Applications: M

Total Page:16

File Type:pdf, Size:1020Kb

Applications: M Applications: M This chapter contains the following sections: • Mac App Store, on page 7 • MacOS Server Admin, on page 8 • MacPorts, on page 9 • Macy's, on page 10 • Mafiawars, on page 11 • Magenta Logic, on page 12 • MagicJack, on page 13 • Magicland, on page 14 • MagPie, on page 15 • Mail.Ru, on page 16 • Mail.ru Attachment, on page 17 • Mailbox, on page 18 • Mailbox-LM, on page 19 • MailChimp, on page 20 • MAILQ, on page 21 • maitrd, on page 22 • Malware Defense System, on page 23 • Malwarebytes, on page 24 • Mama.cn, on page 25 • Management Utility, on page 26 • MANET, on page 27 • Manolito, on page 28 • Manorama, on page 29 • Manta, on page 30 • MAPI, on page 31 • MapleStory, on page 32 • MapMyFitness, on page 33 • MapQuest, on page 34 • Marca, on page 35 • Marine Traffic, on page 36 • Marketo, on page 37 • Mashable, on page 38 Applications: M 1 Applications: M • Masqdialer, on page 39 • Match.com, on page 40 • Mathrubhumi, on page 41 • Mathworks, on page 42 • MATIP, on page 43 • MawDoo3, on page 44 • MaxDB, on page 45 • MaxPoint Interactive, on page 46 • Maxymiser, on page 47 • MC-FTP, on page 48 • McAfee, on page 49 • McAfee AutoUpdate, on page 50 • McIDAS, on page 51 • mck-ivpip, on page 52 • mcns-sec, on page 53 • MCStats, on page 54 • mdc-portmapper, on page 55 • MDNS, on page 56 • MdotM, on page 57 • Me.com, on page 58 • Me2day, on page 59 • Media Hub, on page 60 • Media Innovation Group, on page 61 • Media Stream Daemon, on page 62 • Media6Degrees, on page 63 • Mediabot, on page 64 • MediaFire, on page 65 • MediaMath, on page 66 • MediaMind, on page 67 • Mediaplex, on page 68 • MediaV, on page 69 • Medipac, on page 70 • Medium, on page 71 • Meebo, on page 72 • Meeting Maker, on page 73 • Meetup, on page 74 • Mega, on page 75 • Megaco, on page 76 • MegaMeeting, on page 77 • Megaproxy, on page 78 • Megashare, on page 79 • Megashares, on page 80 • Megaupload, on page 81 • MelOn, on page 82 • Memcomm, on page 83 • Menards, on page 84 Applications: M 2 Applications: M • Mendeley, on page 85 • Mention, on page 86 • Mercado Livre, on page 87 • Merdeka.com, on page 88 • Meregister, on page 89 • MERIT Internodal Protocol, on page 90 • Merriam-Webster, on page 91 • Mesmo Games, on page 92 • Messenger, on page 93 • Meta5, on page 94 • Metacafe, on page 95 • MetaCrawler, on page 96 • MetaFilter, on page 97 • Metagram, on page 98 • Meter, on page 99 • MF Cobol, on page 100 • MFE, on page 101 • MFTP, on page 102 • MGCP, on page 103 • MGID, on page 104 • Mgoon, on page 105 • Mibbit, on page 106 • Michigan Radio, on page 107 • micom-pfs, on page 108 • MICP, on page 109 • Micromuse-lm, on page 110 • Microsoft, on page 111 • Microsoft Access, on page 112 • Microsoft Ads, on page 113 • Microsoft AutoUpdate, on page 114 • Microsoft CRM Dynamics, on page 115 • Microsoft CryptoAPI, on page 116 • Microsoft download, on page 117 • Microsoft Dynamics CRM, on page 118 • Microsoft Excel, on page 119 • Microsoft FrontPage Server Extensions, on page 120 • Microsoft Global Catalog, on page 121 • Microsoft NCSI, on page 122 • Microsoft Powerpoint, on page 123 • Microsoft Rome, on page 124 • Microsoft Shuttle, on page 125 • Microsoft Store, on page 126 • Microsoft System Center Operations Manager, on page 127 • Microsoft Update, on page 128 • Microsoft Visual Studio, on page 129 • Microsoft Web Platform Installer, on page 130 Applications: M 3 Applications: M • Microsoft Windows Live Services Authentication, on page 131 • Microsoft Windows Messenger, on page 132 • Microsoft WNS, on page 133 • Microsoft Word, on page 134 • Microsoft-DS, on page 135 • Middle East Broadcasting Center, on page 136 • Midori, on page 137 • Mikogo, on page 138 • Millennial Media, on page 139 • Milliyet, on page 140 • Minecraft, on page 141 • Mini SQL, on page 142 • Mininova, on page 143 • Mint.com, on page 144 • Minus, on page 145 • MissLee, on page 146 • Mister Wong, on page 147 • MIT ML Device, on page 148 • MIT Spooler, on page 149 • mit-ml-dev, on page 150 • MixBit, on page 151 • Mixi, on page 152 • Mixpanel, on page 153 • Mixx, on page 154 • MJ12 Bot, on page 155 • MKRU, on page 156 • MKRU Streaming, on page 157 • MLive, on page 158 • MLN Advertising, on page 159 • MMS, on page 160 • Moat, on page 161 • Mobaga Town, on page 162 • Mobile Safari, on page 163 • Mobile Theory, on page 164 • MobileAsset, on page 165 • MobileCore, on page 166 • MobileIP, on page 167 • MobilIP-MN, on page 168 • Mobility XE protocol, on page 169 • MobiTV, on page 170 • Modbus, on page 171 • MOG, on page 172 • Mojang, on page 173 • Mojiva, on page 174 • Mondex, on page 175 • Monetate, on page 176 Applications: M 4 Applications: M • Monitor, on page 177 • Monster World, on page 178 • Monster.com, on page 179 • Moodlebot, on page 180 • Mop.com, on page 181 • MoPub, on page 182 • MoreFreeCamSecret, on page 183 • Morgan Stanley, on page 184 • Morpheus, on page 185 • MortgageWare, on page 186 • Motley Fool, on page 187 • Motorola, on page 188 • Motrixi, on page 189 • Movenetworks, on page 190 • Movieclips, on page 191 • MovieTickets.com, on page 192 • Mozilla, on page 193 • MP4, on page 194 • MPEG, on page 195 • MPEG Transport Stream, on page 196 • MPLS, on page 197 • MPLS Unicast, on page 198 • MPM, on page 199 • MPM FLAGS Protocol, on page 200 • MPP, on page 201 • MPTN, on page 202 • MQTT, on page 203 • MRM, on page 204 • MS CDN, on page 205 • MS CRS, on page 206 • MS Exchange Routing, on page 207 • MS Global Catalog Secure, on page 208 • MS Office Existence Discovery, on page 209 • MS Office Protocol Discovery, on page 210 • MS OLAP, on page 211 • MS Online, on page 212 • MS SQL, on page 213 • MSA, on page 214 • MSDN, on page 215 • MSDP, on page 216 • MSG, on page 217 • msg-icp, on page 218 • MSMQ, on page 219 • MSN, on page 220 • MSN Messenger, on page 221 • msnbot, on page 222 Applications: M 5 Applications: M • MSNP, on page 223 • MSOC File Transfer, on page 224 • MSP, on page 225 • MTA, on page 226 • MTP, on page 227 • MTv, on page 228 • MuchShare, on page 229 • Multiling HTTP, on page 230 • Multiplex, on page 231 • Multiply, on page 232 • Multiupload, on page 233 • MUMPS, on page 234 • Munin, on page 235 • Music Hub, on page 236 • Musical.ly, on page 237 • Mute, on page 238 • Mutt, on page 239 • MUX, on page 240 • MUZU TV, on page 241 • MyBuys, on page 242 • MyDownloader, on page 243 • MyHeritage, on page 244 • Mylex-mapd, on page 245 • MyLife, on page 246 • MyOnlineArcade, on page 247 • MyPCBackup, on page 248 • MySpace, on page 249 • MySpace Chat, on page 250 • Myspace Music, on page 251 • Myspace Photos, on page 252 • Myspace Videos, on page 253 • MySQL, on page 254 • myUdutu, on page 255 • MyWay, on page 256 • MyWebSearch, on page 257 Applications: M 6 Applications: M Mac App Store Mac App Store Description Online store for Mac OSX products. Different than Apple App Store, which is for iOS products. Categories web services provider,e-commerce Tags Risk Very Low Business Relevance Low Applications: M 7 Applications: M MacOS Server Admin MacOS Server Admin Description Remote administration/configuration tools for Mac OS X Server. Categories network protocols/services Tags Risk Medium Business Relevance Medium Applications: M 8 Applications: M MacPorts MacPorts Description Package for software installation. Categories web services provider Tags encrypts communications,adds/installs other Risk Medium Business Relevance Very Low Applications: M 9 Applications: M Macy's Macy's Description Department store chain. Categories e-commerce Tags displays ads Risk Very Low Business Relevance Low Applications: M 10 Applications: M Mafiawars Mafiawars Description A multiplayer browser