Firefox 與網路瀏覽器發展簡史 網際網路在現今的生活中已不可或缺,讓我們回溯 1993 年網路黎明時期, the History of Firefox and Web Browsers 透過最常接觸的瀏覽器其進化歷程,來逐步回顧網際網路發展的歷史。
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Shaping Choices in the Digital World
IP REPORTS INNOVATION AND FORESIGHT N°06 Shaping Choices in the Digital World January 2019 Commission Nationale de l’Informatique et des Libertés From dark patterns to data protection: 3 place de Fontenoy TSA 80715 the influence of ux/ui design on user empowerment 75334 PARIS CEDEX 07 Tél. +33 (0)1 53 73 22 22 [email protected] www.cnil.fr linc.cnil.fr SHAPING CHOICES IN THE DIGITAL WORLD EDITORIAL 1 People live with all kinds of digital objects. These range from social networks to cutting-edge connected objects. They are now a fully-fledged part of our aesthetic relationship with the world, on a par with architecture or decorative art. A certain widely distributed and highly standardised aesthetic of digital media has been created, producing strong brands in users’ minds. Users are barely aware of this aesthetic, which is well thought out. Conditioning through design pre-empts everything that the individual handles or sees in the digital world. In the wake of Bauhaus, where design is based on the search for functional aesthetics, digital technology has become a relevant field of application in EDITORIAL problem-solving. For, beyond the desire to avoid ugliness that “does not sell”, to quote Raymond Loewy, the digital promise is so broad that the functions provided by design seem endless, giving the key players that own them the expectation of a substantial return on investment. Web giants have understood this by competing to attract users, customising their experience, influencing – as subtly and as substantially as possible – their behaviour, in all fields, from leisure to politics. -
Machine Learning in the Browser
Machine Learning in the Browser The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:38811507 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA Machine Learning in the Browser a thesis presented by Tomas Reimers to The Department of Computer Science in partial fulfillment of the requirements for the degree of Bachelor of Arts in the subject of Computer Science Harvard University Cambridge, Massachusetts March 2017 Contents 1 Introduction 3 1.1 Background . .3 1.2 Motivation . .4 1.2.1 Privacy . .4 1.2.2 Unavailable Server . .4 1.2.3 Simple, Self-Contained Demos . .5 1.3 Challenges . .5 1.3.1 Performance . .5 1.3.2 Poor Generality . .7 1.3.3 Manual Implementation in JavaScript . .7 2 The TensorFlow Architecture 7 2.1 TensorFlow's API . .7 2.2 TensorFlow's Implementation . .9 2.3 Portability . .9 3 Compiling TensorFlow into JavaScript 10 3.1 Motivation to Compile . 10 3.2 Background on Emscripten . 10 3.2.1 Build Process . 12 3.2.2 Dependencies . 12 3.2.3 Bitness Assumptions . 13 3.2.4 Concurrency Model . 13 3.3 Experiences . 14 4 Results 15 4.1 Benchmarks . 15 4.2 Library Size . 16 4.3 WebAssembly . 17 5 Developer Experience 17 5.1 Universal Graph Runner . -
IYIR for HTML
INFOSEC UPDATE 2006 Student Workbook Norwich University June 19-20, 2006 M. E. Kabay, PhD, CISSP-ISSMP Assoc. Prof. Information Assurance Program Director, MSIA BSIA Division of Business Management Norwich University [email protected] Copyright © 2006 M. E. Kabay. All rights reserved. Page 1 INFOSEC UPDATE 2006 -- June 19-20, 2006 01 Introduction Category 01 Introduction 2006-06-12 Introduction M. E. Kabay, PhD, CISSP WELCOME Welcome to the 2005 edition of the Information Security Year in Review (IYIR) project. In 1993 and 1994, I was an adjunct professor in the Institute for Government Informatics Professionals in Ottawa, Canada under the aegis of the University of Ottawa. I taught a one-semester course introducting information security to government personnel and enjoyed the experience immensely. Many of the chapters of my 1996 textbook, _The NCSA Guide to Enterprise Security_ published by McGraw-Hill were field-tested by my students. In 1995, I was asked if I could run a seminar for graduates of my courses to bring them up to date on developments across the entire field of information security. Our course had twenty students and I so enjoyed it that I continued to develop the material and teach the course with the NCSA (National Computer Security Association; later called ICSA and then eventually renamed TruSecure Corporation and finally CyberTrust, its current name) all over the United States, Canada, Europe, Asia and the Caribbean. After a few years of working on this project, it became obvious that saving abstracts in a WordPerfect file was not going to cut it as an orderly method for organizing the increasing mass of information that I was encountering in my research. -
