM)[15] is generally recognized as world's first electronic computer that ran a stored program—an event that occurred on 21 June 1948.[16][17] However the SSEM was not regarded as a full-fledged computer, but more a proof of concept predecessor to the Manchester Mark 1 computer, which was first put to research work in April 1949.
[https://en.wikipedia.org/wiki/Stored-program_computer]

cmr.time.1949.04.MARK-1

name::
* McsEngl.cmr.time.1949.04.MARK-1@cptIt,
* McsEngl.computer.MARK1@cptIt,
* McsEngl.MARK1@cptIt,

_DESCRIPTION:
The University of Manchester's Small-Scale Experimental Machine (SSEM)[15] is generally recognized as world's first electronic computer that ran a stored program—an event that occurred on 21 June 1948.[16][17] However the SSEM was not regarded as a full-fledged computer, but more a proof of concept predecessor to the Manchester Mark 1 computer, which was first put to research work in April 1949.
[https://en.wikipedia.org/wiki/Stored-program_computer]

cmr.time.1946.ENIAC

name::
* McsEngl.cmr.time.1946.ENIAC@cptIt,
* McsEngl.computer.ENIAC@cptIt,
* McsEngl.ENIAC@cptIt,

_DESCRIPTION:
ENIAC COMPUTER:
It cost $3 million in 1992 dollars.
It made 5000 additions per sec.
[video]

cmr.time.1943.COLOSSUS

name::
* McsEngl.cmr.time.1943.COLOSSUS@cptIt,
* McsEngl.computer.colossus@cptIt,
* McsEngl.colossus-computer@cptIt,

_DESCRIPTION:
Others cite the programmable British Colossus computer which was demonstrated to be working on December 8, 1943.
[https://en.wikipedia.org/wiki/Atanasoff%E2%80%93Berry_computer]

cmr.time.1942.ATANASOFF-BERRY

name::
* McsEngl.cmr.time.1942.ATANASOFF-BERRY@cptIt,
* McsEngl.computer.atanasoff-berry@cptIt,
* McsEngl.atanasoff-berry-computer@cptIt,

_DESCRIPTION:
The Atanasoff–Berry computer (ABC) was the first automatic electronic digital computer, an early electronic digital computing device that has remained somewhat obscure. The ABC's priority is debated among historians of computer technology, because it was not programmable, nor Turing-complete.[1] Many credit John Mauchly and J. Presper Eckert, creators of the ENIAC,[2] which came into use in July 1946, with the title. Others cite the programmable British Colossus computer which was demonstrated to be working on December 8, 1943.
Some historians argue that the credit undisputedly belongs to Iowa State mathematics and physics professor John Vincent Atanasoff for his work with the ABC, with the help of graduate student Clifford Berry.[3] Conceived in 1937, the machine was not programmable, being designed only to solve systems of linear equations. It was successfully tested in 1942. However, its intermediate result storage mechanism, a paper card writer/reader, was unreliable, and when John Vincent Atanasoff left Iowa State College for World War II assignments, work on the machine was discontinued.[4] The ABC pioneered important elements of modern computing, including binary arithmetic and electronic switching elements,[5] but its special-purpose nature and lack of a changeable, stored program distinguish it from modern computers. The computer was designated an IEEE Milestone in 1990.[6]
Atanasoff and Berry's computer work was not widely known until it was rediscovered in the 1960s, amidst conflicting claims about the first instance of an electronic computer. At that time, the ENIAC was considered to be the first computer in the modern sense, but in 1973 a U.S. District Court invalidated the ENIAC patent and concluded that the ENIAC inventors had derived the subject matter of the electronic digital computer from Atanasoff (see Patent dispute).
[https://en.wikipedia.org/wiki/Atanasoff%E2%80%93Berry_computer]

cmr.evoluting.Generation5 (1985-?)

name::
* McsEngl.cmr.evoluting.Generation5 (1985-?)@cptIt,
* McsEngl.conceptIt227.8,

1985:
Οι σοβιετικοί επιστήμονες ανήγγειλαν την έναρξή της.
[ΔΗΜΗΤΡΙΟΥ-5, 1986, 85#cptResource168]

cmr.evoluting.Generation4 (1966-1970)

name::
* McsEngl.cmr.evoluting.Generation4 (1966-1970)@cptIt,
* McsEngl.conceptIt227.7,

1966-1970:
Ανακαλύπτονται τα microprocessors, ολοκληρωμένοι υπολογιστές σε ένα ολοκληρωμένο κύκλωμα. Παραπέρα σμίκρυνση όγκου, αύξηση της ταχύτητας και της χωρητικότητας.
[ΕΜΕ 1984, 24]

1974- :
Χαρακτηρίζεται από τα κυκλώματα με ολοκλήρωση μεγάλου βαθμού, απο την εκτεταμένη χρήση της ανίχνευσης λάθους, από την οργάνωση δικτών υπολογιστών κι από την ανάπτυξη των μικροϋπολογιστών... Μπορούν να εκτελούν εκατοντάδες εκατομύρια πράξεις στο λεπτό κι έχουν "εργαζόμενη μνήμη" με 108 bits.
[ΔΗΜΗΤΡΙΟΥ-5, 1986, 85#cptResource168]

cmr.evoluting.Generation3 (1959-1965)

name::
* McsEngl.cmr.evoluting.Generation3 (1959-1965)@cptIt,
* McsEngl.conceptIt227.6,

1959-1965:
Χρησιμοποιούν ολοκληρωμένα κυκλώματα. Σμίκρυνση όγκου. Αναπτύσσονται γλώσσες προγραμματισμού. Χρήση Terminals.
[ΕΜΕ 1984, 24]

1964-1974:
Η τρίτη γενια χαρακτηρίζεται απο τη χρήση γλώσσας ανώτερης στάθμης, τα ολοκληρωμένα κυκλώματα, την τεχνολογία πυριτίου στα τρανζίστορς και την προσθήκη περιφερειακών εξαρτημάτων: εκτυπωτή, γραφομηχανής, διατρητή, δίσκου αρχείων κλπ.
[ΔΗΜΗΤΡΙΟΥ-5, 1986, 85#cptResource168]

cmr.evoluting.Generation2 (1947-1959)

name::
* McsEngl.cmr.evoluting.Generation2 (1947-1959)@cptIt,
* McsEngl.conceptIt227.5,

1947-1959:
Χρησιμοποιούσαν τρανζίστορς. Κατασκευάστηκαν κατά τμήματα.
Ταχύτερες συσκευές εισόδου-εξόδου.
Δυνατότητα μεταφοράς στοιχείων από έναν Η/Υ σε άλλον μέσω τηλεφώνου.
[ΕΜΕ 1984, 24]

cmr.evoluting.Generation1 (-1946)

name::
* McsEngl.cmr.evoluting.Generation1 (-1946)@cptIt,
* McsEngl.conceptIt227.4,

μέχρι 1946:
Χρησιμοποιούσαν λυχνίες. Παρήγαγαν θερμότητα. Δεν ήταν πολύ αξιόπιστοι. Μερικοί μπορούσαν να αποθηκεύουν προγράμματα. Επαιρναν τα στοιχεία εισόδου απο χαρτοταινία ή απο διάτρητες κάρτες.
[ΕΜΕ 1984, 24]

FvMcs.computer'CPU

_CREATED: {1999-11-12}

name::
* McsEngl.conceptIt534,
* McsEngl.computer'CPU@cptIt,
* McsEngl.FvMcs.computer'CPU@cptIt,
* McsEngl.cpu@cptIt534,
* McsEngl.central processing unit@cptIt,

DEFINITION

Central Processing Unit or CPU, in computer science, the computational and control unit of a computer; the device that interprets and executes instructions. Mainframes and early minicomputers contained circuit boards full of integrated circuits that implemented the central processing unit.
"Central Processing Unit," Microsoft(R) Encarta(R) 97 Encyclopedia. (c) 1993-1996 Microsoft Corporation. All rights reserved.

cpu.SPECIFIC

name::
* McsEngl.cpu.SPECIFIC@cptIt,

_SPECIFIC:#ql:_GENERIC cptIt534#

microprocessor#cptIt13: attSpe#

FvMcs.computer'DISPLAY

name::
* McsEngl.conceptIt42,
* McsEngl.computer'DISPLAY@cptIt,
* McsEngl.FvMcs.computer'DISPLAY@cptIt,
* McsEngl.display@cptIt42,
* McsEngl.DISPLAY@cptIt,
* McsEngl.console@cptIt,
* McsEngl.monitor@cptIt,
* McsEngl.terminal@cptIt,
* McsElln.ΟΘΟΝΗ@cptIt42,

display'GENERIC

_GENERIC:
* entity.economic.satisfierWorking.techInfo.hardware#cptItsoft1#

display'ΑΝΤΙΘΕΣΗ

name::
* McsEngl.display'ΑΝΤΙΘΕΣΗ@cptIt,

display'ΒΑΡΟΣ

name::
* McsEngl.display'ΒΑΡΟΣ@cptIt,

MY'VE150mb: Net 4.5 kg (9.9 lb) ViewPanel only

display'ΕΠΙΛΟΓΗ

name::
* McsEngl.display'ΕΠΙΛΟΓΗ@cptIt,

H επιλογή οθόνης εξαρτάται απο τη φύση της εργασίας που εκτελεί ο χρήστης.
- Για CAD, DTP χρειάζεται μεγάλη οθόνη με υψηλές προδιαγραφές γεωμετρικής και χρωματικής πιστότητας.
- Για συνήθεις χρήσεις οι λεγόμενες ΓΕΝΙΚΗΣ ΧΡΗΣΗΣ συνδυάζουν ικανοποιητική απόδοση σε λογική τιμή.
[COMPUTER GO, JUL. 1994, 87]

display'ΓΩΝΙΑ'ΘΕΑΣΗΣ

name::
* McsEngl.display'ΓΩΝΙΑ'ΘΕΑΣΗΣ@cptIt,

Οι λεπτές έχουν μικρή οριζόντια και κάθετη.

MY'VE150mb: Maximum viewing angles Left Right Up Down 60° 60° 45° 55°

display'ΚΑΤΑΝΑΛΩΣΗ'ΕΝΕΡΓΕΙΑΣ

name::
* McsEngl.display'ΚΑΤΑΝΑΛΩΣΗ'ΕΝΕΡΓΕΙΑΣ@cptIt,

H οθόνη του κομπιουτερ είναι το πλέον ενεργοβόρο περιφερειακό και με πολλές ώρες λειτουργίας εύκολα φουσκώνει το λογαριαμό της ΔΕΗ.
Αρκετές οθονες έχουν ΠΡΟΔΙΑΓΡΑΦΕΣ για εξοικονομηση ενέργειας.
[COMPUTER GO, JUL. 1994, 93]

ΠΡΟΔΙΑΓΡΑΦΕΣ ΜΕΙΩΣΗΣ ΕΝΕΡΓΕΙΑΣ:
- Energy star (EPA) όχι μόνο για τις οθόνες αλλά και για όλα τα περιφερειακά.
- VESA DPMS (display power management signaling)
[COMPUTER GO, JUL. 1994, 93]

display'ΡΥΘΜΙΣΕΙΣ

name::
* McsEngl.display'ΡΥΘΜΙΣΕΙΣ@cptIt,

Αναλογικές, Ψηφιακές ρυθμίσεις.

display'ΣΥΓΚΛΙΣΗ'ΤΩΝ'ΟΡΙΖΟΝΤΙΩΝ'ΚΑΙ'ΚΑΘΕΤΩΝ

name::
* McsEngl.display'ΣΥΓΚΛΙΣΗ'ΤΩΝ'ΟΡΙΖΟΝΤΙΩΝ'ΚΑΙ'ΚΑΘΕΤΩΝ@cptIt,

display'ΦΩΤΕΙΝΟΤΗΤΑ

name::
* McsEngl.display'ΦΩΤΕΙΝΟΤΗΤΑ@cptIt,

display'CARD#cptIt992: attPar#

name::
* McsEngl.display'CARD@cptIt,

display'COLOR

name::
* McsEngl.display'COLOR@cptIt,

ΚΟΥΡΑΣΤΙΚΟΙ ΣΥΝΔΙΑΣΜΟΙ:
ΜΠΛΕ ΣΕ ΜΑΥΡΟ
ΚΟΚΚΙΝΟ ΣΕ ΜΑΥΡΟ
ΚΙΤΡΙΝΟ Η ΠΡΑΣΙΝΟ ΣΕ ΑΣΠΡΟ
ΜΠΛΕ ΣΕ ΠΡΑΣΙΝΟ
ΚΟΚΚΙΝΟ ΣΕ ΜΩΒ
* ΚΟΚΚΙΝΟ ΣΕ ΜΠΛΕ ΔΙΝΕΙ ΣΤΕΡΕΟΠΤΙΚΟ ΑΠΟΤΕΛΕΣΜΑ.

display'CONNECTOR

name::
* McsEngl.display'CONNECTOR@cptIt,
* McsEngl.display'port@cptIt,

DIGITAL:
* DVI

ANALOG:
* D-15 sub (η κλασσική σύνδεση).

BNC connector

Ειδικό βύσμα που περιστρέφοντάς το κλειδώνει επάνω στην υποδοχή και χρησιμοποιείται στις μεγάλες οθόνες για την είσοδο του σήματος εικόνας. Είναι καλύτερο από το κοινό 15pin D-Sub VGA, διότι το διερχόμενο μέσω αυτού σήμα ΔΕΝ επηρεάζεται εύκολα από ραδιοσυχνότητες.
[ΚΟΜΠΙΟΥΤΕΡ ΓΟ, ΝΟΕΜ. 1996, 174]

display'DOTPITCH (ΒΗΜΑ ΚΟΥΚΙΔΑΣ)

name::
* McsEngl.display'DOTPITCH (ΒΗΜΑ ΚΟΥΚΙΔΑΣ)@cptIt,

Στις κλασσικές το ΟΡΙΖΟΝΤΙΟ ΒΗΜΑ = dot pitch x sin60 = DotPitch x 0,86.
Στις Τρινιτρον το ΟΡΙΖΟΝΤΙΟ ΒΗΜΑ = dot pitch
[RAM, OKT. 1996, 223]

Είναι η απόσταση μεταξύ δύο ομοιόμορφων κουκκίδων φωσφόρου μέσα σε ένα pixel. Είναι μέτρο ευκρίνειας.
[COMPUTER GO, DEC 1995, ΕΝΘΕΤΟ 37]

Dot-pitch είναι η αποσταση των τριών κουκίδων που συνθέτουν ένα pixel (κάθε μία αντιπροσωπεύει ένα βασικό χρώμα), μετρημένη παράλληλα με τη διαγώνιο της οθόνης.
[COMPUTER GO, JUL. 1994, 94]

ΒΗΜΑ ΚΟΥΚΙΔΑΣ:
ΟΣΟ ΜΙΚΡΟΤΕΡΟ ΕΙΝΑΙ ΤΟ ΒΗΜΑ ΚΟΥΚΙΔΑΣ ΤΟΣΟ ΚΑΛΥΤΕΡΗ ΠΟΙΟΤΗΤΑ ΕΧΟΥΜΕ.
ΣΥΝΙΘΙΣΜΕΝΗ ΤΙΜΗ 0,28mm.

Οι οθόνες TRINITRON δεν χρησιμοποιούν κουκκίδες στο πλεγμα αλλά λουρίδες (stripes) και έχουν μικρότερη απόσταση μεταξύ τους 0.26mm.
[COMPUTER GO, JUL. 1994, 94]

display'FILTER-(ΦΙΛΤΡΟ)cptIt463: attPar##

name::
* McsEngl.display'FILTER-(ΦΙΛΤΡΟ)cptIt463: attPar@cptIt,

display'FLICKERING (ΤΡΕΜΟΥΛΙΑΣΜΑ)

name::
* McsEngl.display'FLICKERING (ΤΡΕΜΟΥΛΙΑΣΜΑ)@cptIt,

display'FREQUENCY#cptIt213#

name::
* McsEngl.display'FREQUENCY@cptIt,

my've150mb: fh:30-60 kHz, fv:50-75 Hz

ΡΥΘΜΟΣ ΑΝΑΝΕΩΣΗΣ

name::
* McsEngl.refresh-rate@cptIt,
* McsElln.ρυθμος-ανανεωσης@cptIt,
* McsElln.καθετη-συχνοτητα@cptIt,
* McsElln.συχνοτητα-ανανεωσης@cptIt,
* McsElln.συχνοτητα-πλασιου@cptIt,

Ο ρυθμός ανανέωσης πρεπει να είναι τουλάχιστον 72Hz.
Για ευαίσθητα μάτια ή για πολύωρη δουλεία συνιστάται 90Hz,
To απόλυτο όριο είναι 120Hz
[COMPUTER GO, DEC 1995, ΕΝΘΕΤΟ 38]

Ο ΡΥΘΜΟΣ ΑΝΑΝΕΩΣΗΣ είναι σπουδαιότατα στοιχειο μιας οθόνης, εκφράζεται σε Hz, και όσο μεγαλύτερος είναι ΤΟΣΟ πιο ξεκούραστη είναι η χρήση της οθόνης.
[COMPUTER GO, JUL. 1994, 87]

ΣΤΑ 72Hz ΣΥΧΝΟΤΗΤΑ ΠΛΑΙΣΙΟΥ, ΑΠΟΦΕΥΓΕΤΑΙ ΤΕΛΕΙΩΣ ΤΟ ΤΡΕΜΟΥΛΙΑΣΜΑ.

η VESA έχει δώσει τιμές για αναλύσεις:
640x480, 72Hz
800x600, 72Hz
1024x768, 70Hz.
Αυτές θεωρούνται ξεκούραστες για τον άνθρωπο.
[COMPUTER GO, JUL. 1994, 94]

ΠΟΣΕΣ ΦΟΡΕΣ ΞΑΝΑΖΩΓΡΑΦΙΖΕΤΑΙ Η ΟΘΟΝΗ ΤΟ ΔΕΥΤΕΡΟΛΕΠΤΟ.

MULTIFREQUENCY MONITORS:
επιλέγουν αυτόματα συνήθως την καλύτερη συχνότητα για κάθε ανάλυση
[COMPUTER GO, JUL. 1994, 87]

ΕΥΡΟΣ ΖΩΝΗΣ / BANDWIDTH

Το εύρος ζώνης συχνοτήτων έχει έμμεση σχέση με το αριθμό των pixels σε μια οριζόντια γραμμή και εκφράζεται σε MHz. Οσο μεγαλύτερο είναι το εύρος ΤΟΣΟ το καλύτερο.
[COMPUTER GO, JUL. 1994, 94]

display'GEOMETRY

name::
* McsEngl.display'GEOMETRY@cptIt,

Με τη μέτρηση της ΓΕΩΜΕΤΡΙΑΣ ερευνούμε τη δυνατότητα που έχει η οθόνη να αναπαράγει σωστά και με ακρίβεια γεωμετρικά σχήματα.

Οι οθόνες LCD έχουν εκ κατασκευής τέλεια γεωμετρία.
[ΡΑΜ, ΟΚΤ. 1996, 224]

CONVERGENCE

Παρουσιάζεται σε λευκή γραμμή, χρώμα κόκκινο ή μπλέ ή πράσινο. Οφείλεται στην ακρίβεια στόχευσης του ηλεκτρονικού πυροβόλου.
[ΚΟΜΠΙΟΥΤΕΡ ΓΟ, ΝΟΕΜ. 1996, 176]

BARREL distortion

Παραμόρφωση σε σχήμα βαρελιού.
[ΚΟΜΠΙΟΥΤΕΡ ΓΟ, ΝΟΕΜ. 1996, 176]

MOIRE

Φυσική παραμόρφωση. Οφείλεται στην παρεμβολή της shadow mask ή του aperture grille στη χρησιμοποιούμενη ανάλυση.
[ΚΟΜΠΙΟΥΤΕΡ ΓΟ, ΝΟΕΜ. 1996, 176]

PINCUSHION distortion

Παραμόφωση αντιθετη από αυτή του βαρελιου, δηλ. στη μέση προς τα μέσα. Οφείλεται σε λανθασμένο χρονισμό στο πηνίο εκτροπής.
[ΚΟΜΠΙΟΥΤΕΡ ΓΟ, ΝΟΕΜ. 1996, 176]

SCREEN REGULATION

Μεγάλωμα της εικόνας όταν σε όλη την επιφάνεια εμφανίζεται 'σκοτεινό' χρώμα. Οφείλεται σε κακής ποιόητας σταθεροποίηση της υψηλής τάσης του ρεύματος και συνήθως παρουσιάζεται σε φτηνά μονιτορς.
[ΚΟΜΠΙΟΥΤΕΡ ΓΟ, ΝΟΕΜ. 1996, 176]

display'HEALTH ISSUES

name::
* McsEngl.display'HEALTH ISSUES@cptIt,


 filters/ΦΙΛΤΡΑ,
 Radiation/ΑΚΤΙΝΟΒΟΛΙΑ,
 Reflection/ΑΝΤΑΝΑΚΛΑΣΗ,
 Standards
 ΑΝΤΙΣΤΑΤΙΚΑ (ΜΕ ΤΑ ΕΛΕΥΘΕΡΑ ΗΛΕΚΤΡΟΝΙΑ)

display'INTERLACED (ΠΕΠΛΕΓΜΕΝΗ ΣΑΡΩΣΗ)

name::
* McsEngl.display'INTERLACED (ΠΕΠΛΕΓΜΕΝΗ ΣΑΡΩΣΗ)@cptIt,

ΠΑΛΙΟΤΕΡΗ ΤΕΧΝΙΚΗ, ΑΝΕΠΙΤΡΕΠΤΗ ΠΙΑ.

ΜΕΧΡΙ ΤΗΝ 1η ΙΑΝΟΥΑΡΙΑΟΥ 1996 ΟΛΟΙ ΟΙ ΕΡΓΟΔΟΤΕΣ ΠΡΕΠΕΙ ΝΑ ΔΙΑΘΕΤΟΥΝ ΣΤΟΥΣ ΥΠΑΛΛΗΛΟΥΣ ΤΟΥΣ ΠΟΥ ΠΕΡΝΟΥΝ ΠΑΝΩ ΑΠΟ 4 ΩΡΕΣ ΣΕ ΟΘΟΝΕΣ, NON-INTERLACED, ΣΥΜΦΩΝΑ ΜΕ ΟΔΗΓΙΑ ΤΗΣ ΕΟΚ.
[CHIP, JAN 1994, 14]

display'PIXEL (ΕΙΚΟΝΟΣΤΟΙΧΕΙΟ)

name::
* McsEngl.display'PIXEL (ΕΙΚΟΝΟΣΤΟΙΧΕΙΟ)@cptIt,

PIXEL = PICture ELement

Κάθε "ΨΗΦΙΔΩΤΟ" της εικόνας.

SHADOW MASK (ΜΑΣΚΑ ΣΚΙΑΣ)

ΚΛΑΣΙΚΕΣ / TRI-DOT

Κάθε εικονοστοιχείο αποτελείται από τρεις ΚΟΥΚΙΔΕΣ φωσφορου κόκκινη, πράσινη, μπλέ.
Οι κόκκοι τοποθετούνται με καθορισμένη διαδοχικότητα που αλλάζει από γραμμή σε γραμμή. Αν στον πρώτη είναι ΚΠΜ, στη δεύτερη γίνεται ΠΜΚ κοκ. Ετσι μεταξύ δύο χρωμάτων ΜΙΑΣ γραμμής βρίσκεται το τρίτο χρώμα της επόμενης γραμμής. Ετσι σχηματίζονται ΤΡΙΑΔΕΣ από γειτονικούς φθορίζοντες κόκκους.
[ΡΑΜ, ΟΚΤ. 1996, 222]

ΣΧΙΣΜΕΣ ΣΚΙΑΣ

TRINITRON / DIAMONDTRON

Κάθε εικονοστοιχείο αποτελείται από τρείς ΓΡΑΜΜΕΣ φωσφόρου.

Το πλεονέκτημα που έχουν οι οθόνες αυτές σε σχέση με τις κλασσικές είναι η αυξημένη ΛΑΜΠΡΟΤΗΤΑ. Οφείλεται στη μεγάλη διαφάνεια που έχει η μάσκα με τις σχισμές σε σχέση με τις οπές ΚΑΙ στην ευρύτερη κάλυψη της οθόνης με τις φθορίζουσες λωρίδες.
[ΡΑΜ, ΟΚΤ. 1996, 222]

display'PRICE#cptEconomy541.44#

name::
* McsEngl.display'PRICE@cptIt,

display'QUALITY

name::
* McsEngl.display'QUALITY@cptIt,

ISO-9241-3 quality standard

TCO'03

name::
* McsEngl.TCO'03@cptIt,

This is a summary of the requirements for flat panel displays in TCO'03 Displays. For more detailed information see the labeling standard under the heading Info Material.
Visual ergonomics

Resolution The resolution must be at least: 15" ? 1024 x 768 16" ? 1024 x 768 17" ? 1280 x 1024 18" ? 1280 x 1024 19" ? 1280 x 1024 21" ? 1600 x 1200

Brightness Brightness must not be too low. It must be at least 150 cd/m2.
There must be even brightness over the entire display. Brightness may only differ by a maximum ratio of 1.5 to 1.
Brightness must be even over the entire display, even when viewed at an angle. Brightness may only differ by a maximum ratio of 1.7 to 1 for a 30-degree angle in the horizontal. The same requirement applies to rotating displays, but measured at a 15-degree angle when standing and a 15-degree angle in the vertical.

Contrast The contrast between a character and the background must be sharp even from angles other than perpendicular to the display. Contrast modulation (Cm) must be Cm ? 0.8 at 30 degrees in the horizontal.

Display frame The display frame must not be too black or too white. This is to avoid contrast with the display surface. Nor may it give rise to disturbing reflections.

Color reproduction The display must have a preset color temperature that can be adjusted by the user. Color reproduction must be even over the entire display surface. Colors must not be distorted when viewed from a side angle.

Workload ergonomics It must be possible to adjust the display in the vertical by at least 20 degrees. The display must be height adjustable. (It is particularly important to be able to lower very large displays down to the table surface.)

Emissions Alternating electrical fields must be a maximum of: - Band I: 5 Hz to 2 kHz, ? 10 V/m, measured at 30 cm and 50 cm in front of the display. - Band II: 2 kHz to 400 kHz, ? 1.0 V/m, measured at 50 cm around and 30 cm in front of the display.
Alternating magnetic fields must be a maximum of: - Band I: 5 Hz to 2 kHz, ? 200 nT, measured at 30 cm in front of and 50 cm around the display. - Band II: 2 kHz to 400 kHz, ? 25 nT measured at 50 cm around the display.
Noise level from the fans or similar units, measured in Bel: - Min: 4.8 B - Max: 5.5 B

Electrical safety The display must fulfill the safety requirements of EN/IEC 60 950.

Ecology To minimize environmental impact, the display must: - Be manufactured in accordance with ISO 14001. - Contain limited amounts of heavy metals such as mercury, cadmium, and lead. - Not contain brominated or chlorinated flame-retardants in plastic components. - Be equipped with information stating where it can be recycled.

Energy The display must be fitted with an energy saving function that ensures power consumption of a maximum of 5W in the lowest standby mode.
[http://www.tcodevelopment.com/pls/nvp/Document.Show?CID=776&MID=144]

TCO'03
The fourth labeling standard from TCO Development of Sweden. TCO are the initials (in Swedish) for the Swedish Confederation of Professional Employees. TCO'03 covers the same areas as the previous TCO'99 standard, but sets stricter requirements and includes many new requirements such as vertical tilt, vertical height adjustment, and a lead-free external cable, external adapter, plastic materials, battery, paint, and lacquer.
[http://www.eizo.com/support/glossary/t13.asp]

display'RADIATION (ΑΚΤΙΝΟΒΟΛΙΑ)

name::
* McsEngl.display'RADIATION (ΑΚΤΙΝΟΒΟΛΙΑ)@cptIt,

Τα ηλεκτρομαγνητικά πεδία δημιουργουνται κυρίως από ηλεκτρονικά μερη (τροφοδοτικό) και τον καθοδικό σωλίνα και όχι απο την φθορίζουσα οθόνη.

Οι ηλεκτρομαγνητικές ακτινοβολίες ELF (χαμηλής συχνότητας) πρέπει να είναι λιγότερο από 20 nTesla
και οι VLF λιγότερο από nT.

ΥΠΑΡΧΟΥΝ ΜΟΝΤΕΛΑ ΠΟΥ ΑΥΞΑΝΕΙ Η ΤΙΜΗ-ΤΟΥΣ ΚΑΤΑ 11.000 ΠΕΡΙΠΟΥ, ΜΕ ΧΑΜΗΛΗ ΑΚΤΙΝΟΒΟΛΙΑ.

ΠΡΟΔΙΑΓΡΑΦΕΣ ΕΚΠΟΜΠΗΣ ΑΚΤΙΝΟΒΟΛΙΑΣ

MPR:

MPR 1980:8:

MPR II:

TCO:

SEMCO: Αυστηρη

SWEDAC: Αυστηρη

Οι περισσότερες προέρχονται απο το ΣΟΥΗΔΙΚΟ ινστιτούτο προστασίας καταναλωτών.

Αλλο πρότυπο είναι το U.S. EPA.

display'REFLECTION (ΑΝΤΑΝΑΚΛΑΣΗ)

name::
* McsEngl.display'REFLECTION (ΑΝΤΑΝΑΚΛΑΣΗ)@cptIt,

ΥΠΑΡΧΟΥΝ ΟΘΟΝΕΣ ΜΕ ΜΕΙΩΜΕΝΗ ΑΝΤΑΝΑΚΛΑΣΗ ΤΟΥ ΠΡΟΣΠΙΠΤΟΝΤΟΣ ΦΩΤΟΣ, ΠΟΥ ΤΙΣ ΚΑΝΕΙ ΠΙΟ ΑΝΕΤΕΣ ΓΙΑ ΤΟ ΧΡΗΣΤΗ, ΔΙΟΤΙ ΜΕΙΩΝΕΤΑΙ Η ΕΚΘΑΜΒΩΣΗ.

display'RESOLUTION (ΑΝΑΛΥΣΗ)

name::
* McsEngl.display'RESOLUTION (ΑΝΑΛΥΣΗ)@cptIt,

ΑΝΑΛΥΣΗ είναι ο αριθμός των pixel#ql:display'pixel# ανα γραμμήΧστήλη.

ΑΝΑΛΥΣΗ
1600χ1200
1280χ1024
1024x768
800x600
640χ480 VGA

SVGA (800x600):
Η ανάλυση αυτή είναι ιδανική για οποιαδήποτε χρήση με τα σημερινά GUIs και κυρίως τα Windows. Σε αυτή την ανάλυση και σε WYSIWYG χωράει στην οθόνη όλο το πλάτος μιας σελίδας Α4 που είναι το πιο διαδεδομένο μέγεθος εντύπου.
[COMPUTER GO, JUL. 1994, 87]

Ολες οι οθόνες έχουν μια ανάλυση γύρω στα 75dpi, οπότε η ανάλυση εικόνας 75dpi είναι ιδανική όταν θέλουμε να δούμε την εικόνα στην οθόνη του υπολογιστη και να έχει λογικό όγκο αποθήκευσης.
[ΡΑΜ, ΝΟΕ. 1996, 192]

display'SECURITY'STANDARDS

name::
* McsEngl.display'SECURITY'STANDARDS@cptIt,

ΠΡΟΔΙΑΓΡΑΦΕΣ ΑΣΦΑΛΕΙΑΣ

Είναι ένα από τα σημαντικότερα χαρακτηριστικά που θα πρεπει να ελέγξετε προτού επιλέξετε κάποιο μόνιτορ. Σήμερα τα περισσότερα τηρούν όλες τις προδιαγραφές ασφαλείας, ηλεκτρομαγνητικής ακτινοβολίας και εργονομίας.
[ΚΟΜΠΙΟΥΤΕΡ ΓΟ, ΝΟΕΜ. 1996, 176]

MPRI / MPRII

Προδιαγραφές που καθορίστηκαν από την Swedish Agency for Administrative Development, ώστε να προσδιοριστούν συγκεκριμένα όριο μαγνητικής/ηλεκτρικής ακτινοβολίας και στατικού ηλεκτρισμου. Το Ι καθορίστηκε το 1987 και το ΙΙ το 1990.
[ΚΟΜΠΙΟΥΤΕΡ ΓΟ, ΝΟΕΜ. 1996, 176]

TCO

Πρόκειται για τα πιο αυστηρά όρια ηλεκτρομαγνητικής ακτινοβολίας στον κόσμο. TCO95 καθορίστηκε το 1995.
[ΚΟΜΠΙΟΥΤΕΡ ΓΟ, ΝΟΕΜ. 1996, 176]

TUV Ergonomie Gepruft

Δημιουργήθηκε στη Γερμανία, βασίστηκε στο TUV/GS, αλλά πιο εξειδικευμένα εισήγαγε προδιαγραφές για την αντίθεση, αντανάκλαση, τα πολύ χαμηλά μαγνητικά πεδία και τις ηλεκτροστατικές παρεμβολές.
[ΚΟΜΠΙΟΥΤΕΡ ΓΟ, ΝΟΕΜ. 1996, 176]

TUV/GS

Γερμανική προδιαγραφή που καθορίζει ότι τα ηλεκτρικά υποσυστήματα ενός προϊόντος έχουν κατασκευασθεί έτσι ώστε να αποφευχθεί κάθε ατύχημα σχετικό με το ηλεκτρικό ρεύμα.
[ΚΟΜΠΙΟΥΤΕΡ ΓΟ, ΝΟΕΜ. 1996, 176]

display'SHAPE (ΣΧΗΜΑ)

name::
* McsEngl.display'SHAPE (ΣΧΗΜΑ)@cptIt,

Οι ΕΠΙΠΕΔΕΣ έχουν καλύτερη εικόνα από τις "ΚΑΜΠΥΛΩΤΕΣ" γιατί δεν παρουσιάζουν οπτική παραμόρφωση στα άκρα τους.
[COMPUTER GO, DEC 1995, ΕΝΘΕΤΟ 37]

display'SIZE (ΔΙΑΣΤΑΣΕΙΣ)

name::
* McsEngl.display'SIZE (ΔΙΑΣΤΑΣΕΙΣ)@cptIt,

Σε όλες τις οθόνες η σχέση πλευρών είναι 4 προς 3.
[ΡΑΜ, ΟΚΤ. 1996, 224]

32 ΙΝΤΣΩΝ
ΚΑΤΑΣΚΕΥΑΣΕ Η ΝΟΤΙΚΟΡΕΑΤΙΚΗ Samsung ΥΨΗΛΗΣ ΕΥΚΡΙΝΕΙΑΣ ΜΕ 1000 ΓΡΑΜΜΕΣ.
[ΚΑΘΗΜΕΡΙΝΗ, 2 ΜΑΙΟΥ 1993, 48]

15":
αποδίδουν καλύτερα την ανάλυση 800χ600 που χρησιμοποιείται κατα κόρον στα GUI απο τις 14".
... Προσφέρουν κατα μέσο όρο 10% μεγλύτερη ορατή επιφάνεια απο τις 14", άν και μεταξύ των κατασκευαστών υπάρχουν σημαντικές διαφορές.
[COMPUTER GO, JUL. 1994, 87]

display.SPECIFIC

name::
* McsEngl.display.SPECIFIC@cptIt,

* display.specific,

display.SPECIFIC-DIVISION.TECHNOLOGY

name::
* McsEngl.display.SPECIFIC-DIVISION.TECHNOLOGY@cptIt,

Video Display Technology
In the past, many researchers and industry watchers have predicted that one or another video display technology would finally dominate and eliminate the competition. However this has not happened. Video displays are used not only with computers, but with any device that needs to display text or graphics like televisions, household appliances, medical, and military equipment.
By far the oldest and most popular display device is the Cathode Ray Tube (CRT), which first appeared in the early 1900's.
The other three major display technologies are the Liquid Crystal Display (LCD), the gas-plasma display, and the electroluminescent (EL) display.
Minor display technologies, comparatively, are the Vacuum Fluorescent Display (VFD), electrophoretic displays, and the Light Emitting Diode (LEDs) displays.
[SOURCE: PC-GLOSSARY 1993]

display.ΑΦΗΣ

name::
* McsEngl.display.ΑΦΗΣ@cptIt,

display.ABM

name::
* McsEngl.display.ABM@cptIt,
* McsEngl.abm-display@cptIt,
* McsEngl.active-beam-matrix-display@cptIt,

Πρόσφατη τεχνολογία της Panasonic που συνδυάζει την τεχνολογία του καθοδικού σωλήνα με αυτή της LCD.
[COMPUTER GO, JUL. 1994, 87]

display.CRT

name::
* McsEngl.display.CRT@cptIt,
* McsEngl.crt-display@cptIt,
* McsEngl.cathode-ray-tube@cptIt,
* McsElln.οθονη-καθοδικου-σωληνα@cptIt,

_DEFINITION:
* (CRT) An electrical device for displaying images by exciting phosphor dots with a scanned electron beam. CRTs are found in computer {VDU}s and {monitors}, televisions and oscilloscopes. The first commercially practical CRT was perfected on 29 January 1901 by Allen B DuMont.

A large glass envelope containing a negative electrode (the
cathode) emits electrons (formerly called "cathode rays") when
heated, as in a {vacuum tube}. The electrons are accelerated
across a large voltage gradient towards the flat surface of
the tube (the screen) which is covered with phosphor. When an
electron strikes the phosphor, light is emitted. The electron
beam is deflected by electromagnetic coils around the outside
of the tube so that it scans across the screen, usually in
horizontal stripes. This scan pattern is known as a {raster}.
By controlling the current in the beam, the brightness at any particular point (roughly a "{pixel}") can be varied.

Different phosphors have different "{persistence}" - the length of time for which they glow after being struck by electrons. If the scanning is done fast enough, the eye sees a steady image, due to both the persistence of the phospor and of the eye itself. CRTs also differ in their {dot pitch}, which determines their spatial {resolution}, and in whether they use {interlace} or not.
(17 Nov 1994)

EVOLEINO:
* Παρά την υπερβολικη αισιοδοξία των περασμενων ετων σχετικά με εναλλακτικές τεχνολογίες, η κλασικη συνταγή του καθοδικού σωλήνα είναι αυτή που θα βλέπουμε για αρκετό καιρό στους υπολογιστές γραφείου.
[COMPUTER GO, JUL. 1994, 87]

display.TERMINAL/ΤΕΡΜΑΤΙΚΑ

name::
* McsEngl.display.TERMINAL/ΤΕΡΜΑΤΙΚΑ@cptIt,

display.LCD (LIQUID CRYSTAL DISPLAY)

name::
* McsEngl.display.LCD (LIQUID CRYSTAL DISPLAY)@cptIt,
* McsEngl.lcd@cptIt42i,
* McsEngl.display.LiquidCrystal@cptIt,
* McsEngl.lcd@cptIt,
* McsEngl.LIQUID-CRYSTAL-DISPLAY@cptIt,

SOURCE:
* RAM 2002.01,

ATTRIBUTES:
* ΓΩΝΙΑ ΘΕΑΣΗΣ: >150
* ΛΟΓΟΣ ΑΝΤΙΘΕΣΗΣ: 500:1
* ΦΩΤΕΙΝΟΤΗΤΑ: 250 cd/m2
* ΚΑΤΑΝΑΛΩΣΗ ΕΝΕΡΓΕΙΑΣ,
* ΧΡΟΝΟΣ ΑΠΟΚΡΙΣΗΣ ΣΤΙΣ ΜΕΤΑΒΟΛΕΣ ΤΩΝ ΕΝΔΕΙΞΕΩΝ (ΓΙΑ ΒΙΝΤΕΟ): >25ms
* ΧΡΟΝΟΣ ΖΩΗΣ ΛΑΜΠΑΣ,

SPECIFIC:
* TN LCD, 1971, οι πρώτες.
* TFT,
* SUPER (IPS) TFT, 1995,
* MVA LCD (160 μοίρες γωνία θέασης).

display.ACTIVE'MATRIX (display.TFT Thin Film Transistor)

name::
* McsEngl.display.ACTIVE'MATRIX (display.TFT Thin Film Transistor)@cptIt,

Η μητρική τεχνολογία είναι η LCD.
Χρησιμοποιεί Τρανζίστορ και Υγρούς-κρυστάλλους.
Τα τρανζίστορ είναι ηλεκτρονικοί-διακόπτες.
Οι υγροί-κρύσταλλοι είναι ουσίες που τα μόρια τους είναι προσανατολισμένα όπως στα στερεά αλλά μπορούν και να αλλάξουν κατεύθυνση όπως στα υγρά.
Κάθε εικονοστοιχείο αποτελείται από 3 τρανζίστορ ένα για κάθε βασικό χρώμα (κόκκινο, πράσινο, μπλέ). Τα χρώματα απεικονίζονται σε κατάλληλα τοποθετημένες χρωματιστές μεμβράνες. Τα τρανζίστορ επιτρέπουν ή διακόπτουν την εφαρμογή ηλεκτρικής-τάσης στα μόρια των υγρών-κρυστάλλων. Η ηλεκτρική-τάση αλλάζει τον προσανατολισμό των μορίων, φαινόμενο που επιτρέπει τη διέλευση ή μή του φωτός.
Οι χρωματικές-διαβαθμίσεις δημιουργούνται με ακριβή έλεγχο του χρονικού-διαστήματος, κατά το οποίο κάθε τρανζίστορ ενός εικονοστοιχείου παραμένει ανοιχτό ή κλειστό.
[ΡΑΜ 2001.09, 144]

source:
ram 2001.09

Κάθε εικονοστοιχείο σχηματίζεται με τρια λιλιπούτεια τρανζίστορ που εκπέμπουν τα τρία βασικά χρώματα.
** τα χρώματα δεν έχουν τη ζωντάνια της CRT.
** πρακτικά δουλεύουμε με μία ανάλυση.
[ΡΑΜ, 1998δεκ, 144]

display.PASSIVE'MATRIX

name::
* McsEngl.display.PASSIVE'MATRIX@cptIt,

Έχει μικρότερο ΚΟΣΤΟΣ παραγωγής αλλά μικρότερη ΕΥΚΡΙΝΕΙΑ από αυτές της ενεργής-μήτρας.
[Ε.ΛΥΚΕΙΟ Εφαρμογές Πληροφορικής Υπολογιστών 2002, 92]

display.3D

name::
* McsEngl.display.3D@cptIt,

Η Sharp ανακοινωσε την κατασκευή οθονων υγρών κρυστάλων 14 και 8,6 ιντσων που παρουσιάζουν τρισδιάστατες εικόνες. Δεν κάνει λόγο για εμπορική εκμετάλευση.
[ΚΑΘΗΜΕΡΙΝΗ, 5 ΦΕΒ. 1995, 63]

display.TRUE'COLOR'DISPLAY

name::
* McsEngl.display.TRUE'COLOR'DISPLAY@cptIt,

24bit code = 16 ΕΚΑΤΟΜΥΡΙΑ ΧΡΩΜΑΤΑ.

GENOA TrueColor 7900, Point computers 66.000 drhmes.

Η Cirrus Logic παρουσίασε μια καινούργια σειρά τσιπ τα οποία θα ρίξουν τόσο πολύ το κόστος της κατασκευής καρτών VGA με χρώμα 24 bit (True Color) ΩΣΤΕ θα συμφέρει πλέον η ενσωμάτωση τους σε μητρικές πλακέτες. Οκτ 92.

display.LCD.FUTURE

name::
* McsEngl.display.LCD.FUTURE@cptIt,

Τρίτη 26/03/2002 12:47
Από τη βιομηχανία ελαστικών Πολλά υποσχόμενη τεχνολογία κατασκευής επίπεδων οθονών από την... Bridgestone
Associated Press
Η έρευνα στον τομέα των «ηλεκτρο-υλικών» οδήγησαν τη Bridgestone στη νέα τεχνολογία οθονών news.in.gr Τόκιο: Η Bridgestone, η μεγαλύτερη ιαπωνική εταιρεία κατασκευής ελαστικών, ανακοίνωσε την Τρίτη ότι έχει αναπτύξει τεχνολογία για την κατασκευή οθονών που θα είναι πιο ευκρινείς και θα έχουν μεγαλύτερο ρυθμό ανανέωσης από τις οθόνες υγρών κρυστάλλων (LCD).
Στα τέλη του 2003, όπως δηλώνει η εταιρεία, η τεχνολογία της -η οποία ονομάστηκε Quick Response Liquid Powder Display- θα είναι δυνατόν να χρησιμοποιηθεί για τη μαζική κατασκευή οθονών. Αναμένεται δε να χρησιμοποιηθεί για την κατασκευή οθονών σε κινητά τηλέφωνα, υπολογιστές χειρός και σε notebook.
Σύμφωνα με την Bridgestone, το νέο υλικό είναι πολύ λεπτό και θα επιτρέψει την ικανοποιητική προβολή από μεγαλύτερη γωνία θέασης σε σχέση με εκείνη των επίπεδων οθονών LCD. Επιπλέον, οι απαιτήσεις του σε ηλεκτρική ενέργεια είναι μικρότερες. Τέλος, οι οθόνες τεχνολογίας Quick Response Liquid Powder ανταποκρίνονται 100 φορές πιο γρήγορα από τις τυπικές LCD και, εκτός από ευκρινείς, είναι και επίπεδες σαν το χαρτί, ισχυρίζεται η Bridgestone.
H δημοσίευση της είδησης στην ιαπωνική οικονομική εφημερίδα Nihon Keizai Shimbun την περασμένη Τετάρτη οδήγησε τη μετοχή της εταιρείας σε άνοδο 3%.

Ηλθαν οι επίπεδες οθόνες Μεγαλύτερη ευκρίνεια, εξοικονόμηση χώρου και ηλεκτρικού ρεύματος

Η κρυστάλλινη σφαίρα στην οποία κάποιοι άνθρωποι έβλεπαν το μέλλον θα εξαφανιστεί. Οι σύγχρονοι μάγοι και οι προφήτες παρατηρούν ήδη όσα πρόκειται να συμβούν σε άνετες επίπεδες γυάλινες επιφάνειες με τη βοήθεια ηλεκτρονικών κυκλωμάτων
Τα μηχανήματα έχουν, όπως οι άνθρωποι, και αυτά τη μοίρα τους. Μπορεί κάτι πολύ χρήσιμο και παραγωγικό, όπως είναι η μηχανή του αυτοκινήτου, να είναι καταδικασμένο να δουλεύει υπό αφόρητες συνθήκες. Κάτι άλλο όμως, όπως η τηλεοπτική συσκευή μας, πρόξενος πολλών δεινών σε διάφορα κοινωνικά στρώματα, μπαινοβγαίνει σε σαλόνια και κρεβατοκάμαρες όπου οι άνθρωποι της επιφυλάσσουν την καλύτερη μεταχείριση. Το σίγουρο είναι πως η δόξα των πραγμάτων δεν διαρκεί αιώνια. Στα παλιατζίδικα βρίσκεις καθημερινά ένα σωρό μηχανήματα που κάποτε σκορπούσαν την ευχαρίστηση στον κόσμο αλλά τώρα κανένας δεν γυρίζει να τους ρίξει μια ματιά. Παγωτομηχανές χειροκίνητες, λάμπες και σόμπες κάθε λογής, μηχανές προβολής για ασπρόμαυρες ταινίες του τρίο Στούτζες και των Μικρών Σατανάδων, φορητά πικάπ που κάποτε έπαιζαν δισκάκια με την Κατερίνα Βαλέντε και τον Τζίμη Μακούλη.
Πιστεύω ότι σε πέντε χρόνια θα είναι γεμάτα τα παλιατζίδικα από τηλεοπτικές συσκευές και μάλιστα αυτές που είναι για έγχρωμα προγράμματα. Οι συμβατικές τηλεοπτικές συσκευές υστερούν σε δυνατότητες τόσο ως προς την ανάλυση όσο και ως προς τις συχνότητες ανανέωσης που μπορούν να υποστηρίξουν. Μια συμβατική τηλεοπτική συσκευή φθάνει σε ανάλυση ως 570Χ440 ενώ η συχνότητα ανανέωσης της εικόνας, που όσο πιο υψηλή είναι τόσο λιγότερο τρεμούλιασμα παρατηρούμε, δεν ξεπερνάει τα 50 Hz. Και απέναντι σε αυτές τις χλωμές κυριολεκτικά δυνατότητες μια καλή κομπιουτερική οθόνη έχει ανάλυση της εικόνας σε 1,600Χ1,200 στοιχεία και συχνότητες ανανέωσης πάνω από 85 Hz. Εκτός αυτού, στη μάχη για τα μάτια των καταναλωτών ο κομπιούτερ, παρ' όλη τη σχετικά μικρή ακόμη εξάπλωσή του σε χώρες όπως η Ελλάδα, έχει αποκτήσει μια ορμή που θα τον κάνει να στείλει στα άχρηστα τις τηλεοπτικές συσκευές, αναλαμβάνοντας πλήρως και αυτό το κομμάτι των καταναλωτικών ηλεκτρονικών. Φυσικά το κινητό τηλέφωνο έδειξε ότι μια ηλεκτρονική συσκευή από τη μία ημέρα στην άλλη μπορεί να βρεθεί στα χέρια ενός ολόκληρου πληθυσμού. Και οι κομπιούτερ ναι μεν δεν μπόρεσαν να πλησιάσουν το κατόρθωμα αυτό, θα διεισδύσουν όμως, όπως λένε οι ειδικοί των αγορών, σίγουρα με αυξανόμενο ρυθμό. Διότι οι νέοι τούς θεωρούν απαραίτητο πλέον κομμάτι του σπιτιού τους λόγω σχολείου αλλά και λόγω των δυνατοτήτων για μουσικές περιπέτειες που ανακάλυψαν με το ΜΡ3 όσοι είναι συνδεδεμένοι στο Internet. Διότι εμφανίζονται καινούργιες συνδυασμένες χρήσεις κινητών τηλεφώνων και κομπιούτερ. Διότι τα παιχνίδια παίζονται σχεδόν αποκλειστικά πλέον στους κομπιούτερ. Διότι μπορείς να λαμβάνεις και τηλεοπτικές εκπομπές σε ένα τμήμα της κομπιουτερικής σου οθόνης ή να ακούς ραδιόφωνο από τα ηχεία της. Διότι η απόδοση της εικόνας στον κομπιούτερ είναι καλύτερη, αφού οι οθόνες έχουν αναγκαστικά λόγω των κειμένων που εμφανίζονται σε αυτές αυστηρότερες προδιαγραφές σχετικά με την ευκρίνεια. Διότι, τέλος, έχουν εμφανιστεί κάποιες επίπεδες οθόνες για κομπιούτερ και εξοικονομούν τόσο πολύτιμο χώρο στο υπέρφορτο από καθετί τραπέζι σου που μεταβάλλονται πραγματικά σε φωτεινά αντικείμενα του πόθου καθώς η παρουσία τους, για να το πούμε τώρα με μια λέξη που άλλοτε δεν τολμούσαμε να τη χρησιμοποιούσαμε για καταναλωτικά προϊόντα, μαζικοποιείται στα ράφια των καταστημάτων.

TFT: ασκήσεις επιπέδου
Η εικόνα στην οθόνη αποτελείται από πληθώρα εικονοστοιχείων γνωστών και ως pixel, που πρέπει να σχηματίζονται ταυτόχρονα στην οθόνη ή, επειδή αυτό τεχνικά ήταν δύσκολο, να φαίνεται έστω στο ανθρώπινο μάτι ότι έχουν ταυτόχρονη εμφάνιση. Αυτό κατάφεραν από πολύ παλιά οι κατασκευαστές τηλεοπτικών οθονών να το κάνουν με τη σάρωση. Από ένα ηλεκτρονικό κανόνι πέφτει μια δέσμη ηλεκτρονίων που συνεχώς αλλάζει, με βάση την όποια εικόνα πρέπει να μεταδοθεί ή αλλιώς, σχηματικά θα λέγαμε, να καρφωθεί σημείο προς σημείο επάνω στη φωτοευαίσθητη επιφάνεια. Δημιουργούνται τα εικονοστοιχεία από τη δράση των εστιασμένων ηλεκτρονίων που πέφτουν στη φωτοευαίσθητη επιφάνεια της οθόνης διαδοχικά το ένα μετά το άλλο. Η συχνότητα με την οποία σαρώνεται κάθε σημείο της οθόνης καθορίζει και τη συχνότητα ολόκληρου του πλαισίου, που μας υποδεικνύει πόσες φορές ανανεώνεται κάθε σημείο της οθόνης μέσα σε ένα δευτερόλεπτο. Η συχνότητα γραμμής είναι η συχνότητα με την οποία ανανεώνεται η κάθε γραμμή της εικόνας. Ο προσαρμοστής εικόνας, η κάρτα οθόνης που αναφέραμε και στο προηγούμενο άρθρο μας, καθοδηγεί τα τρία κανόνια για τα τρία βασικά χρώματα. Κάθε εικονοστοιχείο περιγράφεται από την κάρτα οθόνης με τις συντεταγμένες του και το χρώμα.
Τα εικονοστοιχεία είναι βασικό γνώρισμα και στις επίπεδες και στις συμβατικές οθόνες, που δεν είναι επίπεδες αλλά αναγκαστικά αποτελούν το εμπρόσθιο τμήμα ενός εκτοξευτή ηλεκτρονίων και παρουσιάζουν καμπυλότητα για λόγους εστίασης. Οι ομοιότητες όμως ανάμεσα στις επίπεδες και στις παλιές συμβατικές σταματούν εδώ. Αρα δεν είναι και πολλές, οπότε ο καταναλωτής μπαίνοντας σε ένα κατάστημα θα πρέπει να είναι προετοιμασμένος διαφορετικά για να ξέρει τι να κοιτάξει σε μια επίπεδη οθόνη.
Ανοίγοντας τη φωτεινότητα στο τέρμα, σε συνθήκες ανάλογες με αυτές όπου θα δουλεύει τον περισσότερο καιρό, πρέπει να αισθανθεί ότι βλέπει χωρίς την παραμικρή προσπάθεια. Και αυτό πολλοί αμελούν να το σκεφθούν τη στιγμή της αγοράς. Η ανάλυση της εικόνας που προτιμούν οι κατασκευαστές των οθονών αυτών είναι 1024Χ768 αλλά ίσως χρειαστεί να δουλέψετε και σε άλλες αναλύσεις. Μην αμελήσετε να τις δοκιμάσετε, διότι εκεί η απόδοση συνήθως πέφτει πολύ. Επίσης πρέπει τη στιγμή της παραλαβής να ανάβεται η οθόνη και να ελέγχεται. Βλέπετε, με τις επίπεδες έχουμε ακόμη συχνά την περίπτωση κολλήματος όπου λόγω της κατασκευής κάποια εικονοστοιχεία παραμένουν σκοτεινά ή για πάντα φωτεινά. Η περίπτωση απαιτεί πολύ προσεκτική παρατήρηση εκ μέρους του αγοραστή και άμεση αλλαγή εκ μέρους του πωλητή. Μην παραλείψετε να κοιτάξετε τις οθόνες αυτές και λοξά και να συγκρίνετε προσεκτικά την αριστερή με τη δεξιά πλευρά της εικόνας. Οι ασκήσεις αυτές μερικές φορές κρύβουν εκπλήξεις.
Οι προβλέψεις πάντως είναι καθησυχαστικές για τους κατασκευαστές. Παρ' ότι τώρα οι επίπεδες οθόνες είναι ακριβές σε σχέση με τις συμβατικές, η αναμενόμενη πτώση των τιμών και η βελτίωση της τεχνολογίας κάνει τους ειδικούς να προβλέψουν ότι σε πέντε χρόνια οι επίπεδες οθόνες θα έχουν ξεπεράσει σε πωλήσεις αυτές με το ηλεκτρονικό κανόνι. Στο κάθε εικονοστοιχείο έχουμε έναν ημιαγωγό αντί για ένα απλό σημείο, που φωσφόριζε ανάλογα με την ένταση στη δέσμη των ηλεκτρονίων όταν αυτή έπεφτε επάνω του. Εδώ ένα τρανζίστορ θα λειτουργήσει σαν διακόπτης. Ο ημιαγωγός αυτός φωτίζεται ή όχι ανάλογα με την εικόνα που πρόκειται να σχηματιστεί στην οθόνη. Θα ανοίξει ή δεν θα ανοίξει αν στο σημείο εκείνο της οθόνης υπάρχει κάποιο φως, κόκκινο, πράσινο ή μπλε. Γι' αυτό και οι οθόνες αυτές ονομάζονται ενεργές οθόνες, αφού στο κάθε σημείο τους πλέον υπάρχει ένα ενεργό κύκλωμα όπως θεωρείται ότι είναι ένα τρανζίστορ, ενώ από εκεί και πέρα αναλαμβάνουν οι υγροί κρύσταλλοι να δημιουργήσουν την τελική εικόνα, μια εικόνα απαλλαγμένη από κάθε εκπομπή ηλεκτρομαγνητικής ακτινοβολίας. Σε μια οθόνη 17 ιντσών η επίπεδη έκδοση έχει το ένα τέταρτο της κατανάλωσης σε ενέργεια αλλά και σε βάρος συγκρινόμενη με μια παλαιότερης τεχνολογίας, όπου το ηλεκτρονικό κανόνι είναι όλα τα κιλά. Σημειώστε ότι εργάζονται και με συνεχές ρεύμα, κάτι που διευκολύνει σε διάφορες ιατρικές εφαρμογές (τα σχετικά στοιχεία αντλήσαμε από την ειδική έκδοση για την 151 ΑΧ της Philips).

Μια αγορά με μέλλον
Οταν λοιπόν τεθεί θέμα οθόνης τα πράγματα θα είναι αρκετά καθαρά πλέον. Το μέλλον είναι επίπεδο και η όποια στρατηγική, ενός ατόμου ή μιας ολόκληρης επιχείρησης, πρέπει αυτό να το λάβει σοβαρά υπόψη. Αν είμαστε κάτοχοι μιας δεκαπεντάρας οθόνης που δεν παρουσιάζει αυτή τη στιγμή κάποιο πρόβλημα, δεν κάνουμε την παραμικρή κίνηση. Υπάρχουν πληροφορίες ότι εμφανίζονται εντός ολίγου επίπεδες οθόνες με 200.000 δραχμές, που θα δίδονται και με άτοκες δόσεις!!! Αυτό και μόνο δείχνει πόσο θα ανάψει σε λίγο ο ανταγωνισμός. Περιμένουμε λίγους μήνες και αγοράζουμε μετά. Πάντως ως το 2000 οι περισσότεροι από εμάς που είχαν δεκαπεντάρες εδώ και πέντε χρόνια δικαιούνται κάτι τόσο καλύτερο και θα το έχουν.
Κάποιος επαγγελματίας που εργάζεται ή θα εργαστεί εντατικά μπροστά σε μια ηλεκτρονική οθόνη επί ώρες κάθε ημέρα δεν μπορεί να περιμένει για πολλούς μήνες. Θα πάει για μια δεκαεπτάρα ή και μεγαλύτερη αυτή τη στιγμή. Θα τον σταματήσει μόνο η τιμή. Τα μάτια του δεν μπορούν να ταλαιπωρηθούν έστω και για ένα εξάμηνο με πάνω από πέντε ώρες εργασίας μπροστά στην οθόνη. Ενώ η αυξημένη απόδοση που παρατηρείται σε όσους εργάζονται επαγγελματικά μπροστά σε μεγάλες οθόνες θα αντισταθμίσει κατά ένα μέρος και τη δαπάνη. Οι μεγαλύτερες των 17 ιντσών οθόνες απευθύνονται αυτή τη στιγμή μόνο σε επαγγελματίες, αφού οι ερασιτέχνες θα περιμένουν προς το παρόν για λίγο ακόμη.
Μάλλον θα το μετανιώσει όποιος σήμερα έστω και με ολοκαίνουργιο σύστημα, για ερασιτεχνική χρήση ή έστω για ανάπτυξη εφαρμογών χωρίς βαριές απαιτήσεις από την πλευρά των εικόνων, αγοράζει οθόνη με διαγώνιο μεγαλύτερη από 17 ίντσες. Με την εξέλιξη της αγοράς και τα όσα προβλέπουν οι οικονομικές αναλύσεις δεν θα προλάβει να κάνει απόσβεση της επένδυσής του προτού έλθει η ώρα για μια νέα οθόνη επίπεδης μορφής. Πόσο μάλλον όσοι προβαίνουν σε προμήθειες μεγάλων ποσοτήτων για σχολεία ή επιχειρήσεις, οι οποίοι πρέπει να είναι πολύ προσεκτικοί γιατί θα κυκλοφορεί σε λίγο πολλή παλιατζούρα που θα πρέπει οι εισαγωγείς να διώξουν με κάθε τρόπο.
ΑΛΚΗΣ ΓΑΛΔΑΔΑΣ

ΤΟ ΒΗΜΑ, 06-12-1998 Κωδικός άρθρου: B12510C231

display.PLASMA

name::
* McsEngl.display.PLASMA@cptIt,

Plasma TVs use thousands of sealed, low pressure glass chambers filled with a mixture of neon and xenon. Behind these chambers are colored phosphors, one red, one blue, and one green for each chamber. When energized, these chambers of "plasma" emit invisible UV light. The UV light strikes the red, green and blue phosphors on the back glass of the display making them produce visible light.

PLASMA VS. LCD
Review Date 4-1-2003 By Phil Conner Copyright © 2003 PlasmaTVBuyingGuide.com All Rights Reserved.

Which is better, Plasma or LCD? It depends. This is a complicated and detailed topic between two technologies that process and display incoming video or computer input entirely differently. Both technologies are advancing rapidly and both are bringing down costs and end user prices at the same time. The collision between the two will take place in the 40" (diagonal) range of monitor/TV in the very near future.
The following are some advantages of each technology and how those advantages relate to a purchaser of either - for different uses:

1) SCREEN BURN-IN
LCD has almost no static image screen burn-in factors to consider. LCD (liquid crystal diode) technology uses essentially a fluorescent backlight to send light through its pixel design, which contains liquid crystal molecules and polarizing substrate to give form to light and color. The "liquid" crystal in an LCD is actually used in its solid state.
Plasma technology does have static image screen burn-in factors to consider. Static images will begin to "burn-in" the image displayed in a short period of time, approximately 15 minutes in some cases. Though the "burn-in" can generally be "washed" out using gray images or continual full color ranges over several hours, burn-in is a significant factor and hindrance to the plasma technology.
Advantage: LCD For applications such as airport displays with flight information, or retail static sales images displaying the same information or pictures on a continual basis - an LCD monitor will be the superior choice.

2) CONTRAST
Plasma technology has come a long way in developing higher contrast images. Panasonic now boasts that its plasma displays have a 3000:1 contrast ratio. Plasma technology simply blocks the power emitted (through complicated internal algorithms) to specific pixels in order to form dark or black pixels. While sometimes hurting gray scaling, this technique does produce dark blacks.
LCD by contrast has to increase the power voltage to make pixels darker. Thus, the higher the voltage surging into and through the pixel, the darker the LCD pixel. Though there are improvements in LCD contrast and black level, even the best producers of LCD technology such as Sharp can only produce a contrast of between 500:1 to 700:1.
Advantage: Plasma For scenes with lots of dark and light shown simultaneously from film originated material, DVD content, or action in games relying on lots of black content, plasma will outperform.

3) LONGEVITY
LCD manufacturers claim figures between 50,000 and 75,000 hours for LCD monitors/TVs. An LCD can last as long as the backlight (and backlight bulbs can actually be changed out). This is because the light is passing through a prism effect of the liquid crystal to produce the light and color. It's a substrate so there is nothing to effectively burn out.
Plasma by contrast uses a small electric pulse for each pixel to excite the rare natural gases argon, neon and xenon (phosphors) used to produce the color information and light. As electrons excite the phosphors oxygen atoms dissipate. These rare gases actually have a life and fade over time. Manufacturers of plasma place a time stamp of 25,000 to 30,000 hours on the life of these phosphors and thus, the display itself. They cannot be replaced. There is no phenomenon of "pumping" new gases into a plasma display.
Advantage: LCD by double or more. Again, for applications requiring industrial/commercial use such as 24/7 storefront displays, LCD is superior for longer use, without regard to picture requirements.

4) COLOR SATURATION
Color information is more specifically realized and accurately reproduced in plasma because all of the information needed to manufacture every color in the spectrum is contained in each pixel cell. Each pixel contains a blue, green, and red element to produce accurate color detailing. The saturation resulting from the plasma pixel design produces the most vibrant colors of any type of display in my opinion. Chromaticity coordinates are much more accurate on good plasma panels than on LCDs.
In LCD, controlling light waves at different speeds to allow them to pass through long thin crystal molecules is a more difficult templatefor producing accuracy and vibrancy in color. Color information benefits from the smaller pixel design of most LCD monitors, but would not be as impressive as plasma at the same size pixel level.
Advantage: Plasma by a good margin. For video content especially fast moving images, plasma technology will excel. LCD is preferred when displaying a static computer image, not only because of burn-in, but because it will also produce nice smooth color with this type of setting.

5) ALTITUDE
As mentioned earlier, LCD is a backlit technology with crystal molecules deflecting light at angles to give color and definition. As such, there is nothing to pressure the unit at altitude and no real limitations. This explains the use of LCD screens as the primary viewing screen for the airlines in flight video material.
Since the plasma display element on a plasma TV is actually a glass substrate envelope containing rare natural gases, thinner air causes increased stress on the gases inside the envelope. This increases the amount of power required to run and cool the plasma which causes louder buzzing or fan noise. These problems usually start to occur at around 6500 feet.
Advantage: LCD For any type of application above Denver, I would use LCD monitors.

6) VIEWING ANGLE
Plasma has always boasted a 160 degree viewing angle, which is as good as it gets. LCD has come a long way toward improving viewing angles. The substrate material on newer generation LCD's by Sharp and NEC has been improved drastically as well as increasing dynamic range. However, they did have a long way to go and there is still a noticeable difference between the two technologies when viewing from angles.
Advantage: Plasma Each cell is lit on its own allowing for superb brightness through every pixel. No backlit device (like LCD) will match up well from the angles with plasma.

7) COMPUTER USE
LCD displays static images from computer extremely effectively and with full color detail, no flicker, and no screen burn in.
Plasma is challenged with static images from computer. Though it will display them well, screen burn in is an issue as well as a "step" effect in the lower resolution panels when displaying static lettering (Powerpoint). Video images are good but there can be some flicker depending upon the manufacturer quality of the unit and the resolution being displayed. Plasma still wins out on angle viewing of course.
Advantage: LCD except at harsh angles.

8) VIDEO PLAYBACK
Plasma will get the nod here because of the excellent performance with fast moving images, high contrast levels, color saturation, and brightness.
With LCD there can be a "trailer" effect during fast pace scenes from video as the technology is much slower reacting to color changes. This results from the light prisms that must be produced from controlling voltages applied to "bend" the light. The higher the voltage applied to the crystal, the darker the image in that section of the LCD panel. This is also the reason for the lower contrast levels.
Advantage: Plasma by a good margin. For DVD, or any streaming video content, TV or HDTV - plasma will deliver non distracting, high contrast (depending on the plasma), high color saturation viewing. LCD has come a long way but is still challenged at the same size comparison while looking great at the smaller sizes.

9) PRODUCTION SIZE AND COST/PRICE
Though both panels are difficult to produce in large panels, plasma has proven the easier of the two as manufacturers have produced plasma panels in the 60" to 63" range. While these displays are still very costly, they have proven that they operate effectively and reliably.
LCD substrate material is difficult to produce in larger sizes without pixel defects. The largest LCD at this moment is a 40" commercial version by NEC. Before that Sharp stretched the LCD horizon from 20" to 22" then 30" and now is just starting to ship its new 37" diagonal widescreen panel.
Advantage: Plasma Even though costs and prices are coming down on both technologies (except the very large plasma panels), plasma still holds the lower cost and higher production capacity and thus pricing advantage. The 50" plasma panel size is extremely popular and is quickly gaining market share from the previously dominant 42" size. This trend of plasma being the lower cost and price producer will likely continue for at least 2 years.

10) VOLTAGE REQUIREMENTS
By using a type of fluorescent backlighting system for light production, LCD has much lower voltage requirements than its plasma counterpart. Plasma by contrast has the challenging requirement of powering hundreds of thousands of transparent electrodes to provide light and excite the encased phosphors of each cell.
Advantage: LCD by double.

Q: Why Plasma TV Monitors are Better?
Higher resolution
Plasma display devices have higher resolution than conventional TV sets, and are capable of displaying full HDTV and DTV signals as well as XGA, SVGA and VGA signals from a computer. For example, you can get plasma displays with a 1024 x 1024 pixel high-resolution that can display images at true 1080i and 720p HDTV resolution, as well as 480i and 480p HD signals.

No scan lines
Conventional CRTs use an electron beam to scan the picture tube from top to bottom at regular intervals, lighting the phosphors to create the image. In the case of standard (NTSC) TV, visible scan lines can be seen.
Most plasma displays include built-in line doubling to further improve image quality when viewing standard analog video sources such as TV broadcasts and VCR tapes.

Exceptional color accuracy
High-end plasma displays are capable of displaying 16.77 million colors -- providing superb color realism with exceptionally subtle gradations between colors.

Widescreen aspect ratio
Plasma display devices have a widescreen 16:9 aspect ratio, the relationship between the screen's width and height. This is the proper aspect ratio for HDTV, and also allows many DVD-Video movies to be viewed in widescreen format, as originally seen in the theater.

Perfectly flat screen
Plasma display monitors have screens that are perfectly flat, with no curvature whatsoever. This eliminates the edge distortion that can occur in CRT displays.

Uniform screen brightness
Unlike some rear and front projection televisions that suffer from uneven screen brightness -- seen as "hot spots" in the middle of the screen or a darkening near the edges and especially corners -- plasma displays illuminate all pixels evenly across the screen.

Slim, space-saving design
Plasma display monitors are only a few inches thin-providing installation options never before possible. In addition to stand mounting, they can be hung on a wall or from a ceiling, allowing you to enjoy big-screen home theater impact from a component that doesn't dominate floor space. Conventional TVs and front projectors, by comparison take up far more real estate and are much more limited in placement flexibility.
Plasma monitors have an elegant, understated "picture frame" appearance that blends inconspicuously with any decor; with a chassis not much wider than the display screen itself.
Because they eliminate the need for a front projection unit and a projection screen, plasma display monitors are also ideal for use in a wide variety of business and commercial applications where the use of a front projector would not be feasible.

Wide viewing angle
Plasma displays offer a viewing angle of 160 degrees (top to bottom and left to right) -- much better than rear projection TVs and LCD displays. This allows a larger number of viewers to enjoy proper image reproduction from a wider variety of locations throughout the room.

Universal display capability
Most plasma monitors can accept any video format formats. Typically, they will include composite video (NTSC, PAL SECAM) (standard RCA jacks), S-video and component video inputs, plus one or more RGB inputs to accept the video output from a computer.
Whether you want to view a sporting event on HDTV, a DVD-Video movie, a satellite broadcast or even surf the Internet with incredible big screen impact, chances are a plasma monitor will accommodate your needs.

Immunity from magnetic fields
Because plasma displays do not use electron beams, as conventional CRT displays do, they are immune to the effects of magnetic fields. Components such as loudspeakers that contain strong magnets can distort the picture if placed too close a standard TV (which has a CRT). On the other hand, plasma displays can be placed in close proximity to any type of loudspeaker and not experience image distortion.

H FUJITSU ΠΑΡΟΥΣΙΑΣΕ ΜΙΑ ΕΓΧΡΩΜΗ ΕΠΙΠΕΔΗ ΟΘΟΝΗ ΠΛΑΣΜΑΤΟΣ 21 ΙΝΣΩΝ.

display.SPECIFIC-DIVISION.BRAND'NAME

name::
* McsEngl.display.SPECIFIC-DIVISION.BRAND'NAME@cptIt,

CTX:
έχουν το πιστοποιητικό ISO_9002, ΠΟΥΛΙΑΔΗΣ & ΣΥΝ.

ErgoView:
of SIGMA DESIGNS, ΣΟΥΗΔΙΚΕΣ ΠΡΟΔΙΑΓΡΑΦΕΣ ΓΙΑ ΜΕΙΩΜΕΝΗ ΑΚΤΙΝ, OFFITECH

MICROSCAN/ADI
14", 15", 17" (130-315 ΧΙΛ ΔΡΧ, 1993) ALTEC

SAMTRON
ΒΙΟΛΟΓΙΚΗ ΟΘΟΝΗ. Η τηλεπερυθρη ακτινοβολία, διεγείρει τη δραστηριότητα των κυττάρων του σώματος, απαλύνει τους πόνους και ευνοεί την ανάπτυξη των ζωντανών οργανισμών. Εκπέμπουν χαμηλή ακτινοβολία σύμφωνα με το MPRII.

IBM PC πέτρου

Το manual είναι στο κουτι 10.

VIEWSONIC

ViewSonic VG712

Η εταιρεία ViewSonic ανακοίνωσε τη διάθεση μίας νέας LCD οθόνης 17'' που απευθύνεται κυρίως σε επαγγελματίες γραφίστες ή φωτογράφους αλλά και σε όσους ασχολούνται με το video-gaming.
H VG 712 χάρη στην τεχνολογία panel PVA που ενσωματώνει, εγγυάται πιστή απεικόνιση χρωμάτων και σταθερή χρωματική απόδοση σε κάθε γωνία θέασης. Επιπλέον, ο υψηλός λόγος αντίθεσης (500:1) και η υψηλή φωτεινότητα της (300 nits), υπόσχονται τέλεια ευκρίνεια εικόνας και κορυφαίες επιδόσεις για επεξεργασία γραφικών ή multimedia.
O χρόνος απόκρισης video των 12ms, σε συνδυασμό με την ψηφιακή είσοδο DVI και τα ενσωματωμένα στερεοφωνικά ηχεία που διαθέτει, μετατρέπουν την απλή θέαση, παιχνιδιών ή ταινιών από τον υπολογιστή, σε αληθινή διασκέδαση!
Η VG 712 έχει ενδεικτική λιανική τιμή πώλησης τα 422 € συν Φ.Π.Α. και συνοδεύεται από 3ετή εγγύηση On-site.
[Flash 2004-12-06]

display.SPECIFIC-DIVISION.SIZE

name::
* McsEngl.display.SPECIFIC-DIVISION.SIZE@cptIt,

display.17

name::
* McsEngl.display.17@cptIt,

NOKIA
* 447W, multimedia, 294000 drx, okt.1996, Elnet

PANASONIC
* TX-D1734F, multimedia, 270000 drx, okt.1996, Intertech#cptItorg391#
* 230.000 Giannena

PHILIPS:
* 107 Brilliance:
This 17" high resolution monitor has a VIS of 15.9", 0.26mm dot pitch, an auto-scanning frequency of 30-86 KHz and delivers true colour resolutions of up to 1280 by 1024 at 80Hz. It also has CustoMax and Colorific® software for colour correction to ensure WYSIWYG (What You See Is What You Get) colour between monitor and printer. Connection to the PC is via a standard D-sub connector. The high contrast screen makes this ideal for frequent and/or demanding business use.
[http://www.philips.com/sv/press/107.html, 1996]
1 Watt, front firing speakers and a microphone are built-in

will be the first monitors to be supplied with a USB hub built in.

easily passed the certification for TCO 1995 - often exceeding the legal minimum requirements.

SONY:
Η Sony παρουσίασε μία νέα οθόνη με καθοδικό σωλήνα Trinitron διαγώνιας διάστασης 17 ιντσών. Το μοντέλο CPD-220VS απευθύνεται στις αγορές των multimedia και επεξεργασίας γραφικών και ως εκ τούτου ενσωματώνει τεχνολογία βελτίωσης εικόνας και σύστημα ήχου με δύο μεγάφωνα των 3,5 watt, ένα subwoofer ισχύος 10-watt και μικρόφωνο. Η οθόνη είναι συμβατή με PC και Macintosh και η τιμή της θα γίνει γνωστή με την επίσημη εμφάνιση την πρώτη μέρα του Φλεβάρη. [HOL 1997jan]

VIEWSONIC
* 17GA, multimedia, 237000 okt.1996, Brain Trust.

*****************************************************************

SIEMENS-NIXDORF
Κορυφαία Γερμανική Τεχνολογία Color Monitor 17", 1280 x 1024 159.900+, BCC OKT. 1996,

DAEWOO
CMC-1701M2, 292000 δρχ +φπα, δεκ.1994,

eizo flexscan l550

Analog Input Digital Input
Models L550
Available Cabinet Colors Gray, Black, Two-Tone (gray & black)
Panel Type 43 cm (17") TFT color LCD panel Active Display Size (H x V) 338 x 270 mm / 13.3 x 10.6" Viewable Image Size Diagonal: 432 mm / 17.0"
Native Resolution 1280 x 1024
Pixel Pitch 0.264 x 0.264 mm
Display Colors 16.19 million
Viewing Angles (H, V) 160° , 160° (at contrast ratio of 5:1)
Brightness 300 cd/m2
Contrast Ratio 450:1
Response Time 16 ms (typical) Scanning Frequency H: 31.5 - 80 kHz V: 56 - 75 Hz H: 31.5 - 64 kHz V: 59 - 61 Hz (VGA Text: 69 - 71 Hz) Dot Clock 135 MHz 108 MHz Input Terminals D-Sub mini 15 pin, DVI-D 24 pin (switchable) Input Signals RGB Analog DVI Standard 1.0 Sync Format Separate Tilt 13 - 35° Power Requirements AC 100 - 120V, 200 - 240V: 50 / 60 Hz Power Consumption 38 watts Power Save Mode Less than 2 watts Dimensions (W x H x D) Stand Extended 13 - 35° : 369 x 298 - 344.5 x 120.5 - 222.5 mm 14.5 x 11.7 - 13.6 x 4.7 - 8.8" Stand Fully Collapsed: 369 x 350.5 x 52 mm 14.5 x 13.8 x 2.0" Net Weight 3.9 kg / 8.6 lbs Plug & Play VESA DDC 2B Screen Control ScreenManager®, One Touch Auto Adjustment Function Power Management VESA DPMS DVI DMPM OSD Languages English, French, German, Italian, Japanese, Spanish, Swedish Certifications and Standards TCO'03 (gray, two-tone), TCO'99 (black), TUV/Ergonomics (including ISO 13406-2), TUV/GS, c-Tick, CE, CB, UL (cTUVus), CSA (cTUVus), FCC-B, Canadian ICES-003-B, TUV/S, VCCI-B, EPA ENERGY STAR®, EIZO Eco Products 2004 Supplied Accessories AC power cord, signal cable (D-Sub mini 15 pin ~ D-Sub mini 15 pin), setup guide, EIZO LCD Utility Disk (PDF user's manual, ICC Profile), 4 screws for mount option, warranty registration card Warranty Five years

sony sdm-x73h

TCO-03

arenavn Sony DELUXEPRO SDM-X73
Varenummer SDM-X73/H Vζgt (fragt) 6 Kg.
1280x1024/85Hz TFT Flat Panel Display / TFT Active Matrix
Triple Input: DVI-D 2xHD15 Hψjttalere
Response Time 16 ms
Image Brightness 300 cd/m2
Image Contrast Ratio 500:1
Image Max H-View Angle 160 Image Max V-View Angle 140
Color: Grey

Thoughtfully designed to optimize comfort and maximize performance, the 17" DeluxePro?SDM-X73 Flat Panel LCD is perfect for freeing up workspace. It features the smooth ErgoStand?control system for height control with a swivel base and tilt to achieve custom viewing positions. The auto-sensing ErgoBright?technology adapts to your work environment and saves energy. Its multi-input digital and analog connections protect your investment.
Specifications
LCD Panel
Panel Type: TFT Active Matrix
Picture Size: 17 inch
Native Resolution: 1280 x 1024
Pixel Pitch: 0.264 mm
Brightness: 300 cd/m?#60;/li>
ErgoBright?Technology: Auto 50 cd/m?- 300 cd/m?#60;/font> High 300 cd/m?#60;/font> Middle 250 cd/m?#60;/font> Low 100 cd/m?#60;/font>
Contrast Ratio: 500:1
Viewing Angle: Horizontal 160?/ Vertical 140?#60;/li>
Response Time: 16 ms
Video Input Connectors (Supports simultaneous connections)
Digital: DVI-D Analog RGB: 2x HD15 - 15-pin HD D-Sub
Audio
Stereo Speakers with HPJ Headphones jack: Stereo minijack
Power
Consumption (Max/ECO): Normal Operation 45W (max) Stand by/ Sleep 1W (max) Power Off 0W (max)
Management: ErgoBright?- High 35W / Middle 35W / Low 17W
Plug & Play
DDC (Display Data Channel) 2B
Other
Auto ImageSet technology - optimizes picture performance/quality Security: Kensington Lock compatible VESA Wall/Arm Mount (75 mm); Stackable ErgoStand?Control System: Tilt Range 5?to +20, swivel 350? heighten up to 4" Cable Management System Internal Power Supply US Government Trade Compliant PC/Mac Compatible (Mac setup utility CD Included)

display.15

name::
* McsEngl.display.15@cptIt,

EIZO:
F351, 149000 drh +fpa, mar. 1995, micro-tec,

display.tech.PAPER

name::
* McsEngl.display.tech.PAPER@cptIt,

_DESCRIPTION:
Έφτιαξαν οθόνη από ένα απλό κομμάτι χαρτί

ΑΘΗΝΑ 01/05/2015



Χαρτί που μπορεί να μετατραπεί σε οθόνη; Κι όμως είναι εφικτό, αφού επιστήμονες ανέπτυξαν μια οθόνη εκπομπής φωτός από απλό χαρτί.

Η τεχνολογία αυτή θα μπορούσε μελλοντικά να χρησιμοποιηθεί για την παραγωγή αναλώσιμων οθονών για συσκευασίες ή εφημερίδες, με φθηνά -και πιο σημαντικό- φιλικά προς το περιβάλλον υλικά.

Ο Λούντβιγκ Έντμαν και η ερευνητική ομάδα του Πανεπιστημίου Umea της Σουηδίας ανέπτυξαν αυτή την πρωτοποριακή ευρεσιτεχνία ψεκάζοντας έξι στρώματα διαφορετικών υλικών πάνω σε ένα κομμάτι χαρτί. Η ομάδα χρησιμοποίησε κόλλα, 4 στρώματα τα οποία μεταφέρουν ρεύμα και μετατρέπουν το ηλεκτρικό σε φως, και τα επικάλυψαν με ένα επιπλέον στρώμα προκειμένου όλα τα υλικά να παραμείνουν στη θέση τους. Στη συνέχεια, τροφοδότησαν το χαρτί με ηλεκτρική ενέργεια τάσεως 11 volt κάνοντάς το να φωτίζει σαν μια κανονική οθόνη υπολογιστή.

Ο Έντμαν δήλωσε ότι η ευρεσιτεχνία αυτή θα μπορούσε να χρησιμοποιηθεί ως μια χαμηλού κόστους εναλλακτική λύση για την κατασκευή οθονών αντίστοιχων των LED και OLED, αναφέρει σε άρθρο του το περιοδικό New Scientist.

Το φως θα μπορούσε να «τυπωθεί» με τον ίδιο τρόπο που τυπώνεται μια εφημερίδα, ενώ είναι εξαιρετικά ευέλικτο και δεν σπάει, σε αντίθεση με το γυαλί που χρησιμοποιείται στις οθόνες.

Άλλες χρήσεις για το χαρτί που εκπέμπει φως θα μπορούσαν να περιλαμβάνουν την τοποθέτηση ετικετών σε αναλώσιμα τρόφιμα ώστε να ανάβει αυτόματα και να ειδοποιεί όταν πλησιάζει η ημερομηνία λήξης του προϊόντος, ή να υπενθυμίζει σε έναν ασθενή να πάρει τα φάρμακά του.

Πηγή: ΑΠΕ/ΜΠΕ
[http://www.nooz.gr/tech/o8oni-apo-ena-aplo-kommati-xarti]

display.SAMSUNG-SYNCMASTER-2032BW

name::
* McsEngl.display.SAMSUNG-SYNCMASTER-2032BW@cptIt,

(PER.168193) SAMSUNG SYNCMASTER 2032BW

Η νέα Samsung 2032BW είναι μια οθόνη ευρείας θέασης καθώς και κορυφαίας ανάλυσης με λεπτό και εργονομικό design. Φανταστείτε άπλετο χώρο εργασίας στο desktop σας καθώς και την απόλυτη απεικόνιση τόσο σε χρώματα όσο και σε ποιότητα. Με χαρακτηριστικά που φτάνουν το άψογο και τελειότητα η οποία σας προσφέρεται απλόχερα, σκεφτείτε με νέα δεδομένα την εργασία σας αλλά και τις αγαπημένες σας ασχολίες.
Τύπος Οθόνης: 20 ιντσών Έγχρωμη TFT-LCD Wide με 16.7 εκατομμύρια χρώματα.
Ανάλυση: 1680 x 1050 στα 60Hz.
Μέγεθος κουκίδας: 0.258 x 0.258 mm.
Χρόνος απόκρισης: 2ms (GtoG).
Γωνίες θέασης: Οριζόντια: 170 μοίρες, Κατακόρυφα: 170 μοίρες.
Κοντράστ: 3000:1(Dynamic), 1000:1 typ.
Φωτεινότητα: 300 cd/τμ.
Είσοδος Σήματος: D-Sub (Αναλογική), DVI-D (Ψηφιακή).
Οριζόντια συχνότητα: 30 - 81 kHZ.
Κατακόρυφη συχνότητα: 56 - 75 Hz.
Αλλα Χαρακτηριστικά: Δυνατότητα Περιστροφής βάσης, DVI(HDCP), MagicBright3.
Χρώμα: Γυαλιστερό Μαύρο.
Διαστάσεις (W x H x D): 476 x 390 x 199 mm (με την βάση).
Κατανάλωση: On 50W, Standby <1W.
Βάρος: 4.75 kg (καθαρό).
Εγγύηση: 3 χρόνια.


