15831557.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

15831557.Pdf Rose_9780307451361_3p_all_r3.qxp:. 5/19/09 4:46 PM Page ii ALSO BY SCOTT ROSENBERG Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software N Rose_9780307451361_3p_all_r3.qxp:. 5/19/09 4:46 PM Page iii say everything HOW BLOGGING BEGAN, WHAT IT’S BECOMING, AND WHY IT MATTERS scott rosenberg CROWN PUBLISHERS NEW YORK Rose_9780307451361_3p_all_r3.qxp:. 5/19/09 4:46 PM Page iv Copyright © 2009 by Scott Rosenberg All rights reserved. Published in the United States by Crown Publishers, an imprint of the Crown Publishing Group, a division of Random House, Inc., New York. www.crownpublishing.com CROWN and the Crown colophon are registered trademarks of Random House, Inc. Library of Congress Cataloging-in- Publication Data is available upon request ISBN 978- 0- 307- 45136- 1 Printed in the United States of America Design by Maria Elias 10987654321 N First Edition www.CrownPublishing.com To purchase a copy of Say Everything visit one of these online retailers: Amazon Barnes & Noble Borders IndieBound Powell’s Books Random House www.CrownPublishing.com Rose_9780307451361_3p_all_r3.qxp:. 5/19/09 4:46 PM Page vii CONTENTS INTRODUCTION: WHAT’S NEW 1 PART ONE PIONEERS CHAPTER 1 PUTTING EVERYTHING OUT THERE Justin Hall 17 CHAPTER 2 THE UNEDITED VOICE OF A PERSON Dave Winer 46 CHAPTER 3 THEY SHALL KNOW YOU THROUGH YOUR LINKS Jorn Barger, filters 74 www.CrownPublishing.com Rose_9780307451361_3p_all_r3.qxp:. 5/19/09 4:46 PM Page viii PART TWO SCALING UP CHAPTER 4 THE BLOGGER CATAPULT Evan Williams, Meg Hourihan 101 CHAPTER 5 THE RISE OF POLITICAL BLOGGING Josh Marshall 131 CHAPTER 6 BLOGGING FOR BUCKS Robert Scoble, Nick Denton, Jason Calacanis 165 CHAPTER 7 THE EXPLODING BLOGOSPHERE Boing Boing 198 CHAPTER 8 THE PERILS OF KEEPING IT REAL Heather Armstrong 229 PART THREE WHAT HAVE BLOGS WROUGHT? CHAPTER 9 JOURNALISTS VS. BLOGGERS 269 CHAPTER 10 WHEN EVERYONE HAS A BLOG 301 N www.CrownPublishing.com Rose_9780307451361_3p_all_r3.qxp:. 5/19/09 4:46 PM Page ix CHAPTER 11 FRAGMENTS FOR THE FUTURE 328 EPILOGUE: TWILIGHT OF THE CYNICS 352 Author’s Note and Acknowledgments 361 Notes 363 Index 395 www.CrownPublishing.com Rose_9780307451361_3p_all_r3.qxp:. 5/19/09 4:46 PM Page 1 INTRODUCTION: WHAT’S NEW n the morning of September 11, 2001, James Marino sat at his O desk at 568 Broadway, looking out a tall window that revealed a panorama of the lower Manhattan skyline. He’d come to the office early to work on his side business—a website called Broadwaystars.com. The site collected tidbits of news and gossip about the New York theater scene and served them up blog- style, time-stamped, with new items at the top. At 8:49 a.m. he’d posted a passel of links: An AIDS benefit recap. Declining box office numbers from Variety. The impending release of a cast album for a show by Rent’s Jonathan Larson titled tick, tick . BOOM! Marino clicked post and looked up from his monitor. He froze a moment, stared, then started typing again: Something very terrible just happened at the World Trade Center. I think a plane crashed into the north- western tower. It is horrible and stunning to look at.—james posted at 9/11/2001 08:56:32 AM www.CrownPublishing.com Rose_9780307451361_3p_all_r3.qxp:. 5/19/09 4:46 PM Page 2 2 SAY EVERYTHING Like so many other New Yorkers that morning, Marino kept watch- ing. He also kept typing: Oh my god. I just saw the other building blow up. A sec- ond plane approaching from the opposite direction (south to north) crashed into the south- east tower. posted at 9/11/2001 09:06:06 AM My office is on the 10th floor of a Soho building with large southern facing windows, so I have a full view of downtown. From my vantage, I see a huge hole where the first plane entered the north west tower from north to south. The south east tower was hit from the south to north. It is being reported that a plane or planes were hijacked and flown into the towers with passengers in them. posted at 9/11/2001 09:06:06 AM Marino had worked for four years at Lehman Brothers in the World Trade Center complex; he’d been there in 1993 when a car bomb exploded in the basement garage. one tower just collapsed (south east) i am weeping. i cant tell you how i feel posted at 9/11/2001 10:02:52 AM The second building just exploded and collaped. This is just beyond anything that I can even conceive. I feel so much anger and helplessness. N posted at 9/11/2001 10:33:07 AM www.CrownPublishing.com Rose_9780307451361_3p_all_r3.qxp:. 