Embedded Linux for Thin Clients Next Generation (Elux® NG) Version 1.25
Embedded Linux for Thin Clients Next Generation (eLux® NG) Version 1.25 Administrator’s Guide Build Nr.: 23 UniCon Software GmbH www.myelux.com eLux® NG Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express consent of UniCon Software GmbH. © by UniCon 2005 Software GmbH. All rights reserved eLux is a registered trademark of UniCon Software GmbH in Germany. Accelerated-X is a trademark of Xi Graphics, Inc. Adobe, Acrobat Reader and PostScript are registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Broadcom is a registered trademark of Broadcom Corporation in the U.S. and/or other countries. CardOS is a registered trademark and CONNECT2AIR is a trademark of Siemens AG in Germany and/or other countries. Cisco and Aironet are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Citrix, Independent Computing Architecture (ICA), Program Neighborhood, MetaFrame, and MetaFrame XP are registered trademarks or trademarks of Citrix Systems, Inc. in the United States and other countries. CUPS and the Common UNIX Printing System are the trademark property of Easy Software Products. DivX is a trademark of Project Mayo. Ericom and PowerTerm are registered trademarks of Ericom Software in the United States and/or other countries. Gemplus is a registered trademark and GemSAFE a trademark of Gemplus. -
HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S. -
Analisi Del Progetto Mozilla
Università degli studi di Padova Facoltà di Scienze Matematiche, Fisiche e Naturali Corso di Laurea in Informatica Relazione per il corso di Tecnologie Open Source Analisi del progetto Mozilla Autore: Marco Teoli A.A 2008/09 Consegnato: 30/06/2009 “ Open source does work, but it is most definitely not a panacea. If there's a cautionary tale here, it is that you can't take a dying project, sprinkle it with the magic pixie dust of "open source", and have everything magically work out. Software is hard. The issues aren't that simple. ” Jamie Zawinski Indice Introduzione................................................................................................................................3 Vision .........................................................................................................................................4 Mozilla Labs...........................................................................................................................5 Storia...........................................................................................................................................6 Mozilla Labs e i progetti di R&D...........................................................................................8 Mercato.......................................................................................................................................9 Tipologia di mercato e di utenti..............................................................................................9 Quote di mercato (Firefox).....................................................................................................9 -
Manual De Firefox Instalación Y Uso
Manual de Firefox Instalación y uso Servicio de Información Mesoamericano de Agricultura Sostenible ÍNDICE ¿Qué es Firefox? ....................................... 3 ¿Cómo lo descargo a mi computadora?............................... 4 Instalación ....................................... 5 Comenzar a utilizar Mozilla Firefox ....................................... 8 Elementos para Navegar ....................................... 9 Pestañas de Navegación ....................................... 11 Uso de Marcadores ....................................... 12 Guardar y extraer información ....................................... 15 Historial ....................................... 15 Establecer Preferencias ....................................... 16 Temas y Extenxiones para Mozilla Firefox............................. 18 Unidad de Informática 2 ¿Qué es Firefox? Firefox es una de las aplicaciones gratuitas que se pueden utilizar para navegar en Internet. Seguramente el lector utilice Internet Explorer que es el navegador más conocido y utilizado, pero no el mejor. Basado en Mozilla, el proyecto Firefox nació, a finales de 2002, orientado a usuarios no técnicos. Fue pasando por diversos nombres (Phoenix, Firebird) hasta tomar la denominación actual. Cabe destacar que se trata de un proyecto ‘Open Source’ (Código Abierto), lo que supone que cualquier desarrollador puede modificar el código para mejorarlo. Este pequeño manual le enseñará a instalar y utilizar Firefox en una computadora con sistema operativo Windows. ¿Por qué debo usar Firefox? Hay -