Κατασκευαστής:  SAMSUNG
Κατηγορία:  ΟΘΟΝΗ / SAMSUNG στην κατηγορία ΟΘΟΝΗ
Υποκατηγορία:  TFT 20
Τιμή:  136.97 € + 26.02 € 19% ΦΠΑ = 163.00 €
Διαθεσιμότητα:  1-2 εργάσιμες ημέρες / Δείτε διαθεσιμότητα καταστημάτων Αθήνας

FvMcs.computer'DISPLAY-FILTER

name::
* McsEngl.conceptIt463,
* McsEngl.computer'DISPLAY-FILTER@cptIt,
* McsEngl.FvMcs.computer'DISPLAY-FILTER@cptIt,
* McsEngl.display-filter@cptIt,
* McsEngl.filter@cptIt463,
* McsElln.ΦΙΛΤΡΟ-ΟΘΟΝΗΣ@cptIt,

ΑΝΤΑΝΑΚΛΑΣΗ ΦΩΤΟΣ

ΑΠΟΡΗΤΟ/PRIVACY

Μόνο αυτος που κάθεται μπροστα βλέπει.

ΘΑΜΒΟΣ/GLARE

ΚΟΝΤΡΑΣΤ ΧΡΩΜΑΤΩΝ

ΣΤΑΤΙΚΑ ΦΟΡΤΙΑ ΗΛΕΚΤΡΙΣΜΟΥ

RADIATION

STANDARD#cptIt139#

ΟΔΗΓΙΑ ΕΟΚ 90/270

SPECIFIC

Specific_concepts (level 3) =

3M HELLAS:
3M PRIVACY/Anti-Glare PF 300

POLAROID:
ΑΑΝΚΑL, ΣΠ. ΤΡΙΚΟΥΠΗ 21 ΕΞΑΡΧΕΙΑ, ΣΥΜΦΩΝΑ ΜΕ ΤΙΣ ΟΔΗΓΙΕΣ ΤΗΣ ΕΟΚ 90/270..

GRARE/GUARD:
ΦΙΛΤΡΑ 99,9% ΜΕΙΩΣΗ ΑΝΤΑΝΑΚΛΑΣΗΣ, 98% ΜΕΙΩΣΗ VLF/ELF ΑΚΤΙΝΟΒΟΛΙΑΣ
 GLARE/GUARD MAXIMUM PLUS, 99.9% OF ELF/VLF, 20.000 DRX
 GLARE/GUARD MULTIGUARD PROFESSIONAL PLUS, 10.000 DRX; ΤΡΙΑΣ ΑΝΑΛΩΣΙΜΑ.
 ΤΑ ΠΟΥΛΑΕΙ ΚΑΙ Η BUSINESS IMAGING SYSTEMS 689.9135-7

FvMcs.computer'MEMORY

name::
* McsEngl.conceptIt999,
* McsEngl.computer'MEMORY@cptIt,
* McsEngl.FvMcs.computer'MEMORY@cptIt,
* McsEngl.computer-memory@cptIt,
* McsEngl.computer'memory@cptIt999,
* McsEngl.memory.computer@cptIt999,
* McsElln.ΜΝΗΜΗ-ΥΠΟΛΟΓΙΣΤΗ@cptIt,

DEFINITION

I don't like the name of this concept.

COMPUTER-MEMORY is any HARDWARE the computer#cptIt227.1# uses to hold information.
[Nikos, 1998feb07]

ΜΝΗΜΗ ΥΠΟΛΟΓΙΣΤΗ είναι ΥΛΙΚΟ#cptIt1# που χρησιμοποιείται να κρατάει πληροφορίες#cptIt242#.
[ΝΙΚΟΣ, ΟΚΤ 1996]

GENERIC

_GENERIC:
* entity.economic.satisfierWorking.techInfo.hardware#cptItsoft1#

CAPACITY#cptIt14.1#

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt999#


MAIN-MEMORY-(RAM)#cptIt140: attSpe#
CACHE-MEMORY#cptIt89: attSpe#
SECODARY-MEMORY-(STORAGE)#cptIt14: attSpe#
VIDEO-MEMORY#cptIt510: attSpe#

CHIP or NOT SPECIFIC-DIVISION

MEMORY-CHIP#cptIt990: attSpe#

SECONDARY-MEMORY#cptIt14: attSpe#

MISC SPECIFIC-DIVISION

virtual'memory#cptIt191: attSpe#

FvMcs.computer'MEMORY-CHIP

name::
* McsEngl.conceptIt990,
* McsEngl.computer'MEMORY-CHIP@cptIt,
* McsEngl.FvMcs.computer'MEMORY-CHIP@cptIt,
* McsEngl.memory-chip@cptIt,
* McsEngl.memory'chip@cptIt990,

DEFINITION

MEMORY CHIP is a COMPUTER-MEMORY#cptIt999# that is used NOT as SECONDARY MEMORY.
[NIKOS, 1997jul]

GENERIC

_GENERIC:
Computer Memory#cptIt999#

CAPACITY#cptIt14.1#

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt990#

EEROM {Electrically Erasable programmable ROM}

EPROM {Erasamble and Programmable ROM}

EPROM: H ΔΙΑΦΟΡΑ ΤΗΣ ΜΕ ΤΗ RAM EINAI OTI ΧΡΕΙΑΖΕΤΑΙ ΕΙΔΙΚΗ ΣΥΣΚΕΥΗ ΓΙΑ ΤΟ ΣΒΗΣΙΜΟ.

ETOX {EPROM TUNNEL OXIDE} INTEL

OTPROM {One Time Programmable ROM}

PROM {Programmable ROM}

PSRAM {pseudo SRAM; A type of DRAM that acts like SRAM}

RAM-(random-access-memory)#cptIt140: attSpe#

name::
* McsEngl.RAM-(random-access-memory)@cptIt,

ROM {Read Only Memory}

Read Only Memory is the type of memory chip that can be read but cannot be written on or altered. ROM provides permanent storage for program instructions and is most often used in microprocessors that always execute the same program such as an electronic game.
ROM's are prepared by the manufacturer and cannot be altered once the chips are made.
ROM is non-volatile, that is, the data stored in ROM remains even after the power is turned-off.
[SOURCE: PC-GLOSSARY 1993]

UV-EPROM {ultraviolet EPROM}

FvMcs.computer'PROCESSOR

name::
* McsEngl.conceptIt13,
* McsEngl.computer'PROCESSOR@cptIt,
* McsEngl.FvMcs.computer'PROCESSOR@cptIt,
* McsEngl.microprocessor@cptIt13,
* McsEngl.processor@cptIt13,
* McsElln.ΕΠΕΞΕΡΓΑΣΤΗΣ@cptIt13,
* McsElln.ΜΙΚΡΟΕΠΕΞΕΡΓΑΣΤΗΣ@cptIt,

The introduction of the microprocessor in the 1970s significantly affected the design and implementation of CPUs. Since the introduction of the first microprocessor (the Intel 4004) in 1970 and the first widely used microprocessor (the Intel 8080) in 1974, this class of CPUs has almost completely overtaken all other central processing unit implementation methods. Mainframe and minicomputer manufacturers of the time launched proprietary IC development programs to upgrade their older computer architectures, and eventually produced instruction set compatible microprocessors that were backward-compatible with their older hardware and software. Combined with the advent and eventual vast success of the now ubiquitous personal computer, the term "CPU" is now applied almost exclusively to microprocessors.
[http://en.wikipedia.org/wiki/CPU]

DEFINITION

Μικροεπεξεργαστής είναι μια ειδική μορφή ΚΕΝΤΡΙΚΗΣ ΜΟΝΑΔΑΣ ΕΠΕΞΕΡΓΑΣΙΑΣ της οποίας όλα τα βασικά ηλεκτρονικά κυκλώματα βρίσκονται σε ένα ολοκληρωμένο κύκλωμα (chip).
[Γιαλούρης κα, Εφαρμογές Πληροφορικής... Α',Β',Γ' Ε.Λυκείου, 1998 α' έκδοση, 46]

Single-chip central-processing-units#cptIt534.1#, called microprocessors, made possible personal computers and workstations.
"Central Processing Unit," Microsoft(R) Encarta(R) 97 Encyclopedia. (c) 1993-1996 Microsoft Corporation. All rights reserved.

processor'GENERIC

_GENERIC:
* CPU#cptIt534#
* INTEGRATED_CIRCUIT#cptItsoft222#

processor'WHOLE

_WHOLE:
* Motherboard#cptIt984#

processor'ENVIRONMENT#cptCore756#

name::
* McsEngl.processor'ENVIRONMENT@cptIt,

processor'COOLER

name::
* McsEngl.processor'COOLER@cptIt,

Checkmate International εισάγει αθόρυβα ανεμιστηράκια της Global Win για την ψύξη επεξεργαστών και σκληρών δίσκων.
[ΡΑΜ, 1999μαρ, 14]

processor'ARCHITECTURE (ISA)

name::
* McsEngl.processor'ARCHITECTURE (ISA)@cptIt,
* McsEngl.processor-architecture@cptIt13i,
* McsEngl.cpu-architecture@cptIt13i,
* McsEngl.architecture-of-processor@cptIt13i,
* McsEngl.instruction-set-architecture@cptIt13i,
* McsEngl.ISA@cptIt,

_DEFINITION:
An instruction set, or instruction set architecture (ISA), is the part of the computer architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external I/O. An ISA includes a specification of the set of opcodes (machine language), and the native commands implemented by a particular processor.[citation needed]
[http://en.wikipedia.org/wiki/Instruction_set_architecture]
===
Η αρχιτεκτονική ενός υπολογιστή χαρακτηρίζεται ανάλογα με το μέγεθος των REGISTERS, δηλαδή πόσα bit μπορούν να συγκρατήσουν πχ. 16bit, 32bit, 64bit, 128bit, εύρος που ακούγεται περισσότερο στους επεξεργαστές των καρτών γραφικών παρά στις CPU.
[RAM, 1999mar, Γ. Τζεβελέκος 224]
===
Ενας επεξεργαστής Itanium χαρακτηρίζεται 64μπιτος από τη 64μπιτ διεύθυνση μνήμης που έχει.
[RAM 1999νοεμ, 238]

EVOLEINO:
1992: 64bit
η Digital παρουσίασε τον πρώτο 64μπιτο τον 21064 ενώ ακολούθησαν αμέσως η Sun και η IBM [ram 1999nov, 238]

TUTEINO:
* COMPUTER_ARCHITECTURE#ql:computer_architecture-*###

processor'BIT-NUMBER

name::
* McsEngl.processor'bit-number@cptIt13i,

SPECIFEINO

680x0:
στους παλιότερους Mac,
[RAM, 1999mar, Γ. Τζεβελέκος 226]

Alpha:
της DEC που χρησιμοποιείται σε ισχυρούς server.
[RAM, 1999mar, Γ. Τζεβελέκος 226]

IA-32 (Intel Architecture 32bit) or Intel x86:
Παρουσιάστηκε για πρώτη φορά το 1978 με το chip 8086. Από τότε έχει εξελιχθεί και έχει φτάσει στην 6η γεννιά της, αυτή του Pentium Pro.
[RAM, 1999mar, Γ. Τζεβελέκος 226]

IA-64:
Την περιμένουμε το 2000, αναπτύσσεται απο την Intel και την Hewlett-Packard, είναι 64bit, και θα συνοδεύεται από ένα νέο είδος εντολών, τις EPIC, Explicity Parallel Instruction Computing.
[RAM, 1999mar, Γ. Τζεβελέκος 229]

Mips Rx000:
της Silicon Graphics
[RAM, 1999mar, Γ. Τζεβελέκος 226]

PA-RISC:
της Hewlett-Packard.
[RAM, 1999mar, Γ. Τζεβελέκος 226]

PowerPC:
Στους σύγχρονους Macintosh.
[RAM, 1999mar, Γ. Τζεβελέκος 226]

SPARC:
της Sun Microsystems.
[RAM, 1999mar, Γ. Τζεβελέκος 226]

4(1971), 8(1972), 16(1978), 32(1985), 64(1993) Bit.

ASIP

An Application Specific Instruction-Set Processor (ASIP) is a component used in System-on-a-Chip design. The instruction set of an ASIP is tailored to benefit a specific application. This specialization of the core provides a tradeoff between the flexibility of a general purpose CPU and the performance of an ASIC.

Some ASIPs have a configurable instruction set. Usually, these cores are divided into two parts: static logic which defines a minimum ISA and configurable logic which can be used to design new instructions. The configurable logic can be programmed either in the "field" in a similar fashion to FPGA or during the chip synthesis.
[http://en.wikipedia.org/wiki/Application_Specific_Instruction_Set_Processor]

CISC

name::
* McsEngl.cisc@cptIt13i,

_DEFINITION:
A complex instruction set computer (CISC, pronounced like "sisk") is a microprocessor instruction set architecture (ISA) in which each instruction can execute several low-level operations, such as a load from memory, an arithmetic operation, and a memory store, all in a single instruction. The term was retroactively coined in contrast to reduced instruction set computer (RISC).
[http://en.wikipedia.org/wiki/CISC]

EPIC

name::
* McsEngl.EPIC@cptIt13i,

Explicitly Parallel Instruction Code of Intel Itanium. Αποτελεί ουσιαστικά συνδυασμό του RISC και μιας τεχνικής ονόματι VLIW (Very Long Instruction Word). Αφήνει δε τον μεταγλωττιστή του προγράμματος να τροποποιήσει τον πηγαίο κώδικα, ώστε αυτός να βελτιστοποιηθεί για παράλληλη επεξεργασία.
[RAM, 1999νοεμ, 238]

RISC

name::
* McsEngl.RISC@cptIt,

_DEFINITION:
The reduced instruction set computer (RISC, pronounced like "risk") is a CPU design philosophy that favors an instruction set reduced both in size and complexity of addressing modes, in order to enable easier implementation, greater instruction level parallelism, and more efficient compilers. As of 2007, common RISC microprocessors families include the DEC Alpha, ARC, ARM, AVR, MIPS, PA-RISC, Power Architecture (including PowerPC), and SPARC.
The idea was originally inspired by the discovery that many of the features that were included in traditional CPU designs to facilitate coding were being ignored by the programs that were running on them. Also these more complex features took several processor cycles to be performed. Additionally, the performance gap between the processor and main memory was increasing. This led to a number of techniques to streamline processing within the CPU, while at the same time attempting to reduce the total number of memory accesses.
[http://en.wikipedia.org/wiki/Load-store_architecture]

MISC

name::
* McsEngl.misc@cptIt13i,

MISC (Minimal Instruction Set Computer) is a processor architecture with a very small number of basic operations and corresponding opcodes. Such instruction sets are commonly stack based rather than register based to reduce the size of operand specifiers. Such a stack machine architecture is inherently simpler since all instructions operate on the top most stack entries. A result of this is a smaller instruction set, a smaller and faster instruction decode unit, and overall faster operation of individual instructions. The downside is that instructions tend to have more sequential dependencies, reducing instruction-level parallelism. MISC architectures have a lot in common with the Forth programming language, and the Java Virtual Machine.
Probably the most commercially successful MISC was the INMOS transputer.
[http://en.wikipedia.org/wiki/Minimal_instruction_set_computer]

ZISC

name::
* McsEngl.zisc@cptIt13i,

_DEFINITION:
In computer science, ZISC stands for Zero Instruction Set Computer, which refers to a chip technology based on pure pattern matching and absence of (micro-)instructions in the classical sense.
The ZISC acronym alludes to the previously developed RISC (Reduced Instruction Set Computer) technology.
ZISC is a technology based on ideas from artificial neural networks. The concept was invented by Dr. Pascal Tannhof within IBM in Paris. It was then jointly developed by Dr. Pascal Tannhof and Dr. Guy Paillet. The first generation of ZISC chip contains 36 independent cells that can be thought of as neurons or parallel processors. Each of these can compare an input vector of up to 64 bytes with a similar vector stored in the cells memory: if the input vector matches the vector in the cells memory, the cell "fires". The output signal contains either the number of the cell that had a match or the "no matches occurred" indicator.
The parallelism is the key to the speed of ZISC systems, which eliminate the step of serial loading and comparing the pattern for each location. Another key factor is ZISC's scalability. A ZISC network can be expanded by adding more ZISC devices without suffering a decrease in recognition speed - networks with 10,000 or more cells might become common. Today's ZISC chip contains 78 neurons per chip and can find a match among 1,000,000 patterns in one second operating at less than 50 MHz. Future generation will be 1,000 neurons or more.
Practical uses of ZISC technology focus on pattern recognition, information retrieval (data mining), security and similar tasks.
[http://en.wikipedia.org/wiki/Zero_Instruction_Set_Computer]

SUPERSCALAR

name::
* McsEngl.superscalar-cpu-architecture@cptIt13i,

_DEFINITION:
A superscalar CPU architecture implements a form of parallelism called Instruction-level parallelism within a single processor. It thereby allows faster CPU throughput than would otherwise be possible at the same clock rate. A superscalar processor executes more than one instruction during a clock cycle by simultaneously dispatching multiple instructions to redundant functional units on the processor. Each functional unit is not a separate CPU core, but an execution resource within a single CPU, such as an arithmetic logic unit, bit shifter or multiplier.
[http://en.wikipedia.org/wiki/Superscalar]

processor'base

name::
* McsEngl.processor'base@cptIt,
====== lagoGreek:
* McsElln.ΒΑΣΗ-ΤΟΠΟΘΕΤΗΣΗΣ@cptIt,

Socket-A (socket-462):
κουμπώνουν οι Αθλον της AMD.

Socket-423:
Pentium 4,

Socket-370:
Pentium III,

Slot 1:
Pentium III

Socket 7 vs. Slot 1
From a system hardware perspective, Cyrix and AMD are pursuing a strategy fundamentally different from Intel's. The Pentium MMX/233 is probably the end of the Pentium interface, called Socket 7, for Intel. For continued performance and technology increases, Intel is shifting to the Pentium II interface, called Slot 1.
AMD and Cyrix have stuck with Socket 7 for several reasons. First, the Slot 1 bus is complex, and details of its operation weren't publicly available when the design of the competing processors began. Second, Intel is believed to have system-level patents that could be asserted against system makers that used non-Intel Slot 1 processors. In AMD's case, there are rumored to be specific exclusions in the company's patent cross-license with Intel that limit what AMD can do with Slot 1. And fundamentally, Slot 1 simply isn't needed today for mainstream desktop systems.
Slot 1 uses an entirely different system bus from that of Socket 7. The Slot 1 bus, functionally identical to the Pentium Pro bus, is a highly pipelined design that allows many transactions to proceed in parallel. It also allows bus operations to finish in an order different from that in which they began. This design makes it much more effective for multiple-processor systems than the Socket 7 bus.
In a single-processor system--in other words, the vast majority of desktop systems--the Slot 1 bus advantages are minor. The Slot 1 design's big advantage in such systems is that there is a second bus, hidden inside the cartridge, that connects the processor to the cache SRAM. This approach, which Intel calls the Dual Independent Bus (DIB) architecture, enables the cache interface to run faster than the system bus. It also makes it possible for Intel to use different cache interface speeds while keeping the system interface constant. At 266 MHz, the Pentium II L2 cache bus runs at 133 MHz--twice the speed of the 66-MHz system bus in a Pentium system. In addition, all of the system bus bandwidth is available for main memory and input/output traffic, whereas a Socket 7 system must handle L2 cache transactions on the system bus as well.
To mitigate the limitations of the Socket 7 bus bandwidth, AMD and Cyrix each gave their latest processors twice the L1 cache of Intel's Pentium MMX or Pentium II. This means that more memory accesses are satisfied by the on-chip cache, so there is less traffic on the system bus and its speed limits are less constraining. The fact that the L2 cache must run at the system bus speed, however, even as CPU speeds approach 300 MHz, is a serious limitation.
One way to get around this limit is to increase the system bus speed. Cyrix already uses a 75MHz bus in its 6x86MX-PR233, and both AMD and Cyrix will move to 83 or 100 MHz bus speeds for some future CPUs. This pushes the limits of what can be achieved with the Socket 7 bus, and chip set design at these speeds will be difficult. Note that even at 100 MHz, the system bus would be slower than the L2 cache bus in the slowest Pentium II system. Intel plans to move to a 100-MHz system bus for the Pentium II in 1998, and the Pentium II's L2 cache speeds will exceed 150 MHz.
The midterm solution for AMD, Cyrix, and other x86 contenders is to integrate the L2 cache on the processor chip. In 1998, at least two processors are likely to be available that put a 256K L2 cache on-chip. This cache will have its own private bus to the processor--just like a Pentium II cartridge--and everything will be on a single piece of silicon. This technique should keep Socket 7 systems viable, except at the high end of the market, through 1998.
In time, however, Intel's competitors will have to move to a new bus design. They might produce CPUs compatible with Slot 1 (or its successor) in 1999, or they may move to a completely new bus design.
[http://www8.zdnet.com/pcmag/features/cpu/cpu4.htm 1997aug]

processor'INSTRUCTION

name::
* McsEngl.processor'INSTRUCTION@cptIt,
* McsEngl.machine-instruction@cptIt13i,
* McsEngl.instruction-of-processor@cptIt13i,

_DEFINITION:
Instructions are patterns of bits with different patterns corresponding to different commands to the machine.
[http://en.wikipedia.org/wiki/Machine_instruction]

In computer science, an instruction is a single operation of a processor defined by an instruction set architecture. In a broader sense, an "instruction" may be any representation of an element of an executable program, such as a bytecode.
On traditional architectures, an instruction includes
- an opcode specifying the operation to be performed, such as "add contents of memory to register", and
- zero or more operand specifiers, which may specify registers, memory locations, or literal data. The operand specifiers may have addressing modes determining their meaning or may be in fixed fields.
[http://en.wikipedia.org/wiki/Instruction_%28computer_science%29]

LENGTH

The size or length of an instruction varies widely, from as little as four bits in some microcontrollers to many hundreds of bits in some VLIW systems. Most modern processors used in personal computers, mainframes, and supercomputers have instruction sizes between 16 and 64 bits. In some architectures, notably most Reduced Instruction Set Computers, instructions are a fixed length, typically corresponding with that architecture's word size. In other architectures, instructions have variable length, typically integral multiples of a byte or a halfword.
[http://en.wikipedia.org/wiki/Instruction_%28computer_science%29]

To μήκος των εντολών στον Itanium of Intel είναι αρκετά πολύπλοκο. Περικλείονται σε πακέτα των 128 μπιτ. Κάθε πακέτο περιλαμβάνει τρεις εντολές 41μπιτ και ένα πρότυπο έγγραφο κώδικα (template) μεγέθους μπιτ.
[RAM 1999νοε, 238]

INSTRUCTION-SET

An instruction set is (a list of) all instructions, and all their variations, that a processor can execute.
Instructions include:
* arithmetic such as add and subtract
* logic instructions such as and, or, and not
* data instructions such as move, input, output, load, and store
* control flow instructions such as goto, if ... goto, call, and return.
[http://en.wikipedia.org/wiki/Instruction_set]

processor'CACHE

name::
* McsEngl.processor'CACHE@cptIt,

A CPU cache is a cache used by the central processing unit of a computer to reduce the average time to access memory. The cache is a smaller, faster memory which stores copies of the data from the most frequently used main memory locations. As long as most memory accesses are to cached memory locations, the average latency of memory accesses will be closer to the cache latency than to the latency of main memory.
[http://en.wikipedia.org/wiki/CPU_cache]

processor'L1

name::
* McsEngl.processor'L1@cptIt,

processor'L2

name::
* McsEngl.processor'L2@cptIt,

processor'CONTROL-UNIT

name::
* McsEngl.processor'CONTROL-UNIT@cptIt,
* McsEngl.control-unit-of-processor@cptIt13i,

PROCESS:
The functions performed by the control unit vary greatly by the internal architecture of the CPU, since the control unit really implements this architecture. On a regular processor that executes x86 instructions natively the control unit performs the tasks of fetching, decoding, managing execution and then storing results. On a processor with a RISC core the control unit has significantly more work to do. It manages the translation of x86 instructions to RISC micro-instructions, manages scheduling the micro-instructions between the various execution units, and juggles the output from these units to make sure they end up where they are supposed to go. On one of these processors the control unit may be broken into other units (such as a scheduling unit to handle scheduling and a retirement unit to deal with results coming from the pipeline) due to the complexity of the job it must perform.
[http://en.wikipedia.org/wiki/Control_unit]

processor'ARITHMETIC-LOGIC-UNIT

name::
* McsEngl.processor'ARITHMETIC-LOGIC-UNIT@cptIt,
* McsEngl.ALU@cptIt13i,

_DEFINITION:
The ALU contains the circuitry to perform simple arithmetic and logical operations on the inputs (like addition and bitwise operations).
[http://en.wikipedia.org/wiki/Central_processing_unit]

The ALU is the heart of the microprocessor, and one of the essential components. It is the operative base between the registers and the control block. It performs various forms of addition, subtraction, and the extension of these to multiplication, division, exponentiation.
The logic mode relates to the operations of gating, masking, and other manipulations of the contents of the registers.
Generally, ALU architecture handles 8-bit quantities through the accumulator while the register file is composed of three 16-bit registers. Because the accumulator and the ALU are often only 8 bits wide, these three general registers can be accessed by instructions that treat them as six 8-bit registers. The choice of concept is often up to the programmer. From a hardware standpoint, the processor on many systems operates on 8-bit bytes and all I/O operations use an 8-bit data path.
[SOURCE: PC-GLOSSARY 1993]

Μέσα στον επεξεργαστή όλες οι εντολές εκτελούνται απο συγκεκριμένες ΥΠΟΛΟΓΙΣΤΙΚΕΣ ΜΗΧΑΝΕΣ που δεν κάνουν τίποτε άλλο από μαθηματικούς υπολογισμούς. Χαρακτηριστικό είναι οτι οι σύγχρονοι επεξεργαστές έχουν διαφορετικές τέτοιες μονάδες για διαφορετικούς τύπους αριθμών. Έτσι για τους ακέραιους έχουμε τα integer units, ενώ για τους δεκαδικούς οι floating point units (FPUs). Όσες περισσότερες μαθηματικές τέτοιες μονάδες έχει ένας επεξεργαστής τόσο περισσότερες μαθηματικές πράξεις μπορεί να εκτελέσει ταυτόχρονα και άρα τόσο πιο γρήγορα μπορεί να τρέξει ένα πρόγραμμα.
[RAM, 1999mar, Γ. Τζεβελέκος 224]

Inputs and outputs

The inputs to the ALU are the data to be operated on (called operands) and a code from the control unit indicating which operation to perform. Its output is the result of the computation.

In many designs the ALU also takes or generates as inputs or outputs a set of condition codes from or to a status register. These codes are used to indicate cases such as carry-in or carry-out, overflow, divide-by-zero, etc.[4]
[http://en.wikipedia.org/wiki/Arithmetic_logic_unit]

processor'FLOATING-POINT-UNIT

name::
* McsEngl.processor'FLOATING-POINT-UNIT@cptIt,
* McsEngl.fpu@cptIt13i,

A floating point unit (FPU) is a part of a computer system specially designed to carry out operations on floating point numbers. Typical operations are addition, subtraction, multiplication, division, and square root. Some systems (particularly older, microcode-based architectures) can also perform various "transcendental" functions such as exponential or trigonometric calculations, though in most modern processors these are done with software library routines.

In most modern general purpose computer architectures, one or more FPUs are integrated with the CPU; however many embedded processors, especially older designs, do not have hardware support for floating point operations.

In the past, some systems have implemented floating point via a coprocessor rather as an integrated unit; in the microcomputer era, this was generally a single microchip, while in older systems it could be an entire circuit board or a cabinet.
[http://en.wikipedia.org/wiki/Floating_Point_Unit]

processor'DATA-PATH-UNIT

name::
* McsEngl.processor'DATA-PATH-UNIT@cptIt,

In von Neumann type computers the Data path unit (DPU) is the part of the CPU, which executes computation operations and data-stream-driven data transfers from or to the CPU. In addition to the DPU a CPU also has an instruction sequencer including the program counter. But Reconfigurable Computing (RC) models do not have an instruction sequencer nor a program counter[citation needed], so that here the DPU is stand-alone. Since RC systems are data-stream-driven, data counters are used instead of a program counter. Data counters are co-located with memory blocks like e. g. Auto-sequencing memory (ASM).
[http://en.wikipedia.org/wiki/Data_path_unit]

processor'CORE-VOLTAGE

name::
* McsEngl.processor'CORE-VOLTAGE@cptIt,
* McsEngl.core-volaltage-of-cpu@cptIt13i,
* McsEngl.vcore-of-cpu@cptIt13i,

_DEFINITION:
The CPU core voltage (VCORE) is the power supply voltage supplied to the CPU (which is a digital circuit), GPU, or other device containing a processing core. The amount of power a CPU uses, and thus the amount of heat it dissipates, is the product of this voltage and the current it draws. In modern CPUs, which are made using CMOS, the current is almost proportional to the clock speed, the CPU drawing almost no current between clock ticks. (See, however, subthreshold leakage.)
[http://en.wikipedia.org/wiki/CPU_core_voltage]

A dual-voltage CPU uses a split-rail design to allow lower voltages to be used in the processor core while the external Input/Output (I/O) voltages remain 3.3 volts for backwards compatability.
Dual-voltage CPUs were introduced for performance gain when increasing clock speeds and finer semiconductor fabrication processes resulted in excess heat generation and power supply concerns, especially regarding laptop computers. Using a voltage regulator, the external I/O voltage levels would be transformed to lower voltages in order to reduce power usage, resulting in less heat being produced with the ability to operate at higher frequencies.
[http://en.wikipedia.org/wiki/Dual-voltage_CPU]

processor'EVALUATION#cptCore546.107#

NAME

name::
* McsEngl.processor'EVALUATION@cptIt,
* McsEngl.conceptIt217,
* McsEngl.processor-performance@cptIt,
* McsEngl.processor-evaluation@cptIt,
* McsEngl.processor/CPU-benchmark@cptIt,
* McsEngl.SPEED'in'PROCESSING@cptIt,
* McsEngl.speed-in-information-processing@cptIt,
* McsElln.ΕΠΙΔΟΣΗ-ΥΠΟΛΟΓΙΣΤΗ@cptIt,

GENERIC

_GENERIC:
evaluation#cptIt447#

PREFIXES


tera  T trillion
giga  G billion
mega  M million
kilo  K thousand
centi  C hundrend
milli  m 1/thosand
micro  μ 1/million
nano  n 1/billion
pico  p 1/trillion
femto  f

SPECIFIC(units of measure)

DHRYSTONE

name::
* McsEngl.drystone@cptIt,

Dhrystones
The performance of a computer system is often evaluated by measuring its operational speed in a variety of different tasks.
The Dhrystone benchmark program is used as a standard figure of merit indicating aspects of a computer system's performance in areas other than its floating-point performance, for instance, integer processes per second, enumeration, record and pointer manipulation.
Since the program does not use any floating-point operations, performs no I/O, and makes no operating system calls, it is most applicable to measuring the performance of systems programming applications.
The program was developed in 1984 and was originally written in Ada, although the C and Pascal versions became more popular by 1989.
[SOURCE: PC-GLOSSARY 1993]

It is a synthetic bencmark developed by Reinhold Weiker in the early 1980s that focuses on integer and string performance.
[BYTE, OCT. 1994, 68]

124 Dhrystone MIPS, HP PA-7100

FLOP: floating point operations per second

name::
* McsEngl.floating-point-operations-per-second@cptIt,
* McsEngl.flop@cptIt,
* McsEngl.flops@cptIt,

_DESCRIPTION:
FLOP: ΕΚΕΙ ΠΟΥ ΧΡΕΙΑΖΟΜΑΣΤΕ ΠΡΑΞΕΙΣ ΚΙΝΗΤΗΣ ΥΠΟΔΙΑΣΤΟΛΗΣ ΕΙΝΑΙ ΤΑ ΤΡΙΣΔΙΑΣΤΑΤΑ ΓΡΑΦΙΚΑ. ΟΙ ΕΦΑΡΜΟΓΕΣ PC ΔΕΝ ΕΙΝΑΙ ΤΑ ΤΡΙΣΔΙΑΣΤΑΤΑ ΓΡΑΦΙΚΑ.

307  BILLION  Cray T-3D with 2048 Alpha AXP Microprocessors.

300  BILLION  Intel's with 4000 microprocessors at $55 million (1991)

8.6  BILLION  math calculations a second, Intel's Touchstone (1991)

4.2  BILLION  conventional supercomputers (1991)

6  BILLION  Intel microprocessor Itanium (2000) [ram 1999nov, 239]

1  BILLION  Apple microprocessor G4 (1999) [ram 1999nov, 239]

INSTRUCTIONS PER SECOND

name::
* McsEngl.IPS@cptIt,

3.4 BILLION υπολογισμούς. ΕΤΑ 10, στο εθνικό κέντρορ σουπερκομπιουτερ στο Νιου Τζέρσεϋ. Μέγεθος χαρτοφύλακα. [ΡΙΖ., 31 ΙΟΥΛ 1988]

400 MIPS *64-Bit alpha RISC DEC in future at 200 MHz.
200 MIPS *i786 Θα παρουσιασθει το 1995. 20 εκατ τρανζιστορς με 250 ΜΙPS.
100 MIPS i586 64-bit CISC at 66 MHz.
77 MIPS *68060: (1994) 50MHz, 77MIPS [MAY 1993]
72 MIPS HP workstation 730 $20000(1991)
50 MIPS i486DX2
40 MIPS microSPARK-tsusami RISC $180, i486DX/50 $500,
8 MIPS Mac IIfx
3 MIPS Mac II


5000 additions per sec. 1946 ENIAC It cost $3 million in 1992 dollars.


3.3 προσθέσεις/αφαιρέσεις το δευτ. ο MARK I (1941)
1.49 πολ/σμούς το δευτ. η μηχανή του Τσούσε (1941)
0.25 πολλαπλασιασμούς το δευτ. ο MARK I (1941)
0.1 διαιρέσεις το δευτ. ο MARK I (1941)

MIPS

name::
* McsEngl.MIPS@cptIt,

MIPS
An acronym for Million Instructions Per Second, MIPS refers to the average number of machine language instructions a computer can perform or execute in one second.
However, it can be shown that the same computer can execute two different loops of code to estimate MIPS, and their execution times will differ significantly.
MIPS should therefore be used only as a very general measure of performance between different types of computers. In order to obtain accurate performance data to compare similar computers, each subsystem must be isolated, and practically speaking, this is an almost impossible task. More realistic benchmark testing occurs at the application level. MIPS is sometimes jokingly referred to as Meaningless Indicator of Processor Speed.
[SOURCE: PC-GLOSSARY 1993]

NAS PARALLEL BENCHMARK

NAS is a branch of the NASA Ames Research Lab.

SPEC89

SPECint89

SPECfp89

SPECmark89

the average of int and fp.


147 SPECMark89, HP PA-7100.
27 SPECmarks IBM RISC system /6000, version 220 (1992).

SPEC92

Whetstone

An early synthetic benchmark developed by Curnow and Wichman in 1976. It measures floating-point performance.
[BYTE, OCT. 1994, 68]

processor'EVOLUTION#cptCore546.171#

name::
* McsEngl.processor'EVOLUTION@cptIt,

2003-09-23: Athlon 64 bit
AMD presents it.

1999jan: Pentium III
[ram 1999mar]

*1999: Κ7
Η AMD **θα** κυκλοφορήσει στο α εξάμηνο τον 64μπιτο Κ7 με νέο δίαυλο.
[ΡΑΜ 1998δεκ]

1997may01:
Intel Pentium II επίσημη παρουσίαση
[RAM 1997jun, 24]

{1997-04-02}: AMD K6
Advanced Micro Devices (AMD), long an also-ran in the computer chip business, will begin an aggressive television campaign next week with a spot during the TV show Seinfeld to pitch its speedy new K6 microprocessor--its first serious threat to Intel's Pentium chip.

1997jan:
Intel Pentium MMX

{time.1971 Intel_4004:
The Intel 4004 is a 4-bit central processing unit (CPU) released by Intel Corporation in 1971. Intel purports it is the world's first commercial microprocessor. The 4004 employed a 10 μm silicon-gate PMOS technology and could execute approximately 92,000 instructions per second.[2]
...The 4004 was released in 16-pin CERDIP packaging on 1971-11-15. The 4004 is the first computer processor designed and manufactured by chip maker Intel, which previously made semiconductor memory chips. The chief designers of the chip were Federico Faggin (project leader and chip designer - developed the random logic methodology with silicon gate that made it possible to fit the microprocessor in one chip in 1970-1971) and Ted Hoff (formulated the architectural proposal in 1969) of Intel, and Masatoshi Shima of Busicom (later of ZiLOG, founded by Federico Faggin at the end of 1974, the first company entirely devoted to microprocessors). Shima designed the Busicom calculator firmware and assisted Faggin during the implementation.
[http://en.wikipedia.org/wiki/Intel_4004]

H INTEL ανακοινώνει το Νοέμβριο τη δημιουργία του πρώτου ΤΣΙΠ, του 4004, με μέγεθος όσο ένα νύχι, είχε με τα 2.300 τρανζίστορς την υπολογιστική ισχύ (0,06mips) του ENIAC, του πρώτου υπολογιστή το 1946, 2 δωματίων, κάμποσων τόνων, 18000 λυχνιών που όταν άναβε μισόσβηναν τα φώτα του Πίτσμπουργκ.
[ΚΑΘΗΜΕΡΙΝΗ, 8 ΔΕΚ. 1996, 63]

processor'FSB

name::
* McsEngl.processor'FSB@cptIt,

* McsEngl.Front-Side-Bus@cptIt,
* McsElln.ΔΙΑΥΛΟΣ-ΣΥΣΤΗΜΑΤΟΣ@cptIt,

ΣΥΧΝΟΤΗΤΑ ΔΙΑΥΛΟΥ:
100|133 MHz,

ΟΙ ΕΠΙΚΟΙΝΩΝΙΕΣ ΤΟΥ ΕΠΕΞΕΡΓΑΣΤΗ ΕΙΝΑΙ ΔΥΟ ΕΙΔΩΝ:
Α) Ι/Ο ΔΙΣΚΟΣ, ΟΘΟΝΗ, ΠΛΗΚΤΡΟΛΟΓΙΟ, ΘΥΡΑ ΣΕΙΡΙΑΚΗ, ΘΥΡΑ ΠΑΡΑΛΛΗΛΙΑΣ ΚΛΠ,
Β) ΟΙ ΠΡΟΣΒΑΣΕΙΣ ΜΝΗΜΗΣ.

ΤΟ Ι/Ο ΟΜΩΣ, ΑΝΕΞΑΡΤΗΤΑ ΑΝ ΕΧΟΥΝ 286, 386, 486 ΓΙΝΕΤΑΙ ΣΤΑ 16ΜΠΙΤ ΛΟΓΩ ΤΟΥ ΔΕΚΑΕΞΑΜΠΙΤΟΥ ΔΙΑΥΛΟΥ ΑΤ.
Ο EISA ΕΙΝΑΙ 32ΜΠΙΤΟΣ.

processor'MODE

name::
* McsEngl.processor'MODE@cptIt,
* McsEngl.mode-of-cpu@cptIt, {2007-12-29}
* McsEngl.privilege-level-of-cpu@cptIt, {2007-12-29}

_DEFINITION:
CPU modes (also called processor modes or CPU privilege levels, and by other names) are operating modes for the central processing unit of some computer architectures that place restrictions on the operations that can be performed by the process currently running in the CPU. This design allows the operating system to run at different privilege levels. These different privilege levels are called rings when referring to their implementation at the OS abstraction level, while CPU modes when referring to their implementation at the cpu firmware abstraction level.
[http://en.wikipedia.org/wiki/CPU_modes]

Real mode
Excluding the Intel 8088, the family of 8086 microprocessors have two modes of executing programs, real and protected mode.
In the real mode of operation, the 80286, 80386, and 80486 CPUs act like the 8086 CPUs and execute programs one at a time in 640 K of conventional memory. In real mode, a misbehaved program could interfere with some other program causing the CPU to halt.
In protected mode, the CPU can safely and reliably execute more than one program at a time. This is accomplished by the operating system through four main facilities; protection, extended memory, virtual memory, and multitasking.
In protected mode, DOS erects barriers to prevent a program from interfering with the operation of any other program.
[SOURCE: PC-GLOSSARY 1993]

processor'PROCESS

name::
* McsEngl.processor'PROCESS@cptIt,

_SPECIFIC:
The fundamental operation of most CPUs, regardless of the physical form they take, is to execute a sequence of stored instructions called a program. Discussed here are devices that conform to the common von Neumann architecture. The program is represented by a series of numbers that are kept in some kind of computer memory. There are four steps that nearly all von Neumann CPUs use in their operation:
- fetch,
- decode,
- execute, and
- writeback.
[http://en.wikipedia.org/wiki/Central_processing_unit]

FETCH-STEP

The first step, fetch, involves retrieving an instruction (which is represented by a number or sequence of numbers) from program memory. The location in program memory is determined by a program counter (PC), which stores a number that identifies the current position in the program. In other words, the program counter keeps track of the CPU's place in the current program. After an instruction is fetched, the PC is incremented by the length of the instruction word in terms of memory units.[3] Often the instruction to be fetched must be retrieved from relatively slow memory, causing the CPU to stall while waiting for the instruction to be returned. This issue is largely addressed in modern processors by caches and pipeline architectures (see below).
[http://en.wikipedia.org/wiki/Central_processing_unit]

DECODE-STEP

_DESCRIPTION:
The instruction that the CPU fetches from memory is used to determine what the CPU is to do. In the decode step, the instruction is broken up into parts that have significance to other portions of the CPU. The way in which the numerical instruction value is interpreted is defined by the CPU's instruction set architecture (ISA).[4] Often, one group of numbers in the instruction, called the opcode, indicates which operation to perform. The remaining parts of the number usually provide information required for that instruction, such as operands for an addition operation. Such operands may be given as a constant value (called an immediate value), or as a place to locate a value: a register or a memory address, as determined by some addressing mode. In older designs the portions of the CPU responsible for instruction decoding were unchangeable hardware devices. However, in more abstract and complicated CPUs and ISAs, a microprogram is often used to assist in translating instructions into various configuration signals for the CPU. This microprogram is sometimes rewritable so that it can be modified to change the way the CPU decodes instructions even after it has been manufactured.
[http://en.wikipedia.org/wiki/Central_processing_unit]

EXECUTE-STEP

After the fetch and decode steps, the execute step is performed. During this step, various portions of the CPU are connected so they can perform the desired operation. If, for instance, an addition operation was requested, an arithmetic logic unit (ALU) will be connected to a set of inputs and a set of outputs. The inputs provide the numbers to be added, and the outputs will contain the final sum. The ALU contains the circuitry to perform simple arithmetic and logical operations on the inputs (like addition and bitwise operations). If the addition operation produces a result too large for the CPU to handle, an arithmetic overflow flag in a flags register may also be set (see the discussion of integer range below).
[http://en.wikipedia.org/wiki/Central_processing_unit]

WRITEBACK-STEP

The final step, writeback, simply "writes back" the results of the execute step to some form of memory. Very often the results are written to some internal CPU register for quick access by subsequent instructions. In other cases results may be written to slower, but cheaper and larger, main memory. Some types of instructions manipulate the program counter rather than directly produce result data. These are generally called "jumps" and facilitate behavior like loops, conditional program execution (through the use of a conditional jump), and functions in programs.[5] Many instructions will also change the state of digits in a "flags" register. These flags can be used to influence how a program behaves, since they often indicate the outcome of various operations. For example, one type of "compare" instruction considers two values and sets a number in the flags register according to which one is greater. This flag could then be used by a later jump instruction to determine program flow.
[http://en.wikipedia.org/wiki/Central_processing_unit]

processor'REGISTER

name::
* McsEngl.processor'REGISTER@cptIt,
* McsEngl.register-of-processor@cptIt13i,
* McsEngl.memory-register@cptIt,

_DEFINITION:
In computer architecture, a processor register is a small amount of storage available on the CPU whose contents can be accessed more quickly than storage available elsewhere. Most, but not all, modern computer architectures operate on the principle of moving data from main memory into registers, operating on them, then moving the result back into main memory—a so-called load-store architecture. A common property of computer programs is locality of reference: the same values are often accessed repeatedly; and holding these frequently used values in registers improves program execution performance
[http://en.wikipedia.org/wiki/Processor_register]

Memory registers are high-speed memory circuits that are integral parts of the Central Processing Unit (CPU) chip. They are system addresses for storing program instructions, data or addresses to data during the execution of a program.
Assembly language programs make frequent use of the memory registers during execution to keep track of program flow and data.
When a program halts or crashes, the contents of the registers at the instant of the failure will provide the programmer with clues to the cause of the problem.
[SOURCE: PC-GLOSSARY 1993]

Memory registers are high-speed memory circuits that are integral parts of the Central Processing Unit (CPU) chip. They are system addresses for storing program instructions, data or addresses to data during the execution of a program.
Assembly language programs make frequent use of the memory registers during execution to keep track of program flow and data.
When a program halts or crashes, the contents of the registers at the instant of the failure will provide the programmer with clues to the cause of the problem.
[SOURCE: PC-GLOSSARY 1993]

QUANTITY:
Σε αντίθεση με τους επεξεργαστές CISC και RISC, που συνήθως έχουν 32 ή και λιγότερους καταχωρητές, η σειρά των Itanium και οι υπόλοιποι επεξεργαστές EPIC θα έχουν 128 καταχωρητές γενικής χρήσης, 128 κινητής υποδιαστολής, 64 καταχωρητές prediction και 8 καταχωρητές διακλαδώσεων (branch registers).
[RAM, 1999nov, 239]

processor'register.PROGRAM-COUNTER

name::
* McsEngl.processor'register.PROGRAM-COUNTER@cptIt,
* McsEngl.program-counter@cptIt13i,

The program counter (also called the instruction pointer, part of the instruction sequencer in some computers) is a register in a computer processor which indicates where the computer is in its instruction sequence. Depending on the details of the particular machine, it holds either the address of the instruction being executed, or the address of the next instruction to be executed. The program counter is automatically incremented for each instruction cycle so that instructions are normally retrieved sequentially from memory. Certain instructions, such as branches and subroutine calls and returns, interrupt the sequence by placing a new value in the program counter.

In most processors, the instruction pointer is incremented immediately after fetching a program instruction; this means that the target address of a branch instruction is obtained by adding the branch instruction's operand to the address of the next instruction (byte or word, depending on the computer type) after the branch instruction. The address of the next instruction to be executed is always found in the instruction pointer.

The basic model (non von Neumann) of Reconfigurable Computing systems, however, uses data counters instead of a program counter.
[http://en.wikipedia.org/wiki/Program_counter]

processor'register.CONTROL

name::
* McsEngl.processor'register.CONTROL@cptIt,

A control register is a processor register which changes or controls the behavior of a CPU or other digital device. Common tasks performed by control registers include:
* Interrupt control
* Mode switches
* Paging control
* Coprocessor control
[http://en.wikipedia.org/wiki/Control_register]

processor'structure#cptCore515#

name::
* McsEngl.processor'structure@cptIt,

Στις 27 Μαρτίου [1995] η Intel ανακοίνωση τη δυνατότητα χάραξης των τσίπ πιριτίου της σε 0,35 μικρόν (χιλιοστο του χιλιοστού) σε βιομηχανικό επιπεδο. Η Μοτορόλα θα περάσει σε αυτή τη χάραξη το 1997 ή 1998.
[ΒΗΜΑ, 16 ΑΠΡ. 1995, Δ7]

processor'PACKAGING

name::
* McsEngl.processor'PACKAGING@cptIt,

Single Edge Processor Package or SEPP is a type of CPU Packaging used by some of Intel's microprocessors, most notably early Celeron processors. It is similar to the Single Edge Contact Cartridge (SECC) except in the fact that it doesn't have the plastic covering of an SECC package. The SEPP has 242 contacts and connects to Slot 1 on the motherboard.
[http://en.wikipedia.org/wiki/Single_Edge_Processor_Package]

ΠΛΑΣΤΙΚΗ_ΣΥΣΚΕΥΑΣΙΑ:
ΦΘΗΝΗ, ΧΩΡΙΣ ΠΟΔΑΡΑΚΙΑ. ΚΟΛΛΙΕΤΑΙ ΣΤΗ ΜΗΤΡΙΚΗ ΧΩΡΙΣ ΝΑ ΜΠΑΙΝΕΙ ΣΕ ΒΑΣΗ ΚΑΙ ΕΤΣΙ ΔΕΝ ΜΠΟΡΕΙ ΝΑ ΑΛΛΑΧΘΕΙ.

processor'watt

name::
* McsEngl.processor'watt@cptIt,

4.5-watt:
Four years ago, the most conservative Intel Core Mobile processor needed around 18 watts of power to work, but the new Core M chips average about 4.5 watts.
Read more: http://www.digitaltrends.com/computing/intel-unveils-5th-gen-core-mobile-processors-first-chips-based-broadwell-ifa-2014/#ixzz3CW7whzmR
Follow us: @digitaltrends on Twitter | digitaltrendsftw on Facebook
[By Matt Smith  — September 5, 2014]

processor'WIDTH-OF-COMPONENTS (nanometer)

name::
* McsEngl.processor'WIDTH-OF-COMPONENTS (nanometer)@cptIt,
* McsElln.ΤΕΧΝΟΛΟΓΙΑ-ΟΛΟΚΛΗΡΩΣΗΣ@cptIt,

14-nanometer#ql:nanometre@cptCore#:
The efficiency gains enjoyed by the new Broadwell-based chips are impressive, to say the least, and come courtesy of a transition from the “old” 22nm production process, to cutting-edge 14nm. As has usually been the case, this latest switch promises a substantial increase in power efficiency.
Read more: http://www.digitaltrends.com/computing/intel-unveils-5th-gen-core-mobile-processors-first-chips-based-broadwell-ifa-2014/#ixzz3CW7Q734C
Follow us: @digitaltrends on Twitter | digitaltrendsftw on Facebook
[By Matt Smith  — September 5, 2014]

22-nanometer:
September 17, 2008 1:10 PM PDT
IBM pushes toward 22-nanometer chips
[http://news.cnet.com/8301-13924_3-10044356-64.html?tag=newsEditorsPicksArea.0] 2008-09-18

45-nanometer:
* AMD-SHANGHAI:
Shanghai--targeted at servers--will be AMD's first 45-nanometer processor. Company insists it won't make the same mistakes as it did with the Barcelona processor. [cnet] 2008-10-05

65-nanometer:
Generally, the smaller the geometries, the faster and more power efficient the chip becomes. Both Intel and Advanced Micro Devices are moving their processor lines from 65-nanometer to 45-nanometer technology.
[http://news.cnet.com/8301-13924_3-10044356-64.html?tag=newsEditorsPicksArea.0] 2008-09-18

0,18μm (microns):
Athlon

  Chip breakthrough claimed
By Jim Davis Staff Writer,
CNET NEWS.COM February 24, 1998, 5:00 p.m. PT update
Researchers at the University of Texas have developed a new chipmaking technology that will help the semiconductor industry continue to produce exponentially more powerful processors while keeping manufacturing costs in check.
Working with DuPont Photomasks (DPMI), researchers have produced a semiconductor DuPont's breakthrough photomask wafer with components that are a mere 0.08 microns wide. By contrast, cutting-edge chip production processes today use a comparatively fat 0.25-micron technology to make chips such as the newest Pentium II processors. Next-generation technology will only go as small as 0.18 micron.
In creating the advanced chip, researchers employed standard ultraviolet light to etch the lines in which the transistors are laid--meaning that the industry doesn't have to invest in next-generation equipment using electrons or X-rays, a massively expensive proposition.
A plant for making 0.25 micron chips now costs between $2 billion and $2.5 billion to construct. That cost is expected jump to between $3 billion and $4 billion with the next generation of plants alone. The research breakthrough means that plants using current-generation technology may be able to produce chips at least through the year 2009.
In general, advanced production techniques allow more transistors to be crammed into the same real estate, thereby increasing the horsepower of the chip. Also, as the transistors are pushed closer together, this increases a chip's speed because the distance between the transistors is reduced.
The new ultraviolet technology could prove critical to the continued advancement of the semiconductor industry because it may eliminate the uncertainty about new production techniques which has clouded the future of chipmaking.
"People in the chip-manufacturing business are so excited that they can see a pathway to evolving what they are doing now rather than having to make huge shift to new technologies," says Grant Willson, professor of chemistry and chemical engineering at the University of Texas. "It would be difficult and unpleasant to make such a radical change."
In 2003, the most powerful processors will run at 1,500 MHz and contain 18 million transistors, according to the Semiconductor Industry Association. Today's commonly used processors for desktop PCs, by contrast, have up to 7.5 million transistors and run at up to 350 MHz.
One of the limits to current technology is the part of the manufacturing process known as "optical lithography." Chips are made by projecting patterns of light on silicon wafers. A piece of equipment called a "photomask," which is used as a very small template for the semiconductor's design.
The light shines through the photomask and reacts with chemicals on the wafer to produce the electronic pathways on the chip. The problem to date has been finding ways to produce pathways smaller than 0.10 micron without resorting to completely new production methods.
To overcome these hurdles, DuPont created a new kind of photomask while university researchers devised a new chemical substance that would react properly to the ever smaller beams of light that shine through the mask.
[] 1998feb25

SPECIFIC

processor.specific,

processor.SPECIFIC-DIVISION.TIME

name::
* McsEngl.processor.SPECIFIC-DIVISION.TIME@cptIt,

2006.09:
Intel Core 2 Extreme X6800 DDR2-800 = 1060€
Intel Core 2 Extreme X6800 DDR2-667 = 1060€
Intel Core 2 Duo E6600 = 349€
AMD Athlon 64 FX-62 DDR2-800 = 898€
AMD Athlon 64 FX-62 DDR2-667 = 898€
AMD Athlon 64 X2 4800+ = 310€
AMD Athlon 64 X2 4400+ = 244€
Intel Pentium D Extreme Edition 955 = 1060€
AMD Athlon 64 X2 3800+ = 165€
Intel Pentium D 940 = 208€
Intel Pentium D 920 = 203€
AMD Athlon 64 3500+ = 99€
AMD Sempron 3500+ = 99€
Intel Celeron D 346 = 64€
[RAM 205, 2006.09, 122]

processor.SPECIFIC-DIVISION.COMPANY

name::
* McsEngl.processor.SPECIFIC-DIVISION.COMPANY@cptIt,

processor.AMD/ADVANCED MACRO DEVICES microprocessor

name::
* McsEngl.processor.AMD/ADVANCED MACRO DEVICES microprocessor@cptIt,

1999feb: K6-III
AMD to roll out K6-III chip By Michael Kanellos Staff Writer, CNET News.com February 19, 1999, 5:00 p.m. PT Advanced Micro Devices will released the K6-III Monday, a new chip that the company says rivals the Pentium III, although observers say it may not be the cure for all of AMD's current woes.
[internet]

Am386 O,8 ΜΙΚΡΩΝ
Am386DXL-40
Am386SXL-33
Am486 (MAY 1993) $306/417 [JUN 1993]
*0,35 ΜΙΚΡΑ: ΤΟ 1995 ΚΑΤΗΓΟΡΙΑ PENTIUM KAI ΠΑΡΑΠΕΡΑ[ΜΑΙΟΣ 1993]

Am486DX(L)2-80MHz(1994)
Ο ταχύτερος διπλοχρονιζόμενος. Ιδανικος για φορητούς.
[COMPUTER GO, OCT. 1994, 52]

processor.AT&T microprocessor

name::
* McsEngl.processor.AT&T microprocessor@cptIt,

Hobbit RISC: It is designed specifically for personal communication.
WE32000

processor.Chips & Technologies microprocessor

name::
* McsEngl.processor.Chips & Technologies microprocessor@cptIt,

processor.CYRIX microprocessor

name::
* McsEngl.processor.CYRIX microprocessor@cptIt,

Cx486DLC, Δεν εχει cooprocessor οπως ο i486, έχει 1Κ cashe που δεν εχει ο 386. 25, 33, 40MHz, 99, 119, 159 ΔΟΛΑΡΙΑ ΑΝΤΙΣΤΟΙΧΑ.

Cx486S2/50, ΜΕ "WRITE-BACK" ΤΕΧΝΟΛΟΓΙΑ ΠΟΥ ΕΞΑΛΕΙΦΕΙ ΤΑ 2/3 ΤΗΣ ΚΥΚΛΟΦΟΡΙΑΣ ΣΤΟ LOCAL BUS. $250 HALF OF i486DX2-50.

Cx486SLC/25, $99.

M1:

processor.EXPONENTIAL TECHNOLOGY

name::
* McsEngl.processor.EXPONENTIAL TECHNOLOGY@cptIt,

Exponential Technology plans to show off fastest microprocessor: 533 megahertz
SAN JOSE, Calif. (Oct 21, 1996 7:25 p.m. EDT) -- A start-up company on Monday announced the speediest microprocessor yet, a chip able to run Apple Macintosh software at up to 533 megahertz, more than twice as fast as current chips.
[http://www2.nando.net/nt/info/]

processor.DEC microprocessor

name::
* McsEngl.processor.DEC microprocessor@cptIt,

ALPHA: RISC. DEC. Επίσημα μπήκε στην αγορά το Φεβρ. 1992. 64-Bit 200 MHz 400 MIPS. 1,7 ΕΚ. ΤΡΑΝΖΙΣΤΟΡΣ ΣΕ 2,3 Τ.ΕΚ.
-ΟΙ ΣΗΜΕΡΙΝΟΙ ΑΛΦΑ, ΤΡΕΧΟΥΝ ΣΤΑ 150MHz. [MAY 1993]
-ΚΟΣΤΟΣ. ME ΤΙΣ ΠΡΟΔΙΑΓΡΑΦΕΣ 200MHz ΘΑ ΚΟΣΤΙΖΕΙ ΣΗΜΑΝΤΙΚΑ ΛΙΓΟΤΕΡΟ ΑΠΟ PENTIUM, ΙΣΩΣ $2000. [MAY 1993]

AXP 21164:
Είναι 4 φορές ταχύτερος απο το πρώτο alpha chip. 300/266 MHz. Η παραγωγή θα αρχίσει 1995
[COMPUTER GO, OCT. 1994, 48]

processor.HP microprocessor

name::
* McsEngl.processor.HP microprocessor@cptIt,

HP PA7100
64-bit, superscalar RISC, 32/99 MHz

processor.IBM microprocessor

name::
* McsEngl.processor.IBM microprocessor@cptIt,

ibm POWERPC 615:
Θα χρησιμοποιεί onchip X86 emulator. Ετσι θα μπορεί να τρέχει intel προγραμματα με απόδοση ενός pentium, δηλαδή πολύ ταχύτερα απο software emulator programs.
Τα πρώτα μηχανήματα θα είναι έτοιμα το 1995.
[COMPUTER GO, APR 1994, 64]

IBM 386 SLC, 88% γρηγορότερος από τον SX.
IBM 486 SLC2,
IBM 486-33/99MHz
IBM RISC system /6000, version 220 (1992) 27 SPECmarks.

processor.IBM'APPLE'MOTOROLA microprocessor

name::
* McsEngl.processor.IBM'APPLE'MOTOROLA microprocessor@cptIt,

*PowerPC 601CPU: With Motorola, will be delivered. ΘΑ ΕΧΕΙ ΤΟΝ ΜΙΚΡΟΕΠΕΞΕΡΓΑΣΤΗ ΜΕ ΚΑΤΑΓΩΓΗ IBM RISC/6000. ΙΣΟΔΥΝΑΜΟΣ PENTIUM 66MHz. ΚΟΣΤΟΣ ΜΙΚΡΟΤΕΡΟ ΑΚΟΜΑ ΑΠΟ 486DX2.
TIMH $375
-ΕΜΦΑΝΙΣΗ ΣΕ ΜΗΧΑΝΗΜΑΤΑ IBM, ΤΕΛΟΣ 1993 [ΜΑΙΟ 1993]

*PowerPC 603: ΕΜΦΑΝΙΣΗ ΜΕΣΑ 1994. ΧΑΜΗΛΗΣ ΚΑΤΑΝΑΛΩΣΗΣ ΓΙΑ ΦΟΡΗΤΟΥΣ [ΜΑΙΟ 1993]

*PowerPC 604: ΕΜΦΑΝΙΣΗ ΜΕΣΑ 1994. ΘΑ ΑΝΤΑΓΩΝΙΣΤΕΙ ΤΑ ΜΕΛΟΝΤΙΚΑ PENTIUM [ΜΑΙΟ 1993]

PowerPC 620

processor.IMS/International Meta Systems microprocessor

name::
* McsEngl.processor.IMS/International Meta Systems microprocessor@cptIt,

IMS 3250...emulate 486 and motorola 68040 (Mac)

processor.INTEL microprocessor

name::
* McsEngl.processor.INTEL microprocessor@cptIt,

2001-08-27:
Ο Pentium 4 με χρόνο κύκλου ρολογιού 2GHz, ο ταχύτερος μέχρι σήμερα επεξεργαστής για υπολογιστές γραφείου, διατίθεται στην αμερικανική αγορά από τη Δευτέρα 27 Αυγούστου.
[www.in.gr]

EM64T

Home › Intel® Software Network › Developer Centers › Intel® EM64T ›
Intel
®
Extended Memory 64 Technology FAQ
 
 
What is Intel® Extended Memory 64 Technology?
Intel® Extended Memory 64 Technology, or Intel®64, is an enhancement to Intel's IA-32 architecture. The enhancement allows the processor to run newly written 64-bit code and access larger amounts of memory. These extensions do not run code written for the Intel® Itanium® processor. Click here for a more detailed description of Intel®64. Further details on the 64-bit extension architecture and programming model can be found in the 64-bit Extension Technology Software Developer's Guide.

Which Intel processors support Intel®64 and when will they be available?
By Q4 of 2006, Intel®64 will be supported in all mobile, desktop and server processors that are based on the Intel® Core™ microarchitecture. All Intel® Xeon® platforms based on the Intel NetBurst® microarchitecture will support Intel®64 as well. Please refer to the processor product list for more information.

How does the performance of 64-bit Itanium® and 64-bit capable IA-32 processor based platforms compare?
The Itanium processor family is and will continue to be the highest performing and most reliable product family we offer for high-end, multi-processor systems. However, the performance differential is constantly changing due to the frequent release of new Itanium and IA-32 processor based platforms. Click here to find the latest performance ratings for all Intel products.

Is Intel®64 the same technology used in the Itanium® 2 processor?
No. Intel®64 is an extension to Intel's processors based on the IA-32 architecture. The Itanium processor family is based on the EPIC architecture. These are two separate families of processors, based on two different architectures. The Itanium processor family is specifically designed for the most demanding mission-critical applications.

Can the Itanium 2 IA-32 Execution Layer run the new Intel®64 code?
At this time, the IA-32 Execution Layer does not support Intel®64 binaries. Intel will evaluate providing this additional capability if and when customers request it.

Which O/S (Operating System) will support Intel's processors with Intel®64?
The following O/S vendors have available or announced product support for Intel®64. Contact each vendor for more details.

* Microsoft:
Microsoft currently has two 64-bit operating systems that support Intel®64: Windows* Server 2003 x64 Edition and Windows* XP Professional x64 Edition. In addition, Microsoft will release the Windows* Vista operating system in 2007, which will also support Intel®64.
* Apple:
Apple MAC OS* X Tiger, version 10.4.1 supports Intel®64.
* Red Hat:
Redhat version 3.0 (and greater) supports Intel®64.
* SuSE*:
SuSE 8.2 (and greater), SLES 8.0 and SLES 9.0 supports Intel®64.
* Sun Solaris*:
Solaris 10 x64/x86 supports Intel®64.
* FreeBSD:
FreeBSD version 6.0 supports Intel®64.


Is it possible to write software that will run on Intel's processors with Intel®64, and AMD's 64-bit capable processors?
Yes, in most cases. Even though the hardware microarchitecture for each company's processor is different, the operating system and software ported to one processor will likely run on the other processor due to the close similarity of the instruction-set architectures. However, Intel processors support additional features, like the SSE3 instructions and Hyper-Threading Technology, which are not supported on non-Intel platforms. As such, we believe developers will achieve maximum performance and stability by designing specifically for Intel® architectures and by taking advantage of Intel's breadth of software tools and enabling services.

How will Intel®64 work, and what software is there to take advantage of 64-bit extensions?
Development of a broad "ecosystem", ranging from processors, chipsets and tools to operating systems (O/S), applications, utilities and drivers is expected to take some time to develop. Platforms with Intel®64 can be run in three basic ways (note: a 64-bit capable BIOS is required for all three scenarios):

1. 32-bit O/S and 32-bit applications (Legacy Mode): No software changes are required, however the user gets no benefit from Intel®64.
2. 64-bit O/S and 32-bit applications (Compatibility Mode): This usage requires all 64-bit device drivers. In this mode, the O/S will see the 64-bit extensions, but the 32-bit application will not. Existing 32-bit applications do not need to be recompiled, and may or may not benefit from the 64-bit extensions. The application will likely need to be recertified by the vendor to run on the new 64-bit extended O/S.
3. 64-bit O/S and 64-bit applications (64-bit Mode): This usage requires 64-bit device drivers. It also requires applications to be modified for 64-bit operation and then recompiled and validated.


Will the Intel IA-32 processor with Intel®64 have more registers than IA-32 processors today?
Yes, Intel's IA-32 processors with Intel®64 have 16 General Purpose Registers (GPRs) and 16 XMM registers. The GPRs and XMM registers are 64 bits and 128 bits in width, respectively, in processors with Intel®64. The additional registers are only used by applications running in 64-bit mode. IA-32 processors without Intel®64 have 8 GPRs and 8 XMM registers. The GPRs and XMM registers are 32 bits and 128 bits in width, respectively, in processors without Intel®64. More details can be found in the 64-bit Extension Technology Software Developer's Guide.

Will applications written for the Intel Itanium processor family run on Intel's IA-32 processors with Intel®64 without being re-compiled?
No. The instruction sets for Intel's Itanium processor family are different than the IA-32 processor family. Applications need to be compiled separately for each processor family.

I have two platforms: one based on the Itanium processor family, and one based on an IA-32 architecture processor family with Intel®64. Will the same 64-bit operating system work on both platforms?
No. Different operating systems are required for each type of platform due to the different instruction set architectures. Contact your OS vendor to identify which operating system is needed for your particular platform configuration.

I have two platforms: one based on an IA-32 architecture processor family with Intel®64, and one based on an IA-32 architecture family without Intel®64. Will the same operating system work on both platforms?
Yes, if you are running a 32-bit operating system on both platforms. However, a 32-bit operating system will not take advantage of Intel®64.

If you want to take advantage of Intel®64, the first platform will need to run an operating system designed for 64-bit extensions. Operating systems for 64-bit extended systems will not run on the second platform. Contact your OS vendor to identify which operating system is needed for your particular platform configuration.

Does Intel®64 include support for AMD's 3DNOW!* instructions?
No. Intel's IA-32 architecture does not support the 3DNOW! instruction set today. This has not changed with the addition of Intel®64.

What changes are needed for an IA-32 based platform to run a 64-bit O/S and 64-bit applications?
To run 64-bit applications and a 64-bit O/S, a platform will need an IA-32 processor with Intel®64, along with updated BIOS and drivers that have been modified for Intel®64. Contact your BIOS vendor and adapter vendor to get the BIOS and drivers that have been optimized for platforms with Intel®64.

Will existing 32-bit software run, without being re-compiled, on an IA-32 processor with Intel®64?
Yes, with some notes of caution. Refer to the 64-bit Extension Technology Software Developer's Guide for more details.

Running a 32-bit application on a 32-bit O/S, even with a processor with Intel®64, will execute without issue. With a 64-bit O/S and a 32-bit application the processor is designed to support this mode of operation completely (this is called compatibility mode). It is possible, however, that some applications may have certain dependencies beyond the processor's control (e.g. dependencies on the O/S or drivers) which may cause the applications to not run as expected.

Does Intel's Hyper-Threading Technology work in conjunction with Intel®64?
Yes. Both 32-bit and 64-bit applications can take advantage of the threading parallelism and performance improvements enabled with Intel's Hyper-Threading Technology.

Does Intel make available a compiler which will generate optimized code for Intel®64?
Yes. As of version 8.1, the Intel Fortran and C++ compiler for both Linux and Windows support Intel®64. For more information, click here.

Are software optimization tools available that support Intel®64?
Yes. Intel® VTune™, the Intel® Math Kernel Library (Intel® MKL), and Intel® Performance Primitives (Intel® IPP) all support Intel®64 under Linux and Windows development environments. Additional VTune information can be found here. For Intel MKL and Intel IPP, information can be found here.

Where can I get applications that have been optimized for Intel®64?
Contact software vendors for their schedules, pricing and availability of applications compatible with Intel®64. Like any industry transition, we expect it to take time for applications to be ported to the 64-bit extended operating systems. By comparison, there are currently thousands of applications optimized for the Intel Itanium processor family. Some examples of currently available 64-bit applications can be found here* and here*.
[http://www.intel.com/cd/ids/developer/asmo-na/eng/dc/64bit/290450.htm, 2006-11-17]

Itanium (MERCED) 64bit

*1999: MERCED
Intel names Merced chip Itanium By Michael Kanellos Staff Writer, CNET News.com October 4, 1999, 10:15 a.m. PT URL: http://news.cnet.com/category/0-1003-200-806094.html update Itanium--think "Titanium" with a slight regional accent--will be the official name of Intel's Merced processor, and the company will provide more details on the chip's microarchitecture at the Microprocessor Forum in San Jose, California, tomorrow.
The name Itanium was chosen to "reflect the strength and performance of the processor," said Jami Dover, vice president of marketing at Intel. Sausalito, California-based Lexicon, which also coined the chip names Celeron and Xeon, came up with the name, she said.
Itanium, due toward the middle of next year, will be the chipmaker's first 64-bit processor, which means that the chip can process information in 64-bit chunks. Current Intel processors work with 32-bit hunks.
The processor will allow Intel to provide the building blocks for servers that compete against the expensive "big iron" servers currently sold by Sun and others. Itanium-based systems will largely be targeted to e-commerce applications and to Internet service providers.
Although Intel has not officially released the speed or price of the chip, it will provide details about the internal structure of the chip tomorrow, according to Steve Smith, vice president and general manager of the IA-64 division. If anything, the structure of the chip makes it apparent that the processor will indeed be more powerful than any previous Intel processor, he said.
The Itanium will be capable, theoretically, of performing at six gigaflops, or performing six billion operations per second, Smith said. The chip will include 4 integer units and 2 floating point units, two internal structures integral to mathematical calculations.
In addition, Itanium will come with up to 4MB of secondary cache memory, Intel said. Cache serves as a data reservoir for the processor and enhances performance. Current Intel Xeon chips top out at 2MB of cache. In its package, the chip is slightly smaller than a 3 x 5 index card.
To complement the chip, Intel will also produce the 460GX chipset, which will work with standard 100-MHz memory, the company said. Initially, the Itanium will not be geared to work with next generation Rambus memory. Server builders typically are more concerned with the amount, rather than the speed, of memory, and using standard memory initially will allow them to pack much more memory into their systems.
Intel is currently having trouble with its 820 chipset, which is the first to use Rambus memory.
More "Coppermine" details Intel will also use the Microprocessor Forum to provide more details on its "Coppermine" Pentium III processor, which is expected on October 25. Coppermine differs from current Pentium IIIs in that it will contain 256KB of integrated secondary cache on the same silicon as the processor. Current Pentium IIIs come with 512KB of cache, but the cache is on separate chips.
Although smaller, the integrated cache will boost performance and help Intel close the performance gap between the Pentium III family and AMD's recently released Athlon chips. Overall, Intel states that its own benchmarks show that Coppermine outperforms standard Pentium IIIs in 3D tests by 13 to 23 percent.
The new Coppermines are expected to run at 700 MHz, with a 733-MHz version coming soon after. Mobile versions of the chip running at 500 MHz will also be released.
Coppermine processors will also come with a 133-MHz system bus, which is the main conduit between the processor and the rest of the computer. Most Intel system buses today run at 100 MHz. Later, Coppermine chips will work with Rambus memory.

Intel says its next generation of processors, code-named Merced, is scheduled for production in 1999 and it will make the first public disclosures about the chip at a conference next week. Intel also said the chip, a 64-bit microprocessor, will run all software programs developed to run on its 32-bit Pentium II processors.
[1997oct]

ΠΑΡΑΣΚΕΥΗ 17 ΟΚΤΩΒΡΙΟΥ 1997 Η Intel μπαίνει EPIC-θετικά στην αρένα των 64-μπιτων επεξεργαστών
Στο Forum Μικροεπεξεργαστών, που ολοκλήρωσε χθες τις εργασίες του, η Intel, σε συνεργασία με τη Hewlett-Packard, έδωσε στη δημοσιότητα τα σχέδιά της για τους επεξεργαστές επόμενης γενιάς που πρόκειται να κυκλοφορήσει στο άμεσο μέλλον.
Η νέα αρχιτεκτονική που εισάγει η Intel, ονομάζεται "EPIC" (Explicitly Parallel Instruction Computing - Υπολογιστές Ρητά Παράλληλων Εντολών, σε αδόκιμη μετάφραση) και θα πρωτοεμφανιστεί στους 64-μπιτους επεξεργαστές όγδοης γενιάς (x868) της Intel, με κωδικό όνομα "Merced" που αναμένεται να κυκλοφορήσουν μέσα στο 1999. Οι νέοι επεξεργαστές θα είναι κατασκευασμένοι στην τεχνική των 0,18 μικρών, ενώ οι πιο προηγμένοι σημερινοί Pentium χρησιμοποιούν αυτή των 0,25 μικρών. Όσο πιο μικρό το νούμερο, τόσα περισσότερα κυκλώματα χωρούν σε ένα chip. Παράλληλα, η Intel ανακοίνωσε πως ήδη εργαζεται πάνω στο σχεδιασμό του "Merced" δεύτερης γενιάς, που θα δούμε γύρω στο 2001. Η τεχνολογία "EPIC" αναμένεται να οδηγήσει σε ένα περισσότερο αποτελεσματικό και γρήγορο επεξεργαστικό αποτέλεσμα, γιατί ελαχιστοποιεί υπάρχουσες αδυναμίες στην αρχιτεκτονική, που προκαλούν διηνεκή κωλυσιεργία στη μετάδοση δεδομένων μέσα στο ολοκληρωμένο κύκλωμα. Αυτό το κατορθώνει αυξάνοντας την παράλληλη επεξεργασία δεδομένων κυρίως (ώστε στον ίδιο ρυθμό να διακινείται μεγαλύτερος όγκος πληροφορίας) και όχι τόσο μεγαλώνοντας τη συχνότητα (το ρυθμό) της επεξεργασίας. Σήμερα, το ίδιο το κύκλωμα του επεξεργαστή αναλαμβάνει την ταξινόμηση και την επεξεργασία των εντολών που θα εκτελεστούν, καθυστερώντας έτσι τη διαδικασία. Με το "EPIC" , δίνεται μεγαλύτερο βάρος στους compiler των προγραμμάτων στον τομέα της μορφοποίησης της πληροφορίας, αφήνωντας στον επεξεργαστή ελεύθερο να κάνει αυτό που ξέρει καλύτερα: την επεξεργασία της. Σε αυτό θα βοηθήσει και η ταχύτερη επικοινωνία με την κύρια μνήμη του συστήματος, που υλοποιέι το EPIC, επιτρέποντας την ταχύτερη μεταφορά δεδομένων από και προε τον επεξεργαστή. Η νέα τεχνολογία αποτελεί μεγάλο άλμα και για την Intel, που περνάει -έστω και καθυστερημένα- στην 64-μπιτη αρχιτεκτονική επεξεργαστών. Ήδη οι επεξεργαστές Alpha της Digital και οι SPARC της Sun τη χρησιμοποιούν σε συχνότητες που φτάνουν τα 600 MHz. Oι Pentium II είναι 32-μπιτοι. Σύμφωνα όμως με την Intel, πρόκειται για μια πιο ριζοσπαστική μετάβαση από αυτήν που έγινε από την τεχνολoγία CISC στη RISC, ή από τα 32 bit στα 64 bit. Οι Merced θα φθάνουν αρχικά σε ταχύτητες ρολογιού της τάξης των 1000 MHz. H εταιρία τους προορίζει να "στελεχώσουν" απαιτητικούς διακομιστές και σταθμούς εργασίας αξιώσεων. Θα βγουν σε δύο κύριες γραμμές. Η μια θα χρησιμοποιεί 256 Merced ανά πoλυ-επεξεργαστικό σύστημα Unix, ενώ η άλλη, 4 με 16 σε σύστημα NT. Παράλληλα με την κυκλοφορία του Merced, η Microsoft αναμένεται να έχει διαθέσει την 64-μπιτη έκδοση των ΝΤ, προκειμένου να αξιοποιηθεί ευρήτατα το chip. Eν τω μεταξύ, η Intel έχει ήδη συνάψει συμφωνίες συνεργασίας με μια ομάδα γνωστών εταιριών, όπως οι Dell Computer, Compaq, Siemens-Nixdorf, Hitachi, Oracle, Phoenix Technologies, Sequent Computer και τη Unisys. ΣXETIKA ΑΡΘΡΑ:
Intel στις τρείς διαστάσεις 24.8.97
H ώρα του Pentium II 18.8.97
Η Intel στο μάτι του κυκλώνα 29.9.97
Η Intel αδειάζει τη Microsoft, αγοράζει τους Alpha 7.10.97
ΣΧΕΤΙΚΟΙ ΚΟΜΒΟΙ: Intel Corporation 1997 Microprocessor Forum
0 ΚΟΜΒΟΣ ΑΡΧΕΙΟ ΑΝΑΖΗΤΗΣΗ ΕΠΙΚΟΙΝΩΝΙΑ
Copyright ©1997, O KΟΜΒΟΣ™ ( kombos @ forthnet.gr ) - Με την επιφύλαξη παντός νομίμου δικαιώματος.

*i886: Το 2000. 100 εκατ. τρανζ., 2 εκ. ΜΙPS.

*P7:
*Intel's Merced [1999] will be the first 64-bit microprocessor from the chip giant.
[c/net 1997oct07]
* Merced: 64bit, IA-64 οικογενεια. 500MHz. Θα τρέχουν το 64bit windowsNT. Θα κυκλοφορήσει τέλη 1988.
[RAM, OKT. 1996, 28]

* i786: Θα παρουσιασθει το 1995. 20 εκατ τρανζιστορς με 250 ΜΙPS.

P6: (ΦΕΒ. 1995)
RISC. 5,5 εκ. τρανζίστορς. 200MIPS.
[ΚΑΘΗΜΕΡΙΝΗ, 26 ΦΕΒ. 1995, 628]

Ενσωματώνει βασικές δυνατότητες των πολυμέσων, modem, κινούμενη εικόνα, μικρόφωνο, ηχεια που ως τώρα υπηρχαν σε ξεχωριστες κάρτες.
[ΚΑΘΗΜΕΡΙΝΗ, 12 ΦΕΒ. 1995, 58]

* Η εταιρία εκτιμά ότι θα εμφανιστεί σε σερβερς στο τέλος του 1995
[COMPUTER GO, JUL. 1994, 52]

PENTIUM

Pentium III: 1999jan11 (Katmai)
Σαν τον ΙΙ αλλά με 70 νέες εντολές πολυμέσων και ιντερνέτ.
[ΡΑΜ 1999μαρ]

Pentium II:

Pentium MMX:
1997jan9: Intel unveils new MMX chip. The Associated Press.

* Θα παρουσιαστεί τα χριστούγενα και το πρώτο τρίμηνο του 97 στον P6
[ΡΑΜ, ΟΚΤ. 1996]

New chip begs new questions
By Brooke Crothers
October 22, 1996, 1:45 p.m. PT
SAN JOSE, California—Intel officially introduced the MMX-enabled P55C Pentium processor today at the Microprocessor Forum here, but although the chip industry has been waiting for this introduction for months, some Intel watchers are already wondering if the new chip will help consumers, or just confuse them.
When it ships in the beginning of next year, the P55C Pentium will run at a speed of 200 MHz on the desktop and 166 MHz on notebook computers, according to David Perlmutter, vice president of Intel's Microprocessor Products Group. The MMX technology is designed to take care of most low-end graphics and multimedia processing so that a PC can run multimedia applications without having to install an extra graphics card. The result, Intel promises, is a more powerful, cheaper PC for the average user.
[Listen to CNET Radio for audio coverage of the Microprocessor Forum, with Intel Cofounder Gordon Moore and others on the future of the microprocessor.]
Intel's list of the reasons why MMX technology improves multimedia performance on Pentium processors is long and complex. Perlmutter cited today the chip's many advantages, including the following:
--A performance improvement of 10 to 20 percent over traditional Pentiums when running existing applications --An average of 60 percent better performance when running "MMX-aware" applications now in the works --An on-chip cache memory of 32K, twice that of existing Pentiums --The ability to issue two MMX instructions at once --New superscalar multimedia instructions --Lower operating voltages that deliver better power saving features for notebook users --One motherboard that will be able to accommodate both Pentium and P55C Pentium processors
But Michael Slater, publisher of the event's sponsor, the Microprocessor Report, said that the delivery of the P55C next year may upset the market, creating confusion about what this new technology is all about, despite its many technological advantages.
"It's going to be an awkward year because it will be introduced in high-end systems in 1997 but it's most useful in low-end systems," said Slater.

"The P55C," he explained, "is really for low-end systems that don't have a 3D rendering engine.
Once you have a 3D engine, MMX does you no good. Are consumers going to be able figure this all out?"
While Slater believes that educating the consumer about the new technology will be a temporary hurdle for systems vendors, he added that the usefulness of MMX technology will become clear over time, especially when it materializes in the more powerful P6 family of processors. The P6 processors will run at 266 MHz. That means that cost-saving PC features like software modems may become feasible because it will only use up about ten percent of the available processor performance, according to Slater.

i586 PENTIUM: (1993)
64 bit, with 100 MIPS at 66MHz.
Περιέχει 3 εκατ. τρανζιστορς. ΤΟ ΜΕΓΑΛΟ ΤΟΥ ΠΛΕΟΝΕΚΤΗΜΑ ΟΤΙ ΠΑΡΑΜΕΝΕΙ ΣΥΜΒΑΤΟΣ ΜΕ ΟΛΑ ΤΑ ΠΡΟΗΓΟΥΜΕΝΑ ΜΕΛΗ ΤΗΣ ΟΙΚΟΓΕΝΕΙΑΣ 80χ86.
-ΤΑ ΚΑΙΝΟΥΡΓΙΑ ΜΗΧΑΝΗΜΑΤΑ ΘΑ ΕΙΝΑΙ ΠΟΛΥ ΠΙΟ ΑΚΡΙΒΑ ΑΠΟ 486. ΘΑ ΠΑΡΟΥΣΙΑΣΤΟΥΝ ΤΟ ΚΑΛΟΚΑΙΡΙ ΤΟΥ 1993. [1993]
-ΚΟΣΤΟΣ ΜΕ ΕΠΙΦΥΛΑΞΗ $5000 [ΚΓΟ]
ΤΙΜΗ $800
[RAM JUNE 1993]

*PENTIUM 32Bit bus. P24T.

486

i486: 1.2 εκατ. τρανζίστορς. It is similar to 386 with an internal memory cache, AND faster due to improved instruction execution.
i486SL
i486SX:
i486DX: sports an internal math coprocessor.
i486DX2: 33/66MHz, 50 MIPS. Παράγει πολλή θερμότητα. ΣΤΟΙΧΙΖΕΙ ΛΙΓΟΤΕΡΟ ΑΠΟ $1000 [1993]
*i486DX3: 99MHz

386

i386: 32 bit processor.
Τον πρωτοέβγαλε η INTEL το 1985. It has an effective addressing range of 4GB.
i386SL, 3,3 volt (τα άλλα είναι πεντάβολτα)
i386SX Uses the 32bit architecture internally, yet has a 16bit external data path.
i386DX

286

i286, IBM-AT. In "protected mode" can access up to 16MB of memory.

i8086, 16/16bit chip. IBM-XT. 16-bit architecture, 16-bit external data path.

i8088, 8/16bit chip. IBM-PC. It is identical to 8086 but has an 8bit external bus. The original PC, introduced in 1981, used this processor. Operate only in "real mode".

processor.MicroUnity Systems Engineering

name::
* McsEngl.processor.MicroUnity Systems Engineering@cptIt,

media processor:
τον κατασκευάζει ο ελληνοαμερικανος ΤΖΟΝ ΜΟΥΣΟΥΡΗΣ. Θα είναι 10 φορες ταχύτερος των Intel με κόστος 50 δολάρια. Ετοιμάζεται για παραγωγή μέσα στο 1995.
[ΚΑΘΗΜΕΡΙΝΗ, 9 ΟΚΤ. 1994]

processor.MIPS Technologies microprocessor

name::
* McsEngl.processor.MIPS Technologies microprocessor@cptIt,

MIPS R4000: 64Bit. ΕΜΦΑΝΙΣΗ ΜΗΧΑΝΗΜΑΤΩΝ ΚΑΛΟΚΑΙΡΙ 1993 ΜΕ ΚΟΣΤΟΣ ΚΑΤΩ $3000. (eg ACER AMERICA CORP.) ΘΑ ΤΡΕΧΟΥΝ WINDOWS NT. [ΜΑΙΟ 1993]
ΚΟΣΤΙΖΕΙ ΟΣΟ Ο i486 33 MHz ΓΥΡΩ $400 ΤΡΕΧΕΙ ΔΕ 2/4 ΦΟΡΕΣ ΓΡΗΓΟΡΟΤΕΡΑ-ΤΟΥ.

MIPS R4200:
150MHz ΛΕΓΕΤΑΙ ΟΤΙ ΕΙΝΑΙ ΤΑΧΥΤΕΡΟΣ ΚΑΙ ΦΘΗΝΟΤΕΡΟΣ ΑΠΟ ALPHA, PENTIUM, POWERPC 601. ΜΗΧΑΝΗΜΑΤΑ ΜΕ ΑΥΤΟΝ ΕΜΦΑΝΙΣΤΗΚΑ ΣΤΗΝ COMDEX 1993.

MIPS R4400 RISC 64-BIT 150 MHZ. ΠΡΟΓΡΑΜΜΑΤΙΣΜΕΝΟΣ ΓΙΑ ΜΑΖΙΚΗ ΠΑΡΑΓΩΓΗ ΤΟΝ ΙΟΥΝΙΟ 93, ΚΟΣΤΙΖΕΙ ΠΕΡΙΠΟΥ ΟΣΟ Ο PENTIUM 66MHz ΚΑΙ ΤΡΕΧΕΙ ΠΕΡΙΠΟΥ ΔΥΟ ΦΟΡΕΣ ΤΑΧΥΤΕΡΑ ΑΠΟ ΤΟΝ ΕΠΕΞΕΡΓΑΣΤΗ ΝΑΥΑΡΧΙΔΑ ΤΗΣ INTEL.

processor.MOTORORA microprocessor

name::
* McsEngl.processor.MOTORORA microprocessor@cptIt,


680x0=CISC
68000, 16/32bit chip.

