(Vrtp) Design Rationale

Total Page:16

File Type:pdf, Size:1020Kb

(Vrtp) Design Rationale Presented at Workshops on Enabling Technology: Infrastructure for Collaborative Enterprises (WET ICE): Sharing a Distributed Virtual Reality, Massachusetts Institute of Technology, Cambridge Massachusetts, June 18-20 1997. virtual reality transfer protocol (vrtp) Design Rationale Don Brutzman, Mike Zyda and Kent Watsen Mike Macedonia Code UW/Br, CS/Zk, CS/Wa Fraunhofer Center for Research in Naval Postgraduate School Computer Graphics Inc. Monterey California 93943-5000 USA 167 Angell Street 408.656.2149 voice, 408.656.3679 fax Providence Rhode Island 02906 USA [email protected] [email protected] 401.453.6363 voice, 401.453.0444 fax [email protected] [email protected] http://www.stl.nps.navy.mil/~brutzman/vrtp/vrtp_design.ps Abstract We propose a new protocol at the application layer, the The capabilities of the Virtual Reality Modeling virtual reality transfer protocol (vrtp). vrtp is intended to Language (VRML) permit building large-scale virtual significantly extend http in order to provide full support for environments (LSVEs) using the Internet and the World LSVE requirements by enabling a spectrum of functionality Wide Web. However the underlying network support between client-server and peer-peer, all optimized on local provided by the hypertext transfer protocol (http) is desktop computers and across the global Internet. insufficient for LSVEs. Additional capabilities for Years of effort on widely distributed interactive 3D lightweight peer-to-peer communications and network graphics applications have clearly identified networking monitoring need to be combined with the client-server issues as the critical bottlenecks preventing the creation of capabilities of http. To accomplish this task, we present a LSVEs. Those years have produced numerous important detailed design rationale for the virtual reality transfer virtual reality technologies (Durlach 95) (Zyda 93). We protocol (vrtp). vrtp is designed to support VRML in the believe the time is now right to put all of the network pieces same manner as http was designed to support HTML. Since together with all of the graphics pieces. vrtp is intended to vrtp must be highly optimized on individual desktops and accomplish this challenge. across the Internet, a Cyberspace Backbone (CBone) is also This paper presents the planned architecture of vrtp. needed for vrtp development and testing. vrtp appears to be Section 2 presents pertinent background networking a necessary next step in the deployment of all-encompassing concepts: key network capabilities for LSVEs, multicast and interactive internetworked 3D worlds. exploiting reality, the Distributed Interactive Simulation (DIS) protocol and the hypertext transfer protocol (http). Section 3 summarizes network considerations for the Virtual 1 Overview and Motivation Reality Modeling Language (VRML). Section 4 shows how an unrecognized spectrum of functionality exists between It is now possible to construct large-scale virtual client-server and peer-to-peer. Sections 5 and 6 define vrtp environments (LSVEs) comprised of internetworked and describe vrtp components: client, server, peer-to-peer graphics using the Virtual Reality Modeling Language and network monitoring. Finally Section 7 explains why a (VRML) version 2.0 (Carey 96). Such online interactive Cyberspace Backbone (CBone) will eventually be needed VRML worlds require diverse and powerful network for high-performance vrtp optimization and experimentation. capabilities to support user demands. The hypertext transfer protocol (http) (Berners-Lee 96) provides effective client- server support for many types of information transfer over 2 Background Networking Concepts the Web (Berners-Lee 94). However other types of network connections are also needed; examples include multicast Of necessity a variety of related networking topics must streaming of real-time audio, video and entity behavior data. be summarized as pertinent background for vrtp design. Furthermore these many capabilities are directly required by More detailed treatments are found in (Brutzman 95, 96b). all participants in LSVEs, rather than indirectly accessed via Four key network capabilities. Many types of separated client and server platforms. information can be distributed in a large-scale virtual 1 environment (LSVE). It is important to be able to group and partition information transfer capabilities into a small set of Light-weight Interactions. Messages composed well-defined primitives. By clearly stating network of state, event and control information as used in requirements, protocol design can efficiently and thoroughly DIS Entity State PDUs or other behavior reports. support virtual world requirements. We have found that all Implemented using unicast or multicast. Complete types of information transfer can be effectively mapped into message semantics are included in a single packet the categories listed in Figure 1 (Macedonia 94, 95) encapsulation without fragmentation. Light-weight (Brutzman 95, 96b). The primary usefulness of this interactions are received completely or not at all. approach is to clarify core requirements which need to be Network Pointers. Light-weight network resource well supported by the underlying global network for LSVEs. references, i.e. a global address space that can be Multicast and Exploiting Reality. Multicast is a crucial multicast to receiving groups. Can be cached so capability for scaling up network capabilities. Multicast that repeated queries are answered by group packets have class D Internet