Web Browsers: Untangling the World Wide Web

Total Page:16

File Type:pdf, Size:1020Kb

Web Browsers: Untangling the World Wide Web ------------------------------------------------------------------------- WEB BROWSERS: UNTANGLING THE WORLD WIDE WEB Joan Latta Konecky Carla Rosenquist-Bohler University of Nebraska-Lincoln Libraries Abstract Not only are Internet resources expanding exponentially, but they are becoming more sophisticated, incorporating a variety of multimedia and hypertextcomponen ts. Internet documents on the World Wide We b may contain elaborately formatted text, color graphics, audio, and video as well as dynamic connections to other Internet resources via hypertext links. In addition to providing user-friendly access to hypermedia resources, most We b browsers (client software) provide a rich graphical environment for authoring and displaying electronic documents locally. 1bis article describes the World Wide We b and a sampling of the available Web browsers. It then discusses a test project developed at the University of Nebraska-Lincoln Libraries designed to explore the potential, demands, and pitfalls of We b access to the Internet, as well as to investigate hypermedia document creation in an academic library environment. The experiences with thepro ject qonfirmed the importance of the World Wide We b and We b browsers to this environment, so much so that providing access to these Internetresources must be seen as mandatoryto any academic or upper level educational library providing electronic information access. Introduction TheWorld Wide Web In the rapidly evolving world of Internet, Mosaic gained World Wi de We b (aka WWW, the We b, or W3) is a unique enormous recognition in the popular media during 1993 as one Internetresource which uses hypertext to link documents on the of the brightest stars in Cyberspace. Due to its vivid appearance, network. It was developed in 1989 at CERN, the European enhanced capabilities and searchfriend liness, it made the World Laboratory for Particle Physics in Switzerland, in order to Wide We b's hypermediacapabilities readily accessible, quickly distribute the literature of high energy physics electronically to eclipsing the well known but simple Gopher software . In fact , researchers from many countries.• "By creating computer media coverage of Mosaic led many to confuse the Mosaic linkage from the citations of an article to the corresponding software with the World Wide We b hypertext system that it source documents, users would be able to navigate through a searches. Mosaic is but one of many World Wide We b browsers body of related literature online simply by following the developed in rapid succession to take advantage of the 'electronic fo otnotes', which would lead readersto the full text multimedia and hypertext nature of the We b. 1bis article will of the materials cited in those notes" 2 describe both the World Wide We b and the client software As the World Wide We b evolved, the hypertext links designed to search it. It will also describe the We b Browser expanded beyond just footnotes in documents. Currently, Demonstration Project at the University of Nebraska-Lincoln hypertextlinks can appear anywherewithin a document, allowing Libraries, which used the Mosaic client software to explore the the user to make nonlinear jumps to related information capabilities and potential uses of World Wide We b browsing anywhere, simply by "clicking" on a "link" -- either some software in an academic library setting. highlighted text, a picture or an icon. The related information Educetion Ubreri" • Vol 19, No. 1 13 - may be located in the same document or may be in a source on and the user's equipment. The Wo rld Wide We b isa multi-protocol a computer in a different country, To the user, the transition is system that supports most of the earlier Internet protocols; transparent. Thus, the effortless hypertext links of the World therefore, searchers can use a We b browser to access and retrieve Wide We b tum widely dispersed Internet sources into one vast Internet resources via Gopher, FTP, WA IS, USENET, Archie, seamless resource.3 Te lnet and bthers, without having to learnthe intricacies of these In developing the World Wide We b, CERN employed three other protocols.s There are a growing number of World Wide universal standards: HyperText Markup Language (HTML), We b browser packages, but among the more popular browsers Uniform Resource Locator (URL), and HyperText Transfer are Lynx, Cello, SlipKnot, Mosaic and Netscape. These will be Protocol (HTTP). HTML was based upon the Standard discussed briefly later. Generalized Markup Language (SGML) and adds formatting Access to the Wo rld Wide We b became an overnight tags to simple ASCIT files. These formatting tags enable the sensation when the graphical Wm dows-based We b browsers were document author to perform three functions: 1) to "display a developed, beginning with NCSA Mosaic, followed closely by variety offonts, images, and highlighting options", 2) to indicate Cornell's Cello, and later AirMosaic, Netscape, and a host of structural elements in the document, such as headers, lists, and other competitors. These powerful graphical Web browsers make paragrapm, and3) to provide hypertext linksto otherdocuments using Internet resources as easy as point and click. on the Internet. 