68030
68040 Motorola 33MHz
- Manufacturers that use motorola's chips are: Altos, Convergent Technologies, Fortune, NCR, Tandy, Sun.

*68060: (1994) 50MHz, 77MIPS [MAY 1993]

processor.NEC microprocessor

name::
* McsEngl.processor.NEC microprocessor@cptIt,

RISC 500MHz: 32bit, CMOS. Καταναλώνει 1/30 της ισχύος των σημερινών τσίπ. Σήμερα βρίσκεται σε πρωτοτυπο στάδιο.
[COMPUTER GO, APR 1994, 52]

VR3000 RISC, 25 MIPS, USED FOR PARALLEL COMPUTER

processor.SUN

name::
* McsEngl.processor.SUN@cptIt,

Sun Microsystems unveils Java chip design
October 24, 1996 Web posted at: 1:45 a.m. EDT
SAN JOSE, California (Reuter) - Sun Microsystems unveiled an eagerly awaited chip designed to boost the speed of computers running Java applications and supply a broad new market for low-cost Internet devices.
When the new microprocessor -- called the picoJava -- comes on the market late next year, it could sharply boost revenues generated by Sun's Microelectronics unit, company officials said at the Microprocessor Forum in San Jose. Sun unveiled the chip's design at the conference.
Sun designed the picoJava chip for use in low-priced devices for accessing the Internet, including so-called network computers. PicoJava is also intended for pagers, cellular phones, navigational devices and pocket communicators.
[http://cnn.com/TECH/9610/24/cyber.summary.reut/sunjava.reut.html]

processor.TI (TEXAS INSTRUMENTS) microprocessor

name::
* McsEngl.processor.TI (TEXAS INSTRUMENTS) microprocessor@cptIt,

microSPARK (Tsunami):
RISC delivers 40 MIPS AT $180 50MHz. the similar CISC intel 486DX/50 COSTS $500. TI, Sun Microsystems, Mentor Graphics companies that developed it.

superSPARK (MAY 1992)
ΚΑΤΑΣΚΕΥΑΖΕΙ 6 ΣΥΜΒΑΤΟΥΣ ΜΕ ΤΗΣ INTEL.

MVP (multimedia video processor) TMS320C80:
αντιπροσωπεύει την επομενη γενια των DSP, ειναι 10 φορες ταχύτερος και φθανει τα 10bops, RISC. Θα χρησιμοποιηθει για συμπιεση/αποσυμπιεση βιντεο, εικονων.

processor.SPECIFIC-DIVISION.ARCHITECTURE

name::
* McsEngl.processor.SPECIFIC-DIVISION.ARCHITECTURE@cptIt,

processor.IA64

name::
* McsEngl.processor.IA64@cptIt,

Η τεχνολογία RISC έχει πεθάνει οριστικά, λέει χωρίς ίχνος συγκίνησης ο κ. Whetstone. Και φθάνει αυτή η φράση του ώστε να κάνεις τη σύνδεση με τις φήμες για την καινούργια τεχνική ΙΑ-64 (Intel Architecture) για την οποία άρχισαν να διαρρέουν οι πρώτες πληροφορίες.
Η τεχνολογία RISC γεννήθηκε το 1974, όταν ο John Cocke παρατήρησε ότι το 20% των οδηγιών σε έναν επεξεργαστή έκανε το 80% των εργασιών. Αρα μπορούσαμε να κερδίσουμε σε ταχύτητα ελαττώνοντας τις οδηγίες, βασιζόμενοι λιγότερο στα κυκλώματα και περισσότερο στα προγράμματα και στον κομπάιλερ που διαβάζει τις εντολές τακτοποιώντας τες με τρόπο που να εκτελούνται όσο γίνεται πιο αποτελεσματικά. Τώρα όμως έρχονται η Intel και η Hewlett-Packard να προτείνουν ένα άλλο πρότυπο εργασίας. Εκεί η προσπάθεια έχει γίνει στο να πραγματοποιούνται περισσότερες εργασίες παράλληλα, μέσα φυσικά στα εκατομμυριοστά του δευτερολέπτου που χρειάζεται η καθεμιά εντολή για να εκτελεσθεί από τα ολοκληρωμένα κυκλώματα.
Αυτό που θα προσπαθήσει η τεχνολογία ΙΑ-64 να βελτιώσει με τη βοήθεια του τρόπου οργάνωσης EPIC (Explicit Parallel Instruction Computing) είναι οι «προφητείες»: ό,τι δηλαδή προσπαθούν οι επεξεργαστές ως σήμερα να κάνουν εκτελώντας και εντολές που τελικά αποδεικνύεται ότι δεν χρειαζόταν να εκτελέσουν αλλά, αν είχαν χρειασθεί, η μηχανή θα είχε κερδίσει κάποιο χρόνο. Αν εκεί υπάρξει βελτίωση, κερδίζεται στα σίγουρα πολύτιμος χρόνος. Ας θυμηθούμε το παράδειγμα μιας τράπεζας που θέλει να είναι πολύ αποτελεσματική στην εξυπηρέτηση των πελατών της και την πρώτη κάθε μήνα έχει ετοιμάσει από πριν τα χαρτιά των αναλήψεων έχοντας παρατηρήσει ότι εκείνη την ημέρα οι πιο πολλοί που μπαίνουν αποσύρουν χρήματα. Αν πέσει μέσα στην πρόβλεψή της, εξοικονομείται πολύς χρόνος και κάτι ανάλογο την ώρα της εκτέλεσης των προγραμμάτων θέλουν τώρα να εκμεταλλευθούν οι κατασκευαστές του νέου επεξεργαστή που θα λέγεται Merced.
Και άλλες τέτοιες καινοτομίες υπάρχουν στην επεξεργασία των δεδομένων, όπως στο διάβασμα από τη μνήμη, που είναι επίσης αιτία μεγάλης καθυστέρησης για έναν επεξεργαστή. Από την πρώτη ανάγνωση που γίνεται στο πρόγραμμα ξεχωρίζονται τα σημεία όπου θα χρειασθεί κάποια πράγματα να φορτωθούν και μπαίνουν ενδείξεις ενώ τα πραγματικά φορτώματα γίνονται κάποια άλλη στιγμή κατάλληλη, ίσως αρκετά πριν, ώστε να θεραπεύεται η ακόμη ανίατη αυτή αργοπορία της όποιας σημερινής μνήμης να ξεφορτώσει αντίγραφα του περιεχομένου της στο πρόγραμμα. Η αλήθεια είναι ότι οι εντολές τώρα είναι μεγαλύτερες σε μήκος στοιχείων, χρειάζονται 40 bits, αλλά οι κατασκευαστές επιμένουν ότι ο επεξεργαστής κερδίζει αλλού σε ταχύτητα ώστε τελικά να συμπεριφέρεται πραγματικά σαν μια Merced-es. Σε δύο χρόνια περίπου θα ξέρουμε αν είχαν δίκιο...
[ΒΗΜΑ 1997δεκε14]

processor.CISC

name::
* McsEngl.processor.CISC@cptIt,
* McsEngl.CISC@cptIt,
* McsEngl.complex-instruction-set-computing@cptIt,

processor.RISC microprocessor

name::
* McsEngl.processor.RISC microprocessor@cptIt,
* McsEngl.RISC-processor@cptIt,
* McsEngl.reduced-instruction-set-computing@cptIt,

Η τεχνολογία RISC γεννήθηκε το 1974, όταν ο John Cocke παρατήρησε ότι το 20% των οδηγιών σε έναν επεξεργαστή έκανε το 80% των εργασιών. Αρα μπορούσαμε να κερδίσουμε σε ταχύτητα ελαττώνοντας τις οδηγίες, βασιζόμενοι λιγότερο στα κυκλώματα και περισσότερο στα προγράμματα και στον κομπάιλερ που διαβάζει τις εντολές τακτοποιώντας τες με τρόπο που να εκτελούνται όσο γίνεται πιο αποτελεσματικά.
[ΒΗΜΑ 1997dec14]

They use simple instructions, so they need to process more instructions to do the same amount of work as a CISC machine.
[BYTE, OCT. 1994, 65]

"ΟΙ ΕΠΕΞΕΡΓΑΣΤΕΣ RISC ΑΠΟΤΕΛΟΥΝ ΤΗ ΜΕΓΑΛΥΤΕΡΗ ΑΠΕΙΛΗ ΓΙΑ ΤΟ ΜΕΛΛΟΝ ΤΟΥ PENTIUM. ΧΩΡΙΣ ΠΕΡΙΟΡΙΣΜΟΥΣ ΓΙΑ ΔΙΑΤΗΡΗΣΗ ΣΥΜΒΑΤΟΤΗΤΑΣ ΜΕ ΤΟΝ ΠΑΛΙΟ ΕΞΟΠΛΙΣΜΟ ΚΑΙ ΤΟ ΛΟΓΙΣΜΙΚΟ, ΤΑ ΤΣΙΠ RISC ΕΙΝΑΙ ΕΛΕΥΘΕΡΑ ΝΑ ΕΝΣΤΕΡΝΙΣΤΟΥΝ ΡΙΖΙΚΕΣ ΝΕΕΣ ΑΡΧΙΤΕΚΤΟΝΙΚΕΣ ΚΑΙ ΠΡΟΗΓΜΕΝΕΣ ΘΕΩΡΙΕΣ ΣΧΕΔΙΑΣΗΣ. ΤΟ ΑΠΟΤΕΛΕΣΜΑ ΕΙΝΑΙ ΟΤΙ ΦΤΑΝΟΥΝ ΣΕ ΕΝΤΥΠΩΣΙΑΚΟΤΑΤΑ ΕΠΙΠΕΔΑ ΣΚΛΗΡΩΝ ΕΠΙΔΟΣΕΩΝ, ΠΟΥ ΑΦΗΝΟΥΝ ΠΟΛΥ ΠΙΣΩ ΤΑ ΠΕΡΙΣΣΟΤΕΡΑ ΒΑΣΙΣΜΕΝΑ ΣΕ CISC ΤΣΙΠ"
[RAM, MAY 1993, 64]

processor.SPECIFIC-DIVISION.ATTRIBUTE

name::
* McsEngl.processor.SPECIFIC-DIVISION.ATTRIBUTE@cptIt,

processor.SPECIFIC-DEVISION.bit

name::
* McsEngl.processor.SPECIFIC-DEVISION.bit@cptIt,

_SPECIFIC:
* 32-bit##
* 64-bit##

processor.ARM

name::
* McsEngl.processor.ARM@cptIt,

_TIME:
According to ARM Holdings, in 2010 alone, producers of chips based on ARM architectures reported shipments of 6.1 billion ARM-based processors, representing 95% of smartphones, 35% of digital televisions and set-top boxes and 10% of mobile computers. It is the most widely used 32-bit instruction set architecture in terms of quantity produced.[9][10]
[http://en.wikipedia.org/wiki/ARM_architecture]

processor.FUZZY microprocessor

name::
* McsEngl.processor.FUZZY microprocessor@cptIt,

OKI ELECTRIC, JAPAN, MSM91U112, 25kFLOPS

processor.NEUROCHIPS microprocessor

name::
* McsEngl.processor.NEUROCHIPS microprocessor@cptIt,

RICOH
LSI RN-200, 1,5gigaCUPS Connection updates per second.
NI 1000, INTEL&NESTOR, 5000/10000 cps ΣΤΗΝ ΑΝΑΓΝΩΣΗ ΧΑΡΑΚΤΗΡΩΝ.[ΜΑΥ 1993]

processor.MULTICORE

name::
* McsEngl.processor.MULTICORE@cptIt,
* McsEngl.multicore-processor@cptIt13i,

A multi-core CPU (or chip-level multiprocessor, CMP) combines two or more independent cores into a single package composed of a single integrated circuit (IC), called a die, or more dies packaged together. A dual-core processor contains two cores and a quad-core processor contains four cores. A multi-core microprocessor implements multiprocessing in a single physical package. A processor with all cores on a single die is called a monolithic processor. Cores in a multicore device may share a single coherent cache at the highest on-device cache level (e.g. L2 for the Intel Core 2) or may have separate caches (e.g. current AMD dual-core processors). The processors also share the same interconnect to the rest of the system. Each "core" independently implements optimizations such as superscalar execution, pipelining, and multithreading. A system with N cores is effective when it is presented with N or more threads concurrently. The most commercially significant (or at least the most 'obvious') multi-core processors are those used in computers (primarily from Intel & AMD) and game consoles (e.g., the Cell processor in the PS3). In this context, "multi" typically means a relatively small number of cores. However, the technology is widely used in other technology areas, especially those of embedded processors, such as network processors and digital signal processors, and in GPUs.
[http://en.wikipedia.org/wiki/Multi-core_%28computing%29]

processor.ΑΔΑΜΑΝΤΙΝΑ ΤΣΙΠ

name::
* McsEngl.processor.ΑΔΑΜΑΝΤΙΝΑ ΤΣΙΠ@cptIt,

Η εταιρια Applied science technology με έδρα τη Μασαχουσέτη κατασκεύασε ένα αδαμάντινο τσίπ 10χ10 εκ. με στοχο να το χρησιμοποιήσει στη δημιουργία υπερυπολογιστή ΜΙΚΡΟΤΕΡΟΥ απο όσους έχουν κατασκευαστεί μέχρι σήμερα. Χωρουν περισότερα τρανζίστορς απο τα σημερινά.
[ΒΗΜΑ, 8 ΙΑΝ. 1995, Γ32]

processor.ΚΒΑΝΤΙΚΑ ΤΣΙΠ microprocessor

name::
* McsEngl.processor.ΚΒΑΝΤΙΚΑ ΤΣΙΠ microprocessor@cptIt,

ΟΙ ΕΡΕΥΝΗΤΕΣ ΠΑΡΟΥΣΙΑΝ ΕΝΑ ΤΕΤΟΙΟ ΤΣΙΠ ΠΟΥ ΕΙΝΑΙ 3 ΦΟΡΕΣ ΓΡΗΓΟΡΟΤΕΡΟ ΑΠΟ ΤΑ ΣΥΜΒΑΤΙΚΑ.
ΟΙ ΠΡΑΚΤΙΚΕΣ ΕΦΑΡΜΟΓΕΣ ΘΑ ΑΝΑΠΤΥΧΘΟΥΝ ΣΕ 5-6 ΧΡΟΝΙΑ.
ΟΙ ΕΙΔΙΚΟΙ ΤΗΣ ΤΙ ΠΡΟΒΛΕΠΟΥΝ ΟΤΙ ΜΕ ΑΥΤΑ ΤΑ ΤΣΙΠΣ ΘΑ ΚΑΤΑΣΚΕΥΑΣΤΟΥΝ ΥΠΟΛΟΓΙΣΤΕΣ ΠΟΥ ΘΑ ΕΧΟΥΝ ΤΗ ΔΥΝΑΤΟΤΗΤΑ ΝΑ ΣΚΕΠΤΟΝΤΑΙ, ΝΑ ΒΛΕΠΟΥΝ ΚΑΙ ΝΑ ΜΙΛΟΥΝ ΣΑΝ ΑΝΘΡΩΠΙΝΑ ΟΝΤΑ.
[COMPUTER GO, JAN 1994, 23]

FvMcs.computer'STORAGE-DEVICE

name::
* McsEngl.conceptIt14,
* McsEngl.computer'STORAGE-DEVICE@cptIt,
* McsEngl.FvMcs.computer'STORAGE-DEVICE@cptIt,
* McsEngl.cmr'storage@cptIt,
* McsEngl.cmrstg@cptIt,
* McsEngl.cpt'computer'storage@cptIt,

* McsEngl.auxiliary-storage@cptIt,
* McsEngl.computer-storage@cptIt14,
* McsEngl.data-storage-device@cptIt14,
* McsEngl.device.data-storage@cptIt14,
* McsEngl.hardware-storage@cptIt14,
* McsEngl.non-volatile-memory@cptIt14,
* McsEngl.secondary-memory@cptIt,
* McsEngl.storage@cptIt14,
* McsEngl.storage-device@cptIt14,
* McsEngl.storage-hardware@cptIt14,
* McsEngl.storage-medium@cptIt14, {2012-12-15}
====== lagoGreek:
* McsElln.ΑΠΟΘΗΚΕΥΣΗ@cptIt,
* McsElln.ΑΠΟΘΗΚΗ@cptIt,
* McsElln.ΑΠΟΘΗΚΕΥΤΙΚΟ-ΜΕΣΟ@cptIt,
* McsElln.ΑΠΟΘΗΚΕΥΤΙΚΟΣ-ΧΩΡΟΣ@cptIt,
* McsElln.ΔΕΥΤΕΡΕΟΥΣΑ-ΜΝΗΜΗ@cptIt,
* McsElln.ΜΕΣΟ-ΑΠΟΘΗΚΕΥΣΗΣ-ΚΟΜΠΙΟΥΤΕΡ@cptIt,

Devices that provide persistent storage capabilities are called non-volatile memory devices. Examples are a hard drive, floppy disk and CD.
Devices that need power to provide data, as does random access memory (RAM), are called volatile memory devices and do not provide persistent storage.
On many early personal data assistants (PDAs), all data was stored in RAM. When the batteries ran out of power, all data was lost. Most newer PDA designs provide persistent storage to prevent the user from losing all data on the device.
[http://en.wikipedia.org/wiki/Persistence_%28computer_science%29]

DEFINITION

Κάθε συσκευή που χρησιμεύει στην αποθήκευση πληροφοριών στο κομπιουτερ.

A data storage device is a device for recording (storing) information (data). Recording can be done using virtually any form of energy, spanning from manual muscle power in handwriting, to acoustic vibrations in phonographic recording, to electromagnetic energy modulating magnetic tape and optical discs.

A storage device may hold information, process information, or both. A device that only holds information is a recording medium. Devices that process information (data storage equipment) may either access a separate portable (removable) recording medium or a permanent component to store and retrieve information.

Electronic data storage requires electrical power to store and retrieve that data. Most storage devices that do not require vision and a brain to read data fall into this category. Electromagnetic data may be stored in either an analog data or digital data format on a variety of media. This type of data is considered to be electronically encoded data, whether or not it is electronically stored in a semiconductor device, for it is certain that a semiconductor device was used to record it on its medium. Most electronically processed data storage media (including some forms of computer data storage) are considered permanent (non-volatile) storage, that is, the data will remain stored when power is removed from the device. In contrast, most electronically stored information within most types of semiconductor (computer chips) microcircuits are volatile memory, for it vanishes if power is removed.

With the exception of barcodes and OCR data, electronic data storage is easier to revise and may be more cost effective than alternative methods due to smaller physical space requirements and the ease of replacing (rewriting) data on the same medium. However, the durability of methods such as printed data is still superior to that of most electronic storage media. The durability limitations may be overcome with the ease of duplicating (backing-up) electronic data.
[http://en.wikipedia.org/wiki/Data_storage_device]

cmrstg'GENERIC

_GENERIC:
* Computer Memory#cptIt999#
* entity.economic.satisfierWorking.techInfo.hardware#cptItsoft1#

cmrstg'ATTRIBUTES

name::
* McsEngl.cmrstg'ATTRIBUTES@cptIt,


INTERNAL+EXTERNAL DEVICE
Reliability
Suitability
Sustained data transfer


model:
price:
computer support:
seek time, ms:
internal/external:
weight:
size:
power suply:
transfer speed Mbps:
interface:
cost of interface adapter:
options:
Media
size:
manufacturer:
cost per disk
cost per MB:
COMMENTS:

cmrstg'advantage

name::
* McsEngl.cmrstg'advantage@cptIt,

Traditional media such as PAPER or MICROFILM are available to only one person at a time. By contrast, with storage in DIGITAL FORM, optical disc systems allow multiple users to view teh same information simultaneously.
[Chorafas, 1990, 317#cptResource444]

cmrstg'Capacity

name::
* McsEngl.cmrstg'Capacity@cptIt,
* McsEngl.conceptIt14.1,
* McsEngl.conceptIt226,
* McsEngl.STORAGE'CAPACITY@cptIt226,
* McsEngl.storage-capacity@cptIt,
* McsElln.ΧΩΡΗΤΙΚΟΤΗΤΑ-ΑΠΟΘΗΚΕΥΤΙΚΟΥ-ΧΩΡΟΥ@cptIt,

{time.2014}:
=== Return of the tape: Sony 185TB cassette tape packs a wallop but for what purpose?
[http://www.techtimes.com/articles/6556/20140506/cassette-tape-tape-sony-185tb.htm]

Prefix

_Prefix:
yotta  Y  Septillion  10^24  1991  1000^8
zetta  Z  Sextillion  10^21  1991  1000^7
exa  E  Quintillion  10^18  1975  1000^6
peta  P  Quadrillion  10^15  1975  1000^5
tera  T  trillion    10^12  1960  1000^4
giga  G  billion    10^9    1000^3
mega  M  million    10^6    1000^2
kilo  K  thousand  10^3    1000^1

k το σύμβολο αυτό σημαίνει 1024 (και μή σπάτε το κεφάλι σας να ρωτάτε "γιατί", πάρτε το σα δεδομένο). Ετσι 8k σημαίνει 8χ1024=8192 χαρακτήρες.
[JARRET, 1987, 21#cptResource117]

Ξεχάστε το terabyte, έρχεται το hellabyte;
Ο ασύλληπτος όγκος δεδομένων επιβάλλει την επινόηση νέων, μεγαλύτερων μονάδων για την αποθήκευσή τους
ΔΗΜΟΣΙΕΥΣΗ: 14/12/2012 22:44

Η Google επενδύει σε κέντρα αποθήκευσης δεδομένων για να χωρέσει όσο το δυνατόν περισσότερα από τα peta, yotta ή και hella bytes πληροφοριών που θα παραχθούν στο μέλλον
 
7

emailεκτύπωση
Ουάσινγκτον
Για ορισμένους ο χώρος για αποθήκευση δεδομένων είναι το Ελ Ντοράντο του μέλλοντος και κάποιοι, όπως η Google, επενδύουν ήδη σε αυτόν. Πέρα όμως από την υλική, το πρόβλημα έχει και μια… γραφειοκρατική πλευρά καθώς ακόμη και αν εξασφαλίσουμε τον χώρο για να «στριμώξουμε» τις ιλιγγιωδώς αυξανόμενες πληροφορίες του online σύμπαντός μας, αυτός θα είναι ενδεχομένως άχρηστος χωρίς την εισαγωγή μιας μεγαλύτερης μονάδας που να τις… χωράει.

Tera, petta, yotta… και μετά τι;

Πριν από κάποια χρόνια ένα gigabyte ήταν για μας κάτι πολύ μεγάλο ενώ τα… τερατώδη τότε στα μάτια μας terabytes αφορούσαν αποκλειστικά τους κολοσσούς της τεχνολογίας και τις τράπεζες επιστημονικών δεδομένων. Σήμερα γεμίζουμε τα gigabytes σε χρόνο dt, τα terabytes έχουν μπει για τα καλά στα σπίτια μας, οι κολοσσοί «τρέχουν» σε petabytes ενώ τρεις επιπλέον τάξεις μονάδων έχουν προστεθεί για να χωρέσουν τον αυξανόμενο όγκο των πληροφοριών που μας κατακλύζουν: τα exabytes, τα zettabytes και τα yottabytes.

Το πρόθεμα yotta αντιπροσωπεύει τη μεγαλύτερη επίσημη μονάδα σήμερα: ακολουθείται από 24 μηδενικά και αναγνωρίστηκε (μαζί με το zetta, με 21 μηδενικά) στη 19η συνεδρίαση της Διεθνούς Επιτροπής Μέτρων και Σταθμών το 1991. Μετά από αυτό όμως τίποτε «επίσημο» δεν υπάρχει για να περιγράψει μεγαλύτερους όγκους δεδομένων. Πολλοί θεωρούν ότι, αν θέλουμε να προλάβουμε δυσάρεστες εξελίξεις, θα πρέπει από τώρα να θεσπίσουμε νέους όρους, μεγαλύτερης «χωρητικότητας» από το yotta,

Hella ή xenna;

Τον Μάρτιο του 2010 μια εκστρατεία ξεκίνησε από την Καλιφόρνια προωθώντας την υιοθέτηση του όρου «hella» για τον ορισμό του ψηφίου 1.000.000.000.000.000.000.000.000.000 – της μονάδας δηλαδή που ακολουθείται από 27 μηδενικά. Στην καλιφορνέζικη σλανγκ «hella» (από το «hell of a lot of») σημαίνει «πολλά» και η πρόταση βρήκε … hella υποστηρικτές. Η εκστρατεία, η οποία οργανώθηκε από τον Οστιν Σέντεκ του Πανεπιστημίου της Καλιφόρνιας, έχει βρει ισχυρή στήριξη στην επιστημονική κοινότητα η οποία πιέζει για την εισαγωγή του όρου στο Διεθνές Σύστημα Μονάδων (SI).

Αν το «hella» οπτικά θυμίζει κάτι από… Ελλάδα, η αντίπαλη πρόταση έχει βάση καθαρά ελληνική: μια μερίδα επιστημόνων προωθεί ως όρο για το επόμενο «σούπερ» ψηφίο το «xenna», από το «x» (που ακολουθεί το yotta στο «αλφάβητο» προθεμάτων του SI) και το ελληνικό «εννέα» ως έκφραση της ένατης τάξης του 103. Ως εναλλακτικές προτείνονται επίσης οι «nonna» και «enna» ή οποιαδήποτε παραλλαγή της ελληνικής ή της λατινικής λέξης για τον αριθμό εννέα.

Όλα ωστόσο είναι προς το παρόν απλές προτάσεις. Η Διεθνής Επιτροπή Μέτρων και Σταθμών κινείται σχετικά αργά και κατόπιν πολλής σκέψεως ενώ ήδη έχει να ασχοληθεί με πολύ πιο επείγοντα ζητήματα, όπως ο επαναπροσδιορισμός του κιλού. Οι διαθέσεις και οι τάσεις ίσως φανούν στην επόμενη συνεδρία της, το 2013.
[http://www.tovima.gr/science/technology-planet/article/?aid=488837]

MEASUREMENT

1 TB, E-Systems storage library at $685,000 (1991)


90 GB, IBM 3390 disk drive (1991)
48 GB, AViiON 7000/8000 of Data General. Under $100000 (1991)

cmrstg'connector

name::
* McsEngl.cmrstg'connector@cptIt,
* McsEngl.cmrstg'bus@cptIt,
* McsEngl.cmrstg'controller@cptIt,
* McsEngl.cmrstg'interface@cptIt,

_DESCRIPTION:
Πρωτόκολλο επικοινωνίας με τον υπολογιστή.
===
Η επικοινωνια των σύγχρονων δίσκων με τη CPU γινεται με τη βοήθεια κατάλληλου interface. Στην περίπτωση των δίσκων, τα interfaces ονομάζονται ελεγκτές (controllers)
[COMPUTER GO, JUL 1994, 67]

eSATA

name::
* McsEngl.eSATA@cptIt,

_DESCRIPTION:
Serial ATA is the next-generation internal storage interconnect, designed to replace parallel ATA technology
Serial ATA (SATA, is a computer bus technology designed for transfer of data to and from a hard disk. It is the successor to the legacy Advanced Technology Attachment standard (ATA, also known as IDE). This older technology was retroactively renamed Parallel ATA (PATA) to distinguish it from Serial ATA. This interface uses 7-pin cables for the data connection, and transmits the data serially rather than in parallel. In addition, Serial ATA should give users the ability to hot swap hard drives. This adds a capability that more expensive systems such as SCSI and Fibre Channel have had for a long time, though the future will tell how widely users exploit that aspect of the technology. Serial ATA also reduces the signalling voltage from the 5 volts used in P-ATA down to 0.5 volts, which reduces power consumption and electrical interference. Due to serial transfer and lower power the maximum allowable length of SATA cables exceeds that of ATA ribbon cables.

The Serial ATA (SATA) bus is defined over two separate connectors, one connector for the data lines and one for the power lines (SATA power pinout). A Serial ATA Hard drive may also have a third connector for legacy PATA power connections. The PATA power connector used instead of the SATA power in some early devices.
Physically, the SATA power and data cables are the most noticeable change from Parallel ATA. The SATA standard defines a data cable using seven pins to supply four conductors shielded with ground supplied by the other three pins.
[http://pinoutsguide.com/HD/serialATA_pinout.shtml]

IDE

name::
* McsEngl.PATA@cptIt,
* McsEngl.ATA@cptIt,
* McsEngl.IDE-Integrated-Drive-Electronics@cptIt,
* McsEngl.Integrated-Drive-Electronics@cptIt,
* McsEngl.PATA@cptIt,

_DESCRIPTION:
Serial ATA (SATA, is a computer bus technology designed for transfer of data to and from a hard disk. It is the successor to the legacy Advanced Technology Attachment standard (ATA, also known as IDE).
[http://pinoutsguide.com/HD/serialATA_pinout.shtml]
===
IDE DISKS:
ΠΛΕΟΝΕΚΤΗΜΑΤΟΥΣ ΕΙΝΑΙ Η ΕΥΚΟΛΙΑ ΜΕ ΤΗΝ ΟΠΟΙΑ ΔΗΛΩΝΟΝΤΑΙ ΣΤΟ ΣΥΣΤΗΜΑ.
ΠΡΩΤΑ ΒΙΔΩΝΟΝΤΑΙ ΣΤΟ ΦΑΤΝΙΟ.
ΜΕΤΑ ΣΥΝΔΕΟΥΜΕ ΜΕ ΤΟ ΕΙΔΙΚΟ ΚΑΛΩΔΙΟ-ΤΑΙΝΙΑ ΔΙΣΚΟΥ ΜΕ ΤΟΝ ΕΛΕΓΚΤΗ, ΜΕ ΤΗ ΣΩΣΤΗ ΠΟΛΙΚΟΤΗΤΑ (ΤΟ ΚΟΚΚΙΝΟ ΚΑΛΩΔΙΑΚΙ ΣΤΗΝ ΑΚΙΔΑ 1 ΤΟΥ ΕΛΕΓΚΤΗ ΚΑΙ ΤΗΝ 1 ΤΟΥ ΔΙΣΚΟΥ).
ΒΕΒΑΙΩΝΟΜΑΣΤΕ ΟΤΙ Ο ΕΛΕΓΚΤΗΣ ΕΙΝΑΙ ΕΝΕΡΓΟΠΟΙΗΜΕΝΟΣ (ΓΙΑΤΙ ΣΥΝΗΘΩΣ ΒΡΙΣΚΕΤΑΙ ΣΕ ΜΙΑ ΚΑΡΤΑ ΠΟΛΛΑΠΛΩΝ ΛΕΙΤΟΥΡΓΙΩΝ, ΠΟΥ ΔΙΑΘΕΤΕΙ ΚΑΙ ΚΥΚΛΩΜΑΤΑ ΘΥΡΩΝ ΣΕΙΡΑΣ ΚΑΙ ΠΑΡΑΛΛΗΛΙΑΣ ΚΑΙ ΠΑΙΧΝΙΔΙΩΝ ΚΑΙ ΤΟΝ ΕΛΕΓΚΤΗ ΔΙΣΚΕΤΩΝ) ΚΑΙ ΜΕΤΑ ΔΗΛΩΝΟΥΜΕ ΣΤΟ BIOS ΤΟΥ ΥΠΟΛΟΓΙΣΤΗ ΤΟΝ ΑΡΙΘΜΟ ΚΥΛΙΝΡΩΝ, ΚΕΦΑΛΩΝ ΚΑΙ ΤΟΜΕΩΝ, ΣΥΜΦΩΝΑ ΜΕ ΤΟΝ ΚΑΤΑΣΚΕΥΑΣΤΗ. ΜΕΤΑ ΤΡΕΧΟΥΜΕ ΤΟ FDISK.
[RAM, OKT 1993, 126]

USB

name::
* McsEngl.USB-storage-connector@cptIt,

_DESCRIPTION:
USB and Firewire hard disks requires conversion of all communication, so external USB/Firewire enclosures include an IDE or SATA bridge chip. Some drive features (like S.M.A.R.T.) cannot be exploited that way and transfer speed with USB/Firewire bridge is limited. However, SATA does not provide power, which means that external 2.5 disks which would otherwise be powered over the USB or Firewire cable need a separate power cable when connected over eSATA.
[http://pinoutsguide.com/HD/serialATA_pinout.shtml]

SATA

name::
* McsEngl.SATA@cptIt,
* McsEngl.serial-ATA@cptIt,
* McsEngl.SATA@cptIt,

SATAIII 6.0Gbps

name::
* McsEngl.SATAIII 6.0Gbps@cptIt,

_DESCRIPTION:
SATA 6.0Gb/s (SATA III, 6.0Gbps) - SATA revision 3.0 doubles the speed of the current 3Gb/s version, reaching transfer speeds of 6Gb/s.
[http://pinoutsguide.com/HD/serialATA_pinout.shtml]

SATAII 3.0Gbps

name::
* McsEngl.SATAII 3.0Gbps@cptIt,

_DESCRIPTION:
SATA 3.0Gb/s (SATA II, 3.0Gbps) - second-generation of SATA interfaces. A 3Gb/s signalling rate was added to the PHY layer. SATA II devices are required to support the original 1.5Gb/s rate. In practice, some older SATA systems require the peripheral device's speed be manually limited to 150MB/s with the use of a jumper. SATA II uses same encoding as SATA I featuring an actual data transfer rate of 2.4 Gb/s, or 300 MB/s.
[http://pinoutsguide.com/HD/serialATA_pinout.shtml]

SATA/150 1.5Gbps

name::
* McsEngl.SATA/150 1.5Gbps@cptIt,

_DESCRIPTION:
SATA/150 (1500Mbps) - first-generation of Serial ATA interfaces, also known as SATA/150, run at 1.5 Gigahertz (GHz). Actual data transfer rate is up to 1.2 Gigabits per second (Gb/s), or 150 megabytes per second (MB/s). The simplicity of a serial link and the use of LVDS allow to use of longer drive cables.
[http://pinoutsguide.com/HD/serialATA_pinout.shtml]

SCSI

FAST SCSI-2,
SCSI-2,
WIND SCSI-2,

_DESCRIPTION:
SCSI (ΣΚΑΖΙ) ΔΙΣΚΟΙ ΠΡΟΟΡΙΖΟΝΤΑΙ ΠΕΡΙΣΣΟΤΕΡΟ ΓΙΑ ΕΞΥΠΗΡΕΤΗΤΕΣ ΔΙΚΤΥΟΥ, ΟΠΟΥ ΧΡΕΙΑΖΟΝΤΑΙ ΠΟΛΛΟΙ ΚΑΙ ΜΕΓΑΛΟΙ ΔΙΣΚΟΙ ΣΕ ΕΝΑΝ ΥΠΟΛΟΓΙΣΤΗ, ΙΚΑΝΟΤΗΤΑ ΠΟΥ ΜΟΝΟ ΑΥΤΟ ΤΟ ΠΡΩΤΟΚΟΛΛΟ ΕΧΕΙ.
ΔΕΧΕΤΑΙ ΜΕΧΡΙ 8 ΣΥΣΚΕΥΕΣ (ΟΧΙ ΜΟΝΟ ΔΙΣΚΟΥΣ) ΑΝΑ ΕΛΕΓΚΤΗ, ΕΝΩ ΤΟ IDE ΜΕΧΡΙ 2 ΔΙΣΚΟΥΣ ΣΤΟ ΣΥΝΟΛΟ.
[RAM, OKT 1993, 124]

SAS

name::
* McsEngl.SAS-storage-connector@cptIt,
* McsEngl.Serial-Attached-SCSI-controller@cptIt,

_DESCRIPTION:
SATA drives may be plugged into Serial Attached SCSI (SAS) controllers and communicate on the same physical cable as native SAS disks. SAS disks, however, may not be plugged into a SATA controller.
[http://pinoutsguide.com/HD/serialATA_pinout.shtml]

USB

name::
* McsEngl.USB-storage-connector@cptIt,

_DESCRIPTION:
USB and Firewire hard disks requires conversion of all communication, so external USB/Firewire enclosures include an IDE or SATA bridge chip. Some drive features (like S.M.A.R.T.) cannot be exploited that way and transfer speed with USB/Firewire bridge is limited. However, SATA does not provide power, which means that external 2.5 disks which would otherwise be powered over the USB or Firewire cable need a separate power cable when connected over eSATA.
[http://pinoutsguide.com/HD/serialATA_pinout.shtml]

cmrstg'resourceInfHmn#cptResource843#

name::
* McsEngl.cmrstg'resourceInfHmn@cptIt,

BYTE, OCT 92

cmrstg'Size

name::
* McsEngl.cmrstg'Size@cptIt,

cmrstg'Speed

name::
* McsEngl.cmrstg'Speed@cptIt,

cmrstg'Access-time#cptIt499#

name::
* McsEngl.cmrstg'Access-time@cptIt,

The access time for a storage device such as a disk is the amount of time required to begin delivering data after the CPU sends a data request. Since different operating environments can affect access times, the figure given is usually an average time. Benchmark tests will often measure a system's access times.

cmrstg'seek-time

name::
* McsEngl.cmrstg'seek-time@cptIt,

Seek time is the length of time the disk head takes to move from whatever track it happens to be on, to whatever track you want to read.
MICRODISK (MICROPOLIS/ΠΟΥΛΙΑΔΗΣ): 3,9 ms

cmrstg'transfer-rate#cptIt498#

name::
* McsEngl.cmrstg'transfer-rate@cptIt,

TRANSFER RATE/ΔΙΑΜΕΤΑΓΩΓΗ
Transfer rate is the speed at which bits can be transfered from the disk to the computer.


33MB/sec    ULTRA ATA
13.3 MB/S    SEAGATE(LIM)
10 MB/S    FAST SCSI-2
4.3 MB/S    STANDARD IDE

SPECIFIC

* cmrstg.specific,

_SPECIFIC:
* FLOPPY-DISK-DRIVE#cptIt46#
* FLASH-MEMORY-CHIP#cptIt91#
* FLOPTICAL-DRIVE#cptIt145#
* LS-120-DRIVE#cptIt107#
* MAGNETIC-HARD-DISK#cptIt55#
* OPTICAL-STORAGE#cptIt182#,
* OPTICAL#cptIt964#
* PCMCIA-DISK#cptIt291#
* TAPE-STREAMER#cptIt18#
* ΠΟΛΥΜΕΡΕΣ-ΦΙΛΜ#cptIt285#

cmrstg.DNA

name::
* McsEngl.DNA-data-storage,

DNA data storage. Convert data to base 4 and you can encode it on synthetic DNA. Why would we want to do that? Simple: a little bit of DNA stores a whole lot of information. In fact, a group of Swiss researchers speculate that about a teaspoon of DNA could hold all the data humans have generated to date, from the first cave drawings to yesterday’s Facebook status updates. It currently takes a lot of time and money, but gene editing may be the future of big data: Futurism recently reportedthat Microsoft is investigating the use of synthetic DNA for secure long-term data storage and has been able to encode and recover 100 percent of its initial test data.
[https://www.weforum.org/agenda/2016/09/7-innovations-that-could-shape-the-future-of-computing]

Towards practical, high-capacity, low-maintenance information storage in synthesized DNA
Nick Goldman,   Paul Bertone,   Siyuan Chen,   Christophe Dessimoz,   Emily M. LeProust, Botond Sipos   & Ewan Birney
AffiliationsContributionsCorresponding author
Nature (2013) doi:10.1038/nature11875
Received 15 May 2012 Accepted 12 December 2012 Published online 23 January 2013
Digital production, transmission and storage have revolutionized how we access and use information but have also made archiving an increasingly complex task that requires active, continuing maintenance of digital media. This challenge has focused some interest on DNA as an attractive target for information storage1 because of its capacity for high-density information encoding, longevity under easily achieved conditions2, 3, 4 and proven track record as an information bearer. Previous DNA-based information storage approaches have encoded only trivial amounts of information5, 6, 7 or were not amenable to scaling-up8, and used no robust error-correction and lacked examination of their cost-efficiency for large-scale information archival9. Here we describe a scalable method that can reliably store more information than has been handled before. We encoded computer files totalling 739 kilobytes of hard-disk storage and with an estimated Shannon information10 of 5.2?Χ?106 bits into a DNA code, synthesized this DNA, sequenced it and reconstructed the original files with 100% accuracy. Theoretical analysis indicates that our DNA-based storage scheme could be scaled far beyond current global information volumes and offers a realistic technology for large-scale, long-term and infrequently accessed digital archiving. In fact, current trends in technological advances are reducing DNA synthesis costs at a pace that should make our scheme cost-effective for sub-50-year archiving within a decade.
[http://www.nature.com/nature/journal/vaop/ncurrent/full/nature11875.html]

cmrstg.HARDDISK_DRIVE (magnetic)

name::
* McsEngl.conceptIt55,
* McsEngl.computer-disk@cptIt55,
* McsEngl.harddisk,
* McsEngl.hard-disk-magnetic@cptIt55,
* McsEngl.hard-disk-drive-(HDD),
* McsEngl.hard-disk,
* McsEngl.hard-drive,
* McsEngl.HDD-(Hard-Disk-Drive),
* McsEngl.cmrdsk,
* McsElln.ΣΚΛΗΡΟΣ-ΔΙΣΚΟΣ@cptIt,

hdd'DEFINITION

hdd'GENERIC

_GENERIC:
* COMPUTER_STORAGE#cptIt14#

hdd'ACCESS-TIME#cptIt499#

name::
* McsEngl.hdd'ACCESS-TIME@cptIt,

Αποδεκτή τιμή είναι μέχρι 14ns.
[COMPUTER GO, DEC 1995, ΕΝΘΕΤΟ 35]

hdd'CAPACITY#cptIt14.1#

name::
* McsEngl.hdd'CAPACITY@cptIt,

Hard drive breakthrough claimed
Seagate says it has figured out a way to use lasers, microscopic lenses, and tiny mirrors to pack up to 20 times more data onto hard drives.
February 16, 6:45 p.m. PT in Computing
[c/net] 1998feb17

hdd'CASHING DISK CONTROLLER

name::
* McsEngl.hdd'CASHING DISK CONTROLLER@cptIt,

INDELCOM, 4293562, Average access time 0,3 ms.

hdd'CLUSTER

name::
* McsEngl.hdd'CLUSTER@cptIt,

The file system depends on a number of special areas of the disk set aside for organization when the disk is formatted: the master boot record, the partition table, the boot record, the file allocation table (from which the FAT system takes its name), and the root directory. At a low level, disks are organized into 512-byte groupings called sectors. The FAT system allocates space for files using a unit called a cluster, made up of an integral number of sectors. The number of sectors in a cluster must be a power of 2. (You can run CHKDSK or SCANDISK to see how big the clusters are on your system.) Microsoft calls these clusters allocation units, and SCANDISK's report includes a notation of their size, such as "16,384 bytes in each allocation unit." You can normally compute the cluster size by dividing the disk size by 64K (65,536 bytes) and rounding up to the nearest power of 2. Thus, a 1.2GB disk has clusters that are 32K in size: 1.2GB (1,258,291.2K) divided by 65,536 is 19.2K, which rounds up to 32K.

hdd'CYLIDERS/HEADS/SECTORS

name::
* McsEngl.hdd'CYLIDERS/HEADS/SECTORS@cptIt,

hdd'GUARANTEE

name::
* McsEngl.hdd'GUARANTEE@cptIt,

hdd'HEAD

name::
* McsEngl.hdd'HEAD@cptIt,

When the hard disk drive is not in use the read/write heads are locked in their current position as a safety measure, but not necessarily away from critical areas of the disk platter(s).
A hard disk drive feature that does ensure the read/write heads to be securely parked away from all critical areas of the platter is called automatic park. This feature is implemented whenever power is turned off or lost.
Most hard drives that offer the automatic park feature use voice- coil technology.
The mechanism that lifts the heads away from the platter when power is removed is called the automatic head lifter.
[SOURCE: PC-GLOSSARY 1993]

hdd'INSTALLATION

name::
* McsEngl.hdd'INSTALLATION@cptIt,

** Κάνω FORMAT μέσω του BIOS

** Τρέχω το FDISK για δημιουργία 'διαμερισματος'

** Κάνω FORMAT το δίσκο.

hdd'INTERFACE/CONTROLLER

name::
* McsEngl.hdd'INTERFACE/CONTROLLER@cptIt,

Πρωτόκολο επικοινωνίας με τον υπολογιστή.


* IDE/ATA
* SCSI

BEST'BUY:
* Quantum fireball ST (ultra ATA) 82000+ 3.2GB 1997jun

hdd'MTBF

name::
* McsEngl.hdd'MTBF@cptIt,

Mean Time Between Failures.

300-500 χιλ. ώρες

hdd'SECTOR

name::
* McsEngl.hdd'SECTOR@cptIt,

A sector is an equally spaced division of data within each track of a disk and is the smallest unit of storage read or written by the disk drive.
Each track consists of the same number of sequentially labelled sectors. Thus, sector three follows sector two on each track, and so on.
Sectors may be referred to as either physical sectors or logical sectors. Physical sectors are the actual, sequentially numbered divisions of the disk. Logical sectors are those that the operating system reads and writes in sequence, a scheme that is determined by the disk's interleave.
Floppy and hard disk sectors are 512 bytes long.
[SOURCE: PC-GLOSSARY 1993]

hdd'size

name::
* McsEngl.hdd'size@cptIt,

3.5in hard drives are mainly used in desktop PCs, while 2.5in disks are used in laptops.
[http://www.pcadvisor.co.uk/how-to/storage/how-use-spare-internal-hard-drive-as-external-hard-drive-usbc-3605133/]

hdd'STRUCTURE

name::
* McsEngl.hdd'STRUCTURE@cptIt,

hdd'PARTITION#ql:partition.harddisk@cptIt#

name::
* McsEngl.hdd'PARTITION@cptIt,

hdd'TRANSFER'RATE#cptIt498#

name::
* McsEngl.hdd'TRANSFER'RATE@cptIt,

Αποδεκτή τιμή είναι 2 Mbyte ps.
[COMPUTER GO, DEC 1995, ΕΝΘΕΤΟ 35]

Resource-of-HDD

_ADDRESS.WPG:
* {2017-10-13} http://www.bbc.com/news/technology-41611802?ocid=socialflow_twitter, (From 14TB to 40TB)

SPECIFIC

hdd.specific,

hdd.FAULT-TOLERANT DISK ARRAYS

name::
* McsEngl.hdd.FAULT-TOLERANT DISK ARRAYS@cptIt,

hdd.PORTABLE/ΦΟΡΗΤΟΙ

name::
* McsEngl.hdd.PORTABLE/ΦΟΡΗΤΟΙ@cptIt,

BSE DRIVES, 6710423
Simplicity computing, tel. 6710423

PINNACLE MICRO:
TAHOE 230 portable 3.5" OPTICAL, parallel port USD., may 1994

SYDOS, 20msec, 10mbit/sec, INFOQUEST

TOSHIBA:
μέχρι 524MB, ΑΜΥ ΑΕΒΕ.

hdd.SSHD {2014}

name::
* McsEngl.hdd.SSHD {2014}@cptIt,
* McsEngl.SSHD@cptIt,

_DESCRIPTION:
2014 Έκαναν την εμφάνισή τους οι υβριδικοί σκληροί δίσκοι (SSHDs) που συνδυάζουν τα χαρακτηριστικά των SSDs και των σκληρών δίσκων (HDDs) στην ίδια μονάδα.
[http://promo.kotsovolos.gr/65years/skliros-diskos/]

hdd.ΓΥΑΛΙΝΗ-ΤΕΧΝΟΛΟΓΙΑ

name::
* McsEngl.hdd.ΓΥΑΛΙΝΗ-ΤΕΧΝΟΛΟΓΙΑ@cptIt,

* ΑΠΟ ΓΥΑΛΙ ΑΝΤΙ ΑΠΟ ΑΛΟΥΜΙΝΙΟ ΠΟΥ ΧΡΗΣΙΜΟΠΟΙΕΙΤΑΙ ΣΗΜΕΡΑ.

hdd.ΕΞΩΤΕΡΙΚΟΙ

name::
* McsEngl.hdd.ΕΞΩΤΕΡΙΚΟΙ@cptIt,

BACKPACK, AANKAL#ql:([Group 46]aankal)##cptIt46: attSpe# 40/100/200 ΜΒ ΠΑΡΑΛΛΗΛΗ ΘΥΡΑ

BERNOULLI 90 PRO: INTEREST, Αριστείδου 99, Καλιθέα, τηλ. 956.3308 524.3918.

ΕSTIA MICROSYSTEMS: Εξωτερικούς σκληρούς 19ms, τηλ 671.0423

JUMBO TRAKKER: INFO-QUEST. PARALLEL PORT 120/250 MB.

MICRODISK (ΠΟΥΛΙΑΔΗΣ): 3,9 ms, 10MB/SEC.

hdd.ΕΣΩΤΕΡΙΚΟΙ

name::
* McsEngl.hdd.ΕΣΩΤΕΡΙΚΟΙ@cptIt,

MAXTOR 7245 3,5", 15msec

OFFITECH: Hard disks fujitsu 12 msc, Σαρανταπόρου, Φωκαίας & Αιγίνης 18547 Πειραιας, τηλ 4819815

hdd.ΥΓΡΗ-ΤΕΧΝΟΛΟΓΙΑ

name::
* McsEngl.hdd.ΥΓΡΗ-ΤΕΧΝΟΛΟΓΙΑ@cptIt,

ΑΝΑΠΤΥΣΕΤΑΙ ΑΠΟ ΤΗΝ CORNER PERIPHERALS INC
* ΘΑ ΠΕΡΙΕΧΟΥΝ ΔΙΠΛΑΣΙΟ ΑΡΙΘΜΟ ΔΕΔΟΜΕΝΩΝ
* ΘΑ ΕΙΝΑΙ ΠΙΟ ΑΝΘΕΚΤΙΚΟΙ
* Ο ΠΡΩΤΟΣ ΘΑ ΠΑΡΟΥΣΙΑΣΤΕΙ ΑΡΧΕΣ 93.
* ΧΡΗΣΙΜΟΠΟΙΕΙ ΥΓΡΟ ΑΝΤΙ ΓΙΑ ΑΕΡΑ ΣΤΗΝ ΠΡΟΣΤΑΣΙΑ ΤΗΣ ΕΠΙΦΑΝΕΙΑΣ ΤΟΥ ΑΠΟ ΚΕΦΑΛΗ.

hdd.1GB

name::
* McsEngl.hdd.1GB@cptIt,

10 ms:
GRD.104000 +fpa, Mar. 1995, ΓΡΑΜΜΗ#cptItorg736#

hdd.540MB

name::
* McsEngl.hdd.540MB@cptIt,

Western Digital: CAVIAR 13ms,
GRD.109000 (jul 1994), anastasiadis#cptItorg306#
GRD.99000+fpa, smart#cptItorg615#

SEAGATE 3660A 12ms, 256 Cache:
GRD.55000 +fpa, mar. 1995, Point#cptItorg560#

GRD.57000 + ΦΠΑ, Μαρ. 1995, ΓΡΑΜΜΗ#cptItorg736#

hdd.340MB

name::
* McsEngl.hdd.340MB@cptIt,

SEAGATE: 3391A, 12ms, 256K cache.
79000+fpa(MAY 1994). POINT COMPUTER#cptItorg560#

hdd.EVOLUTING

name::
* McsEngl.hdd.EVOLUTING@cptIt,

{time.2015}:
Σταδιακά, οι σκληροί δίσκοι δίνουν τη θέση τους σε δίσκους στερεάς κατάστασης (SSD), οι οποίοι εξελίσσονται με ραγδαίο ρυθμό και προσφέρουν εκπληκτικές ταχύτητες.
[http://promo.kotsovolos.gr/65years/skliros-diskos/]

{time.2013}:
ΤΟ 2013 Διατέθηκε το πρότυπο SATA 3.1 (16 Gbit/s, 1969 MB/s), όπου μεταξύ άλλων νέων χαρακτηριστικών προσφέρει υψηλότερη απόδοση για τους υβριδικούς σκληρούς δίσκους.
[http://promo.kotsovolos.gr/65years/skliros-diskos/]

{time.2011}:
Καθιερώθηκε το πρότυπο SATA 3.1 που περιλαμβάνει αρκετές βελτιώσεις, όπως είναι η μείωση κατανάλωσης ενέργειας και η βελτιωμένη απόδοση των SSDs.
[http://promo.kotsovolos.gr/65years/skliros-diskos/]

{time.1993}:
=== ΠΑΓΚΟΣΜΙΑ ΑΓΟΡΑ.
Οι 6 πρώτες ετερίες σκληρών δίσκων κατέχουν το 89%. με
- Quantum 20,1%
- Seagate 19,9%,
- Conner Peripherals 18,7%
- IBM 10,6%
- Western Digital 10%
- Maxtor 9,7%.
[COMPUTER GO, JUL. 1994, 42]

{time.1976}:
The World's First SSD
In 1976, Dataram introduced the world's first solid-state drive, the Bulk Core. The product consisted of a rack-mount chassis--measuring 19 inches wide by 15.75 inches tall--that held up to eight individual memory boards, each packed with 256KB of RAM chips. In total, the Bulk Core system could provide a massive 2MB of storage for minicomputers such as the DEC PDP-11 and the Data General Nova. Data-access times ranged from 0.75 milliseconds to 2 milliseconds, depending on the controller board. (Today, SSDs regularly have 0.06ms access times.)
A Bulk Core setup, including a controller board and 256KB of storage, cost $9700 in 1977, which is equivalent to $36,317 today. At that pricing rate, a 1TB SSD (which costs about $1100 today) would have cost $152 billion.
[http://www.pcworld.com/article/246617/evolution_of_the_solid_state_drive.html#slide2]

{time.1973}:
Η IBM εισήγαγε το μοντέλο 3340 (γνωστό και ως “Winchester”). Ο συγκεκριμένος σκληρός δίσκος ήταν μικρότερος σε όγκο και η τεχνολογία του αποτέλεσε πρότυπο για πολλούς δίσκους που κυκλοφόρησαν μέχρι και το 2011!
[http://promo.kotsovolos.gr/65years/skliros-diskos/]

{time.1957}:
Η IBM παρουσίασε τον πρώτο σκληρό δίσκο 305 RAMAC, αποτελούμενο από 50 πλακέτες, διαμέτρου 24 ίντσες με συνολική χωρητικότητα 5 MB.
[http://promo.kotsovolos.gr/65years/skliros-diskos/]

cmrstg.HVD

name::
* McsEngl.cmrstg.HVD@cptIt,

Group aims to drastically up disc storage
By Michael Kanellos http://news.com.com/Group+aims+to+drastically+up+disc+storage/2100-1041_3-5562599.html
Story last modified Thu Feb 03 14:47:00 PST 2005

A few hundred movies on an optical disc? That's the goal of the Holographic Versatile Disc (HVD) Alliance. Six companies, including Fuji Photo and CMC Magnentics, have formed a consortium to promote HVD technology, which will let consumers conceivably put a terabyte (1TB) of data onto a single optical disc.
A TB-size disc would certainly compress movie collections. The consortium said an HVD disc could hold as much data as 200 standard DVDs and transfer data at over 1 gigabit per second, or 40 times faster than a DVD. HVD is a possible successor to technologies such as Blu-ray and HD DVD. Single layer Blu-ray discs hold about 25GB of data while dual-layer discs hold 50GB. Ordinary DVD discs, meanwhile, hold about 4.7GB. HVD technology will be pitched at corporations and the entertainment market, the HVD Alliance said.
The technology behind HVD is based on holography technology from Japan's Optware, one of the six founders of the consortium. A technical committee formed last December to flesh out HVD standards.
Sony unveiled a home server with 1TB of storage for the Japanese market last year. Half of the capacity would be enough to record six channels of TV for five and a half days non-stop, Sony said.
The organization, however, is looking at first developing discs with lower capacities. The first assignments of the technical committee involve coming up with standards for a 200GB recordable disc and a 100GB read-only disc.
If history is an indication, consumers will fill the disc up. High-definition broadcasting and gaming are also expected to add a heavy burden to existing home storage systems because of the size of the files. Two hours of HD programming takes up about 15GB to 25GB.
Michiko Nagai of CNET Japan contributed to this story from Tokyo.

Copyright ©1995-2005 CNET Networks, Inc. All rights reserved.

cmrstg.MOLECULE-MAGNET

name::
* McsEngl.cmrstg.MOLECULE-MAGNET@cptIt,

The researchers, from Xerox Corp., the University of Barcelona in Spain and the City College of New York, plan to announce the creation of a microscopic magnet, one molecule in size, derived from a special combination of manganese, oxygen, carbon and hydrogen.

A computer data storage system based on such a magnet could alone pack data thousands or millions of times more densely than today's memory and storage systems.

The research team said that the new molecules had exhibited a physical phenomenon called quantum magnetic hysteresis, in which material can contain multiple magnetic states at the same time. That might one day make it possible to create a tiny device that would hold multiple bits of data simultaneously, unlike today's memory building blocks, which can hold only one bit at a time.

To be sure, the researchers were quick to point out that they had not actually figured out how to read or write information from the tiny new molecules yet.
[N.Y. Times News Service Jan 27, 1997]

cmrstg.NAS

_CREATED: {2012-12-24}

name::
* McsEngl.cmrstg.NAS@cptIt,
* McsEngl.conceptIt14.2,
* McsEngl.NAS@cptIt14.2, {2012-12-24}

_DESCRIPTION:
Network-attached storage (NAS) is file-level computer data storage connected to a computer network providing data access to a heterogeneous group of clients. NAS not only operates as a file server, but is specialized for this task either by its hardware, software, or configuration of those elements. NAS is often manufactured as a computer appliance – a specialized computer built from the ground up for storing and serving files – rather than simply a general purpose computer being used for the role.[nb 1]

As of 2010 NAS devices are gaining popularity, as a convenient method of sharing files among multiple computers.[1] Potential benefits of network-attached storage, compared to file servers, include faster data access, easier administration, and simple configuration.[2]

NAS systems are networked appliances which contain one or more hard drives, often arranged into logical, redundant storage containers or RAID arrays. Network-attached storage removes the responsibility of file serving from other servers on the network. They typically provide access to files using network file sharing protocols such as NFS, SMB/CIFS, or AFP.
[http://en.wikipedia.org/wiki/Network-attached_storage]

ZyXEL-NAS210

_ATTRIBUTE:
* Firmware: 4.40

cmrstg.PORTABLE

name::
* McsEngl.cmrstg.PORTABLE@cptIt,

cmrstg.PRIMARY-STORAGE

name::
* McsEngl.cmrstg.PRIMARY-STORAGE@cptIt,

ΕΙΝΑΙ ΜΙΑ ΑΠΟΘΗΚΗ ΠΟΥ ΕΧΕΙ ΠΡΟΣΠΕΛΑΣΙΜΟ ΧΡΟΝΟ ΙΚΑΝΟ ΝΑ ΒΑΛΕΙΣ ΤΟ ΛΕΙΤΟΥΡΓΙΚΟ ΣΥΣΤΗΜΑ, ΠΟΥ ΘΑ ΧΡΗΣΙΜΟΠΟΙΗΘΕΙ ΣΤΗ ΛΕΙΤΟΥΡΓΙΑ ΤΟΥ ΥΠΟΛΟΓΙΣΤΗ.

cmrstg.REMOVABLE

name::
* McsEngl.cmrstg.REMOVABLE@cptIt,

cmrstg.SD-CARD

name::
* McsEngl.cmrstg.SD-CARD@cptIt,
* McsEngl.sd-card@cptIt,

_DESCRIPTION:
SD (Secure Digital) cards are a special brand of data storage that have two main purposes, to store data and to transfer data between devices. SD cards are popular in devices that are too small to have dedicated hard drive storage space, such as mobile phones, GPS units, digital cameras and many other electronic devices. Data that is stored on SD cards can be read by all these electronic devices, and can also be read by PCs and laptops that have card adapters. This makes transferring data between mobile devices or digital cameras and laptops/PC simple and convenient, and users won't have to worry about losing their data.

1. Basic Variations
SD cards started out simply as SD cards, but as the technology has expanded so has the range and choice of SD cards. Some SD cards may not be compatible with certain devices, both in terms of size and the format of data storage used on the SD card. Knowing which card to buy can be intimidating, but in general there are only three considerations that should be kept in mind when looking for an SD card: the physical size of the card, the storage space and format of the card and the class rating of the card.
[http://www.ebay.com/gds/5-Differences-Between-SD-SDHC-and-MicroSDHC-Memory-Cards-/10000000178358640/g.html]

sdcard'Capacity

name::
* McsEngl.sdcard'Capacity@cptIt,

_DESCRIPTION:
3. SD, SDHC, and SDXC
Apart from physical size, another consideration when choosing a SD card is the storage space of the card. SD cards have come a long way in terms of storage space, with cards that can store up to 64GB or larger being available.

SD Cards
SD cards were the first cards on the market, and can only store up to 2GB of data. It should be noted that microSD cards that have the same format can also store only 2GB of data, as physical size doesn't have an impact on the amount of storage space.

SDHC Cards
2GB is a tiny amount of data storage, which is why the developers and manufacturers of SD cards came up with an additional storage format known as SDHC, which stands for Secure Digital High Capacity. These cards can store between 4GB and 32GB, but can only be used in devices compatible with the SDHC format. The SDHC format is also reverse compatible, meaning that devices that can read SDHC cards can also read SD cards, but devices that can only read SD formats cannot use cards that have the SDHC format.

SDXC Cards
SDXC (Secure Digital eXtended Capacity) cards are the latest SD cards available and their storage sizes range between 64GB and 2TB. There are very few devices at the moment that can use SDXC, but these will most likely increase in popularity as data needs of users increase even more. Knowing how much space is needed can be a tricky thing, as it's difficult to predict in advance how the device will be used and the type of data that will be stored. Below is a chart showing average values that can help give an idea of how much data certain media applications can use. It should be noted that these are estimates only, as file sizes can dramatically vary depending on the settings used.

2GB
4GB
8GB
16GB
32GB
HD movies (MPEG-4/H.264)

20 minutes

40 minutes

80 minutes

160 minutes

320 minutes

10MP Photos

770 photos

1540 photos

3080 photos

6160 photos

12,320 photos

ACC/MP3 Music (128Kbps)

34 hours

68 hours

136 hours

272 hours

545 hours
[http://www.ebay.com/gds/5-Differences-Between-SD-SDHC-and-MicroSDHC-Memory-Cards-/10000000178358640/g.html]

sdcard'Size

name::
* McsEngl.sdcard'Size@cptIt,

_DESCRIPTION:
2. SD Card Sizes
SD cards come in three physical sizes: SD, miniSD and microSD. Normal SD cards are the largest, miniSD cards are smaller and finally, microSD cards are the smallest, being the approximate size of a fingernail. The physical size of the card doesn't affect the capacity and storage space of the SD card, with microSD cards being able to store up to 32GB or even 64GB of data. SD cards are larger than microSD cards.

2a. Size in Conjunction with Usability
SD card sizes become an issue when examining which devices they will be used in conjunction with. MiniSD cards have mostly fallen out of favour, and apart from older devices and some digital cameras, miniSD cards are not used anymore. Full-sized SD cards are usually found in use with digital cameras, laptops, and desktops. The smallest cards, microSD cards have found massive popularity as the cards of choice for mobile phones and many of the latest electronic devices. Luckily, for those concerned about incompatibility and the inability to use the same microSD card to transfer data between their mobile device and their laptop or PC, many microSD cards come with adapters which turn the tiny card into a normal-sized SD card, which can then be used in conjunction with a laptop or PC.
[http://www.ebay.com/gds/5-Differences-Between-SD-SDHC-and-MicroSDHC-Memory-Cards-/10000000178358640/g.html]

sdcard'Speed

name::
* McsEngl.sdcard'Speed@cptIt,

_DESCRIPTION:
4. Class Rating
Apart from card size and storage space, there is a further important difference to take into consideration when choosing a microSD card, and that is the class rating. Simply put, some microSD cards can read and write information faster than others. Having a slow write and read speed can dramatically impact the performance of a device, as it has to spend a longer time writing or reading the data on the card. This is particularly noticeable while watching HD video on a mobile phone, where slow microSD card speeds can cause jittery playback and impact the performance of the video.

5. Class Rating and Speed
Most SD cards now come with a class rating that gives an indication of how fast the card is. The class rating represents the speed at which the card reads and writes data in MB/s. So a card with a class rating of 2 will have a minimum read/write speed of 2MB/s, while a card with a class rating of 10 will have a minimum read/write speed of 10MB/s. It should be noted that the class rating lists the minimum speed that the manufacturer can guarantee, meaning that even class 2 cards can read/write data faster in some instances, and can even give speeds of 4MB/s. However, the trend is clear and higher classed cards will perform better than lower classed cards. In general, a higher class rating is recommended, especially if one is planning on watching HD movies or writing/reading a lot of data off the card. Many cheaper cards have lower class ratings, which mean that they may be cheaper than other SD cards, but will be much slower and will most likely affect the performance of the device that the card is used in conjunction with.
[http://www.ebay.com/gds/5-Differences-Between-SD-SDHC-and-MicroSDHC-Memory-Cards-/10000000178358640/g.html]

cmrstg.SECONDARY-STORAGE

name::
* McsEngl.cmrstg.SECONDARY-STORAGE@cptIt,

Αποθήκη με μεγάλο χρονο προσπέλασης.

cmrstg.SOLID-STATE-DRIVE

_CREATED: {2007-11-30}

name::
* McsEngl.cmrstg.SOLID-STATE-DRIVE@cptIt,
* McsEngl.SSD@cptIt,
* McsEngl.solid-state-drive@cptIt14i,
====== lagoGreek:
* McsElln.Δίσκος-στερεάς-κατάστασης@cptIt,

_DESCRIPTION:
ΕΧΟΥΝ 100 ΦΟΡΕΣ ΤΑΧΥΤΕΡΟΥΣ ΧΡΟΝΟΥΣ ΠΡΟΣΠΕΛΑΣΗΣ ΑΠΟ ΜΑΓΝΗΤΙΚΟΥΣ, ΑΚΡΙΒΟΙ.

November 29, 2007 6:05 AM PST
Price drops ahead for solid-state drives
Posted by Michael Kanellos

Solid-state drives are still going to be somewhat hard to find and expensive in 2008, but mass production, cheaper flash, and tech advances will start to change that in 2009 and 2010.

Micron Technology, the Boise, Idaho-based maker of DRAM and flash memory, this week unveiled plans to come out with solid-state drives. The drives function like regular hard drives. But instead of storing data on spinning disks, solid-state drives store it on NAND memory chips--the kind found in cameras and MP3 players.
[http://www.news.com/8301-10784_3-9825675-7.html?tag=nefd.lede]

FvMcs.computer'storage.3D-OPTICAL-DRIVE

name::
* McsEngl.conceptIt39,
* McsEngl.computer'storage.3D-OPTICAL-DRIVE@cptIt,
* McsEngl.FvMcs.computer'storage.3D-OPTICAL-DRIVE@cptIt,
* McsEngl.3-D-optical-drive@cptIt,
* McsEngl.3d'opticalDrive@cptIt39,

DEFINITION

There are strong indications that 3-D holographic memeories could reach practical applications in three to five years.
[1992].

FvMcs.computer'storage.CDROM-DRIVE

name::
* McsEngl.conceptIt265,
* McsEngl.computer'storage.CDROM-DRIVE@cptIt,
* McsEngl.FvMcs.computer'storage.CDROM-DRIVE@cptIt,
* McsEngl.cd'drive@cptIt265,
* McsEngl.CDROM'DRIVE@cptIt265,
* McsEngl.CDROM-drive@cptIt,
* McsEngl.cd'rom-drive@cptIt,
* McsEngl.storage.cdrom@cptIt265,

ACCESS-TIME#cptIt499#

name::

* McsEngl.access-time@cptIt,
* McsEngl.seek-time@cptIt,
* McsElln.ρυθμος-ανιχνευσης@cptIt,
* McsElln.ταχυτητα-προσπελασης@cptIt,

Ο Μέσος χρόνος ΑΠΟ την αναζήτηση ΜΕΧΡΙ την έναρξη ανάγνωσης πληροφορίας. Οσο πιο γρήγορα βρίσκει την πληροφορία τόσο το καλύτερο.
[MULTIMEDIA-&-CD-ROM, JUL. 1994, 27#cptResource73]


120 msec: TOSHIBA XM-3501, ΑΜΥ
125 msec: TOSHIBA XM-3501B
200 msec: TOSHIBA
340 msec: SONY CDU-7205, ΑΥΤΟ ΕΧΩ ΕΓΩ.

CDROM'TITLES#cptIt147: attPar#

name::
* McsEngl.CDROM'TITLES@cptIt,

ognCompany#cptEconomy7#

INFOQUEST,
OPTICAL SYSTEMS,
COMQUEST,
μακεδονικα ηλεκτρονικα,
Intelect S.A. 647.4481 rewritable,

sony corporation in san jose calif. 800-352-7669

Media Vision of Fremont, Calif.,800-348-7116

DIMENSIONS

ΕΝΑ ΜΙΚΡΟΤΕΡΟ CD ΑΡΧΙΣΕ ΝΑ ΕΜΦΑΝΙΖΕΤΑΙ ΣΤΗΝ ΑΓΟΡΑ ΤΩΝ 80mm. ΤΟ ΠΑΡΟΥΣΙΑΣΕ Η PANASONIC AT COMDEX IN NOTEBOOK. ΣΗΜΕΡΑ ΕΧΟΥΝ ΜΕΓΕΘΟΣ 120mm.

DISK AT ONCE (DAO)

name::
* McsEngl.conceptIt265.3,
* McsEngl.disk'at'once@cptIt265.3,
* McsEngl.dao@cptIt265.3,

Η ακτίνα λέιζερ λειτουργει κατά τη διαδικασία εγγραφής του σιντι (δε σταματά όπως στα multisession). Η μέθοδος αυτή χρησιμοποιείται συνήθως στα μουσικά σιντί, προκειμένου να μηδενίσουμε τα κενά μεταξύ των τραγουδιών.

DRIVER

ATAPI DEVICE DRIVER DOS/WIN31
FD-82

INTERFACE/ΚΑΡΤΑ ΕΠΙΚΟΙΝΩΝΙΑΣ

Προτιμήστε AT bus or SCSI interface. Αν είστε κάτοχος καλής κάρτας ήχου μή διστάσετε να συνδέσετε σε αυτή το drive σας.
[MULTIMEDIA-&-CD-ROM, JUL. 1994, 27#cptResource73]

PROTOCOL

ATAPI
SCSI
USB 2.0
USB 1.1

measure#cptCore88#

1992:
εκτιμάται ότι εγκαταστάθηκαν σε προσωπικούς υπολογιστές 3,4 εκ.
[MULTIMEDIA & CD-ROM, JUL. 1994, 14#cptResource73]

{time.1993
εκτιμάται οτι εγκαταστάθηκαν 8,3 εκ.
[MULTIMEDIA-&-CD-ROM, JUL. 1994, 14#cptResource73]

SPEED (transfer-rate)

name::
* McsElln.ΔΙΑΜΕΤΑΓΩΓΗ@cptIt,

32x/12x/40x= 32 write / 12 rewrite /40 read

ΕΠΙΔΟΣΕΙΣ:
2002.05 = 40x/12x/48x, €195 TEAC

SPEED READ

name::
* McsEngl.TRANSFER-RATE#cptIt498#@cptIt,

Η πιο σημαντική παράμετρος για να εκτιμήσουμε πόσο γρήγορο είναι το ντράιβ.
Ετσι υπάρχουν τα single speed, 150KB/sec, like audio CD. and double speed, 300KB/sec.
[MULTIMEDIA-&-CD-ROM, JUL. 1994, 27#cptResource73]


48x = 7.200 KB/sec
1x = 150 KB/sec


684 KB/sec TOSHIBA XM-3501
600 KB/sec PIONEER DRM-604X (6 DISK MINI CHARGER)
330 KB/sec (KiloBytes): TOSHIBA XM-3401
150 KB/sec SONY CDU-7205, I have that.

SPEED WRITE

name::
* McsEngl.record-speed@cptIt,

ΟΝΟΜΑΣΤΙΚΗ ΤΑΧΥΤΗΤΑ ΕΓΓΡΑΦΗΣ:
40x = 6.000 KB/sec
32x = 4.800 KB/sec
24x = 3.600 KB/sec

1x = 150 KB/sec

SPEED REWRITE

STANDARD#cptIt139#

Κατά τη δημιουργία του πρώτου σας CD θα πρέπει να επιλέξετε το φορμάτ, δηλά το στάνταρντ πάνω στο οποίο θα βασιστεί η εγγραφή του.
1) Υπάρχουν τα Mode 1 και Mode 2. Το δεύτερο είναι πιο πρόσφατο και διαδεδομένο. Με το Mode 2 δημιουργούνται τα Multisession CD, στα οποία προσθέτετε πληροφορίες όποτε εσείες θέλετε (μέχρι 99 φορές).
2) Επίσης θα πρέπει να επιλέξετε μεταξύ των ISO Level 1 και ISO Level 2. Το πρώτο επιτρέπει ονόματα αρχείων για τα δεδομένα που θα γράψετε με μήκος έως και 11 γράμματα, ενώ το δεύτερο αυξάνει τον αριθμό αυτό στα 31 γράμματα.
3) Όμοια χρειάζεται να επιλέξετε κάποια στιγμή και το σετ χαρακτήρων. Εδώ οι επιλογές είναι τρείς, το ISO 9660, το DOS και ASCII. Το πρώτο είναι το πιο δημοφιλές.
4) Μιά τέταρτη επιλογή είναι το πρότυπο Joliet, το οποίο υποστηρίζεται από τα windows 95 και μετά.
Για τη μέγιστη συμβατότητα με το παρελθόν, επιλέξετε το ISO Level 1 και σετ χαρακτήρων ISO 9660
[RAM 2001 ιούλιος ένθετο]

CD-ROM XA (eXtended Architecture):
προσθήκη στο yellow book.

CD-I (GREEN BOOK):
Εχουμε ποιότητα Hi-Fi και μπορούμε να αναγνώσουμε φωτογραφικούς δίσκους. Μπορούν να παίξουν full motion video disks.

NEW HIGH-DENSITY CD SYSTEM:
PHILIPS & SONY, will halv the trach pitch. Will have 3GB storage capacity.
[BYTE, OCT. 1994, 36]

PHOTO CD:
Της Kodak. Οι φωτογραφίες διαβάζονται από XA and CD-I drives.

RED BOOK:
Προδιαγραφές για τα audio CD.

YELLOW BOOK:
υπάρχουν 2 στάνταρντς. Mode 1, Mode 2.

MOST {Multiple Operation System Technology} of Compton's, ΕΠΙΤΡΕΠΕΙ ΕΝΑ ΚΑΙ ΜΟΝΑΔΙΚΟ CD ΝΑ ΧΡΗΣΙΜΟΠΟΙΗΘΕΙ ΣΕ PC ΣΥΜΒΑΤΟΥΣ ΜΕ DOS OR WINDOWS, ΣΕ ΥΠΟΛΟΓΙΣΤΕΣ MACINTOSH, ή ΣΤΟ ΦΟΡΗΤΟ MMCD of SONY.

TRACK-AT-ONCE (TAO)

name::
* McsEngl.conceptIt265.4,
* McsEngl.track'at'once@cptIt265.4,
* McsEngl.tao@cptIt265.4,

Πρόκειται για μια μέθοδο εγγραφής κατά την οποία η ακτίνα λέιζερ σταματά να λειτουργεί σε ορισμένα χρονικά διαστήματα. Την εφαρμόζουμε όταν θέλουμε να γράψουμε ένα CD Multisession. Το ελάχιστο μέγεθος περιόδου εγγραφής είναι τέσσερα δευτερόλεπτα ή 700ΚΒ περίπου, ενώ ο μέγιστος αριθμός περιόδων είναι 99.

ΔΙΑΡΚΕΙΑ ΖΩΗΣ ΔΙΣΚΟΥ

10 χρόνια ΓΙΑ ΕΝΑ ΔΙΣΚΟ.

ΘΗΚΗ ΔΙΣΚΟΥ

Η καλύτερη είναι αυτη του συρταριου που μπαινοβγαίνει.
Τα caddy που μπορούν να χαθούν ή να σπάσουν, είναι χειρότερα.
[MULTIMEDIA-&-CD-ROM, JUL. 1994, 27#cptResource73]

ΧΩΡΗΤΙΚΟΤΗΤΑ

Η ΝΕΑ ΤΕΧΝΟΛΟΓΙΑ ΤΗΣ SONY, BLUEBEAM, ΘΑ ΤΡΙΠΛΑΣΙΑΣΕΙ ΤΟ ΧΩΡΟ ΑΠΟ ΤΑ 600 ΜΒ ΣΗΜΕΡΑ ΣΤΑ 1,7 GB.
MHN ΠΕΡΙΜΕΝΕΤΕ ΠΡΟΙΟΝΤΑ ΠΡΙΝ ΑΠΟ 5/6 ΧΡΟΝΙΑ.
[RAM, ΜΑΡΤ 1993, 21]

ΠΕΡΙΣΤΡΟΦΕΣ ΔΙΣΚΟΥ

530 rpm, περιστροφες το λεπτο.

1060 περιστροφές τα μοντέλα διπλης ταχύτητας.

2.120 περιστροφές τα μοντέλα τετραπλης ταχυτητας.

SPECIFIC

Specific_concepts (level 3) =

CD-RW

ΑΡΙΣΤΗ ΑΓΟΡΑ:
2002.05: ΡΑΜ ---> LITEON LTR 32123S: 32x/12x/40x, €116,8

RICOH:
MP6200S 165000+fpa 1997jul

CD-MRW

γράφουν ΠΟΛΛΕΣ φορές στον ίδιο δίσκο

MY CDROM

HITACHI CDR-8330 24x:
BUY: {1997-09-09}
PRICE: 38.812

SONY CDU-7205
ΑΓΟΡΑ: 1992.
MANUALS:  BIBLNA494#cptResource494#,
TRANSFER RATE: 150 KBytes/sec
ACCESS TIME: 340msec,
DISKS: 12/8cm, XA, MODE 1/2, cd audio, red/yellow book, form 1&2 disc conforming to green book in a cd caddy.

DRIVERS:
AUTOEXEC: \LASERLIB\MSCDEX.EXE /D:SONY_001 /L:F /M:8.

CONFIG: LASTDRIVE=F
DEVICE=\LASERLIB\SONY_CDU.SYS /D:SONY_001 /B:340 /Q:* /T:* /M:H.

MULTI-SESSION DRIVE

Διαβάζει πληροφορίες απο πολλά ToC του δίσκου. ΠΧ αν δώσετε ένα δισκο να σας προσθέσουν και άλλες πληροφορίες ΜΟΝΟ αν το ντραιβ είναι multisession θα μπορέσει να διαβάσει τις επιπρόσθετες πληροφορίες.
[MULTIMEDIA-&-CD-ROM, JUL. 1994, 27#cptResource73]

CDROM ΔΙΠΛΗΣ ΠΥΚΝΟΤΗΤΑΣ

ΜΙΑ ΜΙΚΡΗ ΒΡΕΤΑΝΙΚΗ ΕΤΑΙΡΙΑ, NIMBUS, ANAKOINΩΣΕ ΟΤΙ ΚΑΤΑΦΕΡΕ ΝΑ ΧΩΡΕΣΕΙ ΜΙΑ ΟΛΟΚΛΗΡΗ ΤΑΙΝΙΑ ΜΕ ΣΤΕΡΕΟΦΩΝΙΚΟ ΗΧΟ.
Σ'ΕΝΑ ΧΡΟΝΟ ΤΟ ΠΡΩΤΟ ΜΟΝΤΕΛΟ
[ΒΗΜΑ, 21 ΜΑΡΤ 1993, Δ21]

ΠΟΛΥΩΡΟΦΟΙ ΔΙΣΚΟΙ

Τεχνολογία της IBM. Κάθε δίσκος πρέπει να είναι αρκετά διαφανής ώστε να αφήνει την ακτίνα λέιζερ να περνά στους άλλους δίσκους. Εχουν δοκιμάζει μέχρι 6 στρώματα δίσκων. Λένε ότι είναι εφικτή η ανάπτυξη 20/30 ορόφων.
[ΒΗΜΑ, 13 ΝΟΕΜ. 1994, Γ32]

COMPANY SPECIFIC-DIVISION

CHINON:
CDS-535: 300KB/sec, 280ms, 119.000drx (apr 1994). Datamicro.

HITACHI:
CDR-1900S: 300KB/sec, 200 ms. 165.000drx (apr 1994). Optical systems.

MAGNAVOX:
PRICE: 418, NAME: cdd 461 RS Comb. external, ACCESS: 700 ms, INCLUDE: 4 discs internal card

MICROSOLUTIONS BACKUP:
PORTABLE, PARALLEL PORT, 150KB/sec. AANKAL.

MITSUMI:
FX001D: 350KB/sec, 78.000drx# (apr 1994). Infoquest.
CRMC, INTERNAL, 700ms, 150/175KB/sec, 72000 drx [DEC 1992]. Infoquest.

NEC:
MULTISPIN 4X Pro(1994): τετραπλης ταχύτητας 600KB/sec, 180ms

multispin 3Xi: 450KB/sec, 195ms, 180000drx (apr 1994). PC Systems.
CDR-37, PORTABLE, 450ms, 300KB/sec, 130000 DRX, [DEC 1992]
CDR-74, EXTERNAL, 180000 DRX, [DEC 1992]
CDR-84, INTERNAL, 165000 DRX, [DEC 1992]
CD-GALLERY: $600, NEC 36/72, 7 titles, speakers, interface kit, cables, installation disk, guide

PANASONIC:
CR562B: 300KB/sec, 320ms, 65000drx (apr 1994). Infotrust/Oktabit/lim/αναστασιαδης.

PHILIPS:
CM 226: 352KB/sec, 325ms, 165000drx (apr 1994). Philips, Πουλιάδης.
CM 206: 352KB/sec, 83.000drx (apr 1994). Philips, Πουλιάδης, Optical Systems.

PIONEER:
DRM-640X, 600KB/sec, 300ms, 6 disks, $1800 [apr 1993]. 395.000drx Χ. Αξαρλης.
DRM-604X holds 6 disks. You can chain 7 minichargers. 300 msc. 4πλης ταχύτητας.

PROCOM:
Technet Hellas

SONY:
TEXNOΛΟΓΙΚΗ ΕΠΕ, 6521979
CDV-531 INTERNAL, $350, ACCESS:  380 ms
CDV-7201 EXTERNAL, $480,
CDU-33A: 300KB/sec, , 340ms, ΤΕΧΝΟΛΟΓΙΚΗ/OKTABIT.
CDU-7205, 150KBytes/sec, 340msec, Το έχω εγώ. laser library CDU-7205, $600, INCLUDE: encycl-languages- atlas-games. VENTOR:  J&R COMPUTER WORLD 1-800-221-8180

TADY:

TOSHIBA:
XM3401B: 376KB/sec, 200ms, 170.000drx (apr 1994). Αμυ/infoquest.
XM4101S: 342KB/sec, 385ms, 97.500drx (apr 1994). "
KT-3301S EXT., 325ms, 225000 drx for PS/2[DEC 1992]. ComQuest.

FvMcs.computer'storage.FLOPPY-DISK-DRIVE

name::
* McsEngl.conceptIt46,
* McsEngl.computer'storage.FLOPPY-DISK-DRIVE@cptIt,
* McsEngl.FvMcs.computer'storage.FLOPPY-DISK-DRIVE@cptIt,
* McsEngl.FDD@cptIt,
* McsEngl.fdd@cptIt46,
* McsEngl.floppy-disk-drive@cptIt,
* McsEngl.floppy'disk'storage@cptIt46,
* McsEngl.storage'floppyDisk@cptIt46,

SPECIFIC

Specific_concepts (level 3) =

Generally, a PC or XT-class machine will have a 360 K floppy drive while an AT-class machine will house a 1.2 MB floppy drive.

Introduced in 1986 by Sony Corporation, the 3.5" disk, often called a microdiskette, is used for data storage on personal computers.
It provides significant design improvements over the conventional 5.25" floppy diskette. The smaller size and stronger container make handling easier and safer. The actual magnetic disk surface is only exposed when the disk is inserted in the drive. This reduces the possibility of contamination by fingerprints and dust particles.
[SOURCE: PC-GLOSSARY 1993]


5.25": old one.
3.5":

FvMcs.computer'storage.DAT

name::
* McsEngl.conceptIt978,
* McsEngl.computer'storage.DAT@cptIt,
* McsEngl.FvMcs.computer'storage.DAT@cptIt,
* McsEngl.dat-storage@cptIt,
* McsEngl.storage.dat@cptIt978,

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt978#

FvMcs.computer'storage.DVD-DISK

name::
* McsEngl.conceptIt981,
* McsEngl.computer'storage.DVD-DISK@cptIt,
* McsEngl.FvMcs.computer'storage.DVD-DISK@cptIt,
* McsEngl.digital-versatile-disk@cptIt,
* McsEngl.digital-video-disk@cptIt,
* McsEngl.dvd@cptIt,
* McsElln.ΔΙΣΚΟΣ-ΨΗΦΙΑΚΗΣ-ΕΙΚΟΝΑΣ@cptIt,
* McsElln.ΨΗΦΙΑΚΟΣ-ΟΠΤΙΚΟΣ-ΔΙΣΚΟΣ@cptIt,

OLD:
digital video player,
mmcd,
multimedia cd,
multimediaCD,
ΔΙΣΚΟΣ COMPACT ΜΕΓΑΛΗΣ ΧΩΡΗΤΙΚΟΤΗΤΑΣ,
ΔΙΣΚΟΣ COMPACT ΓΙΑ ΠΟΛΥΜΕΣΑ,
ΔΙΣΚΟΣ ΥΠΕΡΔΙΠΛΗΣ ΧΩΡΗΤΙΚΟΤΗΤΑΣ,

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt981#

dvd.SPECIFIC-DIVISION.STORAGE

name::
* McsEngl.dvd.SPECIFIC-DIVISION.STORAGE@cptIt,

SPECIFIC:
* DVD-5  4,7 GB,
* DVD-9  8,5 GB,
* DVD-10  9,4 GB,
* DVD-14  13,2 GB,
* DVD-18  17,1 GB,

LITEON SOHW832S Το πρώτο dual layer DVD±RW
Για το Flash.gr, Τεχνολογία
Διεύθυνση του άρθρου: http://tech.flash.gr/newproducts/Hardware/2004/5/21/10713id/

Η Liteon ανακοίνωσε την, εντός των προσεχών ημερών, διάθεση στην Ελληνική αγορά της νέας σειράς προϊόντων τα οποία θα φέρουν δραματικές αλλαγές στο χώρο της εγγραφής δίσκων DVD. Το νέο DVD±RW Liteon SOHW832S είναι η πρώτη συσκευή που υποστηρίζει την πολυαναμενόμενη εγγραφή σε δύο στρώσεις (Dual Layer), κάτι που σημαίνει ότι η χωρητικότητα του κάθε δίσκου (DVD+R9) εκτοξεύεται στα 9 GB!
Με το νέο DVD±RW της Liteon, απλουστεύεται δραματικά η διαδικασία back-up μεγάλου όγκου δεδομένων σε δίσκους DVD. Με την νέα συσκευή δεν υπάρχει πια λόγος συμπίεσης των ταινιών DVD, καθώς κάθε μια χωράει αυτούσια σε ένα και μόνο δίσκο DVD. Παράλληλα την ίδια εποχή αναμένεται και το νέο LITEON SOHW12135, το πρώτο DVD±RW που υποστηρίζει ταχύτητα εγγραφής σε 12x.
Τα προϊόντα της Liteon διατίθενται από επιλεγμένα καταστήματα Πληροφορικής σε όλη την Ελλάδα.
Επίσημος αντιπρόσωπος: DIONIC A.E., τηλ. 210.2419600.

dvd.SPECIFIC-DIVISION.USE

name::
* McsEngl.dvd.SPECIFIC-DIVISION.USE@cptIt,

DVD-AUDIO

USE:
* 74 λεπτά μουσικής με συχνότητα-δειγματολειψίας 192kHz και μέγεθος-δειγματολειψίας 24bit.