Protocol (IP) addresses which members instead of servers. Pointers do not permits individual packets to be routed to multiple recipients contain a complete object as light-weight without duplication on individual LANs (Deering 89). Host interactions do, instead containing only a reference machines must intentionally subscribe to a multicast address to an object. in order for incoming packets to be passed to the application. Thus multicast packets have particular strengths in Heavy-weight Objects. Large data objects minimizing bandwidth and minimizing processor cycles. requiring reliable connection-oriented Multicast capabilities are of fundamental importance when transmission. Typically provided as a web query considering networked real-time streams (Macedonia 94). response to a network pointer request. Since multicast currently uses only the User Datagram Real-time Streams. Live video, audio, DIS Protocol (UDP) and not the Transport Control Protocol behaviors, sequential graphics images or other (TCP) of the IP suite, multicast streams are a connectionless continuous stream traffic that requires real-time "unreliable" service. Lost MBone packets stay lost. No setup delivery, sequencing and synchronization. is required, no acknowledgments are used, and no guarantee Typically implemented using multicast channels. of delivery exists for this type of "best effort" service. Ordinarily this is a good thing for most real-time information Figure 1. Four key communications capabilities used streams (such as audio, video and behaviors) since it avoids in virtual environments (Macedonia 94, 95) delivery bottlenecks and unwanted overhead. Numerous (Brutzman 95, 96b). researchers are experimenting with "reliable multicast" transport protocols which try to achieve a different balance Distributed Interactive Simulation (DIS) and between reliability and potential congestion, typically by Behavior Protocols. For the past seven years, a major gaining occasional retransmission benefits without focus in networked virtual environments has been the unacceptable acknowledgment overheads (Crowcroft 96). Department of Defense's Distributed Interactive Simulation The Multicast Backbone (MBone) is one of the Internet's (DIS) standard, also know as IEEE 1278. The DIS standard most interesting capabilities since it is used for distribution (IEEE 95) describes the packet format for 27 protocol data of live audio, video and other packets (such as DIS) on a units (PDUs) specified for use in military combat global scale. In other words, the MBone interconnects the simulations. Of these only a few have general applicability. multicast capabilities of LANs across the Internet. MBone We are most interested in the widely used Entity State PDU is a virtual network because it shares the same physical (ESPDU). Entity state in this context includes linear and media as the Internet and is comprised of a network of rotational values for posture, velocity and acceleration in routers (mrouters) that support global multicast. combination with efficiently designed algorithms for dead Furthermore it is possible to partition the LSVE reckoning and track smoothing. The ESPDU is well suited communications space to exploit reality by assigning for relaying physically based model information among different communication channels to different multicast numerous interacting participants in real time. Meanwhile addresses, typically corresponding to geographic, temporal the DIS specification has been frozen and DoD development or functional areas of interest (AOI) (Macedonia 95, 96). work redirected toward a hybrid distributed client-server These considerations for reducing bandwidth and processor object broker model, the High-Level Architecture/Run-Time cycles while achieving global connectivity are critical when Infrastructure (HLA/RTI) (DMSO 96). scaling to arbitrarily large numbers of simultaneously The IEEE DIS protocol is robust and effective in interacting users on the network. multiuser environments and can
Recommended publications
  • Just Another Perl Hack Neil Bowers1 Canon Research Centre Europe
    Weblint: Just Another Perl Hack Neil Bowers1 Canon Research Centre Europe Abstract Weblint is a utility for checking the syntax and style of HTML pages. It was inspired by lint [15], which performs a similar function for C and C++ programmers. Weblint does not aspire to be a strict SGML validator, but to provide helpful comments for humans. The importance of quality assurance for web sites is introduced, and one particular area, validation of HTML, is described in more detail. The bulk of the paper is devoted to weblint: what it is, how it is used, and the design and implementation of the current development version. 1. Introduction The conclusion opens with a summary of the information and opinions given in this paper. A Web sites are becoming an increasingly critical part of selection of the lessons learned over the last four years how many companies do business. For many companies is given, followed by plans for the future, and related web sites are their business. It is therefore critical that ideas. owners of web sites perform regular testing and analysis, to ensure quality of service. 2. Web Site Quality Assurance There are many different checks and analyses which The following are some of the questions you should be you can run on a site. For example, how usable is your asking yourself if you have a web presence. I have site when accessed via a modem? An incomplete list of limited the list to those points which are relevant to similar analyses are given at the start of Section 2.