game created by Zynga. It is on several social networking sites and on the iPhone. Categories gaming Tags not work related,Facebook game Risk Very Low Business Relevance Very Low Applications: M 11 Applications: M Magenta Logic Magenta Logic Description Registered with IANA on port 313 tcp/udp. Categories network protocols/services Tags Risk Very Low Business Relevance Medium Applications: M 12 Applications: M MagicJack MagicJack Description Magic Jack is a USB device that allows any phone to make free calls within the US and Canada. Categories multimedia (other) Tags Risk Very High Business Relevance Medium Applications: M 13 Applications: M Magicland Magicland Description Facebook game application. Categories web services provider,gaming Tags displays ads,console gaming,Facebook game Risk Very Low Business Relevance Low Applications: M 14 Applications: M MagPie MagPie Description A web crawler. Categories web content aggregators Tags Risk Low Business Relevance Medium Applications: M 15 Applications: M Mail.Ru Mail.Ru Description Runet's free e-mail service. Categories web services provider,email,multimedia (TV/video) Tags displays ads,sends mail,share photos Risk Very Low Business Relevance Low Applications: M 16 Applications: M Mail.ru Attachment Mail.ru Attachment Description Attaching a file to an email on mail.ru. Categories web services provider, email, multimedia (TV/video), multimedia (music/audio) Tags displays ads, sends mail Risk Medium Business Relevance Low Applications: M 17 Applications: M Mailbox Mailbox Description App for Email service. Categories web services provider,email,mobile application Tags SSL protocol Risk Medium Business Relevance Low Applications: M 18 Applications: M Mailbox-LM Mailbox-LM Description Mailbox-LM is a used by FTP Daemon. Categories network protocols/services Tags Risk Medium Business Relevance Medium Applications: M 19 Applications: M MailChimp MailChimp Description Email service provider.
Recommended publications
  • South Korea Section 3
    DEFENSE WHITE PAPER Message from the Minister of National Defense The year 2010 marked the 60th anniversary of the outbreak of the Korean War. Since the end of the war, the Republic of Korea has made such great strides and its economy now ranks among the 10-plus largest economies in the world. Out of the ashes of the war, it has risen from an aid recipient to a donor nation. Korea’s economic miracle rests on the strength and commitment of the ROK military. However, the threat of war and persistent security concerns remain undiminished on the Korean Peninsula. North Korea is threatening peace with its recent surprise attack against the ROK Ship CheonanDQGLWV¿ULQJRIDUWLOOHU\DW<HRQS\HRQJ Island. The series of illegitimate armed provocations by the North have left a fragile peace on the Korean Peninsula. Transnational and non-military threats coupled with potential conflicts among Northeast Asian countries add another element that further jeopardizes the Korean Peninsula’s security. To handle security threats, the ROK military has instituted its Defense Vision to foster an ‘Advanced Elite Military,’ which will realize the said Vision. As part of the efforts, the ROK military complemented the Defense Reform Basic Plan and has UHYDPSHGLWVZHDSRQSURFXUHPHQWDQGDFTXLVLWLRQV\VWHP,QDGGLWLRQLWKDVUHYDPSHGWKHHGXFDWLRQDOV\VWHPIRURI¿FHUVZKLOH strengthening the current training system by extending the basic training period and by taking other measures. The military has also endeavored to invigorate the defense industry as an exporter so the defense economy may develop as a new growth engine for the entire Korean economy. To reduce any possible inconveniences that Koreans may experience, the military has reformed its defense rules and regulations to ease the standards necessary to designate a Military Installation Protection Zone.