4 With graphical We b browsers, users can access not only The Uniform Resource Locator (URL) is a unique identifier simple ASCII text but the full multimedia resources of the for each Internet resource and serves as the "address" for Internet, including form atted text, full-screen color graphics, connecting to that resource. A URL has a standardized format audio recordings and video. These browsers use the WWW of: protocol:/lhostlpath/filename document "language," HTML,to display or print formatted text with headlines, subheadings, bold, italics, and different sizes and The firstpart of the URL,pro tocol, describes the type of Internet types of fonts. In most graphical browsers, the hypertext links resource, such as HTTP (WWW site or hypertext document), are displayed in one color while previously selected links are gopher, wais, telnet, ftp or file. The second part, host, is the remembered and displayed in another color. Internetaddress andport of the computer where the information Most We b browsers are designed with an open framework, is stored. Path refers to the directory or subdirectory on that using external viewer programs to handle the different types of computer and filename refers to the specific file. It is very textual and multimedia data. This open framework allows the important to include the : and I punctuation in a URL.5 � browser software to 1) be customized with different individual The underlying protocol used to transfer documents on the viewer programs, 2) easily evolve to handle new data types, and We b is HTTP. Unlike earlier Internetprotocols, HTTPpermits 3) be able to integrate improved viewers. The We b browser the transfer and retrieval of documents which have been software unifiesthese separate external programs, providing one form atted with HypertextMarkup Language (HTML)and which consistent and easy to use interface for accessing many different may contain graphic, audio or video elements.6 Computers that types of Internet resources.9 use HTTPto send or deliver HTML documents to users of the We b browsers also provide many other capabilities. To Internetare called "Web servers." Users browse the We b using improve the speed of access, many browsers store previously "Web client" software (suchas Cello, Ly nx, SlipKnot, Netscape retrieved documents in cache memory on the local computer for or Mosaic) on their local computers. rapid rebrowsing. Anextremely valu able function of all the We b The World Wide Web is a "client/server" system, composed browsers is the ability to develop personalized Internet resource of at least two separate computers, a "server" and a "client". A lists by saving theURLs to Bookmark or "hotlist" filesfor future "server" is the central information provider which stores and, reference. The URLs in the Bookmark lists are active hypertext upon request from a "client", provides either the specific links so that the user may jump directly from an entry in the information resources or the hypertext links which point to Bookmark file to the specifiedInternet resource . These lists may information sources at other sites. One ofthe advantages of a also be exported, loaded or appended fo r others to use. client/server system, such as the World Wide We b, is that the user may choose from a variety of client programs, tailored for different needs, preferences and computingplatform s.? Network Access Issues There are several issues which must be confronted when Accessing the Web: Web Browsers accessing the World Wide We b, including type of network connection, network traffic load and operating equipment The We b user interface (the way it looks, how it accesses requirements. First, there are several kinds of Internet the WWW site, and its ease of use) is determined by the We b connections from which to choose: dedicated or direct ethemet client or "browser" software. There are many different types of connection, SLIP or PPP connections and dial up "shell" (UNIX Web browsers, tailored to the needs, or limitations, of the user or terminal) connections. - 14 Education Libraries • Vo l 19, No. 1 Dedicated connectionshave their own IPaddr ess, use TCP/ A Sampling of Web Browsers IPlang uage, have unlimited access for multiple users, are very fast and expensive. SLIP (Serial Line Internet Protocol) or PPP We b browsers are under rapid development. Within eight (Point-to-Point Protocol)connections are available for individual months, Mosaic, a browser that was hailed as a "killer dial up users and linkdirectly to theInternet through the phone application" in the mainstream media and popular journals, has line. SLIP/PPP connections have complex installations which been replaced by other critically acclaimed browsers. As new require the users to configure an IP address, load TCP/IP Web browsers emerge, new or improved capabilities are software, and, ifthey are using Wm dows, load Trumpet Wm sock introduced in rapid fire, leapfrog fashion.