DVD-ROM

USE:
* computer data.

SPECIFIC:
* ο διαχωρισμός γίνεται κυρίως στον τρόπο εγγραφής των δεδομένων.
* DVD-R Authoring,
* DVD-R General,
* DVD-RAM,
* DVD-RW,
* DVD+RW
* DVD+R

DVD-VIDEO

USE:
133 λεπτά βίντεο υψηλής ανάλυσης MPEG-2, με υπότιτλους μέχρι 32 γλώσες και ήχο μέχρι 8 γλώσες.

FORMAT:
* UDF

FOLDER:
* VIDEO_TS (Transport-Stream):
- .VOB (video-object) FILE: περιέχει όλη την πληροφορία (εικόνα, ήχο, υπότιτλους, μενού, διαφορετικές κάμερες).
- .IFO (Navigation Information) FILE: πληροφορίες για την πλοήγηση στο δίσκο.
- .BUP (BackUP) FILE: αντίγραφα των IFO αρχείων.

dvd.BLUE'RAY

name::
* McsEngl.dvd.BLUE'RAY@cptIt,

Blu-ray group looks for wider support Last modified: May 21, 2004, 12:03 PM PDT By Richard Shim Staff Writer, CNET News.com
A group promoting blue-laser optical discs as the next DVD format plans to open its ranks to wider membership, looking for added opportunities for the technology.
The Blu-ray Disc Founders group is re-incorporating and forming the Blu-ray Disc Association, it announced earlier this week. The consortium said it will invite companies from a wider range of industries to play a part in the development of the emerging DVD format.
The original group of 13 companies consisted of consumer electronics, PC and storage makers: Dell, Hewlett-Packard, Hitachi, LG Electronics, Matsushita Electric Industrial, Mitsubishi Electric, Pioneer, Royal Philips Electronics, Samsung Electronics, Sharp, Sony, TDK and Thomson Multimedia.
"We recognized the need for a broader input and strategic help from players such as content providers, studios and software makers," said Maureen Weber, a general manager at HP and member of Blu-ray Disc Founders. "We're responding to criticism that we needed to be more inclusive."
Weber added that a group separate from the Blu-ray Disc Association will collect royalties and licensing fees. The terms of those fees and who will gather them are still being determined.
The Blu-ray backers aim to make the technology the widest-used format for high-definition optical storage, in hopes of capitalizing on the growing use of digital content, and as high-definition television begins to take off. Membership applications to the new association will be available in the summer, and the first meeting of the re-formed group is planned for the fall.
In the interim, the Founders group plans to host a conference in southern California. The June conference will showcase Blu-ray features now in development, such as content protection and interactive applications.
Another industry association, which includes Toshiba and NEC among its members, has been working on a competing disc technology, now called HD-DVD. That technology claims to be compatible with current DVD standards.
The Blu-ray Disc format uses blue-laser light and is considered a potential successor to today's red-laser DVD technology. Blu-ray Disc technology allows up to 27GB of storage on a single-sided disc, compared with 4.7GB on current DVDs.
A rewritable disc with a dual layer on the same side that holds up to 50GB of data is being developed by the group. In addition, read-only (BD-ROM) and record-only (BD-R) formats are expected to be available in the summer.
Products using the BD-ROM and BD-R formats are set for release in the second half of 2005. The rewritable Blu-ray format has been available since February of last year.

FvMcs.computer'storage.FLASH-MEMORY-CHIP

name::
* McsEngl.conceptIt91,
* McsEngl.computer'storage.FLASH-MEMORY-CHIP@cptIt,
* McsEngl.FvMcs.computer'storage.FLASH-MEMORY-CHIP@cptIt,
* McsEngl.FLASH'MEMORY@cptIt91,
* McsEngl.flash-memory-chips@cptIt,

DEFINITION

A newer, more economical type of EEPROM

ADVANTAGES

ΚΡΑΤΟΥΝ ΤΟ ΦΟΡΤΙΟ ΤΟΥΣ ΟΤΑΝ ΣΒΗΣΕΙ Ο ΥΠΟΛΟΓΙΣΤΗΣ

TAXYTHTA
100 ΦΟΡΕΣ ΤΑΧΥΤΕΡΕΣ ΑΠΟ ΣΚΛΗΡΟΥΣ, ΑΠΟ ΔΩ ΠΗΡΑΝ ΤΟ ΟΝΟΜΑ ΤΟΥΣ.

ΙΣΧΥ
100 ΦΟΡΕΣ ΛΙΓΟΤΕΡΗ ΙΣΧΥ, ΟΙ ΜΠΑΤΑΡΙΕΣ ΣΤΟΥΣ ΦΟΡΗΤΟΥΣ ΘΑ ΚΡΑΤΟΥΝ 200 ΩΡΕΣ ΑΝΤΙ 2-4 ΤΩΡΑ.

ΜΙΚΡΟΤΕΡΟ ΒΑΡΟΣ

ΑΝΤΕΧΕΙ ΣΕ 50G ΕΝΩ Ο ΣΚΛΗΡΟΣ ΣΕ 5G.

CREATION

1984, Η TOSHIBA ΕΦΕΥΡΕ ΑΥΤΟ ΤΟ ΕΙΔΟΣ ΜΝΗΜΗΣ ΣΤΑ ΜΕΣΑ ΤΟΥ '80 ΑΛΛΑ ΕΧΑΣΕ ΤΗΝ ΠΡΩΤΟΠΟΡΙΑ ΟΤΑΝ ΕΡΙΞΕ ΤΟ ΒΑΡΟΣ ΤΗΣ ΣΤΙΣ ΑΛΛΕΣ, ΤΙΣ ΣΥΜΒΑΤΙΚΕΣ ΜΝΗΜΕΣ DRAM

ΙΣΧΥΡΕΣ ΣΥΜΜΑΧΙΕΣ ΓΙΑ FLASH MEMORY CHIPS
Οι Ιαπωνικές εταιρίες Hitachi και Mitsubishi Electric υπέγραψαν συμφωνία σχετικά με την από κοινού ανάπτυξη flash memory chips. Οι δύο εταιρίες προσβλέπουν στην προτυποποίηση των flash memory chips που χρησιμοποιούνται στη βιομηχανία. Αργότερα, στη συμμαχία αυτή αναμένεται να προσχωρήσει και η γαλλική Thomson. Η Hitachi και η Mitsubishi Electric ασχολούνται ήδη με την ανάπτυξη τέτοιων προϊόντων, η κάθε μια για λογαριασμό της.
Τα πρώτα προϊόντα της κοινής συνεργασίας των δύο εταιριών αναμένονται για το 1995. Οι δύο εταιρίες ελπίζουν, με τη συνεργασία τους, να πετύχουν μείωση του κόστους και του χρόνου ανάπτυξης των chips. Ανάλογες συνεργασίες στο χώρο των προϊόντων flash memory υπάρχουν ήδη μεταξύ των Intel και Sharp, καθώς και μεταξύ των Toshiba, National Semiconductor και Samsung.
[compulink, feb 1994]

DRAWBACKS

ΚΟΣΤΟΣ

ΜΠΟΡΟΥΜΕ ΝΑ ΓΡΑΨΟΥΜΕ ΚΑΙ ΝΑ ΣΒΗΣΟΥΜΕ 100.000 ΦΟΡΕΣ

EVOLUTION

ΟΙ ΙΑΠΩΝΕΣ ΕΙΔΙΚΟΙ ΠΡΟΒΛΕΠΟΥΝ ΟΤΙ ΟΙ FLASH ΜΝΗΜΕΣ ΘΑ ΑΝΤΙΚΑΤΑΣΤΗΣΟΥΝ ΤΟΥΣ ΣΚΛΗΡΟΥΣ ΔΙΣΚΟΥΣ.

H TOSHIBA ΑΝΑΚΟΙΝΩΣΕ ΟΤΙ ΘΑ ΠΑΡΟΥΣΙΑΣΕΙ ΜΕΧΡΙ ΤΕΛΟΥΣ ΤΟΥ 1992 ΕΝΑ 16ΜΒit chip for $125.

FvMcs.computer'storage.FLOPTICAL-DISK

name::
* McsEngl.conceptIt145,
* McsEngl.computer'storage.FLOPTICAL-DISK@cptIt,
* McsEngl.FvMcs.computer'storage.FLOPTICAL-DISK@cptIt,
* McsEngl.floptical-disk-storage@cptIt,
* McsEngl.storage.FlopticalDisk@cptIt145,

DEFINITION

Χρησιμοποιούν και 1.44 δίσκους.

SPECIFIC

Specific_concepts (level 3) =

Oι υπολογιστες ΙΚΑΡΟΣ έρχονται με floptical 3.5" των 21 ΜΒ. Μicropolis.

PROCOM:
VENTOR:          PROCOM TECHNOLOGY
model:          FLOPTICA 20
price:          $585
computer support:      PC, MAC
seek time, ms:        80
internal/external:      EXT
weight lbs:        -6
size:
power suply:        int
transfer speed Mbps:    0.2
interface:        SCSI
cost of interface adapter:
options:
Media
size:          20.8
manufacturer:        insite, 3m, Maxell
cost per disk:      $45
cost per MB:        $2.15
COMMENTS: for notebooks, primary storage?

FvMcs.computer'storage.LS-120-DRIVE

name::
* McsEngl.conceptIt107,
* McsEngl.computer'storage.LS-120-DRIVE@cptIt,
* McsEngl.FvMcs.computer'storage.LS-120-DRIVE@cptIt,
* McsEngl.ls@cptIt120-drive,
* McsEngl.storage.ls120@cptIt,

DEFINITION

Είναι μία συσκευή με ξεκάθαρο σκοπό. Να εκτοπίσει το παραδοσιακό floppy 1.44.
Χρησιμοποιείται και ως συσκευή εκκίνησης
[COMPUTER GO, 1997jul 24]

GENERIC

_GENERIC:
computer STORAGE#cptIt14#

INTERFACE/CONTROLLER

ATAPI

FvMcs.computer'storage.MAGNETOOPTICAL-STORAGE HARDWARE

name::
* McsEngl.conceptIt182,
* McsEngl.computer'storage.MAGNETOOPTICAL-STORAGE HARDWARE@cptIt,
* McsEngl.FvMcs.computer'storage.MAGNETOOPTICAL-STORAGE HARDWARE@cptIt,
* McsEngl.magneto-optical-storage-hardware@cptIt,
* McsEngl.storage.magnetooptical@cptIt182,
* McsElln.ΜΑΓΝΕΤΟ-ΟΠΤΙΚΟΣ-ΔΙΣΚΟΣ@cptIt,

SPECIFIC

Specific_concepts (level 3) =

3D-Optical-Drive#cptIt39: attSpe#

CD


CD-ROM#cptIt265: attSpe#
CD-R#cptIt965: attSpe#
CD-RW

MULTIMEDIA CD

REWRITABLE-drive#cptIt221: attSpe#

ROD: erasable optical storage

WORM/WRITE-ONCE-READ-MANY-drive#cptIt117: attSpe#

name::
* McsEngl.WORM/WRITE-ONCE-READ-MANY-drive@cptIt,

FUJITSU ΜΑΓΝΗΤΟΟΠΤΙΚΟΣ ΔΙΣΚΟΣ

H FUJITSU ΑΝΕΠΤΥΞΕ ΕΝΑ ΜΙΚΡΟΣΚΟΠΙΚΟ ΜΑΓΝΗΤΟΟΠΤΙΚΟ ΔΙΣΚΟ, 1,8", 60ΜΒ. Η ΜΑΖΙΚΗ ΠΑΡΑΓΩΓΗ ΘΑ ΑΡΧΙΣΕΙ ΤΟ 1995.

SONY MINIDISK

MINI-ΔΙΣΚΕΤΑ, 2,5 ιντσών ετοιμάζουν η Sony και άλλες εταιρείες που προσφέρει και τη σημαντική δυνατότητα τροποποίησης των πάντων από το χρήστη. Στην αρχη θα εμφανισθεί σαν προϊόν στερεοφωνικού ήχου.

TRANSFER RATE 150 Kbps.
STORAGE CAPASITY: 140 MB.
VARIATIONS: WRITABLE, READONLY, HYBRID.
[BYTE, NOV 1993, 32]

FvMcs.computer'storage.OPTICAL

name::
* McsEngl.conceptIt964,
* McsEngl.computer'storage.OPTICAL@cptIt,
* McsEngl.FvMcs.computer'storage.OPTICAL@cptIt,
* McsEngl.optical-storage@cptIt,
* McsEngl.storage'optical@cptIt964,

GENERIC

_GENERIC:
computer STORAGE#cptIt14#

SPECIFIC

_SPECIFIC#ql:_GENERIC cptIt964#

FMD 140GB

Επιστήμη - Τεχνολογία
Τελευταία ενημέρωση: Πέμπτη 9 ΝΟΕ 2000 19:21
Νέος οπτικός δίσκος, χωρητικότητας 140GB, από την Constellation 3D

Τεράστια χωρητικότητα υπόσχεται ο οπτικός δίσκος τεχνολογίας FMD
news.in.gr

Νέα Υόρκη: Μια νέα τεχνολογία οπτικού δίσκου, ο οποίος έχει χωρητικότητα έως και 140GB δεδομένων, δημιούργησε η εταιρεία Constellation 3D. H εταιρεία πρόκειται να παρουσιάσει τις δυνατότητες της νέας της τεχνολογίας την ερχόμενη εβδομάδα, στο πλαίσιο της έκθεσης Comdex, η οποία διοργανώνεται στο Λας Βέγκας.
Σύμφωνα με τον ειδησεογραφικό τόπο Wired News, η καινούργια τεχνολογία της Constelation 3D εισάγει σημαντικές καινοτομίες στον τρόπο σχεδιασμού των οπτικών μέσων αποθήκευσης.
Το μειονέκτημα των συμβατικών CD έγκειται στο ότι η ανάγνωση των δεδομένων γίνεται μόνο από την επιφάνειά του. Στην περίπτωση του DVD, η ακτίνα λέιζερ δεν διαβάζει δεδομένα μόνο από την επιφάνεια, αλλά εισχωρεί και στη δεύτερη στρώση του δίσκου. Όμως, μετά τη δεύτερη στρώση, η ακτίνα λέιζερ διαθλάται και δεν μπορεί να ανιχνεύσει τα δεδομένα τα οποία έχουν τη μορφή οπών στην επιφάνεια του δίσκου.
Με την τεχνολογία Δίσκου Πολλαπλών Στρώσεων Φθορίου (Fluorescent Multilayer Disc-FMD), η ακτίνα λέιζερ του οδηγού δίσκου μπορεί να εισχωρήσει σε πολλά επίπεδα, αυξάνοντας έτσι κατακόρυφα τον όγκο αποθήκευσης των δεδομένων. Στους δίσκους τεχνολογίας FMD τα δεδομένα εγγράφονται σε πολλαπλές στρώσεις ενός φθορίζοντος υλικού το οποίο επιτρέπει τη δίοδο του φωτός. Σύμφωνα με την Constellation 3D, ένας δίσκος FMD μπορεί να έχει περισσότερες από δέκα στρώσεις.
Ένας δίσκος FMD είναι διάφανος, έχει το μέγεθος ενός συμβατικού CD ή DVD και περιέχει μέχρι και 140GB δεδομένων (δηλαδή 30 φορές περισσότερα δεδομένα από ό,τι ένα συμβατικό DVD).
Η πρώτη γενιά των οδηγών FMD-ROM θα επιτρέπουν μόνο την ανάγνωση δεδομένων, όμως η εταιρεία εργάζεται και για την τεχνολογία εγγραφής σε δίσκους FMD, η οποία θα είναι διαθέσιμη στο κοινό μέχρι το τέλος του 2001.
Ο αντιπρόεδρος του τμήματος μάρκετινγκ της Constellation 3D Τζον Έλις υποστηρίζει, πάντως, πως το FMD όχι απλώς ανταγωνίζεται το DVD, αλλά αποτελεί το επόμενο βήμα στην εξέλιξη των οπτικών μέσων αποθήκευσης δεδομένων.

FvMcs.computer'storage.PCMCIA-DRIVE

name::
* McsEngl.conceptIt291,
* McsEngl.computer'storage.PCMCIA-DRIVE@cptIt,
* McsEngl.FvMcs.computer'storage.PCMCIA-DRIVE@cptIt,
* McsEngl.PCMCIA-STORAGE@cptIt,
* McsEngl.storage.pcmcia@cptIt291,

DEFINITION

H αρχιτεκτονικη PCMCIA έχει πλέον καθιερωθεί ως πρότυπο στους φορητούς. Η καθιέρωση συνοδεύτηκε απο πολλά περιφερειακά οπως:
μνημες SRAM,
fax-modems,
LAN cards,
flash memory,
ATA σκληρους δίσκους'
και άλλες ειδικές κάρτες.
[COMPUTER GO, APRI 1994, 22]

SPECIFIC(hard disks)

MAXTOR:
MXL-105-III interface, 105MB (1993) $500 MAXTOR, Info-Quest. 189.000+fpa.

MobilMax 131, 19msec,

SPECIFIC

Specific_concepts (level 3) =

TYPE II: έκδοση 2.

TYPE III: έκδοση 2.1
syquest(1994)

FvMcs.computer'storage.TAPE-STREAMER

name::
* McsEngl.conceptIt18,
* McsEngl.computer'storage.TAPE-STREAMER@cptIt,
* McsEngl.FvMcs.computer'storage.TAPE-STREAMER@cptIt,
* McsEngl.tape-streamer@cptIt,
* McsEngl.tape'streamer@cptIt18,
* McsElln.ΚΑΣΕΤΕΣ@cptIt,
* McsElln.ΤΑΙΝΙΕΣ@cptIt,

DEFINITION

ΤΑΙΝΙΕΣ είναι συσκευές αποθήκευσης αργες και φτηνές.

CAPACITY#cptIt14.1#

{time.2014}:
=== Return of the tape: Sony 185TB cassette tape packs a wallop but for what purpose?
By Mike Lata,   Tech Times | May 6, 12:03
Sony has shattered density records with a new cassette tape it has developed along with IBM. The tape is capable of storing 185 TB of memory on it or 148 GB per square inch.

The cassette tapes these days are seen as items from a long forgotten era of the 80s and Walkmans. However, Sony has created a new record with storage capabilities using one of these tapes as the storage medium.

The tape can hold 185 TB of data in a single cartridge or 148 GB per square inch, which is a new record. Basically, you can put 3,700 Blu-ray discs on it.

The advantage of such tapes is that they can store way more data than optical media and are cheaper as well as less power hungry than running hard drives inside data center servers. However, the process of transferring data from the tapes is slow in comparison.
[http://www.techtimes.com/articles/6556/20140506/cassette-tape-tape-sony-185tb.htm]

IMPLEMENTATION

DEGREE OF AUTOMATION

PRICE#cptEconomy541.44#

RELIABILITY

TRANSFER-RATE#cptIt498#

USER INTERFACE

SPECIFIC

Specific_concepts (level 3) =

SONY, 8 GB, 150 MB/min. ΤΕΧΝΟΛΟΓΙΚΗ ΕΠΕ.

DAT/Digital Audio Tape

QIC/Quarter Inch Cartridge

Διπλασια τιμη, αλλά 3 φορες ταχύτερες.

FvMcs.computer'storage.WRITE-MANY-OPTICAL-DRIVE

name::
* McsEngl.conceptIt221,
* McsEngl.computer'storage.WRITE-MANY-OPTICAL-DRIVE@cptIt,
* McsEngl.FvMcs.computer'storage.WRITE-MANY-OPTICAL-DRIVE@cptIt,
* McsEngl.rewritable-optical-drive/storage@cptIt,
* McsEngl.storage.WriteManyOptical@cptIt221,
* McsEngl.write-many-optical-drive@cptIt,
* McsElln.ΕΠΑΝΕΓΓΡΑΨΙΜΟΣ-ΟΠΤΙΚΟΣ-ΔΙΣΚΟΣ@cptIt,

ETERIES#ql:[Group optical rewritable]:IT-COMP.NFO# illp# {optical rewritable}

ADVANTAGES:
JUKEBOXES
MO (MagnetOptical) drives:
Write Many Read Always:

ADVANTAGES

1. Remonability
2. Reliability
3. Lower cost per megabyte

write many drive

MO (MagnetOptical) drives: lasers and magnetic write heads.

write many drive

JUKEBOXES

Write Many Read Always:
Erasable products began to ship to the consumer market at the end of 1988...
Prices of erasable drives range between $4000 and $6000, while erasable discs cost between $200 and $250.
...The capacity of ISO drives is 650 megabytes with an average acess time of 80 milliseconds. (Elshami1990,24)

SPECIFIC

Specific_concepts (level 3) =

MAKERS:
ALPHATRONIX:
COMART
DPL (UK)
MAXTOR:
MICRO DESIGN INTERNATIONAL
PANASONIC:
PINNACLE MICRO
RELAX TECHNOLOGY
RICOH:
RPS:
SONY: ΤΕΧΝΟΛΟΓΙΚΗ ΕΠΕ, 400.000
VALITEK: 413-549-2900 45ms, no controller card required

ALPHATRONIX

INSPIRE ii, THE FASTEST. 1988 THE WORLD'S FIRST.

DPL

DPL (UK) OFFERS THE optistore 128, a 3.5", 128 MB rewritable optical disk system.
28 msec seek time.
1400 lires agglias the system. 60 each diskette.

MAXTOR

TAHITI II (SCSI), 592/920 MB, 35ms, $3400
MICRO DESIGN INTERNATIONAL, LAZERBANK LIBRARY 5-16DX 27ms 10GB, GREECE INTELECT 01-6474481

PANASONIC

PANASONIC: LF7012, 1GB, $3200

PINNACLE

PINNACLE MICRO: 650 MB, PMP-650. 19 msec effective access time. Plug-and-Play ready. Fax 714-724-1913.
ΕΛΛΑΔΑ: COMART 9234333.

PINNACLE MICRO

model:      PMO-650
price:        $4,000
computer support:    PC, MAC, PS/2, SUN
seek time, ms:      +19
internal/external:    EXT
weight:        7.4
size:
power suply:      int.
transfer speed Mbps:  4.2
interface:      SCSI
cost of interface adapter: INCLUDED
options:
Media
size MB:      +650
manufacturer:    DIGITAL OPTICAL TECH
cost per disk:    $199
cost per MB:    $.3
COMMENTS: Καλό όταν μεγάλη χωρητικότητα είναι αναγκαία.

RCD: Recordable CD, $4000(oct 1993) tel-714.7273300

RELAX TECHNOLOGY

model:        Rewritable Sierra 128
price:        ++$1400
computer support:    PC, MAC, PS/2, SUN
seek time, ms:      39
internal/external:    EXT
weight:        +1.76 Notebook
size:
power supply:      int. Notebook
transfer speed Mbps:  4
interface:      SCSI-I
cost of interface adapter: INCLU
options:
Media
size:      128
manufacturer:    RICOH
cost per disk:    ++$49
cost per MB:    $.38

RICHOH

RICOH: 1) RO-3010E, 127MB, 45ms, $1400
2) 650MB, 20000 MTFB, $2500

RPS

RPS: NS 1200E, 128MB, 45 msec, 500000 drx. tel.8822772

SONY

SONY: 650MB, 20000 MTFB, $3000

VENTOR

model:
price:
computer support:
seek time, ms:
internal/external:
weight:
size:
power suply:
transfer speed Mbps:
interface:
cost of interface adapter:
options:
Media
size:
manufacturer:
cost per disk
cost per MB:
COMMENTS:

FvMcs.computer'storage.ΠΟΛΥΜΕΡΕΣ-ΦΙΛΜ

name::
* McsEngl.conceptIt285,
* McsEngl.computer'storage.ΠΟΛΥΜΕΡΕΣ-ΦΙΛΜ@cptIt,
* McsEngl.FvMcs.computer'storage.ΠΟΛΥΜΕΡΕΣ-ΦΙΛΜ@cptIt,
* McsElln.ΠΟΛΥΜΕΡΕΣ ΦΙΛΜ@cptIt,

_DESCRIPTION:
1993
ΠΡΙΝ ΛΙΓΕΣ ΜΕΡΕΣ ΤΟ ΠΑΡΟΥΣΙΑΣΑΝ ΕΡΕΥΝΗΤΕΣ ΤΗΣ ΙΒΜ. ΑΠΟΘΗΚΕΥΕΙ ΤΡΙΔΙΑΣΤΑΤΕΣ "ΕΙΚΟΝΕΣ" ΔΕΔΟΜΕΝΩΝ ΜΕ 100-1000 ΦΟΡΕΣ ΤΑΧΥΤΕΡΗ ΑΠΟΘΗΚΕΥΣΗ ΚΑΙ ΑΝΙΧΝΕΥΣΗ ΜΕ ΤΟΥΣ ΣΥΜΒΑΤΟΥΣ
[ΚΑΘΗΜΕΡΙΝΗ 28 ΜΑΡΤΙΟΥ 1993, 42]

FvMcs.system.IT_HUMAN-(stmIth)

name::
* McsEngl.conceptIt180,
* McsEngl.system.IT_HUMAN-(stmIth)@cptIt,
* McsEngl.FvMcs.system.IT_HUMAN-(stmIth)@cptIt,
* McsEngl.human-it-system@cptIt180, {2012-05-08}
* McsEngl.system.it-human@cptIt180, {2012-05-20}
* McsEngl.system.it.human@cptIt180, {2012-05-05}
* McsEngl.systemTechData@cptIt180, {2011-09-06}
* McsEngl.Combuter based information system;@cptIt,
* McsEngl.Information-management-system@cptIt,
* McsEngl.information-technology-system@cptIt,
* McsEngl.information-system@cptIt,
* McsEngl.sih-system.it.human@cptIt,
* McsEngl.sysIth@cptIt180, {2012-05-08}
* McsEngl.sysItHmn@cptIt180, {2012-05-05}
* McsEngl.ITS@cptIt180, {2012-04-14}
* McsEngl.ITMS@cptIt180,
* McsEngl.std@cptIt180, {2011-09-06} {2012-04-14}
* McsEngl.sysData@cptIt180, {2011-09-06}
* McsEngl.sistemoTekoDato@lagoSngo, {2011-09-06}
* McsSngo.sistemoTekoDato@cptIt180, {2011-09-06}
* McsElln.ΗΛΕΚΤΡΟΝΙΚΟ ΠΛΗΡΟΦΟΡΙΑΚΟ ΣΥΣΤΗΜΑ@cptIt,
* McsElln.ΜΗΧΑΝΟΓΡΑΦΗΣΗ@cptIt,
* McsElln.ΠΛΗΡΟΦΟΡΙΑΚΟ ΣΥΣΤΗΜΑ@cptIt,
* McsElln.ΠΤΣ@cptIt,
* McsElln.ΣΥΣΤΗΜΑ ΗΛΕΚΡΟΝΙΚΩΝ ΠΛΗΡΟΦΟΡΙΩΝ@cptIt,
* McsElln.ΣΥΣΤΗΜΑ ΠΛΗΡΟΦΟΡΙΑΚΩΝ-ΤΕΧΝΟΛΟΓΙΩΝ@cptIt,
* McsElln.ΣΠΤ@cptIt180,

DEFINITION

ITS I call PROCESSING-INFO-TECH#cptIt245.1# that is an independent SYSTEM#cptCore348.1#.
[NIKOS, MAR. 1995]

ITS is a MAN&MACHINE system, that process information
[NIKOS, 20 SEP. 1994]

IT-SYSTEM is any entity that manipulates HUMAN information using information technology, in any organization.
..an automated information system is an integral part of a larger information system, comprising both automated and manually processed information.
[Hall#cptResource23# 1991 233#cptResource23]

The Discipline of Information Systems
Several IS scholars have debated the nature and foundations of Information Systems which has its roots in other reference disciplines such as Computer Science, Engineering, Mathematics, Management Science, Cybernetics, and others.[20][21][22][23].
Information systems also can be defined as a collection of hardware, software, data, people and procedures that work together to produce quality information.
[http://en.wikipedia.org/wiki/Information_systems]

INFORMATION TECHNOLOGY SYSTEM (ITS) is a "system" of
- COMPUTER-NETWORKS#cptIt21#,
- COMPUTER-SYSTEMS#cptIt227#,
- COMMUNICATION-TECHNOLOGY#cptIt244#,
- PEOPLE,
- HUMAN-INFORMATION#cptIt221#,
that process human information.
[nikos, oct 1993]

stmIth'GENERIC

_GENERIC:
* entity.whole.system.it#cptItsoft277#
* worldview-management-system#cptCore402#
* PROCESSING info-tech#cptIt245#

stmIth'WHOLE

_WHOLE:
* system.humans#cptCore925#
ORGANIZATION WHICH USES THE SYSTEM

stmIth'OTHER-VIEW#cptCore505#

name::
* McsEngl.stmIth'OTHER-VIEW@cptIt,

A study of writings about the design concepts of information systems, revealed that the majority of the articles or books of the 1970s were
- either "cookbook type" (how to do it),
- or were vague generalized ideas.
[Ligon, 1986, 2#cptResource61]

A 1964 articl by J. Moss discussed methods of "Planning a MIS"
[Ligon, 1986, 11#cptResource61]

stmIth'PART

_SPECIFIC:
* COMMUNICATION TECHNOLOGY
* systemItComputer#cptItsoft453#
* data#cptItsoft242#
* people##

stmIth.PARTIAL-DIVISION

name::
* McsEngl.stmIth.PARTIAL-DIVISION@cptIt,

_PARTIAL_DIVISION:
* human#cptItsoft180.2#
* systemIt#

stmIth'CollectionData

name::
* McsEngl.stmIth'CollectionData@cptIt,
* McsEngl.conceptIt544,
* McsEngl.collectionData-of-sysData@cptIt180i,

_GENERIC:
* digital-data#cptIt242#
* human information#cptCore654.16#

_Description
ANY 'human-information#cptCore445.1#' the ITS uses (process, communicate)
[NIKOS, 18 SEP. 1994]

stmIth'Department#cptEconomy105#

name::
* McsEngl.stmIth'Department@cptIt,
* McsEngl.it-department@cptIt,
* McsEngl.edp-department@cptIt,
* McsElln.ΤΜΗΜΑ-ΜΗΧΑΝΟΓΡΑΦΗΣΗΣ@cptIt,
* McsElln.ΜΗΧΑΝΟΓΡΑΦΙΚΟ-ΚΕΝΤΡΟ@cptIt,

DEPARTMENT#cptEconomy105: attPar#

stmIth'evaluation#cptCore546.107#

name::
* McsEngl.stmIth'evaluation@cptIt,

The ultimate test of a good IS is not the extent of mechanization or the size, but rather the ACCURACY of the information in the system and most important, how well you, the manager, can USE the stored information for planing, managing, and evaluating programs.
[Meltzer, 1981, 9#cptResource74]#

stmIth'EVOLUTION#cptCore546.171#

name::
* McsEngl.stmIth'EVOLUTION@cptIt,
* McsEngl.conceptIt223,
* McsEngl.ITS-DEVELOPMENT/EVOLUTION@cptIt,
* McsEngl.its'development@cptIt223,

_GENERIC:
* evolution#cptCore725#

DEFINITION

_DESCRIPTION:
SYSTEMS DEVELOPMENT consists of analysis, design and implementation.
It is part of a larger process. It must be preceded by SYSTEMS PLANNING and be followed by SYSTEMS MAINTENANCE.
[Eliason, 1990#cptResource13]

A system study is a six step process.
1. Problem definition
2. System analysis
3. System design
4. Programming analysis
5. Program preparing
6. Software implementation and maintenance.
[Sanders, 1988, p470#cptResource91]

the LIFE CYCLE concept also applies to combuter based information system. In fact, it can be applied in two ways.
First as a long term evolution of a firm's CBIS.
The second view applies to a particular CBIS project. [McLeod, 1990, p624#cptResource65]

Methodology (APPROACH)

 life-cycle approach (a fully functional approach)

 prototyping

Stage

 SYSTEMS-ANALYSIS#cptIt224: attSpe#

 SYSTEMS DESIGN

 SYSTEMS IMPLEMENTATION

 SYSTEMS MAINTENANCE

 SYSTEMS PLANNING

stmIth'doing#cptCore475#

name::
* McsEngl.stmIth'doing@cptIt,

* information-processing-function#cptItsoft444#

stmIth'Goal#cptIt215#

name::
* McsEngl.stmIth'Goal@cptIt,

With information systems, future challenges pose real demands on:
system implementation,
databases,
data communications,
user training,
keeping the system basically simple,
[Chorafas, 1982, 214#cptResource440]

stmIth'Human

name::
* McsEngl.stmIth'Human@cptIt,
* McsEngl.conceptIt180.2,
* McsEngl.conceptIt451,
* McsEngl.its-PEOPLE@cptIt,
* McsEngl.its'people@cptIt451,

* McsElln.πληροφοριακου-τεχνολογικου-συστηματος-ΑΝΘΡΩΠΟΙ@cptIt,

_DESCRIPTION:
ΚΑΘΕ άνθρωπος σχετιζόμενος με το σύστημα.

_SPECIFIC:
CREATOR
MANAGER
USER

stmIth'ognCompany#cptEconomy7#

name::
* McsEngl.stmIth'ognCompany@cptIt,


MAKER
 CREATOR
 EXPAND
 INSTALL
 MAINTENANCE


VENDOR

stmIth'OrgUsing

name::
* McsEngl.stmIth'OrgUsing@cptIt,

stmIth'Price#cptEconomy541.44#

name::
* McsEngl.stmIth'Price@cptIt,

COST/INVESTMENT/SPENDING

The information investment: "The total value of IS investment in U.S. industries easily amounts to billions of dollars." Manufacturing companies spend 1.1 persent, service companies 2 percent, and public organizations 2.3 persent of their revenue.
[Li et al, 1991, 20]

"The information executive will easilly earn a seat on the executive committee when he or she can clearly demonstrate the value added to the business by the information investment."
[VINCENT,#cptResource108# 1990, 195#cptResource108]

stmIth'systemIt

_CREATED: {2015-08-29}

name::
* McsEngl.stmIth'systemIt@cptIt,
* McsEngl.conceptIt180.3,

stmIth'systemItComputer#cptIt453#

name::
* McsEngl.stmIth'systemItComputer@cptIt,

stmIth'SystemHardware#cptIt180.1#

_CREATED: {2011-09-06}

name::
* McsEngl.stmIth'SystemHardware@cptIt,
* McsEngl.hardaware-system@cptIt180.1, {2011-09-06}
* McsEngl.sysHard@cptIt180.1, {2011-09-06}
* McsEngl.systemHardware@cptIt180.1, {2011-09-06}

_DESCRIPTION:
Only the "machine" part of a data-tech-system.
[hmnSngo.2011-09-06]

stmIth'SystemSoftware#cptIt490#

name::
* McsEngl.stmIth'SystemSoftware@cptIt,

stmIth'user-interface

name::
* McsEngl.stmIth'user-interface@cptIt,

The main method is the keyboard.

SPECIFIC

name::
* McsEngl.stmIth.specific@cptIt,
* McsEngl.sith.specific@cptIt,
* McsEngl.sysIth.specific@cptIt,

_SPECIFIC:
* stmIth.book_device#cptItsoft316#
===
* stmIth.car_devide#cptItsoft212#
* stmIth.computer_device#cptItsoft227.9#
===
* stmIth.economy#cptItsoft450#
* stmIth.election#cptItsoft286#
* stmIth.expert_system##
===
* stmIth.decision_support#cptItsoft497.11#
* stmIth.DEVIDE
* stmIth.device.CAR#cptItsoft212#
* stmIth.devide.COMPUTER#cptItsoft227.9#
* stmIth.device.BOOK#cptItsoft316.1#
* stmIth.device.NEWSPAPER#cptItsoft23#
* stmIth.device.PERIODICAL#cptItsoft328#
===
* stmIth.fund_transfering#cptItsoft98#
===
* stmIth.job_search#cptItsoft398#
===
* stmIth.knowledge#cptItsoft458.2#
===
* stmIth.network#cptItsoft451.1#
* stmIth.network.computer#cptItsoft21.4#
* stmIth.newspaper#cptItsoft23#
===
* stmIth.online_computer_network#cptItsoft372#
* stmIth.ogn.education#cptItsoft329#
* stmIth.ogn.government#cptItsoft219#
* stmIth.ogn.judicial#cptItsoft287#
* stmIth.ogn.ministry
* stmIth.ogn.municipal#cptItsoft312#
* stmIth.ogn.lawyer_office#cptItsoft193#
* stmIth.ogn.library-#cptItsoft237#
* stmIth.ogn.hospital#cptItsoft192#
* stmIth.ogn.household
* stmIth.ogn.parliament#cptItsoft163#
* stmIth.ogn.perfecture#cptItsoft235#
* stmIth.ogn.production#cptItsoft205#
* stmIth.ogn.producer.public
* stmIth.ogn.public#cptItsoft306#
* stmIth.ogn.stock_exchange#cptItsoft283#
* stmIth.ogn.TV_station#cptItsoft305#
===
* stmIth.periodical#cptItsoft328#
===
* stmIth.sector_of_economy
* stmIth.sector.health#cptItsoft454#
* stmIth.sector.public#cptItsoft270#
* stmIth.sector.tourist#cptItsoft201#
* stmIth.stock_exhange#cptItsoft283#
* stmIth.system.computer
* stmIth.system.computers#cptItsoft21.4#
===
* stmIth.TAXIS#cptItsoft264#
* stmIth.toll#cptItsoft397#
* stmIth.trading#cptItsoft51#
* stmIth.transaction
===
* stmIth.website##
===

There are various types of information systems, for example:
* transaction processing systems,
* office systems,
* decision support systems,
* knowledge management systems,
* database management systems, and
* office information systems.
Critical to most information systems are information technologies, which are typically designed to enable humans to perform tasks for which the human brain is not well suited, such as: handling large amounts of information, performing complex calculations, and controlling many simultaneous processes.
[http://en.wikipedia.org/wiki/Information_systems]

stmIth.SPECIFIC-DIVISION.controlling

name::
* McsEngl.stmIth.SPECIFIC-DIVISION.controlling@cptIt,

_SPECIFIC:
* distributed-transacting-system##
* distributedNo-transacting-system##

stmIth.SPECIFIC-DIVISION.ogn-uses

name::
* McsEngl.stmIth.SPECIFIC-DIVISION.ogn-uses@cptIt,

_SPECIFIC:
* org-production#cptItsoft205#
* CAR#cptIt212#
* economy#cptItsoft450#
* ECONOMY SECTOR
 * HEALTH SECTOR#cptIt454#
 * PUBLIC SECTOR#cptIt270#
 * TOURIST SECTOR#cptIt201#
* EDUCATIONAL ORGANIZATION#cptIt329#
* HOME
* HOSPITAL#cptIt192#
* LAWYER OFFICE#cptIt193#
* LIBRARY#cptIt237#
* PUBLIC ORGANIZATION#cptIt306#
* stock-exhange#cptItsoft283#
* toll-ogn-stmIth#cptItsoft397#
* TV STATION#cptIt305#
===
ΑΡΧΙΤΕΚΤΟΝΑ ΓΡΑΦΕΙΟ
ΑΣΦΑΛΙΣΤΙΚΗ ΕΤΑΙΡΙΑ
ΑΥΤΟΚΙΝΗΤΩΝ ΕΝΟΙΚΙΑΣΕΙΣ
ΒΙΒΛΙΟΠΩΛΕΙΟΥ ΔΙΑΧΕΙΡΙΣΗ
ΒΙΟΜΗΧΑΝΙΚΗ ΔΙΑΧΕΙΡΙΣΗ
ΒΟΥΛΚΑΝΙΖΑΤΕΡ ΔΙΑΧΕΙΡΙΣΗ
ΓΥΜΝΑΣΤΗΡΙΟΥ ΔΙΑΧΕΙΡΙΣΗ
ΔΙΑΝΟΜΩΝ ΔΙΑΧΕΙΡΙΣΗ
ΔΙΣΚΟΠΩΛΕΙΩΝ ΔΙΑΧΕΙΡΙΣΗ
ΕΙΔΩΝ ΥΓΙΕΙΝΗΣ ΔΙΑΧΕΙΡΙΣΗ
ΕΙΣΑΓΩΓΕΣ-ΕΞΑΓΩΓΕΣ
ΕΚΔΟΤΙΚΩΝ ΕΠΙΧΕΙΡΗΣΕΩΝ ΔΙΑΧΕΙΡΙΣΗ
ΕΚΘΕΣΕΩΝ-ΕΚΔΗΛΩΣΕΩΝ ΔΙΑΧΕΙΡΙΣΗ
ΕΚΠΑΙΔΕΥΤΗΡΙΟΥ ΔΙΑΧΕΙΡΙΣΗ
ΕΚΤΕΛΩΝΙΣΤΕΣ
ΕΜΠΟΡΙΚΗ ΔΙΑΧΕΙΡΙΣΗ
ΕΡΓΟΣΤΑΣΙΟ ΑΥΤΟΚΙΝΗΤΩΝ
ΕΣΤΙΑΤΟΡΙΟΥ ΔΙΑΧΕΙΡΙΣΗ
ΗΛΕΚΤΡΟΝΙΚΟΥ ΕΡΓΑΣΤΗΡΙΟΥ ΔΙΑΧΕΙΡΙΣΗ
ΙΑΤΡΙΟ
ΚΑΒΑ
ΚΑΘΑΡΗΣΤΗΡΙΟΥ ΔΙΑΧΕΙΡΙΣΗ
ΚΑΥΣΙΜΩΝ ΠΡΑΤΗΡΙΟ ΔΙΑΧΕΙΡΙΣΗ
ΚΟΙΝΟΧΡΗΣΤΩΝ ΔΙΑΧΕΙΡΙΣΗ
ΚΟΜΜΩΤΗΡΙΟΥ ΔΙΑΧΕΙΡΙΣΗ
ΚΟΣΜΗΜΑΤΟΠΩΛΕΙΟΥ ΔΙΑΧΕΙΡΙΣΗ
ΚΤΗΜΑΤΟΜΕΣΙΤΕΣ ΔΙΑΧΕΙΡΙΣΗ
ΜΕΤΑΦΟΡΩΝ ΔΙΑΧΕΙΡΙΣΗ
ΜΟΥΣΙΚΗΣ ΣΤΟΥΝΤΙΟ ΔΙΑΧΕΙΡΙΣΗ
ΝΑΥΤΙΛΙΑΚΕΣ ΕΤΑΙΡΙΕΣ
ΞΕΝΟΔΟΧΕΙΟΥ ΔΙΑΧΕΙΡΙΣΗ
ΟΔΟΝΤΙΑΤΡΙΚΟ
ΟΠΤΙΚΩΝ ΕΙΔΩΝ ΔΙΑΧΕΙΡΙΣΗ
ΠΑΙΔΙΚΩΝ ΣΤΑΘΜΩΝ ΔΙΑΧΕΙΡΙΣΗ
ΠΕΤΡΕΛΑΙΟΕΙΔΩΝ ΔΙΑΧΕΙΡΙΣΗ
ΠΟΛΙΤΙΚΟΙ ΜΗΧΑΝΙΚΟΙ/ΤΟΠΟΓΡΑΦΟΙ/ΑΡΧΙΤΕΚΤΟΝΕΣ
ΠΟΛΙΤΕΥΤΕΣ/ΔΗΜΟΣΙΟΙ ΣΥΜΒΟΥΛΟΙ
ΠΟΛΥΚΑΤΑΣΤΗΜΑΤΟΣ ΣΥΣΤΗΜΑ
ΠΡΟΠΟ-ΛΟΤΤΟ ΣΤΟΙΧΗΜΑΤΩΝ
ΠΤΗΝΟΤΡΟΦΙΑ-ΚΤΗΝΟΤΡΟΦΙΑ
ΡΑΔΙΟΦΩΝΙΚΟΙ ΣΤΑΘΜΟΙ
ΣΥΛΛΟΓΩΝ ΔΙΑΧΕΙΡΙΣΗ
ΣΥΜΒΟΛΑΙΟΓΡΑΦΕΙΟΥ ΔΙΑΧΕΙΡΙΣΗ
ΣΥΝΕΡΓΕΙΩΝ ΑΥΤΟΚΙΝΗΤΩΝ ΔΙΑΧΕΙΡΙΣΗ
ΣΧΟΛΗΣ ΟΔΗΓΩΝ ΔΙΑΧΕΙΡΙΣΗ
ΤΑΧΥΔΡΟΜΙΚΟΥ ΤΑΜΙΕΥΤΗΡΙΟΥ ΣΥΣΤΗΜΑ
ΤΡΑΠΕΖΑΣ ΣΥΣΤΗΜΑ
ΤΡΟΦΙΜΩΝ ΔΙΑΧΕΙΡΙΣΗ
ΥΠΟΥΡΓΕΙΟ
ΦΑΡΜΑΚΕΙΟΥ ΔΙΑΧΕΙΡΙΣΗ
ΧΡΥΣΟΧΟΙΑΣ ΕΡΓΑΣΤΗΡΙΟΥ ΔΙΑΧΕΙΡΙΣΗ
ΩΔΕΙΟΥ ΔΙΑΧΕΙΡΙΣΗ

stmIth.SPECIFIC-DIVISION.doing

name::
* McsEngl.stmIth.SPECIFIC-DIVISION.doing@cptIt,

_SPECIFIC:
* decision-support-system#cptItsoft497.11#
* ELECTIONS#cptIt286#
* EXPERT SYSTEM
* funding#cptItsoft1007#
* INTERACTIVE-TELEVISION#cptIt293#
* JOB-SEARCH#cptIt398#
* transacting#cptItsoft51#
* transacting.money#cptItsoft98#
* ONLINE-INFORMATION-SERVICES-its#cptIt372#
===
* ΓΕΩΓΡΑΦΙΚΑ'ΠΛΗΡΟΦΟΡΙΑΚΑ'ΣΥΣΤΗΜΑΤΑ/GIS
* ΓΡΑΦΕΙΟΥ ΟΡΓΑΝΩΣΗ
* ΕΡΓΩΝ ΠΑΡΑΚΟΛΟΥΘΗΣΗ
* ΕΣΟΔΑ-ΕΞΟΔΑ
* ΛΟΓΙΣΤΙΚΑ
* ΜΙΣΘΟΔΟΣΙΑ
* ΟΙΚΟΝΟΜΙΚΗ ΑΝΑΛΥΣΗ & ΠΡΟΒΛΕΨΗ
* ΠΑΡΑΓΓΕΛΙΩΝ ΔΙΑΧΕΙΡΙΣΗ
* ΠΑΡΑΓΩΓΗΣ ΔΙΑΧΕΙΡΙΣΗ
* ΠΕΛΑΤΩΝ ΔΙΑΧΕΙΡΙΣΗ
* ΠΡΟΣΩΠΙΚΟΥ ΔΙΑΧΕΙΡΙΣΗ
* ΠΡΟΣΦΟΡΩΝ ΠΑΡΑΚΟΛΟΥΘΗΣΗ
* ΠΤΗΝΟΤΡΟΦΙΑ-ΚΤΗΝΟΤΡΟΦΙΑ
* ΠΩΛΗΣΕΩΝ ΔΙΑΧΕΙΡΙΣΗ
* ΣΥΝΔΡΟΜΩΝ ΔΙΑΧΕΙΡΙΣΗ

stmIth.control.DISTRIBUTED

name::
* McsEngl.stmIth.control.DISTRIBUTED@cptIt,
* McsEngl.stmIth.distributed@cptIt,
* McsEngl.distributed-system@cptIt,

resource

_ADDRESS.WPG:
* http://book.mixu.net/distsys// I wanted a text that would bring together the ideas behind many of the more recent distributed systems - systems such as Amazon's Dynamo, Google's BigTable and MapReduce, Apache's Hadoop and so on.

FvMcs.stmIth.doing.FUNDING

_CREATED: {2015-08-21}

name::
* McsEngl.conceptIt1007,
* McsEngl.stmIth.doing.FUNDING@cptIt,
* McsEngl.FvMcs.stmIth.doing.FUNDING@cptIt,
* McsEngl.digital-funding-system@cptIt1007,
* McsEngl.eFunding-system@cptIt1007,
* McsEngl.stmIth.funding@cptIt1007,

DEFINITION

_DESCRIPTION:
Digital-system to fund projects, startups, ...
[hmnSngo.2015-08-21]

stmIthFdg'GENERIC

_GENERIC:
* stmIth#cptItsoft180#

stmIthFdg'funding#ql:funding@cptEconomy#

name::
* McsEngl.stmIthFdg'funding@cptIt,

SPECIFIC

name::
* McsEngl.stmIthFdg.specific@cptIt,

stmIthFdg.BY-PEOPLE (crowdfunding)

name::
* McsEngl.stmIthFdg.BY-PEOPLE (crowdfunding)@cptIt,
* McsEngl.conceptIt1007.1,
* McsEngl.digital-crowdfunding-system@cptIt,

crowdfunding#ql:crowdfunding@cptEconomy#

pricing

SPECIFIC

_SPECIFIC:
* indigogo##

stmIthFdg.DonorsChoose.org

name::
* McsEngl.stmIthFdg.DonorsChoose.org@cptIt,

_DESCRIPTION:
Supporting teachers and students since 2000
DonorsChoose.org makes it easy for anyone to help a classroom in need. Public school teachers from every corner of America create classroom project requests, and you can give any amount to the project that inspires you.
1,779,859 supporters
598,133 projects funded
15,053,233 students reached
[http://www.donorschoose.org/]

stmIthFdg.FUNDING-CIRCLE {2010}

name::
* McsEngl.stmIthFdg.FUNDING-CIRCLE {2010}@cptIt,
* McsEngl.funding-circle@cptIt,

_DESCRIPTION:
Type    Ltd.
Founded    United Kingdom (2010)
Headquarters  London, England, UK
Area served    UK, USA
Products    Financial Services
Website    www.fundingcircle.com
Funding Circle is a peer-to-peer lending service which allows savers to lend money directly to small and medium sized businesses.[1] Funding Circle was the first site to use the process of peer-to-peer lending for business funding in the UK,[2] and now operates in both the UK and US markets. As of April 2015, Funding Circle has facilitated over £750 million in loans to small and medium sized firms.[3]
[https://en.wikipedia.org/wiki/Funding_Circle]

stmIthFdg.LENDING (crowdlending)

name::
* McsEngl.stmIthFdg.LENDING (crowdlending)@cptIt,
* McsEngl.conceptIt1007.2,
* McsEngl.crowdlending-system@cptIt1007.2,
* McsEngl.p2p-lending-system@cptIt1007.2,
* McsEngl.peer-to-peer-lending-system@cptIt1007.2,
* McsEngl.p2pl-system@cptIt1007.2,

_DESCRIPTION:
Peer-to-peer lending, abbreviated P2PL, is the practice of lending money to unrelated individuals, or "peers", without going through a traditional financial intermediary such as a bank or other traditional financial institution. P2PL is not to be confused with peer to peer investing (P2PI). This lending takes place online on peer-to-peer lending companies' websites using various different lending platforms and credit checking tools. Many also use the abbreviation "P2P" when discussing the peer-to-peer lending or investing industries more generally. Peer-to-peer lending is also known as crowdlending.
[https://en.wikipedia.org/wiki/Peer-to-peer_lending]

pricing

SPECIFIC

_SPECIFIC:
* DirectMoney
* Energy in Common (EIC)
* funding-circle##
* Kiva Microfunds
* zoho##

stmIthFdg.INDIEGOGO

name::
* McsEngl.stmIthFdg.INDIEGOGO@cptIt,
* McsEngl.crowdfunding.INDIEGOGO@cptIt,
* McsEngl.indiegogo@cptEconomy,
* McsEngl.indiegogo-stmIthFdg@cptEconomy,
* McsEngl.indiegogostm@cptEconomy,

_GENERIC:
* stmIthFdg.people##

_DESCRIPTION:
Indiegogo is a way for people all over the world to join forces to make ideas happen. Since 2008, millions of contributors have empowered hundreds of thousands of inventors, musicians, do-gooders, filmmakers—and other game-changers—to bring big dreams to life.
[https://www.indiegogo.com/about/our-story]

indiegogostm'pricing

name::
* McsEngl.indiegogostm'pricing@cptIt,

_DESCRIPTION:
It is free to sign up, to create a campaign, and to contribute to a campaign. When your campaign raises funds, Indiegogo charges a 5% fee on the funds you raise.
[https://support.indiegogo.com/hc/en-us/articles/204456408-Fees-Pricing]

FvMcs.stmIth.doing.JOB-SEARCH

name::
* McsEngl.conceptIt398,
* McsEngl.stmIth.doing.JOB-SEARCH@cptIt,
* McsEngl.FvMcs.stmIth.doing.JOB-SEARCH@cptIt,
* McsEngl.JOB-SEARCH-its@cptIt,
* McsEngl.its.jobsearch@cptIt398,
* McsElln.ΕΥΡΕΣΗ-ΕΡΓΑΣΙΑΣ-ΠΛΗΡΟΦΟΡΙΑΚΟ-ΣΥΣΤΗΜΑ@cptIt,
* McsElln.ΕΥΡΕΣΗΣ-ΕΡΓΑΣΙΑΣ-ΣΠΤ@cptIt,

GENERIC

_GENERIC:
* entity.whole.system.it_human#cptItsoft180#

SPECIFIC

Specific_concepts (level 3) =

TOUCH ILLINOIS

ΑΠΟ ΤΟΝ ΠΕΡΑΣΜΕΝΟ ΟΚΤΩΒΡΙΟ (1993) ΣΤΟ ΓΡΑΦΕΙΟ ΕΥΡΕΣΕΩΣ ΕΡΓΑΣΙΑΣ ΤΟΥ ΑΡΛΙΝΓΚΤΟΝ ΧΑΙΤΣ ΣΤΟ ΙΛΙΝΟΙ ΤΩΝ ΗΠΑ ΥΠΑΡΧΟΥΝ 12 ΜΗΧΑΝΗΜΑΤΑ ΠΟΥ ΟΙ ΑΝΕΡΓΟΙ ΣΕ ΟΘΟΝΕΣ ΕΠΑΦΗΣ ΨΑΧΝΟΥΝ ΜΟΝΟΙ ΤΟΥΣ ΒΑΣΕΙΣ ΔΕΔΟΜΕΝΩΝ ΜΕ ΠΡΟΣΦΟΡΑ ΕΡΓΑΣΙΑΣ.
[ΚΑΘΗΜΕΡΙΝΗ, 9 ΙΑΝΟ 1993]

FvMcs.stmIth.doing.OFFICE-AUTOMATION

name::
* McsEngl.conceptIt311,
* McsEngl.stmIth.doing.OFFICE-AUTOMATION@cptIt,
* McsEngl.FvMcs.stmIth.doing.OFFICE-AUTOMATION@cptIt,
* McsEngl.OFFICE-AUTOMATION@cptIt,
* McsEngl.office'automation@cptIt311,
* McsEngl.sysItBusiness.OFFICE-AUTOMATION@cptIt,
* McsElln.ΑΥΤΟΜΑΤΙΣΜΟΣ-ΓΡΑΦΕΙΟΥ@cptIt,

GENERIC

_GENERIC:
* entity.whole.system.it_human#cptItsoft180#

FAILURES

XEROX.
ΕΧΕΙ ΗΔΗ ΔΟΚΙΜΑΣΕΙ ΣΤΙΣ ΔΕΚΑΕΤΙΕΣ ΤΟΥ 1960 ΚΑΙ 1970

WANG LABORATORIES.
ΠΡΟΣΠΑΘΗΣΕ ΝΑ ΚΑΤΑΡΓΗΣΕΙ ΤΙΣ ΕΓΓΡΑΦΕΣ ΔΙΑΔΙΚΑΣΙΕΣ. ΧΡΕΩΚΟΠΗΣΕ.

IBM.

EXXON.
TO 1984 ΠΟΥΛΗΣΕ ΤΗ ΘΥΓΑΤΡΙΚΗ ΤΗΣ ΠΟΥ ΗΤΑΝ ΕΞΕΙΔΙΚΕΥΜΕΝΗ, ΕΝΩ ΕΙΧΑΝ ΕΠΕΝΔΥΘΕΙ 2 ΔΙΣ ΔΟΛ.
[ΚΑΘΗΜΕΡΙΝΗ, 13 ΙΟΥΝ 1993, 54]

FvMcs.stmIth.doing.PUBLIC-EXPENSES

name::
* McsEngl.conceptIt483,
* McsEngl.stmIth.doing.PUBLIC-EXPENSES@cptIt,
* McsEngl.FvMcs.stmIth.doing.PUBLIC-EXPENSES@cptIt,
* McsEngl.its.public'expenses@cptIt483,
* McsEngl.public-expenses-its@cptIt,
* McsElln.ΔΗΜΟΣΙΩΝ-ΕΞΟΔΩΝ-ΣΠΤ@cptIt,

SPECIFIC

EU vvv

SIMAR

COMPANY: intrasoft

PRICE: 600 εκ. δρχ.

FvMcs.stmIth.doing.SOCIAL_NETWORKING-(stmIthSnt)

_CREATED: {2015-08-22}

name::
* McsEngl.conceptIt1008,
* McsEngl.digital-social-networking@cptIt1008,
* McsEngl.social-network-stmIth@cptIt1008,
* McsEngl.social-networking-stmIth@cptIt1008,
* McsEngl.stmIth.social-network@cptIt,
* McsEngl.stmIth.social-networking@cptIt,
* McsEngl.stmIthSnt@cptIt,

stmIthSnt'DEFINITION

_DESCRIPTION:
Any systemIth that connects CITIZENS.
[hmnSngo.2015-08-23]

stmIthSnt'GENERIC

_GENERIC:
* entity.whole.system.it_human#cptItsoft180#

stmIthSnt'human (member)

name::
* McsEngl.stmIthSnt'human (member)@cptIt,

stmIthSnt'organization

name::
* McsEngl.stmIthSnt'organization@cptIt,

stmIthSnt'systemIt

name::
* McsEngl.stmIthSnt'systemIt@cptIt,

stmIthSnt'website

name::
* McsEngl.stmIthSnt'website@cptIt,

SPECIFIC

name::
* McsEngl.stmIthSnt.specific@cptIt,

_SPECIFIC:
*

stmIthSnt.administering.DISTRIBUTED

_CREATED: {2015-08-27}

name::
* McsEngl.stmIthSnt.administering.DISTRIBUTED@cptIt,
* McsEngl.digital-distributed-social-network@cptIt,

stmIthSnt.administering.DISTRIBUTED.NO

_CREATED: {2015-08-27}

name::
* McsEngl.stmIthSnt.administering.DISTRIBUTED.NO@cptIt,
* McsEngl.digital-centralized-social-network@cptIt,

stmIthSnt.FLUX

name::
* McsEngl.stmIthSnt.FLUX@cptIt,
* McsEngl.Flux-Movement@cptIt,

_DESCRIPTION:
The Flux Movement is a global political movement aiming to bring in Issue Based Direct Democracy (IBDD) over the top of Representative Democracy. IBDD is unlike any other democratic system because it biases objectively true knowledge, instead of measuring majoritarian preference. This will result in faster, better decision-making, a higher quality of life for citizens, better social and economic policies, etc.
Practically this means Flux is a gateway for voters to participate directly in Parliament or Congress, paving the way to democracy without authority. Elected Flux Representatives and Senators give up their autonomy and use their votes in line with the outcomes produced by the Flux ecosystem; an ecosystem comprised of ordinary people like you.
[http://demo.xo1.io/index.html]

stmIthSnt.AVAAZ {2007}

_CREATED: {2015-08-22}

name::
* McsEngl.stmIthSnt.AVAAZ {2007}@cptIt,
* McsEngl.conceptIt1008.1,
* McsEngl.avaaz@cptIt1008.1,

_GENERIC:
* global campaigning organisation,

_DESCRIPTION:
Founded  2007
Focus  Progressive NGO
Location  international
Origins  New York
Area served  Worldwide
Method  Petition, demonstrations, supporting independent press in conflict areas
Members  41,591,438+
Key people
 Ricken Patel (ED), 100+ employees and several freelancers
Website  www.avaaz.org
Avaaz is a global civic organization launched in January 2007 that promotes activism on issues such as climate change, human rights, animal rights, corruption, poverty, and conflict; it works to "close the gap between the world we have and the world most people everywhere want."[1] The organization operates in 15 languages and claims over thirty million members in 194 countries,[1] and The Guardian considers it "the globe's largest and most powerful online activist network".[2]
[https://en.wikipedia.org/wiki/Avaaz]

stmIthSnt.FACEBOOK {2004}

name::
* McsEngl.stmIthSnt.FACEBOOK {2004}@cptIt,
* McsEngl.conceptCore372.1,
* McsEngl.facebook@cptCore372.1,

_GENERIC:
* website-netHmn#cptCore372.2#

Facebook-inc#cptItorg1700#

member#cptCore401#

{time.2012}:
Ειρήνη Βενιού
Ένα δισεκατομμύριο χρήστες σε μια μέρα για το Facebook
Την περασμένη Δευτέρα «ένας στους επτά ανθρώπους στον πλανήτη» μπήκε στην ιστοσελίδα κοινωνικής δικτύωσης
ΔΗΜΟΣΙΕΥΣΗ: 2015-08-28 13:56
«Κόκκινο» χτύπησαν οι μετρήσεις της Facebook την περασμένη Δευτέρα, καθώς κατά τη διάρκεια της μέρας φαίνεται ότι χρησιμοποίησαν το «μπλε» μέσο κοινωνικής δικτύωσης περίπου ένα δισεκατομμύριο χρήστες. Σύμφωνα με post του ιδρυτή της δημοφιλούς ιστοσελίδας κοινωνικής δικτύωσης, Μαρκ Ζάκερμπεργκ, «ένας στους επτά ανθρώπους στον πλανήτη χρησιμοποίησαν το Facebook για να συνδεθούν με φίλους και συγγενείς τους».
Το Facebook καταμετρά περί το 1,5 δισ. χρήστες, οι οποίοι βάσει των κινήσεών τους φαίνεται ότι χρησιμοποιούν το εν λόγω δίκτυο τουλάχιστον μια φορά τον μήνα. Ωστόσο, την περασμένη Δευτέρα καταγράφηκε η χρήση του από ένα δισεκατομμύριο εγγεγραμμένα μέλη μέσα σε μόλις μια μέρα.
Ο σημερινός κολοσσός του Διαδικτύου, «γεννήθηκε» στις 4 Φεβρουαρίου του 2004 από τον Ζάκερμπεργκ και άλλους τέσσερις συμφοιτητές του από το Πανεπιστήμιο Χάρβαρντ. Λίγα χρόνια αργότερα και συγκεκριμένα, τον Οκτώβριο του 2012 το Facebook απέκτησε τον δισεκατομμυριοστό του χρήστη.
«Είναι η πρώτη φορά που αγγίζουμε το “ορόσημο” του ενός δισεκατομμυρίου ημερήσιων χρηστών. Πρόκειται μόνο για το ξεκίνημα της διασύνδεσης ολόκληρου του πλανήτη» έγραψε στο προφίλ του ο Ζάκερμπεργκ, ποστάροντας παράλληλα ένα βίντεο που εξιστορεί την πορεία του μέσου κοινωνικής δικτύωσης που οδήγησε στην επανάσταση της διαδικτυακής επικοινωνίας.
[http://www.tovima.gr/science/technology-planet/article/?aid=732710]

{time.2012}:
=== Human:
τον Οκτώβριο του 2012 το Facebook απέκτησε τον δισεκατομμυριοστό του χρήστη.
[http://www.tovima.gr/science/technology-planet/article/?aid=732710]
===
Το πρώτο τρίμηνο του 2012 οι χρήστες του Facebook ξεπέρασαν τα 900 εκατομμύρια σε ολόκληρο τον κόσμο.
[http://www.tovima.gr/finance/article/?aid=456033&h1=true]

{time.2004-02-04}:
=== creation:
Ο σημερινός κολοσσός του Διαδικτύου, «γεννήθηκε» στις 4 Φεβρουαρίου του 2004 από τον Ζάκερμπεργκ και άλλους τέσσερις συμφοιτητές του από το Πανεπιστήμιο Χάρβαρντ.
[http://www.tovima.gr/science/technology-planet/article/?aid=732710]

Personal-data

Το facebook δεν σέβεται κανέναν νόμο
Ο αυστριακός φοιτητής Νομικής πήρε δικαστικώς όλα τα προσωπικά του στοιχεία
ΔΗΜΟΣΙΕΥΣΗ: 2012-11-04, 05:45

Ο Μαξ Σρεμς με τις πάνω από 1.200 σελίδες με προσωπικά στοιχεία του που κατάφερε να αποσπάσει δικαστικά από το Facedook

Είναι ο πιο ενοχλητικός χρήστης του Facebook στον πλανήτη. Ο Μαξ Σρεμς, ένας 25χρονος φοιτητής Νομικής από την Αυστρία, κάνει τα πιο επίμονα και φορτικά «poke» (ψηφιακά «σκουντήματα», δηλαδή ένα είδος ηλεκτρονικής ειδοποίησης χρήστη προς χρήστη στη γλώσσα του δημοφιλούς κοινωνικού δικτύου) στην πλάτη του δισεκατομμυριούχου ιδρυτή του Facebook Μαρκ Ζούκερμπεργκ. Και μιλάει στο «Βήμα» για το πώς κατάφερε να «γονατίσει» δικαστικά το δίκτυο του ενός δισεκατομμυρίου ανθρώπων και τις αμφιλεγόμενες πρακτικές του που «παραβιάζουν την ιδιωτικότητα» και «δεν σέβονται κανέναν νόμο».

Τα «πήρε στο κρανίο». Ενιωσε θιγμένος σαν να παίζει στην ταινία «Οι ζωές των άλλων», όπου η καθημερινότητά του καταγράφεται βήμα προς βήμα από μια αόρατη σύγχρονη «Στάζι». «Το Facebook γνωρίζει πολλά πράγματα για εμάς, ως αποτέλεσμα των όσων έχουμε πει, φανερά ή κρυφά, με τους φίλους μας. Οσο περισσότερα έχετε μοιραστεί τόσα στοιχεία έχει το Facebook "εναντίον" σας, ειδικά αν στις συνομιλίες σας αναφέρεστε στον σεξουαλικό σας προσανατολισμό, στα πολιτικά σας πιστεύω ή στις επαγγελματικές σας επαφές» μας λέει ο Σρεμς.
Για τον λόγο αυτό έφτιαξε μια ιστοσελίδα με τον «πολεμικό» τίτλο «Europe vs Facebook» (Ευρώπη εναντίον Facebook). Περισσότεροι από 45.000 χρήστες έχουν ήδη ανταποκριθεί, απαιτώντας από το ευρωπαϊκό αρχηγείο του Facebook στην Ιρλανδία όλα, μα όλα, τα προσωπικά τους αρχεία: παλαιά και νέα, σβησμένα και εμφανή, αόρατα και ορατά.

«Οταν κάποιος φτιάχνει λογαριασμό στο Facebook συναινεί στην αποδοχή κάποιων απίστευτα περίπλοκων κανονισμών. Κάθησα ο ίδιος προσωπικά μαζί με μια ομάδα δικηγόρων και πάλι δεν καταφέραμε να βγάλουμε άκρη σε αυτόν τον λαβύρινθο. Οι κανονισμοί πρέπει να είναι ξεκάθαροι ώστε μετά το κάθε Facebook να μην πουλάει, εν αγνοία μας, τη ζωή μας σε εταιρείες και ανθρώπους» τονίζει ο 25χρονος.

«Κατ' αρχάς, αν απενεργοποιήσετε τον λογαριασμό σας δεν καταφέρνετε απολύτως τίποτα, αφού και πάλι όσα έχετε γράψει υπάρχουν στα αρχεία του Facebook. Το βήμα στο οποίο πρέπει να προχωρήσετε είναι να κάνετε οριστική διαγραφή του λογαριασμού σας. Και τότε όμως το Facebook έχει το δικαίωμα να κρατήσει κάποια "δεδομένα", χωρίς να τα συγκεκριμενοποιεί και χωρίς τη συγκατάθεσή σας. Το Facebook δεν σέβεται κανέναν νόμο» επισημαίνει ο Σρεμς.

«Η μεγαλύτερη απάτη κατ' εμέ είναι εκείνο το κουμπί Opt-Out: όταν κάποιος βάζει ένα νέο προϊόν, υπηρεσία ή εφαρμογή στο σύστημα, το Facebook ενεργοποιεί αυτόματα όλους τους χρήστες του να το αποδεχτούν, χωρίς να τους ρωτήσει πρώτα. Είναι πολύ δύσκολος ο εντοπισμός των κουμπιών αυτών και η απενεργοποίησή τους από τον χρήστη. Κάποιος που δεν είναι απόλυτα εξοικειωμένος με την τεχνολογία δεν έχει τρόπο να προστατευτεί» συμπληρώνει.

«Ελπίζω ότι η πρωτοβουλία μας δεν θα έχει αντίκτυπο μόνο στο μέλλον του Facebook, αλλά σε όλο το Διαδίκτυο, σχετικά με ζητήματα ιδιωτικότητας και σεβασμού των χρηστών του» λέει ο αυστριακός «επαναστάτης» του Διαδικτύου, που ωστόσο είναι σαφής: «Είμαι παιδί της γενιάς του Internet και δεν θέλω να αποκοπώ από αυτό, απλώς θέλω να ανακτήσω ξανά την εμπιστοσύνη μου στο Διαδίκτυο. Πρέπει ο κάθε χρήστης να μάθει ποια είναι η διαφορά ανάμεσα στην έννοια "κοινωνική δικτύωση", που είναι κάτι σπουδαίο, και το Facebook, μια εταιρεία που διατηρεί μονοπωλιακά το δικαίωμά μας σε αυτού του είδους την κοινωνική επικοινωνία».

Τι θα έλεγε στον Ζούκερμπεργκ αν ποτέ τον συναντούσε; «Θα του έλεγα πως πρέπει να μάθει να σέβεται τους νόμους που ισχύουν εκτός ΗΠΑ, στα κράτη απ' όπου βγάζει τα εκατομμύριά του, ειδικά στην Ευρώπη» μας απαντά.

Ιρλανδική Δικαιοσύνη
Ο αγώνας τώρα δικαιώνεται
Ο δικαστικός αγώνας του Σρεμς μόλις απέδωσε τους πρώτους του καρπούς. Πριν από λίγες ημέρες η ιρλανδική Δικαιοσύνη (η έδρα του Facebook στη Γηραιά Ηπειρο βρίσκεται στο Δουβλίνο) εξανάγκασε το ευρωπαϊκό τμήμα του Facebook μεταξύ άλλων:

να παρέχει στους ευρωπαίους χρήστες όλα τα αρχεία τους, ακόμη και όσα έχουν διαγραφεί,
να δυσχεραίνει την εκμετάλλευσή τους από τεράστια οικονομικά συμφέροντα,
να τους επιτρέπει να κλείνουν οριστικά τον λογαριασμό τους,
να μη διευκολύνει τη διάδοση εκατομμυρίων προσωπικών δεδομένων (μέσω λογαριασμών τρίτων),
να προφυλάσσει την ιδιωτικότητα στην Ευρώπη.

Οι ευρωπαίοι χρήστες πλέον δεν θα βλέπουν αυτόματα πάνω στις φωτογραφίες τους τα ονόματά τους (το λεγόμενο «tag» - ετικετοποίηση) αποφεύγοντας ανεπιθύμητη έκθεση προσωπικών δεδομένων και στιγμών. Ωστόσο εκατομμύρια άλλοι χρήστες εκτός Ευρώπης θα εξακολουθήσουν να υφίστανται αυτή την ενίοτε δυσάρεστη ταυτοποίηση.

Προσωπικά
Οικονομική εκμετάλλευση
Δέκα από τα πιο δημοφιλή «applications» για παιχνίδια στο Facebook αποκαλύπτουν προσωπικά δεδομένα (ηλικία, κατοικία, επάγγελμα, χόμπι κτλ.) σε τουλάχιστον 25 διαφημιστικές εταιρείες. Αυτές παρακολουθούν τις μουσικές ή ενδυματολογικές προτιμήσεις των χρηστών και τους βομβαρδίζουν με διαφημίσεις αντίστοιχων προϊόντων.

Ανήλικοι κάτω των 13
Οι όροι χρήσης αναφέρουν ως ελάχιστο όριο ηλικίας τα 13 έτη. Ομως ένα στα πέντε παιδιά 9 ως 12 ετών στην Ευρώπη διαθέτει προσωπικό προφίλ, συχνότατα με ψεύτικα στοιχεία. Ετοιμάζεται μια ψηφιακή «εργαλειοθήκη» προσιτή στους γονείς που επιθυμούν να επιτρέψουν στα κάτω των 13 ετών παιδιά τους να αποκτήσουν λογαριασμό.

Σεξουαλικά αδικήματα
Στο Facebook ανθούν τα σεξουαλικά αδικήματα και η σωματεμπορία. Πρόσφατη είναι η απαγωγή ενός 14χρονου κοριτσιού στην Ινδονησία από έναν 24χρονο τον οποίο γνώρισε μέσω Facebook. Συμφώνησαν να συναντηθούν, το κορίτσι απήχθη, κλειδώθηκε σε ένα δωμάτιο επί μία εβδομάδα και βιάστηκε επανειλημμένως.

Φωτογραφίες-«ρουφιάνοι»
Από τις 15 Οκτωβρίου το Facebook σταμάτησε (αλλά μόνο στην Ευρώπη) τη χρήση λογισμικού αναγνώρισης προσώπων (tag) στις φωτογραφίες που θα αναρτώνται εφεξής. Η εφαρμογή αναγνώριζε αυτόματα ονόματα και πρόσωπα χρηστών και τα συσχέτιζε με άλλα σημεία μέσα στον ιστότοπο, παραβιάζοντας την ιδιωτικότητά τους.
[http://www.tovima.gr/world/article/?aid=482366]

stmIthSnt.GLOBAL-CITIZEN

_CREATED: {2015-08-22}

name::
* McsEngl.stmIthSnt.GLOBAL-CITIZEN@cptIt,
* McsEngl.global-citizen@cptIt,

_DESCRIPTION:
Global Citizen is a community of people like you. People who want to learn about and take action on the world’s biggest challenges—and use their power to get other people involved too.

We bring you stories and actions that make a difference. That help fight extreme poverty and inequality around the world, and support approaches that will make life more sustainable for people and the planet.

Unlock your power. Join us.
[https://www.globalcitizen.org/en/about/who-we-are/]

stmIthSnt.POLITICAL-PARTY

name::
* McsEngl.stmIthSnt.POLITICAL-PARTY@cptIt,
* McsEngl.conceptIt1008.3,

party#cptCore812.1#

stmIthSnt.SOCIAL-MOVEMENT

_CREATED: {2015-08-22}

name::
* McsEngl.stmIthSnt.SOCIAL-MOVEMENT@cptIt,
* McsEngl.online-social-movement@cptIt,

_DESCRIPTION:
Online communities build off social movements, enabling the connection of persons worldwide to develop a base and gain awareness to the cause.
[https://en.wikipedia.org/wiki/Online_social_movement]

stmIthSnt.TWITTER

_CREATED: {2013-11-11}

name::
* McsEngl.stmIthSnt.TWITTER@cptIt,
* McsEngl.conceptIt1008.2,
* McsEngl.twitter@cptIt,
* McsEngl.the-sms-of-the-internet@cptIt,

_ADDRESS.WPG:
* https://twitter.com/

_GENERIC:
* website-netHmn#cptCore372.2#

twitter'account

name::
* McsEngl.twitter'account@cptIt,
* McsEngl.twitter'username@cptIt,

_ADDRESS.WPG:
* https://twitter.com/username,

_QUANTITY:
304.000.000 {2015.04}

twitter'hastag

name::
* McsEngl.twitter'hastag@cptIt,
* McsEngl.twitter'heading@cptIt,
* McsEngl.twitter'topic@cptIt,
* McsEngl.twitter'title@cptIt,

_DESCRIPTION:
Definition: The# symbol, called a hashtag, is used to mark keywords or topics in a Tweet. It was created organically by Twitter users as a way to categorize messages.
Using hashtags to categorize Tweets by keyword:
People use the hashtag symbol# before a relevant keyword or phrase (no spaces) in their Tweet to categorize those Tweets and help them show more easily in Twitter Search.
Clicking on a hashtagged word in any message shows you all other Tweets marked with that keyword.
Hashtags can occur anywhere in the Tweet – at the beginning, middle, or end.
Hashtagged words that become very popular are often Trending Topics.

Example: In the Tweet below, @eddie included the hashtag#FF. Users created this as shorthand for "Follow Friday," a weekly tradition where users recommend people that others should follow on Twitter. You'll see this on Fridays.

Using hashtags correctly:
If you Tweet with a hashtag on a public account, anyone who does a search for that hashtag may find your Tweet
Don't#spam#with#hashtags. Don't over-tag a single Tweet. (Best practices recommend using no more than 2 hashtags per Tweet.)
Use hashtags only on Tweets relevant to the topic.
[https://support.twitter.com/articles/49309-using-hashtags-on-twitter#]

_ADDRESS.WPG:
_SPECIFIC:
* https://twitter.com/hashtag/name,
#ThisIsACoup, 2015-07-12,
#greekment: greek bailout3 2015-07-13,
#https://twitter.com/hashtag/inequality?src=hash:

How Influential Have Hashtags Become on Twitter?
Inbox
x

wiseGEEK <learn@wisegeeknewsletter.com> Unsubscribe
11:01 AM (28 minutes ago)

to me
125 million hashtags are shared each day on Twitter, 10 years after they
were first used on the social media site.

Twitter has traced the birth of the term “hashtag” to August 2007,
during the early days of the social networking service. On 23 August 2007,
Chris Messina -- officially the 1,186th user on Twitter -- tweeted "How do
you feel about using# (pound) for groups. As in#barcamp [msg]?" He
thought that the pound or hash symbol (#) would be useful in organizing
group conversations about related tweets. He also suggested that Twitter
co-founders Jack Dorsey and Biz Stone consider adopting the practice. Stone
sarcastically responded: “Sure, we'll get right on that.” Now, 10 years
later, the lowly symbol that used to indicate a number (as in#2 pencil)
has become a social media staple. About 125 million hashtags are used by
Twitter's 328 million users every day.
Read More: http://www.wisegeek.com/how-influential-have-hashtags-become-on-twitter.htm?m {2017-08-30}

twitter'timeline

name::
* McsEngl.twitter'timeline@cptIt,

twitter'tweet

name::
* McsEngl.twitter'tweet@cptIt,
* McsEngl.twitter'message@cptIt,

tweet'character

name::
* McsEngl.tweet'character@cptIt,

140 characters

twitter'mention

name::
* McsEngl.twitter'mention@cptIt,

_DESCRIPTION:
What is a mention?
A mention is a Tweet that contains another user’s @username anywhere in the body of the Tweet. (Yes, this means that replies are also considered mentions.)
We collect these messages, as well as all your replies, in your Notifications tab.
If you include multiple @usernames in your Tweet, all of those people will see your Tweet in their Notifications tab.
[https://support.twitter.com/articles/14023-what-are-replies-and-mentions#]

To post a mention on Twitter:
1. Type your Tweet as you normally would, but replace any names you include with that person's @username. For example: "I love @Twitter!"
2. Click Tweet to post it.
3. Our system will recognize and link to the @username in the Tweet.
[https://support.twitter.com/articles/20169871-how-to-post-replies-and-mentions#]

twitter'reply

name::
* McsEngl.twitter'reply@cptIt,

_DESCRIPTION:
What is a reply?
A reply is a response to another user's Tweet that begins with the @username of the person you're replying to. You can reply by clicking the Reply button on a Tweet.
Any Tweet that is a reply to you begins with your @username and will show up in your Notifications tab.
When a Tweet starts with a @username, the only users who will see it in their timeline (other than the sender and the recipient) are those who follow both the sender and the recipient.
[https://support.twitter.com/articles/14023-what-are-replies-and-mentions#]

To post a reply on Twitter:
Find the Tweet you want to reply to.
Click the reply icon located at the bottom of the Tweet.
A Tweet box will pop up with the @username of the account you are replying to added at the beginning of the Tweet. Complete your reply and click Tweet to post it.
[https://support.twitter.com/articles/20169871-how-to-post-replies-and-mentions#]

twitter.QUANTITY

name::
* McsEngl.twitter.QUANTITY@cptIt,

How Many Words Are Tweeted Each Day?
Approximately 3 billion words are tweeted each day -- enough to fill 5,300 copies of Ayn Rand's novel "Atlas Shrugged."

According to Twitter, around 500 million tweets were sent each day in
August 2015. The average tweet has been estimated to be between 40 and 60
characters in length, even though Twitter allows for a maximum of 140
characters. Assuming that the average tweet contains six words, that would
mean that about 3 billion words are sent out on Twitter every day --
equivalent to more than 5,300 copies of Ayn Rand's novel Atlas Shrugged.
Read More: http://www.wisegeek.com/how-many-words-are-tweeted-each-day.htm?m, {2015-12-11}

twitter'Terms-of-service

name::
* McsEngl.twitter'Terms-of-service@cptIt,

_ADDRESS.WPG:
* https://twitter.com/en/tos, ({2017-10-02} last effective)

stmIthSnt.WEBSITE

_CREATED: {2013-11-11}

name::
* McsEngl.stmIthSnt.WEBSITE@cptIt,
* McsEngl.conceptCore372.2,
* McsEngl.website-netHmn@cptIt,
* McsEngl.website-human-network@cptIt,
* McsEngl.netHmnWst@cptIt,

_GENERIC:
* website#cptItsoft19.6#

_DESCRIPTION:
It is a website with registered users which communicate.
[hmnSngo.2013-11-11]

SPECIFIC

FvMcs.stmIth.doing.TAX-COLLECTION

name::
* McsEngl.conceptIt218,
* McsEngl.stmIth.doing.TAX-COLLECTION@cptIt,
* McsEngl.FvMcs.stmIth.doing.TAX-COLLECTION@cptIt,
* McsEngl.its-ΕΦΟΡΙΑΣ@cptIt,
* McsEngl.its.ΕΦΟΡΙΑΣ@cptIt218,
* McsElln.ΕΦΟΡΙΑΣ-ΣΠΤ@cptIt,
* McsElln.ΠΛΗΡΟΦΟΡΙΑΚΟ-ΣΥΣΤΗΜΑ-ΕΦΟΡΙΩΝ@cptIt,
* McsElln.ΠΛΗΡΟΦΟΡΙΑΚΟ-ΣΥΣΤΗΜΑ-ΦΟΡΟΛΟΓΙΑΣ@cptIt,
* McsElln.ΠΛΗΡΟΦΟΡΙΚΟ-ΦΟΡΟΛΟΓΙΚΟ-ΣΥΣΤΗΜΑ@cptIt,

GENERIC

_GENERIC:
* entity.whole.system.it_human#cptItsoft180#

ognCompany#cptEconomy7#

Doing#cptCore475#

ΕΛΕΓΧΟΣ ΕΤΑΙΡΙΩΝ

Greece#cptCore18#

Το σύστημα ελέγχου 'ESCORT' της ΔΑΝΙΑΣ, που θα χρησιμοποιήσει και η ΒΡΕΤΑΝΙΑ, θα χρησιμοποιήσει μέχρι τέλους του 1994 η ΕΛΛΑΔΑ. Λειτουργεί σε φορητά κομπιουτερ.
[ΚΑΘΗΜΕΡΙΝΗ, 11 ΔΕΚ. 1994, 49]

ΜΗΤΡΩΟ ΦΟΡΟΛΟΓΟΥΜΕΝΩΝ

ΦΠΑ

ΦΟΡΟΛΟΓΙΑ ΦΥΣΙΚΩΝ ΚΑΙ ΝΟΜΙΚΩΝ ΠΡΟΣΩΠΩΝ

ΦΟΡΟΛΟΓΙΑ ΚΕΦΑΛΑΙΟΥ

ΠΑΡΑΚΟΛΟΥΘΗΣΗ ΟΦΕΙΛΕΤΩΝ

ΕΣΟΔΑ ΕΞΟΔΑ ΔΟΥ

ΔΙΑΣΤΑΥΡΩΣΗ ΠΛΗΡΟΦΟΡΙΩΝ ΚΑΙ ΦΟΡΟΛΟΓΙΚΗ ΕΙΚΟΝΑ ΦΟΡΟΛΟΓΟΥΜΕΝΟΥ

ORGANIZATION WHO USES THE SYSTEM

PRICE#cptEconomy541.44#

SCHEDULE

ΔΙΑΓΩΝΙΣΜΟΣ
Α'ΦΑΣΗ
ΕΡΓΑΣΙΕΣ
ΕΤΑΙΡΙΑ
ΚΟΣΤΟΣ
ΠΛΗΘΟΣ ΕΦΟΡΙΩΝ
Β'ΦΑΣΗ

ΟΛΟΚΛΗΡΩΜΕΝΟ ΠΛΗΡΟΦΟΡΙΚΟ ΦΟΡΟΛΟΓΙΚΟ ΣΥΣΤΗΜΑ

SPECIFIC

Specific_concepts (level 3) =

ΣΥΣΤΗΜΑ ΕΛΛΑΔΑΣ

ΧΡΟΝΟΔΙΑΓΡΑΜΜΑ:
1978-1980:  ΕΙΧΕ ΕΙΣΑΧΘΕΙ ΣΑΝ ΥΨΗΛΗ ΠΡΟΤΕΡΑΙΟΤΗΤΑ.
1991 ΑΥΓΟ:  ΔΙΑΓΩΝΙΣΜΟΣ.
1993 ΑΠΡΙ:  ΥΠΟΓΡΑΦΗ ΟΡΙΣΤΙΚΗΣ ΣΥΜΒΑΣΗΣ.
1993 ΝΟΕΜ:  ΠΑΡΑΔΟΣΗ ΤΟΥ ΣΤΡΑΤΗΓΙΚΟΥ ΣΧΕΔΙΟΥ.

