background preloader

Abbreviations & their meaning

Facebook Twitter

Cache

Abbreviations.com. Serveur. Serveur. Protocole SIP - Tout savoir sur le protocole SIP. Difference between Speed Class, UHS Speed Class, and Speed Ratings (performance) for SD/SDHC/SDXC cards. Difference between Speed Class, UHS Speed Class, and Speed Ratings (performance) for SD/SDHC/SDXC cards What is the difference between Speed Class and Speed Ratings for SDTM/SDHCTM cards? The speed rating measures maximum transfer speed for reading and writing images to and from a memory card, expressed as megabytes per second. However, video doesn't need as big a data pipe because the video format is a smaller "fixed stream" that uses only a portion of the data pipe.

Unlike card write speeds that measure maximum performance, class ratings measure the minimum sustained speed required for recording an even rate of video onto the card. The class rating number corresponds to the transfer rate measured in megabytes per second. What does this difference mean for me? Still digital images shot on high-megapixel cameras should utilize fast data throughput (a large data pipe), higher speed cards for improved performance. Speed Class is a minimum speed based on a worst case scenario test. NetPublic - Accompagner l'accès de tous à l'Internet.

About Bot

Bitzi. Bitzi was a website where volunteers shared reports about any kind of digital file, with identifying metadata, commentary, and other ratings. Information contributed and rated by volunteers was compiled into the Bitpedia data set and reference work, described by Bitzi as a "digital media encyclopedia". The Bitpedia was published through the Bitzi website and web services under an open content license (Creative Commons Attribution - Share Alike 2.0). Founded by Gordon Mohr with Mike Linksvayer[1] the Bitzi service launched in 2001 and its standards and services have been adopted by a number of popular peer-to-peer file sharing systems.

Bitzi was sponsored by a metadata publishing company of the same name based in San Francisco. Technology[edit] At Bitzi, files are identified by applying a strong hash function to their contents, which gives a distinct "fingerprint" for each file. Data about specific files can also be programmatically retrieved via a REST-style XML web service. Shutdown[edit] Beta? Cache? Crack the code for the code.

Slideshow Beta? Cache? Crack the code for the code This handy acronym has two definitions in the world of computer jargon. ISP most commonly stands for Internet Service Provider, referring to a company that provides other companies or individuals with access to or a presence on the internet. [bey-tuh or, esp. In addition to being the second letter of the Greek alphabet, this term has many senses, from "the second brightest star in a constellation" to "a kind of VCR tape. " [al-guh-rith-uhm] This eponym is named for the ancient mathematician Muhammad ibn Musa al-Khwarizmi, founder of algebra.

[fish] Don't be fooled; this phish doesn't involve tuna, nets, or an American jam band. [kash] So you're typing one of your favorite web address into Google: "dictionary.com," but after the first few letters the search bar has finished the address for you! [troh-juhn] [jee-oh-tag] If you've ever gone back through a photo album and found yourself asking "where in the world was that picture taken? " BitTorrent. Programmer Bram Cohen, a former University at Buffalo graduate student in Computer Science,[4] designed the protocol in April 2001 and released the first available version on July 2, 2001,[5] and the final version in 2008.[6] BitTorrent clients are available for a variety of computing platforms and operating systems including an official client released by Bittorrent, Inc.

As of 2009, BitTorrent reportedly had about the same number of active users online as viewers of YouTube and Facebook combined.[7][8] As of January 2012[update], BitTorrent is utilized by 150 million active users (according to BitTorrent, Inc.). Based on this figure, the total number of monthly BitTorrent users can be estimated at more than a quarter of a billion.[9] Description[edit] The middle computer is acting as a seed to provide a file to the other computers which act as peers. The file being distributed is divided into segments called pieces. When a peer completely downloads a file, it becomes an additional seed. Digital Living Network Alliance. The Digital Living Network Alliance (DLNA) is a nonprofit collaborative trade organization established by Sony in June 2003, that is responsible for defining interoperability guidelines to enable sharing of digital media between multimedia devices.[3] These guidelines are built upon existing public standards, but the guidelines themselves are private (available for a fee).