5/19/09 4:46 PM Page 3 INTRODUCTION 3 Eventually, Marino left his desk and made his way uptown to his brother’s West Side apartment, then finally home to Westchester. That evening he posted again: I think I lost about 100 friends today. I can’t count them. I keep breaking down. I don’t think that I have ever been so sad and cried so much. I don’t know if I will ever be the same. But I am home now. Thank you to everyone for the notes. posted at 9/11/2001 07:31:01 PM Most New Yorkers have indelible memories of the minutes and hours after the planes hit that day. Those memories are recorded on countless Web pages, in emails and forum postings and uploaded photos. But much of that record made its way onto the Web after the fact, by hours or days or weeks. In the chaos on the ground, a lot of people were focused on getting to safety, or their eyes were glued to TV news, or their Internet connections were disrupted by the crushing network overload. The Broadwaystars.com posts recorded the 9/11 events as they piled up, one fraught moment on top of the previous one. Though they broke from what Marino calls the site’s typical “gossipy, snarky” tone, they were not carefully composed or particularly eloquent. Instead, they offered a witness’s raw feed, unmediated by anchorperson or interviewer— a naked vantage on a cataclysm. Marino wrote what he saw. And if you scroll down the page he wrote, you see that at 8:49 a.m. the world was one way, and at 8:56 a.m. it was another. k As the day’s disasters unfolded, most Americans got their news from TV, with its ceaseless loop of billowing smoke and cratering towers. TV www.CrownPublishing.com Rose_9780307451361_3p_all_r3.qxp:. 5/19/09 4:46 PM Page 4 4 SAY EVERYTHING broadcast the big picture, but it couldn’t tell you whether your friend who worked at the World Trade Center had made it out in time, or whether your sister or uncle had made it home safely. The telephone sys- tems failed almost immediately. The websites of the big news operations quickly overloaded, too. But email still worked, and smaller websites managed to stay up. The Internet’s arteries clogged, but people found ways to communicate through its capillaries. Marino’s 8:56 post was among the first to hit the Web that day; it might well have been the very first. (The first AP story went over the wire at 8:55 a.m., but most websites took a few minutes to get it up. At 8:58 a.m., Metafilter, a popular group blog, posted a link to a one-line news bulletin on the front page of the CNN website, but CNN did not yet have a full story posted.) Later that morning, a gaming journalist and Web celebrity named Justin Hall— who’d been chronicling his life in an open Web diary since 1994—posted: at these times there’s two types of media valuable - email friends from japan and london writing - are you okay? and the only way to reach people - small packet transit. and the TV rebirth of the broadcast media. The only pipes big enough still to bring us the pictures and moving pictures of buildings collapsing. In San Francisco, Evan Williams, who ran a service called Blogger that helped thousands of people— including Marino—run their weblogs, wanted to do something useful, so he got to work building a page that automatically collated postings about the attacks from Blogger users across the Web and listed them in chronological order. Marino’s post headed the list. N www.CrownPublishing.com Rose_9780307451361_3p_all_r3.qxp:. 5/19/09 4:46 PM Page 5 INTRODUCTION 5 In Woodside, a rustic enclave of homes for Silicon Valley’s stock- option millionaires, a software developer named Dave Winer had started his day early, posting links and headlines to his blog, Scripting News. Winer didn’t have a TV set, but around 9:00 a.m. (6:00 a.m. on the West Coast) he received an email from a fellow blogger named Bill Seitz, alerting him to the news and suggesting he look at the Empire State Building webcam, which offered real-time snapshots from the venerable skyscraper’s observation deck. Seitz captured an image right after the collapse of the South Tower and posted it to his own blog at 10:17 a.m.; at 10:57 a.m., he posted a second image under the words “No more WTC.” Winer’s father, Leon Winer, was a professor at Pace University, and it occurred to Winer that Pace was near the World Trade Center.