Recommended publications
  • The Origins of the Underline As Visual Representation of the Hyperlink on the Web: a Case Study in Skeuomorphism
    The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Romano, John J. 2016. The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism. Master's thesis, Harvard Extension School. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33797379 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism John J Romano A Thesis in the Field of Visual Arts for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2016 Abstract This thesis investigates the process by which the underline came to be used as the default signifier of hyperlinks on the World Wide Web. Created in 1990 by Tim Berners- Lee, the web quickly became the most used hypertext system in the world, and most browsers default to indicating hyperlinks with an underline. To answer the question of why the underline was chosen over competing demarcation techniques, the thesis applies the methods of history of technology and sociology of technology. Before the invention of the web, the underline–also known as the vinculum–was used in many contexts in writing systems; collecting entities together to form a whole and ascribing additional meaning to the content.
    [Show full text]
  • Reading E-Books in a Web Browser
    Read Library eBooks in your Web Browser Internet Explorer/Microsoft Edge/Google Chrome/Mozilla Firefox Read library eBooks without downloading any apps or software. You can read many eBooks in our collection by using OverDrive READ on your computer, tablet, or smartphone’s web browser. Browsing and Checking Out eBooks 1. In your web browser, go to www.cityofrichmond.net/library, and then scroll down to the Overdrive e-Books & Audiobooks icon. 2. The Suburban Library Cooperative OverDrive catalog will open. Click Sign In in the upper right hand corner of the screen. 3. Select Lois Wagner Memorial Library from the list and enter your complete library card number. Select Remember my login information on this device if you want this information saved for future use. 4. Browse for a book by selecting the menu options of Subjects or Collections at the top of the page. You can also click the magnifying glass to search by author or title. 5. If the book you have found is available for checkout, it will have a blue Available heading. 6. Click on the cover of the book-if it is available in the OverDrive READ format, it can be viewed in your browser. Click Borrow, and then click again on Go To Loans. 7. You will be taken to your Loan page, where you can select Read in Your Browser. Reading Your eBook 1. The first time you open a book in your browser, you may be given tips on how to navigate the book. 2. When you are finished reading, simply close your web browser.
    [Show full text]
  • Usenet Gopher
    Usenet Usenet is a worldwide distributed discussion system. It was developed from the general-purpose UUCP dial-up network architecture. Tom Truscott and Jim Ellis conceived the idea in !"#"$ and it was established in !"%&.'!( Users read and post messages (called articles or posts$ and collectively termed news* to one or more categories$ known as newsgroups. Usenet resembles a bulletin board system )++,* in many respects and is the precursor to Internet forums that are widely used today. Usenet can be superficially regarded as a hybrid between email and web forums. .iscussions are threaded$ as with web forums and ++,s$ though posts are stored on the server sequentially. Usenet is a collection of user-submitted notes or messages on various subjects that are posted to servers on a worldwide network. Each subject collection of posted notes is known as a newsgroup. There are thousands of newsgroups and it is possible for you to form a new one. 1ost newsgroups are hosted on Internet-connected servers$ but they can also be hosted from servers that are not part of the Internet. 2opher 3 system that pre-dates the 4orld 4ide 4eb for organizing and displaying -les on Internet servers. 3 Gopher server presents its contents as a hierarchically structured list of -les. 4ith the ascendance of the 4eb, many gopher databases were converted to 4eb sites which can be more easily accessed via 4eb search engines . The Gopher protocol is a TCP/IP application layer protocol designed for distributing, searching$ and retrieving documents over the Internet. The Gopher protocol was strongly oriented towards a menu-document design and presented an alternative to the 4orld 4ide 4eb in its early stages$ but ultimately 7TTP became the dominant protocol.
