Premium Essay

The Origins of Web Technology

In:

Submitted By Mykal1968
Words 484
Pages 2
[pic]

The Internet has no one specific origin. Many people from many different time periods, as early as mid-evil times, have documented ideas that reflect its ground works. In 1961, Leonard Kleinrock drafted and published the first paper on the concept of packet switching. “Packet switching is the idea that packets of data can be ‘routed’ from one place to another based on address information carried in the data” (Who Invented the Internet?). Packet switching is an essential building block of the Internet. The origins of our modern internet came from the Advanced Research Projects Agency Network created by Larry G. Roberts (who also invented the first long-distance computer network) in 1965. Even though they themselves admitted that no one person invented the internet, Bob Khan and Vint Cerf are most attributed to this achievement. In 1972-1973, these two gentlemen worked together to create what is called the Transmission Control Protocol which is used in the modern internet to transport data.

The World Wide Web is one of many applications of the Internet. “The WWW project is based on the principle of universal readership: ‘if information is available, then any (authorized) person should be able to access it from anywhere in the world’” (Zeltser). This idea of “universal readership” was recognized as important and even essential by many people before it was materialized and finalized by Tim Berners-Lee in November of 1990 with the help of Robert Cailliau. The proposal presented by these two gentlemen explained the “WorldWideWeb” as a figurative “web” of documents composed of hypertext. The hypertext markup language (abbreviated HTML) is accepted as the primary markup language. HTML is an essential part of the makeup of every internet web page seen today on the World Wide Web.

WEB TECHNOLOGIES

[pic]

HTML
HTML is a markup

Similar Documents

Free Essay

Teams

...Abstract—The tremendous growth in popularity of smartphones has been closely matched by increased efforts to harness their potential. This has lead to the development of powerful mobile operating systems that provide novel programming platforms for the creation of rich mobile applications. To support these new paradigms, developers are now asked to spend considerable effort in replicating functionality, usually already available in web applications, for the native applications. In this paper, we observe that web applications closely simulate the design of native applications and the web origin can act as a more reliable authentication identifier for third-party application content.We consequently argue in favor of using web applications as the default for mobile platforms and propose a practical approach to extend web applications with native applicationlike capabilities. Central to our approach is a browser-based permission model that effectively manages permissions both at install time and at runtime, and supports dynamic user policies. We discuss security and non-security challenges of realizing this approach. The rapid growth of mobile computing and increasing adoption of smartphones has resulted in the evolution of rich mobile platforms, such as Android and iOS. While these platforms derive much of the functionality from traditional desktop operating systems, they also introduce security mechanisms to satisfy the new requirements imposed by the mobile ...

Words: 796 - Pages: 4

Free Essay

Dns (Domain Name System)

...Domain Name System Proper use reduces intranet administration costs Architecture Flexible Scalable Extensible Service Standard Robust Efficient DNS Affordable Reliable Predictable The Internet continues expanding. Its progress seems unstoppable; for years now the rate of growth has been increasing. To easily continue using a more widely spread Internet, and to keep a grip on it, DNS is vital. This article explains the benefit of DNS for business networks and the technological and administrative conditions necessary for the optimal deployment of this technology. The method described here is particularly important for organizations with many employees spread over multiple locations. Domain Name System Proper use reduces intranet administration costs N etwork addresses, such as 192.68.44.134, are difficult for people to remember. The need for associating names with network addresses has been recognized almost from the start of the Internet. Initially, a list of the names and network addresses of all computer systems was maintained in a central file, known as the hosts file. System administrators needed the discipline to regularly pick up the latest version. This method of working was no longer practical once the Internet starting rapidly expanding. System administrators needed to pick up an increasingly large file increasingly often. Also, the whole Internet was dependent on a single central authority who made changes. This authority also had no way of verifying...

Words: 2847 - Pages: 12

Premium Essay

The Great Wall of China

... The most famous is the wall built between 220 BC and 200 BC by the first Emperor of China, Quin Shi Huang. Little of it remains, it was much farther north than the current wall, which was built during the Ming Dynasty [“Great Wall Origin of the Great Wall | History.” Great Wall of China, History, Gallery of Pictures, Travel Guide, News, Discovery and Research]. The protective walls across northern China are on a scale that dwarfs every other construction project on earth. The walls travel through all kinds of terrain, beneath the sea, over jagged mountain ranges, and into forgiving deserts. The wall builders faced endless challenges and found ingenious ways to overcome them. The great majority of construction required the workers to haul sand and other supplies on their backs up steep hills for hours on in. The Great Wall is a testament to human achievement that exceeds any accomplishment in the west, including the Egyptian’s ability to build pyramids. The Chinese perfected the art of war and the science of defense. They developed many of the technologies we still use in construction today. If the Great Wall symbolizes anything, it’s the Chinese people determination to survive, at whatever the cost would be [You Tube. You Tube. Web. 07...