Recommended publications
  • Michael T. Nygard — «Release It! Design and Deploy Production-Ready Software
    What readers are saying about Release It! Agile development emphasizes delivering production-ready code every iteration. This book finally lays out exactly what this really means for critical systems today. You have a winner here. Tom Poppendieck Poppendieck.LLC It’s brilliant. Absolutely awesome. This book would’ve saved [Really Big Company] hundreds of thousands, if not millions, of dollars in a recent release. Jared Richardson Agile Artisans, Inc. Beware! This excellent package of experience, insights, and patterns has the potential to highlight all the mistakes you didn’t know you have already made. Rejoice! Michael gives you recipes of how you redeem yourself right now. An invaluable addition to your Pragmatic bookshelf. Arun Batchu Enterprise Architect, netrii LLC Release It! Design and Deploy Production-Ready Software Michael T. Nygard The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC. Every precaution was taken in the preparation of this book. However, the publisher assumes no responsibility for errors or omissions, or for damages that may result from the use of information (including program listings) contained herein. Our Pragmatic courses, workshops, and other products can help you and your team create better software and have more fun.
    [Show full text]
  • The Irregular Musings of Lou Montulli: the Reasoning Behind Web Cookies
    1/25/2018 The irregular musings of Lou Montulli: The reasoning behind Web Cookies The irregular musings of Lou Montulli Early web guy, engineer and entrepreneur TUESDAY, MAY 14, 2013 BLOG ARCHIVE ► 2015 (1) The reasoning behind Web Cookies ► 2014 (2) I get a fair number of questions about cookies from ▼ 2013 (15) individuals and the press. I thought I would try and ► June (5) explain some of the motivation and history behind Web ▼ May (10) cookies as well as some of the design behind them. Value based home music recording Feel free to post more questions and I will try and expand this article with more details. Wow, Flickr is giving away 1TB of storage for pers... See my recent post on 3rd party cookies as well! It's the end of <blink>! Why blocking 3rd party cookies could be a bad thin... Google "Play All" music service initial Motivation review HTTP is the networking language behind your browser. HTTP, or Hyper Text The reasoning behind Web Cookies Transport Protocol, was designed and introduced as part of the WWW project that started with Tim Berners­Lee at CERN and was expanded upon by several universities, A short history of the "about:" URL corporations and private individuals. The WWW and HTTP are open standards which The origins of the <blink> tag are published and given into the public trust in order to foster interoperability and to I'm trying out blogger create products that can become ubiquitous. Fine cabinetry meets not so modern gaming One of the problems faced in the early years of the web was how to create websites that had "memory" for individual users.
    [Show full text]
  • HTTP Cookies: Standards, Privacy, and Politics
    HTTP Cookies: Standards, Privacy, and Politics DAVID M. KRISTOL Bell Labs, Lucent Technologies How did we get from a world where cookies were something you ate and where “nontechies” were unaware of “Netscape cookies” to a world where cookies are a hot-button privacy issue for many computer users? This article describes how HTTP “cookies” work and how Netscape’s original specification evolved into an IETF Proposed Standard. I also offer a personal perspective on how what began as a straightforward technical specification turned into a political flashpoint when it tried to address nontechnical issues such as privacy. Categories and Subject Descriptors: C.2.2 [Computer-Communication Networks]: Network Protocols—Applications; K.2 [History of Computing]: Systems General Terms: Standardization, Security, Design Additional Key Words and Phrases: Cookies, HTTP, privacy, state management, World Wide Web 1. INTRODUCTION The topic of HTTP “cookies” has become at least slightly familiar to many In- ternet users. Articles in the popular press now regularly mention cookies in conjunction with privacy concerns. However, cookies were in use for over two years before they achieved notoriety,and some of that notoriety emerged around the same time as the appearance of the first formal standard for cookies, which had previously been informally described on Netscape Communications Corpo- ration’s Web site. The cookie standardization process began in April 1995 with a discussion on [www-talk]. In December of that year, the IETF undertook to write a cookie standard. After a series of Internet-Drafts got published in connec- tion with extensive public discussion on [http-wg] (and after noticeable de- lays due to IETF process), RFC 2109 [Kristol and Montulli 1997], HTTP State Management Mechanism, was published in February 1997 as an IETF Pro- posed Standard.