    [Show full text]
  • LEARNING HTML5 and CSS 1. What Is HTML? Ans: HTML Has Been Derived from SGML, Which Stands for Standard General Markup Language
    LEARNING HTML5 AND CSS 1. What is HTML? Ans: HTML has been derived from SGML, which stands for standard general markup language. HTML was created to allow those users who were not specialized in using SGML to create web pages. 2. What are tags in HTML? Ans: An HTML tag begin with a ‘less than’ symbol(<) and ends with a ‘greater than’ symbol(>). These symbols are also called angle brackets. Syntax:<html> text </html> Start tag End tag The part --<html>is called the opening tag, while the part--- </html> is called the closing tag. The closing tag is same as the opening tag except that it has forward slash before its name. 3. What is the difference between the <body>and <head>tags? Ans: The HEAD section contains the title and the other information about the HTML document. The BODY section contains all the information that is displayed on a web page. 4. How are attributes defined? Ans: An attribute provides additional information about an element. Attributes are usually defined its name-value pairs. The name is the property of the tag that you want to set, while the value is the value of the property to be set. <p align = “left”>This text is left aligned </p> The <p> tag, also knows as the paragraph tag, is used to define a paragraph. Now we can use the attribute align with it to set the alignment of the paragraph. Also, there are three possible values of the align attribute—left, right, and center. 5.Define HTML. What is its use? Ans: HTML stands for hypertext markup language.
    [Show full text]
  • Annotea: an Open RDF Infrastructure for Shared Web Annotations
    Proceedings of the WWW 10th International Conference, Hong Kong, May 2001. Annotea: An Open RDF Infrastructure for Shared Web Annotations Jos´eKahan,1 Marja-Riitta Koivunen,2 Eric Prud’Hommeaux2 and Ralph R. Swick2 1 W3C INRIA Rhone-Alpes 2 W3C MIT Laboratory for Computer Science {kahan, marja, eric, swick}@w3.org Abstract. Annotea is a Web-based shared annotation system based on a general-purpose open RDF infrastructure, where annotations are modeled as a class of metadata.Annotations are viewed as statements made by an author about a Web doc- ument. Annotations are external to the documents and can be stored in one or more annotation servers.One of the goals of this project has been to re-use as much existing W3C technol- ogy as possible. We have reacheditmostlybycombining RDF with XPointer, XLink, and HTTP. We have also implemented an instance of our system using the Amaya editor/browser and ageneric RDF database, accessible through an Apache HTTP server. In this implementation, the merging of annotations with documents takes place within the client. The paper presents the overall design of Annotea and describes some of the issues we have faced and how we have solved them. 1Introduction One of the basic milestones in the road to a Semantic Web [22] is the as- sociation of metadata to content. Metadata allows the Web to describe properties about some given content, even if the medium of this content does not directly provide the necessary means to do so. For example, ametadata schema for digital photos [15] allows the Web to describe, among other properties, the camera model used to take a photo, shut- ter speed, date, and location.