Mozilla Source Tree Docs Release 50.0A1
Mozilla Source Tree Docs Release 50.0a1 August 02, 2016 Contents 1 SSL Error Reporting 1 2 Firefox 3 3 Telemetry Experiments 11 4 Build System 17 5 WebIDL 83 6 Graphics 85 7 Firefox for Android 87 8 Indices and tables 99 9 Localization 101 10 mach 105 11 CloudSync 113 12 TaskCluster Task-Graph Generation 119 13 Crash Manager 133 14 Telemetry 137 15 Crash Reporter 207 16 Supbrocess Module 211 17 Toolkit modules 215 18 Add-on Manager 221 19 Linting 227 20 Indices and tables 233 21 Mozilla ESLint Plugin 235 i 22 Python Packages 239 23 Managing Documentation 375 24 Indices and tables 377 Python Module Index 379 ii CHAPTER 1 SSL Error Reporting With the introduction of HPKP, it becomes useful to be able to capture data on pin violations. SSL Error Reporting is an opt-in mechanism to allow users to send data on such violations to mozilla. 1.1 Payload Format An example report: { "hostname":"example.com", "port":443, "timestamp":1413490449, "errorCode":-16384, "failedCertChain":[ ], "userAgent":"Mozilla/5.0 (X11; Linux x86_64; rv:36.0) Gecko/20100101 Firefox/36.0", "version":1, "build":"20141022164419", "product":"Firefox", "channel":"default" } Where the data represents the following: “hostname” The name of the host the connection was being made to. “port” The TCP port the connection was being made to. “timestamp” The (local) time at which the report was generated. Seconds since 1 Jan 1970, UTC. “errorCode” The error code. This is the error code from certificate veri- fication. Here’s a small list of the most commonly-encountered errors: https://wiki.mozilla.org/SecurityEngineering/x509Certs#Error_Codes_in_Firefox In theory many of the errors from sslerr.h, secerr.h, and pkixnss.h could be encountered. -
Mozillamessaging.Com Site Redesign Site Map — Version 3.0 — September 22, 2008
Mozillamessaging.com Site Redesign Site Map — Version 3.0 — September 22, 2008 While this document can be printed at 8.5” x 11” it may be hard to read and is intended to be printed at 11” x 17”. Mozillamessaging.com Site Redesign Version 3.0 Other Systems and Features 03 05 Mozilla Messaging Languages http://www.mozillamessaging.com/en-US/features.html http://www.mozillamessaging.com/en-US/all.html Thunderbird 02 Release Notes 04 Download Page 18 (Overview) http://www.mozillamessaging.com/ http://www.mozillamessaging.com/en-US/releasenotes/ http://www.mozillamessaging.com/en-US/download.html ?? URL TBD en-US/thunderbird Secure Email TBD http://www.mozillamessaging.com/en-US/email.html All Add-Ons https://addons.mozilla.org/en-US/thunderbird/ Supported Servers TBD http://www.mozillamessaging.com/en-US/servers Recommended https://addons.mozilla.org/en-US/thunderbird/recommended Add-Ons Popular https://addons.mozilla.org/en-US/ https://addons.mozilla.org/en-US/thunderbird/browse/type:1/cat:all?sort=popular thunderbird/ FAQ Themes http://www.mozilla.org/support/thunderbird/faq https://addons.mozilla.org/en-US/thunderbird/browse/type:2 Tips & Tricks Dictionaries http://www.mozilla.org/support/thunderbird/tips https://addons.mozilla.org/en-US/thunderbird/browse/type:3 Keyboard Shortcuts http://www.mozilla.org/support/thunderbird/keyboard Mouse Shortcuts Add-Ons Support 06 http://www.mozilla.org/support/thunderbird/mouse https://addons.mozilla.org/en-US/thunderbird/ (Overview) http://www.mozillamessaging.com/ Menu References Bugzilla en-US/support http://www.mozilla.org/support/thunderbird/menu https://bugzilla.mozilla.org/ Editing Config. -
Mozilla, the European Perspective