These guidelines specify a set of restricted ways of using the standards to achieve interoperability and include almost no free audio formats and only the most common (free or otherwise) video formats, meaning that DLNA servers generally have to support transcoding in order to produce a useful service.[4] DLNA uses Universal Plug and Play (UPnP) for media management, discovery and control.[5] UPnP defines the type of device that DLNA supports ("server", "renderer", "controller") and the mechanisms for accessing media over a network. History[edit] Specification[edit] Home Network Devices[edit] Member companies[edit]

Detexify LaTeX handwritten symbol recognition. Want a Mac app? Lucky you. The Mac app is finally stable enough. See how it works on Vimeo. Download the latest version here. Restriction: In addition to the LaTeX command the unlicensed version will copy a reminder to purchase a license to the clipboard when you select a symbol.

You can purchase a license here: Buy Detexify for Mac If you need help contact mail@danielkirs.ch. What is this? Anyone who works with LaTeX knows how time-consuming it can be to find a symbol in symbols-a4.pdf that you just can't memorize. How do I use it? Just draw the symbol you are looking for into the square area above and look what happens! My symbol isn't found! The symbol may not be trained enough or it is not yet in the list of supported symbols. I like this. You could spare some time training Detexify. The backend server is running on Digital Ocean (referral link) so you can also reduce my hosting costs by using that referral link. Why should I donate? Hosting of detexify costs some money. No. Yes. eMule. eMule is a free peer-to-peer file sharing application for Microsoft Windows. Started in May 2002 as an alternative to eDonkey2000, eMule now connects to both the eDonkey network and the Kad network. The distinguishing features of eMule are the direct exchange of sources between client nodes, fast recovery of corrupted downloads, and the use of a credit system to reward frequent uploaders.

Furthermore, eMule transmits data in zlib-compressed form to save bandwidth. eMule is coded in C++ using the Microsoft Foundation Classes. As of August 2013, it is the second most frequently downloaded project on SourceForge, with over 665 million downloads, only behind VLC media player.[3] History[edit] The eMule project was started on May 13, 2002 by Hendrik Breitkreuz (also known as Merkur) who was dissatisfied with the original eDonkey2000 client. eMule was first released as a binary on August 4, 2002 at version 0.05a.

Nodes in Kad network In new versions, a "Bad source list" was added. Low ID[edit] Géolocalisation. Un article de Wikipédia, l'encyclopédie libre. Schéma de principe de la géolocalisation par GPS La géolocalisation ou géoréférencement est un procédé permettant de positionner un objet (une personne, etc) sur un plan ou une carte à l'aide de ses coordonnées géographiques. Cette opération est réalisée à l'aide d'un terminal capable d'être localisé (grâce à un système de positionnement par satellites (et un récepteur GPS par exemple) ou à d'autres techniques) et de publier (en temps réel ou de façon différée) ses coordonnées géographiques (latitude/longitude). Les positions enregistrées peuvent être stockées au sein du terminal et être extraites postérieurement, ou être transmises en temps réel vers une plateforme logicielle de géolocalisation.

La transmission temps réel nécessite un terminal équipé d'un moyen de télécommunication de type GSM, GPRS, UMTS, radio ou satellite lui permettant d'envoyer les positions à des intervalles réguliers. Plusieurs techniques existent : HDMI. HDMI (High-Definition Multimedia Interface) is a proprietary audio/video interface for transferring uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.[1] HDMI is a digital replacement for analog video standards.

HDMI implements the EIA/CEA-861 standards, which define video formats and waveforms, transport of compressed, uncompressed, and LPCM audio, auxiliary data, and implementations of the VESA EDID.[2][3] CEA-861 signals carried by HDMI are electrically compatible with the CEA-861 signals used by the digital visual interface (DVI). Several versions of HDMI have been developed and deployed since initial release of the technology but all use the same cable and connector. History[edit] Specifications[edit] Audio/video[edit] Uncompressed video[edit] Communication channel protocols[edit] DDC[edit] TMDS[edit] Internet protocol suite. The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks.

It is commonly known as TCP/IP, because its most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP), were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense.

TCP/IP provides end-to-end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. The TCP/IP model and related protocol models are maintained by the Internet Engineering Task Force (IETF). History[edit] Early research[edit] Diagram of the first internetworked connection Specification[edit] Adoption[edit] Key architectural principles[edit] Abstraction layers[edit] Link layer[edit] Localhost. In computer networking, localhost means this computer.