    [Show full text]
  • Comparative Study of Search Engines
    “COMPARATIVE STUDY OF SEARCH ENGINES USEFUL FOR LIBRARIANS” A Dissertation Submitted to the Tilak Maharashtra Vidyapeeth, Pune For Master of Philosophy (M.Phil.) In LIBRARY AND INFORMATION SCIENCE Submitted By Mr. SUSHANT KORE Under the Guidance of Dr. N. B. DAHIBHATE Principal Technical Officer Information Division (DIRC) National Chemical Laboratory, Pune TILAK MAHARASHTRA VIDYAPETH DEPARTMENT OF LIBRARY AND INFORMATION SCIENCE PUNE - 411 037. December, 2014 DECLARATION I hereby declare that the dissertation entitled “Comparative study of search engines useful for librarians” completed by me for the degree of Master of Philosophy in library and Information Science. The entire work embodied in this thesis has been carried out by me under the guidance of Dr. N.B. Dahibhate, National Chemical Laboratory, and Digital Information Resource Center (DIRC), Pune. (Mr. Sushant Kore) Research Student (M.Phil.) Place: Pune Date: 26th December, 2014 CERTIFICATE This is to certify that the thesis entitled “Comparative study of search engines useful for librarians” which is being submitted herewith for the award of the Degree of Master of Philosophy (M.Phil.) in Library and Information Science of Tilak Maharashtra Vidyapeeth, Pune is the result of original research work completed by Mr. Sushant Kore under my supervision and guidance. To the best of my knowledge and belief the work incorporated in this thesis has not formed the basis for award of any Degree or similar title of this or any other University or examining body. (Dr. N.B. Dahibhate) Principal Technical Officer Information Division (DIRC) NCL, Pune Place: Pune Date: 26th December , 2014 ACKNOWLEDGEMENT I am very thankful to my respectable parents for their kind support in my life as well as completing my dissertation and bringing me to this stage in the educational field.
    [Show full text]
  • Compsci 4 HTML Aug 31, 2006
    CompSci 4 HTML Aug 31, 2006 Prof. Susan Rodger CompSci 4 • Last time – How to start a web page, copy files to Duke account • Assignment 1 due Friday, Assignment 2 out • Today – Learn HTML – Use laptop cart – bring laptop if can • start Alice next week – Read Chapter 1 – Do reading quiz on blackboard • Multiple attempts • Must do before next class period starts Browsers on the Web • First browser called “WorldWideWeb” – Hypertext browser/editor – Created in 1990 by Tim Berners-Lee at CERN – 1991 available on internet • Lynx – Textual browser, 1992, history – Lou Montulli, Charles Rezac, Michael Grobe CompSci 4 Web page in Lynx Other Browsers •Mosaic – 1993, Univ of Illinois Urbana-Champaign – Last version in 1997 • Netscape – 1994 by Jim Clark and Marc Andreessen – Hired most of Mosaic Engineers and Montulli (lynx) – history • Internet Explorer – 1995, first version attached to Windows 95, not very popular – history How do These Browsers view the same info? • Standards –Html – Figure formats (gif, jpeg, tiff) – Scripts (javascript, cgi) • Plug-ins – Program provided by companies that are run when specific file is downloaded URLS • Uniform Resource Locator • Address of location of a web site or other Internet service • Organized first by protocol – http, mailto, ftp, file • Organized next by domains – .com, .edu, .org, country (.it, .fr, .de) • Organized finally by directory on specific machine An HTML file • Write HTML commands in a text file – use Notepad – save as .txt file • File should have .html extension • View file with browser
    [Show full text]
  • Web Caching Duane Wessels
    only for RuBoard - do not distribute or recompile Copyright Table of Contents Index Full Description About the Author Reviews Reader reviews Errata Web Caching Duane Wessels Publisher: O'Reilly First Edition June 2001 ISBN: 1-56592-536-X, 318 pages A properly designed cache, by reducing network traffic and improving access times to popular web sites, is a boon to network administrators and web users alike. This book hands you all the technical information you need to design, deploy and operate an effective web caching service. It also covers the important political aspects of web caching, including privacy and security issues. only for RuBoard - do not distribute or recompile only for RuBoard - do not distribute or recompile Web Caching Preface Audience What You Will and Won't Find Here Caching Resources Conventions Used in This Book How To Contact Us Acknowledgments 1. Introduction 1.1 Web Architecture 1.2 Web Transport Protocols 1.3 Why Cache the Web? 1.4 Why Not Cache the Web? 1.5 Types of Web Caches 1.6 Caching Proxy Features 1.7 Meshes, Clusters, and Hierarchies 1.8 Products 2. How Web Caching Works 2.1 HTTP Requests 2.2 Is It Cachable? 2.3 Hits, Misses, and Freshness 2.4 Hit Ratios 2.5 Validation 2.6 Forcing a Cache to Refresh 2.7 Cache Replacement 3. Politics of Web Caching 3.1 Privacy 3.2 Request Blocking 3.3 Copyright 3.4 Offensive Content 3.5 Dynamic Web Pages 3.6 Content Integrity 3.7 Cache Busting and Server Busting 3.8 Advertising 3.9 Trust 3.10 Effects of Proxies 4.