Mozilla, the European perspective Pascal Chevrel Mozilla Europe October 09 TheThe MozillaMozilla structurestructure Project led by a non-profit: Mozilla Foundation 2 direct subsidiaries: Mozilla Corporation (Web and labs) Mozilla Messaging (Thunderbird) 3 regional affiliates Mozilla Europe Mozilla Japan Mozilla China AA fewfew factsfacts aboutabout MozillaMozilla inin EuropeEurope 45% of Firefox users are in Europe (~150 million) ~32% market share in Europe (vs 23% world) Regional affiliate to Mozilla (Mozilla Europe) Firefox in 41 European languages Dynamic professional market based on the Mozilla platform or using pieces of it (Mozdev Group, Zoomorama, Briks, Glaxstar, Disruptive Innovations, TomTom, 3Liz, Nokia...) France:France: aa fertilefertile fieldfield forfor MozillaMozilla Strong and organized community of developers building applications with the Mozilla platform Organized community with several not for profit organizations (frenchmozilla, geckozone, xulfr) Mozilla Europe is based in Paris Professional market for Xul outside of Firefox add- ons (intranet applications, large scale deployments of Firefox/Thunderbird, industry applications...) TheThe EuropeanEuropean MozillaMozilla CommunityCommunity EuropeanEuropean eventsevents onon MozillaMozilla TechnologiesTechnologies Two annual European-wide meetings for Mozilla 1. FOSDEM, in Université Libre de Bruxelles 2. MozCamp Europe + Direct education outreach with Mozilla Add-ons Workshops across Europe WhyWhy MozillaMozilla EducationEducation inin Europe?Europe? The Mozilla project values are based on sharing of knowledge and meritocracy, values shared with Education Open Source is quickly gaining acceptance both in the industry and the public sector in Europe, making Mozilla technologies an asset on the job market The Web was invented in Europe in CERN ! MMTCMMTC coursecourse inin Madrid,Madrid, 20092009 CollaborationCollaboration withwith URJCURJC A 3 months course online, started with a one week live session of teaching in Madrid. -
Business Models of the Open Economy
BUSINESS MODELS OF THE OPEN ECONOMY Coordinated by Louis-David Benyayer 2 OPEN MODELS BUSINESS MODELS OF THE OPEN ECONOMY Coordinated by Louis-David Benyayer 3 • Publisher: Without Model • 11 rue du Chemin de fer, 94230 Cachan, France • Printed by: Imprimerie Frazier • 20 € • May 2016 4 Open Models is made available according to the terms of the Creative Commons license Attribution - Share Alike 3.0 non-transcribed (more information on the page https://creativecommons.org/licenses/by-sa/3.0/). You are authorized to: › Share ‒ copy, distribute and communicate the content by any means and in any format › Adapt ‒ remix, transform and create from the content for any use, including commercial use Under the following conditions: Attribution - you have to quote the name of author of the articles and www.openmodels.fr as a source, provide a link to the license and mention the changes you have made. Share under the same conditions - if you happen to make a remix, whether you transform or create from the material constituting the original work, you have to distribute the modified work under the same conditions, that is, under the same license as the one under which the original work was distributed. 5 foreword OPEN MODELS ARE CHANGING EVERYTHING, ARE YOU READY? Software, education, industrial design, data, sciences, art and culture, open mo- dels are everywhere. The actors who make use of these open approaches often question the positions defined by traditional actors. Communities frequently organize themselves to collectively solve issues that centralized organizations come up against. Tabby, the car available as an open source kit, Protei, the marine open source drone and OpenStreetMap are just a few examples. -
NIST SP 800-28 Version 2 Guidelines on Active Content and Mobile
Special Publication 800-28 Version 2 (Draft) Guidelines on Active Content and Mobile Code Recommendations of the National Institute of Standards and Technology Wayne A. Jansen Theodore Winograd Karen Scarfone NIST Special Publication 800-28 Guidelines on Active Content and Mobile Version 2 Code (Draft) Recommendations of the National Institute of Standards and Technology Wayne A. Jansen Theodore Winograd Karen Scarfone C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 March 2008 U.S. Department of Commerce Carlos M. Gutierrez, Secretary National Institute of Standards and Technology James M. Turner, Acting Director GUIDELINES ON ACTIVE CONTENT AND MOBILE CODE Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-28 Version 2 Natl. Inst. Stand. Technol. Spec. Publ.