The Lpgbt: a Radiation Tolerant ASIC for Data, Timing, Trigger and Control Applications in HL-LHC

Total Page:16

File Type:pdf, Size:1020Kb

The Lpgbt: a Radiation Tolerant ASIC for Data, Timing, Trigger and Control Applications in HL-LHC The lpGBT: a radiation tolerant ASIC for Data, Timing, Trigger and Control Applications in HL-LHC Paulo Moreira, CERN On behalf of the lpGBT team Topical Workshop on Electronics for Particle Physics 02 – 06 September 2019, Santiago de Compostela – Spain lpGBT Team Design/Test • CERN David Porret, Daniel Hernandez, Julian Mendez, Jose Fonseca, Ken Wyllie, Nour Guettouche, Paulo Moreira, Pedro Leitao, Rui Francisco, Sophie Baron, Stefan Biereigel, Szymon Kulis • AGH UST Marek Idzik, Miroslaw Firlej, Jakub Moroń, Tomasz Fiutowski, Krzysztof Swientek • KU Leuven Bram Faes, Jeffrey Prinzie, Paul Leroux • UNL – FCT João Carvalho, Nuno Paulino • SMU Physics Datao Gong, Di Guo, Dongxu Yang, Jingbo Ye, Quan Sun, Tiankuan Liu, Wei Zhou • SMU Engineering Tao Zhang, Ping Gui Building blocks • Czech Technical University Prague Miroslav Havranek, Tomas Benka • CERN Stefano Michelis, Iraklis Kremastiotis, Alessandro Caratelli, Kostas Kloukinas 2 lpGBT Link Architecture High radiation doses No or small radiation doses LHC: up to 100 Mrad (1014 1MeV n/cm2) HL – LHC: up to 1 Grad (1016 1MeV n/cm2) Short distance optical links: 50 to 300 m FPGA Timing & Trigger Timing & Trigger TIA PD DAQ lpGBT DAQ LD LD Slow Control Slow Control Custom ASICs On-Detector Off-Detector Radiation Hard Electronics Commercial Off-The-Shelf (COTS) Electrical links to the frontend modules. Lengths: cm to few m Custom optoelectronics 3 More than a “Communications ASIC” • Capable of • 5.12 or 10.24 Gbps (for uplinks) • 2.56 Gbps (for downlinks) • Enables the implementation of RadTol links • DAQ • Trigger (constant and deterministic latency) • Experiment control [slow control] • Implements Control and Monitoring Functions • Three I2C Masters • 16 – bit General Purpose I/O port • Output reset pin • 10 – bit ADC (8 multiplexed inputs) Pin count: 289 (17 x 17) • 8 – bit voltage DAC Pitch: 0.5 mm • 8 – bit current DAC Size: 9 mm x 9 mm x 1.25 mm • Temperature sensor • Designed for radiation hardness • M. Firlej, et al., “An lpGBT sub-system for Total Ionizing Dose (TID): 200 Mrad environmental monitoring and control of • Extensive SEU protection (TMR, FEC) experiments” (Fri @ 09:50) 4 Communicates with • The counting room • Optical fibre links • The FE modules / ASICs • Electrical links (eLinks) • The Number and Bandwidth of eLinks is programmable • For Down eLinks • Bandwidth: 80/160/320 Mbps • Count: 16/8/4 • For Up eLinks 5 eLinks Special Features • Ad hoc signalling “standard” (CLPS) • Differential for noise immunity and EMI • 100 W for good signal integrity • Low voltage swing for low power • eLink drivers (eTx) • Programmable amplitude • Programmable pre-emphasis • Data invert function • eLink Receivers (eRx) • Programmable equalization (3 settings) • Data invert function D. Guo, et al., “The eTx line driver and the eRx line receiver: two building blocks • Hi – Z or 100 W termination for data and clock transmission using the • External biasing for DC coupling CLPS standard” (Tue @ 17:20) • Internal biasing for AC Coupling • Phase – aligner mechanisms for error S. Kulis, et al. “A multi-channel multi-data free data reception rate circuit for phase alignment of data in • manual / semi-automatic / automatic the lpGBT” (Fri @ 11:30) 6 High – Speed links Special Features • Transmitter RX Continuous Time Linear Equalizer • 5.12 / 10.24 Gbps • Programmable amplitude • Programmable pre-emphasis • Receiver • 2.56 Gbps • Programmable equalization • Reference and Reference-less locking • Built-In test features • HS – Loopback (2.56 Gbps) • PRBS generators / checkers • Eye Opening Monitor Q Sun, et al., “Downlink Equalization and • FEC error counter Eye Opening Monitor in the lpGBT” (Thu @ 10:00) 7 Timing Functions • Deterministic & fixed latency • For clocks • For data (up and down links) • Programmable frequency clock outputs • 29 outputs • 40 / 80 / 160 / 320 / 640 / 1280 MHz • Programmable phase/frequency clock outputs • 4 outputs • 50 ps phase-resolution • 40 / 80 / 160 / 320 / 640 / 1280 MHz S. Biereigel, et al., “The lpGBT PLL and • Low jitter CDR Architecture, Performance and SEE • RMS < 5 ps @ 40 MHz Robustness” (Fri @ 09:00) 8 Built In Test Features • Ring oscillators All curves normalized to CH1 at 1.2V • Four instances VDD = 1.08 / 1.2 / 1.32 V • One in each “corner” of the ASIC “Shades” correspond to the four channels • The chip can measure their oscillation frequency T = 10˚ C f ≈ 40 MHz @ 1.2 V • To estimate the “process corner” nom • To track the degradation with TID • Not a “dosimeter”! • SEU Monitoring Memory • 2500 Self Resetting Memory cells • Upset rate estimation! • TMR Testing • Enables/disables clock TMR • Verification of TMR during production 9 The lpGBT is Low-Power! • CMS PS Module (10Gbs, FEC5) 410 mW (@ Vdd = 1.2V) • Uplink 14 x 640 Mbps • Downlink 2 x 320 Mbps • eClocks 2 x 320 MHz + 2 x 640 MHz • CMS 2S Module (5Gbs, FEC12) 330mW (@ Vdd = 1.2V) • Uplink 10 x 320 Mbps • Downlink 2 x 320 Mbps • eClocks 2 x 320 MHz • CMS Pixels (10Gbs, FEC5) 320mW (@ Vdd = 1.2V) • Uplink 7 x 1.28 Gbps • Downlink 7 x 160 Mbps • eClocks disabled • ATLAS ITK Strips (10Gbs, FEC5) 380 mW (@ Vdd = 1.2V) • Uplink 14 x 640 Mbps • Downlink 8 x 160 Mbps • eClocks 4 x 160MHz • Low speed system (10Gbs, FEC5) 490 mW (@ Vdd = 1.2V) • Uplink 28 x 320 Mbps • Downlink 16 x 80 Mbps • eClocks 16 x 40 MHz 10 lpGBT Prototyping • Tapeout • 25/07/2018 • 1st Prototypes • 300 Pieces • Foundry done: 12/10/2018 (die at CERN) • Packaging done: 21/11/2018 (packaged chips at CERN) • Evaluation testing • Chips proved “99.9% functional”! • A few “functions” need performance improvement! • 2nd Prototype batch • 300 chips ordered Dec 2018 • 1st + 2nd batch • 50 “naked” chips for SEU and TID testing • 150 ASICs distributed to the users • Currently 400 tested chips still available for distribution • 3rd Prototype batch • 400 chips ordered July 2019 11 Testing • Test system Evaluation Testing @ CERN • Based on the Xilinx Virtex-7 FPGA VC707 Evaluation Kit Testing started November 2018 and a custom mezzanine board • Test cycle: • More than 1000 parameters measured at 7 supply SEU – Heavy Ions Heavy Ion Facility (HIF) voltages (including [rough] characterization of some March 2019 @ UCL Louvain, Belgium circuits: BERT, ADC, DAC,…) • All this in ≈ 220 s SEU – Two Photon Testing Two Photon Absorption (TPA) facility May 2019 @ KU Leuven, Belgium TID – X-Ray (up to 500 Mrad) X – Ray facility May / June 2019 @ CERN TID – Annealing @ CERN July 2019 Temperature (-25 ˚C to 60 ˚C) @ CERN J. Mendez, et al., “LpGBT Tester: an FPGA S. Biereigel, et al., “Methods for Clock July 2019 based test system for