    [Show full text]
  • Arizona State Board of Education AMENDED Agenda
    April 20, 2020 Regular Board Meeting 04/20/2020 10:00 AM 1535 W. Jefferson Room # 122 Meeting Minutes Phoenix, AZ 85007 Printed : 6/15/2020 9:23 AM MST Arizona State Board of Education AMENDED Agenda NOTICE OF PUBLIC MEETING Pursuant to Arizona Revised Statutes (A.R.S.) 38-431.02, notice is hereby given to the members of the Arizona State Board of Education and to the general public that the Board will hold a meeting, open to the public, on Monday, April 20, 2020, at 10:00 A.M. at the Arizona Department of Education, Room 122, 1535 W. Jefferson, Phoenix, AZ 85007. The boardroom will be closed to the public. Information on how the public may attend is outlined below. For this meeting, all public comment will be accepted in written form only. Information on how the public may submit written comment is also outlined below. A copy of the agenda for the meeting is attached. The Board reserves the right to change the order of items on the agenda, with the exception of public hearings. One or more members of the Boards may participate telephonically. Agenda materials can be reviewed online at http://azsbe.az.gov Pursuant to A.R.S. §38-431.02 (H), the Board may discuss and take action concerning any matter listed on the agenda. Pursuant to A.R.S. 38-431.03(A)(2), the Board may vote to convene in executive session, which will not be open to the public, for discussion or consideration of records exempt by law from public inspection.
    [Show full text]
  • WEB-BASED ANNOTATION and COLLABORATION Electronic Document Annotation Using a Standards-Compliant Web Browser
    WEB-BASED ANNOTATION AND COLLABORATION Electronic Document Annotation Using a Standards-compliant Web Browser Trev Harmon School of Technology, Brigham Young University, 265 CTB, Provo, Utah, USA Keywords: Annotation, collaboration, web-based, e-learning. Abstract: The Internet provides a powerful medium for communication and collaboration through web-based applications. However, most web-based annotation and collaboration applications require additional software, such as applets, plug-ins, and extensions, in order to work correctly with the web browsers typically found on today’s computers. This in combination with the ever-growing number of file formats poses an obstacle to the wide-scale deployment of annotation and collaboration systems across the heterogeneous networks common in the academic and corporate worlds. In order to address these issues, a web-based system was developed that allows for freeform (handwritten) and typed annotation of over twenty common file formats via a standards-compliant web browser without the need of additional software. The system also provides a multi-tiered security architecture that allows authors control over who has access to read and annotate their documents. While initially designed for use in academia, flexibility within the system allows it to be used for many annotation and collaborative tasks such as distance-learning, collaborative projects, online discussion and bulletin boards, graphical wikis, and electronic grading. The open-source nature of the system provides the opportunity for its continued development and extension. 1 INTRODUCTION did not foresee the broad spectrum of uses expected of their technologies by today’s users. While serving While the telegraph and telephone may have cracked this useful purpose, such add-on software can open the door of instantaneous, worldwide become problematic in some circumstances because communication, the Internet has flung it wide open.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • Cascading Style Sheet Web Tool
    CASCADING STYLE SHEET WEB TOOL _______________ A Thesis Presented to the Faculty of San Diego State University _______________ In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science _______________ by Kalthoum Y. Adam Summer 2011 iii Copyright © 2011 by Kalthoum Y. Adam All Rights Reserved iv DEDICATION I dedicate this work to my parents who taught me not to give up on fulfilling my dreams. To my faithful husband for his continued support and motivation. To my sons who were my great inspiration. To all my family and friends for being there for me when I needed them most. v ABSTRACT OF THE THESIS Cascading Style Sheet Web Tool by Kalthoum Y. Adam Master of Science in Computer Science San Diego State University, 2011 Cascading Style Sheet (CSS) is a style language that separates the style of a web document from its content. It is used to customize the layout and control the appearance of web pages written by markup languages. CSS saves time while developing the web page by applying the same layout and style to all pages in the website. Furthermore, it makes the website easy to maintain by just editing one file. In this thesis, we developed a CSS web tool that is intended to web developers who will hand-code their HTML and CSS to have a complete control over the web page layout and style. The tool is a form wizard that helps developers through a user-friendly interface to create a website template with a valid CSS and XHTML code.