    [Show full text]
  • The Versatility of Microblogging
    www.spireresearch.com Side Click: The versatility of microblogging Microblogging is well-established globally as a way of keeping in touch with others about events occurring in their lives in real-time. Popular microblogging sites include Twitter in the U.S., Tencent QQ in China and Me2day in South Korea. Twitter has 140 million active users1, while China’s Tencent QQ has a staggering 721 million active user accounts2, ranking only behind Facebook in terms of being the most used social networking service worldwide. Microblogging allows users to combine blogging and instant messaging to post short messages on their profiles3; including small and conversational talk, self-promotion, spam and news 4 . On a deeper level, microblogging has altered the way people consume and generate information – not only democratizing the broadcasting of information but also enabling it to be done in real-time. Connecting to stakeholders There are several benefits to integrating microblogging into a business’s regular stakeholder communication regime. Consumers who “follow” a company’s products or services would be the first to know of any promotions. The company also benefits through obtaining prompt feedback and suggestions for improvement. A concerned investor 1 Twitter turns six, Twitter Blog, 21 March 21 2012 2 QQ Continues to Dominate Instant Messaging in China, eMarketer Inc., 27 April 2012 3 An Insight Into Microblogging Trends And Toolbars, ArticlesXpert,21 January 2012 4 Twitter Study – August 2009, PearAnalytics.com, August 2009 © 2012 Spire Research and Consulting Pte Ltd would want to be the first to know of any important news which might impact her returns.
    [Show full text]
  • Applications Log Viewer
    4/1/2017 Sophos Applications Log Viewer MONITOR & ANALYZE Control Center Application List Application Filter Traffic Shaping Default Current Activities Reports Diagnostics Name * Mike App Filter PROTECT Description Based on Block filter avoidance apps Firewall Intrusion Prevention Web Enable Micro App Discovery Applications Wireless Email Web Server Advanced Threat CONFIGURE Application Application Filter Criteria Schedule Action VPN Network Category = Infrastructure, Netw... Routing Risk = 1-Very Low, 2- FTPS-Data, FTP-DataTransfer, FTP-Control, FTP Delete Request, FTP Upload Request, FTP Base, Low, 4... All the Allow Authentication FTPS, FTP Download Request Characteristics = Prone Time to misuse, Tra... System Services Technology = Client Server, Netwo... SYSTEM Profiles Category = File Transfer, Hosts and Services Confe... Risk = 3-Medium Administration All the TeamViewer Conferencing, TeamViewer FileTransfer Characteristics = Time Allow Excessive Bandwidth,... Backup & Firmware Technology = Client Server Certificates Save Cancel https://192.168.110.3:4444/webconsole/webpages/index.jsp#71826 1/4 4/1/2017 Sophos Application Application Filter Criteria Schedule Action Applications Log Viewer Facebook Applications, Docstoc Website, Facebook Plugin, MySpace Website, MySpace.cn Website, Twitter Website, Facebook Website, Bebo Website, Classmates Website, LinkedIN Compose Webmail, Digg Web Login, Flickr Website, Flickr Web Upload, Friendfeed Web Login, MONITOR & ANALYZE Hootsuite Web Login, Friendster Web Login, Hi5 Website, Facebook Video
    [Show full text]
  • Interval Signature: Persistence and Distinctiveness of Inter-Event Time Distributions in Online Human Behavior
    Interval Signature: Persistence and Distinctiveness of Inter-event Time Distributions in Online Human Behavior Jiwan Jeong Sue Moon School of Computing School of Computing KAIST KAIST [email protected] [email protected] ABSTRACT all individuals in order to explicate or model the human be- Interval patterns, or inter-event time distributions that oc- havior [3, 13, 17, 25, 26, 36, 41]. On the contrary, we take cur in human activity, have long been an interest of many another angle and examine the diversity in individual distri- researchers studying human dynamics. While previous stud- butions of inter-event times, which we call interval pattern in ies have mostly focused on characterizing the aggregated this work. How does an individual’s interval pattern change inter-arrival patterns or finding universal patterns across all over time? Does it remain consistent or fluctuate from time individuals, we focus on the diversity among the patterns of to time? If the pattern is persistent, is it distinctive enough di↵erent individuals; the goal of this paper is to understand to characterize one from the others? how persistent an individual’s interval pattern is and how In this work we use four online datasets—Wikipedia edit distinctive it is from those of the others. We use Wikipedia, history, me2DAY, Twitter, and Enron email—to study the me2DAY, Twitter, and Enron email data to study the inter- interval patterns of users across di↵erent platforms. In par- val patterns of online human behavior. Our analysis reveals ticular, we have the entire history of Wikipedia and me2DAY, that individuals have robust and unique interval signatures.