the lpGBT ASIC” Signal Characterization using FPGA (Tue @ 17:20) Peripherals” (Thru @ 16:55) 12 Performance (1/…) Function Circuit Functionality Performance TID SEU ASIC Control I2C Slave (1) IC channel N.A. EC port N.A. Configuration memory X eFuses X N.A. Startup & WD Power ON RST Brown-Out Detector X X N.A. (1) See note (7) Legend – Functionality/performance good! – Functionality/performance satisfactory but some aspects of it need improvement! X – Functionality/performance unsatisfactory must be reviewed! N.A. – Does Not Apply or wasn’t specifically tested. 13 Performance (2/…) Function Circuit Functionality Performance TID SEU HS Transmitter PLL/CDR (2) Tx @ 5.12 Gbps Tx @ 10.24 Gbps PRBS Generators N.A. HS loopback N.A. N.A. HS Receiver Equalizer CDR Frame Aligner (3) Rx @ 2.56 Gbps Eye Opening Monitor N.A. N.A. PRBS Checkers N.A. N.A. (2) See: S. Biereigel, et al., “The lpGBT PLL and CDR Architecture, Performance and SEE Robustness” (Fri @ 09:00) (3) Frame aligner fails to capture some of the unlock conditions making for a relatively long relocking time after an SEU 14 Performance (3/…) Function Circuit Functionality Performance TID SEU ePortRx Deserializer (4) Phase-Aligner PRBS Checkers N.A. N.A. ePortTx Serializer PRBS Generators N.A. N.A. Mirror function eTx eTx + pre-emphasis eRx eRx + equalization (4) See: S. Kulis, et al. “A multi-channel multi-data rate circuit for phase alignment of data in the lpGBT” (Fri @ 11:30) 15 Performance (4/…) Function Circuit Functionality Performance TID SEU Experiment control and monitoring I2C master (x3) (5) N.A. GPIO REST OUT Reference voltage N.A. Temperature sensor N.A. 8[12]-bit Voltage DAC N.A. 8-bit Current DAC N.A. 10-bit ADC N.A. (5) The Yield of the I2C masters is low. Particularly, in about 43% of the ASICs at least one of the I2C masters fails. This is due to a timing problem (identified) in the logic. The yield of master “0” is the lowest. “Curiously”, some of the channels might “popup back into life” with Total Irradiation Dose! 16 Performance (5/…) Function Circuit Functionality Performance TID SEU Clocks eClocks (6) Phase-Shifter Process Monitors and Testing Ring oscillator (x4) N.A. SEU Monitoring Memory N.A. TMR Testing (7) N.A. N.A. N.A. Power Consumption (6) Measurements show the presence of systematic jitter (approaching ±10 ps P-P) in all the clocks except at 40 MHz. Additionally, significant duty cycle distortion is present in the high frequency clocks. This phenomena is not yet well understood, although the systematic jitter can be correlated with digital activity in the ASIC. (7) A logic mistake (identified) prevents accessing the ASIC through the I2C interface once one of the TMR clocks (40 MHz) is disabled! 17 TID and Power Consumption @ 10 Gbps & FEC 12 1.32 V 1.20 V 1.08 V VDD (“All that is digital + I/O”) VDDTX (HS TX) VDDRX (HS RX + PLL + CLK GEN) 18 eFuses • At least for lpGBTs serving as masters, configuration data is read from the eFuses at Power-Up Reading the eFuses: Error Probabilities • This has to be done reliably so that communications can be established with the frontend modules and the counting room • However, X-ray irradiation tests have proven the fuse reading process to degrade with TID • At around 150 Mrad, “bit flips” can be observed during the read process! • Solutions to be implemented • Redesign the sense amplifier to avoid an offset buildup with TID • Add CRC to the configuration.