    [Show full text]
  • Materials for the 2013 Summer Candidacy Program
    2013 SUMMER CANDIDACY PROGRAM MATERIALS THE CHICAGO -KENT LAW REVIEW QUESTION Websites collect a substantial amount of user information with technology that tracks the user’s purchases, website access, posts on social media, and other internet activity. This information is added to the rest of the information available about the user on the internet, his or her “internet persona”, and sold to advertisers. In most circumstances, the website’s privacy policy acknowledges this practice and equates use of the website with the user’s acceptance of its privacy policy. Courts in the U.S. have validated this practice of equating use of a website with acceptance of a website’s privacy policy, which has resulted in the continued collection and sale of individual information. These decisions have received substantial criticism from privacy advocates, but strong praise from advertising agencies and various other interested parties. Using only the sources contained in this packet, write an academic article (15 pages, maximum) (1) Analyzing court decisions regarding the legality of the current practice; (2) Discussing whether the current practice should continue considering the benefits and harms; and (3) Taking a stand as to what courts or the legislature should do (if anything) to change or preserve the legal status quo. Outside research is strictly forbidden . You can analyze the statements or propositions from other sources discussed in the SCP materials. However, you cannot obtain and read those sources; neither should you cite them directly. Keep in mind that not every word of every source relates to the issue. You must determine what is relevant.
    [Show full text]
  • Cache Cookies: Searching for Hidden Browser Storage
    Bachelor thesis Computer Science Radboud University Cache Cookies: searching for hidden browser storage Author: First supervisor/assessor: Patrick Verleg Prof. dr. M.C.J.D van Eekelen s3049701 [email protected] Second assessor: Dr. ir. H.P.E. Vranken [email protected] June 26, 2014 Abstract Various ways are known to persistently store information in a browser to achieve cookie-like behaviour. These methods are collectively known as `su- per cookies'. This research looks into various super cookie methods. Atten- tion is given to the means a user has to regulate data storage and what is allowed by the cookiewet. The main goal of this research is to determine whether a browser's cache can be used to store and retrieve a user's unique identification. The results show that this is the case, and these `cache cookies' use a method so fun- damentally entangled with the cache that there is no easy way to prevent them. Because of cache cookies and other methods, the only way to prevent all tracking methods is to disable cache, history, cookies and plug-in storage. Contents 1 Introduction 2 2 Cookies for maintaining browser state 5 2.1 Storing and retrieving cookies . .5 2.1.1 Same-origin policy . .6 2.1.2 Third party cookies . .6 2.2 Protection against cookies . .7 2.2.1 Technical means . .7 2.2.2 Regulation . .8 3 Super cookies 11 3.1 Plug-in cookies . 11 3.2 HTML 5 . 14 3.3 Misusing browser features . 15 3.4 Regulation . 18 4 Research: Cache Cookies 20 4.1 Method .
    [Show full text]
  • The Year of the Internet
    1 The Year of the Internet The novelty days of the World Wide Web tend to be recalled in sharply different ways. One way is to remember them wistfully, as an innocent time when browsing came into fashion, when the still-new Web offered serendipity, mystery, and the whiff of adventure. The prominent tech- nology skeptic Evgeny Morozov gave expression to early-Web nostalgia in a lush essay a few years ago that lamented the passing of cyber- fl ânerie, the pleasure of wandering leisurely online without knowing where one would go or what one might fi nd. He wrote that those days of slowly loading Web pages and “the funky buzz of the modem” offered “their own weird poetics” and the promise of “opening new spaces for play and interpretation.”1 Far more common than gauzy nostalgia is to look back at the early Web with bemusement and sarcasm, to liken the emergent online world of the mid-1990s to a primordial place, when the environment of the Web was mostly barren and boring, not a place to linger, not a place to do much at all. The “Jurassic Web,” Farhad Manjoo called it, in an essay posted at Slate.com. What’s “striking about the old Web,” he wrote, “is how unsure everyone seemed to be about what the new medium was for.”2 Fair enough. The Internet of 1995 was a place without Facebook, Twitter, or Wikipedia. Google was barely on the horizon: its founders, Sergey Brin and Larry Page, were graduate students who met in 1995 on the campus of Stanford University.