Α' ΦΑΣΗ
* ΕΡΓΑΣΙΕΣ:
14 ΕΚΑΤΟΜΥΡΙΑ ΕΓΓΡΑΦΕΣ
300 ΠΡΟΓΡΑΜΜΑΤΑ
1050 ΘΕΣΕΙΣ ΕΡΓΑΣΙΑΣ
79 ΛΕΙΤΟΥΡΓΙΕΣ
14000 ΔΟΚΙΜΕΣ ΣΕΝΑΡΙΩΝ
* ΕΤΑΙΡΙΑ:
IBM
* ΚΟΣΤΟΣ:
3,5 ΔΙΣ
* ΠΛΗΘΟΣ ΕΦΟΡΙΩΝ:
115 ΣΤΙΣ 133 ΜΗΧΑΝΟΓΡΑΦΗΘΗΚΑΝ ΠΛΗΡΩΣ.

ΟΛΟΚΛΗΡΩΜΕΝΟ-ΠΛΗΡΟΦΟΡΙΚΟ-ΦΟΡΟΛΟΓΙΚΟ-ΣΥΣΤΗΜΑ/TAXIS#cptIt264: attPar#

ΣΥΣΤΗΜΑ ΙΤΑΛΙΑΣ

ΜΕ ΤΟ ΠΛΗΡΟΦΟΡΙΚΟ ΦΟΡΟΛΟΓΙΚΟ ΣΥΣΤΗΜΑ, ΚΑΤΑΦΕΡΕ ΝΑ ΠΕΡΙΟΡΙΣΕΙ ΤΗ ΦΟΡΟΔΙΑΦΥΓΗ ΣΤΟ 6% ΠΕΡΙΠΟΥ.
ΕΠΙΣΗΣ ΕΚΕΙ, ΟΧΙ ΕΛΛΑΔΑ, ΟΙ ΤΑΜΕΙΑΚΕΣ ΜΗΧΑΝΕΣ ΣΤΕΛΝΟΥΝ ΑΠ'ΕΥΘΕΙΑΣ ΣΤΗΝ ΕΦΟΡΙΑ ΤΑ ΣΤΟΙΧΕΙΑ
[ΒΗΜΑ, 4 ΑΠΡΙ 1993, Δ13]

ΕΝΙΑΙΟ ΦΟΡΟΛΟΓΙΚΟ ΜΗΤΡΩΟ:
ΕΙΧΕ ΥΛΟΠΟΙΗΘΕΙ ΕΔΩ ΚΑΙ ΑΡΚΕΤΑ ΧΡΟΝΙΑ ΑΛΛΑ ΤΕΘΗΚΕ ΣΕ ΕΦΑΡΜΟΓΗ ΠΡΙΝ 2 ΧΡΟΝΙΑ.
[ΒΗΜΑ, 24 ΟΚΤΩ 1993, Δ12]

FvMcs.stmIth.doing.TAXIS

name::
* McsEngl.conceptIt264,
* McsEngl.stmIth.doing.TAXIS@cptIt,
* McsEngl.FvMcs.stmIth.doing.TAXIS@cptIt,
* McsEngl.TAXIS@cptIt,
* McsEngl.taxis@cptIt264,
* McsElln.ΟΛΟΚΛΗΡΟΜΩΜΕΝΟ-ΠΛΗΡΟΦΟΡΙΑΚΟ-ΣΥΣΤΗΜΑ-ΦΟΡΟΛΟΓΙΑΣ@cptIt,

DEFINITION

TAXIS είναι υποπρόγραμα του ΚΛΕΙΣΘΕΝΗ#cptIt477.1#,
[hmnSngo.1995-05]

GENERIC

_GENERIC:
* entity.whole.system.it_human#cptItsoft180#

WHOLE

_WHOLE:
ΚΛΕΙΣΘΕΝΗΣ#cptItsoft477#

BUDGET#cptEconomy540.16#

15 δισ. για το TAXIS
[ΒΗΜΑ, 27 ΝΟΕΜ. 1994, Α61]

12-13 δισ. δρχ. το hardware θα κοστίσει.
[ΒΗΜΑ, 23 ΟΚΤ. 1994, Ε6]

ognCompany#cptEconomy7#

Την εκπόνηση του ΣΤΡΑΤΗΓΙΚΟΥ ΣΧΕΔΙΟΥ και την ανάπτυξη λογισμικού ανέλαβαν το 1993 οι Intrasoft, και sogei ιταλικη, με υπεργολάβους τις planet, και sema group.
[ΒΗΜΑ, 23 ΟΚΤ. 1994, Ε6]

INFORMATION-MACHINE SYSTEM

317 SERVERS
6800 WORKSTATIONS (486)
4500 PRINTERS
[ΒΗΜΑ, 23 ΟΚΤ. 1994, Ε6]

GOAL#cptIt215#

ΣΚΟΠΟΣ
ΣΤΟ ΤΕΛΕΥΤΑΙΟ ΣΤΑΔΙΟ ΘΑ ΦΤΙΑΞΟΥΝ ΤΟ ΦΟΡΟΛΟΓΙΚΟ.ΦΑΚΕΛΟ ΓΙΑ ΚΑΘΕ ΦΥΣΙΚΟ ΚΑΙ ΝΟΜΙΚΟ ΠΡΟΣΩΠΟ.

site

_ADDRESS.WPG:
* http://gsis.gr/gsis/info/gsis_site/index.html,

EVOLUTING#cptCore546.171#

{time.1993}:
=== ΑΠΡΙΛΙΟΣ 1993
ΘΑ ΥΠΟΓΡΑΦΕΙ ΟΡΙΣΤΙΚΗ ΣΥΜΒΑΣΗ

FvMcs.stmIth.doing.TRANSACTING-ASSET

_CREATED: {2015-08-13} {2011-07-26} ?

name::
* McsEngl.conceptIt51,
* McsEngl.stmIth.doing.TRANSACTING-ASSET@cptIt,
* McsEngl.FvMcs.stmIth.doing.TRANSACTING-ASSET@cptIt,
* McsEngl.conceptIt1002,
* McsEngl.stmIth.doing.TRANSACTING@cptIt,
* McsEngl.digital-transacting-system@cptIt,
* McsEngl.system.it.human.transacting@cptIt,

* McsEngl.sihDtg@cptIt,
* McsEngl.computerized-payment@cptIt,
* McsEngl.e-commerce@cptIt,
* McsEngl.electronic-commerce@cptIt,
* McsEngl.electronic-trade@cptIt51,
* McsEngl.electronic-trading@cptIt51, {2012-03-27}
* McsEngl.eTrade@cptIt,
* McsEngl.eTrading@cptEconomy369.25, {2011-07-26}
* McsEngl.eTrading@cptIt51,
* McsEngl.eTransacting-system@cptIt51, {2015-08-21}
* McsEngl.paperless-trading@cptIt,
* McsEngl.sysItHmn.electronic-trading@cptIt,
* McsEngl.sihTrg@cptEconomy51, {2015-08-30}
* McsEngl.sysIthTrd@cptEconomy51, {2012-05-31}
* McsEngl.sysItTrd@cptEconomy51, {2012-05-05}
====== lagoGreek:
* McsElln.ΗΛΕΚΤΡΟΝΙΚΟ-ΕΜΠΟΡΙΟ@cptIt,
* McsElln.ηλεκτρονικο-εμποριο-πτ51@cptIt,

_Etymology:
The term 'trading platform' is generally used to avoid confusion with ‘trading system’ which is more often associated with the trading method or strategy rather than the computer system used to execute orders within financial circles.[1]
[http://en.wikipedia.org/wiki/Electronic_trading_platform]

DEFINITION

_DESCRIPTION:
Transacting (exchanging / transfering) e-asset (information representing exchange-value).
[hmnSngo.2017-01-28]
===
In finance, an Electronic trading platform is a computer system that can be used to place orders for financial products over a network with a financial intermediary. This includes products such as shares, bonds, currencies, commodities and derivatives with a financial intermediary, such as a brokers, market makers, Investment banks or stock exchanges. Such platforms allow electronic trading to be carried out by users from any location and are in contrast to traditional floor trading using open outcry and telephone based trading.
Electronic trading platforms typically stream live market prices on which users can trade and may provide additional trading tools, such as charting packages, news feeds and account management functions. Some platforms have been specifically designed to allow individuals to gain access to financial markets that could traditionally only be accessed by specialist trading firms such as allowing margin trading on forex and derivatives such as contract for difference. They may also be designed to automatically trade specific strategies based on technical analysis or to do high-frequency trading.
[http://en.wikipedia.org/wiki/Electronic_trading_platform]
===
Electronic trading, sometimes called etrading, is a method of trading securities (such as stocks, and bonds), foreign exchange or financial derivatives electronically. Information technology is used to bring together buyers and sellers through electronic trading platform and networks to create virtual market places such as NASDAQ, NYSE Arca and Globex which are also known as electronic communications networks (ECNs).
Electronic trading is in contrast to older floor trading and phone trading and has a number of advantages, but glitches and cancelled trades do still occur.[1]
[http://en.wikipedia.org/wiki/Electronic_trading]

Most people think that e-commerce means online shopping--workaholics pointing their browsers to Amazon.com to order an emergency present because they forgot someone's birthday again.
But Web shopping is only a small part of the e-commerce picture. The term also refers to online stock and bond transactions and buying and downloading software without ever going near a store. In addition, e-commerce includes business-to-business connections that make purchasing easier for big corporations. And many people hope that so-called microtransactions will let people pay small amounts--a few cents or a few dollars--to access online content or games.
QVC, the shopping channel whose Web subsidiary iQVC opened last September, argues that it has been doing electronic commerce for the past 11 years by broadcasting on cable TV and taking orders over the phone. But the kind of e-commerce that everyone is interested in right now refers to systems that let money change hands over the Internet.
[http://www.cnet.com/Content/Features/Techno/Ecommerce20/ss01.html 1997aug]

An electronic communication network (ECN) is a financial term for a type of computer system that facilitates trading of financial products outside of stock exchanges. The primary products that are traded on ECNs are stocks and currencies. The first ECN, Instinet, was created in 1969. ECNs increase competition among trading firms by lowering transaction costs, giving clients full access to their order books, and offering order matching outside of traditional exchange hours.[citation needed] ECNs are sometimes also referred to as Alternative Trading Systems or Alternative Trading Networks.
[http://en.wikipedia.org/wiki/Electronic_communication_network]

sihTrg'WHOLE

_WHOLE:
* eTransaction-system-of-economy#cptEconomy74.26#
* transaction-system-of-economy#cptEconomy74#

sihTrg'doing

name::
* McsEngl.sihTrg'doing@cptIt,
* McsEngl.conceptEconomy51.1,
* McsEngl.electronic-trading@cptIt,

_GENERIC:
* transacting#cptEconomy3#

_SPECIFIC:
* ATM##
* exchanging##
* payment-processing##
* buying##
* selling##
* money-exchanging##
* money-sending##
* money-receiving##
* money-transacting#cptItsoft98#

_SPECIFIC_DIVISION.sfs:
* exchanging##
* exchangingNo (transfering|gifting)##

sihTrg'human

name::
* McsEngl.sihTrg'human@cptIt,

sihTrg'Pitfall

name::
* McsEngl.sihTrg'Pitfall@cptIt,

Προσοχή στις ευκαιρίες και στις αγορές του Internet Οι κρυφές επιβαρύνσεις αυξάνουν κατακόρυφα το κόστος των ηλεκτρονικών συναλλαγών
Παρά το γεγονός ότι οι συναλλαγές μέσω του Παγκόσμιου Διαδικτύου γίνονται με απλό τρόπο και χωρίς χρονικές καθυστερήσεις, παρουσιάζουν ορισμένες παγίδες, τουλάχιστον για όσους τις χρησιμοποιούν για πρώτη φορά και δεν γνωρίζουν πώς να προφυλαχθούν από τυχόν παραπλανητικές υποσχέσεις. Και οι παγίδες αυτές δεν σχετίζονται με την ασφάλεια των συναλλαγών, αλλά με το κόστος της αγοράς διαφόρων ειδών, η τελική τιμή των οποίων ίσως επιβαρυνθεί από διάφορα κρυφά κόστη που μπορεί να μετατρέψουν μια πραγματική ευκαιρία σε ακριβή αγορά.
Οι ηλεκτρονικές αγορές, δηλαδή οι αγορές μέσα από το Internet, έχουν αρχίσει να γίνονται όλο και περισσότερο δημοφιλείς. Σύμφωνα με έρευνες μεγάλων διεθνών εμπορικών οίκων, ο όγκος των συναλλαγών που αφορούν εμπορική δραστηριότητα μέσω του Internet έχει αυξηθεί αλματωδώς τον τελευταίο χρόνο. Οι ειδικοί του χώρου μάλιστα προβλέπουν πως η αξία των συναλλαγών των κατόχων των πιστωτικών καρτών μέσω του Internet θα φθάσει ως το 2000 τα 2 τρισ. δρχ., περίπου.
Οσοι λοιπόν ψωνίζουν από το Internet θα πρέπει να είναι προσεκτικοί όσον αφορά το κόστος των αγορών, καθώς επιπλέον χρεώσεις ίσως μετατρέψουν μια πραγματική ευκαιρία σε ακριβή αγορά. Για παράδειγμα, τα ταχυδρομικά τέλη μπορεί να είναι υψηλά, στην περίπτωση που οι χρήστες ψωνίζουν από τις ΗΠΑ. Χωρίς αμφιβολία, η Αμερική προφέρει μια καλά αναπτυγμένη και οργανωμένη βάση για ψώνια, η οποία προσελκύει έναν διαρκώς αυξανόμενο αριθμό πελατών από την Ευρώπη, κυρίως για μουσικά CD, όπου και οι διαφορές τιμών είναι μεγάλες.
Αυτό όμως που πρέπει να προσέξει ο ηλεκτρονικός καταναλωτής στην προκειμένη περίπτωση είναι μήπως, εκτός από την καλή τιμή του CD, υπάρχει και φόρος που προστίθεται σ' αυτήν και δεν αναφέρεται.
Οσοι ψωνίζουν με πιστωτική κάρτα, θα πρέπει ακόμη να προσέχουν η συναλλαγή τους να πραγματοποιείται σε site προστατευμένο από «χάκερ». Δηλαδή, με απλά λόγια, να μην πέσουν τα απόρρητα στοιχεία της πιστωτικής κάρτας τους σε ξένα χέρια.
Συνήθως, όταν το site είναι προστατευμένο, εμφανίζεται στον browser (στο πρόγραμμα με το οποίο ο χρήστης έχει πρόσβαση στο Internet) ένα σχετικό εικονίδιο, σε κάποια γωνία της οθόνης του, με ένα κλειδωμένο λουκέτο. Αυτή είναι και η μίνιμουμ προφύλαξη των χρηστών. Ακόμη, το λογισμικό πολλές φορές ειδοποιεί τον χρήστη αν είναι σε περιβάλλον ασφαλούς ή όχι server. Απλώς θα πρέπει να έχει ενεργοποιημένη την κατάλληλη επιλογή.
Παρ' όλα αυτά, όσες επιχειρήσεις δραστηριοποιούνται στον τομέα πωλήσεων μέσω Διαδικτύου δεν κάνουν δεκτές, πολλές φορές, συναλλαγές με πιστωτικές κάρτες που έχουν εκδοθεί και χρησιμοποιούνται στην Ευρώπη. Η αιτία είναι απλή. Φοβούνται τον κίνδυνο της απάτης.
Οσοι πραγματοποιούν συναλλαγές με πιστωτικές κάρτες στο Internet, εκτός των άλλων σημείων, θα πρέπει να προσέξουν και τι τους χρεώνει και η ίδια η κάρτα για κάθε συναλλαγή. Για παράδειγμα, ορισμένες κάρτες χρεώνουν επιπλέον τον χρήστη με 1,5% ανά συναλλαγή, στην περίπτωση που η συναλλαγή αυτή έγινε σε ξένο νόμισμα. Βέβαια, αυτός ο τρόπος χρέωσης είναι αρκετά φθηνότερος από το να στείλει κάποιος ένα τσεκ, όπου θα χρεωθεί ακόμη περισσότερο.
Πάντως, το γενικό συμπέρασμα είναι ότι οι συναλλαγές σε ηλεκτρονικό χρήμα κοστίζουν.
Το άλλο πρόβλημα με τις συναλλαγές μέσω Internet είναι ότι ο καταναλωτής είναι κατά κάποιον τρόπο ευάλωτος σε περίπτωση που κάτι δεν πάει καλά. Αλλά και αν ακόμη τα καταφέρει, ενδέχεται για ορισμένα είδη που έχει αγοράσει «ηλεκτρονικά» και τα οποία προέρχονται από τρίτες χώρες, εκτός ΕΕ δηλαδή, να αντιμετωπίσει και έξοδα τελωνείου, ΦΠΑ κλπ.
Ετσι, κάποιος που αποφασίζει να κάνει μια συναλλαγή μέσω Internet θα πρέπει:
* Να συγκρίνει τις τιμές ιδίων και όχι παρόμοιων ειδών, ώστε να μπορεί να επιλέξει τη φθηνότερη.
* Να ελέγχει το φορολογικό καθεστώς, που ισχύει για τα είδη που θέλει να αγοράσει μέσω Διαδικτύου, της χώρας όπου βρίσκεται η επιχείρηση με της οποίας το site έχει συνδεθεί.
* Πάντοτε να καταγράφει την ταχυδρομική διεύθυνση, τα τηλέφωνα και τα ονόματα των υπευθύνων της εταιρείας με την οποία πραγματοποιεί ηλεκτρονικές συναλλαγές.
* Να ελέγχει την πολιτική τής κάθε εταιρείας σχετικά με επιστροφή χρημάτων και επιστροφή ειδών, στην περίπτωση που δεν μείνει ικανοποιημένος από την αγορά.
* Να ελέγχει αν παρέχεται εγγύηση συγκεκριμένου χρονικού διαστήματος μέσα στο οποίο θα πρέπει να παραλάβει τα είδη που αγόρασε.

Η Ευρώπη κατά της απάτης Μια νέα, σημαντική, πρωτοβουλία εγκαινίασε η Ευρωπαϊκή Επιτροπή για την καταπολέμηση της απάτης και της πλαστογραφίας σχετικά με τις κάρτες πληρωμής, το ηλεκτρονικό χρήμα, τις επιταγές, τις κατ' οίκον τραπεζικές συναλλαγές και άλλα μέσα πληρωμής, πλην των μετρητών.
Οι πληρωμές αυτές αυξάνονται ταχύτατα σε όγκο, τα τελευταία χρόνια. Σύμφωνα με τα μέχρι στιγμής στοιχεία, ο κύκλος εργασιών, μόνο του τομέα πιστωτικών καρτών, πλησιάζει τα 2 τρισ. ECU, ετησίως. Οι δηλωμένες απώλειες, λόγω εγκλημάτων σχεδιαζομένων με κάρτες πληρωμής, εκτιμώνται σε 2,7 δισ. ECU, ετησίως. Οι εκδότες καρτών στις χώρες της Ευρώπης υφίστανται απώλειες, οι οποίες φθάνουν το 25% των συνολικών απωλειών από κάρτες πληρωμής. Η Επιτροπή κατήρτισε ένα πλαίσιο για την καταπολέμηση της απάτης που αποτελείται από δύο σκέλη. Το πρώτο σκέλος, μια κοινή δράση που προτάθηκε, περιγράφει τα είδη της συμπεριφοράς που πρέπει να ποινικοποιηθούν ανεξάρτητα από το χρησιμοποιούμενο μέσον πληρωμής.
Μεταξύ των αξιόποινων πράξεων, συγκαταλέγονται η κλοπή, ή η παραποίηση μέσου πληρωμής, η κατοχή παραποιημένου ή πλαστογραφημένου μέσου, η εν γνώσει χρήση, ή αποδοχή πληρωμής, με παραποιημένο ή κλεμμένο μέσον, ή αλλοίωση δεδομένων. Η κοινή δράση που προτείνει η Επιτροπή προβλέπει ακόμη μηχανισμούς συνεργασίας μεταξύ των κρατών -μελών. Επίσης, καλεί τους ενδιαφερομένους να εξετάσουν ορισμένες πρωτοβουλίες, όπως ενίσχυση της ασφάλειας των προϊόντων και συστημάτων πληρωμής, αναβάθμιση των μηχανισμών πρόσβασης στα προϊόντα πληρωμής, εκπαίδευση και κατάρτιση αυτών που κάνουν χρήση των προϊόντων αυτών.
ΓΕΡ. ΖΩΤΟΣ

ΤΟ ΒΗΜΑ, 23-08-1998 Κωδικός άρθρου: B12495E031

sihTrg'ResourceInfHmnn#cptResource843#

name::
* McsEngl.sihTrg'ResourceInfHmnn@cptIt,

Check out these sites and organizations to get a running start on your own e-commerce site:

CommerceNet is an industry association dedicated to promoting electronic commerce. Launched in April 1994 in Silicon Valley, it now includes more than 500 companies and organizations worldwide. Members include banks, telecommunications companies, Internet service providers, online services, software and service companies, and real, live customers. http://www.commerce.net

The Internet-Sales Discussion List was started in November 1995 to provide a forum for merchants to discuss online sales issues. The group compiles postings from its subscribers into the I-Sales Digest, which is sent for free every day to 5,500 subscribers from more than 65 countries. www.mmgco.com/isales.html

Electronic Commerce World magazine (formerly EDI World) is a magazine about business-to-business e-commerce. pwr.com/EDIWORLD/default.html

The World Wide Web Consortium (W3C) is an online standards body active in many fields, including ways to make the growing variety of payment methods on the Web interoperable. This project is called the Joint Electronic Payments Initiative, or JEPI.
www.w3.org/pub/WWW/Payments

The Electronic Commerce Resource Center Program is designed to promote awareness and implementation of e-commerce and related technologies.
www.ecrc.ctc.com/necrc/ecrcpr.htm

"The 10 Secrets of Selling Online" from Viaweb includes some obvious but useful tips to help make your e-commerce site a success.
www.viaweb.com/vw/secrets.html
[http://www.cnet.com/Content/Features/Techno/Ecommerce20/ss12.html 1997aug]

sihTrg'systemIt

name::
* McsEngl.sihTrg'systemIt@cptIt,
* McsEngl.sihTrg'network@cptIt,
* McsEngl.ecommerce-network@cptIt,
* McsEngl.etrade-network@cptIt,

sihTrg'program

name::
* McsEngl.sihTrg'program@cptIt,
* McsEngl.conceptIt51.3,
* McsEngl.conceptEconomy74.25,
* McsEngl.eMarket'Electronic-trading-platform@cptIt,
* McsEngl.electronic-trading-platform@cptIt51.3, {2012-05-31}
* McsEngl.etrading-program@cptIt51.3, {2012-05-31}

=== _NOTES: The term 'trading platform' is generally used to avoid confusion with ‘trading system’ which is more often associated with the trading method or strategy rather than the computer system used to execute orders within financial circles.[1]

_DESCRIPTION:
In finance, an Electronic trading platform is a computer system that can be used to place orders for financial products over a network with a financial intermediary. This includes products such as shares, bonds, currencies, commodities and derivatives with a financial intermediary, such as a brokers, market makers, Investment banks or stock exchanges. Such platforms allow electronic trading to be carried out by users from any location and are in contrast to traditional floor trading using open outcry and telephone based trading.
Electronic trading platforms typically stream live market prices on which users can trade and may provide additional trading tools, such as charting packages, news feeds and account management functions. Some platforms have been specifically designed to allow individuals to gain access to financial markets that could traditionally only be accessed by specialist trading firms such as allowing margin trading on forex and derivatives such as contract for difference. They may also be designed to automatically trade specific strategies based on technical analysis or to do high-frequency trading.
[http://en.wikipedia.org/wiki/Electronic_trading_platform]

sihTrg'protocol

name::
* McsEngl.sihTrg'protocol@cptIt,

sihTrg'GENERIC

_GENERIC:
* entity.whole.system.it_human#cptItsoft180#
* exchanging#cptEconomy-369# {2012-05-05}

SPECIFIC

name::
* McsEngl.sihTrg.specific@cptIt,
* McsEngl.sysIthTrd.specific@cptIt,

_SPECIFIC: sysIthTrd.alphabetically:
* sysIth.trading.forex#cptIt51.2#
* sysIth.trading.social#cptItsoft51.4#

sihTrg.SPECIFIC-DIVISION.controlling

name::
* McsEngl.sihTrg.SPECIFIC-DIVISION.controlling@cptIt,

_SPECIFIC:
* distributed-transacting-system##
* distributedNo-transacting-system##

sihTrg.SPECIFIC-DIVISION.doing

name::
* McsEngl.sihTrg.SPECIFIC-DIVISION.doing@cptIt,

_SPECIFIC:
* exchanging##
* exchangingNo (transfering|gifting)##

sihTrg.SPECIFIC-DIVISION.satisfier

name::
* McsEngl.sihTrg.SPECIFIC-DIVISION.satisfier@cptIt,

_SPECIFIC:
* financial-transacting-stmIth#cptItsoft51.6#
* financialNo-transacting-stmIth#cptIt#

sihTrg.Direct-market-access

name::
* McsEngl.sihTrg.Direct-market-access@cptIt,
* McsEngl.eMarket.Direct-market-access@cptIt,
* McsEngl.direct-market-access@cptEconomy74i,

_DESCRIPTION:
Direct Market Access (commonly shortened to DMA) is a term used in financial markets to describe electronic trading facilities that give investors wishing to trade in financial instruments a way to interact with the order book of an exchange. Normally, trading on the order book is restricted to broker-dealers and market making firms that are members of the exchange. Using DMA, investment companies (also known as buy side firms) and other private traders utilise the information technology infrastructure of sell side firms such as investment banks and the market access that those firms have, but control the way a trading transaction is managed themselves rather than passing the order over to the broker's own in-house traders for execution. Today, DMA is often combined with algorithmic trading giving access to many different trading strategies.
[http://en.wikipedia.org/wiki/Direct_Market_Access]

sihTrg.DISTRIBUTED

_CREATED: {2015-08-31}

name::
* McsEngl.sihTrg.DISTRIBUTED@cptIt,
* McsEngl.conceptIt51.15,
* McsEngl.distributed-transacting-stmIth@cptIt51.15,
* McsEngl.sihTrg.decentralized@cptIt51.15,

* McsEngl.sihTrgDrd@cptIt51.15,

_GENERIC:
* distributed-computer-network##

doing

_ADDRESS.WPG:
* http://www.originstamp.org//

_SPECIFIC:
* timestamping information##

SPECIFIC

_SPECIFIC:
* bitcoin
* ethereum#cptIt51.16#
* namecoin##

sihTrg.ETHEREUM {2015}#ql:ethereum_network#

name::
* McsEngl.sihTrg.ETHEREUM {2015}@cptIt,

sihTrg.INSTINET {1969}

name::
* McsEngl.sihTrg.INSTINET {1969}@cptIt,

_DESCRIPTION:
Not to be confused with Computer network.
An electronic communication network (ECN) is the term used in financial circles for a type of computer system that facilitates trading of financial products outside of stock exchanges. The primary products that are traded on ECNs are stocks and currencies. The first ECN, Instinet, was created in 1969. ECNs increase competition among trading firms by lowering transaction costs, giving clients full access to their order books, and offering order matching outside of traditional exchange hours. ECN's are sometimes also referred to as Alternative Trading Networks.
[http://en.wikipedia.org/wiki/Electronic_Communication_Network]

sihTrg.NXT#ql:netNxt#

name::
* McsEngl.sihTrg.NXT@cptIt,

sihTrg.PayPal (pypl)

name::
* McsEngl.sihTrg.PayPal (pypl)@cptIt,
* McsEngl.conceptIt51.8,
* McsEngl.PayPal-stmIthTrg@cptIt51.8, {2015-08-21}
* McsEngl.PayPal@cptEconomy246i, {2012-05-25}

* McsEngl.pypl@cptIt,
* McsEngl.stmPypl@cptIt,
* McsEngl.ppal@cptIt,

_DESCRIPTION:
PayPal allows any business or individual with an email address to securely, conveniently and cost-effectively send and receive payments online. Our network builds on the existing financial infrastructure of bank accounts and credit cards to create a global, real-time payment solution. We deliver a product ideally suited for small businesses, online merchants, individuals and others currently underserved by traditional payment mechanisms.
The size of our network and widening acceptance of our product have helped us become one of the leading payment networks for online auction websites. PayPal is also being increasingly used on other ecommerce sites for the sale of goods such as electronics and household items, the sale of services such as web design and travel, and the sale of digital content. Offline businesses, including lawyers, contractors and doctors, have increasingly begun to receive payments online through PayPal. PayPal's service, which lets users send payments for free, can be used from computers or web-enabled mobile phones.
PayPal (Europe) S.ΰ r.l. et Cie, S.C.A. is duly licenced as a Luxembourg credit institution in the sense of Article 2 of the law of 5 April 1993 on the financial sector as amended and is under the prudential supervision of the Luxembourg supervisory authority, the Commission de Surveillance du Secteur Financier, with registered office in L-1150 Luxembourg.
PayPal Inc. (which is a parent company of PayPal (Europe) S.ΰ r.l. et Cie, S.C.A.) is located in California, USA.
[https://www.paypal.com/gr/webapps/mpp/about]
===
PayPal allows any business or individual with an email address to securely, conveniently and cost-effectively send and receive payments online. Our network builds on the existing financial infrastructure of bank accounts and credit cards to create a global, real-time payment solution. We deliver a product ideally suited for small businesses, online merchants, individuals and others currently underserved by traditional payment mechanisms.
The size of our network and widening acceptance of our product have helped us become one of the leading payment networks for online auction websites, including eBay. PayPal is also being increasingly used on other ecommerce sites for the sale of goods such as electronics and household items, the sale of services such as web design and travel, and the sale of digital content. Offline businesses, including lawyers, contractors and doctors, have increasingly begun to receive payments online through PayPal. PayPal's service, which lets users send payments for free, can be used from computers or web-enabled mobile phones.
PayPal (Europe) S.ΰ r.l. et Cie, S.C.A. is duly licenced as a Luxembourg credit institution in the sense of Article 2 of the law of 5 April 1993 on the financial sector as amended and is under the prudential supervision of the Luxembourg supervisory authority, the Commission de Surveillance du Secteur Financier, with registered office in L-1150 Luxembourg.
PayPal Inc. (which is a parent company of PayPal (Europe) S.ΰ r.l. et Cie, S.C.A.) was acquired by eBay in October 2002, and is located in California, USA.
[https://www.paypal.com/gr/webapps/mpp/about]
===
PayPal is a global e-commerce business allowing payments and money transfers to be made through the Internet. Online money transfers serve as electronic alternatives to paying with traditional paper methods, such as checks and money orders.
Originally, a PayPal account could be funded with an electronic debit from a bank account or by a credit card at the payer's choice. But some time in 2010 or early 2011, PayPal began to require a verified bank account after the account holder exceeded a predetermined spending limit. After that point, PayPal will attempt to take funds for a purchase from funding sources according to a specified funding hierarchy, regardless of what funding source is listed as "primary" in the account-holder's profile. The funding hierarchy is (1) a balance in the PayPal account; (2) a PayPal credit account, PayPal Extras, PayPal SmartConnect, PayPal Extras Master Card or Bill Me Later (if selected as primary funding source) (It can bypass the Balance); (3) a verified bank account; (4) other funding sources, such as non-PayPal credit cards.[2]
The recipient of a PayPal transfer can either request a check from PayPal, establish their own PayPal deposit account or request a transfer to their bank account.
PayPal is an acquirer, performing payment processing for online vendors, auction sites, and other commercial users, for which it charges a fee. It may also charge a fee for receiving money, proportional to the amount received. The fees depend on the currency used, the payment option used, the country of the sender, the country of the recipient, the amount sent and the recipient's account type.[3] In addition, eBay purchases made by credit card through PayPal may incur extra fees if the buyer and seller use different currencies.
On October 3, 2002, PayPal became a wholly owned subsidiary of eBay.[4] Its corporate headquarters are in San Jose, California, United States at eBay's North First Street satellite office campus. The company also has significant operations in Omaha, Nebraska, Scottsdale, Arizona, and Austin, Texas, in the United States, Chennai, Dublin, Kleinmachnow (near Berlin) and Tel Aviv. As of July 2007, across Europe, PayPal also operates as a Luxembourg-based bank.
On March 17, 2010, PayPal entered into an agreement with China UnionPay (CUP), China's bankcard association, to allow Chinese consumers to use PayPal to shop online.[5] PayPal is planning to expand its workforce in Asia to 2,000 by the end of the year 2010.[6][7][dated info]
Between December 4–9, 2010, PayPal services were attacked in a series of denial-of-service attacks organized by Anonymous in retaliation for PayPal's decision to freeze the account of WikiLeaks citing terms of use violations over the publication of leaked US diplomatic cables.[8][9][10][11]
[http://en.wikipedia.org/wiki/Paypal]

stmPypl'account

name::
* McsEngl.stmPypl'account@cptIt,
* McsEngl.pyplaccount@cptIt,

_DESCRIPTION:
All PayPal accounts allow you to receive and make payments for goods and services.
[https://www.paypal.com/gr/webapps/helpcenter/helphub/article/?solutionId=FAQ2258&topicID=ACCOUNT_TYPES_CA&m=TCI]
===
Compare PayPal Account Types
Account Benefits  Personal  Premier  Business
Send money      
24-hour fraud surveillance      
Customer Service availability      
eBay Tools  Limited    
Merchant Services  Limited    
Accept credit or debit cards      
Multi-user access      
PayPal allows members to have not more than one Personal account or Premier account and one Business account. However, each PayPal account must contain unique email addresses and financial information. You may upgrade your account at any time.
[https://www.paypal.com/gr/cgi-bin/webscr?cmd=xpt/Marketing/general/PayPalAccountTypes-outside]
===
Can I have more than one PayPal account?
Yes. You can open one PayPal account for your personal use and if needed, you can also open a separate account for your business. However, your business account can’t use the same email address as your account for personal use.

pyplaccount'bank-account

name::
* McsEngl.pyplaccount'bank-account@cptIt,

How long will it take to withdraw money from my PayPal account to my bank account?
===
Please allow 5 - 7 days for the money to appear in your bank account. The length of time depends on your bank's processing schedule.
[https://www.paypal.com/gr/webapps/helpcenter/helphub/article/?solutionId=FAQ1346&topicID=&m=ARA]

Will PayPal have the ability to withdraw funds from my bank account without my permission?
===
No. PayPal only withdraws or adds funds with your permission.
[https://www.paypal.com/gr/webapps/helpcenter/helphub/article/?solutionId=FAQ1148&topicID=&m=ARA]

pyplaccount'closing

name::
* McsEngl.pyplaccount'closing@cptIt,

Closing an account:

Before you close your account please be sure there’s no money in your PayPal balance and that your financial details have been removed. If there is a balance, withdraw the money to your bank account. Once your balance is zero, remove your bank and card details.

To close your PayPal account:
Log in to your PayPal account.
Click Profile near the top of the page.
Select My account settings.
In the Account Type section, click Close account and follow the instructions.
We may ask you to confirm ownership of the account before it can be closed.

Note: It’s not possible to reopen an account once it has been closed but you can sign up for a new account instead.
[https://www.paypal.com/uk/webapps/helpcenter/helphub/article/?solutionId=FAQ1756&topicID=OPENING_OR_CLOSING_AN_ACCOUNT_HELPHUB&m=TCI]

pyplaccount'money.adding

name::
* McsEngl.pyplaccount'money.adding@cptIt,

How do I add money to my PayPal account from my confirmed bank account?
Print
Here's how:
Go to www.paypal.com and log in to your PayPal account.
Click Add money at the top of the page.
Click Add money from a U.S. bank account .
Select your bank account (if you have more than one).
Enter the amount to transfer and click Continue.
Review the transfer details and click Submit.
[https://www.paypal.com/gr/webapps/helpcenter/helphub/article/?solutionId=FAQ1348&topicID=ADD_MONEY_TO_MY_ACCOUNT&m=TCI]

pyplaccount'money.withdrawing

name::
* McsEngl.pyplaccount'money.withdrawing@cptIt,

How do I cancel a withdrawal?
===
Unfortunately, once you’ve requested a withdrawal from your PayPal account, it can’t be canceled.
[https://www.paypal.com/gr/webapps/helpcenter/helphub/article/?solutionId=FAQ855&topicID=&m=ARA]

What are the fees for withdrawing money to my local bank account?
===
Fees will vary according to the amount to be withdrawn.

Log in to your PayPal account and click Fees at the bottom of any page for information about withdrawal fees.

Note: Some banks may charge fees for electronic funds transfers. You can contact your bank directly for more information.
[https://www.paypal.com/gr/webapps/helpcenter/helphub/article/?solutionId=FAQ1189&topicID=&m=ARA]

How can I lift my Withdrawal Limit?
===
Your withdrawal limit is the total amount of money you can withdraw from an unverified PayPal account.

Here's how you can view and lift the withdrawal limit.

Log in to your PayPal account.
On the Account Overview page, click View Limits.
The remaining amount you can withdraw and send is listed.
To lift your limit, click Lift Limit and follow the instructions.
[https://www.paypal.com/gr/webapps/helpcenter/helphub/article/?solutionId=FAQ558&topicID=WITHDRAW_MONEY_FROM_MY_ACCOUNT&m=TCI]

pyplaccount.BUSINESS

name::
* McsEngl.pyplaccount.BUSINESS@cptIt,
* McsEngl.pypl'business-account@cptIt,

_DESCRIPTION:
Business: Recommended for merchants who operate under a company/group name. It offers additional features such as allowing up to 200 employees limited access to your account and customer service email alias for customer issues to be routed for faster follow-ups.
[https://www.paypal.com/gr/webapps/helpcenter/helphub/article/?solutionId=FAQ2258&topicID=ACCOUNT_TYPES_CA&m=TCI]

pyplaccount.PERSONAL

name::
* McsEngl.pyplaccount.PERSONAL@cptIt,
* McsEngl.pypl'personal-account@cptIt,

_DESCRIPTION:
Personal: Recommended for individuals who shop and pay online.
[https://www.paypal.com/gr/webapps/helpcenter/helphub/article/?solutionId=FAQ2258&topicID=ACCOUNT_TYPES_CA&m=TCI]

What information is required to open a Personal PayPal account?
===
To open a personal PayPal account, you'll need to provide your name, address, phone number, and email address.

We also ask that you create a password for your PayPal account and choose two different security questions to answer. This information is necessary for us to protect you from loss of password, credit card fraud, or to contact you should the need come up.
[https://www.paypal.com/gr/webapps/helpcenter/helphub/article/?articleID=FAQ2080&m=SRE&url=https%253A%252F%252Fokminternal.paypal.com%252Finfocenter%252Findex%253Fpage%253Dcontent%2526id%253DFAQ2080%2526actp%253Dsearch%2526viewlocale%253Den_XC&answerId=16777226&searchId=1412147482229&rankId=11]

pyplaccount.PREMIER

name::
* McsEngl.pyplaccount.PREMIER@cptIt,
* McsEngl.pypl'premier-account@cptIt,

_DESCRIPTION:
Premier: Recommended for casual sellers or non-businesses who wish to get paid online, and who also make online purchases.
[https://www.paypal.com/gr/webapps/helpcenter/helphub/article/?solutionId=FAQ2258&topicID=ACCOUNT_TYPES_CA&m=TCI]

stmPypl'concept

name::
* McsEngl.stmPypl'concept@cptIt,

Payment status – what does it mean?
Active
Canceled
Cleared
Completed
Denied
Expired
Failed
Funds available
Funds not yet available
Held
In progress
Marked as paid
On hold
On hold – ship now
Paid
Pending
Placed
Refunded
Refused
Returned
Reversed
Temporary hold
Unclaimed
Uncleared
Under review

stmPypl'Active
Subscriptions: You have automatic payments scheduled for this subscription.

stmPypl'Canceled
Money requests: Either you or the sender canceled the request.
Payments sent: You canceled the payment, and the money was refunded to your account.
Subscriptions: The subscription was canceled, and no more payments will be made.

stmPypl'Cleared
Payments received: You received an eCheck payment, and the money is now in your account.

stmPypl'Completed
Adding funds from your bank account: The transfer has been completed, and the money is in your account.
Payments received: The transaction was successful, and the money is in your account.
Payments sent: The recipient received your payment.
Subscriptions: All payments for this subscription have been made.
Withdrawals to your bank account: We have sent your money, and it should be in your bank account within a few business days.

stmPypl'Denied
Payments sent: The recipient decided not to accept your payment.
Payments received: You decided not to accept the payment.

stmPypl'Expired
When you place an order: The transaction expired.

stmPypl'Failed
Payments sent: Your payment didn't go through.

stmPypl'Funds available
Previously unavailable funds from eBay sales that are now in your PayPal account and ready for use.

stmPypl'Funds not yet available
While you establish a successful eBay sales history, you may not have access to your money for up to 21 days. You may get it sooner, but it may take longer if your buyer reports a problem with the sale.

stmPypl'Held
Payments received: The money is being held, pending reversal.
Payments sent: The money is being held, pending reversal.

stmPypl'In progress
Payments sent: Your payment was sent, but the recipient hasn't accepted it yet.

stmPypl'Marked as paid
Marked as paid: Your full payment has been received.

stmPypl'On hold
Payments received: The money is being held temporarily. The sender may have filed a dispute, or we are reviewing the transaction.
Payments sent: The money is on hold while you dispute the transaction.
Withdrawals to your bank account: There’s a problem with your bank account, and your withdrawal couldn’t go through.

stmPypl'On hold – ship now
Payments received: The transaction is under a payment hold for an eBay item. Your funds will be released after 21 days. To get your payment sooner, please ship the merchandise right away.

stmPypl'Paid
Money requests: Either you or the recipient was paid the full amount.

stmPypl'Pending
Adding funds from your bank account: You requested a bank transfer. The money should be in your PayPal account soon.
Money requests: The money request has not yet been paid. You can pay, edit, send a reminder, or cancel the request.
Withdrawals to your bank account: You requested a transfer from PayPal to your bank account.

stmPypl'Placed
Part of your available PayPal balance is being held temporarily while this payment is processed. Once the purchase is complete, we'll release the hold and use the money for the payment.

stmPypl'Processed
Adding funds from your bank account: We have transferred your request to your bank. The money should be in your PayPal account shortly.

stmPypl'Refunded
Refunded or Partially refunded: If you paid by debit or credit card, your refund will go to that card. Otherwise, your refund will go to your PayPal account.
Payments sent: The recipient refunded your payment.

stmPypl'Refused
Adding funds from your bank account: Your bank transfer was rejected. We’ll email you why this happened.
Payments sent: The recipient didn't receive your payment.

stmPypl'Returned
Payments sent: Your money was returned because the recipient didn't claim the payment within 30 days.

stmPypl'Reversed
Payments sent: Either you or PayPal canceled the payment.
Withdrawals to your bank account: The transfer was denied, and we credited the money back to your PayPal account. We’ll email you why this happened.

stmPypl'Temporary hold
Payments sent and received: A temporary hold may be placed on money during the authorization process. This process usually doesn't take long, and you'll see the status change to "Completed."

stmPypl'Unclaimed
Payments Sent: A payment may be unclaimed for several reasons:
The recipient has not signed up for a PayPal account and has not yet received your payment.
The recipient has a Personal account (which cannot receive more than 5 card-funded payments a year) and has not upgraded. Or the recipient hasn't accepted the payment.
The recipient has a Premier or Business account and has chosen to individually accept or decline payments from customers who don't have a confirmed address.
The money has been deducted from your PayPal account. You can cancel this payment by clicking Unclaimed and then Cancel Payment. Please note that all unclaimed transactions are automatically canceled after 30 days.

stmPypl'Uncleared
Payments received: The eCheck payment is in process. We recommend you wait to ship until the payment clears.
When you send a payment: The eCheck payment is in process.

stmPypl'Under_review
Payments received: We are reviewing this transaction. Please don't ship until we complete our review.

stmPypl'doing.BUYING

name::
* McsEngl.stmPypl'doing.BUYING@cptIt,
* McsEngl.pypl'buing@cptIt,

stmPypl'buyer-protection

name::
* McsEngl.stmPypl'buyer-protection@cptIt,

What is PayPal Buyer Protection?
===
When you pay with PayPal on any website PayPal Buyer Protection covers you if you have a problem. If an item doesn’t arrive or is significantly not as described we will help you to get a full refund.

To qualify for PayPal Buyer Protection:
Use PayPal to complete your payment.
Pay for the item with one payment. Items purchased with multiple payments aren't eligible.
Let the seller know there's a problem with the transaction by opening a dispute in the Resolution Center within 45 days of making your payment. Then, escalate the dispute to a claim within 20 days of the date you opened the dispute.
Keep your PayPal account in good standing.

If your transaction qualifies for PayPal Buyer Protection you are covered for the full purchase price plus the original shipping charges.

You can report your problem in the PayPal Resolution Center or the eBay Resolution Center. Either way, you’ll receive the same coverage. To find out how to report a problem on eBay, go to eBay and click Resolution Center at the bottom of any page.

Please note that some purchases such as vehicles in the Motors category, intangible items, capital equipment in the Business & Industrial category, and Real Estate aren't eligible for PayPal Buyer Protection.

To learn more about PayPal Buyer Protection and to see a full list of eligibility requirements and exclusions, please review our User Agreement. You can find the User Agreement by clicking Legal Agreements at the bottom of any PayPal page.
[https://www.paypal.com/gr/webapps/helpcenter/helphub/article/?solutionId=FAQ1269&topicID=&m=ARA]

stmPypl'payment

name::
* McsEngl.stmPypl'payment@cptIt,

_QUANTITY:
More than 9 million payments were processed everyday by PayPal in 2013.
[https://www.paypal.com/gr/webapps/mpp/accept-payments-online]

stmPypl'doing.SELLING

name::
* McsEngl.stmPypl'doing.SELLING@cptIt,
* McsEngl.pypl'selling@cptIt,

stmPypl'doing.TRANSFERING-MONEY

name::
* McsEngl.stmPypl'doing.TRANSFERING-MONEY@cptIt,
* McsEngl.pypl'money-transfering@cptIt,

stmPypl'receiving-money

name::
* McsEngl.stmPypl'receiving-money@cptIt,
* McsEngl.pypl'money-receiving@cptIt,

stmPypl'sending-money

name::
* McsEngl.stmPypl'sending-money@cptIt,
* McsEngl.pypl'money-sending@cptIt,

_ADDRESS.WPG:
* Send money in a few seconds.
[https://www.paypal.com/gr/webapps/mpp/send-money-online]

What is the maximum amount I can send with my PayPal account?
===
To see your sending limit:

Log in to your PayPal account.
Click My Account at the top of the page.
Click View limits next to your PayPal balance.
Need to send more money than your sending limit allows? You can lift your sending limit by linking your bank account or credit card to your PayPal account.

To lift your sending limit:

Log in to your PayPal account.
Click My Account at the top of the page.
On the Overview page, click View limits next to your PayPal balance.
Click Lift Limits.
Decide how you want to lift your sending limits and follow the directions.
[https://www.paypal.com/gr/webapps/helpcenter/helphub/article/?articleID=FAQ732&m=SRE&url=https%253A%252F%252Fokminternal.paypal.com%252Finfocenter%252Findex%253Fpage%253Dcontent%2526id%253DFAQ732%2526actp%253Dsearch%2526viewlocale%253Den_XC&answerId=16777235&searchId=1412147482229&rankId=20]

stmPypl'fee

name::
* McsEngl.stmPypl'fee@cptIt,

_DESCRIPTION:
PayPal is the safer, easier way to pay and get paid.

   
Purchase    Personal Transfer
Pay  Get paid    Send money  Receive money
Free  1.9% to 3.4% + €0.35 EUR    
Free when the money comes from PayPal balance.

3.4% + €0.35 EUR
when the money comes from a debit or credit card
(the sender decides who pays this fee).
If your transaction requires a currency conversion, we will use a retail exchange rate. The retail exchange rate is our wholesale cost of foreign currency (determined by an outside financial institution) plus a currency conversion fee. This fee depends on the currency you are converting into. See the "Fees" > "Additional Fees" > "Currency Conversion Fee" section of the User Agreement for details.

Also, there's a cross-border fee included in the transaction fee for cross-border payments. For details, refer to the "Fees" section of the User Agreement. Within that section, review the topics "Cross-border Personal Transactions" and "Commercial Transactions."

Free to open a PayPal account.
Free to withdraw from your PayPal balance to your bank account.
Free to top up your PayPal balance from your bank account.
Other fees may apply that are not imposed by or paid through PayPal.
[https://www.paypal.com/gr/cgi-bin/webscr?cmd=_display-fees-outside, 2014-09-30]

stmPypl'network

name::
* McsEngl.stmPypl'network@cptIt,
* McsEngl.PayPal-network@cptIt,

stmPypl'organization

name::
* McsEngl.stmPypl'organization@cptIt,
* McsEngl.PayPal-Holdings@cptIt,
* McsEngl.Inc.@cptIt,
* McsEngl.PayPal-company@cptIt,

_DESCRIPTION:
Type  Public
Traded as  NASDAQ: PYPL
Founded  Palo Alto, California (June 1998)
Headquarters  San Jose, California, United States
Area served  Worldwide
Founder(s)  Elon Musk, Luke Nosek, Ken Howery, Max Levchin, Peter Thiel
Chairman  John Donahoe
CEO  Dan Schulman
Revenue  US$8.03 billion (2014)
Subsidiaries  Braintree, Paydiant, Venmo
Website  www.paypal.com
Written in  C++,[1] JavaScript (as Node.js)[2]
Alexa rank  Decrease 40 (June 2015)[3]
Advertising  Yes
Registration  Optional
Available in  Multilingual
Current status  Active
PayPal Holdings, Inc. is an American company operating a worldwide online payments system. Online money transfers serve as electronic alternatives to traditional paper methods like checks and money orders. PayPal is one of the world's largest internet payment companies.[6] The company operates as an acquirer, performing payment processing for online vendors, auction sites and other commercial users, for which it charges a fee.
Established in 1998,[7] PayPal had its IPO in 2002, and became a wholly owned subsidiary of eBay later that year.[8][9] In 2014, PayPal moved $228 billion in 26 currencies across more than 190 nations, generating a total revenue of $7.9 billion (44% of eBay’s total profits).[10] The same year, eBay announced plans to spin-off PayPal into an independent company the following year. The spin-off was complete on July 18, 2015.[11]
[https://en.wikipedia.org/wiki/PayPal]

stmPypl'privacy-policy

name::
* McsEngl.stmPypl'privacy-policy@cptIt,

Privacy Policy for PayPal Services
Last Update: May 14, 2014
Print Download PDF


Jump to section:

1. Overview
2. Binding Corporate Rules
3. Information We Collect
4. Our Use and Disclosure of Information
5. Information Security
6. Accessing and Changing Your Information
7. Accountability
8. IMPORTANT DATA PROTECTION INFORMATION FOR USERS RECEIVING PAYMENTS THROUGH WEBSITE PAYMENTS PRO (INCLUDING VIRTUAL TERMINAL) AND/OR PAYPAL HERE*

This Privacy Policy applies to all European Union countries except Austria, Belgium, Croatia, Denmark, Finland, France (including French Guiana, Guadeloupe, Martinique, Reunion and Mayotte), Germany, Italy (including the Vatican City), Luxembourg, Netherlands, Poland, Portugal, Spain and Sweden.
Please view, read, download and save this policy.

The Privacy Policy below governs your use of your PayPal account and products, services and any other features, technologies or functionalities offered by us (collectively "the PayPal Services") (including, without limitation, any information you provide in relation to the PayPal Services).



1. Overview
In order to operate the PayPal Services and to reduce the risk of fraud, PayPal (Europe) S.ΰ r.l. et Cie, S.C.A. ("PayPal", “our”, “us” or "we"), the data controller, must ask you to provide us with information about yourself, including your credit or debit card and/or bank account details. By consenting to, and agreeing the terms of, this Privacy Policy, you expressly consent and agree to us processing your data in the manner set out herein. This Privacy Policy describes the information we collect and how we use that information. PayPal takes the processing of your personal information very seriously and will use your information only in accordance with the terms of this Privacy Policy.

We will not sell or rent your personal information to third parties for their marketing purposes without your explicit consent. However, in order for us to offer our services to our users; enhance the quality of our service from time to time; and protect the interests of our users, we will in limited circumstances share some of your personal information with third parties under strict restrictions, as described in more detail in the section "Our Use and Disclosure of Information". It is important for you to review this Privacy Policy as it applies to all the PayPal Services.

By accepting the Privacy Policy at registration, you expressly consent to our use and disclosure of your personal information and direct us to do so in the manner described in this Privacy Policy.

All future changes to this Privacy Policy set out in the Policy Update already published on the “Legal Agreements” landing page of the PayPal website at the time you register for the Services are incorporated by reference into this Privacy Policy and will take effect as specified in the Policy Update. “Policy Update” means a prior notice of changes to any of your agreements with PayPal which PayPal may make available to you in writing. If you disagree with the terms of this Privacy Policy, please do not register for or use the PayPal Services.

Notification of Changes

This Privacy Policy may be revised over time as new features are added to the PayPal Services or as we incorporate suggestions from our customers. We may amend this Privacy Policy at any time by posting a revised version on our website. The revised version will be effective at the time we post it. In addition, if we propose to change this Privacy Policy in a substantial manner, we will provide you with at least 30 days' prior notice of such a change. We may post the notice on the "Policy Updates" page of our website(s) and/or send the notice by e-mail. After this 30 days' notice, you will be considered as having expressly consented to all amendments to the Privacy Policy. If you disagree with the terms of this Privacy Policy, you may close your account at any time.

Please check the PayPal website at https://www.paypal.com/uk/ at any time for the most current version of our Privacy Policy.

Some pages on the PayPal website include links to third-party websites. These sites are governed by their own privacy statements, and PayPal is not responsible for their operations, including but not limited to their information practices. Users submitting information to or through these third-party websites should review the privacy statements of these sites before providing them with personally identifiable information.

For the avoidance of doubt, this Privacy Policy does not constitute a "framework contract" for the purpose of the EU Payment Services Directive (2007/64/EC) or any implementation of that directive in the European Union or EEA (including, without limitation, the UK Payment Services Regulations 2009).

A Special Note about Children

Children are not eligible to use our service and we ask that minors (persons under the age of 18) do not submit any personal information to us or use the PayPal Services.
Back to top

2. Binding Corporate Rules
In addition to the privacy practices set out in this Privacy Policy, eBay Inc., the ultimate parent company of PayPal, has established a set of Corporate Rules (also referred to as Binding Corporate Rules), approved by a number of European Union data protection regulators. These Corporate Rules are a commitment by eBay Inc. to adequately protect your personal information regardless of where the data resides, and depending upon your location, may provide additional rights through your data protection regulator or a court. If you would like additional information regarding our Corporate Rules please contact us.

Back to top



3. Information We Collect
Required Information

To open a PayPal account or use the PayPal Services, you must provide your name, address, phone number, and email address. In order to make payments through the PayPal Services, you must provide credit card, debit card or bank account information. We also ask you to choose two different security questions to answer (such as your city of birth or your pet's name). This required information is necessary for us to process transactions, issue a new password if you forget or lose your existing password, protect you against credit card fraud and current account fraud, and contact you should the need arise in administering your account or the PayPal Services.

We will also require other commercial and/or identification information if you send or receive certain high-value transactions or high overall payment volumes through the PayPal Services or as is otherwise required in order for us to comply with our anti-money laundering obligations under European law.

When you access PayPal using a mobile device (e.g. a smartphone), we may additionally collect and store device sign-on data (including device ID) and geolocation data in order to provide our services.

If you use certain functionalities provided by us (such as the PayPal POS Functionality available in your mobile app) we may ask you to upload a picture of you in order to provide these specific services. If we allow you to link your membership of an eligible loyalty scheme to your Account, we may require you to provide to us your loyalty scheme membership ID.

Transaction Information

When you use the PayPal Services to send money to someone else or request money from someone else, we ask you to provide information related to that transaction. This information includes the amount and type of the transaction (purchase of goods, purchase of services, or simple money transfer), other purchase details and the email address, Skype ID (if applicable) or phone number of the third party. Also, when you send money to another PayPal customer, you may be asked to provide personal details to that customer to complete the transaction. Those details may also be passed on to us from that customer. We retain this information for each of your transactions through the PayPal Services and may add this information to your account profile to be used for future transactions that you may make with us. We also collect the Internet address (IP address) and other identifying information about the computer or device you use to access your PayPal account or use the PayPal Services, in order to help detect possible instances of unauthorised transactions.

Information about You from Third Parties

In order to protect all our customers against potential fraud, we verify the information you provide with the "Payment Processors" and/or "Credit Reference and Fraud Agencies" listed in the table under the section "Disclosure to Third Parties other than PayPal Customers" below. In the course of such verification, we receive personally identifiable information about you from such services. In particular, if you register a credit card or debit card or bank account with PayPal, we will use card authorisation and fraud screening services to verify that your bank or card information and address match the information you supplied to PayPal, and that the card has not been reported as lost or stolen.

If you send or receive high overall payment volumes through the PayPal Services, or if as a merchant have limited selling history, in some circumstances we will conduct a background check on your business by obtaining information about you and your business, and potentially (if legally permitted) also about your directors, shareholders and partners, from a credit reference or fraud agency such as Dun & Bradstreet, as listed in the table under the section entitled, "Disclosure to Third Parties other than PayPal Customers" below. If you owe us money, we may conduct a credit check on you by obtaining additional information about you from a credit reference or fraud agency, to the extent permitted by law. PayPal, at its sole discretion, reserves the right to periodically retrieve and review a business and/or consumer credit report supplied by such credit reference or fraud agency for any account, and reserves the right to close an account based on information obtained during this credit review process.

If you use your PayPal account to sell items, we may also collect public information about your business and your behaviour on social media platforms (such as the e-mail address and the number of “likes” and “followers”), to the extent relevant to confirm an assessment of your transactions and/or your business, including its size and the size of its customer base.

We may also collect information from members of the eBay Inc. corporate family or other companies (subject to their privacy policies). If you are sending transaction related communication on PayPal’s or eBay’s conflict resolution platforms to your buyer or seller, we may collect such information in order to assess your transactions and any risk associated with your activities, as well as for fraud detection, prevention, and or remediation of fraud, or other illegal actions or to detect, prevent or remediate violations of policies or the applicable user agreements.

Additional Verification

If we cannot verify the information that you provide, or if you request a withdrawal by cheque to an address other than your verified credit card billing address, we may ask you to upload or send us additional information by fax (such as your driving licence, credit card statement, and/or a recent utility bill, or other information linking you to the applicable address), or to answer additional questions online to help verify your information.

Website Traffic Information

Because of the way Internet communication standards work, when you arrive at or leave the PayPal website, we automatically receive the web address of the site that you came from or are going to. We also collect information on which pages of our website you visit, IP addresses, the type of browser you use and the times you access our website. We use this information to try to understand our customers' preferences better and to manage the load on our servers, so as to improve our services and your experience with PayPal.

Our Use of Cookies, Web Beacons, Local Storage and Similar Technologies

When you visit or interact with our sites, services, applications, tools, advertising, and messaging (such as email), we or our authorised service providers may use cookies, web beacons, and other similar technologies for storing information to help provide you with a better, faster, and safer experience. This page is designed to help you understand more about these technologies and our use of them on our sites and in our services, applications, and tools.

Below is a summary of few key things you should know about our policy related to the use of such technologies. You can review our full policy here.

We offer certain site features, services, applications, and tools that are available only through our use of these technologies. You are always free to block, delete, or disable these technologies if your browser or device so permits. However, if you decline cookies or other similar technologies, you may not be able to use certain site features, services, applications, or tools. You may also be required to re-enter your password more frequently during a session. For more information on how you can block, delete, or disable these technologies, please review the Help section of your browser, add-on, application, or device.

Where applicable, we protect our cookies and other similar technologies so that only we and/or our authorised service providers can interpret them by assigning them a unique identifier that is designed for interpretation only by us. You may encounter cookies, web beacons, or other similar technologies from authorised third parties, commonly called service providers, that we have contracted with to assist us with various aspects of our site operations, or to provide you our services, applications, and tools. We use both “session” and “persistent” cookies, as well as first-party and third-party cookies and similar technologies.

Our uses of these technologies fall into the following general categories

Operationally Necessary – allow us to operate our sites, services, applications, and tools, and ensure their safety and security, and allow you to access these sites, services, applications, and tools;
Performance-Related – are useful in order to assess the performance of our sites, services, applications, and tools;
Functionality-Related – offer you enhanced functionality when using our sites, services, applications, and tools; and
Advertising- or Targeting-Related – are used by us or our third-party advertising providers to deliver content, including advertisements relevant to your interests.
We may work with third-party companies, commonly known as service providers, who may place third-party cookies, web beacons, or similar technologies for storing information on our sites or in our services, applications, and tools with our permission. These service providers help us operate our sites, applications, services, and tools, and provide you with a better, faster, and safer experience;

Our sites, services, applications, and tools may use third parties, such as network advertisers and ad exchanges, to serve advertisements. These third-party ad networks and exchange providers may use third-party cookies, web beacons, or similar technologies to collect information to provide you with their services. They may also collect your device identifier, IP address, or identifier for advertising (IDFA), which may be used to tailor the advertising you see on our sites or elsewhere on the web.

Customer Service Correspondence

If you send us correspondence, including emails and faxes, we retain such information in the records of your account. We will also retain customer service correspondence and other correspondence from PayPal to you. We retain these records in order to keep records of our relationship, to measure and improve our customer service, and to investigate potential fraud and violations of our User Agreement. We may, over time, delete these records if permitted by law.

Questionnaires, Surveys and Profile Data

From time to time, we offer optional questionnaires and surveys to our users for such purposes as collecting demographic information or assessing users' interests and needs. The use of the information collected will be explained in detail in the survey itself. If we collect personally identifiable information from our users in these questionnaires and surveys, the users will be given notice of how the information will be used prior to their participation in the survey or questionnaire.

Recipients without registered PayPal Accounts and Requests

When a registered PayPal user either sends a payment to, or requests a payment from, an individual who is not a registered PayPal user, we will retain the information that the registered PayPal user submits to us, including, for example, the other party's email address, Skype ID (if applicable), phone number and/or name, for the benefit of the registered PayPal user who is attempting to contact the other party, so that the registered PayPal user can see a complete record of his or her transactions, including uncompleted transactions. Although this information is stored for a certain period of time, we will not market to the non-registered person in any way at any time. Additionally, these persons have the same rights to access and correct information about themselves (assuming that their details were correct) as anyone else who uses the PayPal Services.

Back to top



4. Our Use and Disclosure of Information
Internal Uses

We collect, store and process your personal information on servers located in the United States and operated by our parent company, PayPal Inc and elsewhere in the World where PayPal facilities are located. Our primary purpose in collecting personal information is to provide you with a safe, smooth, efficient, and customised experience. You agree that we may use your personal information to:

provide the services and customer support you request;
resolve disputes, collect fees, and troubleshoot problems;
detect, prevent, and/or remediate fraud or other potentially illegal or prohibited activities, or to detect, prevent or remediate violations of policies or applicable user agreements;
customise, measure, and improve our services and the content and layout of our website;
deliver targeted marketing and advertising, service updates, and promotional offers based on the communication preferences you have defined for your PayPal account (please refer to the section "Our Contact with PayPal Customers" below) and your activities when using the PayPal Services; and
compare information for accuracy, and verify it with third parties.
Content Posted by You for Publication

When providing us with content or posting content (in each case for publication, whether on- or off-line) using the PayPal Services, you grant eBay Inc, and its subsidiaries and subsidiary undertakings (which includes, without limitation, PayPal) (the “eBay Group”) a non-exclusive, worldwide, perpetual, irrevocable, royalty-free, sublicensable (through multiple tiers) right to exercise any and all copyright, publicity, trademarks, database rights and intellectual property rights you have in the content, in any media known now or in the future. Further, to the fullest extent permitted under applicable law, you waive your moral rights and promise not to assert such rights against the eBay Group, its sublicensees or assignees. You represent and warrant that none of the following infringe any intellectual property right: your provision of content to us, your posting of content using the PayPal Services, and the eBay Group’s use of such content (including of works derived from it) in connection with the PayPal Services.

Marketing

We may combine your information with information we collect from other companies and use it to improve and personalise the PayPal Services. If you don't wish to receive marketing communications from us or participate in our ad-customisation programmes, simply log in to your account, select My Account, Profile, then My account settings and update your Communication preferences, or follow the directions provided with the communication or advertisement.

Disclosure to Other PayPal Customers

If you are a registered PayPal user, your name, email address, Skype ID (if applicable), phone number (if applicable) date of sign-up, the number of payments you have received from verified PayPal users, and whether you have been verified to have control of a bank account are made available to other PayPal customers whom you have paid or senders who are attempting to pay you using the PayPal Services. If you are a Business account holder, we will also display to other PayPal customers the website address (URL) and customer service contact information that you provide us. In addition, this and other information may also be shared with third parties when you use these third parties to access the PayPal Services. However, your credit card number, bank account and other financial information will not be revealed to anyone whom you have paid or who has paid you through the PayPal Services or third parties that use the PayPal Services, except with your express permission or if we are required to do so pursuant to credit card rules, a court order or other legal process.

If you are buying goods or services and pay through PayPal, we may provide the seller with the delivery address for the goods and your billing address to complete your transaction. If an attempt to pay your seller fails, or is later invalidated, we may also provide your seller with details of the unsuccessful payment. To facilitate dispute resolutions, we may provide a buyer with the seller's address so that goods can be returned to the seller.

If you are using the PayPal POS Functionality on your mobile app, we may share your picture that you have stored with your mobile app with the seller with whom you are attempting to transact in order to verify your identity, as well as the fact that that you are within local reach as a customer.

If you use PayPal as means of logging into external websites or mobile apps, we may share your login status with any third party offering this Service as a login method, as well as the personal and other Account information that you consent to being shared so that the third party can recognise you. PayPal will not give such third party access to your PayPal Account and will only make payments from your Account to that third party with your specific authorisation. You can access, view and control the settings for any such data sharing with merchants when logged into your PayPal account.

If you link your membership of an eligible loyalty scheme to your Account in our mobile app, we may share your loyalty scheme membership ID with any merchant participating in the relevant loyalty scheme when you pay that merchant using PayPal. If you remove your loyalty scheme membership ID from your Account, we will stop sharing this information.

We work with third parties including merchants to enable them to accept or facilitate payments from or to you using the PayPal Services. In doing so, a third party may share information about you with us such as your email address or phone number, when a payment is sent to you or when you are attempting to pay that third party. We use this information to confirm that you are a PayPal customer and that PayPal can be enabled to make a payment, or where a payment is sent to you to send you a notification that you have received a payment. Also, if you request that we validate your status as a PayPal customer with a third party, we will do so. Please note that third parties you buy from and contract with may have their own privacy policies, and PayPal is not responsible for their operations, including but not limited to their information practices.

By accepting this Privacy Policy, you expressly agree and consent that each time you pay or attempt to pay another PayPal customer(including a merchant) using your PayPal account, PayPal may transfer the aforementioned relevant data to such PayPal customer, who may be located outside the European Economic Area (EEA), in order to process, execute or otherwise deal with and provide information about the payment. You also expressly agree and consent to PayPal providing transactional information and other information necessary for the use of a PayPal mobile application (including point of sale products) to a merchant or another PayPal customer who you have explicitly selected or chosen using the PayPal mobile application or point of sale product.

If you open a PayPal account directly on a third- party website or via a third party application, any information that you enter on that website or application (and not directly through the PayPal Services) will be shared with the owner of such third party website or application and your information may be subject to their privacy policies.

Disclosure to Third Parties other than PayPal Customers

PayPal will not sell or rent any of your personal information to third parties for their marketing purposes without your explicit consent, and will only disclose this information in the limited circumstances and for the purposes described in this policy. This includes transfers of data to non-EEA member states. Specifically, you consent to and direct PayPal to do any and all of the following:

Disclose information including, without limitation, transaction information, account information, personal information and the contents of communications to: the police; security forces; competent governmental, intergovernmental or supranational bodies; competent agencies (other than tax related authorities), departments, regulatory authorities, self-regulatory authorities or organisations (including, without limitation, the Agencies set out in the table under the heading "Agencies" below); and other third parties, including Group companies, that we in good faith believe it is appropriate for us to cooperate with in investigations of fraud or other illegal activity or potential illegal activity, or to conduct investigations of violations of our User Agreement (including without limitation, your funding source or credit or debit card provider). If false or inaccurate information is provided by you and fraud is identified, details will be passed by us to fraud prevention agencies and law enforcement agencies may access and use that information. We and other organisations may also access and use (including from other countries) this information and the information recorded by fraud prevention agencies to prevent fraud and money laundering. Please contact us if you want to receive further details of the relevant fraud prevention agencies.
Disclose information in response to the requirements of the credit card associations or a civil or criminal legal process.
If you as a merchant use a third party to access or integrate PayPal, we may disclose to any such partner the status of your PayPal integration, whether you have an active PayPal account and whether you may already be working with a different PayPal integration partner.
Disclose information to the "Categories" of third parties listed in the table below. The purpose of this disclosure is to allow us to provide our services to you. We also set out in the table below, under each "Category", non-exclusive examples of the actual third parties (which may include their assigns and successors) to whom we currently disclose your account information or to whom we may consider disclosing your account information over the next six months, together with the purpose of doing so, and the actual information we disclose (except as explicitly stated, these third parties are limited by law or by contract from using the information for secondary purposes beyond the purposes for which the information was shared).
Category

Party Name and Jurisdiction (in brackets)

Purpose

Data Disclosed

Payment Processors

 
HSBC Bank Plc (UK, Ireland), HSBC Merchant Services LLP (UK), Bank of America (UK, USA, Italy, and India), Discover Financial Services (USA), JPMorgan Chase Bank (UK, USA), BNP Paribas (France), Netgiro (Sweden), StarFinanz (Germany), Wells Fargo (Ireland, USA), American Express (USA), National Westminster Bank PLC (UK), OmniPay Limited (Ireland), Australia and New Zealand Banking Group Limited (Australia), ANZ National Bank Limited (New Zealand) and Transaction Network Services (UK) Limited (UK)

To allow payment processing settlement services, and fraud checking.

Name, address, details of user funding instruments, and details of payment transactions.

 
Deutsche Bank AG (Germany, Netherlands, France, Spain)

To allow the processing of direct debits in Germany, Netherlands, France and Spain.

Name, date of transaction, amount, currency and user’s bank account information.

 
Royal Bank of Scotland plc (UK) (“RBS”)

To allow payment processing and dispute handling for transactions of PayPal users when those users transact with a merchant who uses the PayPal service via the RBS service.

All account information except details of user financial instruments.

 
Visa Europe Ltd (UK) including Visa’s VMAS system; Mastercard International Incorporated. (USA) including Mastercard’s MATCH system

To share risk and fraud information in the mandatory credit card company’s database regarding the conduct of a merchant’s account thereby reducing exposure to fraud and breaches of scheme rules and standards.

All account details of merchant account, and circumstances and conduct of the account

Audit

 
PricewaterhouseCoopers Sΰrl (Luxembourg)

To test PayPal’s Anti Money Laundering (AML) and Know Your Customer (KYC) controls and to carry out professional auditing services for PayPal Inc. and its subsidiaries.

For a sample of individual customer accounts:
name, PayPal account number (Customer ID), total amount received on the PayPal account, total amount sent from the PayPal account, type of PayPal account, and, as the case may be, any other relevant account information.

Customer Service Outsourcing

 
Sutherland Global Services Inc. (USA and Philippines), Sitel GmbH (Germany), Transcom Worldwide SAS (France, Tunisia), Transcom Worldwide France SAS (France), Transcom Worldwide SpA (Italy), Competence Call Center Leipzig GmbH (Germany), Convergys Customer Management Group Inc. (USA), Arvato Direct Services GmbH (Germany) and Concentrix Europe Limited (UK)

To allow telephone and email customer support services.

Name, address, phone number, email addresses, truncated and limited or full funding source information (case dependent), funding source expiration dates, type of PayPal account, proof of identity, account balance and transaction information, customer statements and reports, account correspondence, shipping information, and promotional information.

 
Nuance Communications Inc. (USA)

To calibrate and optimise speech recognition performance for telephone customer support services.

Recordings of a sample of customer support telephone calls, which may include any or all account information transmitted during the call.

 
ICT Group Inc. (US)

To perform and facilitate telephone customer support.

Name, address, phone number, and PayPal account number.

 
Lithium Technologies Inc. (USA)

To provide member-to-member platform services and customer service on our customer community platforms.

Name, email address, PayPal single sign on ID (PayPal SSN ID)



Attensity Europe GmbH

To provide customer services arising from customer contacts to PayPal on social media channels.

Information provided by the customer via social media channels which may include name, address, phone number, email addresses, social media user names, truncated and limited or full funding source information (case dependent), funding source expiration dates, type of PayPal account, proof of identity, account balance and transaction information, customer statements and reports, account correspondence, shipping information, and promotional information.

 
ILinc Communications, Inc. (USA)

To provide webinars (online seminars) to merchants on ILinc’s platform.

Name, email address of merchants

 
ePerformax Contact Centers & BPO (USA), Genpact International Inc. (USA)

To provide customer services regarding payments globally.

Name, address, phone number, email addresses, truncated and limited or full funding source information (case dependent), funding source expiration dates, type of PayPal account, proof of identity, account balance and transaction information, customer statements and reports, account correspondence, shipping information, and promotional information.

Credit Reference and Fraud Agencies

Please note that in addition to the stated purposes below, PayPal uses your personal information to detect, prevent, and/or remediate fraud or other illegal actions, or to detect, prevent or remediate violations of policies or applicable user agreements.

 
CRIF (Italy), Cerved B.I (Italy), Coface (France), Synectics Solutions Limited (UK), MCL Hunter (UK), GB Group plc (UK), Graydon (UK), iQor Recovery Services Limited (UK), Capita Plc (UK),UK Data Limited (UK), ICC Information Limited (UK), Payment Trust Limited (UK), 192.com (UK), 192.com Limited (UK), i-CD Publishing (UK) Limited (UK), Experian Netherlands BV (Netherlands), Experian Bureau de Credito SA (Spain), Informa D&B SA (Spain), and CRIBIS D&B S.r.l. (Italy).

To verify identity, verify linkage between a customer and its bank account or credit/debit card, assist in making decisions concerning a customer’s credit worthiness (including without limitation, in relation to credit products offered by PayPal), carry out checks for the prevention and detection of crime including fraud and/or money laundering, assist in debt recovery, manage PayPal accounts and undertake statistical analysis, undertake research and testing as to appropriateness of new products and services and system checking.

Please note that data disclosed to these agencies may be retained by the applicable credit reference and fraud agency for audit and fraud prevention purposes.

Name, address, phone number, email address, date of birth, length of time at address, proof of identity, legal form, length of time in business, company registration number, VAT number, funding instrument including bank account and credit /debit card details (if appropriate) and relevant transaction information (if appropriate).

 
Callcredit plc. (UK) including the SHARE database administered by Callcredit, Experian Limited (UK) including databases administered by Experian used for consumer and commercial referencing including CAPS credit searches and CAIS credit account performance data, Equifax Ltd (UK) including the Insight database administered by Equifax, Dun & Bradstreet Limited (UK)

To verify identity, verify linkage between a customer and its bank account or credit/debit card, make decisions concerning a customer’s credit worthiness (including without limitation, in relation to credit products offered by PayPal), carry out checks for the prevention and detection of crime including fraud and/or money laundering, assist in debt recovery, manage PayPal accounts and undertake statistical analysis, undertake research and testing as to appropriateness of new products and services and system checking.

For users of the UK products “Website Payments Pro”, “Virtual Terminal” and “PayPal Here” and UK merchants only:
• to report defaults and supply monthly account performance information, where the account shows an amount owing to us (reflected as a negative balance) for three or more consecutive months, to the databases of these third parties; and
• for the purposes set out in section 8 of this Privacy Policy.

Please note that data disclosed to these agencies and databases may be:
• retained by the applicable credit reference agency or database for audit and fraud prevention purposes;
• disclosed to other financial institutions for the purpose of gauging creditworthiness; and
• transferred outside of the EU and on a global basis.

Name, address, phone number, email address, date of birth, length of time at address, proof of identity, legal form, length of time in business, company registration number, VAT number, funding instrument including bank account and credit /debit card details (if appropriate), relevant transaction information (if appropriate), account balance, all information supplied and used for your application for the UK products “Website Payments Pro”, “Virtual Terminal” and “PayPal Here” and the financial instrument used to pay for your PayPal Here- enabled device.

 
CIFAS (UK) and the CIFAS database

For users with UK PayPal accounts only: to prevent and detect fraud (which may include checking details on job applicants and employees and on proposals and claims for all types of insurance).

Please note that data disclosed to this database may be:

• retained by the database for audit and fraud prevention purposes;
• disclosed to other financial institutions for the purpose of fraud prevention and detection (including to prevent money laundering) for example, when checking details on applications for credit and other facilities, managing credit and credit related accounts or facilities, recovering debt, checking details on claims for insurance and checking details of job applicants or employees;

• used to determine your risk profile and for cooperation with the relevant authorities in compliance with the requirements of the Luxembourg Law of 5 April 1993 on the financial sector and laws relating to the prevention of money laundering, terrorism and fraud (excluding the treatment of personal data in relation to solvency of the persons referred to in article 14(1)(d) of the Luxembourg Law of 5 April 1993 on the financial sector); and
• transferred outside of the EU and on a global basis.

All account details and circumstances of the conduct of the account

 
Deltavista GmbH (Germany)

Establish risk associated with address, identity; assist in making decisions concerning a customer’s credit worthiness; research and testing as to appropriateness of new products and services.

Name, address, date of birth, email address

 
Accumio Finance Services GmbH (Germany), CEG Creditreform Boniversum GmbH (Germany), Bόrgel Wirtschaftsinformationen GmbH & Co. KG (Germany)

To verify identity and address and retrieve contact phone numbers and addresses, establish risk associated with address, identity; research and testing as to appropriateness of new products and services.

To assist in making decisions concerning the credit worthiness of consumers (if they have a German PayPal account and have specifically consented to such check) and merchants, including without limitation, in relation to credit products offered by PayPal and offering direct debit payments as payment method.

The creditworthiness scores that we request from these agencies that include scores that are calculated according to mathematical-statistical procedures.

Please note the fact that PayPal requested such information, and any negative account performance data disclosed to these databases in relation to customers who have a German PayPal account may potentially be:

• retained by the database for audit purposes and for scoring of such customer’s creditworthiness;
• any such score may be disclosed to other third parties for the purpose of gauging creditworthiness.

and
• transferred outside of the EU and on a global basis.

Name, address, date of birth, email address, account status, account balance, and in case the transfer of such information is legally justified, also certain information on negative account performance of a customer with a German PayPal account, for which PayPal has requested a creditworthiness check from the respective database.

 
SCHUFA Holding AG (Germany), infoscore Consumer Data GmbH (Germany)

To verify a customer's identity and address, carry out checks for the prevention and detection of failing direct debit payments, and of crime including fraud and/or money laundering, including checks on the linkage of the customer and its bank account, to help determine creditworthiness of consumers (if they have a German PayPal account and have specifically consented to such check) and of merchants, and for research and testing as to appropriateness of new products and services.

The creditworthiness scores that we request from these agencies include scores that are calculated according to mathematical-statistical procedures.

Please note the fact that PayPal requested such information, and any negative account performance data disclosed to these databases in relation to customers who have a German PayPal account may potentially be:

• retained by the database for audit purposes and for scoring of such customer’s creditworthiness;
• any such score may be disclosed to other third parties for the purpose of gauging creditworthiness

and
• transferred outside of the EU and on a global basis.

Further, in relation to customers who have a German PayPal account, the information on a failed direct debit payment may be:

• retained by the infoscore database for audit purposes; and

• (without linkage to the customer’s identity) disclosed to other third parties for the purpose of preventing failed direct debit payments.

Name, address, email address, date of birth, gender, bank account details, information on failed direct debit payments from a bank account (without linkage to the identity of the customer), and in case the transfer of such information is legally justified, also certain information on negative account performance of a customer with a German PayPal account.

 
Creditreform Berlin Wolfram KG (Germany), Verband der Vereine Creditreform e.V. (Germany)

To determine creditworthiness of merchants.

Name, address, email-address.

 
World-Check (UK)

To verify identity.

All account information.

 
Global Data Corporation (USA)

To verify identity, carry out checks for the prevention and detection of crime including fraud, research and testing as to appropriateness of new products and services.

Name, address, date of birth, telephone number, email address

 
RSA Security Inc. (USA) and RSA Security Ireland Limited (Ireland)

To verify identity.

All account information.

 
ID Checker.nl BV (Netherlands) (Ireland)

To verify identity; research and testing as to appropriateness of new products and services.

Name, address, email address, date of birth, legal form, company registration number, VAT number, proof of identity, address, or other documents requested by PayPal and the data contained therein for Risk / Compliance purposes.

 
Aristotle International, Inc. (USA)

To verify identity.

Name, address, date of birth

 
Acxiom Ltd (UK), Acxiom Deutschland GmbH (Germany) and Acxiom France SAS (France)

To verify identity.

Name, address, phone number, email address and date of birth.

 
Creditinfo Decision (Czech Republic) and DecisionMetrics Limited (UK)

To assist with PayPal’s assessment of merchant risk.

All merchant account information.

 
ThreatMetrix Inc (USA)

To retrieve risk information regarding the IP and device from which you are accessing PayPal, research and testing as to appropriateness of new products and services.

IP and hardware information about the device (device ID)

 
TeleSign Corporation (USA)

To validate phone numbers, research and testing as to appropriateness of new products and services.

Telephone number

 
AddressDoctor GmbH (Germany),

To re-structure address data into normalized format.

Name, address, email address

 
Deutsche Post Direkt GmbH (Germany), AZ Direct GmbH (Germany), Deutsche Post Adress GmbH & Co. KG (Germany)

To validate and re-structure address data into normalized format and to verify name and address.

Name, address, email address

     
 
Mitek Systems Inc. (USA)

To validate images of identity documents and research and testing as to appropriateness of new products and services.

Proof of identity, details of bank accounts and credit/debit card information

 
Jumio Inc (USA)

To capture and validate proofs of identity and address

All data recorded on the customer’s identity and address documents

 
Au10tix Limited (Cyprus)

Automatic data extraction and document validation / forgery detection

Documents proving identity and address

 
Telovia SA (Luxembourg)

Identity validation and Know Your Customer (KYC) controls conducted for anti money laundering purposes

Name, address, date of birth, proof of ID and address

 
Syniverse Technologies, LLC (USA)

Validate and apply data quality checks to phone numbers (SMS message to be sent to the customer)

Name, address, phone number.

 
Signicat AS (Norway)

To verify and authenticate identity

Name, address, date of birth and e-id reference number

 
BankersAccuity Inc. (USA)

Research and testing as to appropriateness of new products and services in relation to the validation of the account data provided to us by the user and conversion of national account data information into IBAN

Customer’s bank account number and sort code and / or IBAN

 
ArkOwl LLC (USA)

To verify email address

Email address

 
Fraudscreen Ltd (UK)

To evaluate level of fraud risk

Name and address

 
LexisNexis, LexisNexis Risk Solutions UK Limited (UK)

To assist with customer authentication

Name, address and date of birth

 
Trustev Ltd (Ireland)

To establish identity through customer’s social media data, connections and credentials

Name, address, date of birth, email address and account number

 
Tracesmart Ltd (UK)

To identify customers and assist with fraud detection, prevention, and or remediation of fraud, or other illegal actions or to detect, prevent or remediate violations of policies or the applicable user agreements.

Title, name, address, date of birth and telephone number

 
Zoot Enterprises, Inc. (USA), Zoot Deutschland GmbH (Germany), Zoot Enterprises Limited (UK)

To process technical applications and to provide a data and document gateway for account review and vetting purposes, and to exchange user information to contracted fraud and credit reference agencies. To also aggregate data from internal and external data sources and provide statistical analysis in order to assess the risk of fraud.

All account information and documents supplied by customers, to include information used to provide identity and address. This information may also include IP addresses.

 
First Data Corporation (USA)

To process merchant-initiated and customer-authorized transactions and to provide account/card processing services, to store transaction, payment and other customer data related to those transactions.

All account information and documents supplied by customers, to include information used to provide identity and address.

 
La Banque de France (France), GB Group plc (UK), SysperTec Communication (France)

Research and testing as to appropriateness of new products and services used to establish risk associated with address, identity, and associated with a customer’s credit worthiness.

Name, address, date of birth, phone number, email address



MaxMind, Inc. (USA)

To detect fraud.

Please note that data disclosed to this service provider may be:
• retained by it for audit and fraud prevention purposes;
• used by it for the purpose of optimising its fraud detection services provided to PayPal and other third parties; and
• transferred outside of the EU and on a global basis.

All account information and IP address, credit card information.



Future Route Ltd (UK)

To carry out accounting data analysis of our commercial users for real time credit-risk evaluation.

Name, address, email address and date of birth.

Financial Products

 
La Poste (France)

To resolve technical issues and user claims (when PayPal is being offered by the merchant through La Poste’s payment solution).

Any Account information necessary to resolve the issue or claim

 
Santander UK Cards Limited (UK)

To conduct joint marketing campaigns for PayPal Credit, and PayPal MasterCard, risk modelling, enforce terms and conditions for PayPal Credit and PayPal MasterCard.

Name, address, email address and account information (including, without limitation, account status).