Recommended publications
  • Name Synopsis Description Arguments Options
    W3M(1) General Commands Manual W3M(1) NAME w3m − a text based web browser and pager SYNOPSIS w3m [OPTION]... [ file | URL ]... DESCRIPTION w3m is a text based browser which can display local or remote web pages as well as other documents. It is able to process HTML tables and frames but it ignores JavaScript and Cascading Style Sheets. w3m can also serveasapager for text files named as arguments or passed on standard input, and as a general purpose directory browser. w3m organizes its content in buffers or tabs, allowing easy navigation between them. With the w3m-img extension installed, w3m can display inline graphics in web pages. And whenever w3m’s HTML rendering capabilities do not meet your needs, the target URL can be handed overtoagraphical browser with a single command. Forhelp with runtime options, press “H” while running w3m. ARGUMENTS When givenone or more command line arguments, w3m will handle targets according to content type. For web, w3m gets this information from HTTP headers; for relative orabsolute file system paths, it relies on filenames. With no argument, w3m expects data from standard input and assumes “text/plain” unless another MIME type is givenbythe user. If provided with no target and no fallback target (see for instance option −v below), w3m will exit with us- age information. OPTIONS Command line options are introduced with a single “−” character and may takeanargument. General options −B with no other target defined, use the bookmark page for startup −M monochrome display −no-mouse deactivate mouse support −num display each line’snumber −N distribute multiple command line arguments to tabs.
    [Show full text]
  • Maelstrom Web Browser Free Download
    maelstrom web browser free download 11 Interesting Web Browsers (That Aren’t Chrome) Whether it’s to peruse GitHub, send the odd tweetstorm or catch-up on the latest Netflix hit — Chrome’s the one . But when was the last time you actually considered any alternative? It’s close to three decades since the first browser arrived; chances are it’s been several years since you even looked beyond Chrome. There’s never been more choice and variety in what you use to build sites and surf the web (the 90s are back, right?) . So, here’s a run-down of 11 browsers that may be worth a look, for a variety of reasons . Brave: Stopping the trackers. Brave is an open-source browser, co-founded by Brendan Eich of Mozilla and JavaScript fame. It’s hoping it can ‘save the web’ . Available for a variety of desktop and mobile operating systems, Brave touts itself as a ‘faster and safer’ web browser. It achieves this, somewhat controversially, by automatically blocking ads and trackers. “Brave is the only approach to the Web that puts users first in ownership and control of their browsing data by blocking trackers by default, with no exceptions.” — Brendan Eich. Brave’s goal is to provide an alternative to the current system publishers employ of providing free content to users supported by advertising revenue. Developers are encouraged to contribute to the project on GitHub, and publishers are invited to become a partner in order to work towards an alternative way to earn from their content. Ghost: Multi-session browsing.