    [Show full text]
  • TRABAJO DE DIPLOMA Título: Diseño De La Página Web De Antenas
    FACULTAD DE INGENIERÍA ELÉCTRICA Departamento de Telecomunicaciones y Electrónica TRABAJO DE DIPLOMA Título: Diseño de la Página Web de Antenas Autor: Alaín Hidalgo Burgos Tutor: Dr. Roberto Jiménez Hernández Santa Clara 2006 “Año de la Revolución Energética en Cuba” Universidad Central “Marta Abreu” de Las Villas FACULTAD DE INGENIERÍA ELÉCTRICA Departamento de Telecomunicaciones y Electrónica TTRRAABBAAJJOO DDEE DDIIPPLLOOMMAA Diseño de la Página Web de Antenas Autor: Alaín Hidalgo Burgos e-mail: [email protected] Tutor: Dr. Roberto Jiménez Hernández Prof. Dpto. de Telecomunicaciones y electrónica Facultad de Ing. Eléctrica. UCLV. e-mail: [email protected] Santa Clara Curso 2005-2006 “Año de la Revolución Energética en Cuba” Hago constar que el presente trabajo de diploma fue realizado en la Universidad Central “Marta Abreu” de Las Villas como parte de la culminación de estudios de la especialidad de Ingeniería en Telecomunicaciones y Electrónica, autorizando a que el mismo sea utilizado por la Institución, para los fines que estime conveniente, tanto de forma parcial como total y que además no podrá ser presentado en eventos, ni publicados sin autorización de la Universidad. Firma del Autor Los abajo firmantes certificamos que el presente trabajo ha sido realizado según acuerdo de la dirección de nuestro centro y el mismo cumple con los requisitos que debe tener un trabajo de esta envergadura referido a la temática señalada. Firma del Tutor Firma del Jefe de Departamento donde se defiende el trabajo Firma del Responsable de Información Científico-Técnica PENSAMIENTO “El néctar de la victoria se bebe en la copa del sacrificio” DEDICATORIA Dedico este trabajo a mis padres, a mí hermana y a mi novia por ser las personas más hermosas que existen y a las cuales les debo todo.
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 7,960,121 B2 Wohlgemuth Et Al
    US007960121B2 (12) United States Patent (10) Patent No.: US 7,960,121 B2 Wohlgemuth et al. (45) Date of Patent: Jun. 14, 2011 (54) METHODS AND COMPOSITIONS FOR 5,079,352 A 1/1992 Gelfand et al. DAGNOSING AND MONITORING 5,091,310 A 2f1992 Innis 5, 120,525 A 6/1992 Goldenberg TRANSPLANT RELECTION 5,142,033. A 8, 1992 Innis 5,143,854 A 9/1992 Pirrung et al. (75) Inventors: Jay Wohlgemuth, Menlo Park, CA 5,210,015 A 5/1993 Gelfand et al. 5,212,071 A 5/1993 Fearon et al. (US); Kirk Fry, Palo Alto, CA (US); 5,215,882 A 6/1993 Bahl et al. Robert Woodward, Pleasanton, CA 5,219,727 A 6/1993 Wang et al. (US); Ngoc Ly, Albany, CA (US) 5,264,351 A 1 1/1993 Harley 5,278,043 A 1/1994 Bannwarth et al. (73) Assignee: XDX, Inc., Brisbane, CA (US) 5,310,652 A 5/1994 Gelfand et al. 5,314,809 A 5/1994 Erlich et al. 5,322,770 A 6/1994 Gelfand (*) Notice: Subject to any disclaimer, the term of this 5,340,720 A 8, 1994 Stetler patent is extended or adjusted under 35 5,346,994 A 9/1994 Chomczynski U.S.C. 154(b) by 0 days. 5,352,600 A 10, 1994 Gelfand et al. 5,374,553 A 12/1994 Gelfand et al. (21) Appl. No.: 12/823,090 5,385,824 A 1/1995 Hoet et al. 5,389,512 A 2/1995 Sninsky et al.