 
TSYS Card Tech Limited (UK), TSYS Managed Services EMEA Limited (UK), PrePay Technologies Limited (trading as PrePay Solutions) (UK)

To conduct joint marketing campaigns for PayPal pre-paid card and risk and fraud modelling and to enforce terms and conditions for PayPal prepaid card.

Name, address, email address, date of birth and account information.

 
Sociιtι Gιnιrale (France), La Banque Postale (France), BNP Paribas (France) and Crιdit Mutuel (France)

Billing purposes.

Only for merchants using PayPal through the partner’s payment solution: merchant ID, number of PayPal transactions, transaction volume with PayPal and, as the case may be, termination of the PayPal account.

 
Findomestic Banca (Italy), Cetelem S.A., Cofidis (France) and Cofinoga S.A. (France)

Registration of the credit card issued by the credit company on the user’s PayPal account and the processing of funding requests made by the same user.

Name, email address, date of birth (as the case may be), credit card number, expiry date, three digit Card Security Code (as the case may be) and amount of the funding request and any account information necessary for fraud or dispute resolution.

 
Total System Services, Inc. (USA)

To process merchant initiated and customer authorised payments (including customer direct debit information) to provide account/card processing services, to store transaction, payment and other customer data related to those transactions. To provide call centre services, card printing, and statement printing services.

Name, address, email address, date of birth (where required), all account information and documents supplied by customers, to include information required to prove identity and address.

 
United Kapital Limited (UK) and United Kapital Limited, LLC (USA)

To enable you (or the merchant with which you transact) to use products issued by United Kapital with PayPal.

Only for PayPal merchants applying for and using products issued by United Kapital Limited: Name, business name, address, date of birth, copies of identification documents, PayPal identification (merchant ID), email address, phone number, transaction information (including, without limitation, number of PayPal transactions and transaction volume with PayPal), length of time as a PayPal user and, as the case may be, termination of the PayPal account.
For customers of those merchants: transaction information, name, email address, phone number, address and PayPal identification number.

Commercial Partnerships

 
Royal Mail Group Plc. (UK) and Pitney Bowes Inc. (USA)

To provide automated label printing for sellers using PayPal and eBay to facilitate postal and delivery services, including payment reconciliation services.

Name, address, email address and postage transaction amount.

 
Trustwave (USA)

To provide customised services and assistance to Merchants using PayPal, and to facilitate the process of becoming PCI DSS compliant.

Name, email address and PayPal account number.

Marketing and Public Relations

 
Decipher Inc. (USA), Northstar Research Partners (USA)

To conduct customer service surveys.

Name, email address, type of account, type and nature of the PayPal services offered or used, and relevant transaction information.

 
Ipsos Mori UK Limited (UK), Ipsos GmbH (Germany), Ipsos SAS (France) and FactWorks GmbH (Germany)

To conduct customer service and marketing surveys.

Name, email address, phone number, type of account, type and nature of the PayPal services offered or used, and relevant transaction information.

 
Adwise (France) and Axance (France)

To conduct marketing surveys.

Name, email address, phone number, type of account, type and nature of the PayPal services offered or used, and relevant transaction information.

 
BD Network Limited (UK), Tullo Marshall Warren Limited (UK), and MyCash (France)

To develop and execute customer promotions.

Name, address and email address.

 
Salesforce.com, inc. (USA)

To store merchant contact information as well as other supporting information about the business relationship.

Name, address, phone number and email address, business name, URL PayPal Account ID and other supporting information about the business relationship, such as (without limitation) name of contact person and contact information at merchant and/or partner through which merchant has been onboarded, description of products sold through PayPal, communication notes and onboarding information, internal decisions about the merchant, revenue calculations and other information on the merchant’s business as made available by the merchant, and information relevant for special integrations of merchants, name and address of bank.

 
Daniel J Edelman Ltd (UK), I&E Consultants (France), Grayling Communications Limited (UK), Rock Communications (Italy), Fleisher (Israel), Clue PR (Poland).

To answer media enquiries regarding customer queries.

Name, address, and all customer account information relevant to customer queries.

 
Alchemy Worx Ltd (UK)

To allow management reporting of marketing campaigns.

Name, email address and details of customer campaign interaction.

 
Carrenza Limited (UK)

To store user data for marketing campaigns.

Name, address, email address, business name, domain name, account status, account preferences, type and nature of the PayPal services offered or used, and relevant transaction information.

 
1000Mercis SA (France) and 1000Mercis Ltd (UK)

To store user data to conduct marketing campaigns on behalf of PayPal.

Name, email address, phone number, type of account, type and nature of the PayPal services offered or used, and relevant transaction information.

 
A McLay & Company Limited (UK), TNT Post Italia (Italy)

To assist in the execution of offline direct mail and marketing campaigns.

Name, address, email address, business name, domain name, account status, account preferences, type and nature of the PayPal services offered or used, and relevant transaction information.

 
Datacolor Dialog-Medien GmbH (Germany), MEILLERGHP GmbH (Germany) and W & J Linney Ltd (UK)

To assist in the execution of offline direct mail and marketing campaigns.

Name, email address, address, business name, domain name, account status, account preferences, type and nature of PayPal services offered or used.

 
Medallia, Inc. (USA)

To conduct customer service surveys.

Name, email address, type of account, type and nature of the PayPal services offered or used, and relevant transaction information.

 
Endlichsommer- werbung in bester gesellschaft mbh (Germany) and Crossover Communication GmbH (Germany)

To assist in the execution of offline direct mail and marketing campaigns

Name, address, business name, type and nature of PayPal services offered or used.

 
optivo GmbH (Germany)

To send emails; email marketing

Name of the merchant, name of the contact person, email address, address, status, client ID and shop system

 
Acxiom France SAS (France), Acxiom Ltd (UK) and Acxiom GmbH (Germany)

To collect additional user information and better target marketing campaigns.

Name, address, email address, date of birth and phone number.

 
Adelanto (France)

To execute marketing campaigns for merchants.

Name of the merchant, name of the contact person, address, email address, merchant website URL and type and nature of the PayPal Services offered or used.

 
Business support services - b2s, SAS (France), Foule Access SAS (France)

To store merchants' contact information for marketing communications to those merchants.

Name of the merchant, name of the contact person, address, email address, phone number, merchant website URL.

 
Consultix (France and Spain) and Quadro Srl (Italy)

To host information provided by merchants and display part of this information on the pages of the PayPal website listing websites accepting PayPal and proposing special offers to PayPal users.

All information provided by merchants in connection with their use of these pages of the PayPal website (including in particular name of the merchant, name of the contact, email address, logo and information relating to the promotion(s) offered to PayPal users).

 
Appnexus, Inc. (US), BlueKai, Inc. (US), Conversant GMBH (Germany), Google Ireland, Ltd. (Ireland),DoubleClick Europe Ltd (UK).

To execute retargeting campaigns in order to deliver personalised advertising.

Anonymous ID generated by cookies, pixel tags or similar technologies embedded in webpages



Criteo SA (France)

To execute retargeting campaigns in order to deliver personalised advertising.

Anonymous ID generated by cookies, pixel tags or similar technologies embedded in webpages and emails delivered to users.



Linkedin Ireland Limited (Ireland)

To execute retargeting campaigns in order to deliver personalised advertising.

Encrypted e-mail address associated with PayPal users (without indicating account relationship).

 
Conversant Inc. (USA)

To execute and measure retargeting campaigns in order to identify visitors and redirect them though personalised advertising campaigns.

PayPal Account ID (as appropriate) as well as device ID used by a specific person, content of advertisements to be delivered and segmentation in a user group for advertisement purposes.



StrikeAd UK Ltd. (UK), Ad-x Limited (UK)

To execute and measure retargeting campaigns in order to segment users for PayPal Here marketing campaigns.

Anonymous cookie ID and device ID to segment user groups for marketing purposes.



Fiksu, Inc. (US)

To execute and measure retargeting campaigns in order to segment users for marketing campaigns involving PayPal mobile applications.

Device ID used for Apple’s iOS operating system when a user installs an application, signs up for the PayPal Services, logs in, checks in, or sets a profile picture.













Nanigans, Inc. (US)

To execute retargeting campaigns in order to deliver personalised advertising.

Advertising ID associated with Apple iOS devices when a user installs an application, relaunches an application, signs up for the PayPal Services, logs in, checks in, checks their balance, saves an offer, successfully completes a transaction, sets a profile picture, or makes other account changes in or related to the use of the application.

 
Heaven SAS (France)

To execute marketing campaigns for merchants.

Name of merchant, merchant website URL, description of item purchased and price of item.

 
Tenthwave Digital, LLC (USA)

To notify winners and prize fulfillment for winners of survey sweepstakes

Name and email address, for sweepstakes winners and alternates only.

 
Sotiaf Telematiques Associes SAS (France)

To store user data for marketing campaigns and to execute direct marketing campaigns.

Name, email address, and phone number.

 
2engage (Germany) and Quo Vadis (Germany)

To conduct market surveys.

Name, company name, address, telephone number, domain name, e-mail address, type and nature of use of PayPal services, market segment and generalised categorisation of company size and information on participation in earlier surveys.

 
Facebook, Inc (USA), Facebook Ireland Limited (Ireland) and Twitter, Inc. (USA)

To show relevant advertisements to Facebook and Twitter users (as the case may be).

Encrypted e-mail address associated with PayPal users (without indicating account relationship).

 
SurveyMonkey Spain, Sucursal em Portugal (Portugal) and SurveyMonkey.com, LLC (USA)

To assist in carrying out user surveys.

Name, email address and details of customer campaign interaction.

 
Marketing and Planning Systems, LLC. USA (USA), Dynamic Logic, Inc. (USA), GfK Custom Research LLC (USA), Millward Brown, Inc. (USA) and Radius Global Market Research, LLC (USA)

To conduct customer service and marketing surveys

Name, email address, type of account, type and nature of PayPal services offered or used, and relevant transaction information

 
Oracle America Inc. (USA)

To develop, measure and execute marketing campaigns.

Name, business name, address and registration number of merchant, name, job title, email address, phone number of merchant’s contact person, merchant website URL, PayPal account number, third party applications used by the merchant, behaviour on PayPal website.

 
Nanigans, Inc. (USA), Fiksu, Inc. (USA), Ad- X Limited (UK)

Help identify behaviour in the mobile app in order to guide decision about targeted marketing; to help efficiently handling and optimising mobile campaigns on social networks and elsewhere in the web

Device ID used by a specific person, events in the mobile app about the use of the mobile app by a specific user (including, without limitation, login, successful completion of the transaction), but no payment and financial information details.

Content of advertisements to be delivered to specific users and, as appropriate, segmentation group to which such person belongs to for advertisement purposes.

 
Zeuner S.p.A. (Italy), Accueil Srl (Italy) and CallCenterNet Italy s.r.l. (Italy)

To store merchants' contact information for marketing communications to those merchants.

Name of the merchant, name of the contact person, address, email address, phone number, merchant website URL.

 
Purepromoter Ltd t/a Pure360

To send service related and (depending on opt-in settings) promotional SMS messages to PayPal users.

Mobile Number, name, address, email address, business name, business contact details, domain name, account status, account type, account preferences, type and nature of the PayPal services offered or used and relevant transaction and account information

 
Pepper Global (Germany)

To execute marketing campaigns for existing merchants and prospects

Mobile Number

Operational services

 
Kanzlei Dr. Seegers, Dr. Frankenheim & Partner Lawyers (Germany, Austria, Switzerland), Akinika Debt Recovery Limited (UK), Capita Plc (UK), Compagnie Francaise du Recouvrement (France), Clarity Credit Management Solutions Limited (UK), eBay Europe Services SARL (Luxembourg); EOS Solution Deutschland GmbH (Germany), EOS Aremas Belgium SA/NV (Belgium), EOS Nederland B.V. (Netherlands), Arvato Infoscore GmbH (Germany), , Infoscore Iberia (Spain), , SAS (France), Transcom WorldWide S.p.A. (Italy), Transcom Worldwide SAS (Tunisia), Intrum Justitia S.p.A. (Italy),

To collect debt.

Name, address, phone number, account number, date of birth, email address, account type, account status, last four digits of financial instruments account, sort code, account balance, details of account transactions and liabilities, name of funding source provider and copies of all correspondence in each case relating to amounts you owe (or another person owes) to us.

 
KSP Kanzlei Dr. Seegers (Germany), BFS Risk & Collection GmbH (Germany); HFG Hanseatische Inkasso- und Factoring-Gesellschaft (Germany),BFS Risk and Collection GmbH (Germany), Team 4 Collect (Spain), Arvato Polska (Poland), BCW Collections Ireland Ltd (Ireland), S.C. Fire Credit S.R.L. (Romania), Gothia Financial Group AB (Sweden), Gothia AS (Sweden), Gothia A/S (Denmark), Gothia Oy (Finland), Credit Solutions Ltd (United Kingdom).

To collect debt; to handle reporting to credit reference agencies about defaulting customers.

Name, address, phone number, account number, date of birth, email address, account type, account status, last four digits of financial instruments account, sort code, account balance, details of account transactions and liabilities, name of funding source provider, applicable details of account behaviour and copies of all correspondence (including without limitation, all correspondence relevant for reporting to credit reference agencies) in each case relating to amounts you owe (or another person owes) to us.

 
Begbies Traynor Group plc (UK), Moore Stephens LLP (UK), Moore Stephens Ltd (UK), Moore Stephens International Ltd (UK), Moorhead James LLP (UK), Comas Srl (Italy), RBS RoeverBroennerSusat GmbH & Co. KG (Germany), LLC Elitaudit (Russia), National Recovery Service (Russia).

To investigate (including, without limitation, to carry out asset and/or site inspections and/or business evaluations) and/or collect (and/or assist with the collection of) debt from potentially and actually insolvent customers

Name, address, phone number, account number, date of birth, email address, account type, account status, last four digits of financial instruments account, sort code, account balance, details of account transactions and liabilities, name of funding source provider and copies of all correspondence, in each case relating to amounts you owe (or another person owes) to us.

 
Webbank (USA)

Only for customers who are also customers of Bill Me Later, Inc.: to help with accounting and recovery services

Name, address, phone number, account number, date of birth, email address, account type, account status, last four digits of financial instruments account, sort code, account balance, details of account transactions and liabilities, and name of funding source provider.

 
Digital River Inc. (USA) and Research in Motion Limited (USA)

To enable you to access and use PayPal via a mobile device (for example mobile phone or PDA).

Applicable details of your account information which are transmitted as part of your use of PayPal via a mobile device.

 
mediafinanz AG (Germany)

To collect debt, to request and proceed information from and to Schufa, Buergel and other credit reference and fraud agencies for PayPal

Name, address, phone number, account number, date of birth, business name, email address, account type, account status, last four digits of financial instruments account, account balance, details of account transactions and liabilities, name of funding source provider, credit score received from agency, account performance data

 
Zyklop Inkasso Deutschland GmbH (Germany), PNO inkasso AG (Germany), Hanseatische Inkasso-Treuhand GmbH (Germany)

To collect and manage debt, to support collections teams in case of insolvent customers

Name, address, phone number, account number, email address, account type, account status, last four digits of financial instruments account, sort code and name of funding source provider, account balance, date and amount of last payment, results of creditworthiness checks

 
Informa Solutions GmbH (Germany)

To request and proceed information from and to Schufa, Buergel and other credit reference and fraud agencies in and from and to ID Checker

Name, date of birth business name, legal form, address, email address, company registration number and VAT number.

For the purpose of verification of identity also: other information contained in documents requested by PayPal for Risk / Compliance purposes.

For customers with a German PayPal account also: phone number, length of time at address, length of time in business, length of time with PayPal, funding instrument including bank account and credit /debit card details and relevant transaction information, credit score received on behalf of PayPal from a credit reference agency, account number, account type, account status, account balance, details of account transactions and liabilities, negative account performance data.

 
P K Consultancy Limited (UK)

To assess risk and help detect and prevent potentially illegal acts and violations of policies.

Name, address, phone number, account number, email address, account type, last four digits of financial instruments account, account balance, details of account transactions and liabilities, account status and account performance information as required for the Purpose

 
Robertson Taylor Insurance Brokers Limited (UK)

Consultation with respect to risk assessment of specific merchants and merchant transactions

Name, address, phone number, account number, business contact details, domain name, email address, account type, account balance, details of account transactions and liabilities, account status and account performance information as required for the Purpose.

 
Yesmail Inc. (USA), Responsys (USA), Silverpop Systems Inc. (USA) and e-Dialog, Inc. (USA)

To fulfil email operations in respect of the PayPal services (including, but not limited to, operations, customer services, collections, marketing programmes and promotions).

Name, address, email address, business name, business contact details, domain name, account status, account type, account preferences, type and nature of the PayPal services offered or used and relevant transaction and account information.

 
Blue Media S.A. (Poland)

To verify identity and ensure that a user is a PayPal account holder. To process instant funding requests made by a user through the Blue Media services.

Name and email address.

 
Consultix GmbH (Germany)

To assist in the creation of PayPal Business Accounts for merchants on-boarding through their bank's or other contract partner payment or service gateway.

All information provided by the merchant (directly or via his/her bank or other contract partner) for the purpose of creating his/her PayPal business account (including without limitation email address, address, business name, business contact details and bank account details).

 
Akamai Technologies Inc. (USA)

Content delivery network – to deliver PayPal page content from local servers to users.

User IP address and cookies.

 
azionare GmbH (Germany)

To distribute prizes in prize promotions on Facebook.

Name, email address.

 
ITELLIUM mobile Solutions GmbH (Germany); CartaSi S.p.A - Gruppo ICBPI (Italy)

To assist in the production of innovative payment methods (e.g. applications) and processing of payments through such innovative payment methods.

All account information.

 
Trustwave Holdings Inc. (USA)

To provide PCI compliance validation services for merchant accounts and merchant integrations.

Business name, address, account number, merchant type, compliance program used, PCI Level, PCI Status, PCI Expiry, name, email address, phone number of merchant’s contact person

 
Zoot Enterprises, Inc. (USA), Zoot Deutschland GmbH (Germany), Zoot Enterprises Limited (UK)

To process technical applications and to provide a data and document gateway for account review and vetting purposes, and to exchange user information to contracted fraud and credit reference agencies.

All account information and documents supplied by customers such as proofs of identity and address

 
RR Donnelley and Sons Company (USA)

To provide printing services such as statements and other printed materials

Name, address, email address, and account information

 
Scorex (UK) Limited (UK)

To provide a technology solution to allow PayPal to process, send and receive credit information of users via its contracted credit reference agencies.

Name, address, email address, date of birth, length of time at address, phone number, legal form, length of time in business, company registration number, VAT number (if appropriate).

 
OXID eSales AG (Germany)

Services in connection with the development and operation of a payment system for stationary trade (point of sale)

All account information and transaction information (as appropriate).

 
Ordermotion, Inc. (USA)

To collect data and create/deliver (direct to customer) orders for the PayPal Here product (including, without limitation, the PayPal Here-enabled device).

Name, address, email, phone number, credit card information and PayPal Payer ID.

 
Ingram Micro, Inc. (USA) and Ingram Micro (UK) Limited (UK)

To act as PayPal's fulfilment distributor for the PayPal Here product (including, without limitation, the PayPal Here-enabled device).

Name and address.



Interxion Datacenters B.V.

To provide data centre operations support for the Bill Safe credit product.

All relevant account information and transaction information (as appropriate).

Group companies

 
PayPal Inc. (USA)

Acting on behalf of PayPal for the purposes of storing and processing of account information.

All account information.

 
PayPal Europe Services Limited (Ireland), eBay Europe Services Limited (Ireland), PayPal Malaysia Services Sdn Bhd (Kuala Lumpur), PayPal Israel Ltd (Israel), PayPal India Private Limited (India), PayPal (UK) Ltd (UK), PayPal France S.A.S. (France), PayPal Deutschland GmbH (Germany), PayPal Spain SL (Spain), PayPal Italia Srl (Italy), PayPal Nederland BV (Netherlands), PayPal European Marketing SA (Switzerland), PayPal Polska Sp Zoo (Poland), PayPal Bilisim Hizmetleri Limited Sirketi (Turkey), PayPal International Sarl (Luxembourg) and PayPal SE (UK)

Acting on behalf of PayPal for the purpose of customer support, risk assessment, compliance and/or other back office.

All account information.

 
PayPal Pte. Ltd. (Singapore)

Acting for the account of PayPal by entering into and performing non-customer contracts which involve customer data.

All account information.

 
eBay Inc. (USA), eBay Europe S.ΰ r.l. (Luxembourg),eBay Services S. ΰ r.l. (Luxembourg), eBay International AG (Switzerland), eBay Corporate Services GmbH (Germany), eBay France SAS (France), eBay (UK) Limited (UK), eBay CS Vancouver Inc. (Canada), eBay Partner Network Inc. (USA), eBay Internet Support (Shanghai) Co Ltd (China), eBay Enterprise Marketing Solutions (USA) (formerly GSI Commerce, Inc (USA), VendorNet Inc (USA), PepperJam Network (USA), , GSI Media Inc. (USA), M3 Mobile Co., Ltd. (Korea), MBS (USA), ClearSaleing (USA), True Action Network (USA), True Action Studio (USA)),GumTree.com Limited (UK), Kijiji International Limited (Ireland), Kijiji US Inc. (USA), mobile.de & eBay Motors GmbH (Germany), Shopping.com Inc. (USA), Shopping Epinions International Limited (Ireland), PayPal Australia Pty Limited (Australia), Marktplaats B.V. (Netherlands), PayPal Charitable Giving Fund (USA), PayPal Giving Fund UK (UK), Tradera AB (Sweden), StubHub, Inc. (USA), Viva Group, Inc. (USA), StubHub Europe S.ΰ r.l. (Luxembourg), StubHub Services S.ΰ r.l. (Luxembourg), Viva Group, Inc. (USA), ProStores Inc. (USA), MicroPlace, Inc. (USA), Internet Auction Co., Ltd. (Korea), Via-Online GmbH (Germany), Bill Me Later, Inc. (USA), Zong Inc.(USA) and X.commerce, Inc. (USA).

To provide joint customers content and services (including, but not limited to registration, transactions, failover for carrier billing accounts, and customer support), to assess risk, or to help detect, prevent and/or remediate fraud, or other potentially illegal acts and violations of policies, and to guide decisions about their products, services and communications.

All account information.

Agencies

 
CSSF (Luxembourg), CNPD (Luxembourg), Financial Ombudsman Service (UK), Altroconsumo (Italy), European Consumer Centre Network organisations (located in Austria, Belgium, Bulgaria Czech Republic, Cyprus, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, and the UK), Les Mediateurs du Net (France), Risolvi Online (Italy) and BaFin (Germany)

To provide the Agencies listed with information within their authority (upon their request) and to respond to queries and/or investigations instigated by users or other stakeholders in the countries where they have jurisdiction.

All account information

For the purpose of this table, the phrase "All account information" includes: name, address, email address, phone number, IP address, machine ID, mobile phone ID and/or number, account number, account type, details of funding instruments associated with the account, details of payment transactions, details of commercial transactions, customer statements and reports, account preferences, details of identity collected as part of our "know your customer" checks on you, and customer correspondence.
With respect to the column titled, "Purpose", each third party, with the exception of the regulatory agencies, certain of the payment processors and credit reference and fraud agencies and group companies referred to at the end of this table, is carrying out the purpose to fulfil obligations which PayPal has contracted with the entity to fulfil. The regulatory agencies are carrying out their purpose in accordance with their regulatory objectives and requirements. Where explicitly specified in the table, the payment processors and credit reference and fraud agencies may use the information in their respective databases, and forward information to third parties for the purposes of fraud prevention and the assessment of creditworthiness, in accordance with their respective terms.
Disclose information to your agent or legal representative (such as the holder of a power of attorney that you grant, or a guardian appointed for you).
Disclose aggregated statistical data with our business partners or for public relations. For example, we may disclose that a specific percentage of our users live in Manchester. However, this aggregated information is not tied to personal information.

As with any other business, it is possible that in the future PayPal could merge with, or be acquired by, another company. If such an acquisition occurs, you consent to the successor company having access to the information maintained by PayPal, including customer account information, and such successor company would continue to be bound by this Privacy Policy unless and until it is amended.
Our Contact with PayPal Customers

We communicate with our users on a regular basis via email to provide requested services. We also communicate with our users by phone to:

resolve customer complaints or claims made by users via the PayPal Services;
respond to requests for customer service;
inform users if we believe their accounts or any of their transactions have been used for an illegitimate purpose;
confirm information concerning a user's identity, business or account activity;
carry out collection activities;
conduct customer surveys; and
investigate suspicious transactions.
We use your email or physical address to confirm your opening of a PayPal account, to send you notice of payments that you send or receive through PayPal (including referral payments described below), to send you information about important changes to our products and services, and to send notices and other disclosures required by law. Generally, users cannot opt out of these communications, but they will be primarily informational in nature rather than promotional.

We also use your email address to send you other types of communications that you can control, including "News from PayPal", auction tips, customer surveys and notice of special third-party promotions. You can choose whether to receive some, all or none of these communications when you complete the registration process, or at any time thereafter, by logging in to your account on the PayPal website, selecting My Account, Profile, then My account settings, and updating your Communication preferences.

We may communicate with you as described above by SMS (and SMS will be treated as an email for the purpose of managing your Communication preferences).

In connection with independent audits of our financial statements and operations, the auditors may seek to contact a sample of our customers to confirm that our records are accurate. However, these auditors cannot use personally identifiable information for any secondary purposes.

Your Use of Information and Our Services

In order to facilitate the transactions between PayPal users, our service allows you limited access other users' contact or delivery information. As a seller you may have access to the User ID, email address and other contact or delivery information of the buyer, and as a buyer you may have access to the User ID, email address and other contact information of the seller.

You agree that, with respect to other users' personally identifiable information that you obtain through the PayPal Services or through a PayPal-related communication or PayPal-facilitated transaction, you will only use this information for: (a) PayPal-related communications that are not unsolicited commercial messages, (b) ancillary actions in relation to the PayPal payments or the transactions for which PayPal has been used (e.g. insurance, delivery and fraud complaints), and (c) any other purpose that such user consents to after adequate disclosure of the purpose(s).

In all cases, you must provide users with the opportunity to remove their data from your database and review any information you have collected about them. More generally, you must comply with all applicable privacy regulations, in particular as they relate to the sending of marketing emails.

PayPal does not tolerate spam. We strictly enforce our Anti-Spam Policy. To report PayPal-related spam to PayPal, please contact us.

Back to top



5. Information Security
PayPal is committed to handling your customer information with high standards of information security. We use computer safeguards such as firewalls and data encryption, we enforce physical access controls to our buildings and files, and we authorise access to personal information only for those employees who require it to fulfil their job responsibilities.

For more information on PayPal's security practices, please see our Safety Advice.

The security of your PayPal account also relies on your protection of your PayPal password. You may not share your PayPal password with anyone. PayPal representatives will never ask you for your password, so any email or other communication requesting your password should be treated as unauthorised and suspicious and forwarded to spoof@paypal.com. If you do share your PayPal password with a third party for any reason, including because the third party has promised to provide you additional services such as account aggregation, the third party will have access to your account and your personal information, and you may be responsible for actions taken using your password. If you believe someone else has obtained access to your password, please change it immediately by logging in to your account and changing your Profile settings, and also contact us right away.
Back to top



6. Accessing and Changing Your Information
You can review the personal information you have provided us and make any desired changes to such information, or to the settings for your PayPal account, at any time by logging in to your account on the PayPal website, selecting My Account, then Profile and changing your preferences. You can also close your account through the PayPal website. If you close your PayPal account, we will mark your account in our database as "Closed", but will keep your account information in our database. This is necessary in order to deter fraud, by ensuring that persons who try to commit fraud will not be able to avoid detection simply by closing their account and opening a new account. However, if you close your account, your personally identifiable information will not be used by us for any further purposes, nor sold or shared with third parties, except as necessary to prevent fraud and assist law enforcement, or as required by law.

Back to top



7. Accountability
Our privacy office is responsible for ensuring that our day-to-day procedures comply with this Privacy Policy. If you want to exercise your right to access your information or have any questions about this privacy statement, PayPal's information practices, or your dealings with PayPal, you can contact us by using this form, or by calling the customer service number located on our website, or by writing to us at PayPal (Europe) S.ΰ.r.l. et Cie, S.C.A., 22-24 Boulevard Royal L-2449, Luxembourg.

Back to top



8. IMPORTANT DATA PROTECTION INFORMATION FOR USERS RECEIVING PAYMENTS THROUGH WEBSITE PAYMENTS PRO (INCLUDING VIRTUAL TERMINAL) AND/OR PAYPAL HERE*
* PayPal Here is PayPal POS Functionality within the PayPal Mobile App (as defined in our User Agreement) that enables a User to pay another User (typically a merchant) or anybody to make a direct card payment to that merchant, in each case for goods and services at a physical point of sale (for example, in store).

A GUIDE TO THE USE OF YOUR PERSONAL DATA BY PAYPAL (EUROPE) S.ΐ.R.L. ET CIE, S.C.A. AND CREDIT REFERENCE AGENCIES

SECTION 1: GENERAL INFORMATION ON OUR USE OF CREDIT REFERENCE AGENCIES

Q: What is a credit reference agency?

A: Credit reference agencies (CRAs) collect and maintain information on consumers' and businesses' credit behaviour, on behalf of financial institutions and lenders in the UK.

Q: Why do you use them when I have applied to your organisation?

A: Although you have applied to us, PayPal (Europe) S.ΰ.r.l. et Cie, S.C.A. and we will check our own records, we may also contact CRAs to get information on your, your financial and/or business associates’ and your business’ credit behaviour with other organisations. This will help us make the best possible assessment of your overall situation before we make a decision.

Q: Where do they get the information?

A: From publicly available sources, including:

- electoral registers maintained by local authorities;
- County Court Judgments records operated by Registry Trust Limited;
- bankruptcy information held by the Insolvency Service; and
- fraud information from fraud prevention agencies.

Credit information also comes from information on applications to banks, building societies, credit card companies etc and also from the conduct of those accounts.

Q: How will I know if my information is to be sent to a CRA or fraud prevention agency?

A: Organisations are only allowed to send information to CRAs and/or fraud prevention agencies with your agreement and knowledge. You will be told when you apply for Website Payments Pro or PayPal Here if your data will be supplied. The next section of this document will tell you how, when and why we search information at CRAs and what we do with the information we obtain from them. We will also tell you if we plan to send information on you or your business, if you have one, to CRAs.

Q: Why is my data used in this way?

A: We and other organisations want to make the best possible decisions we can, in order to make sure that you, or your business, will be able to carry out your obligations to us. We and other organisations may also use the information to check your identity. In this way we can ensure that we all make responsible decisions. At the same time we also want to make decisions quickly and easily and, by using up-to-date information, provided electronically, we are able to make the most reliable and fair decisions possible.

Q: Who controls what credit reference agencies are allowed to do with my data?

A: All organisations that collect and process personal data are regulated by the Data Protection Act 1998, overseen by the Office of the Information Commissioner. All credit reference agencies are in regular dialogue with the Commissioner. Use of the Electoral Register is controlled under the Representation of the People Act 2000.

Q: Can just anyone look at my data held at credit reference agencies?

A: No, access to your information is very strictly controlled and only those that are entitled to do so may see it. Usually that will only be with your agreement or (very occasionally) if there is a legal requirement.

SECTION 2: WHAT PAYPAL (EUROPE) S.ΐ.R.L. ET CIE, S.C.A. DOES

Please read this section very carefully.

When you apply to us for Website Payments Pro or PayPal Here we may:
Check our own records for information on your PayPal account(s).
Search at credit reference agencies for:
public data on your credit behaviour;
information on the conduct of your personal credit accounts if you are proprietors of a small business; and
information on your business accounts.
Search at fraud prevention agencies for information on you
What we do with the information you supply to us as part of the application:
Information that is supplied to us will be sent to credit reference agencies.
If you give us false or inaccurate information and we suspect fraud, we will record this and may also pass this information to financial and other organisations involved in fraud prevention to protect us, them and our respective customers from theft and fraud.
Your data may also be used by PayPal, to offer your business other products.
With the information that we obtain we will:
Assess your application for Website Payments Pro or PayPal Here;
Verify your identity and the identity of other directors/partners;
Undertake checks for the prevention and detection of fraud and/or money laundering;
Possibly use scoring methods to assess this application and to verify your identity;
Manage your PayPal account(s) with ourselves; and/or
Undertake periodic statistical analysis or testing to ensure the accuracy of existing and future products and services.
Any or all of these processes may be automated.
What we do when you have set up Website Payments Pro or PayPal Here:
Where you have access to and use Website Payments Pro or PayPal Here, we will give details of your PayPal account and other details of your use of Website Payments Pro or PayPal Here (as the case may be), including names and parties to the account, and how you manage it to credit reference agencies.
If you owe us money and do not pay in full and on time, we will tell credit reference agencies.
We may make periodic searches of our own group records, credit reference and fraud prevention agencies to manage your account with us, to take decisions regarding your identity and also credit, including whether to make Website Payments Pro or PayPal Here (as the case may be) available or to continue or extend existing services to you.
If you owe us money and do not make payments that you owe us, we will trace your whereabouts and recover payment.
SECTION 3: WHAT CREDIT REFERENCE AGENCIES DO

When credit reference agencies receive a search from us they will:
Place a search "footprint" on you and/or your business' credit file whether or not this application proceeds. If the search was for a credit application the record of that search (but not the name of the organisation that carried it out) may be seen by other organisations when you apply for credit in the future.
Link together the previous and subsequent names advised by you, of anyone that is a party to the account.
Supply to us:
Information about you and/or your business or credit information such as previous applications for credit and the conduct of the accounts;
Public information, such as details of County Court Judgments (CCJs) and bankruptcies;
Electoral register information on you and your business partners; and/or
Fraud prevention information.
When information is supplied by us, to them, on your account(s):
Credit reference agencies will record the details that are supplied on your account including previous and subsequent names of the parties
If you owe us money and do not pay in full and on time, credit reference agencies will record the outstanding debt.
Records shared with credit reference agencies remain on file for six years after they are closed whether settled by you or defaulted.
How your data WILL NOT be used by credit reference agencies:
It will not be used to create a blacklist.
It will not be used by the credit reference agency to make a decision.
How your data WILL be used by credit reference agencies:
The information which we, other organisations and fraud prevention agencies provide to the credit reference agencies about you, your financial and/or business associates and your business may be supplied by credit reference agencies to other organisations and used by them to:

Verify your identity if you or your financial or business associate applies for other facilities including all types of insurance applications and claims.
Assist other organisations to make decisions on credit, credit related services and on motor, household, life and other insurance proposals and insurance claims, about you, your partner, other members of your household or your business.
Trace your whereabouts and recover payment if you do not make payments that you owe.
Conduct checks for the prevention and detection of crime including fraud and/or money laundering.
Manage your personal, your partner’s and/or business account
Manage your personal, your partner’s and/or business insurance policies (if you have one/any).
Undertake statistical analysis and system testing.
Your data may also be used for other purposes for which you give your specific permission or, in very limited circumstances, when required by law or where permitted under the terms of the Data Protection Act 1998.
Your data may also be used to offer you other products, but only if you have not opted out of receiving such offers.
How to Find Out More

You can contact credit reference agencies currently operating in the UK (the main ones are listed below). The information they hold may not be the same so it is worth contacting them all. They will charge a small statutory fee.

CallCredit Ltd., Consumer Services Team, PO Box 491, Leeds, LS3 1WZ
0870 0601 414 (UK)
www.callcredit.co.uk

Experian, CreditExpert, PO Box 7710, Nottingham, NG80 7WE
0870 2416 212 (UK)
www.experian.co.uk

Equifax Plc, Credit File Advice Centre, PO Box 1140, Bradford, BD1 5US
0870 0100 583 (UK)
www.equifax.co.uk

Dun & Bradstreet Ltd, Customer Service Department, Marlow International, Parkway, Marlow, Bucks, SL7
1AJ
0845 145 1700 (UK)
http://www.dnb.co.uk

If you want to receive details of those fraud prevention agencies from whom we obtain and with whom we record information about you, write to us at PayPal (Europe) S.ΰ.r.l. et Cie, S.C.A., 22-24 Boulevard Royal L-2449, Luxembourg. You have a legal right to these details.

© 1999 - 2014 PayPal
This content is for general information purposes only and does not form financial or professional advice.
[https://www.paypal.com/gr/webapps/mpp/ua/privacy-full?locale.x=en_GR&viewType=popup] 2014-09-30

stmPypl'resource

name::
* McsEngl.stmPypl'resource@cptIt,

_ADDRESS.WPG:
* https://www.paypal.com/gr/webapps/helpcenter/helphub/home//

stmPypl'security

name::
* McsEngl.stmPypl'security@cptIt,

_DESCRIPTION:
Forward suspicious emails to spoof@paypal.com.
Make sure you're using the latest internet browser.
Visit the PayPal Security Center.
===
Industry-leading fraud prevention helps keep you safe
[https://www.paypal.com/gr/cgi-bin/webscr?cmd=xpt/Marketing/general/PayPalAccountTypes-outside]

Use your credit card or bank account without exposing your financial information to merchants.

Your financial information is safe with PayPal. We will never share your information with merchants.

To prevent fraud, PayPal sets specific withdrawal and receiving limits on your account. There are instructions available on how to remove these before you reach your account limits. Simply log in to your account and click Lift your account limits in the To Do List.

stmPypl'user-aggreement

name::
* McsEngl.stmPypl'user-aggreement@cptIt,

User Agreement for PayPal Service
Last Update: Jun 17, 2014
Print Download PDF


This Agreement contains sixteen sections (including a schedule). You may jump directly to any section by selecting the appropriate link below. The headings and subheadings below are for reference only and do not limit the scope of each section. Some capitalised terms have specific definitions in Section 15. Underlined words in this Agreement and on our website hyperlink to relevant information.



Jump to section:

1. Our Relationship with You
2. Eligibility and Types of Accounts
3. Sending Money
4. Receiving Money
5. Account Balances and Transaction Information
6. Withdrawing/Redeeming E-money
7. Term and closing Your Account
8. Fees and Currency Conversion
9. Restricted Activities
10. Your Liability – Actions We May Take
11. Seller Protection Programme
12. Errors and Unauthorised Transactions
13. PayPal Buyer Protection
14. Disputes with PayPal
15. Definitions
Schedule 1. Table of Fees


This Agreement is a contract between you and PayPal and applies to your use of the Services. The terms of the Acceptable Use Policy, and Merchant Gift Vouchers Policy located on the “Legal Agreements” landing page are incorporated by reference into this Agreement and provide additional terms and conditions related to the Services. All future Changes set out in the Policy Update already published on the “Legal Agreements” landing page of the PayPal website at the time you register for the Services are incorporated by reference into this Agreement and will take effect as specified in that Policy Update. The terms of the PayPal MasterCard Rewards Programme are also incorporated by reference into this Agreement and apply to your use of PayPal Credit. A copy of these terms will be provided to you when you are successfully approved for PayPal Credit. The above mentioned documents are “Ancillary Documents” for the purpose of this Agreement. For the avoidance of doubt, neither the Ancillary Documents nor the parts of this Agreement that incorporate the terms of the Ancillary Documents constitute “framework contracts” for the purpose of the EU Payment Services Directive (2007/64/EC ) or any implementation of that directive in the EU or EEA (including, without limitation, the UK Payment Services Regulations 2009). This Agreement, together with other legal terms and legally required disclosures relating to your use of the PayPal Service will be provided to you, at all times on the PayPal website(s) (typically located on the “Legal Agreements” landing page). This information may also be sent to you or appear in places on the PayPal website(s) or otherwise where relevant to your use of the PayPal Services.
By registering for the Services, you must read, agree with and accept all of the terms and conditions contained in this Agreement (including the Policy Updates, policies and reward terms referred to above). This Agreement is provided to you and concluded in English. You agree that any use by you of the Services shall constitute your acceptance of the Agreement and we recommend that you store or print-off a copy of the Agreement (including all policies) for your records.

PayPal may require you to have a PayPal Account to use the Services (including, without limitation, to send or receive payments or to use PayPal as a means of logging into third party services).


IMPORTANT

This is an important document which you must consider carefully when choosing whether to use the Services at any time. Please read the terms of this Agreement carefully before agreeing to it. This Agreement also highlights certain risks on using the Services together with guidance on how to safely carry out online payments via PayPal.

You are solely responsible for understanding and complying with any and all laws, rules and regulations of your specific jurisdiction that may be applicable to you in connection with your use of the PayPal Services, including but not limited to, those related to export or import activity, taxes or foreign currency transactions.

Please note the following risks and key terms applicable to your use of the PayPal Services:

Risk of payment reversals

Payments received in your PayPal Account may be reversed at a later time, for example, if such a payment is subject to a Chargeback, Reversal, Claim or otherwise invalidated. This means that for some of our sellers, payments received into their Account may be returned to the sender or otherwise removed from their Account after they have been paid and/or delivered any goods or services sold.

A key eligibility requirement of the Seller Protection Programme is that the seller must post the item to the address which appears on the transaction details page. If the item is delivered in person or if a seller posts the item to a different address (for example, if the buyer asks that you send to another address on the basis that it is a “work address” or a “gift” address) then you will not be eligible for re-imbursement under the terms of the programme.

You can help protect yourself from the risks of a payment being reversed from your Account by following the criteria set out in the PayPal Seller Protection Programme and by following the other guidance provided to sellers as set out in the "Security Centre" accessible via every page of the PayPal website.

We may close, suspend, or limit your access to your Account or our Services, and/or limit access to your funds to the extent and for so long as reasonably needed to protect against the risk of liability (see section 10.2h) if you violate this Agreement including the PayPal Acceptable Use Policy, or any other agreement you enter into with PayPal. For the avoidance of doubt, we may permanently block your account for breach of section 10.6 (Information about you).

Risk of payments being held by PayPal

Please note that although you may only have one PayPal Account, your Account has two separate and distinct functionalities, the payment functionality and the reserve functionality. Your ability to access funds in your Account and to execute payment transactions from your Account will depend upon which functionality the funds are subject to at any given time. For the purposes of this Agreement:

The element of your Account which constitutes the payment functionality will be known as the "Payment Account". The Payment Account is the operational part of your Account through which you have access to funds and which can be used for the execution of payment transactions.
The element of your Account which constitutes the reserve functionality will be known as the "Reserve Account". Your access to the Reserve Account is restricted and you have no ability to access funds in the Reserve Account or to execute payment transactions over funds in the Reserve Account. Funds held in the Reserve Account may be marked, for example, "Pending", "Uncleared", "Held".
Examples of when funds may be held by PayPal to mitigate risks include when those funds are subject to:

an eCheque, Add funds or Top-up bank transfer payment (see section 3.7)
Merchant processing delay (see section 3.9)
Reserve (see section 10.4)
Payment review (see section 4.3)
Payment Hold (see section 10.5)
Restricted Activity and actions taken by PayPal (see sections 9 and 10)
Disputes

If you wish to open a Dispute through PayPal’s Online Resolution Centre you must do so within 45 days (or, if you are claiming as a registered UK resident user of PayPal, 180 days) of making your payment.

Payment execution

Please note that PayPal will execute a valid Payment Order made by you through your Payment Account and credit the payment service provider of the person to whom you are sending your payment as soon as the payment schemes available to PayPal allow (which can be within the next Business Day) following the date you gave us your valid Payment Order. This execution time is subject to certain conditions and more detail around execution of Payment Orders is set out in section 3.1 of this Agreement.

You must consider such risks and guidance when using PayPal.


For more information about the PayPal service, please read our Key Payment and Service Information.

The headings and subheadings below are for reference only and do not limit the scope of each section. Some capitalised terms have specific definitions, and we have provided them in section 15 or otherwise in the text of this Agreement. You will also find underlined words in this Agreement and on our website that hyperlink to relevant information.



1. Our Relationship With You
1.1 PayPal is only a Payment Service Provider. PayPal (Europe) S.ΰ r.l. et Cie, S.C.A. (R.C.S. Luxembourg B 118 349) is duly licensed as a Luxembourg credit institution in the sense of Article 2 of the law of 5 April 1993 on the financial sector as amended (the “Law”) and is under the prudential supervision of the Luxembourg supervisory authority, the Commission de Surveillance du Secteur Financier.

PayPal’s main business is the issuance of E-money and the provision of services closely related to the issuance of E-money. A description of the main characteristics of the PayPal Service is set out in the Key Payment and Service Information document which is accessible via the Legal Agreements link of each page of the PayPal website(s). Since the service is limited to E-money, which does not qualify as a deposit or an investment service in the sense of the Law, you are not protected by the Luxembourg deposit guarantee schemes provided by the Association pour la Garantie des Dιpτts Luxembourg (AGDL). PayPal enables you to make payments to and accept payments from third parties. PayPal is an independent contractor for all purposes. PayPal does not have control of nor assumes the liability or legality for the products or services that are paid for with our Service. We do not guarantee the identity of any User or ensure that a buyer or a seller will complete a transaction. Please note that there are risks of dealing with underage persons or people acting under false pretence.

1.2 Your Privacy. Protecting your privacy is very important to PayPal. Please review our Privacy Policy in order to better understand our commitment to maintaining your privacy, as well as our use and disclosure of your Information.

1.3 Intellectual Property. The URLs representing the PayPal website(s), “PayPal,” and all related logos of our products and services described in our website(s) are either copyrighted by PayPal, trademarks or registered trademarks of PayPal or its licensors. In addition, all page headers, custom graphics, button icons, and scripts are either copyrighted by PayPal, service marks, trademarks, and/or trade dress of PayPal. You may not copy, imitate, modify, alter, amend or use them without our prior written consent. You, as a merchant, may use HTML logos provided by PayPal through our merchant services, auction tools features or affiliate programmes without prior written consent for the purpose of directing web traffic to the Service. You may not alter, modify or change these HTML logos in any way, use them in a manner that is disparaging to PayPal or the Service or display them in any manner that implies PayPal’s sponsorship or endorsement. All right, title and interest in and to the PayPal website and any content thereon is the exclusive property of PayPal and its licensors.

1.4 Assignment. You may not transfer or assign any rights or obligations you have under this Agreement without PayPal’s prior written consent. You are not permitted to transfer your Account to a third party. PayPal reserves the right to transfer or assign this Agreement or any right or obligation under this Agreement at any time without your consent. This does not affect your rights to close your Account under section 7.1.

1.5 Notices to You. We will communicate with you in the language(s) in which we have made available this Agreement to you. You agree that PayPal may provide notice or other information to you by posting it on the PayPal website(s) (including the posting of information which is only accessed by you by logging into your Account), emailing it to the email address listed in your Account, mailing it to the street address listed in your Account, calling you by phone, or sending you a “text” / SMS message. You must have internet access and an e-mail account to receive communications and information relating to the Services. With the exception of amendments to this Agreement, such notice shall be considered to be received by you within 24 hours of the time it is posted to the PayPal website(s) or emailed to you. If the notice is sent by mail, we will consider it to have been received by you three Business Days after it is sent. You may request a copy of any legally required disclosures (including this Agreement) from us and we will provide this to you in a form which allows you to store and reproduce the information (for example, by e-mail) and you may terminate your consent to receive required disclosures through electronic communications by contacting PayPal as described in section 1.6 below. PayPal may charge you a Records Request Fee (per Schedule 1) to provide a paper copy. PayPal reserves the right to close your Account if you withdraw your consent to receive electronic communications.

1.6 Notices to PayPal. Notices to PayPal made in connection with this Agreement must be sent by postal mail to PayPal’s head office: PayPal (Europe) S.ΰ r.l. et Cie, S.C.A. Attention: Legal Department 22-24 Boulevard Royal L-2449, Luxembourg.

1.7 Transaction History. Unless your Account is restricted, you can access your details of executed payment transactions and other information relating to your Account transaction history and Balance by logging into your Account and clicking on the “History” tab. See section 5.1 of this Agreement for more information about accessing your Account information. You agree to review your transactions through your Account History instead of receiving periodic statements by mail.

1.8 Amendments to this Agreement. We may at any time amend, delete or add to this Agreement, including the Fees and other amounts which apply to your Account (as set out in Schedule 1) (a “Change”) by giving notice of such Change by posting a revised version of this Agreement on the PayPal website(s). A Change will be made unilaterally by us and you will be deemed to have accepted the Change after you have received notice of it. We will give you 2 months' notice of any Change with the Change taking effect once the 2 month notice period has passed, except the 2 month notice period will not apply where a Change is required by law or relates to the addition of a new service, extra functionality to the existing Service or any other change which we believe in our reasonable opinion to neither reduce your rights nor increase your responsibilities. In such instances, the Change will be made without prior notice to you and shall be effective immediately.

If you do not accept any Change, you must close your Account following the account closure procedure set out in section 7.1. If you do not object to a Change by closing your Account within the 2 month notice period, you will be deemed to have accepted it. While you may close your Account at any time and without charge, please note that you may still be liable to us after you terminate this Agreement for any liabilities you may have incurred and are responsible for prior to terminating this Agreement and please further note our rights under section 10.3 (Account closure and limited access).
Back to top



2. Eligibility and Types of Accounts
2.1 Eligibility. To be eligible for our Services, you must (i) be a resident of one of the countries listed on the PayPal Worldwide page; (ii) have full legal capacity to enter into a contract; and (iii) if you are an individual, be at least 18 years old. You further represent and warrant to us in opening an Account with us that you are not acting on behalf of, or for the benefit of, anyone else, unless you are opening the Account for and under the direction of the company that employs you. If you are not acting for the company that employs you, the new Account must be in your own name only. This Agreement applies only to Users who are residents of the United Kingdom and Relevant Countries. If you are a resident of another country, you may access your agreement from the PayPal website(s) in your country (if applicable).

2.2 Personal, Premier and Business Accounts. We offer three different types of Accounts: Personal, Premier and Business Accounts. Unless otherwise agreed, you may hold not more than one Personal Account or Premier Account and one Business Account. By opening a Business Account and accepting the terms as outlined in this Agreement, you attest that you are not establishing the Account primarily for personal, family, or household purposes. You agree that your Account comprises the Payment Account and the Reserve Account.

2.3 Verified status.

a. To obtain Verified status you must complete the following steps depending on your Account status:

For UK customers:

Personal Account holders: Either:

1) Set up Direct Debit and complete the Random Deposit Process; or

2) Be successfully approved for and activate PayPal Credit.

Premier/Business Account holders: Either:

1) Set up Direct Debit; complete the Random Deposit Process; and provide supplemental business information; or

2) Be successfully approved for and activate PayPal Credit; and provide supplemental business information.

For Relevant Country customers: add a credit card and complete the Link and Confirm Card process.

b. PayPal may, from time to time, make available to you other methods or procedures for you to obtain “Verified” status. By highlighting a User as “Verified” PayPal only represents that the Verified user has completed the steps of the process to obtain “Verified” status. Further to section 1.1 and by attributing Verified status to a user, PayPal neither guarantees, undertakes nor otherwise represents that a Verified user will complete a Commercial Transaction.

2.4 PayPal as Login Method. If you use PayPal as means of logging into external websites or mobile apps, we may share your login status with any third party offering this Service as a login method, as well as the personal and other Account information that you consent to being shared so that the third party can recognise you. PayPal will not give such third party access to your PayPal Account and will only make payments from your Account to that third party with your specific authorisation.

If you offer this Service as a means for visitors to log into your website, app, or otherwise for your customer accounts, you must agree to any specific terms applicable when this functionality is made available to you, and comply with any specifications in any integration manual or guideline. PayPal does not guarantee or otherwise represent the identity of any user of this login method. PayPal will not share with you the personal and other Account information of the user (including login status) held by PayPal unless the user has consented to our disclosure of that information to you.

Back to top



3. Sending Money
3.1 Our execution of your Payment Orders. Subject to the terms of this Agreement (and your compliance with the same), you agree that we will execute a Payment Order made by you via your Payment Account and credit the payment service provider of the person to whom you are sending your payment, as soon as the payment schemes available to PayPal allow (which can be within the next Business Day) following the date you gave us and we received your valid Payment Order. This is subject to you providing us with:

your Payment Order before 4pm on a Business Day, except that the relevant time shall be 5.00pm if your Account is registered in Greece, 3.00pm if your Account is registered in Ireland, 2.45pm if your Account is registered in Hungary and 2.00pm if your Account is registered in the Czech Republic. All times stated are local times of the country where your Account is registered. If you provide us with your Payment Order after this time or not on a Business Day, you agree that your Payment Order was received by us on the following Business Day;
a correct Unique Identifier or other valid details of the recipient or you as PayPal or the person you are paying may reasonably request from you when you complete the details to make the Payment Order;
all mandatory information requested in the relevant payment or checkout flows;
(if required), details of your valid Funding Source(s) that have sufficient funds to make the payment;
valid consent to authorise your Payment Order, such valid consent is provided when you:
click the “Pay” or “Continue” or other button in the sections of the PayPal website(s) or PayPal checkouts which permit you to send us a Payment Order after you have submitted your correct log-in information (eg e-mail and password) and successfully logged into your PayPal Account; and/or
have set up a third party initiated payment Authorisation in which you have agreed with a merchant or other third party to provide an advance Authorisation to allow that merchant or third party to collect or otherwise direct payment of funds from your PayPal Account; and/or
instruct us to make a payment in any other way which we may notify you when making the Payment Order from time to time.
Our obligation to execute payment orders as set out above in this section 3.1 only applies to payments executed: between Users with registered Accounts in the European Economic Area (“EEA”); and in the currency of Pounds Sterling, Euro or the currency of the EEA State that has not adopted Euro as its currency. Once your Payment Order has been provided to us, you may not revoke it or otherwise withdraw your consent to the execution of the payment transaction, with the exception that you are able to cancel a Recurring Payment provided that you do so before the end of the Business Day which falls on the day before the next recurring payment is due to be made. We are under no obligation to execute your Payment Order if you do not have sufficient funds. PayPal reserves the right not to effect a payment made by you until it receives cleared funds.

3.2 Sending Limits. If you have a yearly sending limit on your Account, you can view it by logging into your Account and clicking on the “View Limits” link on the “Account Overview” page. For this purpose, “yearly” relates to each calendar year. We may, at our reasonable discretion (for example, without limitation, to limit fraud or credit risk), impose limits on the amount of money you can send through our Service.

3.3 Lifting your sending limit. In order to lift your sending limit, you must complete the steps set out below.

In the UK: 1) Either: set up Direct Debit and complete the Random Deposit Process; or be successfully approved for and activate PayPal Credit and 2) if you hold a Business or Premier Account, you may also need to provide business information. If you wish to lift the sending limit on your card linked to your Account you will also be required to complete the Link and Confirm Card process.
In the Relevant Countries: add a credit card and complete the Link and Confirm Card process.
PayPal may, from time to time, require you to, or provide you with the option of, carrying out other methods or procedures to lift your sending limit.

3.4 Default Funding Sources. When you make a payment you authorise us to obtain funds on your behalf from your applicable Funding Source, to issue E-money and to transfer the E-money to the recipient or to your Balance in each case according to your instructions and subject to the terms of this Agreement. PayPal will fund your transaction as follows:

Balance
If you have a Balance in your Account, PayPal will always use your Balance to fund your payment.
Funding Sources
If you do not have a Balance, or your Balance is not sufficient to fund your entire transaction, PayPal will fund your transaction, or the remainder of your transaction, in the following order (to the extent that such Funding Sources are available for use with your Account):
Balance (if any)
Instant Transfer from your bank account
PayPal Credit
Debit card / credit card
eCheque
Recurring Payments
If you have a Balance at the time the merchant processes your payment, PayPal will use your Balance instead of your Preferred Funding Source.
Merchant Processing Delay
If there is a Merchant Processing Delay and you have a Balance at the time the merchant processes your payment and completes the transaction, PayPal will use your Balance instead of your Preferred Funding Source.
Cards as Funding Sources: By adding a debit card, credit card or pre-paid card as a Funding Source, you are providing PayPal with a continuous authority to automatically charge that card to obtain the relevant funds when the card is used as a Funding Source pursuant to this Agreement. You can stop the continuous authority in respect of any card by removing that card as a Funding Source in your Account Profile.

Special Funding Sources: Certain payments may be funded by special Funding Sources linked to your Account, such as merchant specific balance, gift vouchers or other promotional funding sources, the use and priority of which are subject to further terms and conditions between you and PayPal (“Special Funding Sources”). Your Account Overview may show, as part of your overall account balance, the notional amount available in your Special Funding Sources to fund qualifying payments at any given time.


3.5 Preferred Funding Source. If you would like to select a Preferred Funding Source you may do so in these instances:

Each time you make a payment, you may select a Preferred Funding Source. You may do so on the “Review Your Payment” page by clicking on the link to change your payment method and selecting from the available funding options. You may also set PayPal Credit as your Preferred Funding Source for all future payments in your Account Profile and where available in certain payment checkout webpages.
In your Account Profile – My Preapproved Payments. If you have set up a Recurring or Automatic Payment, or authorise a merchant or other third party to collect payments from your PayPal Account, you may be able to select a Preferred Funding Source for all future payments to the merchant or other third party. You may do so by logging in to your Account, selecting "Profile", selecting "My Preapproved Payments", and then by selecting the links to set a Preferred Funding Source (may be called "Backup Funding Source"). Otherwise we will use your Default Funding Source.
Limitations. If you have a Balance in your PayPal Account, PayPal will use your Balance instead of your Preferred Funding Source, unless your Preferred Funding Source is eCheque or PayPal Credit. If you have a Balance and do not want to use it to fund your next payment, you must withdraw from your Balance before initiating your next payment.
Quick Pay. If you select “Quick Pay” for your PayPal Mobile payments, you will not be able to select a Preferred Funding Source for your future PayPal Mobile payments made with Quick Pay. You may cancel your “Quick Pay” setting at any time from your mobile phone.


3.6 Funding Source Limitations. In order to manage risk, PayPal may limit the Funding Sources available for a transaction. If we limit a Funding Source, we will alert you that there is a higher than normal level of risk associated with the payment (for example and without limitation, a risk that the payment may be challenged to be unauthorised). Such a notice does not mean that either party to the transaction is acting in a dishonest or fraudulent manner. It means there may be a higher than normal level of risk associated with the payment. Funding Sources may be limited also if you make a PayPal payment through certain third party websites or applications. For PayPal Business Payments, you are limited to funding your PayPal payment with either (or both) your Balance or by eCheque.

If your Funding Sources are limited, you may choose to continue with the transaction with the understanding that you may have fewer avenues available for dispute resolution should the transaction turn out to be unsatisfactory (for instance, if one of your Funding Sources is your credit card but, as a result of a limitation of Funding Sources, you cannot fund your PayPal payment by credit card, you will not have chargeback rights for the PayPal payment).

3.7 Bank Transfers. When Instant Transfer, eCheque or a “top-up” bank transfer is used as your Funding Source, or when you initiate an Add Funds transaction, you are requesting an electronic transfer from your bank account. For these transactions, you agree the following:

eCheque. An eCheque payment involves the execution of the following two interrelated and consecutive Payment Orders made by you: (1) a Payment Order that instructs your bank to pay PayPal; and (2) a Payment Order that instructs PayPal to pay the recipient from your Payment Account. You agree that, once PayPal receives the funds from your bank, PayPal may hold those funds in your Reserve Account and those funds will not be made available to you in your Payment Account to trigger the execution of the second Payment Order until the Business Day that PayPal has deemed that the risk of the first payment being reversed has passed. The risk that the first payment made be reversed is due to the bank notifying us that there were insufficient funds in your bank account to execute the first Payment Order (“NSF Risk”). Until both Payment Orders are completed the funds will be held in your Reserve Account and the transaction will appear to you as “Uncleared” in your Account details. PayPal does not consider that the funds from the first Payment Order are at its disposal, enabling such funds to be made available to you in your Payment Account to trigger the second Payment Order, until the NSF Risk has passed. Further, PayPal is not in possession of all the information necessary to place the funds at the recipient’s disposal in their Payment Account until the NSF risk has been determined by PayPal to pass.
Top-up bank transfer and Add funds. A "Top-up bank transfer" is a payment where you instruct your bank to make a payment to PayPal’s bank account. This instruction is made by you contacting your bank directly and providing the bank with PayPal’s bank account details. You agree that once PayPal receives the funds from your bank that PayPal may hold those funds until the Business Day that PayPal has determined that the risk of the payment being reversed due to NSF Risk has passed. An “Add funds” transaction allows you to add funds to your Account Balance from your bank account. It involves the execution of a Payment Order that instructs your bank to pay PayPal. You agree that once PayPal receives the funds from your bank that those funds will be held in your Reserve Account until the Business Day that PayPal has deemed that the risk of the payment being reversed due to NSF Risk has passed. Until the Payment Order is completed the transaction will appear as “Uncleared” in your Account details. PayPal is not in possession of all the information necessary to place the funds from a Top-up bank transfer or Add funds Payment Order at your disposal in your Payment Account until the NSF Risk has passed.
PayPal will make electronic transfers from your bank account in the amount you specify through a mechanism called Automated Clearing House (or ACH for short) (this may involve use of the Faster Payments Service if: you are making a "Top-up bank transfer"; your bank account is based in the UK; and your bank supports that service for that particular transfer). You agree that such requests by you for PayPal to make electronic transfers from your bank account constitute your authorisation to PayPal to make the transfers and once you have provided your authorisation for the transfer, you will not be able cancel the electronic transfer. PayPal reserves the right to require you to fund your requested payment by eCheque to mitigate risk associated with your Payment Order. You give PayPal the right to resubmit any ACH debit you authorised that is returned for insufficient or uncollected funds.

For users with registered addresses in Cyprus, Estonia, Greece, Ireland, Latvia, Malta, Slovakia and Slovenia: The Single Euro Payments Area (SEPA) is an initiative of the European Commission and European banking sector, aimed at making transactions more efficient within the European Union. After the implementation of the use of SEPA Direct Debit mandates by PayPal, whenever you register a bank account with PayPal or pay with a new bank account for the first time, you will be granting PayPal a SEPA Direct Debit mandate. You will be able to access such mandate and the mandate reference number (MRN) in your PayPal Account profile at any time and cancel the mandate for future transactions.

Whenever you make an electronic transfer from your bank account to PayPal via SEPA direct debit after that, you authorise PayPal to use such mandate and draw the amount from your bank account as explained above in this section 3.7 and you authorise your bank to arrange for payment to PayPal. You may claim a refund from your bank at any time up to 8 weeks after the date on which the SEPA direct debit payment took place in accordance with your bank’s terms and conditions.

PayPal will inform you of the amount of the SEPA direct debit payment and the time frame in which PayPal will collect the amount from the bank account together with the purchase confirmation.In the event that PayPal resubmits any SEPA direct debit payment request due to Reversal of the original payment, there will be no (additional) information given on the amount and the time frame ahead of the resubmission.

3.8 Refused Transactions. When you send E-money, and although the E-money is available to the recipient, the recipient is not required to accept it. You agree that you will not hold PayPal liable for any damages resulting from a recipient's decision not to accept a payment made through the Service. We will:

Quickly return any refunded or denied payment to your Balance or as appropriate, your original Funding Source; and
return any unclaimed payment to your Balance within 30 Days after the date you initiated the payment.
3.9 Merchant Processing Delay. When you send a payment to certain merchants, you are providing an Authorisation to the merchant to process your payment and complete the transaction. Some merchants may delay processing your payment. In such an instance, your Authorisation will remain valid typically for up to 30 Days. If you have a positive Balance at the time you made your Authorisation, you agree that PayPal may hold the amount of your Balance which forms the payment in your Reserve Account. The payment will be held as pending in your Reserve Account until the merchant completes the processing of your payment. If your payment requires a currency conversion by us, the exchange rate (which includes a Currency Conversion Fee) will be determined at the time the merchant processes your payment and completes the transaction. Between the time you authorise a payment and the time the payment is processed, the merchant may amend the payment amount (for example, to account for taxes, postage or amendments to the purchase you made with the merchant). You agree, at the time of Authorisation, to authorise a payment to be made to the merchant up to the amount which is highlighted as being the ‘maximum amount’ (or similar) on the payment authorisation page. This is to include any additional amounts which may be payable by you to the merchant, as subsequently agreed by you and the merchant. You further agree that we are not required to verify this additional amount with you at the time the payment is transferred and that we may transfer any amount up to the ‘maximum amount’ (or similar) on the basis of your Authorisation and upon receiving instructions from the merchant of the final payment amount.

3.10 Third party initiated payments (including Recurring Payments). A third party initiated payment is a payment made on the basis of your advance Authorisation to a third party (for example, a merchant , or a mobile app provided by a merchant, or eBay) to collect funds from your PayPal Account.

One example of this type of payment is a "Recurring Payment" which is a third party initiated payment made on a recurring basis (whether sporadically or periodically) that can be managed via your PayPal Account. Sometimes Recurring Payments are also called "subscriptions", "preapproved payments" or “automatic payments”.

By providing an advance Authorisation, you are giving the third party the ability to collect or reverse variable amount payments from your Account on a one-time basis, or on a (sporadically or periodically) recurring basis until you cancel your arrangement or authorisation with the applicable third party. You hereby authorise and instruct PayPal to pay the third party (or another person they direct) amounts from your PayPal Account for amounts you owe as presented to us by the third party. You agree that PayPal is not obligated to verify or confirm the amount the third party presents to us for the purpose of processing this type of payment. You further acknowledge and agree that payments made under this provision are variable and may be made on various dates.

If you use the PayPal Location Based Payments Functionality to make a Third Party Initiated Payment to another User (typically a merchant) who accepts payments through the PayPal Location Based Payments Functionality, you may Authorise that User by selecting the User in the PayPal Location Based Payments Functionality. When you Authorise such a User, we may restrict the total amount that the Authorised User can request from your Account within a specific time period, as we may determine at our own discretion.

If your third party initiated payment requires a currency conversion by us, the amount of the Currency Conversion Fee (per Schedule 1) will be determined at the time the applicable third party processes your payment and completes the transaction. You acknowledge that the exchange rate determined at the time of each payment transaction will differ and you agree to the future execution of third party initiated payments being based on fluctuating exchange rates.

Third parties who present us with a payment request under this provision hereby:

warrant to PayPal that the amounts they present have been agreed and consented to by the User whose Account will be deducted (including changes to those amounts) and that they will give prior notice of the deduction to the User; and
agree that they will notify their customers at least 4 weeks in advance of the amount they will collect if that amount has increased in such a manner that the customer could not have reasonably expected to pay such an amount, taking into account that customer’s previous spending patterns and the circumstances of the payment and that they will be liable to PayPal for any refunds of such payment in accordance with the terms of this User Agreement.
You agree that you cannot request a refund from PayPal for a third party initiated payment unless:

the Authorisation did not specify the exact amount of the payment transaction when the Authorisation was given and the applicable amount exceeded the amount you could have reasonably been expected to pay, taking into account your previous spending patterns and the circumstances of the case;
and

your consent to the making of the third party initiated payment was not given as set out in section 3.1(e); or
the information relating to the third party initiated payment was not provided or made available to you for at least 4 weeks before the date the payment transaction was made to the merchant;

and
you notify us of the request within 8 weeks from the date the payment was made; and
you comply with our requests to obtain information which we reasonably require to review the circumstances of the case. We reserve the right to request further information as is reasonably necessary to ascertain whether the above conditions have been satisfied and to waive any or all of the above conditions.
3.11 Cancelling Recurring Payments. You may cancel a Recurring Payment at any time up to 1 Business Day prior to the date the payment is scheduled to be made. To cancel a Recurring Payment, log in to your Account, access the “My Account” tab, then access the “Profile” tab, then access the “Financial Information” column and click on "My Preapproved Payments” and follow the instructions to cancel the payment. Please keep in mind that Recurring Payments are sometimes referred to as subscriptions or preapproved payments. In addition, if you cancel a Recurring Payment you may still be liable to the merchant for the payment and be required to pay the merchant through alternative means.

When you use the PayPal Location Based Payments Functionality to give an Authorisation for a Third Party Initiated Payment to a User (typically a merchant) who accepts payments through the PayPal Location Based Payments Functionality, you may only cancel the Authorisation by following the steps to cancel your selection of the User in the PayPal Location Based Payments Functionality.

3.12 Sending E-money in Multiple Currencies. You may Send Money in U.S. Dollars, Canadian Dollars, Euros, Pounds Sterling, Yen, Argentine Peso, Australian Dollars, Brazilian Real, Czech Koruna, Danish Krone, Hong Kong Dollar, Hungarian Forint, Israeli New Shekels, Mexican Peso, New Zealand Dollar, Norwegian Krone, Philippine Peso, Polish Zloty, Singapore Dollar, Swedish Krona, Swiss Franc, Thai Baht and Taiwan New Dollar. There may be some restrictions with regard to where you can send certain currencies. When you are sending money to a merchant who has requested a currency that is different than your primary currency, you will need to specify whether you want to pay the merchant in the merchant’s requested currency, or in your primary currency (in some cases, the merchant may not give you a choice). If you send E-money in a currency that is not your primary currency, we follow these practices:

If you have a Balance in the requested currency, we will fund your transaction from your Balance.
If you have a Balance in a different currency, we will perform a currency conversion and use it to fund your transaction.
If you do not have a Balance, we will fund your transaction through your Default Funding Sources.
3.13 Card information. If your card number changes or your card expiration date changes, we may acquire that information from our financial services partner(s) and update your Account accordingly.

Back to top



4. Receiving Money
PayPal may allow anybody (with or without a PayPal Account) to initiate a payment to your Account.

4.1 Lifting your receiving limit. If you have a yearly receiving limit on your Account, you can view it by logging into your Account and clicking on the “View Limits” link on the “Account Overview”. For this purpose, “yearly” relates to each calendar year. We may, at our reasonable discretion (for example, without limitation, to limit fraud or credit risk), impose limits on the amount of money you can receive through our Service. In order to lift your receiving limit, you must complete the steps set out below.

In the UK: 1) Either: set up Direct Debit and complete the Random Deposit Process, or be successfully approved for and activate PayPal Credit; and 2) confirm your location (whether via our automated process, your telephone or post) and 3) for Premier and Business Account holders, provide supplemental business information.
In the Relevant Countries: 1) add a credit card and complete the Link and Confirm Card process; 2) for Business and Premier Account holders, provide supplemental business information; and 3) provide us with further documents in a manner and form which we may reasonable request.
You can find more information about the Link and Confirm Card process in the PayPal Help Centre which is located on the PayPal website. PayPal may, from time to time, require you to, or provide you with the option of, carrying out other methods or procedures to lift your receiving limit.

4.2 Use of PayPal on eBay. Sellers who offer PayPal as a payment method in their eBay listings must follow these requirements:

Accept PayPal if the eBay listing includes PayPal as a payment method.
Accept PayPal payments via all PayPal funding sources from a buyer, including but not limited to eCheque and credit cards.
Accept cross border PayPal transactions which are permitted by PayPal if the eBay listing offers postage outside the place where you are registered.
4.3 Payment Review. Payment Review is a process by which PayPal reviews certain potentially high-risk payment transactions. This may be because PayPal has the reasonable suspicion that a buyer’s Payment Instrument and/or Account are being used in relation to Restricted Activities (as set out in section 9) or for other reasons as determined by us in our reasonable discretion. If a payment is subject to Payment Review, PayPal will:

execute the Payment Order initiated by the buyer;
in PayPal’s discretion, immediately upon such execution restrict the buyer’s Payment Instrument;
place a hold on the payment, meaning the funds are held in the seller’s Reserve Account;
provide notice to the seller to delay the shipping of the item purchased by the buyer; and
conduct its review of the payment.
PayPal is not in possession of all the information necessary to place the funds at the seller’s disposal in the seller’s Payment Account until the Payment Review is complete and PayPal has found the payment to be in order. Where a Payment Review finds problem with the payment, the payment will be reversed and the funds returned to the buyer from the seller’s Reserve Account. All payments that complete Payment Review are still subject to being reversed under the terms of this Agreement but will be Seller Protection Eligible if they meet the Seller Protection Policy requirements. PayPal will provide notices to you by email and/or in the Transaction History tab of your PayPal account. A payment subject to Payment Review is a review of the payment only and is implemented to reduce the risk of PayPal users receiving high risk transactions. A payment subject to Payment Review is neither a review nor a representation by PayPal as to the commercial dealings, character or reputation of a party to the payment transaction and should not be considered as a lessening of the respect of any person.

4.4 Risk of Reversals, Chargebacks and Claims. The receipt of a payment into your PayPal Account does not equate to the receipt of cleared funds. A notification that E-money has been sent to you, does not amount to a receipt of E-money in your Account unless you have accepted the payment. You acknowledge and agree that a payment transaction is completed and received by you even if it becomes subject to a Reversal, Chargeback. Claim, Reserve or hold. When you receive a payment, you are liable to PayPal for the full amount of the payment plus any Fees if the payment is later invalidated for any reason. In addition to any other liability, if there is a Reversal, or if you lose a Chargeback or Claim and you are not entitled to a payment under the Seller Protection Programme, you will owe PayPal an amount equal to the Reversal, Chargeback or Claim and our Fees per Schedule 1 (including a Chargeback Fee if applicable) and PayPal will debit your Balance to recover such an amount. If a sender of a payment files a Chargeback, the credit card company, not PayPal, will determine who wins the Chargeback. You can find out more about Chargebacks by reviewing our Chargeback Guide, accessible via the PayPal Security Centre and the section called: “Selling Safely”. The PayPal Security Centre is accessed via the PayPal website.

4.5 Non discouragement. In representations to your customers or in public communications, you agree not to mischaracterise or disparage PayPal as a payment method. You agree that you will only surcharge for the use of PayPal in compliance with any law applicable to you. You further agree that if you do charge a buyer any form of surcharge that you, and not PayPal, will inform the buyer of the requested charge. PayPal has no liability to any buyer where you have failed to inform the buyer of any surcharge. You acknowledge that if you are permitted to surcharge and your further fail to disclose any form of surcharge to a buyer this may constitute a criminal offence by you.

4.6 Receiving Money in Multiple Currencies. You do not need to maintain a Balance in a particular currency to accept payments sent in that currency. If you already maintain a Balance in the currency in which you receive a payment, we will credit all payments received in that currency to your Balance. If you receive a payment in a currency for which you do not have a Balance, the payment will remain pending and we will ask you to manually accept or refuse the payment unless you have a Premier or Business Account and have already established a preference in your Profile to automatically accept payments in that currency. Where you (not PayPal) offer a currency conversion at the point of sale, you will inform the buyer of the exchange rate and any charges that will be applied to the payment transaction. PayPal has no liability to any buyer if you fail to inform the buyer of the exchange rate and charges. You acknowledge that if you fail to disclose the exchange rate and charges to the buyer this may constitute a criminal offence by you.

4.7 Taxes. It is your responsibility to determine what, if any, taxes apply to the payments you make or receive, and it is your responsibility to collect, report and remit the correct tax to the appropriate tax authority. PayPal is not responsible for determining whether taxes apply to your transaction, or for collecting, reporting or remitting any taxes arising from any transaction.

4.8 Your Refund Policy and Privacy Policy. We recommend that if you are selling goods or services you have a published return policy and a published privacy policy on your website.

4.9 PayPal Business Payments. If you offer PayPal Business Payments in a payment flow, you shall not offer any other PayPal-branded payment option in the same flow, unless otherwise agreed with PayPal.

Back to top



5. Account Balances and transaction information
5.1 Balances and transaction information. You may check your Balance by logging into your Account. Key information relating to your payments will be provided to you via e-mail and your transaction history will also be updated and made available to you at any time by logging into your Account. You will also be able to access a downloadable report via the “History” section of your Account. The “History” section will also show all Fees incurred and any other amounts charged to your Account in the relevant period. The “History” will only be updated and made available if there has been any activity on your Account or any Fees have been incurred in the relevant period. PayPal reserves the right to charge a Fee for providing you with additional information or for providing the transaction history and other information about Fees in a different way. The way in which we provide the transaction information will allow you to store and reproduce the information unchanged, for example by printing a copy. PayPal will ensure that the details of each transaction will be made available for you to view online for at least 13 months from when it is first made available. You do not need to maintain a Balance in your Account in order to make payments. A Balance will be created whenever you use the Service to make either a Bank Funded Payment or a Card Funded Payment. If you hold a Balance you will not receive interest or any other earnings on this Balance because the Balance represents E-Money and not a deposit.

5.2 Amounts you owe us and Multiple Currencies. If one of the currency Balances in your Account shows that you owe us an amount of funds for any reason, PayPal may set-off the amount you owe us by using funds you maintain in a different currency Balance or by deducting amounts you owe PayPal from money you receive into your Account, or money you attempt to withdraw or send from your Account, or in a different Account, and by deducting funds from any withdrawals you attempt to make. If, for a period of 21 Days, you have a Balance that reflects an amount owing to us that is not in Euros, PayPal will convert the amount you owe us to Euros (the Exchange Rate and Fee will be applied to any conversion).

5.3 Risks of Maintaining Balances in Multiple Currencies. You are responsible for all risks associated with maintaining Balances in multiple currencies (including, without limitation, the risk that the value of these Balances will fluctuate as exchange rates change, which over time may result in a significant decrease in the value of the Balances). You agree that you will not attempt to use multiple currencies for speculative trading.

5.4 Set-off of Balances. You agree that we may set-off any of the amounts held in Accounts held or controlled by you with any fees, charges or other amounts owing to us and payable by you or to pay eBay any amounts that are past due for a period of 180 Days. In simple terms, our right to set-off means that we may deduct such fees, charges or other amounts mentioned in this section from an Account Balance held or controlled by you.

5.5 Security Interest. To secure your performance of this Agreement, you grant to PayPal a legal claim against the proceeds of your Account as security for any amount you may owe to us. This is known in legal terms as a “lien” on and “security interest” in your Account.
Back to top



6. Withdrawing/Redeeming E- money
6.1 How to Withdraw/Redeem E-money. You may withdraw funds by electronically transferring them to your bank account or if you are a registered user of a Credit Card Withdrawal Region, your branded MasterCard or Visa card. Some jurisdictions may permit you to withdraw funds to either your bank account or your card. The bank account into which you request the redemption of E-money must be denominated in the home currency of your Account. Balances must be redeemed in your home currency – see section 6.4 if your Account holds a balance in multiple currencies.

6.2

Withdrawal/Redemption Limits. You agree to comply with our requests to verify your identity before we redeem E-money to you to allow us to reduce the risk of fraud or to otherwise comply with our anti-money laundering or other legal obligations. You can view your yearly and/or other periodic withdrawal limits, if any, by logging into your Account and clicking on the “View Limits” link on the “Account Overview.” For this purpose, “yearly” relates to each calendar year. We may, at our reasonable discretion (for example, without limitation, to limit fraud or credit risk), impose limits on the amount of money you can withdraw through our Service.
Execution methods and timeframes.
General. Redemption transactions from your Payment Account will be executed within the timeframes set out in section 3.1.
Redemptions/withdrawals to UK bank accounts. We will use the Faster Payments Service to process a redemption/withdrawal Payment Order (pursuant to section 3.1) where
the payment is made to your UK bank account in Pounds Sterling;
the receiving institution can receive the payment via the Faster Payments Service; and
the payment amount is within the limits stipulated by the Faster Payments Service from time to time
Redemption/withdrawal payments using the Faster Payments Service could (but are not guaranteed to) be credited to your bank account within 2 hours.

Transaction Review. We may review your withdrawal transaction to mitigate any risks and/or to prevent money laundering and to ascertain whether any Restricted Activity (as set out in section 9) is taking place (“Redemption Risk”). Where a Redemption Risk is identified by us, we reserve the right to restrict your Payment Instrument and/or refuse your Payment Order. When you instruct us to perform a redemption, we may treat this as a future dated Payment Order which we will execute within the timeframes set out in section 3.1 once we determine the Redemption Risk has passed. If we release the restriction and/or proceed to process your withdrawal, you agree that the date of your Payment Order will start on the Business Day the restriction was lifted.
6.3 Lifting your withdrawal limit. In order to lift your withdrawal limit, you must complete the steps set out below.
In the UK: 1) Either: set up Direct Debit and complete the Random Deposit Process, or be successfully approved for and activate PayPal Credit; and 2) confirm your location (whether via our automated process, your telephone or by post) and 3) for Premier and Business Account holders provide supplemental business information.
In the Relevant Countries: add a credit card and complete the Link and Confirm Card process.
PayPal may, from time to time, require you to, or provide you with the option of, carrying out other methods or procedures to lift your withdrawal limit.

6.4 Withdrawing Money in Multiple Currencies. If you have multiple currencies in your Balance, you will be able to choose from those when you withdraw funds, but, unless otherwise agreed, the withdrawal will take place in your home currency.

Back to top



7. Term and closing Your Account
7.1 Term and How to Close Your Account. The term of this Agreement is for a period of time when you successfully register for a PayPal account until this Agreement is terminated for whatever reason. Subject to section 7.2, you may close your Account and terminate this Agreement at any time by logging in to your Account, clicking on the “Profile” tab, clicking on the “Close Account” link, and then following the instructions. Upon Account closure, we will cancel any pending transactions and you will forfeit any Balances associated with Redemption Codes. You must withdraw your Balance not later than the time you close your Account and terminate this Agreement. You can find out more about closing your Account in the PayPal Help Centre which is accessed via the PayPal website.

7.2 Limitations on Closing Your Account. You may not close your Account to evade an investigation. If you attempt to close your Account while we are conducting an investigation, we may hold your funds for up to 180 Days to protect PayPal or a third party against the risk of Reversals, Chargebacks, Claims, fees, fines, penalties and other liabilities of whatever nature. You will remain liable for all obligations related to your Account even after the Account is closed.

7.3 Unclaimed Balances on Dormant Accounts. Subject to the remainder of this section, E-money held in your Account is not subject to any time limitation as to its validity. If you do not access your Account for a period of three years it may be closed. After closure, we may use the information you have provided us to try to send you any funds in redemption of the E-money in your Account. If that information is not correct and we are unable to complete the payment to you, we may then deposit (at your expense) your E-money with the Luxembourg Caisse de Consignation at Trιsorerie de l’Etat, 3, rue du St-Esprit, L-1475, Luxembourg, Tel: (+352) 2478-2478, Fax: (+352) 46 72 62. Applicable terms and conditions of the Caisse de Consignation, in particular with regard to fees and taxes due, can be directly obtained from the Caisse de Consignation, Trιsorerie de l’Etat. For the avoidance of doubt, the Trιsorerie de l‘Etat, Caisse de Consignation, is not an operational unit of PayPal, but a department of the Luxembourg Treasury operating under the jurisdiction of the Luxembourg Ministry of Finance. Please contact PayPal Customer Service at the telephone number shown on the PayPal website(s) if you have any questions about funds held in your Account if it has been closed pursuant to this section 7.3.
Back to top



8. Fees and Currency Conversion
8.1 Fees. Fees for Users registered in the UK and Relevant Countries are set out in Schedule 1 below. For the avoidance of doubt, a User with a PayPal Account not registered in the UK or Relevant Countries will be liable to PayPal for the fees as set out in the terms of the User Agreement applicable to the country where the User is registered or as set out in the Fee Table accessible via the “footer” of each page of the PayPal website applicable to the country where the User is registered.
If other Fees apply for services or functionalities not referred to in Schedule 1 below, you will be notified of those Fees on the PayPal Website(s) where those other services or functionalities are offered or provided.

8.2 Currency Conversion. If your transaction involves a currency conversion by PayPal, it will be completed at a foreign exchange rate determined by a financial institution, which is adjusted regularly based on market conditions. The exchange rate is adjusted regularly and may be applied immediately and without notice to you. This exchange rate includes a processing fee expressed as a certain percentage above the wholesale exchange rate at which PayPal obtains foreign currency, and the processing fee is retained by PayPal.
Where a currency conversion is offered by PayPal at the point of sale you will be shown the exchange rate that will be applied to the transaction before you proceed with authorising the payment transaction. By proceeding with your authorisation of the payment transaction you are agreeing to the currency conversion on the basis of the exchange rate. You may opt out of a currency conversion by PayPal before you complete your payment by selecting “Other Conversion options” on the “Review Your Information” page during checkout.

Where a currency conversion is offered at the point of sale by the merchant, not by PayPal, and you choose to authorise the payment transaction on the basis of the merchant's exchange rate and charges, PayPal has no liability to you for that currency conversion.

The “Currency Converter” tool can be accessed through your Account and used to see what exchange rates apply at any given time.

Where your payment is funded by a Debit or Credit Card and involves a currency conversion, by entering into this agreement you consent to and authorise PayPal to convert the currency in place of your Credit or Debit card issuer.