    [Show full text]
  • The Elinks Manual the Elinks Manual Table of Contents Preface
    The ELinks Manual The ELinks Manual Table of Contents Preface.......................................................................................................................................................ix 1. Getting ELinks up and running...........................................................................................................1 1.1. Building and Installing ELinks...................................................................................................1 1.2. Requirements..............................................................................................................................1 1.3. Recommended Libraries and Programs......................................................................................1 1.4. Further reading............................................................................................................................2 1.5. Tips to obtain a very small static elinks binary...........................................................................2 1.6. ECMAScript support?!...............................................................................................................4 1.6.1. Ok, so how to get the ECMAScript support working?...................................................4 1.6.2. The ECMAScript support is buggy! Shall I blame Mozilla people?..............................6 1.6.3. Now, I would still like NJS or a new JS engine from scratch. .....................................6 1.7. Feature configuration file (features.conf).............................................................................7
    [Show full text]
  • Arena Training Guide for Administrators Table of Contents
    Arena training guide for administrators Table of contents Preface 4 About this guide 4 Get to know Axiell 4 About Arena 5 Liferay 5 Portlets 5 Language handling 5 Styling 5 Arena architecture 6 Administration in Arena 7 Arena articles 7 Signing in to Arena 7 Signing in to Liferay 8 The Arena administration user interface 8 Accounts 11 User types in Arena 11 Permissions 12 Managing users in Liferay 14 Managing a roles in Liferay 16 Arena portal site administration 17 Admin: installation details 17 Site settings 19 Managing pages 21 Page permissions 21 Navigation 21 Configuring pages 21 Creating a page 22 Deleting a page 23 Arena Nova 25 Focus shortcuts 25 That’s how it works-articles 25 News articles 26 Event articles 26 Branch articles 26 FAQ articles 27 Image resources and image handling 27 Portlets in Arena 28 Symbols in the list of portlets 28 Portlets required for basic Arena functionality 28 Placement of portlets 29 Configuring portlets 30 The control toolbar 30 Look and feel 30 2 Assigning user permissions to portlets and pages 30 Liferay articles 32 Creating a Liferay article 32 Adding a Liferay article on a page 32 Arena articles 33 Approving articles 33 Handling abuse and reviews 34 Admin: moderation 34 Searching in catalogue records 36 Single words 36 Phrases 36 Multiple words 36 Truncation 36 Boolean operators 36 Fuzzy search and the similarity factor 36 Search parameters for catalogue records 37 Search parameters for Arena articles 40 Examples 40 Linking and syntaxes 41 Dynamic links 41 Syntax for similar titles 42 Syntax for other titles by the same author 42 Syntax for dynamic news list 42 3 Preface Simple, stylish and engaging, Arena is perfect for archives, libraries and museums to showcase and organize their collections in the public domain.
    [Show full text]
  • UC-Elinks Direct Linking Usability Report UC-Elinks Project
    UC-eLinks Direct Linking Usability Report UC-eLinks Project March 5, 2009 Report Author: Jane Lee, CDL Editor: Felicia Poe, CDL On-Site Coordinator: Laura Calverley, UC Berkeley Report URL: http://www.cdlib.org/inside/assess/evaluation_activities/docs/2009/UC- eLinks_directLinking_jan2009.pdf UC-eLinks Direct Linking Usability Report Table of Contents 1 INTRODUCTION............................................................................................................................. 3 2 SETTING THE STAGE: GRADUATE RESEARCHERS............................................................. 4 2.1 WHAT USERS DO........................................................................................................................ 4 2.2 WHAT USERS WANT ................................................................................................................... 4 2.3 LIBRARY WEBSITE AS AN ACCESS POINT .................................................................................... 4 2.4 WHY GOOGLE SCHOLAR?........................................................................................................... 5 3 UC-ELINKS: DON’T MAKE ME THINK ....................................................................................... 7 3.1 SIMPLIFY, SIMPLIFY, SIMPLIFY .................................................................................................... 7 3.2 UC-ELINKS HEADER INFORMATION ............................................................................................. 9 3.3 THE YELLOW BUTTON................................................................................................................
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • A Multimodal Browser for the World-Wide Web
    A multimodal browser for the World-Wide Web David G. Novick, David House, Mark Fanty, Ronald A. Cole Center for Spoken Language Understanding Oregon Graduate Institute {novick, dhouse, fanty, cole}@cse.ogi.edu Abstract Spoken Language Access to Multimedia (SLAM) is a spoken language extension to the graphical user interface of the World-Wide Web browser Mosaic. SLAM uses the complementary modalities of spoken language and direct manipulation to improve the interface to the vast variety of information available on the Internet. To make the advantages of spoken language systems available to a wider audience, the speech recognition aspects can be performed remotely across a network. This paper describes the issues and architecture of what is believed to be the first spo- ken-language interface to the World-Wide Web to be easily implemented across platforms. I. Introduction The World-Wide Web (WWW) (CERN, 1994) is a network-based standard for hypermedia documents that combines documents prepared in Hypertext Markup Language (HTML) (NCSA, 1994a) with an extensible set of multimedia resources. The most popular browser for the WWW is Mosaic (NCSA, 1994b), a cross-platform program developed and distributed by NCSA, now running in X-based Unix, Macintosh and PC-Windows environments. As a hypermedia viewer, Mosaic combines the flexibility and navigability of hypermedia with multimedia outputs such as audio and GIF images. The World-Wide Web, especially viewed with Mosaic, is phenomenally popular. It is an archetypal interface to what will become the national information infrastructure. By mid-Spring of 1994, Internet traffic was doubling about every six months.