    [Show full text]
  • How and Why Do I Clear a Web Browser's Cache? When a Web
    How and Why Do I Clear a Web Browser’s Cache? When a web browser (e.g. Internet Explorer, Mozilla Firefox, Chrome, or Safari) is used to visit a website, the browser “caches” (stores) information regarding the site (e.g. items or pages viewed, listened to, or purchased), so the browser doesn’t have to retrieve the information from the original location every time the same page or file is accessed. This helps speed a web search. IMPORTANT TIP: It is important to “clear the cache” and, sometimes, a web browser’s “history” in order to avoid error messages when accessing sites or loading software. Now that many applications, such as Datatel UIWeb, WebAdvisor, and Live 25, used here at WSU are web-based, this has become an occasional issue. Web browsers usually are set to allow only a specific amount of storage for the cached “temporary Internet files”. If the specified limit is reached, error messages might prevent a user from accessing a desired site or web-based application. While visiting a web site, a “cookie” is created by the browser and stored on a user’s computer. Cookies store information about the user, such as login information for the site, selected shopping items, and provides the information to the website visited. Each visited web address is stored in the web browser’s “history”. The user can return to a site from the browser’s history list (log) or create a bookmark to easily return to a site. Browsers usually clear a computer’s cache and history, periodically, but it is good idea to clear cache, cookies, and history, manually when having a problem with a browser or when installing certain types of computer software if you don’t already do this procedure on a routine basis.
    [Show full text]
  • Name Synopsis Description Arguments Options
    W3M(1) General Commands Manual W3M(1) NAME w3m − a text based web browser and pager SYNOPSIS w3m [OPTION]... [ file | URL ]... DESCRIPTION w3m is a text based browser which can display local or remote web pages as well as other documents. It is able to process HTML tables and frames but it ignores JavaScript and Cascading Style Sheets. w3m can also serveasapager for text files named as arguments or passed on standard input, and as a general purpose directory browser. w3m organizes its content in buffers or tabs, allowing easy navigation between them. With the w3m-img extension installed, w3m can display inline graphics in web pages. And whenever w3m’s HTML rendering capabilities do not meet your needs, the target URL can be handed overtoagraphical browser with a single command. Forhelp with runtime options, press “H” while running w3m. ARGUMENTS When givenone or more command line arguments, w3m will handle targets according to content type. For web, w3m gets this information from HTTP headers; for relative orabsolute file system paths, it relies on filenames. With no argument, w3m expects data from standard input and assumes “text/plain” unless another MIME type is givenbythe user. If provided with no target and no fallback target (see for instance option −v below), w3m will exit with us- age information. OPTIONS Command line options are introduced with a single “−” character and may takeanargument. General options −B with no other target defined, use the bookmark page for startup −M monochrome display −no-mouse deactivate mouse support −num display each line’snumber −N distribute multiple command line arguments to tabs.
    [Show full text]
  • Maelstrom Web Browser Free Download
    maelstrom web browser free download 11 Interesting Web Browsers (That Aren’t Chrome) Whether it’s to peruse GitHub, send the odd tweetstorm or catch-up on the latest Netflix hit — Chrome’s the one . But when was the last time you actually considered any alternative? It’s close to three decades since the first browser arrived; chances are it’s been several years since you even looked beyond Chrome. There’s never been more choice and variety in what you use to build sites and surf the web (the 90s are back, right?) . So, here’s a run-down of 11 browsers that may be worth a look, for a variety of reasons . Brave: Stopping the trackers. Brave is an open-source browser, co-founded by Brendan Eich of Mozilla and JavaScript fame. It’s hoping it can ‘save the web’ . Available for a variety of desktop and mobile operating systems, Brave touts itself as a ‘faster and safer’ web browser. It achieves this, somewhat controversially, by automatically blocking ads and trackers. “Brave is the only approach to the Web that puts users first in ownership and control of their browsing data by blocking trackers by default, with no exceptions.” — Brendan Eich. Brave’s goal is to provide an alternative to the current system publishers employ of providing free content to users supported by advertising revenue. Developers are encouraged to contribute to the project on GitHub, and publishers are invited to become a partner in order to work towards an alternative way to earn from their content. Ghost: Multi-session browsing.