A Currency Conversion Fee (as set out in Schedule 1 of this Agreement) will apply whenever PayPal performs a currency conversion.
Back to top



9. Restricted Activities
9.1 Restricted Activities. In connection with your use of our website, your Account, or the Services, or in the course of your interactions with PayPal, a User or a third party, you will not:

Breach this Agreement (including, without limitation, opening multiple PayPal accounts or breaching the Card Processing Agreement, the Acceptable Use Policy or any other agreement that you have entered into with PayPal (including a Policy));
Breach any law, statute, contract, or regulation (including, without limitation, those governing financial services including anti-money laundering, consumer protections, unfair competition, anti-discrimination and false advertising);
Infringe PayPal’s or any third party's copyright, patent, trademark, trade secret or other intellectual property rights, or rights of publicity or privacy;
Act in a manner that is obscene, defamatory, libelous, unlawfully threatening or unlawfully harassing;
Provide false, inaccurate or misleading Information;
Fail to provide us with further information about you or your business activities that we may reasonably request;
Send or receive what we reasonably believe to be potentially fraudulent or unauthorised funds;
Refuse to cooperate in an investigation or provide confirmation of your identity or any Information you provide to us;
Attempt to "double dip" or undertake any action which could amount to unjust enrichment during the course of a dispute by receiving or attempting to receive funds from both PayPal and the seller, bank, or credit card company for the same transaction;
Use an anonymising proxy;
Control an Account that is linked to another Account that has engaged in any of these Restricted Activities;
Conduct your business or use the Services in a manner that results in or may result in complaints, Disputes, Claims, Reversals, Chargebacks, fees, fines, penalties and other liability to PayPal, a User, a third party or you;
Abuse (as either a buyer or seller) of our Online Dispute Resolution process and/or PayPal Buyer Protection;
Cause PayPal to receive a disproportionate number of Claims that have been closed in favour of the claimant regarding your Account or business;
Have a credit score from a credit reporting agency that indicates a high level of risk associated with your use of the Services;
Use your Account or the Services in a manner that PayPal, Visa, MasterCard, American Express or our bank acquirer and/or payment processors reasonably believe to be an abuse of the bank’s reversal process, credit card system or a violation of credit card association rules;
Allow your Account to have a balance reflecting an amount owing to us;
Undertake activity that does or may present to us a credit or fraud risk, a sudden increase in exposure, or a significant or otherwise detrimental level of exposure (as PayPal reasonably believes based on the information available to it);
Provide yourself a cash advance from your credit card (or help others to do so);
Access the Services from a country that is not included on PayPal's Worldwide page;
Disclose or distribute another User’s Information to a third party, or use the Information for marketing purposes unless you receive the User’s express consent to do so;
Send unsolicited email to a User or use the Services to collect payments for sending, or assisting in sending, unsolicited email to third parties;
Take any action that imposes an unreasonable or disproportionately large load on our infrastructure;
Facilitate any viruses, Trojan horses, worms or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or Information;
Use any robot, spider, other automatic device, or manual process to monitor or copy our website without our prior written permission;
Use any device, software or routine to bypass our robot exclusion headers, or interfere or attempt to interfere, with our website or the Services;
Copy, reproduce, communicate to any third party, alter, modify, create derivative works, publicly display or frame any content from the PayPal website(s) without our or any applicable third party’s written consent;
Take any action that may cause us to lose any of the services from our internet service providers, payment processors, or other suppliers;
Use the Service to test credit card behaviours;
Reveal your Account password(s) to anyone else, nor may you use anyone else's password. We are not responsible for losses incurred by you including, without limitation, the use of your Account by any person other than you, arising as the result of misuse of passwords;
Do, or omit to do, or attempt to do or omit to do, any other act or thing which may interfere with the proper operation of the Service or activities carried out as part of the Services or otherwise than in accordance with the terms of this Agreement;
Request or send a Personal Transaction payment for a Commercial Transaction; or
Allow your use of the Service to present to PayPal a risk of non-compliance with PayPal’s anti-money laundering, counter terrorist financing and similar regulatory obligations (including, without limitation, where we cannot verify your identity or you fail to complete the steps to lift your sending, receiving or withdrawal limit in accordance with sections 3.3, 4.1 and 6.3.).
Integrate or use any of the Services without fully complying with all mandatory requirements communicated to you by way of any integration or programmers’ guide or other documentation issued by PayPal from time to time.
You agree that engaging in the above Restricted Activities diminishes your or other PayPal customers’ safe access and/or use of your Payment Instrument, Account or the Service generally.

9.2 Keeping your Payment Instrument Safe. You agree to perform the following actions to keep your Payment Instrument safe:

Not engage in any of the Restricted Activities;
Keep the details of your Funding Sources and password safe;
Not allow anyone else to have or use your Funding Sources or password details;
Not disclose the details of your Funding Sources or password except when using the Service;
Never write your password in a way that can be understood by someone else;
Not choose a password that is made more memorable to you such as a sequence of letters or numbers that may be easy to guess;
Take care to make sure that no one sees your password when you use it; and
Comply with all reasonable instructions we may issue regarding how you can keep your Payment Instrument safe.
Keep your personal details in your Account up to date. We may be unable to respond to you if you contact us about your Account from an address, telephone number or email account that is not registered with us.
Take all reasonable steps to protect the security of the personal electronic device through which you access the Services (including, without limitation, using pin and/or password protected personally configured device functionality to access the Services and not sharing your device with other people).
Back to top



10. Your Liability – Actions We May Take
10.1 Your Liability.

You are responsible for all Reversals, Chargebacks, fees, fines, penalties and other liability incurred by PayPal, a PayPal User, or a third party caused by your use of the Services and/or arising from your breach of this Agreement. You agree to reimburse PayPal, a User, or a third party for any and all such liability.
Liability for Claims under PayPal Buyer Protection.Notwithstanding any other section of this Agreement, if PayPal makes a final decision that you lose a Claim filed directly with PayPal, you will be required to reimburse PayPal for your liability. Please see section 13 (and in particular sections 13.1, 13.2 and 13.3) for details about how PayPal Buyer Protection may affect you as a seller. Your liability will include the full purchase price of the item and original postage costs (and in some cases, you may not receive the item back). PayPal Seller Protection may cover your liability, see section 11 below.
Reimbursement for Your Liability.In the event you are liable for any amounts owed to PayPal, PayPal may immediately remove such amounts from your Balance (if available). If there are insufficient funds in your Balance to cover your liability, PayPal reserves the right to collect your debt to PayPal by using any payments received in your Account and otherwise you agree to reimburse PayPal through other means. PayPal may also recover amounts you owe us through legal means, including, without limitation, through the use of a debt collection agency.
Temporary Holds for Disputed Transactions.If a buyer files a Claim, Chargeback or Reversal on a payment you received, PayPal will place a temporary hold on the funds in your Account to cover the full amount of the Claim, Chargeback or Reversal. A hold placed under this provision will not restrict your use of the Account with regard to funds other than those disputed or at risk under the Claim, Chargeback or Reversal, unless we have another reason for doing so. If you win the dispute or if the payment is eligible for a payment under the terms of PayPal Seller Protection, we will release the hold and restore your access to the applicable funds. If you lose the dispute, PayPal will remove the funds from your Account. This process also applies to claims that a buyer files with eBay through the eBay resolution process if your PayPal Account is your reimbursement method for buyer claims and eBay has notified us of the claim. Claims filed directly with eBay are governed by eBay policy only - the terms of the PayPal Seller Protection programme do not cover sellers in respect of those claims.
10.2 Actions by PayPal. If we have reason to believe that you have engaged in any Restricted Activities, we may take various actions to protect PayPal, eBay, a User, a third party, or you from Reversals, Chargebacks, Claims, fees, fines, penalties and any other liability. The actions we may take include but are not limited to the following:

We may, at any time and without liability, suspend, block, limit, close or cancel your right to use your Payment Instrument or Account entirely or for any particular transaction, which may in turn suspend, block, limit, close or cancel access to your Account or the Services (such as limiting access to any of your Funding Sources, and your ability to send money, make withdrawals, or remove financial Information). We will normally give you advance notice of any suspension or cancellation but we may, if it is reasonable to do so (for example if you are in breach of this Agreement or we consider it advisable for security reasons), suspend or cancel your right to use your Payment Instrument or Account without prior notice to you;
Block your Account and/or hold any funds in the Reserve Account (including, without limitation, for more than 180 days if so required by PayPal, where PayPal’s rights under section 10.2 arise from your engagement in the Restricted Activity set out in section 9.1 ag.);
Refuse any particular payment transaction at any time for any reason and will only be required to make available the fact of the refusal and the reasons for the refusal and how you may resolve the problem, where possible, upon request and provided it is not prohibited by law;
We may reverse a payment (including, if appropriate, to the sender’s Funding Source), that violates our Acceptable Use Policy or section 9, or which we reasonably suspect of violating our Acceptable Use Policy or section 9;
We may contact third parties and disclose details of the Restricted Activities in the manner set out in our Privacy Policy;
We may request information from you or otherwise update inaccurate Information you provided us;
We may refuse to provide our Services to you in the future;
We may hold your funds to the extent and for so long as reasonably needed to protect against the risk of liability. You acknowledge that, as a non-exhaustive guide:
PayPal’s risk of liability in respect of card-funded payments that you receive can last until the risk of a Chargeback closing in favour of the payer/buyer (as determined by card scheme rules) has passed. This depends on certain factors, including, without limitation:
The type of goods or services for which you receive payment; or
The timeframe for delivery of the goods or performance of the services for which you receive payment (e.g. sales of event tickets months in advance of the event date can present a higher and more enduring risk of Chargebacks than sales of most other items or services);
PayPal’s risk of liability in respect of a Claim or Dispute arising from a payment that you receive can last for the time that it takes for the parties to close the Claim or Dispute and all appeals associated with that Claim or Dispute in accordance with section 13 of this Agreement;
PayPal’s risk of liability in respect of any event of insolvency that you suffer can last for as long as and to the extent that laws applicable to your insolvency restrict PayPal from taking legal action against you; and
If you allow your Account to have a balance reflecting an amount owing to PayPal, PayPal’s risk of liability can last for the time and to the extent that you owe that amount to PayPal.
We may take legal action against you.
Unless otherwise directed by us, you must not use or attempt to use your Payment Instrument or Account while it is suspended or has been closed. You must ensure that all agreements with merchants or other third parties that involve third party initiated payments (including, Recurring Payments) set up from your Account are cancelled immediately upon the termination, suspension or closure of your Account. You remain liable under this Agreement in respect of all charges and other amounts incurred through the use of your Account at any time, irrespective of termination, suspension or closure.

10.3 Account Closure and Limited Access. At our sole discretion we may close your Account and terminate this Agreement with you at our convenience by providing you with two months prior notice. We may also close your Account and terminate this Agreement at any time where you are in breach of the terms of this Agreement. If we close your Account, we will provide you with notice of Account closure and where practicable, the reasons for closing your Account, together with the ability to withdraw any undisputed funds that we are holding. If we suspect that your Account has been accessed without your authorisation, we may also suspend, or limit, your access to your Account or the Services (such as limiting access to any of your Funding Sources, and your ability to send money, make withdrawals, or remove financial Information). If we otherwise limit access to your Account, we will provide you with notice and opportunity to request restoration of access if appropriate.

10.4 Reserves. PayPal, in its sole discretion, may place a Reserve on funds held in your Account when PayPal reasonably believes (based on the information available to PayPal at the time of taking the Reserve and what in its sole discretion it regards as an acceptable level of risk to PayPal under all the circumstances) there may be a higher than acceptable level of risk associated with your Account. If PayPal places a Reserve on funds in your Account, the funds will be held in your Reserve Account and those funds will be shown as “pending” in your PayPal Balance. If your Account is subject to a Reserve, PayPal will provide you with a notice specifying the terms of the Reserve. The terms may require that a certain percentage of the amounts received into your Account are held for a certain period of time, or that a certain amount of money is held in reserve, or anything else that PayPal determines is necessary to protect against the risk associated with your Account. PayPal may change the terms of the Reserve at any time by providing you with notice of the new terms. You may close your Account if you object to the Reserve. If your Account is closed for any reason, we have the right to hold the Reserve for up to 180 Days. When managing risk for Accounts, we may also limit the amount you can immediately withdraw or change the speed or the method of payment for withdrawals, set-off amounts from your Balance and/or require that you, or a person associated with you, enter into other forms of security arrangements with us (for example, by providing a guarantee or requiring you to deposit funds with us as security for your obligations to us or third parties). You also agree to undertake, at your own expense, any further action (including, without limitation, executing any necessary documents and registering any form of document reasonably required by us to allow us to perfect any form of security interest or otherwise) required to establish a Reserve or other form of security in a manner reasonably determined by us.

10.5 Payment Hold

You agree that if either:
i. you receive a payment that involves Transaction Risk; or

ii. there may be a higher than acceptable level of risk or exposure associated with your Account (based on the information available to PayPal at the relevant time and what in its sole discretion it regards as an acceptable level of risk or exposure to PayPal under all the circumstances),

PayPal may in its sole discretion (acting reasonably) place a hold on that or any payment. If PayPal places a hold on funds in your Account, we will notify you about it (including, without limitation, how long the hold may last) - the funds will be held in your Reserve Account and those funds will be shown as “pending” in your PayPal Balance.

PayPal will release the hold made on your payment under this provision when PayPal determines that the Transaction Risk; or risk or exposure associated with your Account, no longer exists. Please note that, notwithstanding the above, if you receive a Dispute, Claim, Chargeback, or Reversal on the transaction payment subject to the hold, the funds (or an amount equal to the relevant payment) may be held in your Reserve Account until the matter is resolved pursuant to this Agreement.
You agree to provide to PayPal any information as PayPal may reasonably request to allow PayPal to determine whether the Transaction Risk or risk or exposure to your Account has passed. You may close your Account if you object to the hold under this provision. If your Account is closed for any reason, PayPal has the right to hold a payment under this provision for a period of up to 180 days from the date the complete obligations under the contract for sale (to which the payment in question relates) have been discharged.
10.6 Information about you

PayPal reserves the right to request additional information from you, other than what is referred to in this Agreement, to allow it to comply with its anti-money laundering obligations. You agree to comply with any request for further information as we reasonably require to enable us to comply with our anti-money laundering obligations. This may include, without limitation, requiring you to fax, email or otherwise provide to us certain identification documents. You also agree to provide us, upon our reasonable request and at your own expense, information about your finance and operations, including, without limitation, your most recent financial statements (certified or otherwise) and merchant processing statements (if applicable).
Back to top



11. Seller Protection Programme
11.1 What is PayPal seller protection?

If you are the recipient of a payment made by a customer ("Payment Recipient"), we may reimburse you an amount for Claims, Chargebacks, or Reversals made against you based on the following reasons:

A Chargeback or Reversal was issued against you for the reason of an “Unauthorised Payment”; or
A Chargeback or Claim was issued against you for the reason of “Not Received”,
where PayPal receives from you proof that the item was posted or delivered in accordance with the requirements set forth below, subject to the further provisions of this section 11 (including, without limitation, the Eligibility Requirements at section 11.6).

11.2 Availability of PayPal seller protection

PayPal seller protection is available to:

Payment Recipients with registered PayPal Account(s) in the Relevant Countries who receive PayPal payments from buyers making an eligible purchase via eBay (worldwide and everywhere PayPal is accepted); and
Payment Recipients with registered PayPal Account(s) in the UK, Ireland, Czech Republic, Greece, Hungary and/or Slovakia who receive PayPal payments from buyers making eligible purchases outside of eBay.
PayPal seller protection does not apply to Claims, Chargebacks and/or Reversals for the reason that the purchase was Significantly Not as Described (SNAD) nor for items that you deliver or are picked up in person.

11.3 How much protection is provided by PayPal seller protection?

PayPal will pay you the full amount of an eligible payment the subject of the Claim, Chargeback, or Reversal and waive the Chargeback Fee, if applicable. There is no limit on the number of payments for which you can receive re-imbursement under PayPal Seller Protection.

11.4 What happens when a buyer files a Claim, Chargeback, or Reversal?

PayPal will place a temporary hold on the funds in your Account to cover the full amount of the Claim, Chargeback, or Reversal. See section 10.1.d for further details about the temporary hold process.

11.5 If the payment is not covered by PayPal seller protection, PayPal will remove the funds from your Account and return the payment to the buyer. In addition, you will be responsible for PayPal’s Chargeback Fee, if applicable.

11.6 Eligibility Requirements

What are the eligibility requirements for PayPal seller protection?

You must meet all of these requirements to be covered:

The item purchased must be a physical, tangible good.
The transaction must be marked by PayPal as eligible or partially eligible for PayPal seller protection on your Account “Transaction Details” page. If it is marked eligible, protection for both Unauthorised Payments and Item Not Received will apply. If it is marked partially eligible, protection for only Item Not Received will apply.
Post the item to the shipping address on the “Transaction Details” page. If the item is delivered in person or if the Payment Recipient posts the item to a different address (for example, if the buyer asks that you send to another address on the basis that it is a “work address” or a “gift” address) then you will not be eligible for re-imbursement under the terms of the programme.
You may access the “Transactions Details” page by logging into your PayPal Account, selecting “History” and then selecting “Details” for the transaction.
Follow the postage requirements described below.
You must accept a single payment from one PayPal Account for the purchase.
Respond to PayPal’s requests for documentation and other information that is reasonably required by PayPal to investigate the matter in a timely manner.
Your primary residence, as listed in your PayPal Account, must be in the United Kingdom and/or Ireland (however, different levels of protection apply for each region, please see section 11.2 above).
Your eligibility is not otherwise suspended.
Eligibility requirements c. and d. above do not apply to any item for which you receive payment through the PayPal Location Based Payments Functionality, provided that you provide to PayPal proof (to PayPal’s reasonable satisfaction) that the item was collected by or delivered to the buyer.

Suspension of eligibility

We may suspend your eligibility for PayPal seller protection if, over the past 30 days:
the total monetary amount of "Buyer Returns" (being Chargebacks, Claims, and (as they relate to Unauthorised Payments only) Reversals) issued against your PayPal Account (no matter where the transaction takes place and whether on or outside of eBay) was equal to or greater than 1% of the total monetary amount of payments received in your PayPal Account during that 30 day period; and
at least 100 Buyer Returns were issued against your PayPal Account.
We will lift the suspension after 90 days, provided that, over the past 90 days:
the monetary amount of Buyer Returns issued against your PayPal Account was below 1% of the total monetary amount of payments received in your PayPal Account during that time; and
fewer than 300 Buyer Returns were issued against your PayPal Account.
We will notify you by e-mail if we suspend or lift the suspension of your eligibility for PayPal seller protection.

11.7 What are the postage requirements?

 
Protection for Unauthorised Payment
Protection for Item Not Received
Postage requirements
Proof of Postage (minimum) or Proof of Delivery
Proof of Delivery
   
11.8 What is “Proof of Postage”?

Online or physical documentation from a postal company that includes all of the following:

A status of “shipped” (or equivalent) and the date of postage
The recipient’s address, showing at least the city/county or postcode (or international equivalent).
Official acceptance from the shipping company (for example, a postmark, a receipt, or online tracking information). Or, if you have Proof of Delivery then you do not need Proof of Postage.
11.9 What is “Proof of Delivery”?

Online documentation from a postal company that includes all of the following:

A status of “delivered” (or equivalent) and the date of delivery.
The recipient’s address, showing at least the city/county or postcode (or international equivalent).
11.10 What are examples of items/transactions/cases that are not eligible for PayPal seller protection?

Intangible items, licenses for digital content, and services.
Items that you deliver (or are picked up) in person (except for items for which you received payment through the PayPal Location Based Payments Functionality).
Transactions made through Zong, Website Payment Pro (PayPal Direct Payment and Virtual Terminal).
Claims, Chargebacks and Reversals for Significantly Not as Described; and/ or claims filed directly with eBay.
PayPal Business Payments.
Back to top



12. Errors and Unauthorised Transactions
12.1 Identifying Errors and/or Unauthorised Transactions. You can inspect your transaction history at any time by logging in to your Account on the PayPal website and clicking the "History" tab. It is very important that you immediately notify PayPal if you have reason to believe any of the following activities have occurred: (i) there has been an unauthorised transaction sent from your Account; (ii) there has been unauthorised access to your Account; (iii) your password or mobile PIN has been compromised; (iv) your PayPal Mobile-activated phone has been lost, stolen or deactivated, or (v) someone has transferred or may transfer money from your Account without your permission (collectively called “Improper Account Access”). You must also immediately notify us if you have reason to believe that any other error has occurred on your Account. In order for you to notify PayPal immediately of any of the above events, we strongly recommend that you monitor your Account closely on a regular basis. We will not seek to hold you liable for any unauthorised use of your Account by any person provided that we are satisfied that you have not acted deliberately so as to enable any third person to gain access to your PayPal ID and/or password/PIN or to your device while you are logged into the Services. We will hold you liable for unauthorised use of your Account if we have evidence that you acted deliberately so as to enable any third person to gain access to your PayPal ID and/or password/PIN; you acted fraudulently; or if you have with intent or gross negligence failed to comply with your obligations to use your Payment Instrument in the manner set out in this Agreement.

12.2 Notifying PayPal of Errors Unauthorised Transactions and/or misappropriated or unauthorised use of your Payment Instrument. You must notify us if you believe there has been or will be an error, unauthorised transaction, misappropriated or unauthorised use of your Payment Instrument or your Account, by telephoning PayPal Customer Service at the telephone number shown on the PayPal website(s), contacting us using this report form or writing to PayPal, Attn: Error Resolution Department 22-24 Boulevard Royal L-2449, Luxembourg. If you initially provide information to us via the telephone, we may require that you send your complaint or question in writing within ten Business Days after the phone contact. Please complete the affidavit form and submit it online or mail it to PayPal, Attn: Error Resolution Department 22-24 Boulevard Royal L-2449, Luxembourg. You must give us all the information in your possession as to the circumstances of any errors, unauthorised transactions and/or misappropriated or unauthorised use of your Payment Instrument or Account and take all reasonable steps requested to assist PayPal in its investigation. We may provide third parties with information we consider relevant in such circumstances in accordance with our Privacy Policy.

12.3 Review of Reports of Errors. We will advise you of the results of our investigation within 20 Business Days after we receive your notice. If we have made an error, we will correct it promptly. If we need more time, however, we may take up to 60 Days to investigate your complaint or question. If we decide that we need more time, we will provisionally re-credit your Account for the amount you think is in error within ten Business Days after we receive your notice; so that you will have use of the E-money during the time it takes us to complete our investigation. If you initially provided information to us via the telephone and we do not receive your complaint or question in writing within ten Business Days after your oral notice, we are not required to provisionally re-credit your Account.

At the end of our investigation, we will advise you of the results within three Business Days. If we determine that there was no error, we will send you a written explanation and we may debit any provisional credit that we previously credited to you in relation to the alleged error. You may ask for copies of the documents that we used in our investigation (and this will not attract the Records Request Fee set out in Schedule 1).

12.4 Liability for Unauthorised Transactions. If you report that there has been an Improper Account Access related to your Account, and there is no evidence to suggest fraud or deliberate or grossly negligent behaviour by you, we will reimburse you in full for all unauthorised transactions sent from your Account provided that you have informed us of the Improper Account Access without undue delay and in any event, no later than 13 months after the first Improper Account Access transaction was executed. Where we believe in our reasonable opinion that further investigation is required to ascertain more clearly the circumstances surrounding the reported Improper Account Access, we will follow the same process as set out in section 12.3 above for such investigation

12.5 Entitlement to a refund. You are entitled to a refund of the full amount of any payment transaction authorised by you and initiated by or through a merchant or other third party, provided the conditions applicable to a refund according to Section 3.10 have been met.

12.6 Errors. If we discover a processing error, we will rectify the error. If the error resulted in your receiving less money than you were entitled to, PayPal will credit your Account for the difference. If the error results in you receiving more money than you were entitled to, PayPal may debit the extra funds from your PayPal Account. If a payment was made to your Funding Source by way of mistake, PayPal may correct the mistake by debiting or crediting (as the case may be) your appropriate Funding Source(s). If the error resulted in our not completing a transaction on time or in the correct amount, we will be liable to refund any amount as a result of carrying out a defective or non-executed payment transaction and for your losses or damages directly and reasonably foreseeably caused by this failure, unless:
through no fault of ours, you did not have enough available funds to complete the transaction,
our system was not working properly and you knew about the breakdown when you started the transaction, or
circumstances beyond our control (such as fire or flood or loss of Internet connection) prevented the transaction, despite our reasonable precautions.
Notwithstanding any other term of this Agreement, PayPal will not be held liable for the non-execution or defective execution of a payment transaction (whether initiated by yourself or another PayPal customer) if you have failed to notify PayPal of such an incorrectly executed payment transaction without undue delay, or in any event no later than within 13 months after the debit date, on becoming aware of such incorrectly executed payment transaction.
Back to top



13. PayPal Buyer Protection
13.1 What is PayPal Buyer Protection?

PayPal Buyer Protection enables PayPal to make a final decision at its full and sole discretion on any problem raised by a buyer in respect of any purchase paid for using PayPal. The final decision may result in PayPal reimbursing the buyer for the amount of the payment made through PayPal for the purchase (up to the full price of the purchase and (where applicable) original postage costs) and the Payment Recipient bearing liability to PayPal for that reimbursement.

PayPal Buyer Protection is neither a product warranty nor a service warranty. No guarantees are given.

If you are a Payment Recipient, your liability under PayPal Buyer Protection may be covered by the Seller Protection Programme (please see section 11 for more details). Sometimes we may be able (but shall not be obliged) to waive your liability for the reimbursement for other reasons (at our full and sole discretion).

Whether you are the buyer or Payment Recipient, you acknowledge that the Services may be used as a method of payment for a wide and complex variety of types of purchases, both online and offline. Accordingly and notwithstanding anything otherwise in this Agreement, you agree that PayPal may (but shall not be obliged to) at any time and for any reason at its full and sole discretion and without liability:

make a final decision on any problem with a purchase raised by a buyer with a PayPal account registered anywhere in the world (whether under the PayPal Buyer Protection policy or User Agreement of the country of registration of that buyer’s PayPal Account or otherwise) in favour of the buyer or the Payment Recipient. The final decision will always be communicated in writing (which may be by email). In the event that PayPal makes a final decision on the problem in favour of the buyer or Payment Recipient, each party must comply with PayPal’s final decision; and
waive the terms and conditions of coverage under PayPal Buyer Protection (whether stated in this Agreement or otherwise, including, without limitation, the conditions of reimbursement at section 13.4) at any time and for any reason, for the purpose of facilitating the resolution of any problem raised by a buyer relating to a purchase paid for using PayPal. As a non-exhaustive guide, this may include allowing reimbursement for Disputes or Claims raised outside of the timeframes set out in section 13.5 for certain purchases (typically purchases agreed to be delivered or performed outside of the timeframe set out in section 13.5), where we have reason to believe that the buyer did not have a reasonable opportunity within that timeframe to determine that there was a problem with that purchase.
PayPal is not obliged to reimburse you for any costs that you incur to comply with any of PayPal’s requests for cooperation for the purpose of resolving the problem (including, without limitation, costs that you incur to return a SNAD item to the Payment Recipient or another party as PayPal requests), although sometimes it may reimburse these costs.

If you sell or market to buyers in other countries, please read the PayPal Buyer Protection policy of the countries in which your target buyers are based (accessible via the “Legal” or “Legal Agreements” footer on most PayPal site pages) as these policies will apply to you as a Payment Recipient or seller.

13.2 Is PayPal Buyer Protection right for me?

The outcome of any decision made by PayPal under PayPal Buyer Protection might not always be suitable for your particular needs and you should carefully read this section 13 and consider your options before using PayPal to resolve a problem.

If PayPal is contacted to resolve a problem, PayPal may require you to take an irreversible action to resolve the problem, which might make it no longer practicable in the circumstances for you to resolve the problem in another way. For example, PayPal may require you to return the item to the Payment Recipient under section 13.6.

Please see below for a non-exhaustive list of ways of resolving your problem without involving PayPal.

Resolve the problem directly with the Payment Recipient: Before contacting PayPal about a problem, you should contact the Payment Recipient directly to resolve the problem in accordance with the Payment Recipient’s return policy (if any) as stated on their eBay listing, website or other sales literature. If you do this:
the conditions for reimbursement at section 13.4 will still apply (including, without limitation, the timeframe for raising a Dispute set out in section 13.5b). It is your responsibility to keep track of these deadlines; and
there is a risk that the Payment Recipient may require you to take certain actions that could cause you to fail to meet the conditions for reimbursement at section 13.4 (for instance, if (whether as part of the Payment Recipient’s return policy or otherwise) the Payment Recipient directs you (and you proceed) to post an item that you purchased to an address that does not correspond with our record of the Payment Recipient’s address, we may determine that you have not posted the item back to the Payment Recipient in compliance with section 13.6).

If you are a Payment Recipient, as you may be liable for any reimbursement made by PayPal to the buyer, you acknowledge that it is in your interests to resolve directly with the buyer any problem with a purchase paid for through PayPal.
Your statutory/legal rights: You may wish to contact the European Consumer Centre (ECC-Net) at http://ec.europa.eu/consumers/redress_cons for advice on your consumer rights and other legal rights (if you are a UK resident you can also contact the Citizens Advice Bureau by visiting https://www.adviceguide.org.uk).
Card chargeback rights: You may pursue your chargeback rights with your card company or card issuer (if they apply), but if you do so at the same time as pursuing the resolution of your problem (whether through a Claim or Dispute) under PayPal Buyer Protection or if you seek a double recovery, PayPal may close your Dispute or Claim and/or hold you liable for the amount you have been reimbursed under PayPal Buyer Protection, and you will have to rely solely on your chargeback rights.
If PayPal is contacted to resolve a problem, PayPal may require you to take an irreversible action to resolve the problem, which might make it no longer practicable in the circumstances for you to resolve the problem in another way. For example, PayPal may require you to return the item to the Payment Recipient under section 13.6.

13.3 What happens when PayPal makes a final decision in favour of the buyer…

If am a buyer?If PayPal makes a final decision on your problem (including, without limitation, a Dispute or a Claim) in your favour, PayPal may (but shall not be obliged to) reimburse you for the amount of the payment made through PayPal for the purchase (up to the full price of the purchase and (where applicable) original postage costs). Please see section 13.4 (Conditions for reimbursement) for details of the conditions of reimbursement.

If I am a Payment Recipient?If PayPal makes a final decision on the buyer’s problem in the buyer’s favour, you will be liable to PayPal for the amount that PayPal may reimburse to the buyer. PayPal shall not be obliged to refund your PayPal or eBay fees associated with the transaction. In some cases (for instance, if you lose a SNAD Claim because the item you sold is counterfeit) you might not receive the item back from the buyer (for instance, it may be disposed of or otherwise irreversibly dealt with).

13.4 Conditions for reimbursement

You may be reimbursed under PayPal Buyer Protection for a problem with a purchase only if all of the following requirements are met:

Your purchase is an eligible purchase. Purchases of most goods and services are eligible, except for purchases of the following :
real estate (including, without limitation, residential property);
businesses (including, without limitation, any items or services forming part of a business or corporate acquisition);
vehicles (including, without limitation, motor vehicles, motorcycles, caravans, aircraft and boats);
custom made items;
goods and services prohibited by the PayPal Acceptable Use Policy;
items that violate eBay’s Prohibited or Restricted Items Policy;
industrial machinery used in manufacturing;
items equivalent to cash (including, without limitation, gift cards);
goods and services purchased using Zong, Website Payments Pro, Virtual Terminal or Personal Transaction payments;
anything on eBay for which the listing does not contain a PayPal Buyer Protection message or an eBay Buyer Protection message (you can view this message in the listing after you complete your purchase by logging into your eBay account, going to “my eBay,” then “won”, and looking at the listing);

and, unless you are purchasing as a registered UK resident user of PayPal:
intangible items (including, without limitation, rights of access to digital content and other licences) ;
services; and
travel tickets (including, without limitation, airline flight tickets).
You sent the payment for your purchase from your PayPal Account to the Payment Recipient’s PayPal Account:
through:
the eBay “Pay Now” button or the eBay invoice; or
for purchases made outside of eBay: the Send Money tab applicable to payments for goods and/or services on the PayPal website or app, or the Payment Recipient's PayPal checkout flow (including, without limitation, the PayPal Location Based Payments Functionality, if used by the Payment Recipient); and
in one instalment only. Purchases paid for in multiple instalments – like a deposit followed by a final payment – are not eligible.
Your problem is either that:
you did not receive your purchase– “Not Received” (“NR”); or
your purchase is “Significantly Not as Described” (“SNAD”). Further information on what we mean by “SNAD” is set out in section 13.9.

If your problem is a transaction that you did not authorise (including, without limitation, a duplicate or incorrect payment when using the PayPal Location Based Payments Functionality), please see section 12 and visit the PayPal Security Centre at https://www.paypal.co.uk/security. You can report the problem via the PayPal Security Centre or <here>.
You have followed the process described in section 13.5 (How do I resolve my problem?).
PayPal has made a final decision on your problem in your favour.
13.5 How do I resolve my problem?

Try to resolve your problem directly with the Payment Recipient

Use reasonable endeavours to resolve the problem directly with the Payment Recipient. If you are still unable to resolve the problem, go to the Online Resolution Centre and follow steps b, c and d.
Open a Dispute

Open a Dispute within 45 days (or, if you are claiming as a registered UK resident user of PayPal, 180 days)of the date on which you made the payment for the purchase you would like to dispute. We may refuse to accept any Dispute that you open in relation to that purchase after the expiry of that period (please be aware of this if you agree a delivery time of an item or performance of a service with the Payment Recipient that falls after the expiry of that period).
Escalate the Dispute to a Claim

If you and the Payment Recipient are unable to come to an agreement, escalate the Dispute to a Claim within 20 days of opening the Dispute. It is your responsibility to keep track of these deadlines.

You must wait at least 7 days from the date of payment to escalate a Dispute for a purchase Not Received (NR), unless the Dispute is for 2,500 USD or more (or currency equivalent). To find the currency equivalent in any other currency (for example, GBP or Euro) at the time of transaction please log into your Account and use the “Currency Converter” tool located in your Account Overview.

If you do not escalate the Dispute to a Claim within 20 days, PayPal may close the Dispute and you will not be eligible for a payment under the terms of PayPal Buyer Protection.

In certain cases, PayPal may permit you to edit or change a Claim after filing only if you wish to add further information or if you wish to change the reason of your Dispute/Claim from “Not Received” to “Significantly Not as Described”. Otherwise you may not edit or change a Claim after filing it.
Respond to PayPal’s requests in a timely manner

Once a Dispute has been escalated to a Claim, PayPal may make a final decision on your problem in favour of the buyer or the Payment Recipient. Before (and for the purpose of) making a final decision on your problem, PayPal may request your cooperation in resolving the problem under section 13.6.
13.6 Cooperating with PayPal to resolve the problem

Whether you are the buyer or the Payment Recipient, for the purpose of resolving the problem, PayPal may request and require you to (and you shall in a timely manner): (i) provide documentary evidence (at your own expense, unless PayPal agrees otherwise) to support your position (including, without limitation, receipts, third party evaluations and police reports); and (ii) take any other action that PayPal specifies. If you refuse to comply with PayPal’s requests, PayPal may make a final decision in favour of the other party.

As a non-exhaustive guide, PayPal may request and require:

the buyer to post back to the Payment Recipient, to PayPal or to a third party (as PayPal may direct) an item that the buyer claims is SNAD and to provide Proof of Delivery (as set out in section 11.9 above). Please take reasonable precautions in re-packing the item to reduce the risk of damage to the item during transit.
the Payment Recipient to accept back the item sent to it by the buyer and refund the buyer the full purchase price plus original postage costs. If the Payment Recipient refuses to accept an item sent back to the Payment Recipient by the buyer at PayPal’s direction), PayPal may award the Claim in favour of the buyer, provided the buyer has provided satisfactory evidence to PayPal that the item was sent to the Payment Recipient at an address supplied to the buyer by PayPal during the Claim process.
the buyer to reasonably cooperate with PayPal to ensure the proper and safe disposal of an item and to provide evidence of its disposal.
the Payment Recipient to present evidence that the Payment Recipient delivered to/performed for the buyer the purchase as agreed with the buyer. If the Payment Recipient presents such evidence, PayPal may find in favour of the Payment Recipient even if the buyer claims to have not received the purchase.
13.7 What if my purchase is not eligible for re-imbursement under PayPal Buyer Protection?

You may also look to resolve a problem directly with the Payment Recipient by filing a dispute through the PayPal Online Resolution Centre. To do so, you must file a Dispute in the PayPal Online Resolution Centre within 45 days (or, if you are claiming as a registered UK resident user. 180 days) of the date on which you sent the payment. Once you have done so, you should attempt to resolve the Dispute directly with the Payment Recipient. If your payment is not eligible under PayPal Buyer Protection, PayPal is not obliged to make a decision on the Claim.

13.8 PayPal POS Functionality

If you use any PayPal POS Functionality (including the PayPal Location Based Payments Functionality) in person at a physical point of sale (for example, in store) to pay (or agree to be invoiced for a payment) from your PayPal Account for your purchase (such purchase being a “POS Purchase”), we recommend that you inspect the POS Purchase (or if your POS Purchase is not a tangible item, review the details and specification of the POS Purchase as provided by the Payment Recipient) in the presence of the Payment Recipient at the time and place of sale wherever possible, so that you can deal immediately and directly with the Payment Recipient if any issues arise with the POS Purchase.
You may open a Dispute alleging that an item paid for as a POS Purchase is SNAD, only if:
the item was not made available to you for inspection immediately before you took possession of it (for instance, you took physical possession of the item when it was in its original intact and non-re-sealable packaging); and
the item’s condition as SNAD only became apparent to you when you took possession of the item (for instance, you only discovered that the item was SNAD when opening the packaging for the first time at home).
You may open a Dispute alleging that an item paid for as a POS Purchase is (and we may treat your item as) NR, only if:
you agreed in writing with the Payment Recipient to receive the item at a time and/or place other than the physical point of sale; and
the Payment Recipient did not make the item available to you as agreed.
13.9 What is Significantly Not as Described (SNAD)?

Your purchase is Significantly Not as Described if it is materially different from the last description of it that you received from the Payment Recipient before you paid for it (which, for exclusively online purchases, shall be taken to be the Payment Recipient’s description of the purchase in the relevant online listing) (“Purchase Description”). Here are some non-exhaustive examples:
You received a completely different item. For instance, you purchased a book and received a DVD or an empty box or the software that you received was not the software that was sold to you.
The condition of your purchase was misrepresented. For instance, the listing for an item said “new” and the item was used.
Your purchase was advertised as authentic but is not authentic.
Your purchase is missing major parts or features and the fact that these parts or features are missing was not disclosed in the listing.
You purchased 3 items from a Payment Recipient but received only 2.
Your purchase was damaged during postage.
Your purchase is not Significantly Not as Described (SNAD) if it is not materially different from the Purchase Description. Here are some non-exhaustive examples:
The defect in your purchase was correctly described by the Payment Recipient.
Your purchase was correctly described but you didn't want it after you received it.
Your purchase was correctly described but did not meet your expectations.
The item that you purchased has minor scratches and was listed as used condition.
An event you purchased tickets to was postponed.
13.10 Assumption of rights

If PayPal pays out a Claim, Reversal or Chargeback that you file against a recipient of your payment, you agree to transfer and allow PayPal to have your rights, benefits and remedies against the recipient of your payment. This is known in legal terms for you to agree to “subrogate” or otherwise “assign” to PayPal your rights against the recipient and third parties related to the payment, and agree that we may pursue those rights, benefits and remedies directly or on your behalf, in PayPal’s discretion.

13.11 No Double Recovery

You may not file a Dispute/Claim, or receive a recovery, for a purchase under PayPal Buyer Protection if you have already received a recovery for that purchase directly from eBay, the Payment Recipient or another third party, or if you have already filed a case for that purchase with eBay, the Payment Recipient or another third party.

13.12 Event tickets

In certain cases, if you purchase a ticket or pay for the right to attend an event from a Payment Recipient who is a UK registered PayPal Account holder (“Event”), all monies paid by you may be held by PayPal on trust for you, so that the beneficial interest in such monies remains with you until the performance of the Event in question.

Back to top



14. Disputes with PayPal
14.1 Contact PayPal First. If a dispute arises between you and PayPal, our goal is to learn about and address your concerns and, if we are unable to do so to your satisfaction, to provide you with a neutral and cost effective means of resolving the dispute quickly. Disputes between you and PayPal regarding our Services may be reported to Customer Service online via the "Email Us" link on the "Contact Us" page at any time, or by calling the Customer Service telephone number located on the PayPal website(s) and by logging into your Account.

14.2 ECC-Net, Financial Ombudsman Service and CSSF. If you have a complaint to make about us, you may choose to escalate it by contacting one of the following:

European Consumer Centre (ECC-Net). You may obtain further information regarding the ECC-Net and how to contact them at ( http://ec.europa.eu/consumers/redress_cons/).

UK Financial Ombudsman Service (FOS). For UK resident Users only - the FOS is a free, independent service which might be able to settle a complaint between you and us. You may obtain further information regarding the FOS and contact the FOS at http://www.financial-ombudsman.org.uk.

Commission de Surveillance du Secteur Financier (CSSF). The CSSF is the authority responsible for the prudential supervision of companies in the financial sector in Luxembourg. You can contact the CSSF at 110 Route d’Arlon L-2991 Luxembourg. You may obtain further information regarding the CSSF and how to contact them at: http://www.cssf.lu.

14.3 Governing Law and Jurisdiction. This Agreement and the relationship between us shall be governed by English law. For complaints that cannot be resolved otherwise, you submit to the non-exclusive jurisdiction of the English courts arising out of or relating to this Agreement or the provision of our Services without prejudice to your right to also initiate a proceeding against PayPal in that context before the competent courts of and in Luxembourg. In simple terms, “nonexclusive jurisdiction of the English courts” means that if you were able to bring a claim arising from this Agreement against us in Court, an acceptable court would be a court located in England, but you may also elect to bring a claim in the court of another country instead. English law will apply in all cases.

14.4 No Waiver. Our failure to act with respect to a breach by you or others does not waive our right to act with respect to subsequent or similar breaches.

14.5 Limitations of Liability. We shall only be liable to you for loss or damage caused directly and reasonably foreseeable by our breach of this Agreement and our liability in these circumstances is limited as set out in the remainder of this section.

In no event shall we, the other companies in our corporate group, persons who act on our behalf, and/or the persons we enter into contracts with be liable for any of the following types of loss or damage arising under or in relation to this Agreement (whether in contract, tort (including, without limitation, negligence) or otherwise:

any loss of profits, goodwill, business, contracts, revenue or anticipated savings even if we are advised of the possibility of such damages, loss of profits, goodwill, business, contracts, revenue or anticipated savings; or

any loss or corruption of data; or

any loss or damage whatsoever which does not stem directly from our breach of this Agreement; or.

any loss or damage whatsoever which is in excess of that which was caused as a direct result of our breach of this Agreement (whether or not you are able to prove such loss or damage).
Nothing in this Agreement shall limit our liability resulting from our fraud or fraudulent misrepresentation, gross negligence, wilful misconduct, for death or personal injury resulting from either our or our subcontractor’s negligence or to the extent such limitation or exclusion is not permitted by applicable law.
14.6 No Warranty. We provide the Services to you subject to your statutory rights but otherwise without any warranty or condition, express or implied, except as specifically stated in this Agreement. PayPal does not have any control over the products or services that are paid for with our Service and PayPal cannot ensure that a buyer or a seller you are dealing with will actually complete the transaction or is authorised to do so. PayPal does not guarantee continuous, uninterrupted or secure access to any part of our Service. We shall not be liable for any delay in the failure in our provision of the Services under this Agreement. You acknowledge your access to the website(s) may be occasionally restricted to allow for repairs, maintenance or the introduction of new facilities or services. PayPal will make reasonable efforts to ensure that requests for electronic debits and credits involving bank accounts and debit and credit cards are processed in a timely manner. We make every effort to ensure that the information contained in our correspondence, reports, on the website(s) and given verbally by our directors, officers and staff is accurate to the best of our belief at the time the information is provided. However, we cannot guarantee the accuracy of all such information in all circumstances and contexts, and no reliance should be placed on such information by you. You must check all correspondence between us carefully and tell us as soon as possible if it includes something which appears to you to be wrong or not made in accordance with your instructions.

You alone are responsible for understanding and complying with any and all laws, rules and regulations of your specific jurisdiction that may be applicable to you in connection with your use of the PayPal Services, including but not limited to, those related to export or import activity, taxes or foreign currency transactions.

14.7 Indemnification/re-imbursement. You agree to defend, reimburse or compensate us (known in legal terms to “indemnify “) and hold PayPal, our other companies in our corporate group, the people who work for us or who are authorised to act on our behalf harmless from any claim or demand (including legal fees) made or incurred by any third party due to or arising out of your or your employees' or agents' breach of this Agreement, breach of any law and/or use of the Services.

14.8 Complete Agreement and third party rights. This Agreement (including any Schedule) sets forth the entire understanding between you and PayPal with respect to the Service. Sections 1, 7, 8, 10, 14, 15 and Schedule 1, as well as any other terms which by their nature should survive, will survive the termination of this Agreement. If any provision of this Agreement is held to be invalid or unenforceable, such provision shall be struck out and the remaining provisions shall be enforced. A person who is not a party to this Agreement has no rights under the Contracts (Rights of Third Parties) Act 1999 to rely upon or enforce any term of this Agreement (except for eBay in respect of its rights as specified in this Agreement) but this does not affect any right or remedy of third parties which exists or is available apart from that Act.

14.9 Licence grant. If you are using PayPal software such as an API, developer’s toolkit or other software application that you have downloaded to your computer, device, or other platform then PayPal and its licensors grant you a limited nonexclusive license to use PayPal’s software in accordance with the documentation, including all updates, upgrades, new versions and replacement software, as described herein for your personal use only. You may not rent, lease or otherwise transfer your rights in the software to a third party. You must comply with the implementation and use requirements contained in all PayPal documentation, together with any instructions provided by us from time to time accompanying the Services (including, without limitation, any implementation and use requirements we impose on you to comply with applicable laws and card scheme rules and regulations). If you do not comply with PayPal’s instructions, implementation and use requirements you will be liable for all resulting damages suffered by you, PayPal and third parties. You agree not to alter, reproduce, adapt, distribute, display, publish, reverse engineer, translate, disassemble, decompile or otherwise attempt to create any source code which is derived from the software. You acknowledge that all rights, title and interest to PayPal’s software are owned by PayPal. Any third party software application you use on the PayPal website is subject to the license you agreed to with the third party that provides you with this software. PayPal does not own, control nor have any responsibility or liability for any third party software application you elect to use on the PayPal website and/or in connection with the PayPal Services. If you are using the PayPal services on the PayPal website, or other website or platform hosted by PayPal, or a third party, and are not downloading PayPal’s software or using third party software applications on the PayPal website, then this section does not apply to your use of the hosted PayPal services.

14.10 Third Party Permissions. You may expressly grant, remove and manage permissions for certain third parties to take certain actions on your behalf by logging into your Account, choosing the Profile subtab under the My Account tab, and selecting API Access, then Manage API Permissions. You acknowledge that if you grant permission for a third party to take actions on your behalf, PayPal may disclose certain information about your PayPal Account to this third party. Granting permission to a third party does not relieve you of any of your responsibilities under this Agreement. You acknowledge and agree that you will not hold PayPal responsible for, and will indemnify PayPal from, any liability arising from the actions or inactions of this third party in connection with the permissions you granted.

14.11 Corporate customers. If you are not a consumer, (being an individual acting for purposes other than a trade, business or profession) Micro-Enterprise or a charity with an annual income of less than 1 million GBP, we consider you to be a “Corporate Customer” and certain provisions of the Payment Services Directive may be disapplied for your use of the Service. In such cases you warrant and represent to PayPal that at the time you entered into this Agreement or any other relevant service terms, you are a Corporate Customer and hereby agree that the following sections of this Agreement will be varied as follows:

you are not entitled to the right to a refund for Recurring Payments and payment transactions initiated by a payee (i.e. a merchant) as set out in sections 3.10 and 12.5;
where you identify an error, unauthorised transaction and/or misappropriated or unauthorised use of your Payment Instrument or Account in accordance with sections 12.1 and 12.2 you have up to 60 days from the date of the alleged error or Improper Account Access to notify us of it, after which time we have no obligation to investigate or act upon your notification;
we will only accept liability for unauthorised transactions in accordance with section 12.4 where you have notified us of the Improper Account Access or error within 60 days of it; and
you will only be entitled to lodge a claim through the UK Financial Ombudsman Service under section 14.2 where you fulfil the UK Financial Ombudsman Service's claimant criteria from time to time.
As a Corporate Customer, you further agree that while we may do so, we are not obliged to comply nor provide you with the information requirements set out in Part 5 of the Payment Services Regulations 2009. Further, you agree that regulations 60, 75, 76 and 77 of the Payment Services Regulations 2009 do not apply to your use of the PayPal Service, meaning that, notwithstanding any other provision of this Agreement, we are not liable to you for the losses or damage you may suffer as a result of the matters referred to in Part 5 and regulations 60, 75, 76 and 77 of the Payment Services Regulations 2009.

Back to top



15. Definitions
“ACH” means the Automated Clearing House network.

“Account” or “PayPal Account” means a Personal, Business or Premier Account.

“Add Funds” has the meaning given in section 3.7.

“Agreement” means this agreement including all subsequent amendments.

"Authorise” or “Authorisation” means you authorise a merchant or other third party to collect or direct a payment from your Account.

“Balance” means any E-money that you have in your PayPal Account.

“Balance/Bank Funded Payment” means a payment that is fully funded through Instant Transfer, eCheque and/or Balance (as the case may be).

“Business Account” means an Account used primarily for business purposes and not for personal, family, or household purposes.

“Business Days”means a day (other than a Saturday or Sunday) on which banks in Luxembourg are open for business (other than for the sole purpose of 24-hour electronic banking).

“buyer” means a User who is buying goods and/or services and using the Services to send payment.

“Buyer Returns” has the meaning given in section 11.6.

“calendar year” means 1 January to 31 December inclusive in any year.

“Card Funded Payment” means a payment that is fully or partially funded through a credit card or debit card.

“Card Processing Agreement”means the 'Commercial Entity Agreement' that commercial entities are required to enter into directly with PayPal’s payment processor(s).

“Change” has the meaning given in section 1.8 .

“Chargeback” means a challenge to a payment that a buyer files directly with his or her credit card issuer or company.

“Claim”means a challenge to a payment that a sender of a payment files directly with PayPal, including, without limitation, challenges filed under PayPal Buyer Protection set out in section 13.

“Credit Card Withdrawal Region”means any of the following: Italy, Luxembourg, Lithuania, Bulgaria, San Marino, Slovakia, Latvia, Romania, Cyprus, Slovenia, Estonia, Malta, Gibraltar and Liechtenstein (and such other regions which PayPal may display on its website(s) from time to time).

“Customer Service” is PayPal’s customer support which can be accessed online via the “Email Us” link on the "Contact Us" page or by calling the customer service number located on the PayPal website(s).

“Days” means calendar days.

“Default Funding Sources”means the order in which PayPal uses your Funding Sources to fund a transaction if you do not select a Preferred Funding Source.

“Dispute” means a dispute filed directly with PayPal in the Online Resolution Centre pursuant to section 13 of this Agreement.

“eBay” means eBay Inc and its affiliates (as the case may be).

“eCheque” has the meaning given in section 3.7.

“E-money”means monetary value, as represented as a claim on PayPal, which is stored on an electronic device, issued on receipt of funds, and accepted as a means of payment by persons other than PayPal. The terms “E-money”, “money” and “funds” are used interchangeably in this Agreement. Further, a reference to a payment made by via the Services refers to an E-money payment.

“European Economic Area” or “EEA”means the region made up of the following countries: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Liechtenstein, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovak Republic, Slovenia, Spain, Sweden and the UK.

“Fees” means those amounts stated in Schedule 1 to this Agreement.

“Full Programme User” means a User with a PayPal Account registered in the UK or any Relevant Country.

“Funding Source”means the payment method used to fund a transaction. The following payment methods may be used to fund a transaction: Balance, Instant Transfer, bank transfer, eCheque, credit card, debit card and Redemption Codes.

“Information” means any confidential and/or personally identifiable information or other information related to an Account or User, including but not limited to the following: name, email address, post/shipping address, phone number and financial information.

“Instant Transfer” means a payment funded from the sender’s bank account in which PayPal credits the recipient instantly.



“Link and Confirm Card process”is a verification process which involves PayPal charging you a “Credit Card and Debit Card Link and Confirmation Fee” to your card. You must then log into your Account and enter the four-digit expanded use number which will appear on your credit card statement and which is associated with the Credit Card and Debit Card Link and Confirmation Fee (see Schedule 1).

“Mass Payments” means the ability to send multiple payments at the same time. Receipt by us of a Mass Payments batch file from you is, subject to section 3.1, receipt of your Payment Order for the purpose of this Agreement.

“Merchant Processing Delay” means a delay between the time you authorise a payment and the merchant processes your payment.

“Micro-Enterprise” means an enterprise which employs fewer than 10 persons and has an annual balance sheet that does not exceed 2 million Euros.

“Not Received” means a challenge from a buyer claiming that the purchase was not received.

“NSF Risk”means the risk that a bank may reverse a bank funded payment due to the reason that there were insufficient funds in the bank account to make the payment.

“Online Resolution Centre” means the PayPal Resolution Centre which can be accessed via the “My Account” tab when you are logged into your Account or by any other means as PayPal may from time to time make available.

“Payment Account” has the meaning given to it at the introduction of this Agreement.

“Payment Instrument”means any or all of the procedures, instructions or requirements which are set out in the PayPal website(s) and which allow Users to access and/or use the PayPal Service.

“Payment Order” means an instruction validly made by you to us requesting the execution of a payment transaction.

"Payment Review" means the process described in section 4 of this Agreement.

“PayPal,” “we,” “us” or “our”means PayPal (Europe) S.ΰ.r.l. et Cie, S.C.A. with registered head office at 22-24 Boulevard Royal L-2449, Luxembourg and includes its successors and any person to whom it has assigned its rights under this Agreement.

“PayPal Buyer Protection” means the PayPal Buyer Protection programme as described in section 13.

“PayPal Credit”means the PayPal branded personal online revolving credit account which can be used to fund payments from your Account and includes (if applicable) the PayPal MasterCard.

“PayPal Location Based Payments Functionality”means the PayPal POS Functionality within the PayPal Mobile App that enables a User to pay another User (typically a merchant) for goods and services, by which the paying User selects and thereby Authorises the other User (i.e. the merchant) to receive a payment. PayPal Location Based Payments Functionality may be otherwise referred to as “PayPal Check in” or “Check in to pay”.

“PayPal MasterCard”means the PayPal co-branded credit card and account opened on and from 1 June 2009 and issued by a nominated third party card issuer.

“PayPal Mobile App”means the application on a mobile device that enables a User to carry out certain PayPal Account transactions using that mobile device.

“PayPal POS Functionality”means any functionality provided by PayPal that enables a User to receive payment for goods and services in that User’s PayPal account, where that User commences the fulfilment of the relevant transaction exclusively at a physical point of sale (for example, in store).

“PayPal website(s)” means any URL, such as www.paypal.co.uk, that we provide the Services to you.

“Personal Account” means an Account used primarily for personal, family, or household purposes.

“Policy” or “Policies”means any Policy or other agreement between you and PayPal that you entered into on the PayPal website(s), or in connection with your use of the Services.

“Policy Update” means a prior notice of Changes which PayPal may make available to you in writing.

“POS Item” has the meaning given in section 13.9.a.

“Preferred Funding Source” means a Funding Source that you select to fund a payment instead of using the Default Funding Sources.

“Premier Account” means an Account that may be used for personal, family or household purposes or for business purposes.

“Random Deposit Process”is a verification process whereby PayPal will send two small deposits to your bank account. To complete the Random Deposit Process you will be required to enter the details of the deposits sent to you via your Account.

“Recurring Payment” has the meaning given in section 3.10.

“Redemption Code” means the electronic code needed to obtain the benefit of gift vouchers, eBay Anything Points, or other promotional coupons.

“Relevant Countries” means the UK, Rest of EU, Liechtenstein and San Marino.

“Reserve”means an amount or percentage of the funds received into your Account that we hold in order to protect against the risk of Reversals, Chargebacks, Claims or any other risk, exposure and/or liability related to your Account and/or use of the Services.

“Reserve Account” has the meaning given to it in the introduction to this Agreement.

“Rest of EU”means those countries in the European Union in which the PayPal Service is made available other than: Austria, Belgium, Croatia, Denmark, Finland, France, Germany, Italy, Luxembourg, The Netherlands, Poland, Portugal, Spain, Sweden and the UK.

“Restricted Activities” means those activities described in section 9 of this Agreement.

“Reversal”means a payment that you received which PayPal may reverse to the sender or another third party because the payment: (a) has been challenged by a buyer directly with their bank; and/or (b) has been removed from your Balance for any reason (other than a Chargeback or Claim pursuant to PayPal Buyer Protection), including, without limitation where (i) the payment violates our Acceptable Use Policy orwe reasonably suspect that the payment violates our Acceptable Use Policy; or (ii) the payment amount was not authorised by the sender with the relevant third party in connection with a valid third party initiated payment authorisation (see section 3.10); or (iii) the payment was funded by a bank transfer that was subsequently reversed by the bank for any reason; and/or (c) has been categorised by PayPal’s internal risk modelling as a risky payment required to be reversed to mitigate the risk associated with the payment. The term “Reversed” shall be construed accordingly.

“seller” and “merchant” are used interchangeably and mean a User who is selling goods and/or services and using the Services to receive payment.

“Send Money” means your ability to send money though the Service.

“Services” means all payment services and related products available through the PayPal website(s).

“Significantly Not as Described” means the definition provided in section 13.9 of this Agreement.

“Transaction Risk”means the risk of PayPal’s position being adversely affected with respect to any liability of yours to PayPal or any third party relating to any Commercial Transaction payment (including, without limitation, (i) the risk relating to any Dispute, Claim, Chargeback, Reversal, fees, fines or penalties, (ii) the risk of a seller not performing a contract with its buyers, (iii) a risk that arises if you sell an item that you do not immediately deliver upon receipt of payment and (iv) the risk of any other liability being incurred by PayPal (or any third party) related to the payment in question), in each case whether actual, anticipated by PayPal or believed by PayPal to exist. Transaction Risk includes, without limitation, (a) in the case of event or concert ticket sales, the risk that exists until the event or concert has taken place and, (b) in the case of transactions relating to travel, the risk that exists until the travel-related goods and services have been provided. You may be notified from time to time about other specific circumstances where Transaction Risk arises (or is deemed to have arisen) for the purpose of this Agreement.

“Unauthorised Payment”means a challenge from a buyer claiming that he or she did not make the payment, and that the person who made the payment was not authorised.

“Unique Identifier”means (1) for the purpose of sending a PayPal payment: the e-mail address, mobile phone number or other identifier we may notify to you which is registered to a PayPal Account in good standing; or (2) for withdrawing funds from your Account: your bank account (eg IBAN or Sort Code and bank account number) or credit card identification details (eg card number and CVV2 Code).

“United Kingdom” or “UK” means the United Kingdom of Great Britain and Northern Ireland.

“User,” “you” or “your” means you and any other person or entity entering into this Agreement with us or using the Service.

“Verified” means that you have completed our verification process in order to help establish your identity with PayPal.

Back to top



Schedule 1. Table of Fees
Fees depend on whether you are making a Commercial Transaction, PayPal Business Payment or a Personal Transaction and whether that transaction is Cross Border or Domestic.

A "Commercial Transaction" involves buying and selling goods and services, or payments received when you “request money” using PayPal.

A "Personal Transaction" involves sending money (initiated from the “Personal” tab of the “Send Money” flow) to, and receiving money into your PayPal Account from, friends and family without making a purchase (that is, the payment is not for goods or services). If you are selling goods or services, you may not ask the buyer to send you a Personal Transaction payment for the purchase. If you do so, PayPal may remove your ability to accept any or all payments for Personal Transactions. Please also note that:

you cannot send money for a Personal Transaction from some countries, including China and (in some cases) Germany;
Indian registered Accounts may neither send nor receive Personal Transaction payments. This means that you cannot send Personal Transaction payments to Indian registered Accounts; and
when a fee applies to a Personal Transaction, the sender by default pays the fee, but certain functionality may require the recipient to pay the fee instead (for instance where that functionality allows the sender to decide that the recipient pays the fee). If you send a Personal Transaction payment from a third party (non PayPal) website or application then PayPal may allow the third party to determine if the sender or recipient of a Personal Transaction payment will pay the Personal Transaction fee. This will be disclosed to you by the third party.
A “PayPal Business Payment” is a payment between UK Users (i) made through a third party’s product or service and funded exclusively using either (or both) Balance or eCheque and (ii) for which the PayPal Business Payment Fee applies.

A "Domestic" transaction is a transaction where both the sender and receiver execute a payment between PayPal Accounts registered in the same country or region.

A “Cross Border” transaction occurs when the sender and receiver execute a payment between PayPal Accounts which are not registered in the same country or region.

Note: reference to a percentage fee rate below refers to an amount equal to that percentage of the payment transaction amount.

Personal Transactions

The Personal Transaction fee will be shown at the time of payment.

Domestic Personal Transactions

Activity
Fee for payment fully funded by:
- PayPal Balance
- Bank
Fee for payment fully or partially funded by
- Debit card and/or
- Credit Card
Sending or Receiving
Free (when no currency conversion is involved)
3.4% + Fixed Fee (see table below)
Cross Border Personal Transactions

To determine the fee for a Cross Border Personal Transaction payment sent to a user in a specific country please follow the steps below.

Note that either the sender or the recipient pays the fee, not both. Please see subsection c of the definition of Personal Transactions in this Schedule 1 for more information.

Step 1. Locate the recipient’s country in the table below (in the first column from left).
Step 2. Determine the region of the sender’s country (second column).
Step 3. Find the applicable fee based on the payment method used (third and fourth columns).

Recipient’s Country
Sender’s Country
Fee for payment fully funded by PayPal balance or bank account
Fee for payment fully or partially funded by debit card or credit card
Albania, Andorra, Austria, Bosnia and Herzegovina, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland (including Aland Islands), Gibraltar, Greece, Hungary, Iceland, Ireland^, Latvia, Liechtenstein, Lithuania, Luxembourg, Malta, Norway, Portugal, Romania, Russia, San Marino, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey, U.K. (including Channel Islands and Isle of Man).
Northern Europe *
0.4%
3.8% + Fixed Fee
US, Canada, Europe I **
0.5%
3.9% + Fixed Fee
Europe II ***
1.0%^
4.4% + Fixed Fee
All other countries
1.5%^
4.9% + Fixed Fee
Belgium, France, French Guiana, Guadeloupe, Italy, Martinique, Mayotte, Netherlands, Reunion.
Northern Europe *
0.4%
3.8% + Fixed Fee
US, Canada, Europe I **
0.5%
3.9% + Fixed Fee
Europe II ***
1.3%
4.7% + Fixed Fee
All other countries
1.8%
5.2% + Fixed Fee
Germany
Northern Europe *
1.8%
3.7% + Fixed Fee
US, Canada, Europe I **
2.0%
3.9% + Fixed Fee
Europe II ***
3.0%
4.9% + Fixed Fee
All other countries
3.3%
5.2% + Fixed Fee
Poland
Northern Europe *
0.9%
3.8% + Fixed Fee
US, Canada, Europe I **
1.0%
3.9% + Fixed Fee
Europe II ***
1.5%
4.4% + Fixed Fee
All other countries
2.0%
4.9% + Fixed Fee
Australia
Anywhere
1.0%
3.4% + Fixed Fee
Brazil
Anywhere
1.0%^
7.4% + Fixed Fee^
Japan
Anywhere
0.3%
3.9% + Fixed Fee
U.S. and Canada
Anywhere
1.0%
3.9% + Fixed Fee
All other countries
Anywhere
0.5%^
3.9% + Fixed Fee^
* Northern Europe: Denmark, Faroe Islands, Finland (including Aland Islands), Greenland, Iceland, Norway, Sweden.

** Europe I: Austria, Belgium, Cyprus, Estonia, France (including French Guiana, Guadeloupe, Martinique, Reunion and Mayotte), Germany, Gibraltar, Greece, Ireland, Italy, Luxembourg, Malta, Monaco, Montenegro, Netherlands, Portugal, San Marino, Slovakia, Slovenia, Spain, United Kingdom (including Channel Islands and Isle of Man), Vatican City State.

*** Europe II: Albania, Andorra, Belarus, Bosnia and Herzegovina, Bulgaria, Croatia, Czech Republic, Georgia, Hungary, Kosovo, Latvia, Liechtenstein, Lithuania, Macedonia, Moldova, Poland, Romania, Russia, Serbia, Switzerland, Turkey, Ukraine.

Note: Cross Border Euro or Swedish Krona payments made between Accounts registered in the European Union or EEA will be treated as Domestic Payments for the purpose of applying Fees.

Fixed Fee (based on currency received)

Currency:
Fee:
Argentine Peso:
2.00 ARS
Australian Dollar:
$0.30 AUD
Brazilian Real:
R$0.60 BRL
Canadian Dollar:
$0.30 CAD
Czech Koruna:
10.00 CZK
Danish Kroner:
2.60 DKK
Euro:
€0.35 EUR
Hong Kong Dollar:
$2.35 HKD
Hungarian Forint:
90.00 HUF
Israeli New Shekel:
1.20 ILS
Japanese Yen:
¥40.00 JPY
Malaysian Ringgit:
2.00 MYR
Mexican Peso:
4.00 MXN
New Zealand Dollar:
$0.45 NZD
Norwegian Krone:
2.80 NOK
Philippine Peso:
15.00 PHP
Polish Zloty:
1.35 PLN
Russian Ruble:
10.00 RUB
Singapore Dollar:
$0.50 SGD
Swedish Krona:
3.25 SEK
Swiss Franc:
0.55 CHF
New Taiwan Dollar:
$10.00 TWD
Thai Baht:
11.00 THB
Turkish Lira:
0.45 TRY
U.K. Pounds Sterling:
£0.20 GBP
U.S. Dollar:
$0.30 USD
^ The fee for an Irish registered User:

receiving a payment fully funded by PayPal balance or bank account from a User registered in "Europe II" or "All other countries" is 0.5%;
sending a payment to a User registered in Brazil is:
a. 0.5% if the payment is fully funded by PayPal balance or bank account; and

b. 4.9%+Fixed Fee if the payment is fully or partially funded by debit card or credit card; and

sending a payment to a User registered in either China, Hong Kong, Singapore or Taiwan (subject to service availability) is:
a. 0% if the payment is fully funded by PayPal balance or bank account; and

b. 3.4%+Fixed Fee (except if the recipient is a User registered in China, in which case the fee is 0%+Fixed Fee) if the payment is fully or partially funded by debit card or credit card.



Commercial Transactions

Activity
Fee
Sending (Buying)
Free (when no currency conversion is involved)
Receiving Domestic payments (Selling)
UK and Relevant Country Standard rates:
3.4% + Fixed Fee (see table below)

Merchant rate(Subject to application and pre-approval by PayPal. Evaluated on a case-by-case basis, including, without limitation on the following criteria: qualifying monthly sales volume, size of average shopping cart and an account in good standing. See “Merchant Rate” page):

UK Merchant rates:
From 1.4% to 2.9% + Fixed Fee

Relevant Country Merchant rates:
From 1.9% to 2.9% + Fixed Fee
Receiving Cross Border payments (Selling)
The Fee for Receiving Domestic Commercial Transaction payments applies, with the percentage-based element of that fee increased by the percentage amount of the Cross Border Fee set out in the table below (depending on the sender’s country).
Sender’s country
Cross Border Fee
Northern Europe*
0.4%
Europe I/ US/ Canada**
0.5%
Europe II***
1.0%
Rest of World
1.5%
* Aland Islands, Denmark, Faroe Islands, Finland, Greenland, Iceland, Norway, Sweden.

** Austria, Belgium, Canada, Channel Islands, Cyprus, Estonia, France (including French Guiana, Guadeloupe, Martinique, Reunion and Mayotte), Germany , Gibraltar, Greece, Ireland, Isle of Man, Italy , Luxembourg, Malta, Monaco, Montenegro,Netherlands, Portugal, , San Marino, Slovakia, Slovenia, Spain, United Kingdom, United States, Vatican City State.

*** Andorra, Albania, Belarus,Bosnia & Herzegovina, Bulgaria, Croatia, Czech Republic, Georgia,Hungary, Kosovo,Latvia, Liechtenstein, Lithuania, Macedonia, Moldova, Poland, Romania, Russian Federation, Serbia, Switzerland, Turkey, Ukraine.

Note: Cross Border Euro or Swedish Krona payments made between Accounts registered in the European Union or EEA will be treated as Domestic Commercial Transaction payments for the purpose of applying Fees.

Fixed Fee
The Fixed Fee for Commercial Transactions is based on the currency received as follows:
Argentine Peso:
2.00 ARS
Australian Dollar:
0.30 AUD
Brazilian Real:
0.40 BRL
Canadian Dollar:
0.30 CAD
Czech Koruna:
10.00 CZK
Danish Krone:
2.60 DKK
Euro:
0.35 EUR
Hong Kong Dollar:
2.35 HKD
Hungarian Forint:
90 HUF
Israeli Shekel:
1.20 ILS
Japanese Yen:
40 JPY
Malaysian Ringgit
2 MYR
Mexican Peso:
4.00 MXN
New Zealand Dollar:
0.45 NZD
Norwegian Krone:
2.80 NOK
Philippine Peso:
15.00 PHP
Polish Zlotych:
1.35 PLN
Russian Ruble:
10.00 RUB
Singapore Dollar:
0.50 SGD
Swedish Krona:
3.25 SEK
Swiss Franc:
0.55 CHF
Taiwan New Dollar:
10.00 TWD
Thai Baht:
11.00 THB
Turkish Lira:
0.45 TRY
U.K. Pounds Sterling:
0.20 GBP
U.S. Dollar:
0.30 USD
Additional Fees

Activity
Fee
Currency Conversion Fee

(I) For currency conversions of amounts in your PayPal account that do not form part of a specific transaction into or out of your account (e.g. converting your balance to another currency) and for transactions involving a currency conversion for which the seller has agreed to bear the conversion fee:2.5% above the wholesale exchange rate

(II) For all other transactions involving a currency conversion:

a. If you are a User registered in a Relevant Country other than the UK and Ireland:

4.0% above the wholesale exchange rate.

b. If you are a User registered in the UK or Ireland:

Between 3.0% and 4.0% above the wholesale exchange rate depending on the currency into which the relevant amount is converted (please refer to the table below):
Currency and Code
Currency Conversion Fee
Argentine Peso (ARS):
4.0%
Australian Dollar (AUD):
4.0%
Brazilian Real (BRL):
4.0%
Canadian Dollar (CAD):
3.0%
Czech Koruna (CZK):
3.5%
Danish Krone (DKK):
3.5%
Euro (EUR):
3.5%
Hong Kong Dollar (HKD):
4.0%
Hungarian Forint (HUF):
3.5%
Israeli Shekel (ILS):
4.0%
Japanese Yen (JPY):
4.0%
Malaysian Ringgit (MYR):
4.0%
Mexican Peso (MXN):
4.0%
New Zealand Dollar (NZD):
4.0%
Norwegian Krone (NOK):
3.5%
Philippine Peso (PHP):
4.0%
Polish Zlotych (PLN):
3.5%
Russian Ruble (RUB):
3.5%
Singapore Dollar (SGD):
4.0%
Swedish Krona (SEK):
3.5%
Swiss Franc (CHF):
3.5%
Taiwan New Dollar (TWD):
4.0%
Thai Baht (THB):
4.0%
Turkish Lira (TRY):
3.5%
U.K. Pounds Sterling (GBP):
3.5%
U.S. Dollar (USD):
3.0%
Withdrawing your Balance
UK Users:
Free

European country* Users

Withdrawal to a bank account (where available):
Free

Withdrawal to a card (where available):
Gibraltar Users: 1.50 GIP
Liechtenstein Users: 3.50 CHF
Other European Country Users: 2 EUR

Withdrawal to a bank account or a card may not be possible in all countries.

Chargeback Fee

To cover the cost of processing Chargebacks, PayPal assesses a settlement fee to sellers for credit and debit card payment chargebacks. (A chargeback may occur when a buyer rejects or reverses a charge on his or her card through the card issuer).

This Fee does not apply if the transaction is covered by PayPal’s Seller Protection Programme.
The Chargeback Fee is as follows and is based on the currency received as follows:
Argentine Peso:
80.00 ARS
Australian Dollar:
22.00 AUD
Brazilian Real:
35.00 BRL
Canadian Dollar:
20.00 CAD
Czech Koruna:
400.00 CZK
Danish Krone:
120.00 DKK
Euro:
16 EUR
Hong Kong Dollar:
155.00 HKD
Hungarian Forint:
4325 HUF
Israeli Shekel:
75.00 ILS
Japanese Yen:
1,875 JPY
Malaysian Ringgit:
65.00 MRY
Mexican Peso:
250.00 MXN
New Zealand Dollar:
28.00 NZD
Norwegian Krone:
125.00 NOK
Philippine Peso:
900.00 PHP
Polish Zlotych:
65.00 PLN
Russian Ruble:
640.00 RUB
Singapore Dollar:
28.00 SGD
Swedish Krona:
150.00 SEK
Swiss Franc:
22.00 CHF
Taiwan New Dollar:
625.00 TWD
Thai Baht:
650.00 THB
Turkish Lira:
30.00 TRY
U.K. Pounds Sterling:
14.00 GBP
U.S. Dollar:
20.00 USD
^ Subject to the commencement of PayPal’s Russian Ruble service
Commercial Transaction Refund Fee
Full refunds
If you fully refund a Commercial Transaction payment, we will retain the Fixed Fee portion of the Commercial Transaction Fee.

Your buyer’s Account will be credited with the full Commercial Transaction payment amount.

We will debit from your Account the amount initially credited to your Account in connection with the Commercial Transaction payment and the Fixed Fee portion of the Commercial Transaction Fee.
Partial Refunds
If you issue a partial refund of a Commercial Transaction payment, we will retain a pro-rated share of the Fixed Fee portion of the Commercial Transaction fee.
Your buyer’s account will be credited with the amount you specify to be refunded to your buyer.
We will debit from your account the pro-rated share of the amount initially credited to your account in connection with the Commercial Transaction payment and the pro-rated share of the fixed fee portion of the Commercial Transaction fee.
Sending Payments through PayPal Mass Payments
2% of total payment amount

A maximum fee cap per payment applies as follows for Domestic Transactions, (based on payment currency):
Argentine Peso:
25.00 ARS
Australian Dollar:
8.00 AUD
Brazilian Real:
12.00 BRL
Canadian Dollar:
7.00 CAD
Czech Koruna:
140.00 CZK
Danish Krone:
42.00 DKK
Euro:
6.00 EUR
Hong Kong Dollar:
55.00 HKD
Hungarian Forint:
1540 HUF
Israeli Shekel:
25.00 ILS
Japanese Yen:
600 JPY
Malaysian Ringgit:
25 MYR
Mexican Peso:
85.00 MXN
New Zealand Dollar:
10.00 NZD
Norwegian Krone:
45.00 NOK
Philippine Peso:
320.00 PHP
Polish Zlotych:
23.00 PLN
Russian Ruble:
240.00 RUB
Singapore Dollar:
10.00 SGD
Swedish Krona:
50.00 SEK
Swiss Franc:
8.00 CHF
Taiwan New Dollar:
220.00 TWD
Thai Baht:
230.00 THB
Turkish Lira:
12 TRY
U.K. Pounds Sterling:
5.00 GBP
U.S. Dollar:
7.00 USD
^ Subject to the commencement of PayPal’s Russian Ruble service

A maximum fee cap per individual payment applies as follows for all other transactions (based on payment currency):
Argentine Peso:
150.00 ARS
Australian Dollar:
50.00 AUD
Brazilian Real:
75.00 BRL
Canadian Dollar:
45.00 CAD
Czech Koruna:
850.00 CZK
Danish Krone:
250.00 DKK
Euro:
35.00 EUR
Hong Kong Dollar:
330.00 HKD
Hungarian Forint:
9250 HUF
Israeli Shekel:
160.00 ILS
Japanese Yen:
4000 JPY
Malaysian Ringgit:
150.00 MYR
Mexican Peso:
540.00 MXN
New Zealand Dollar:
60.00 NZD
Norwegian Krone:
270.00 NOK
Philippine Peso:
1900 PHP
Polish Zlotych:
140.00 PLN
Russian Ruble:
1400.00 RUB
Singapore Dollar:
60.00 SGD
Swedish Krona:
320.00 SEK
Swiss Franc:
50.00 CHF
Taiwan New Dollar:
1350 TWD
Thai Baht:
1400.00 THB
Turkish Lira:
80 TRY
U.K. Pounds Sterling:
30.00 GBP
U.S. Dollar:
45.00 USD
^ Subject to the commencement of PayPal’s Russian Ruble service

Note:For cross border Euro or Swedish Krona payments made between Accounts registered in the European Union or EEA the Domestic Transaction Fee will apply.
Credit Card and Debit Card Link and Confirmation Fee (verifying credit or debit card details).

In general, there is no fee to join PayPal. However, some Users, in order to increase their sending limit or as PayPal may determine, may be charged a Credit Card and Debit Card Link and Confirmation Fee.
Depending on currency
Argentine Peso:
6.00 ARS
Australian Dollar:
2.00 AUD
Brazilian Real:
4.00 BRL
Canadian Dollar:
2.45 CAD
Czech Koruna:
50.00 CZK
Danish Krone:
12.50 DKK
Euro:
1.50 EUR
Hong Kong Dollar:
15.00 HKD
Hungarian Forint:
400 HUF
Israeli Shekel:
8.00 ILS
Japanese Yen:
200.00 JPY
Mexican Peso:
20.00 MXN
New Zealand Dollar:
3.00 NZD
Norwegian Krone:
15.00 NOK
Philippine Peso:
100.00 PHP
Polish Zlotych:
6.50 PLN
Russian Ruble:
60 RUB
Singapore Dollar:
3.00 SGD
Swedish Krone:
15.00 SEK
Swiss Franc:
3.00 CHF
Taiwan New Dollar:
70.00 TWD
Thai Baht:
70.00 THB
U.K. Pounds Sterling:
1.00 GBP
U.S. Dollar:
1.95 USD


This amount will be refunded when you successfully complete the credit card or debit card verification process.
Records Request Fee
10.00 GBP or 12.00 EUR (per item)

This Fee will apply for requests of information relating to why we had reasonable justification to refuse your Payment Order. We will not charge you for records requested in connection with your good-faith assertion of an error in your Account.
Bank Return Fee on Withdrawal

This amount is charged when a withdrawal is attempted by a User and it fails because incorrect bank account information or delivery information is provided.
UK users: 0.50 GBP
Irish users: 3 EUR
Slovakian users: 3 EUR
Czech Republic users: 200 CZK
Greek users: 3 EUR
Hungarian users: 1,500 HUF
Charity Pricing
Subject to application and pre-approval by PayPal

UK Charity Domestic rate: 1.4% + Fixed Fee per each payment transaction.

Relevant Country Charity Domestic rate:
1.9% + Fixed Fee per each payment transaction.

Fixed Fee for Charity Pricing
(depending on the payment currency received):
Argentine Peso:
2.00 ARS
Australian Dollar:
0.30 AUD
Brazilian Real:
0.40 BRL
Canadian Dollar:
0.30 CAD
Czech Koruna:
10.00 CZK
Danish Krone:
2.60 DKK
Euro:
0.35 EUR
Hong Kong Dollar:
2.35 HKD
Hungarian Forint:
90 HUF
Israeli Shekel:
1.20 ILS
Japanese Yen:
40 JPY
Malaysian Ringgit:
2 MYR
Mexican Peso:
4.00 MXN
New Zealand Dollar:
0.45 NZD
Norwegian Krone:
2.80 NOK
Philippine Peso:
15.00 PHP
Polish Zlotych:
1.35 PLN
Russian Ruble:
10.00 RUB
Singapore Dollar:
0.50 SGD
Swedish Krona:
3.25 SEK
Swiss Franc:
0.55 CHF
Taiwan New Dollar:
10.00 TWD
Thai Baht:
11.00 THB
Turkish Lira:
0.45 TRY
U.K. Pounds Sterling:
0.20 GBP
U.S. Dollar:
0.30 USD


Cross Border rate: The Cross Border Fee for Charity Pricing is the same as the Fee for Receiving Cross Border Commercial Transaction payments.

Note: For Cross Border Euro or Swedish Krona payments made between Accounts registered in the European Union or EEA the Domestic rate will apply.
Receiving eCheques
A maximum fee cap per eCheque payment (based on the currency received) applies as follows:
Argentine Peso:
150.00 ARS
Australian Dollar:
50.00 AUD
Brazilian Real:
75.00 BRL
Canadian Dollar:
45.00 CAD
Czech Koruna:
850.00 CZK
Danish Krone:
250.00 DKK
Euro:
35.00 EUR
Hong Kong Dollar:
330.00 HKD
Hungarian Forint:
9250 HUF
Israeli Shekel:
160.00 ILS
Japanese Yen:
4000 JPY
Malaysian Ringgit
150.00 MYR
Mexican Peso:
540.00 MXN
New Zealand Dollar:
60.00 NZD
Norwegian Krone:
270.00 NOK
Philippine Peso:
1900.00 PHP
Polish Zlotych:
140.00 PLN
Russian Ruble:
1400.00 RUB
Singapore Dollar:
60.00 SGD
Swedish Krona:
320.00 SEK
Swiss Franc:
50.00 CHF
Taiwan New Dollar:
1350.00 TWD
Thai Baht:
1400.00 THB
Turkish Lira
80.00 TRY
U.K. Pounds Sterling:
30.00 GBP
U.S. Dollar:
45.00 USD
Micropayments Pricing

Based on application and pre-approval by PayPal, you may upgrade an existing account – please contact us if you want to do that. This rate will apply to all Commercial Transaction payments received into your PayPal account.

Activity
Fee
Domestic - Micropayments
5% + Fixed Fee*
Cross Border - Micropayments
6% + Fixed Fee*
Micropayments Fixed Fee*
As per the Fixed Fee specified by the currency received. https://micropayments.paypal-labs.com
Argentine Peso:
0.15 ARS
Australian Dollar:
0.05 AUD
Brazilian Real:
0.10 BRL
Canadian Dollar:
0.05 CAD
Czech Koruna:
1.67 CZK
Danish Krone:
0.43 DKK
Euro:
0.05 EUR
Hong Kong Dollar:
0.39 HKD
Hungarian Forint:
15 HUF
Israeli Shekel:
0.20 ILS
Japanese Yen:
7 JPY
Malaysian Ringgit
0.20 MYR
Mexican Peso:
0.55 MXN
New Zealand Dollar:
0.08 NZD
Norwegian Krone:
0.47 NOK
Philippine Peso:
2.50 PHP
Polish Zlotych:
0.23 PLN
Russian Ruble:
2.00 RUB
Singapore Dollar:
0.08 SGD
Swedish Krona:
0.54 SEK
Swiss Franc:
0.09 CHF
Taiwan New Dollar:
2 TWD
Thai Baht:
1.80 THB
Turkish Lira:
0.08 TRY
U.K. Pounds Sterling:
0.05 GBP
U.S. Dollar:
0.05 USD
^ Subject to the commencement of PayPal’s Russian Ruble service

Note:For Cross Border Euro or Swedish Krona payments made between Accounts registered in the European Union or EEA the Domestic rate will apply.
PayPal Business Payment Fee

PayPal may apply the following fee to each PayPal Business Payment

Activity
PayPal Business Payment Fee
Sending or receiving

The PayPal Business Payment fee is paid by the recipient, unless it is disclosed to the sender before payment is sent that the sender must pay this fee.
2.00 GBP per transaction in GBP

0.50 USD per transaction in USD
Quoted fees are inclusive of all applicable taxes; however, other taxes or costs may exist that are not paid through PayPal or imposed by us. You are liable for telephone charges and any charges made by your internet service provider or similar or associated charges as a result of the use by you of the Services. You agree that we can deduct our Fees from the amounts we transfer but before those funds are credited to your Account. We will provide you with the details of the amounts you receive and our charges either by e-mail or by reviewing your transaction history by logging into your Account. Unless it is proven that we have made a mistake, all fees are payable by you without set off or other deductions. We may make a charge for any additional services we provide outside this Agreement. We will tell you of those charges when you ask for the service.

Back to top



© 1999 - 2014 PayPal
This content is for general information purposes only and does not form financial or professional advice.
[https://www.paypal.com/gr/webapps/mpp/ua/useragreement-full?locale.x=en_GR&viewType=popup] 2014-09-30

sihTrg.satisfier.FINANCIAL

name::
* McsEngl.sihTrg.satisfier.FINANCIAL@cptIt,
* McsEngl.conceptIt51.6,
* McsEngl.financial-transacting-stmIth@cptIt,
* McsEngl.sysIthTrgFin@cptIt,

_SPECIFIC:
* money-transacting##

sihTrg.satisfier.FINANCIAL.NO

name::
* McsEngl.sihTrg.satisfier.FINANCIAL.NO@cptIt,
* McsEngl.conceptIt51.7,
* McsEngl.financialNo-transacting-stmIth@cptIt,
* McsEngl.sysIthTrgFinNo@cptIt,

sihTrg.satisfier.RETAIL-PHARMACY

name::
* McsEngl.sihTrg.satisfier.RETAIL-PHARMACY@cptIt,
* McsEngl.eDragstore@cptIt,
* McsEngl.eFarmakio@cptIt,

Greece

ΥΓΕΙΑ 08.04.2015 : 13:00
750 ηλεκτρονικά φαρμακεία στην Ελλάδα
ΠΕΝΝΥ ΜΠΟΥΛΟΥΤΖΑ
Στον χώρο του ηλεκτρονικού εμπορίου επεκτείνονται συνεχώς τα φαρμακεία στη χώρα μας. Πέρυσι, επτά στους δέκα Ελληνες «online» καταναλωτές αγόρασαν κάποιο καλλυντικό ή βιταμίνη - συμπληρώματα διατροφής από ηλεκτρονικό φαρμακείο εκμεταλλευόμενοι τις χαμηλές τιμές και τις προσφορές. Την ίδια στιγμή, ωστόσο, ένα στα δέκα ηλεκτρονικά φαρμακεία στην Ελλάδα είναι αμφίβολης νομιμότητας, καθώς δεν αναφέρεται διεύθυνση φυσικού καταστήματος όπως επιβάλλεται, ενώ το 15% δεν τηρεί τις υποχρεώσεις του ως ηλεκτρονικό κατάστημα.

Τα στοιχεία αυτά προκύπτουν από μελέτη του Εργαστηρίου Ηλεκτρονικού Εμπορίου και Επιχειρείν του Οικονομικού Πανεπιστημίου Αθηνών για την καταγραφή και αξιολόγηση των ηλεκτρονικών φαρμακείων στην Ελλάδα, που έδειξε ότι η συγκεκριμένη αγορά χαρακτηρίζεται από «ανωριμότητα» αλλά έχει σαφώς προοπτικές. Αυτή τη στιγμή λειτουργούν στην Ελλάδα 750 ηλεκτρονικά φαρμακεία (στη μελέτη αναλύθηκαν 210) με ετήσιες πωλήσεις που ξεπερνούν τα 75 εκατομμύρια ευρώ. Σύμφωνα με τη μελέτη, τέσσερις στους δέκα (39%) οnline καταναλωτές αγόρασαν το 2014 από ηλεκτρονικό φαρμακείο κάποιο προϊόν προσωπικής φροντίδας, και τρεις στους δέκα (31%) αγόρασαν βιταμίνες και συμπληρώματα διατροφής. Μάλιστα, τα καλλυντικά και οι βιταμίνες είναι στη 10η θέση και 14η θέση αντίστοιχα, στη λίστα με τα προϊόντα με τις συχνότερες οnline αγορές στην Ελλάδα για το 2014. Τέσσερις στους δέκα καταναλωτές αναφέρουν ότι στα ηλεκτρονικά φαρμακεία βρίσκουν καλύτερες προσφορές και το 37% ότι βρίσκει καλύτερες τιμές. Το 28% δίνει σημασία στην άμεση παράδοση, το 22% στην ταχύτητα στην εξυπηρέτηση και το 21% στην ευκολία εύρεσης προϊόντων.