    [Show full text]
  • Ii. L'essor Du Journalisme Citoyen
    Université Panthéon-Assas école doctorale de Sciences économiques et de gestion, Sciences de l’information et de la communication (ED455) Thèse de doctorat en Sciences de l’information et de la communication soutenue le 21 novembre 2012 Le journalisme amateur à l'ère d'Internet : illusion populaire ou nouvel espace de liberté 2012 - d'expression ? 11 Thèse de Doctorat / Doctorat de Thèse Minjung JIN Sous la direction de Josiane JOUET Membres du jury : Mme Josiane JOUET, Professeur à l’Université Paris II, Directeur de thèse M.Fabien GRANJON, Professeur à l’Université Paris VIII, Rapporteur M.Tristan MATTELART, Professeur à l’Université Paris VIII, Rapporteur M. Rémy RIEFFEL, Professeur à l’Université Paris II 2 JIN Minung | Thèse de doctorat | 11-2012 Avertissement La Faculté n’entend donner aucune approbation ni improbation aux opinions émises dans cette thèse ; ces opinions doivent être considérées comme propres à leur auteur. 3 JIN Minjung| Thèse de doctorat | 11-2012 4 JIN Minung | Thèse de doctorat | 11-2012 Remerciements Je tiens à remercier tout d’abord Josiane Jouët, directrice de thèse infatigable, toujours présente, patiente dans l’orientation. Je ne la remercierai jamais assez pour ses remarques pertinentes ainsi que ses conseils et ses encouragements. Sans elle, ce travail n’aurait pas vu le jour. J’adresse mes remerciements aux personnes qui ont directement participé à l’élaboration de ce travail : Toutes les personnes qui ont accepté de répondre à mes entretiens. Oh Yeun-ho pour m’avoir donné la possibilité d’intégrer le journalisme amateur en tant que membre de son équipe de reportage.
    [Show full text]
  • MASTER THESIS in Universal Design of ICT May 2017
    MASTER THESIS in Universal Design of ICT May 2017 The Accessibility of Chinese Social Media for People with Visual Impairments – the case of Weibo Zhifeng Liu Department of Computer Science Faculty of Technology, Art and Design Preface and Acknowledgement China is just beginning to pay attention to accessibility. There are 83 million people with disabilities in China, including 13 million people with visual impairments. Weibo is one of the most popular social media. There are 100 million daily active users. Almost every Chinese has his own Weibo account, which showed that Weibo has inevitable influence. It would be meaningful if Weibo is fully accessible, especially for people with visual impairments. Thus, through this project I would like to contribute to the research and practice concerning accessibility in China. Firstly, I would like to thank my supervisor Weiqin Chen for providing important instruction in the project and writing-up process. Secondly, I acknowledge the contribution of Information Accessibility Research Association (IARA) in China and the participants involving in survey and user testing for their support in this project. A research paper “How accessible is Weibo for people with visual impairments” based on this project has been accepted as a full paper by the AAATE 2017 (The Association for the Advancement of Assistive Technology in Europe). 15 May 2017, Oslo Zhifeng Liu 1 Abstract Weibo is one of the most widely used social media in China. It is the Chinese Twitter, which allow users to post 140 Chinese characters. Weibo has 100 million daily active users. People usually use it to get news and share their opinions since Weibo serves as micro-blogging.