    [Show full text]
  • Web Browsing and Communication Notes
    digital literacy movement e - learning building modern society ITdesk.info – project of computer e-education with open access human rights to e - inclusion education and information open access Web Browsing and Communication Notes Main title: ITdesk.info – project of computer e-education with open access Subtitle: Web Browsing and Communication, notes Expert reviwer: Supreet Kaur Translator: Gorana Celebic Proofreading: Ana Dzaja Cover: Silvija Bunic Publisher: Open Society for Idea Exchange (ODRAZI), Zagreb ISBN: 978-953-7908-18-8 Place and year of publication: Zagreb, 2011. Copyright: Feel free to copy, print, and further distribute this publication entirely or partly, including to the purpose of organized education, whether in public or private educational organizations, but exclusively for noncommercial purposes (i.e. free of charge to end users using this publication) and with attribution of the source (source: www.ITdesk.info - project of computer e-education with open access). Derivative works without prior approval of the copyright holder (NGO Open Society for Idea Exchange) are not permitted. Permission may be granted through the following email address: [email protected] ITdesk.info – project of computer e-education with open access Preface Today’s society is shaped by sudden growth and development of the information technology (IT) resulting with its great dependency on the knowledge and competence of individuals from the IT area. Although this dependency is growing day by day, the human right to education and information is not extended to the IT area. Problems that are affecting society as a whole are emerging, creating gaps and distancing people from the main reason and motivation for advancement-opportunity.
    [Show full text]
  • Web Browsers
    WEB BROWSERS Page 1 INTRODUCTION • A Web browser acts as an interface between the user and Web server • Software application that resides on a computer and is used to locate and display Web pages. • Web user access information from web servers, through a client program called browser. • A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web Page 2 FEATURES • All major web browsers allow the user to open multiple information resources at the same time, either in different browser windows or in different tabs of the same window • A refresh and stop buttons for refreshing and stopping the loading of current documents • Home button that gets you to your home page • Major browsers also include pop-up blockers to prevent unwanted windows from "popping up" without the user's consent Page 3 COMPONENTS OF WEB BROWSER 1. User Interface • this includes the address bar, back/forward button , bookmarking menu etc 1. Rendering Engine • Rendering, that is display of the requested contents on the browser screen. • By default the rendering engine can display HTML and XML documents and images Page 4 HISTROY • The history of the Web browser dates back in to the late 1980s, when a variety of technologies laid the foundation for the first Web browser, WorldWideWeb, by Tim Berners-Lee in 1991. • Microsoft responded with its browser Internet Explorer in 1995 initiating the industry's first browser war • Opera first appeared in 1996; although it have only 2% browser usage share as of April 2010, it has a substantial share of the fast-growing mobile phone Web browser market, being preinstalled on over 40 million phones.
    [Show full text]
  • Why Websites Can Change Without Warning
    Why Websites Can Change Without Warning WHY WOULD MY WEBSITE LOOK DIFFERENT WITHOUT NOTICE? HISTORY: Your website is a series of files & databases. Websites used to be “static” because ​ there were only a few ways to view them. Now we have a complex system, and telling your webmaster what device, operating system and browser is crucial, here’s why: TERMINOLOGY: You have a desktop or mobile “device”. Desktop computers and mobile ​ ​ ​ devices have “operating systems” which are software. To see your website, you’ll pull up a ​ ​ ​ ​ “browser” which is also software, to surf the Internet. Your website is a series of files that ​ ​ needs to be 100% compatible with all devices, operating systems and browsers. Your website is built on WordPress and gets a weekly check up (sometimes more often) to ​ ​ ​ see if any changes have occured. Your site could also be attacked with bad files, links, spam, comments and other annoying internet pests! Or other components will suddenly need updating which is nothing out of the ordinary. WHAT DOES IT LOOK LIKE IF SOMETHING HAS CHANGED? Any update to the following can make your website look differently: There are 85 operating ​ systems (OS) that can update (without warning). And any of the most popular roughly 7 ​ ​ ​ browsers also update regularly which can affect your site visually and other ways. (Lists below) ​ Now, with an OS or browser update, your site’s 18 website components likely will need ​ ​ updating too. Once website updates are implemented, there are currently about 21 mobile ​ devices, and 141 desktop devices that need to be viewed for compatibility.