    [Show full text]
  • The Tor Dark Net
    PAPER SERIES: NO. 20 — SEPTEMBER 2015 The Tor Dark Net Gareth Owen and Nick Savage THE TOR DARK NET Gareth Owen and Nick Savage Copyright © 2015 by Gareth Owen and Nick Savage Published by the Centre for International Governance Innovation and the Royal Institute of International Affairs. The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of the Centre for International Governance Innovation or its Board of Directors. This work is licensed under a Creative Commons Attribution — Non-commercial — No Derivatives License. To view this license, visit (www.creativecommons.org/licenses/by-nc- nd/3.0/). For re-use or distribution, please include this copyright notice. 67 Erb Street West 10 St James’s Square Waterloo, Ontario N2L 6C2 London, England SW1Y 4LE Canada United Kingdom tel +1 519 885 2444 fax +1 519 885 5450 tel +44 (0)20 7957 5700 fax +44 (0)20 7957 5710 www.cigionline.org www.chathamhouse.org TABLE OF CONTENTS vi About the Global Commission on Internet Governance vi About the Authors 1 Executive Summary 1 Introduction 2 Hidden Services 2 Related Work 3 Study of HSes 4 Content and Popularity Analysis 7 Deanonymization of Tor Users and HSes 8 Blocking of Tor 8 HS Blocking 9 Conclusion 9 Works Cited 12 About CIGI 12 About Chatham House 12 CIGI Masthead GLOBAL COMMISSION ON INTERNET GOVERNANCE PAPER SERIES: NO. 20 — SEPTEMBER 2015 ABOUT THE GLOBAL ABOUT THE AUTHORS COMMISSION ON INTERNET Gareth Owen is a senior lecturer in the School of GOVERNANCE Computing at the University of Portsmouth.
    [Show full text]
  • Cookie Policy
    COOKIE POLICY When you visit our website https://www.arenamedia.com/ some cookies or other tracking technologies may be stored on your device (computer, tablet or smartphone). This Cookie Policy contains information on what cookies are, the type of cookies used by HAVAS S.A. on the website https://www.arenamedia.com/ and the purpose of such use, and your choices regarding cookies. This Cookie Policy should be read together with the Havas Data Protection Policy and Terms of Use. WHAT ARE COOKIES AND OTHER TRACKING TECHNOLOGIES? Cookies are small text files which contain an amount of data generated when you browse on a website and installed in your internet browser. The other tracking technologies, such as web beacons, pixels or clear gifs, work similarly to cookies. Cookies and other tracking technologies are used to monitor your activity on a website by enabling us (through first party cookies) or thirds (through third party cookies) to collect information about how you use the website and enhance the way it works and your visit on our website. There are two types of cookies: session cookies and persistent cookies. • Session cookies are temporary and therefore automatically deleted from your device every time you close your browser; • Persistent cookies remain on your device for a period of time specified in the cookie and are activated every time you visit the website which installed it. YOUR CHOICE REGARDING COOKIES You have a number of options to control or limit how we or third parties use cookies: • You can choose to delete all or some cookies from your device through your browser settings; • You can choose to prevent cookies from being installed on your device through your browser settings; • You can enable or disable cookies we use on our website by clicking on the “cookie setting” at the bottom of our website.