    [Show full text]
  • Ubiquitous Sensor Networks and Its Application
    International Journal of Distributed Sensor Networks Ubiquitous Sensor Networks and Its Application Guest Editors: Tai-hoon Kim, Wai-Chi Fang, Carlos Ramos, Sabah Mohammed, Osvaldo Gervasi, and Adrian Stoica Ubiquitous Sensor Networks and Its Application International Journal of Distributed Sensor Networks Ubiquitous Sensor Networks and Its Application Guest Editors: Tai-hoon Kim, Wai-Chi Fang, Carlos Ramos, Sabah Mohammed, Osvaldo Gervasi, and Adrian Stoica Copyright © 2012 Hindawi Publishing Corporation. All rights reserved. This is a special issue published in “International Journal of Distributed Sensor Networks.” All articles are open access articles distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, pro- vided the original work is properly cited. Editorial Board Prabir Barooah, USA Jing Liang, China Hairong Qi, USA Richard R. Brooks, USA Weifa Liang, Australia Joel Rodrigues, Portugal W.-Y. Chung, Republic of Korea Wen-Hwa Liao, Taiwan Jorge Sa Silva, Portugal George P. Efthymoglou, Greece AlvinS.Lim,USA Sartaj K. Sahni, USA Frank Ehlers, Italy Zhong Liu, China Weihua Sheng, USA Yunghsiang S. Han, Taiwan Donggang Liu, USA Zhi Wang, China Tian He, USA Yonghe Liu, USA Sheng Wang, China Baoqi Huang, China Seng Loke, Australia Andreas Willig, New Zealand Chin-Tser Huang, USA Jun Luo, Singapore Qishi Wu, USA S. S. Iyengar, USA Jose R. Martinez-deDios, Spain Qin Xin, Norway Rajgopal Kannan, USA Shabbir N. Merchant, India Jianliang Xu, Hong Kong Miguel A. Labrador, USA Aleksandar Milenkovic, USA Yuan Xue, USA Joo-Ho Lee, Japan Eduardo Freire Nakamura, Brazil Fan Ye, USA Minglu Li, China Peter Csaba Olveczky,¨ Norway Ning Yu, China Shijian Li, China M.
    [Show full text]
  • The Relationship Between Local Content, Internet Development and Access Prices
    THE RELATIONSHIP BETWEEN LOCAL CONTENT, INTERNET DEVELOPMENT AND ACCESS PRICES This research is the result of collaboration in 2011 between the Internet Society (ISOC), the Organisation for Economic Co-operation and Development (OECD) and the United Nations Educational, Scientific and Cultural Organization (UNESCO). The first findings of the research were presented at the sixth annual meeting of the Internet Governance Forum (IGF) that was held in Nairobi, Kenya on 27-30 September 2011. The views expressed in this presentation are those of the authors and do not necessarily reflect the opinions of ISOC, the OECD or UNESCO, or their respective membership. FOREWORD This report was prepared by a team from the OECD's Information Economy Unit of the Information, Communications and Consumer Policy Division within the Directorate for Science, Technology and Industry. The contributing authors were Chris Bruegge, Kayoko Ido, Taylor Reynolds, Cristina Serra- Vallejo, Piotr Stryszowski and Rudolf Van Der Berg. The case studies were drafted by Laura Recuero Virto of the OECD Development Centre with editing by Elizabeth Nash and Vanda Legrandgerard. The work benefitted from significant guidance and constructive comments from ISOC and UNESCO. The authors would particularly like to thank Dawit Bekele, Constance Bommelaer, Bill Graham and Michuki Mwangi from ISOC and Jānis Kārkliņš, Boyan Radoykov and Irmgarda Kasinskaite-Buddeberg from UNESCO for their work and guidance on the project. The report relies heavily on data for many of its conclusions and the authors would like to thank Alex Kozak, Betsy Masiello and Derek Slater from Google, Geoff Huston from APNIC, Telegeography (Primetrica, Inc) and Karine Perset from the OECD for data that was used in the report.