    [Show full text]
  • The Elinks Manual the Elinks Manual Table of Contents Preface
    The ELinks Manual The ELinks Manual Table of Contents Preface.......................................................................................................................................................ix 1. Getting ELinks up and running...........................................................................................................1 1.1. Building and Installing ELinks...................................................................................................1 1.2. Requirements..............................................................................................................................1 1.3. Recommended Libraries and Programs......................................................................................1 1.4. Further reading............................................................................................................................2 1.5. Tips to obtain a very small static elinks binary...........................................................................2 1.6. ECMAScript support?!...............................................................................................................4 1.6.1. Ok, so how to get the ECMAScript support working?...................................................4 1.6.2. The ECMAScript support is buggy! Shall I blame Mozilla people?..............................6 1.6.3. Now, I would still like NJS or a new JS engine from scratch. .....................................6 1.7. Feature configuration file (features.conf).............................................................................7
    [Show full text]
  • Legislators of Cyberspace: an Analysis of the Role Of
    SHAPING CODE Jay P. Kesan* & Rajiv C. Shah** I. INTRODUCTION ............................................................................................................................ 4 II. THE CASE STUDIES: THE DEVELOPMENT OF CODE WITHIN INSTITUTIONS.............................. 13 A. World Wide Web......................................................................................................... 14 1. Libwww............................................................................................................ 14 2. NCSA Mosaic .................................................................................................. 16 B. Cookies ........................................................................................................................ 21 1. Netscape’s Cookies .......................................................................................... 21 2. The IETF’s Standard for Cookies .................................................................... 24 C. Platform for Internet Content Selection....................................................................... 28 D. Apache......................................................................................................................... 34 III. LEGISLATIVE BODIES: SOCIETAL INSTITUTIONS THAT DEVELOP CODE ................................. 37 A. Universities.................................................................................................................. 38 B. Firms...........................................................................................................................
    [Show full text]
  • T1, U-2 and L1 Transmitters™ Software V3.06 April 22, 2014
    ™ Air Integrated Dive Computer User Manual ™ Air Integrated Dive Computer Software v1.18 Ultrasonic software v1.11 And T1, U-2 and L1 Transmitters™ Software v3.06 April 22, 2014 Liquivision Products, Inc -1- Manual 1.6; Lynx 1.18; US 1.11; U-2 3.06 ™ Air Integrated Dive Computer User Manual CONTENTS IMPORTANT NOTICES ............................................................................................................................... 8 Definitions ..................................................................................................................................................... 9 User Agreement and Warranty ....................................................................................................................... 9 User Manual .................................................................................................................................................. 9 Liquivision Limitation of Liability ............................................................................................................... 10 Trademark Notice ........................................................................................................................................ 10 Patent Notice ............................................................................................................................................... 10 CE ............................................................................................................................................................... 10 LYNX
    [Show full text]
  • Computer and Information Services Newsletter
    Computer and Information Services Newsletter This newsletter is an information resource for the University of Minnesota. Volume 5, Number 5 November 1995 The Help Line that Never Sleeps... M Features The Help Line that Never Sleeps ................. 1 MicroHelpline Internet Options Get Documents by E-mail ...................... 7 FTP ...................................................... 7 Academic & Distributed Computing Web .................................................... 10 Services announces a new service that Finger ................................................. 11 allows you to find answers to common Gopher................................................ 12 About E-mail Signatures ............................ 15 (and uncommon!) help line questions. The Technical Coordinators Program is Growing........................................... 16 Electronic MicroHelpline Virtual Library Searching Indexes On-line..................... 4 Our new electronic MicroHelpline service brings the Go for Gold: information and expertise of our professional help line a Gopher Information Hunt ................ 6 consultants to the Internet. You can access this service twenty four hours a day using two popular Internet tools: Gopher and the World-Wide Web. With the MicroHelpline service you can find information that would normally have required a call to our help line. In the long run, using the electronic MicroHelpline will save everyone time Here’s a taste of what you can access on this server. M Computer Store News 24-hour Service ........................................
    [Show full text]