    [Show full text]
  • Visualizing Data
    Visualizing Data Ben Fry Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Visualizing Data by Ben Fry Copyright © 2008 Ben Fry. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Andy Oram Indexer: Ellen Troutman Zaig Production Editor: Loranah Dimant Cover Designer: Karen Montgomery Copyeditor: Genevieve d’Entremont Interior Designer: David Futato Proofreader: Loranah Dimant Illustrator: Jessamyn Read Printing History: December 2007: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Visualizing Data, the image of an owl, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. This book uses RepKover™, a durable and flexible lay-flat binding. ISBN-10: 0-596-51455-7 ISBN-13: 978-0-596-51455-6 [C] Table of Contents Preface .
    [Show full text]
  • Comparative Web Browsers Richard Kershenbaum Endacott Society Computer Study Group 01-09-2013 History of Web Browsers
    Comparative Web Browsers Richard Kershenbaum Endacott Society Computer Study Group 01-09-2013 History of Web Browsers Life before Web Browsers – FTP, NNTP (Usenet News), gopher http://www.youtube.com/watch?v=Bkd3Vy QMBK0 WorldWideWeb (renamed Nexus) – Tim Berners-Lee – CERN – 1991 – first web browser NCSA Mosaic – Marc Andreessen - 1993 – first widely-used web browser More Web Browser History • Development of NCSA Mosaic was funded by the High Performance Computing and Communication Act of 1991 • Andreesen and Jim Clark (a founder of Silicon Graphics) formed Mosaic Communications Corp., which became Netscape Corp. • Lynx – 1992 – Lou Montulli, Michael Grobe, Charles Rezac – text-based browser More Browser History • Lou joined Netscape in 1994, invented browser cookies • Netscape Navigator was the dominant browser druing the 1990s • Spyglass Mosaic – 1994 (Spyglass was a for-profit spinoff of NCSA) • Microsoft licenses Spyglass Mosaic in 1994, releases Internet Explorer 1 Yet More Browser History • Microsoft bundles IE with Windows 95 – doesn’t have to pay royalties to Spyglass, but IE becomes dominant browser • IE3 – 1996 – became extremely popular • IE9 – 2011 -- • IE10 – 10/2013 – currently only for Windows 8 - More history…. • Mozilla Firefox – 2004 • Opera, Safari 1.0 -- 2003 • Google Chrome – 2008 – now the most usage, but fewer users than IE or Firefox • Maxthon Cloud browser -- 2008 Browser pros & cons (PC World, 2/12): • What’s important to you? − Speed? − Security? − Add-ons? − Share bookmarks & settings across computers and devices?
    [Show full text]
  • Study & Analysis of Various Protocols in Popular Web Browsers
    International Journal of Advancements in Research & Technology, Volume 1, Issue3, August-2012 1 ISSN 2278-7763 Study & Analysis of various Protocols in popular Web Browsers Dr. Bharat Mishra, Harish Singh Baghel,Manoj Patil, Pramod Singh Computer Science, M.G.C.G.V Chitrakoot Satna (M.P), Satna, India; Email: [email protected] ABSTRACT The web browsers are the application software that are used to access information from the World Wide Web. With the increas- ing popularity of the web browsers, the modern web browsers are designed to contain more features as compared to the exist- ing web browsers. For the transferring of information through these browsers, various protocols have been implemented on these modern web browsers to make these browsers more efficient. Different protocols used in different layers have different functions and by increasing the efficiency of these protocols we can make the working of browsers more efficient. Keywords : TCP/IP, NetBIOS, UDP, FTP, SNMP. 1 INTRODUCTION From the cellular phone to the desktop, the web browser has Foxy Tunes media player control toolbar, Adblock Plus ad become a ubiquitous piece of software in modern computing blocking utility, Stumble Upon (website discovery), Foxmarks devices. These same browsers have become increasingly com- Bookmark Synchronizer (bookmark synchronizer), WOT: Web plex over the years, not only parsing plaintext and HTML, but of Trust security site advisor, download enhancer, and Web images, videos and other complex protocols and file formats. Developer toolbar. With a market share of 45.5% in 2009 it is Modern complexities have brought along security vulnerabili- the most popular browser.
    [Show full text]