    [Show full text]
  • Strong Regularities in Growth and Decline of Popularity of Social Media Services
    Strong Regularities in Growth and Decline of Popularity of Social Media Services Christian Bauckhage Kristian Kersting University of Bonn, TU Dortmund University, Fraunhofer IAIS Fraunhofer IAIS Bonn, Germany Dortmund, Germany ABSTRACT Google Trends Google Trends 100 shifted Gompertz 100 shifted Gompertz 80 80 We analyze general trends and pattern in time series that 60 60 40 40 characterize the dynamics of collective attention to social 20 20 media services and Web-based businesses. Our study is 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 based on search frequency data available from Google Trends (a) buzznet (b) failblog and considers 175 different services. For each service, we collect data from 45 different countries as well as global av- Google Trends Google Trends 100 shifted Gompertz 100 shifted Gompertz erages. This way, we obtain more than 8,000 time series 80 80 60 60 which we analyze using diffusion models from the economic 40 40 20 20 sciences. We find that these models accurately characterize 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 the empirical data and our analysis reveals that collective (c) flickr (d) librarything attention to social media grows and subsides in a highly regular and predictable manner. Regularities persist across Google Trends Google Trends 100 shifted Gompertz 100 shifted Gompertz regions, cultures, and topics and thus hint at general mech- 80 80 60 60 anisms that govern the adoption of Web-based services. We 40 40 discuss several cases in detail to highlight interesting find- 20 20 ings.
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • Gilbert SHANG NDI Faculty of Social Sciences, Universidad De Los Andes Bogota, Colombia [email protected]
    Gilbert SHANG NDI Faculty of Social Sciences, Universidad de los Andes Bogota, Colombia [email protected] WRITING THE WALL, RIGHTING THE WORLD. EXPLORING THE DIONYSIAN DIMENSIONS OF WALL GRAFFITI FROM THE AGORA TO FACEBOOK Recommended Citation: Shang Ndi, Gilbert. “Writing the Wall, Righting the World. Exploring the Dionysian Dimensions of Wall Graffiti from the Agora to Facebook.” Metacritic Journal for Comparative Studies and Theory 4.2 (2018): https://doi.org/10.24193/mjcst.2018.6.07 Abstract: The turn of the current century has witnessed the re-negotiation of materiality and the growing ascendancy of the virtual, the immaterial over the real or tangible. Though it would be presumptuous to claim that the virtual has totally assumed control over the real, it can be asserted that the figure of the wall as a transfusion between the real/virtual and the self/other has emerged between the two. Based on constructions of textuality articulated by theorists such as Roland Barthes and Friedrich Nietzsche, and a pastiche format that mimics the functionality of the wall of scription, this article brings together multiple enactments of mural scriptions that include the concrete, textual, textile, vegetative and the virtual in order to articulate the Dionysian property of wall-effects. It traces successive actualisations of the wall, analysing how the virtual Facebook wall assimilates and re-dynamizes the traits of the tangible walls through an array of intertextual/inter-medial modalities. Keywords: wall, graffiti, scription, wall-effects, abjection. Introduction The turn of the twenty-first century has witnessed the re-negotiation of materiality and the growing ascendancy of the virtual or immaterial over the real or tangible.
    [Show full text]
  • Web-Based Fingerprinting Techniques
    Web-based Fingerprinting Techniques V´ıtor Bernardo and Dulce Domingos LaSIGE, Faculdade de Ciencias,ˆ Universidade de Lisboa, Lisboa, Portugal Keywords: Browser Fingerprinting, Cross-browser Fingerprinting, Device Fingerprinting, Privacy, Fingerprint. Abstract: The concept of device fingerprinting is based in the assumption that each electronic device holds a unique set of physical and/or logical features that others can capture and use to differentiate it from the whole. Web-based fingerprinting, a particular case of device fingerprinting, allows website owners to differentiate devices based on the set of information that browsers transmit. Depending on the techniques being used, a website can track a device based on its browser features (browser fingerprinting) or based on system settings (cross-browser fingerprinting). The latter allows identification of the device even when more than one browser is used. Several different works have introduced new techniques over the last years proving that fingerprinting can be done in multiple ways, but there is not a consolidated work gathering all of them. The current work identifies known web-based fingerprinting techniques, categorizing them as which ones are browser and which are cross-browser and showing real examples of the data that can be captured with each technique. The study is synthesized in a taxonomy, which provides a clear separation between techniques, making it easier to identify the threats to security and privacy inherent to each one. 1 INTRODUCTION far more upsetting than simple cookies. In most cases, web-based fingerprinting is used to Device fingerprinting is based on the assumption that track users activity in sites and bind a device finger- no two devices are exactly alike and that profiles can print to a user profile (together with its preferences, be created by capturing the emanation patterns sent tastes and interests).
    [Show full text]