Τουλάχιστον το 25% των ελληνικών ηλεκτρονικών φαρμακείων λειτουργεί με τις βέλτιστες διεθνείς πρακτικές και προσφέρει ολοκληρωμένες υπηρεσίες στους καταναλωτές. Παράλληλα όμως ένα 25% των e-φαρμακείων θα «κοβόταν» κατά τη διαδικασία πιστοποίησης, καθώς είτε δεν παρέχει στοιχεία για τη διεύθυνση του φυσικού καταστήματος, τον αριθμό άδειας λειτουργίας κ.ά. (ηλεκτρονικό φαρμακείο μπορεί να ανοίξει μόνο φαρμακοποιός με άδεια ίδρυσης και λειτουργίας φαρμακείου) είτε δεν αναρτά αριθμό επικοινωνίας, όρους χρήσης, ΑΦΜ κ.ά. Οπως ανέφερε στην «Κ» η υπεύθυνη ερευνών του Εργαστηρίου Ηλεκτρονικού Εμπορίου του ΟΠΑ, δρ Κατερίνα Φραϊδάκη, έως τον περασμένο Αύγουστο άνοιγαν με ραγδαία ταχύτητα ηλεκτρονικά φαρμακεία στην Ελλάδα, τα οποία επιδίδονταν σε ένα «πόλεμο τιμών» με αποτέλεσμα τελικά να μειώνεται σημαντικά η κερδοφορία τους. Εκτοτε, ο ρυθμός μειώθηκε, ενώ άρχισαν να καταγράφονται σταδιακά νέες τάσεις που στοχεύουν περισσότερο στην καλύτερη εξυπηρέτηση αλλά και την εγκαθίδρυση σχέσης εμπιστοσύνης με τον καταναλωτή. Οι τάσεις αυτές είναι οι εξατομικευμένες υπηρεσίες (π.χ. έλεγχος παραγγελίας), η ψηφιακή συνεργασία των φαρμακείων με επώνυμους προμηθευτές και η αξιοποίηση του φυσικού φαρμακείου.
[http://www.kathimerini.gr/810673/article/epikairothta/ygeia/750-hlektronika-farmakeia-sthn-ellada]

sihTrg.satisfier.MONEY-TRANSACTING

_CREATED: {2012-05-27}

name::
* McsEngl.sihTrg.satisfier.MONEY-TRANSACTING@cptIt,
* McsEngl.conceptIt98,
* McsEngl.conceptIt3.2,
* McsEngl.eft-system@cptIt98, {2012-05-27}
* McsEngl.electrodic-cash-system@cptIt98,
* McsEngl.electronic-fund-transfering-system@cptIt98, {2012-05-27}
* McsEngl.electronic-money-system@cptIt98, {2012-05-27}
* McsEngl.digital-financial-platform@cptIt,
* McsEngl.digital-money-network@cptIt,
* McsEngl.digital-payment-system@cptIt98, {2015-08-21}
* McsEngl.DigitalServiceSystem@cptIt,
* McsEngl.epayment-system@cptIt,
* McsEngl.mnyDgl'service-system@cptIt98,
* McsEngl.mny'digital-service-system@cptIt98, {2015-08-15}
* McsEngl.mny'service-system.digital@cptIt98, {2015-08-15}
* McsEngl.monetary-digital-service-system@cptIt,
* McsEngl.money-digital-service-system@cptIt,
* McsEngl.sysIth.money-transacting@cptIt98, {2012-05-29}
* McsEngl.mnyDss@cptIt98, {2015-08-13}
* McsEngl.stmIthMny@cptIt98,
* McsEngl.sysIthMny@cptIt98, {2012-12-19}
* McsEngl.sysIthMon@cptIt98, {2012-05-27}

sihMny'GENERIC

_GENERIC:
* money-service-system#ql:mny'service_system#
* entity.whole.system.it_human#cptItsoft180#

sihMny'currency (eMoney)#cptEconomy541.115.58#

name::
* McsEngl.sihMny'currency (eMoney)@cptIt,

sihMny'device

name::
* McsEngl.sihMny'device@cptIt,

sihMny'doing#cptCore475#

name::
* McsEngl.sihMny'doing@cptIt,

_SPECIFIC:
* ATM##
* exchanging##
* payment-processing##
* buying (giving)
* converting|exchanging
* gifting
* paying
* selling (receiving)
* transfering

sihMny'human

name::
* McsEngl.sihMny'human@cptIt,

_DESCRIPTION:
There are humans that OPERATE the system. Humans that USE the system.
[hmnSngo.2015-08-22]

sihMny'organization

name::
* McsEngl.sihMny'organization@cptIt,

sihMny'organization.EXCHANGE

name::
* McsEngl.sihMny'organization.EXCHANGE@cptIt,

_FEE:
* trading-fee##
* withdrawal-fee##

sihMny'security

_CREATED: {2012-05-29}

name::
* McsEngl.sihMny'security@cptIt,
* McsEngl.conceptIt98.7,

sihMny'systemIt

_CREATED: {2015-08-18}

name::
* McsEngl.sihMny'systemIt@cptIt,
* McsEngl.conceptIt98.24,
* McsEngl.sihMny'network@cptIt,

sihMny'program

name::
* McsEngl.sihMny'program@cptIt,

sihMny'protocoll

name::
* McsEngl.sihMny'protocoll@cptIt,

sihMny'transaction-per-second

name::
* McsEngl.sihMny'transaction-per-second@cptIt,

SPECIFIC

name::
* McsEngl.sysIthMny.specific@cptIt,

_SPECIFIC: sysIthMny.alphabetically:
* sysIthMny.ACH_network#cptItsoft98.10#
* sysIthMny.ATM_network#cptItsoft98.8#
* sysIthMny.contact#cptItsoft98.12#
* sysIthMny.contactless#cptItsoft98.2#
* sysIthMny.credit_card_system#cptItsoft98.17#
* sysIthMny.debit_card_system#cptItsoft98.14#
* sysIthMny.decentralized##
* sysIthMny.offline#cptItsoft98.6#
* sysIthMny.online#cptItsoft98.5#
* sysIthMny.POS#cptItsoft98.11#

_SPECIFIC: sysIthMny.SPECIFIC_DIVISION.device:
* card_system
* computer_system
* mobile_computer_system

_SPECIFIC: sysIthMny.SPECIFIC_DIVISION.NETWORK:
* sysIthMny.offline#cptItsoft98.6#
* sysIthMny.online#cptItsoft98.5#

_SPECIFIC: sysIthMny.SPECIFIC_DIVISION.device_contactness:
* sysIthMny.contact#cptItsoft98.12#
* sysIthMny.contactless#cptItsoft98.2#

sihTrg.satisfier.money.SPECIFIC-DIVISION.doing

name::
* McsEngl.sihTrg.satisfier.money.SPECIFIC-DIVISION.doing@cptIt,

_SPECIFIC:
* converting#cptItsoft51.2#
* receiving#cptItsoft98.26#
* sending|giving#cptItsoft98.25#
===
* gift
* payment

sihTrg.satisfier.money.SPECIFIC-DIVISION.currency

name::
* McsEngl.sihTrg.satisfier.money.SPECIFIC-DIVISION.currency@cptIt,

_SPECIFIC:
* cryptocurrency##
* government-currency##
* mixed-currency##
===
* bitcoin#cptItsoft98.1#

sihTrg.satisfier.money.ACH-network

name::
* McsEngl.sihTrg.satisfier.money.ACH-network@cptIt,
* McsEngl.conceptIt98.10,
* McsEngl.conceptIt318,
* McsEngl.ACH@cptIt,
* McsEngl.ach@cptIt318,
* McsEngl.Automated-clearing-house@cptIt,

_DESCRIPTION:
Another type of electronic fund transfer system, wich is conceptually different from the two systems descrimed above (ATM, POS) is the ACH.
As the namae suggest, an ACH is analogous to a traditional clearing house, in that it represents a system for the interbank clearing of debits and credits.
...An ACH is thus not a system for automating the handling and clearing of paper checks. The payment items must enter the system in the form of electronic data, usually computer-generated magnetic tape.
[Niblack, W.C. 'Development of Electonic Fund Transfer System (1976)'. In Havrilesky, T.M., J.T. Boorman CURRENT PERSPECTIVES IN BANKING, 1980, p247]
===
More banks, S&Ls, and credit unions rushed to join and use the services of the automated clearing house networks
[Bowden-et-al, 1984, 194#cptResource436]

National-Automated-Clearing-House-Association

In 1983, electronic corporate payments were initiated through the National Automated Clearing House Association.
[Bowden-et-al, 1984, 194#cptResource436]

sihTrg.satisfier.money.Bitreserve => Uphold

_CREATED: {2015-08-14}

name::
* McsEngl.sihTrg.satisfier.money.Bitreserve => Uphold@cptIt,
* McsEngl.ognUphold@cptIt,
* McsEngl.uphold@cptIt,
* McsEngl.bitreserve@cptIt,

_GENERIC:
* stmIthCrypto#cptItsoft51.12#

_DESCRIPTION:
Join the world's fastest growing platform for moving, converting?, transacting ?and holding any form of money or commodity.? Instantly, securely and for free.?
[https://uphold.com/en]
===
Bitreserve is a new financial system. We provide people a way to access and move their money from any device without any of the costs and delays of traditional banking.

As the world’s first financial service to publish a real-time, verifiable, proof of solvency, we are setting a new standard for transparency and consumer protection that we hope will define the future of the financial services industry.

We understand the world-changing potential of digital money and we’re committed to helping people experience the control, ease, speed and cost-saving benefits of cloud money. By helping to remove billions of dollars in fees and commissions charged by banks, credit cards and money transfer businesses, we are creating a more fair and equitable world.

For us, business success and social benefit are equally important. That’s why five percent of our profits are dedicated in perpetuity to supporting economic opportunity worldwide through the Bitreserve Fund.
Change money. Change the world.
[https://bitreserve.org/en/our-vision]

bitreserve'currency

name::
* McsEngl.bitreserve'currency@cptIt,

Supported currencies

With Bitreserve, you can choose to hold your money in a variety of currencies and precious metals. Currently available currencies and precious metals are:

Currencies
- U.S. dollars (USD)
- Euros (EUR)
- Pounds (GBP)
- Yuan (CNY)
- Yen (JPY)
- Swiss Franc (CHF)
- Indian Rupee (INR)
- Mexican Pesos (MXN)
- Australian Dollars (AUD)
- Canadian Dollars (CAD)
- Hong Kong Dollars (HKD)
- New Zealand Dollars (NZD)
- Singapore Dollars (SGD)
- Kenyan Shillings (KES)
- Israeli Sheqel (ILS)
- Bitcoin (BTC)

Precious Metals
- Gold (XAU)
- Silver (XAG)
- Platinum (XPT)
- Palladium (XPL)

We’re working hard to add more currencies and commodities every day, in order to support our global members with all of their savings and money transfer needs. If there is a currency or commodity you would particularly like to see, please do let us know by filling in this form or dropping us a line at support@bitreserve.org.
[https://support.bitreserve.org/hc/en-us/articles/202473803-What-currencies-does-Bitreserve-support-]

bitreserve'solvency

name::
* McsEngl.bitreserve'solvency@cptIt,

φερεγγυότητα

_DESCRIPTION:
Bitreserve is built around the fundamental concept that everyone has the right to total visibility into, and control over, their held value.

Bitreserve’s public Reserveledger™ and Reservechain™— along with quarterly company audits — provide a real-time verification of solvency.

Our data visualisation site Changemoney.org illustrates just how and where transactions on the site travel.

Bitreserve is setting a new standard of consumer protection and financial services accountability. Visit our reserve status for details on financial obligations to our members, along with the amount of assets in our full reserve.

Anyone at any time can confirm our solvency and ensure that his or her value is safe.
[https://bitreserve.org/en/transparency]

sihTrg.satisfier.money.device.CARD-SYSTEM

_CREATED: {2012-05-29}

name::
* McsEngl.sihTrg.satisfier.money.device.CARD-SYSTEM@cptIt,
* McsEngl.conceptIt98.21,
* McsEngl.card-money-transacting-system@cptIt98.12, {2012-05-29}

_SPECIFIC:
* credit_card_system#cptIt98.17#
* debit_card_system#cptIt98.14#
* strored_value_card_system#cptIt98.20#

sihTrg.satisfier.money.device.card.CREDIT-CARD-SYSTEM

_CREATED: {2012-05-29}

name::
* McsEngl.sihTrg.satisfier.money.device.card.CREDIT-CARD-SYSTEM@cptIt,
* McsEngl.conceptIt98.17,
* McsEngl.card-network@cptIt, {2012-11-18} [economist]
* McsEngl.credit-card-payment-system@cptIt98.14, {2012-05-29}
* McsEngl.credit-card-money-transacting-system@cptIt98.14, {2012-05-29}

Credit-card

name::
* McsEngl.conceptIt98.18,
* McsEngl.conceptEconomy265,
* McsEngl.credit-card@cptEconomy265,
* McsEngl.device.credit-card@cptIt98.18, {2012-05-29}
* McsEngl.physical-credit-card@cptIt,
* McsElln.ΠΙΣΤΩΤΙΚΗ-ΚΑΡΤΑ@cptIt,
* McsElln.ΠΙΣΤΩΤΙΚΗ'ΚΑΡΤΑ@cptEconomy265,

_GENERIC:
* entity.economic.satisfierWorking.techInfo.hardware.device#cptItsoft1.2#
* satisfier.financial#cptEconomy541.114#

_DESCRIPTION:
A credit card is a small plastic card issued to users as a system of payment. It allows its holder to buy goods and services based on the holder's promise to pay for these goods and services.[1] The issuer of the card creates a revolving account and grants a line of credit to the consumer (or the user) from which the user can borrow money for payment to a merchant or as a cash advance to the user.
A credit card is different from a charge card: a charge card requires the balance to be paid in full each month. In contrast, credit cards allow the consumers a continuing balance of debt, subject to interest being charged. A credit card also differs from a cash card, which can be used like currency by the owner of the card. Most credit cards are issued by banks or credit unions, and are the shape and size specified by the ISO/IEC 7810 standard as ID-1. This is defined as 85.60 Χ 53.98 mm (3.370 Χ 2.125 in) (33/8 Χ 21/8 in) in size.
[http://en.wikipedia.org/wiki/Credit_card]
===
είναι ΧΡΗΜΑΤΙΣΤΙΚΟ ΠΡΟΙΟΝ ...
[hmnSngo.1995-05]
===
Η ΠΙΣΤΩΤΙΚΗ ΚΑΡΤΑ είναι 'πιστωτικο χρημα' ...
[hmnSngo.1995-04]

EVOLUTION#cptCore546.171#

That's what happened with bank credit cards in the 1960s (shakeout leaving few nationwide). Now most of the bank cards you see are Visa and Master Card.
[Bowden et al, 1984, 202]

Money#cptEconomy541.115#

name::
* McsEngl.conceptIt98.19,
* McsEngl.credit-card-account@cptIt98.19,

_GENERIC:
* money.electronic

_DESCRIPTION:
The money in a credit-card is just a digital-number. The measure#Core979# of the money is this number and a currency#Economy240.11# given for this credit-card.
[hmnSngo.2012-05-28]

MoneyMeasure#cptEconomy541.115.61#

Quantity#cptCore744.10#

USA:
Yet more than 28 MILLION active bank credit-card accounts exist in the United States alone, and the total amount of credit outstanding exceeds 10 BILLION dollars.
[Chorafas, 1982, 120]

Security

Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account. Credit card fraud is also an adjunct to identity theft. According to the Federal Trade Commission, while identity theft had been holding steady for the last few years, it saw a 21 percent increase in 2008. However, credit card fraud, that crime which most people associate with ID theft, decreased as a percentage of all ID theft complaints for the sixth year in a row.[1]
The cost of card fraud in 2006 were 7 cents per 100 dollars worth of transactions (7 basis points).[2] Due to the high volume of transactions this translates to billions of dollars. In 2006, fraud in the United Kingdom alone was estimated at £535 million,[3] or US$750–830 million at prevailing 2006 exchange rates.[4]
[http://en.wikipedia.org/wiki/Credit_card_fraud]

ΑΠΟΔΟΧΗ

CITIBANK VISA

7.000.000 σε 165 χώρες, 45.000 στην Ελλαδα.

ΑΣΦΑΛΙΣΗ ΤΑΞΙΔΙΩΤΙΚΗ

CITIBANK VISA

δωρεάν ταξιδιωτική ασφάλιση

ΒΟΗΘΕΙΑ ΙΑΤΡΙΚΗ

CITIBANK VISA

δωρεάν ιατρική και νομική βοήθεια σ'όλο το κόσμο

ΒΟΗΘΕΙΑ ΝΟΜΙΚΗ

CITIBANK VISA

δωρεάν ιατρική και νομική βοήθεια σ'όλο το κόσμο

ΕΚΠΤΩΣΕΙΣ ΣΕ ΑΓΟΡΕΣ

CITIBANK VISA

εγγυημένες εκπτώσεις

ΕΛΑΧΙΣΤΗ ΚΑΤΑΒΟΛΗ ΤΟ ΜΗΝΑ

CITIBANK VISA

ΕΛΑΧΙΣΤΗ ΚΑΤΑΒΟΛΗ, 7,5%. ΤΟ ΠΟΣΟ ΠΟΥ ΥΠΕΡΒΑΙΝΕΙ ΤΟ ΜΗΝΙΑΙΟ ΟΡΙΟ ΧΡΕΙΑΖΕΤΑΙ ΝΑ ΚΑΤΑΒΑΛΕΤΑΙ ΜΕ ΤΟ ΠΡΩΤΟ ΛΟΓΑΡΙΑΣΜΟ

ΕΞΟΦΛΗΣΗ (τρόπος)

CITIBANK VISA

* Απλη επιταγη, ΟΠΟΙΑΔΗΠΟΤΕ ΤΡΑΠΕΖΑΣ
* CITIBANK, ΑΤΜ, FHONE 9242420, ΑΥΤΟΜΑΤΗ ΕΞΟΦΛΗΣΗ
* ΕΛΤΑ, ταχυπληρωμή

ΜΕΤΡΗΤΑ προς ανάληψη

CITIBANK VISA

25.000 δρχ το μήνα στην ελλάδα, 300 ECU ΤΟ ΧΡΟΝΟ στο εξωτερικό

ΟΡΙΟ ΠΙΣΤΩΣΗΣ

CITIBANK VISA

Το ποσό που μπορώ να πληρώσω με δόσεις, 200.000

ΟΡΙΟ ΣΥΝΑΛΛΑΓΩΝ ΤΟ ΜΗΝΑ

CITIBANK VISA

όριο συναλλαγών μηνιαίο: αγορές το μήνα, 200.000 δρχ.

ΠΡΟΣΦΟΡΕΣ

ΠΡΟΣΦΟΡΕΣ:
* πρόσθετο συνάλαγμα
* πληρωμή με δόσεις
* αναλήψεις και αγορά στο εξωτερικό
* δωρεάν ιατρική και νομική βοήθεια σ'όλο το κόσμο
* δωρεάν ταξιδιωτική ασφάλιση
* εγγυημένες εκπτώσεις
* Συνειδητή ενίσχυση φιλανθρωπικών σκοπών
* πρόσθετο συνάλαγμα
* πληρωμή με δόσεις
* αναλήψεις και αγορά στο εξωτερικό
* δωρεάν ιατρική και νομική βοήθεια σ'όλο το κόσμο
* δωρεάν ταξιδιωτική ασφάλιση
* εγγυημένες εκπτώσεις
* Συνειδητή ενίσχυση φιλανθρωπικών σκοπών

INNOVATION
Last big innovation was instituted in 1987 by American Express and quickly copied by Visa and Mastercard. Their programs provided expanded warranties for items bought with a credit card in the case of breakage, loss, theft or fire damage.
[Ramirez, Anthony. "Citibank To Promise Low Prices: Bank Acts to Attract Credit-Card Business With a Rebate Policy" THE NEW YORK TIMES (April 1, 1991): D1 & D6]

ΣΥΝΑΛΛΑΓΜΑ

1000 ECU το μήνα, ΧΩΡΙΣ να υπερβεί το πιστοτικό όριο το μήνα. Η προμήθεια της τράπεζας κειμένεται από 1500 σε 3000 δρχ.
[ΒΗΜΑ, 1997μαιο04, Δ15]

ΕΘΝΟΚΑΡΤΑ MASTERCARD

1.000.000 και πληρωμή σε δραχμές.

CITIBANK VISA

πρόσθετο συνάλαγμα: Ελεύθερο για πληρωμες ξενοδοχείων, εστιατορίων, μεταφορές. 600 ECU σε κάθε ταξίδι.

ΤΖΙΡΟΣ

USA:
Last year (1990), American consumers charged nearly $350 billion of goods and services on cards.
[Ramirez, Anthony. "Citibank To Promise Low Prices: Bank Acts to Attract Credit-Card Business With a Rebate Policy" THE NEW YORK TIMES (April 1, 1991): D1 & D6]

ΦΙΛΑΝΘΡΩΠΙΚΟΙ ΣΚΟΠΟΙ

CITIBANK VISA

Συνειδητή ενίσχυση φιλανθρωπικών σκοπών

price protection plan

CITIBANK VISA

It will announce it today that it will quarantee people who shop with its cards that they will pay the lowest available price for their purchases. The customer must made a claim within 60 days of the purchase and to document, with a printed advertisement, that the goods could be bought at a lower price
[Ramirez, Anthony. "Citibank To Promise Low Prices: Bank Acts to Attract Credit-Card Business With a Rebate Policy" THE NEW YORK TIMES (April 1, 1991): D1 & D6]

SPECIFIC


AMERICAN EXPRESS.
CASHCARD/VISA
CITIBANK VISA CLASSIC
DINERS
ERGOCARD Τράπεζα εργασίας VISA.
EUROCARD: Germany, Scadinavia
MASTERCARD
XIOSBANK
ΕΘΝΟcash/Maestro
ΕΜΠΟΡΟΚΑΡΤΑ
ΕΜΠΟΡΟΚΑΡΤΑ/VISA
IONOKARTA

EUROBANK CARDS

ΔΙΕΥΘΥΝΣΗ:
Eurobank Cards Α.Ε.
Πετμεζά 13, 11743 Αθήνα
Εξυπηρέτηση πελατών: 801-111-1144

VISA ELECTRON:

MASTERCARD:

CITIBANK VISA CLASSIC

ΔΙΕΥΘΥΝΣΗ: Συγγρού 54, 117 42 Αθήνα, Τηλ. 923.9943-4, 325.3748, 324.0372,
φαξ 923.9181
ΚΛΟΠΗ: 923.9943/4, 363.1230 μή εργάσιμες ώρες

sihTrg.satisfier.money.device.card.DEBIT-card-system

_CREATED: {2012-05-29}

name::
* McsEngl.sihTrg.satisfier.money.device.card.DEBIT-card-system@cptIt,
* McsEngl.conceptIt98.14,
* McsEngl.debit-card-payment-system@cptIt98.14, {2012-05-29}
* McsEngl.debit-card-money-transacting-system@cptIt98.14, {2012-05-29}

Debit-card

name::
* McsEngl.conceptIt98.15,
* McsEngl.conceptEconomy287,
* McsEngl.bank-card@cptEconomy287, {2012-05-29}
* McsEngl.check-card@cptEconomy287, {2012-05-29}
* McsEngl.DEBIT-CARD@cptEconomy287,
* McsEngl.debit-card@cptIt,
* McsElln.ΧΡΕΩΣΤΙΚΗ-ΚΑΡΤΑ@cptIt,

_GENERIC:
* entity.economic.satisfierWorking.techInfo.hardware.device#cptItsoft1.2#
* satisfier.financial#cptEconomy541.114#

_DESCRIPTION:
A debit card (also known as a bank card or check card) is a plastic card that provides the cardholder electronic access to his or her bank account(s) at a financial institution. Some cards have a stored value with which a payment is made, while most relay a message to the cardholder's bank to withdraw funds from a designated account in favor of the payee's designated bank account. The card can be used as an alternative payment method to cash when making purchases. In some cases, the primary account number is assigned exclusively for use on the Internet and there is no physical card.[1][2]
In many countries, the use of debit cards has become so widespread that their volume has overtaken or entirely replaced checks and, in some instances, cash transactions. The development of debit cards, unlike credit cards and charge cards, has generally been country specific resulting in a number of different systems around the world, which were often incompatible. Since the mid 2000s, a number of initiatives have allowed debit cards issued in one country to be used in other countries and allowed their use for internet and phone purchases.
Unlike credit and charge cards, payments using a debit card are immediately transferred from the cardholder's designated bank account, instead of the them paying the money back at a later date.
Debit cards usually also allow for instant withdrawal of cash, acting as the ATM card for withdrawing cash. Merchants may also offer cashback facilities to customers, where a customer can withdraw cash along with their purchase.
[http://en.wikipedia.org/wiki/Debit_card]
===
A charge card is a plastic card that provides an alternative payment to cash when making purchases in which the issuer and the cardholder enter into an agreement that the debt incurred on the charge account will be paid in full and by due date (usually every thirty days) or be subject to severe late fees and restrictions on card use.
Though the terms charge card and credit card are sometimes used interchangeably, they are distinct protocols of financial transactions: a credit card is a revolving credit instrument that does not need to be paid in full; no late fee is charged so long as the minimum payment is made at specified intervals (usually every thirty days) which carries the balance forward as a loan charging interest. Charge cards are typically issued without spending limits (although one may be punitively imposed after a late payment), whereas credit cards always have a specified line of credit that the user may not exceed for purchases.
[http://en.wikipedia.org/wiki/Charge_card]
===
είναι ΧΡΗΜΑΤΙΣΤΙΚΟ ΠΡΟΙΟΝ ...
[hmnSngo.1995-05]
===
The plastic "debit cards" would be used for purchases, deposits, withdrawls, bill-payment - in fact, for all kinds of financial transactions.
[Bowden et al, 1984, 173#cptResource436#]
===
ΤΟ ΠΟΣΟ ΠΟΥ ΞΟΔΕΥΕΤΑΙ ΑΦΑΙΡΕΙΤΑΙ ΑΥΤΟΜΑΤΑ ΑΠΟ ΤΟ ΛΟΓΑΡΙΑΣΜΟ. ΔΕΝ ΥΠΑΡΧΕΙ ΟΡΙΟ ΑΓΟΡΩΝ. ΟΛΟΚΛΗΡΟ ΤΟ ΥΠΟΛΟΙΠΟ ΕΙΝΑΙ ΣΤΗ ΔΙΑΘΕΣΗ.
===
CASHCARD DEBIT (ΤΡΑΠΕΖΑ ΠΙΣΤΕΩΣ, ALPHALINK)
 ΧΩΡΙΣ ΟΡΙΟ ΑΓΟΡΩΝ
 ΧΩΡΙΣ ΩΡΑΡΙΟ
 ΧΩΡΙΣ ΟΡΙΟ ΑΝΑΛΗΨΕΩΝ
 ΧΩΡΙΣ ΣΥΝΔΡΟΜΗ

Money

_CREATED: {2012-05-29}

name::
* McsEngl.conceptIt98.16,

_GENERIC:
* money#cptEconomy541.115#

_DESCRIPTION:
The money of a debit-card-system are located in a BANK-ACCOUNT of the card-holder.
[hmnSngo.2012-05-29]

SPECIFIC

There are currently three ways that debit card transactions are processed: EFTPOS (also known as online debit or PIN debit), offline debit (also known as signature debit) and the Electronic Purse Card System.[3] One physical card can include the functions of all three types, so that it can be used in a number of different circumstances.
[http://en.wikipedia.org/wiki/Debit_card]

sihTrg.satisfier.money.device.card.STORED-VALUE

_CREATED: {2012-05-29}

name::
* McsEngl.sihTrg.satisfier.money.device.card.STORED-VALUE@cptIt,
* McsEngl.conceptIt98.20,
* McsEngl.electronic-cash-system@cptIt98.20, {2012-05-29}
* McsEngl.electronic-purse-system@cptIt98.20, {2012-05-29}
* McsEngl.electronic-wallet-system@cptIt98.20, {2012-05-29}
* McsEngl.selectronic-cash-system@cptIt98.20, {2012-05-29}

_DESCRIPTION:
A stored-value card refers to monetary value on a card not in an externally recorded account and differs from prepaid cards where money is on deposit with the issuer similar to a debit card.[1] One major difference between stored value cards and prepaid debit cards is that prepaid debit cards are usually issued in the name of individual account holders, while stored value cards are usually anonymous.
The term stored-value card means the funds and or data are physically stored on the card. With prepaid cards the data is maintained on computers affiliated with the card issuer. The value associated with the card can be accessed using a magnetic stripe embedded in the card, on which the card number is encoded; using radio-frequency identification (RFID); or by entering a code number, printed on the card, into a telephone or other numeric keypad.
[http://en.wikipedia.org/wiki/Stored-value_card]

sihTrg.satisfier.money.CIRCLE

_CREATED: {2015-08-14}

name::
* McsEngl.sihTrg.satisfier.money.CIRCLE@cptIt,
* McsEngl.circle-system@cptIt,

_DESCRIPTION:
Circle is a consumer Internet company focused on transforming the world economy with secure, simple, and less costly technology for storing and using money.

We’re entering a more deeply integrated global economy in which social identities, media, communications and commerce flow freely across the planet instantly and with virtually no cost to consumers. Yet our existing infrastructure for handling money remains decades old, frustrating and limiting people and creating enormous, unnecessary taxes on our world economy.

Circle provides mobile apps aimed at enabling greater ease-of-use in online and in-person payments, enhanced security and privacy for customers, and the convenience of free, instant, global digital money transfers.

Unlike existing systems for using money which are based on closed and proprietary technology and networks, Circle is building on open Internet standards and protocols, including digital currency technologies such as Bitcoin. We believe that the world can have an Internet of Value Exchange just as we have an Internet of Media and an Internet of Information Exchange that are similarly built on open platforms and networks.

As a leadership team, we have collectively built, scaled and directed significant global companies in Internet technology and media and global finance. Circle presents a similar opportunity with the promise of transforming and improving how people use money around the world.
[https://www.circle.com/en/about]

sihTrg.satisfier.money.COMMUNITY-EXCHANGE-SYSTEM

_CREATED: {2012-12-19}

name::
* McsEngl.sihTrg.satisfier.money.COMMUNITY-EXCHANGE-SYSTEM@cptIt,
* McsEngl.community-exchange-system@cptIt, {2012-12-19}

_ADDRESS.WPG:
* http://www.community-exchange.org//

_DESCRIPTION:
The Community Exchange System is an Internet-based trading network[1] which allows participants to buy and sell goods and services without using a national currency. While the relatively new system can be used as an alternative to traditional currencies such as the dollar or Euro or South African rand, the Community Exchange System is a complementary currency in the sense that it functions alongside established currencies. It is international in scope.[2] It does not have printed money or coins[3] but uses computer technology to serve as an "online money and banking system" and as a marketplace.[4] It is an advance from an arrangement in which either one good or service is exchanged for another good or service, or commonly called barter, since it uses a digital unit of value.[2][3] While there are reports that the system is growing, in 2011 the system handles only a tiny fraction of international world commercial activity.
[http://en.wikipedia.org/wiki/Community_Exchange_System]
===
There are many similar trading systems around the world, commonly know as
Community Exchange Systems,
Local Exchange Trading Systems (LETS),
Mutual Credit trading systems or
Time Banks.
[http://www.community-exchange.org/docs/whatces.htm]

An Example of a Trade

Requirement: Your car needs an oil change.

Step 1: You either look through the Offerings List or do a search to see if anyone is offering oil changes or car maintenance. Someone is offering oil changes for T80 but you must bring your own oil and oil filter.

Step2: In the Offerings List you click on the person's name to obtain contact details. You phone the person (the 'seller') and agree on a time and place for the oil change.

Step 3: The oil change takes place and then you (the 'buyer') fill in a Trading Slip (obtainable from the site), giving the date, your name, your account number, the amount (T80) and your signature. You fill in the same details on the counterfoil and get the seller to sign it. The counterfoil is then separated from the slip and you hand the main part to the seller, keeping the counterfoil for yourself. For the seller your Trading Slip represents your payment and your acknowledgement of the service or goods delivered; for you the counterfoil is your record of payment.

Step 4: You leave, satisfied that your car has fresh oil. The seller then goes to a computer and enters the details of the trade into the transaction form of his or her CES 'bank account'. This becomes a credit for the seller and a debit for you. You are now obliged to provide goods and services to the community worth T80.
[http://www.community-exchange.org/docs/example.htm]

sihTrg.satisfier.money.currency.BITCOIN {2009}#ql:netbtc#

name::
* McsEngl.sihTrg.satisfier.money.currency.BITCOIN {2009}@cptIt,

sihTrg.satisfier.money.currency.BLOCKCHAIN (crypto)

name::
* McsEngl.sihTrg.satisfier.money.currency.BLOCKCHAIN (crypto)@cptIt,
* McsEngl.conceptIt51.12,

sihTrg.satisfier.money.currency.FAIRCOIN (link#ql:fairnet#)

name::
* McsEngl.sihTrg.satisfier.money.currency.FAIRCOIN (link#ql:fairnet#)@cptIt,

sihTrg.satisfier.money.currency.MUTUAL-CREDIT

_CREATED: {2015-08-22}

name::
* McsEngl.sihTrg.satisfier.money.currency.MUTUAL-CREDIT@cptIt,
* McsEngl.mutual-credit-stmIthMny@cptIt,

_DESCRIPTION:
Mutual credit is a type of alternative currency in which the currency used in a transaction can be created at the time of the transaction. Local exchange trading systems (LETS) are mutual credit systems. Typically this involves keeping track of each individual's credit or debit balance. Although the effect is like a loan, no interest is charged, and since mutual credit allows for trading and cancelling balances with others, debts can be paid off indirectly. The "IOU" is a common example of this.
[https://en.wikipedia.org/wiki/Mutual_credit]

mutual-credit#ql:mnymcredit#

SPECIFIC

_SPECIFIC:
* LETS##
* WIR-system##

_SPECIFIC:
The local exchange trading system (LETS), the Community Exchange System, the Cincinnati Time Store and, (in the United Kingdom), the Echo business trading network are examples of mutual credit systems. A number of different mutual credit systems have been proposed. Mutual credit can be combined with a number of features of alternative currency systems. For example, it is usually (but does not need to be) a local currency, and it can have a demurrage fee for the holding of balances.
[https://en.wikipedia.org/wiki/Mutual_credit]

sihMny.LETS

_CREATED: {2012-12-19}

name::
* McsEngl.sihMny.LETS@cptIt,
* McsEngl.LETS@cptIt, {2012-12-19}
* McsEngl.local-employment-and-trading-system@cptIt,
* McsEngl.local-energy-transfer-system@cptIt,
* McsEngl.local-exhange-trading-system@cptIt,

_DESCRIPTION:
A local exchange trading system (also local employment and trading system or local energy transfer system; abbreviated to LETS or LETSystem) is a locally initiated, democratically organised, not-for-profit community enterprise that provides a community information service and record transactions of members exchanging goods and services by using the currency of locally created LETS Credits. [1]
[http://en.wikipedia.org/wiki/LETS]

sihTrg.satisfier.money.DECENTRALIZED

_CREATED: {2012-05-29}

name::
* McsEngl.sihTrg.satisfier.money.DECENTRALIZED@cptIt,
* McsEngl.conceptIt98.13,
* McsEngl.decentralized-payment-system@cptIt98.13, {2012-05-29}
* McsEngl.distributed-money-transacting-system@cptIt98.13,
* McsEngl.centralized-money-transacting-system@cptIt98.13, {2012-05-29}

_GENERIC:
* distributed-transacting-system##

_DESCRIPTION:
Cryptocurrencies allow electronic money systems to be decentralized, systems include:
Bitcoin, a peer-to-peer electronic monetary system based on cryptography.
Litecoin, originally based on the Bitcoin protocol, intended to improve upon its alleged inefficiencies.
Ripple monetary system, a monetary system based on trust networks.
Dogecoin, a Litecoin-derived system meant by its author to reach broader demographics.
Monero (cryptocurrency), focused on privacy, decentralisation and scalability.
Nxt, conceived as flexible platform to build applications and financial services around.
[https://en.wikipedia.org/wiki/Electronic_money]
===
Decentralised electronic money systems include:
Ripple monetary system, a monetary system based on trust networks.
Bitcoin, a peer-to-peer electronic monetary system based on cryptography.
Loom, a digitally encrypted commodity exchange system, warehouse certificates that can be used as currency.[3]
[http://en.wikipedia.org/wiki/Electronic_currency]

SPECIFIC

_SPECIFIC:
* blockchain-network#ql:netbcn#
* Bitcoin-system##
* Ripple-system##

sihTrg.satisfier.money.DECENTRALIZED.NO (centralized)

_CREATED: {2015-08-12}

name::
* McsEngl.sihTrg.satisfier.money.DECENTRALIZED.NO (centralized)@cptIt,
* McsEngl.conceptIt1001,
* McsEngl.sysIthMny.centralized@cptIt1001,

_DESCRIPTION:
Many systems—such as PayPal, eCash, WebMoney, Payoneer, cashU, and Hub Culture's Ven will sell their electronic currency [clarification needed] directly to the end user. Other systems only sell through third party digital currency exchangers. The M-Pesa system is used to transfer money through mobile phones in Africa, India, Afghanistan, and Eastern Europe. Some community currencies, like some local exchange trading systems (LETS) and the Community Exchange System, work with electronic transactions.
[https://en.wikipedia.org/wiki/Electronic_money]

sihTrg.satisfier.money.device.ATM-network

name::
* McsEngl.sihTrg.satisfier.money.device.ATM-network@cptIt,
* McsEngl.conceptIt98.8,
* McsEngl.It324old@cptIt,
* McsEngl.ATMnet@cptIt98.8, {2012-05-29}
* McsEngl.ATM-network@cptIt,

ATMnet'Advantage

name::
* McsEngl.ATMnet'Advantage@cptIt,

With the ATMs, there is the advantage of 24-hour service, and perhaps time savings, because it isn't necessary to stand in line at the teller's window.
[Bowden-et-al, 1984, 187#cptResource436]

ATMnet'Automated-Teller-Machine

name::
* McsEngl.ATMnet'Automated-Teller-Machine@cptIt,
* McsEngl.conceptIt98.9,
* McsEngl.conceptIt319,
* McsEngl.ATM@cptIt,
* McsEngl.Automated-teller-machine@cptIt,

_GENERIC:
* entity.economic.satisfierWorking.techInfo.machine#cptItsoft1.1#

_DESCRIPTION:
There are some interesting things about the SHARED ATM SYSTEMS. One is that they include banks, savings and loans, mutual savings banks, and credit unions.
[Bowden-et-al, 1984, 198#cptResource436]

attribute#cptCore546.174#

_ATTRIBUTE:
ADVANTAGES
CASH CARDS
COST
FEE
FUNCTIONS
FUTURE
IMPACT

ATM'Cost

name::
* McsEngl.ATM'Cost@cptIt,

Their cost is just $40,000 to $50,000 each, as compared with $250,000 to $500,000 required for setting up a staffed brance office.
[Austin-et-all, 1989, 24#cptResource435]

Many ATM are not cost effective. Costs per transaction range from $.25 to $.50, and generally, the volume of monthly transactions does not offset monthly costs. However, both long-term potential and customer demand continues to require expansion of such services.
[Austin-et-all, 1989, 277#cptResource435]

ATM'Quantity

name::
* McsEngl.ATM'Quantity@cptIt,

USA:
1979:
in 1979, about ten years after the first ATMs were installed, there were about 13,800 ATMs in use. Before the end of 1983 the number exceeded 40,000.
[Bowden-et-al, 1984, 194#cptResource436]
1982:
{the senior Vice president of bank One of Columbus, Ohio said in February 1982} The ATM is now its 12th year in the country. Right now there are about 39,000 of them out there and the acceptance curve is standing straight up! It is being projected that in the next 5 years the number of ATMs in place will expand to 125,000.
[Bowden-et-al, 1984, 193#cptResource436]
1990:
At present there are close to 100,000 ATMs in operation in the US and 157 regional and 8 national networks supporting them.
[Martin, 1990, 18#cptResource134]

ATMnet'Account.money-market-deposit

name::
* McsEngl.ATMnet'Account.money-market-deposit@cptIt,

Commercial banks and S&Ls were rapidly updating their ATM networks in December 1982 and early 1983 to put the new MMDA accounts on machine.
[Bowden-et-al, 1984, 195#cptResource436]

ATMnet'Doing#cptCore475#

name::
* McsEngl.ATMnet'Doing@cptIt,

OTHER BANKS:
When using teller machines of a bank other than their own, consumers can
withdraw funds,
check account balances and
transfer funds among accounts.
Deposits at machines of other banks are possible IF they are in the same state, but many banks have chosen not to process deposits of other bank customers, because of the expence of handling checks and cash.
[Quint, 1991, 33#cptResource438]

THEY DON'T DO:
They are unable to evaluate credit applications grant credit or disburse funds.
[Austin-et-all, 1989, 24#cptResource435]

ATMnet'Effect#cptCore546.189#

name::
* McsEngl.ATMnet'Effect@cptIt,

_Effect:
Traditionally, the entire depository financial institutions industry has operated on an "in-office basis; the use of off-premise ATMs, was the first real break with that tradition.
[Austin-et-all, 1989, 278#cptResource435]

ATMnet'Fee

name::
* McsEngl.ATMnet'Fee@cptIt,

Generally, the consumer's bank charges a fee of as much as $2 for each transaction unless a minimum balance is maintained, and pays a charge of less than 10 cents to the operator of the system connecting the teller machines. The bank whose machine is used also paid a fee, which at Cirrus is about 50 cents a transaction.
[Quint, 1991, 33#cptResource438]

ATMnet'EVOLUTION#cptCore546.171#

name::
* McsEngl.ATMnet'EVOLUTION@cptIt,
* McsEngl.evoluting-of-ATMnet@cptIt,

ATM'FUTURE

name::
* McsEngl.ATM'FUTURE@cptIt,

CITIBANK:
Citibank's rapid expansion of teller machines since 1977 help it solidify its position as the leading consumer bank in the NY area market.
More recently, it has refined its system so that customers can use their plastic cards at any Citibank machine in teh US, as well as in Puerto Rico and Japan.
Later this year, it expects to include Singapore, Germany and Hong Kong.
[Quint, 1991, 33#cptResource438]

WORLD:
"We are rapidly approaching the day in electronic banking when all banks in the United States, and all banks in the world, will be offering the same availability of ATM machines" said J.F. Love, president of Faulkner & Gray, a NY publisher of many banking magazines, inclunding Bank Network News.
[Quint, 1991, 33#cptResource438]

ATMnet'Use

name::
* McsEngl.ATMnet'Use@cptIt,

According to bank Network News, automated teller machines handled about 475 milion transaction a month during 1990.
Citibank estemates that 80% of all branch visits by its customers in NY are handled by its more than 1000 automated tellers.
[Quint, 1991, 33#cptResource438]

in 1982, withdrawals made up about 75% and deposits about 20% of total transactions. The average deposite size was $267, and teh average withdrawl was $37.
[Bowden-et-al, 1984, 194#cptResource436]

SPECIFIC

ATMnet.CIRRUS

name::
* McsEngl.ATMnet.CIRRUS@cptIt,
* McsEngl.conceptIt320,
* McsEngl.CIRRUS-ATM-network@cptIt,
* McsEngl.CIRRUS@cptIt98i,

{time.1990}:
Although it handled only 104 million transfers during 1990, it is the largest network for conecting bank machines in different regions and overseas, with 55,000 MACHINES in 20 countries.
[Quint, 1991, 35#cptResource438]

{time.1984}:
Over 5,000 ATMs and over 20 million card holders
[Bowden-et-al, 1984, 202#cptResource436]

{time.1983}:
CIRRUS started operations in January 1983, a few months before Plus began functioning.
[Bowden-et-al, 1984, 202#cptResource436]

FINANCIAL INSTITUTIONS on CIRRUS

Citibank, which for years refused to allow other bank's customers to use its automated teller machines in the New York area, announce yesterday that it would join the cirrus network.
[Quint, 1991, 33#cptResource438]

ON CIRRUS, 7,200 banks and financial institutions in the US and overseas share access to their machines.
[Quint, 1991, 33#cptResource438]

Owner

The Chicago-based CIRRUS system was founded by 13 major banks.
[Bowden-et-al, 1984, 202#cptResource436]

ATMnet.USA

name::
* McsEngl.ATMnet.USA@cptIt,

At present there are 157 regional and 8 national networks supporting them.
[Martin, 1990, 18#cptResource134]

Several nationwide ATM networks were set up in 1981-82 and were in operation before the end of 1983.
[Bowden-et-al, 1984, 194#cptResource436]

at the end of 1983, these four networks
 MidAtlantic Systems,
 Magic Line,
 MPACT, and
 PULSE
were the largest in the country in terms of numbers of ATMs inclunded.
[Bowden-et-al, 1984, 195#cptResource436]

By the end of 1981 there were more than a dozen different groups trying to put together nationwide ATM networks ... and by the end of 1983 there were 7 national networks either in operation or nearly so. these were:
Visa International
Plus System
CIRRUS System
The Exchange
NATIONNET
Master Teller, and
Express Cash (by American Express).
Each of these national networks provided the same kinds of services nation wide that had been previously provided by the regional shared systems.
...There is no question that this is interstate banking... but in 1980 the Comptroller of the Currency issued the opinion that ATM sharing arrangements with out-of-state banks do not violate the McFadden Act.
[Bowden-et-al, 1984, 199#cptResource436]

PLUS SYSTEM

name::
* McsEngl.plus-system@cptIt,

It started operations in mid 1983 with about 10,000 ATM machines connected...
The Plus System, Inc., based in Denver, is owned by 34 major banks (all Visa members and it had about 950 other financial institutions tied into the system.
[Bowden-et-al, 1984, 202#cptResource436]

ATMnet.World

name::
* McsEngl.ATMnet.World@cptIt,

Throughout 1983, Hock (president of Visa International) was moving ahead with plans to establish a worldwide network of ATMs...Visa..hopes to buillp it into a global network with at least 8000 machines in many countries throughout the world by the end of 1986.
[Bowden-et-al, 1984, 201#cptResource436]

sihTrg.satisfier.money.device.Contact

_CREATED: {2012-05-29}

name::
* McsEngl.sihTrg.satisfier.money.device.Contact@cptIt,
* McsEngl.conceptIt98.12,
* McsEngl.contact-payment-system@cptIt98.12, {2012-05-29}
* McsEngl.contact-money-transacting-system@cptIt98.12, {2012-05-29}

sihTrg.satisfier.money.device.Contactless

_CREATED: {2012-05-28}

name::
* McsEngl.sihTrg.satisfier.money.device.Contactless@cptIt,
* McsEngl.conceptIt98.2,
* McsEngl.contactless-payment-system@cptIt98.2, {2012-05-28}
* McsEngl.contactless-money-transacting-system@cptIt98.2, {2012-05-28}

Contactless payment systems are credit cards and debit cards, key fobs, smartcards or other devices which use RFID for making secure payments. The embedded chip and antenna enable consumers to wave their card or fob over a reader at the point of sale. Some suppliers claim that transactions can be almost twice as fast as a conventional cash, credit, or debit card purchase. Because no signature or PIN entry is typically required for purchases under US$25 in the US and under £15 in the UK, some research indicates that consumers are likely to spend more money due to the ease of small transactions. MasterCard Canada says it has seen "about 25 percent" higher spending by users of its PayPass-brand RFID credit cards.[1]
[http://en.wikipedia.org/wiki/Contactless_payment]

Mastercard Contactless

MasterCard Contactless [formerly branded Paypass[58]] is an EMV compatible, "contactless" payment feature similar to American Express' ExpressPay, and Visa payWave. All three use the same symbol as shown on the right. It is based on the ISO/IEC 14443 standard that provides cardholders with a simpler way to pay by tapping a payment card or other payment device, such as a phone or key fob, on a point-of-sale terminal reader rather than swiping or inserting a card. PayPass can currently be used on transactions up to and including £20 GBP, $50 USD, $100 CAD or $100 AUD.

In 2003, MasterCard concluded a nine-month PayPass market trial in Orlando, Florida with JPMorgan Chase, Citibank, and MBNA. More than 16,000 cardholders and more than 60 retailer locations participated in the market trial. In addition, MasterCard worked with Nokia, AT&T Wireless, and JPMorgan Chase to incorporate MasterCard PayPass into mobile phones using Near Field Communication technology, in Dallas, Texas. In 2011, Google and MasterCard launched Google Wallet, an Android application which allows a mobile device to send credit/debit card information directly to a Paypass enabled payment terminal, bypassing the need for a physical card.
[https://en.wikipedia.org/wiki/MasterCard#Mastercard_Contactless]

sihTrg.satisfier.money.device.MOBILE-PAYMENT

_CREATED: {2012-11-18} {2012-05-27}

name::
* McsEngl.sihTrg.satisfier.money.device.MOBILE-PAYMENT@cptIt,
* McsEngl.mobile-payment-system@cptIt, {2012-11-18}
* McsEngl.mobile-payment@cptEconomy346.23, {2012-05-27}

_GENERIC:
* payment_service#cptEconomy346.19#

_DESCRIPTION:
Mobile payment, also referred to as mobile money, mobile banking, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation and performed from or via a mobile device.
Financial institutions and credit card companies[1] as well as Internet companies such as Google[2] and a number of mobile communication companies, such as mobile network operators and major telecommunications infrastructure and handset multinationals such as Ericsson[3][4] have implemented mobile payment solutions.
Mobile payment is an alternative payment method. Instead of paying with cash, check, or credit cards, a consumer can use a mobile phone to pay for a wide range of services and digital or hard goods such as:
Music, videos, ringtones, online game subscription or items, wallpapers and other digital goods.
Transportation fare (bus, subway or train), parking meters and other services
Books, magazines, tickets and other hard goods.
There are four primary models for mobile payments:
Premium SMS based transactional payments
Direct Mobile Billing
Mobile web payments (WAP)
Contactless NFC (Near Field Communication)
Additionally there is a new emerging model from Haiti: direct carrier/bank co-operation.
Mobile payment is being adopted all over the world in different ways.[5][6] Combined market for all types of mobile payments is expected to reach more than $600B globally by 2013,[7] which would be double the figure as of February, 2011,[8] while mobile payment market for goods and services, excluding contactless NFC transactions and money transfers, is expected to exceed $300B globally by 2013.[9]
Some mobile payment solutions are also used in developing countries for micropayments.[10]
[http://en.wikipedia.org/wiki/Mobile_payment]

_DESCRIPTION:
Mobile payment, also referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation and performed from or via a mobile device.

Financial institutions and credit card companies[1] as well as Internet companies such as Google[2] and a number of mobile communication companies, such as mobile network operators and major telecommunications infrastructure such as w-HA from Orange and handset multinationals such as Ericsson[3][4] have implemented mobile payment solutions.

Mobile payment is an alternative payment method. Instead of paying with cash, check, or credit cards, a consumer can use a mobile phone to pay for a wide range of services and digital or hard goods such as:

Music, videos, ringtones, online game subscription or items, wallpapers and other digital goods.
Transportation fare (bus, subway or train), parking meters and other services
Books, magazines, tickets and other hard goods.
There are four primary models for mobile payments:

Premium SMS based transactional payments
Direct Mobile Billing
Mobile web payments (WAP)
Contactless NFC (Near Field Communication)
Additionally there is a new emerging model from Haiti: direct carrier/bank co-operation.

Mobile payment is being adopted all over the world in different ways.[5][6] Combined market for all types of mobile payments is expected to reach more than $600B globally by 2013,[7] which would be double the figure as of February, 2011,[8] while mobile payment market for goods and services, excluding contactless NFC transactions and money transfers, is expected to exceed $300B globally by 2013.[9]

In developing countries mobile payment solutions have been deployed as a means of extending financial services to the community known as the unbanked or underbanked, which is estimated to be as much as 50% of the world's adult population, according to Financial Access' 2009 Report "Half the World is Unbanked".[10] These payment networks are often used for micropayments.[11] The use of mobile payments for Financial Inclusion has attracted the interest and funding of international aid foundations like the Bill and Melinda Gates Foundation, USAID and MercyCorps.
[http://en.wikipedia.org/wiki/Mobile_payment]

SPECIFIC

Apple-Pay

name::
* McsEngl.Apple-pay@cptIt,

_DESCRIPTION:
Apple Pay is a mobile payment and digital wallet service by Apple Inc. that lets users make payments using the iPhone 6, iPhone 6 Plus, Apple Watch-compatible devices (iPhone 5 and later models), iPad Air 2 and iPad Mini 3. Apple Pay does not require Apple-specific contactless payment terminals and will work with Visa's PayWave, MasterCard's PayPass, and American Express's ExpressPay terminals.[1]
[https://en.wikipedia.org/wiki/Apple_Pay]

ISIS {2010}

name::
* McsEngl.ISIS@cptIt, {2012-11-18}

_DESCRIPTION:
Isis is a joint venture between AT&T, T-Mobile and Verizon Wireless in the mobile payment space, announced on 16 November 2010. The system is reported to be based on near field communication (NFC). Notably, Sprint is not part of the consortium. The CEO of ISIS is Mike Abbott. The ISIS mobile system has partnered with the Discover network and Barclaycard US.

On April 4, 2011, Isis announced it will pilot the Isis mobile commerce program in Salt Lake City in early to mid-2012. On July 19, 2011, a partnership was announced[1] between ISIS, Visa, Mastercard, Discover, and American Express.

On August 29, 2011, the three mobile phone companies announced plans to invest more than $100 million in the project.[2]

[edit]Technologies

Isis uses several underlying technologies:

C-SAM mobile wallet platform[3]
Gemalto mobile commerce platform[4]
[http://en.wikipedia.org/wiki/ISIS_(mobile_payment_system)]

SnapScan

_DESCRIPTION:
FREQUENTLY ASKED QUESTIONS
What is SnapScan?
SnapScan is a smartphone app that lets you use your phone to pay for things in shops.

How does the payment process work?
Each shop has a unique code that’s linked to their bank account. (We call it a SnapCode).

When you want to pay, you scan the code with the SnapScan app (it uses your phone’s camera and automatically recognises the code). This brings up their store – all you do is enter the amount you want to pay and confirm that it is correct with a 4 digit PIN.

SnapScan then charges your debit or credit card (Visa or MasterCard) for the amount you are paying, the same as when you pay with your card.

How does the setup process work?
After you’ve downloaded SnapScan, you’ll be asked to scan your debit or credit card (Visa or MasterCard). SnapScan will use your phone’s camera to automatically recognise your card details, so you don’t need to type in long card numbers. Then you choose your own 4 digit PIN to ensure that only you can confirm payments.

Are my card details safe?
Yes. Your card details are encrypted and stored only on your phone itself – nowhere else. We never see them, and they aren’t backed up on any external server.

Which phones does SnapScan work on?
You can download SnapScan on your iPhone, Android or BlackBerry. It's free to download, and free to use.

What if my phone gets lost or stolen?
You have a PIN that only you know so no one can buy anything.

How do I find shops that accept SnapScan?
The easiest way is to download SnapScan and check out the Merchant Finder within the app.

What are the fees?
We charge the merchant a small fee but it's always free for customers, like credit cards.

Why should I download SnapScan?
So you don't have to fumble with cards or cash. Your phone is usually in your hand anyway, and SnapScan is just faster.
[http://www.snapscanapp.com/faq]

sihTrg.satisfier.money.doing.CONVERTING (forex)

name::
* McsEngl.sihTrg.satisfier.money.doing.CONVERTING (forex)@cptIt,
* McsEngl.conceptIt51.2,
* McsEngl.stmIthTrg.satisfier.FOREX@cptIt,
* McsEngl.forex-electronic-trading-system@cptIt, {2012-05-05}
* McsEngl.sysIthFx@cptIt51.2, {2012-05-31}

_GENERIC:
* money-transacting-stmIth#cptItsoft98#

_DESCRIPTION:
The National Futures Association (NFA) in the US lists the following general standard requirements for forex electronic trading systems;[2]
Authentication (Passwords, Authentication Tokens such as secureID cards; or digital certificates)
Encryption
Transactions recording standard
Pricing and slippage standard
[http://en.wikipedia.org/wiki/Electronic_trading_platform]

stmIthFx'dbFX

name::
* McsEngl.stmIthFx'dbFX@cptIt,

dbFX was Deutsche Bank’s online margin forex trading platform for individuals which was shut down on 13 May 2011. The client list was bought by Gain Capital and existing clients were directed to Gain's retail service forex.com upon closure of the business.
dbFX on its website said "...We'd like to inform you that from Friday 13 May 2011, Deutsche Bank will no longer provide dbFX, its online FX trading platform for individuals and small institutions. dbFX has made arrangements that will allow existing clients to open an account with FOREX.com...".
[http://en.wikipedia.org/wiki/DBFX]

stmIthFx'Exchanging#cptEconomy3.17.2#

name::
* McsEngl.stmIthFx'Exchanging@cptIt,

stmIthFx'Program

name::
* McsEngl.stmIthFx'Program@cptIt,
* McsEngl.forex'platform@cptIt51i, {2012-05-31}
* McsEngl.forex'program@cptIt51i, {2012-05-31}

traFXpure

name::
* McsEngl.traFXpure@cptIt51i, {2012-05-31}

Five major investment banks are backing a new foreign exchange trading platform that discourages high-frequency trading in the world’s largest and most liquid market.
The platform, to be called traFXpure, will be operated by Tradition, the Swiss interdealer broker, and will look to cut down on potential “flash” orders – trades made at lightning speeds on electronic systems.
[http://www.ft.com/intl/cms/s/0/3f8cf658-aa43-11e1-8b9d-00144feabdc0.html#axzz1wSdNnkdG]

stmIthFx'Retail-foreign-exchange-platform

name::
* McsEngl.stmIthFx'Retail-foreign-exchange-platform@cptIt,
* McsEngl.retail-fx-platform@cptEconomy51i,

Retail foreign exchange trading is a small segment of the large foreign exchange market. In 2007 it had been speculated that volume from retail foreign exchange trading represents 5 percent of the whole foreign exchange market which amounts to $50–100 billion[1][2] in daily trading turnover. The retail foreign exchange market has been growing. In general retail customers are able to trade spot currencies. Due to the increasing tendency in the past years of the gradual shift from traditional intrabank 'paper' trading to the more advanced and accurate electronic trading, there has been spur in software development in this field. This change provided different types of trading platforms and tools intended for the use by banks, portfolio managers, retail brokers and retail traders.
One of the most important tools required to perform a foreign exchange transaction is the trading platform providing retail traders and brokers with accurate currency quotes.
[http://en.wikipedia.org/wiki/Forex_platform]

stmIthFx'EVOLUTION#cptCore546.171#

name::
* McsEngl.stmIthFx'EVOLUTION@cptIt,
* McsEngl.evoluting-forex-system@cptIt,

History and new developments

Since 1996, when retail foreign exchange trading was first introduced, several brokers who lacked the sufficient tools developed their own trading platforms tailored specifically to their needs. The 1st retail FX brokers were MG Forex, The Matchbook FX ECN, GFT, CMC Markets, Saxo Bank (then known as Midas) and a handful of others. Most except CMC, Saxo & Matchbook FX were based on the ACT foreign exchange trading technology and GUI. These platforms were good enough at the time but required constant investments in research and development and this development cost too much. This was the first wave.[citation needed]
The second wave was in the early 2000s: several software companies entered the retail foreign exchange trading market by launching their own versions of trading platforms, like Apbg Group, Ctn Systems and MetaTrader 4 from MetaQuotes Software which allowed the users to create their own trading indicators and automatic strategies. Typically these versions were cumbersome for both front-end users (retail traders) and back-end users (retail brokers) due to the misunderstanding of the developers about the foreign exchange market and also because of the insufficient programming tools/languages at the time. Simultaneously most of the retail brokers kept using and developing their own systems as they waited for better platforms which were yet to be developed.
It is only in the last couple of years that the advanced trading platforms started to emerge. Platforms like Multicharts and cTrader put much stronger emphasis on the user interface (GUI) making it more accessible to the retail traders while making trading on it very simple and intuitive. Platforms started to focus on social networking as a way to attract new users, after the emergence of Facebook, Twitter and other social media networks. Social trading has been growing intensely in the last years, especially after platforms like Currensee, Zecco.com, eToro or FXStat appeared.
Moreover, a very strong emphasis was put on the back-end which allowed the retail brokers better control over their operations, better reporting and accurate system and ways to manage marketing campaigns.[citation needed]
Gradually this wave is replacing the previous second wave with a major shift now to the friendlier and more intuitive systems of the third wave which according to Aite Group are necessary in order to maintain growth.[3]
[http://en.wikipedia.org/wiki/Forex_platform]

SPECIFIC

name::
* McsEngl.sysIthFx.specific@cptIt,

stmIthFx.Currensee-network

name::
* McsEngl.stmIthFx.Currensee-network@cptIt,
* McsEngl.currensee@cptIt51i, {2012-05-31}

Currensee (or currensee.com) is a financial services company based in Boston to serve as a social network for foreign exchange (FX, Forex or currency) traders. The impetus to let traders collaborate on trading strategies, styles, and techniques stemmed from the fundamental chaos of the retail forex market, where regulations vary from country to country and the were a high number of solo "Day traders".[1]
From this initial social networking foray emerged Currensee's "Trade Leaders Investment Program," in which Currensee uses a proprietary algorithm to identify top-performing traders from within the social network, invites them to participate in the program, and then allows other investors to follow and execute their trades in their own brokerage account. Something that was akin to the mutual fund system based in stock indexes.
[http://en.wikipedia.org/wiki/Currensee]

Currensee-Inc

_ATTRIBUTE:
Currensee Inc
Type  Private
Industry  Financial services
Founded  2008
Headquarters  Boston, United States
Key people  Dave Lemont CEO
Asaf Yigal Co-founder
Avi Leventhal Co-founder
Products  currency trading, Social network
Website  www.currensee.com
[http://en.wikipedia.org/wiki/Currensee]

stmIthFx.Peer-to-peer

name::
* McsEngl.stmIthFx.Peer-to-peer@cptIt,

Peer-to-peer trading systems
In the South Pacific, "peer-to-peer" foreign exchange services, supported by local government agencies, are emerging in an attempt to reduce transaction costs to heavily remittance-dependent nations, such as Tonga and Samoa.[citation needed]
[http://en.wikipedia.org/wiki/Forex_platform]

stmIthFx.Retail

name::
* McsEngl.stmIthFx.Retail@cptIt,

stmIthFx.Social-network

name::
* McsEngl.stmIthFx.Social-network@cptIt,

sihTrg.satisfier.money.doing.PAYMENT

_CREATED: {2015-08-27}

name::
* McsEngl.sihTrg.satisfier.money.doing.PAYMENT@cptIt,
* McsEngl.conceptIt51.10,
* McsEngl.stmIthMny.payment@cptIt,
* McsEngl.payment-network@cptIt51.10,

_DESCRIPTION:
Payment I call any transaction except conversion

sihMny'transaction-per-second

name::
* McsEngl.sihMny'transaction-per-second@cptIt,

SPECIFIC

_SPECIFIC:
* https://en.wikipedia.org/wiki/List_of_online_payment_service_providers,

sihMny.doing.TRANSFERING

_CREATED: {2012-05-29}

name::
* McsEngl.sihMny.doing.TRANSFERING@cptIt,
* McsEngl.conceptIt98.4,
* McsEngl.stmIthMny.transfering@cptIt,
* McsEngl.transfering-money-electronic-system@cptIt98.4, {2012-05-29}

_DESCRIPTION:
Transfering money is a transaction not for paying#cptEconomy369.32#
[hmnSngo.2012-05-29]

sihMny.doing.RECEIVING

_CREATED: {2015-08-21}

name::
* McsEngl.sihMny.doing.RECEIVING@cptIt,
* McsEngl.conceptIt98.26,

sihMny.doing.SENDING

_CREATED: {2015-08-21}

name::
* McsEngl.sihMny.doing.SENDING@cptIt,
* McsEngl.conceptIt98.25,
* McsEngl.sihMny.doing.GIVING@cptIt,

_SPECIFIC:
* gifting
* paying

sihMny.doing.PAYING

_CREATED: {2012-05-29}

name::
* McsEngl.sihMny.doing.PAYING@cptIt,
* McsEngl.conceptIt98.3,
* McsEngl.paying-electronic-system@cptIt98.3, {2012-05-29}

_GENERIC:
* giving-money-transacting-stmIth##

_DESCRIPTION:
Paying means you give money to someone BECAUSE you get|got from him a satisfier.
[hmnSngo.2012-05-29]

sihMny.instance.VisaNet

name::
* McsEngl.sihMny.instance.VisaNet@cptIt,
* McsEngl.siHMny.VisaNet@cptIt,
* McsEngl.VisaNet@cptIt,
* McsEngl.Visa-network@cptIt,

_DESCRIPTION:
The company operates a proprietary transaction processing network, called VisaNet, which facilitates authorization, clearing and settlement of payment transactions worldwide, while offering fraud protection for account holders and rapid payments for merchants.
Visa states that the network is capable of handling more than 24,000 transaction messages per second, and currently processes over 13,000 transactions per second for people and businesses worldwide, “enabling them to use digital currency instead of cash and checks.”
[http://bravenewcoin.com/news/visas-blockchain-efforts-continue/]

transaction-per-second

_DESCRIPTION:
Visa is the world’s largest payment network and handles nearly 56,000 transaction messages a second.
[http://cointelegraph.com/news/visa-plans-blockchain-push-from-india]
===
the Visa network, which is estimated to be 24,000 tx/second. VisaNet, the base payment network for most of the world’s credit card payments and digital transactions, processes around 150 million transactions on a daily basis.
[https://cointelegraph.com/news/australian-record-scalability-blockchain-how-crypto-is-stepping-into-the-land-down-under]

sihTrg.satisfier.money.ETHEREUM#ql:ethereum#

name::
* McsEngl.sihTrg.satisfier.money.ETHEREUM@cptIt,

sihTrg.satisfier.money.M-PESA

name::
* McsEngl.sihTrg.satisfier.money.M-PESA@cptIt,
* McsEngl.M-pesa-system@cptIt,
* McsEngl.M-Pesa@cptIt,

_DESCRIPTION:
M-Pesa is the world's most successful money transfer service that enables millions of people who have access to a mobile phone but do not have or have only limited access to a bank account, to send and receive money, top-up airtime and make bill payments. As at last year, it announced it has 25 mln active global users.
[https://cointelegraph.com/news/in-africa-m-pesa-success-is-example-in-bitcoin-adoption-bitcoinnow-founder]

sihTrg.satisfier.money.Offline

_CREATED: {2012-05-29}

name::
* McsEngl.sihTrg.satisfier.money.Offline@cptIt,
* McsEngl.conceptIt98.6,
* McsEngl.offline-money-transacting-system@cptIt98.6, {2012-05-29}

sihTrg.satisfier.money.Online

_CREATED: {2012-05-29}

name::
* McsEngl.sihTrg.satisfier.money.Online@cptIt,
* McsEngl.conceptIt98.5,
* McsEngl.online-money-transacting-system@cptIt98.5, {2012-05-29}

sihTrg.satisfier.money.POS-system

name::
* McsEngl.sihTrg.satisfier.money.POS-system@cptIt,
* McsEngl.conceptIt98.11,
* McsEngl.POS@cptIt,
* McsEngl.Point-of-sale-system@cptIt,

_DESCRIPTION:
Point of sale terminals are computerized on-line terminals located in mass merchandisers' locations -such as grocery stores or shopping centers- which permit instantaneous credit account verification and exchange of funds between a retailer and a customer. Using the customer's verification number and credit/debit cards, funds are automatically transferred from the customer's to the retailer' account.
[Austin-et-all, 1989, 277#cptResource435]

Impediment

POS terminal systems have not had widespread acceptance by either customers or retail merchants. CUSTOMERS dislike these debit cards because of their loss of "float" (ie, using a credit card, they can defer payment on their purchase, interest free, for a month or more; using a POS, th electronic cash transfer to the retiler is instantneous). RETAILERS are reluctant to use them because of physical space limitations.
[Austin-et-all, 1989, 277#cptResource435]

sihTrg.satisfier.money.REAL-TIME-GROSS-SETTLEMENT

_CREATED: {2015-08-12}

name::
* McsEngl.sihTrg.satisfier.money.REAL-TIME-GROSS-SETTLEMENT@cptIt,
* McsEngl.conceptIt51.9,
* McsEngl.Real-time-gross-settlement-system@cptIt,
* McsEngl.RTGS@cptIt,

* McsEngl.Automated-High-value-Transfer-Network@cptIt,
* McsEngl.Automated-Settlement-System-for-Inter-Participant-Payments@cptIt,
* McsEngl.Banking-Electronic-Speed-Payment-System@cptIt,
* McsEngl.Central-Bank-Real-Time-Gross-Settlement-System@cptIt,
* McsEngl.Clearing-House-Automated-Payment-System@cptIt,
* McsEngl.Clearing-House-Automated-Transfer-System@cptIt,
* McsEngl.Electronic-Fund-Transfer@cptIt,
* McsEngl.Electronic-Transfer-and-Settlement-System@cptIt,
* McsEngl.Exchange-Settlement-Account-System@cptIt,
* McsEngl.Express-Real-Time-Interbank-Gross-Settlement-System@cptIt,
* McsEngl.Financial-Network-System@cptIt,
* McsEngl.Financial-Wire-Network@cptIt,
* McsEngl.Inter-bank-Payment-and-Settlement-System@cptIt,
* McsEngl.Interbank-Funds-Transfer-System@cptIt,
* McsEngl.Interbank-Payment-System@cptIt,
* McsEngl.interbank-settlement-system@cptIt,
* McsEngl.MAS-Electronic-Payment-System@cptIt,
* McsEngl.Multiple-Option-Settlement@cptIt,
* McsEngl.National-Advanced-Payment-System@cptIt,
* McsEngl.Real-Time-Electronic-Transfer-of-Funds-and-Securities@cptIt,
* McsEngl.Real-Time-Inter-Bank-Settlement-Mechanism@cptIt,
* McsEngl.Reserve-Bank-Information-and-Transfer-System@cptIt,
* McsEngl.System-of-Electronic-Payments@cptIt,
* McsEngl.Super-Online-Banking-System@cptIt,

_DESCRIPTION:
Real-time gross settlement systems (RTGS) are specialist funds transfer systems where transfer of money or securities[1] takes place from one bank to another on a "real time" and on "gross" basis. Settlement in "real time" means payment transaction is not subjected to any waiting period. The transactions are settled as soon as they are processed. "Gross settlement" means the transaction is settled on one to one basis without bundling or netting with any other transaction. Once processed, payments are final and irrevocable.

RTGS systems are typically used for high-value transactions that require immediate clearing. In some countries the RTGS systems may be the only way to get same day cleared funds and so may be used when payments need to be settled urgently. However, most regular payments would not use a RTGS system, but instead would use a national payment system or network that allows participants to batch and net payments.

RTGS systems are usually operated by a country's central bank as it is seen as a critical infrastructure for a country's economy. Economists view that an efficient national payment system reduces the cost of exchanging goods and services, and is indispensable to the functioning of the interbank, money, and capital markets. A weak payment system may severely drag on the stability and developmental capacity of a national economy; its failures can result in inefficient use of financial resources, inequitable risk-sharing among agents, actual losses for participants, and loss of confidence in the financial system and in the very use of money.[2]
[https://en.wikipedia.org/wiki/Real-time_gross_settlement]

SPECIFIC

_SPECIFIC:
Existing systems

Below is a listing of countries and their RTGS systems:

Albania - AECH, RTGS
Angola - SPTR, (Sistema de pagamentos em tempo real)
Azerbaijan - AZIPS (Azerbaijan Interbank Payment System)
Australia - RITS (Reserve Bank Information and Transfer System)
Barbados - Central Bank Real Time Gross Settlement System (CBRTGS)
Bosnia and Herzegovina - RTGS
Bulgaria - RINGS (Real-time INterbank Gross-settlement System)
Brazil - STR (Sistema de Transferencia de Reservas)
Canada - LVTS (Large Value Transfer System) (This is actually an RTGS Equivalent system. Final settlement happens in the evening.)
China - China National Advanced Payment System ("CNAPS") (also called "Super Online Banking System)[6]
Chile - LBTR/CAS (Spanish: Liquidacion Bruta en Tiempo Real)
Croatia - HSVP (Croatian: Hrvatski sustav velikih placanja)[7]
Czech Republic - CERTIS (Czech Express Real Time Interbank Gross Settlement System)
Egypt - RTGS
Eurozone - TARGET2
Fiji - FIJICLEAR
Hong Kong - Clearing House Automated Transfer System (CHATS)
Hungary - VIBER (Hungarian: Valos Ideju Brutto Elszamolasi Rendszer)
India - RTGS,[8] NEFT, IMPS[9]
Indonesia - Sistem Bank Indonesia Real Time Gross Settlement (BI-RTGS)
Iran - SATNA (?????? ????? ?????? ???, Real-Time Gross Settlement System)
Japan - BOJ-NET (Bank of Japan Financial Network System)[10]
Kenya - Kenya Electronic Payment and Settlement System (KEPSS)[1]
Korea - BOK-WIRE+ (The Bank of Korea Financial Wire Network,?????)
Kuwait - KASSIP (Kuwait's Automated Settlement System for Inter-Participant Payments)
Macedonia - MIPS (Macedonian Interbank Payment System)[11]
Malawi - MITASS (Malawi Interbank Settlement System)
Malaysia - RENTAS (Real Time Electronic Transfer of Funds and Securities)
Mexico - SPEI (Spanish: Sistema de Pagos Electronicos Interbancarios)[12]
Morocco - SRBM (Systeme de reglement brut du Maroc) [2]
Namibia - NISS (Namibia Inter-bank Settlement System) [3]
New Zealand - ESAS (Exchange Settlement Account System)
Nigeria - CIFTS (CBN Inter-Bank Funds Transfer System)
Pakistan - Pakistan Real Time Inter-Bank Settlement Mechanism - PRISM (State Bank of Pakistan)[4]
Peru - LBTR (Spanish: Liquidacion Bruta en Tiempo Real)
Philippines - PhilPaSS [5]
Poland - SORBNET [6] and SORBNET2 [7]
Russia - BESP system (Banking Electronic Speed Payment System)[8]
Romania - ReGIS system [9]
Saudi Arabia - (Saudi Arabian Riyal Interbank Express) SARIE [10]
Singapore - MEPS+ (MAS Electronic Payment System Plus)
South Africa - SAMOS (The South African Multiple Option Settlement) [11]
Sri Lanka - LankaSettle (RTGS/SSSS)
Sweden - RIX (Swedish: Riksbankens system for overforing av kontoforda pengar) [12]
Switzerland - SIC (Swiss Interbank Clearing) [13]
Taiwan - CIFS (CBC Interbank Funds Transfer System) [14]
Tanzania - TIS (Tanzania interbank settlement system)
Thailand - BAHTNET (Bank of Thailand Automated High value Transfer Network)
Turkey - EFT (Electronic Fund Transfer)
Ukraine - SEP (System of Electronic Payments of the National Bank of Ukraine) [15]
United Kingdom - CHAPS (Clearing House Automated Payment System)
United States - Fedwire
Zambia - ZIPSS-Zambian Inter-bank Payment and Settlement System
Zimbabwe - ZETSS-Zimbabwe Electronic Transfer and Settlement System
[https://en.wikipedia.org/wiki/Real-time_gross_settlement]

sihMny.Target2 {2007}

_CREATED: {2012-06-14}

name::
* McsEngl.sihMny.Target2 {2007}@cptIt,
* McsEngl.conceptIt98.2,
* McsEngl.TARGET2@cptIt98.2, {2012-06-14}
* McsEngl.Target2-clearing-system@cptIt,

_GENERIC:
* RTGS##

_DESCRIPTION:
TARGET2 is an interbank payment system for the real-time processing of cross-border transfers throughout the European Union. TARGET (Trans-European Automated Real-time Gross Settlement Express Transfer System) was replaced in November 2007 by TARGET2.
[http://en.wikipedia.org/wiki/TARGET2]

sihTrg.satisfier.money.RIPPLE (link#ql:ripple_distributed_network#)

name::
* McsEngl.sihTrg.satisfier.money.RIPPLE (link#ql:ripple_distributed_network#)@cptIt,

sihTrg.satisfier.money.SWIFT

name::
* McsEngl.sihTrg.satisfier.money.SWIFT@cptIt,
* McsEngl.swift@cptIt98,
* McsEngl.Society-for-Worldwide-Interbank-Financial-Telecommunication@cptIt,
====== lagoFrench:
Société Coopérative à Responsabilité Limitée (limited co-operative society)

_DESCRIPTION:
SWIFT is the Society for Worldwide Interbank Financial Telecommunication, a member-owned cooperative through which the financial world conducts its business operations with speed, certainty and confidence. More than 10,800 banking organisations, securities institutions and corporate customers in over 200 countries trust us every day to exchange millions of standardised financial messages.
[http://www.swift.com/about_swift/index]
Handles external INTERNATIONAL transactions and clearances throughout the world, and acts as a superinternational transfer system.
[Austin-et-all, 1989, 279#cptResource435]

sihTrg.satisfier.money.ΔΙΑΣ#cptIt321: attSpe#

name::
* McsEngl.sihTrg.satisfier.money.ΔΙΑΣ@cptIt,

sihTrg.satisfier.money.ΤΑΧΥΜΕΤΑΦΟΡΑ-ΧΡΗΜΑΤΩΝ

name::
* McsEngl.sihTrg.satisfier.money.ΤΑΧΥΜΕΤΑΦΟΡΑ-ΧΡΗΜΑΤΩΝ@cptIt,

WESTERN UNION FINANCIAL SERVICES INC.
* ΕΧΕΙ ΑΝΤΙΠΡΟΣΩΠΟ ΣΤΗ ΕΛΛΑΔΑ ΤΗΝ "ΧΡΙΣΤΟΦΟΡΟΣ Κ. ΒΑΡΒΙΑΣ ΚΑΙ ΣΥΝΕΡΓΑΤΕΣ ΑΕ" (ΙΔΡΥΤΗΣ ΤΗΣ diners club).
* ΤΩΡΑ ΛΕΙΤΟΥΡΓΕΙ ΤΟ in-bound (ΑΠΟ ΤΟ ΕΞΩΤΕΡΙΚΟ ΣΤΗΝ ΕΛΛΑΔΑ). ΑΝΑΜΕΝΕΤΑΙ Η ΕΦΑΡΜΟΓΗ ΤΟΥ out-bound (ΑΠΟ ΕΛΛΑΔΑ ΣΤΟ ΕΞΩΤΕΡΙΚΟ) ΚΑΙ ΤΟ intra-bound.
* Ο ΑΠΟΣΤΟΛΕΑΣ ΧΡΕΩΝΕΤΑΙ ΓΙΑ ΤΗΝ ΑΠΟΣΤΟΛΗ. ΟΙ ΣΥΜΒΑΛΛΟΜΕΝΟΙ ΠΡΕΠΕΙ ΝΑ ΠΑΝΕ ΣΕ ΚΑΠΟΙΟ ΑΝΤΙΠΡΟΣΩΠΟ.

sihTrg.satisfier.money.ΠΑΝΕΥΡΩΠΑΙΚΟ-ΣΥΣΤΗΜΑ

name::
* McsEngl.sihTrg.satisfier.money.ΠΑΝΕΥΡΩΠΑΙΚΟ-ΣΥΣΤΗΜΑ@cptIt,

edc/maestro. ΣΥΜΦΩΝΑ ΜΕ ΤΟ ΟΠΟΙΟ ΟΙ ΚΑΤΟΧΟΙ ΚΑΡΤΩΝ, ΠΟΥ ΕΚΔΙΔΟΝΤΑΙ ΑΠΟ ΣΥΓΚΕΚΡΙΜΕΝΕΣ ΤΡΑΠΕΖΕΣ, ΜΠΟΡΟΥΝ ΝΑ ΚΑΝΟΥΝ ΤΙΣ ΑΓΟΡΕΣ ΤΟΥΣ ΣΕ ΞΕΝΕΣ ΧΩΡΕΣ ΚΑΙ ΝΑ ΧΡΕΩΝΕΤΑΙ Ο ΛΟΓΑΡΙΑΣΜΟΣ ΤΟΥΣ ΑΠΕΥΘΕΙΑΣ ΣΤΟΝ ΤΡΑΠΕΖΙΚΟ ΤΟΥΣ ΛΟΓΑΡΙΑΣΜΟ.
-ΣΤΗ ΕΛΛΑΔΑ Η ΕΘΝΙΚΗ ΤΡΑΠΕΖΑ ΘΑ ΕΚΔΟΣΕΙ ΤΕΤΟΙΑ ΚΑΡΤΑ.
-ΘΑ ΑΡΧΙΣΕΙ ΝΑ ΕΦΑΡΜΟΖΕΤΑΙ ΑΠΟ ΤΟΝ ΙΟΥΝΙΟ 1993.
[ΒΗΜΑ 23 ΜΑΙΟ 1993, Ε9]

sihTrg.SOCIAL-TRADING

_CREATED: {2012-05-31}

name::
* McsEngl.sihTrg.SOCIAL-TRADING@cptIt,
* McsEngl.conceptIt51.4,
* McsEngl.social-trading-network@cptIt51.4, {2012-05-31}

_DESCRIPTION:
Social trading is the process through which online financial investors rely mostly (or solely) on user generated financial content gathered from various Web 2.0 applications as the major information source for making financial trading decisions.[1]. Social trading introduces a new way of analyzing financial data. Until recently investors and traders were relying on fundamental and technical analysis to form their investment decisions. Now they can weave into their investment decision process social indicators that are fueled by a transparent real-time trading data feed of all the users in the social trading network.This is now being introduced as social financial analysis. Social trading has also been associated with a variety of online social trading networks[2] These social trading networks can be considered a subcategory of online social networks.
[http://en.wikipedia.org/wiki/Social_trading]

Social-trading

_CREATED: {2012-05-31}

name::
* McsEngl.Social-trading@cptIt,
* McsEngl.conceptIt51.5,
* McsEngl.online-social-trading@cptIt51.5, {2012-05-31}
* McsEngl.social-trading@cptIt51.5, {2012-05-31}
* McsEngl.trading.social@cptIt51.5, {2012-05-31}

Cooperative Trading - Social trading offers traders the opportunity to work together in trading teams which can trade the markets collaboratively, whether by pooling funds, dividing research or through sharing information.
[http://en.wikipedia.org/wiki/Social_trading]

SPECIFIC

_SPECIFIC:
* financial
===
Among the first such networks were eToro, Zecco.com and Currensee, soon followed by FXStat or ZuluTrade.[5]
[http://en.wikipedia.org/wiki/Social_trading]

sihTrg.EVOLUTING#cptCore546.171#

name::
* McsEngl.sihTrg.EVOLUTING@cptIt,

{time.2011}:
=== 2011-05-13 dbFX closed:
dbFX was Deutsche Bank’s online margin forex trading platform for individuals which was shut down on 13 May 2011. The client list was bought by Gain Capital and existing clients were directed to Gain's retail service forex.com upon closure of the business.
[http://en.wikipedia.org/wiki/DBFX]

{time.decade2010early}:
=== RETAIL FOREX SECOND WAVE:
The second wave was in the early 2000s: several software companies entered the retail foreign exchange trading market by launching their own versions of trading platforms, like Apbg Group, Ctn Systems and MetaTrader 4 from MetaQuotes Software which allowed the users to create their own trading indicators and automatic strategies. Typically these versions were cumbersome for both front-end users (retail traders) and back-end users (retail brokers) due to the misunderstanding of the developers about the foreign exchange market and also because of the insufficient programming tools/languages at the time. Simultaneously most of the retail brokers kept using and developing their own systems as they waited for better platforms which were yet to be developed.
[http://en.wikipedia.org/wiki/Forex_platform]

{time.2007}:
=== BANK RETAIL FOREX:
In 2007 it had been speculated that volume from retail foreign exchange trading represents 5 percent of the whole foreign exchange market which amounts to $50–100 billion[1][2] in daily trading turnover.
[http://en.wikipedia.org/wiki/Forex_platform]

{time.2006}:
=== BANK RETAIL FOREX:
In 2006 a few banks have started offering foreign exchange trading services to individual traders and money managers. DBFX and CitiFX Pro are some of the banks that were offering this service.[citation needed] However Deutsche Bank shut down its DBFX service in 2011.
[http://en.wikipedia.org/wiki/Forex_platform]

{time.1997}:
=== 1997jul30:
PALO ALTO, Calif. (July 30, 1997 02:04 a.m. EDT) - Yahoo! Inc., whose popular Web site helps computer users navigate the sprawling Internet, Tuesday announced a global electronic commerce alliance with the Visa International credit card organization.
[internet]
=== 1997jul:
Ο Μπιλ Κλίντον ανακήρυξε πρόσφατα το Δίκτυο "ζώνη ελεύθερων συναλλαγών". Το μήνυμα είναι αποτέλεσμα της διετούς έρευνας επιτροπής υπό την προεδρία του Ιρα Μάγκαζίνερ. Οι λόγοι είναι, όπως πάντα, οικονομικοί.
[ΒΗΜΑ 1997ιουλ13, Α27]

{time.1996}:
=== RETAIL FOREX:
Since 1996, when retail foreign exchange trading was first introduced, several brokers who lacked the sufficient tools developed their own trading platforms tailored specifically to their needs.
[http://en.wikipedia.org/wiki/Forex_platform]
=== 1996nov: Mastercard sees rise in electronic trade:
Mastercard International Inc. executives announced the company will seek to exploit expected growth in electronic commerce and computerized payments during the next few years. Two Mastercard executives said they see 1997 as the year in which electronic commerce via the Internet takes off.
[http://www.cnn.com/DIGEST/, 11 Nov. 1996]

{time.1969}:
=== Instinet:
Instinet was founded by Jerome M. Pustilnik and Herbert R. Behrens and was incorporated in 1967 as Institutional Networks Corp. The founders aimed to compete with the New York Stock Exchange by means of computer links between major institutions, such as banks, mutual funds, and insurance companies, with no delays or intervening specialists.[1] Through the Instinet system, which went live in December 1969, the company provided computer services and a communications network for the automated buying and selling of equity securities on an anonymous, confidential basis.
[http://en.wikipedia.org/wiki/Instinet]

concept

{time.2015-08-21}:
=== MERGE:
Trading#51# with Transacting#1002#

meta-info

page-wholepath: https://synagonism.net / dirFolioViews / FvMcsIt / FvMcsIt1