    [Show full text]
  • Emacs-W3m User's Manual
    This file documents emacs-w3m, an Emacs interface tow3m. This edition is for emacs-w3m version 1.4.567. Emacs-w3m User's Manual An Emacs interface to w3m for emacs-w3m version 1.4.567 The emacs-w3m development team Copyright c 2000-2014 TSUCHIYA Masatoshi Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 or any later version published by the Free Software Foundation. This document is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABIL- ITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this document; see the file COPYING. If not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. i Table of Contents Emacs-w3m User's Manual :::::::::::::::::::::::: 1 1 Preliminary remarks:::::::::::::::::::::::::::: 2 2 It's so easy to begin to use emacs-w3m ::::::: 3 2.1 What version of Emacs can be used? ::::::::::::::::::::::::::: 3 2.2 Using w3m: the reason why emacs-w3m is fast:::::::::::::::::: 3 2.3 Things required to run emacs-w3m ::::::::::::::::::::::::::::: 3 2.4 Installing emacs-w3m :::::::::::::::::::::::::::::::::::::::::: 5 2.5 Installing on non-UNIX-like systems :::::::::::::::::::::::::::: 6 2.6 Minimal settings to run emacs-w3m :::::::::::::::::::::::::::: 7 3 Basic usage :::::::::::::::::::::::::::::::::::::: 8
    [Show full text]
  • Recommended Google Chrome Extensions
    Recommended Google Chrome Extensions Pedestrian Janus legislate very resistlessly while Micheil remains sleeveless and subparallel. When Judy sparks his flowing damasks not inside enough, is Derby sword-shaped? Self-satisfied Millicent never agonize so modestly or assembling any suffixes apolitically. Simply highlight the image and save it. With the help of Ghostery, revoke access to emails that have already been opened, you can also whitelist just the websites you need while you work. Once you take a screenshot of a selected area of your screen or an entire web page, TLDR just started working again. Think of two simple examples. Grammarly is by far one of the best Chrome extensions, Yahoo Mail with dynamic email signatures. What are the benefits of Chrome Extensions? Using these insights, to help you save interesting articles and read it later. Once installed, Best Buy and Newegg. When you connect again, too. Facebook site that the social media giant hoovers up your data. Or even similar websites and web pages to your own? Search Ventures Pty Ltd, site audit, track and manage proposals for your creative business. Please submit your information below, saved passwords, it will suggest a date if you click the calendar icon next to the task name. This extension can erase temporary files and removes download history. Enhance your written communication everywhere you type! These will help out and save a lot of time. Best Chrome Extensions gHacks Technology News. This lets the user can keep an eye on what is happening on other websites and applications and interact with them as well.
    [Show full text]
  • How Do Tor Users Interact with Onion Services?
    How Do Tor Users Interact With Onion Services? Philipp Winter Anne Edmundson Laura M. Roberts Princeton University Princeton University Princeton University Agnieszka Dutkowska-Zuk˙ Marshini Chetty Nick Feamster Independent Princeton University Princeton University Abstract messaging [4] and file sharing [15]. The Tor Project currently does not have data on the number of onion Onion services are anonymous network services that are service users, but Facebook reported in 2016 that more exposed over the Tor network. In contrast to conventional than one million users logged into its onion service in one Internet services, onion services are private, generally not month [20]. indexed by search engines, and use self-certifying domain Onion services differ from conventional web services names that are long and difficult for humans to read. In in four ways; First, they can only be accessed over the Tor this paper, we study how people perceive, understand, and network. Second, onion domains are hashes over their use onion services based on data from 17 semi-structured public key, which make them difficult to remember. Third, interviews and an online survey of 517 users. We find that the network path between client and the onion service is users have an incomplete mental model of onion services, typically longer, increasing latency and thus reducing the use these services for anonymity and have varying trust in performance of the service. Finally, onion services are onion services in general. Users also have difficulty dis- private by default, meaning that users must discover these covering and tracking onion sites and authenticating them. sites organically, rather than with a search engine.
    [Show full text]