    [Show full text]
  • Download Text, HTML, Or Images for Offline Use
    TALKING/SPEAKING/STALKING/STREAMING: ARTIST’S BROWSERS AND TACTICAL ENGAGEMENTS WITH THE EARLY WEB Colin Post A thesis submitted to the faculty at the University of North Carolina at Chapel Hill in partial fulfillment of the requirements for the degree of Master of Arts in Art History in the College of Arts & Sciences Chapel Hill 2019 Approved by: Cary Levine Victoria Rovine Christoph Brachmann © 2019 Colin Post ALL RIGHTS RESERVED ii ACKNOWLEDGMENTS Many people have supported me throughout the process of writing this thesis—support duly needed and graciously accepted as I worked on this thesis while also conducting research for a dissertation in Information Science and in the midst of welcoming my daughter, Annot Finkelstein, into the world. My wife, Rachel Finkelstein, has been steadfast throughout all of this, not least of which in the birth of our daughter, but also in her endless encouragement of my scholarship. All three of my readers, Cary Levine, Victoria Rovine, and Christoph Brachmann, deserve thanks for reading through several drafts and providing invaluable feedback. Cary has also admirably served as my advisor throughout the Art History degree program as well as a member of my dissertation committee. At times when it seemed difficult, if not impossible, to complete everything for both degrees, Cary calmly assured me that I could achieve these goals. Leading the spring 2019 thesis writing seminar, Dr. Rovine helped our whole cohort through to the successful completion of our theses, providing detailed and thoughtful comments on every draft. I also deeply appreciate the support from my peers in the course.
    [Show full text]
  • BROWSERS: a Brief Historyof Securityvulnerabilities
    BROWSERS: A brief history oF PROJECT BY GROUP 5 SNEHA BALIGA / JULIA CHLASTACZ / DANG TRUNG NGUYEN / MARIJA NIKOLIC / BOGDAN NOVAKOVIC / PREETI PURI / security vulnerabilities CHENYUN ZENG 2.8.9 Lynx Vulnerabilities refer to Thomas Netscape Navigator 8.1.3 the Common Vulnerabilities Dickey Netscape and Exposures (CVE) - a system 75.1 that provides a reference method for publicly known information - K-Meleon security vulnerabilities and exposures. Netscape Netscape created the Mozilla Organization in Vulnerabilities 1998 to co-ordinate the development of the 69 Mozilla Application Suite. Netscape acquired AOL Firefox Risk severity in 1999 and went on to create multiple browsers. AOL Phoenix Critical 1.5 High AOL Medium 2.49 Low Seamonkey Risk refers to the potential that 28.7 the threat will be realized for a particular vulnerability. Palemoon 12.18 Number of open Opera vulnerabilities Opera Software 1,200 11.0 1,000 800 Internet 600 Explorer 400 Microsoft 44.0 200 Microsoft created Edge in 2015 in an 0 attempt to phase out Internet Explorer. Edge Open vulnerabilities refer to 11.4 the number of vulnerabilities open Amaya and unresolved in that year. W3C, INRIA 3.34 Konqueror Usage share KDE 0.11 ELinks 0% Twibright 5.2 Relationship lines Labs Maxthon 1 50% Maxthon International 3.34 Company Name GNOME Web 100% Epiphany 1 1 Successor browser GNOME Project Usage share refers to the 12.1 percentage of user share in Forked from another browser the browser market. Safari Apple Only 7 browsers accomodate 19 usage share of more than 1%. Symbols
    [Show full text]