It is a hostname that the computer's software and users may employ to access the computer's own network services via its loopback network interface. Using the loopback interface bypasses local network interface hardware. The local loopback mechanism is useful for testing software during development independent of any networking configurations. If a computer has been configured to provide a website, directing its web browser to may display its home page. The name is also a reserved top-level domain name (cf. .localhost), set aside to avoid confusion with the narrower definition as a hostname.[1] The IETF standards restrict domain name registrars to assign the name in their normal registration procedures, such as for second-level domains, e.g., localhost.com.

Name resolution[edit] IPv4 network standards reserve the entire 127.0.0.0/8 address block for loopback purposes. 127.0.0.1 localhost ::1 localhost References[edit] Lulz. "Lulz es una derivación de LOLS, que, a su vez, es derivacion de LOL, el cual significa Laugh Out Loud. El Lulz se hizo popular por los LOLcats, quienes se hicieron populares por su mala, pero chistosa ortografía de la lengua inglesa. " El término Lulz es una derivación de LOL (Laugh out loud). Según un artículo del New York Times sobre los ataques troll o bromas en internet, el término significa "El orgullo de haber desequilibrado emocionalmente a la víctima".[1] El uso del término se puede ver cuando un grupo de atacantes o bromistas dicen que hacen algo "for the lulz", que más o menos sería que el objetivo del ataque es el disfrute de los desequilibrios que se causen a la víctima o las víctimas.

Ejemplos de bromas y acciones para este propósito Tras muchos insultos, los constantes vídeos de Jessy contra los bromistas hicieron que consiguieran los datos personales de la niña, como su correo electrónico, Twitter, teléfono y la dirección de su casa. Referencias[editar] Relacionados[editar] Napster. Later systems successfully followed and elaborated on Napster's file-copying methods, including Gnutella, Freenet, Bit Torrent and many others. Some systems, like LimeWire, Grokster, Madster and the original eDonkey network, were shut down or altered under similar circumstances. Origin[edit] Napster was co-founded by Shawn Fanning, John Fanning, and Sean Parker.[2][3][4][5][6][7][8][9] Initially, Napster was envisioned as an independent peer-to-peer file sharing service.

The service operated between June 1999 and July 2001.[10] Its technology allowed people to easily share their MP3 files with other participants.[11] Although the original service was shut down by court order, the Napster brand survived after the company's assets were liquidated and purchased by other companies through bankruptcy proceedings.[12] History[edit] These reasons aside, many other users simply enjoyed trading and downloading music for free. Macintosh version[edit] Legal challenges[edit] Promotional power[edit] OpenVPN. OpenVPN has been ported and embedded to several systems. For example, DD-WRT has the OpenVPN server function.

SoftEther VPN, a multi-protocol VPN server, has an implementation of OpenVPN protocol. Architecture[edit] Encryption[edit] OpenVPN uses the OpenSSL library to provide encryption of both the data and control channels. It lets OpenSSL do all the encryption and authentication work, allowing OpenVPN to use all the ciphers available in the OpenSSL package.

Authentication[edit] OpenVPN has several ways to authenticate peers with each other. Networking[edit] OpenVPN's use of common network protocols (TCP and UDP) makes it a desirable alternative to IPsec in situations where an ISP may block specific VPN protocols in order to force users to subscribe to a higher-priced, "business grade," service tier. Security[edit] OpenVPN offers several internal security features. Extensibility[edit] Platforms[edit] Firmware implementations[edit] Software implementations[edit] Community[edit] See also[edit] Open-source software. Open-source software (OSS) is computer software with its source code made available and licensed with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.[1] Open-source software is very often developed in a public, collaborative manner.

Open-source software is the most prominent example of open-source development and often compared to (technically defined) user-generated content or (legally defined) open-content movements.[2] A report by the Standish Group (from 2008) states that adoption of open-source software models has resulted in savings of about $60 billion per year to consumers.[3][4] Definitions[edit] The Open Source Initiative's (OSI) definition is recognized[who?] As the standard or de facto definition. Eric S. Raymond and Bruce Perens formed the organization in February 1998. OSI uses The Open Source Definition to determine whether it considers a software license open source. Early releases. OpenSSL. Peer-to-peer file sharing. Post-WIMP. PolarSSL. Radio-frequency identification. SAN non è NAS letto al contrario. Server-side language. SHA-2: le risposte alle sue domande 

Trol (Internet) URL = Uniform resource locator. URN. Uniform resource name. Uniform Resource Name. Virtual private network. WebSocket. WIMP (computing)