Words: 939 - Pages: 4

Premium Essay

Capstone

...majoring in business with a focus on marketing and advertising; the other sought a degree in graphic design technology. The graphic designer was learning how to take an art form that was originally done with paper, pens, acetate, tape and glue and apply those same skills using computerized graphics, layers, vectors and pixels. Business work such as accounting, proposals, estimates, invoices and contracts was performed on an IBM compatible machine while all the graphic and design work was performed on a Mac LC II. Internal communications were executed using a 9600 baud modem system. External communications were performed through U.S. mail, telephone calls and a relatively new technology called facsimile transmissions (fax). Primary project output consisted of creating marketing and advertising materials such as logos, corporate branding materials, advertisements and other promotional print driven materials. Like many partnerships, Creative Image owners eventually dissolved the working relationship to pursue other ventures; however the business license was retained for 20 years in order to continue to allow freelance work by the artist. In 2011, the designer re-entered college to support 20 years of freelance design experience with a Bachelor’s Degree and redirect a career based upon print experience into establishing an expertise on creating successful web presence. Thus began the reinvigoration of Creative Image Group. State of the Company Today the company...

Words: 1523 - Pages: 7

Free Essay

Valve Corporation Final Project

...●●● Introduction ……...………….……..………..….……………………………………………………………………………….. 3 External Analysis …………….…………….…………………………………………………………………………………….. 3 PESTEL Analysis ……………….……………………………………………………………………………………………. 4 Political Factors ……………………………………………………………………………………………………. 4 Economic Factors …………………………………………………………………………………………………. 4 Socio-Cultural Factors ………………………………………………………………………………………….. 5 Technological Factors ………………………………………………………………………………………….. 6 Environmental Factors ………………………………………………………………………………………... 7 Legal Factors ……………………………………………………………………………………………………….. 7 Five – Forces Model ……………………………………….……………………………………………………………. 8 Supplier Power ……….………….…………....………………………………………………………………… 8 Buyer Power ………………………...……..………………………………………….…………….…………… 9 Degree of Rivalry ……………………….………..……………………………………………………………. 10 Threat of New Entrants ……….………....……….……………………………………………………….. 10 Threat of Substitutes …………….……….……………………………………….………………………… 11 Conclusion ....……. ………………..………………………………………………………………………………………….. 12 Problems and Solutions …………………………………………………………………………………………… 12 Works Cited ………………………………………...…………………………………………………………………………... 14 Introduction Gabe Newell, a Harvard drop out, began working for Microsoft in 1983. Newell spent thirteen years at Microsoft and emerged as a “Microsoft Millionaire.” Newell and his co-worker Mike Harrington left Microsoft in 1996 to begin their own company. The inspiration came from another former Microsoft employee named Michael Abrash...

Words: 4205 - Pages: 17

Free Essay

Smash: Secure Cross-Domain Mashups on Unmodified Browsers

...ABSTRACT Mashup applications mix and merge content (data and code) from multiple content providers in a user’s browser, to provide high-value web applications that can rival the user experience provided by desktop applications. Current browser security models were not designed to support such applications and they are therefore implemented with insecure workarounds. In this paper, we present a secure component model, where components are provided by different trust domains, and can interact using a communication abstraction that allows ease of specification of a security policy. We have developed an implementation of this model that works currently in all major browsers, and addresses challenges of communication integrity and frame-phishing. An evaluation of the performance of our implementation shows that this approach is not just feasible but also practical. The technology discussed in this paper allows mutually mistrusting client-side components to communicate safely without any modifications to current browsers, and hence has the potential to achieve immediate and widespread adoption. Categories and Subject Descriptors: D.2.0 [General]: Protection mechanisms, D.2.11 [Software Architectures]: Information hiding, domain-specific General Terms: Security, design. Keywords: Web 2.0, browser, mashup, component model, phishing. 1. INTRODUCTION Web applications increasingly rely on extensive scripting on the client-side (browser) using readily available JavaScript libraries. One motivation...

Words: 10150 - Pages: 41

Free Essay

Case Study

...To start with Akamai’s version 1.0: Freeflow not only made sites 10 times faster and protected them against sudden traffic bursts but also reduced the content provider’s payments to ISP’s for bandwidth which justified charging them for the service. On the other hand the ISP’s also gained some things as the improved speeds were valued by their subscribers but Akamai needed data center space and transit bandwidth from the ISP’s so along with high speed which their subscribers valued, Akamai needed to compensate the ISP’s and subsidizing was a perfect way to do so. Akamai’s version 2.0: EdgeSuite technology moved Akamai beyond its traditional role of content delivery into assembly, presentation, and delivery of data from the internet’s edge. EdgeSuite offered a very constructive value proposition to the content providers by Firstly, Akamai used CDN to improve page loading by serving web pages from the internet’s edge instead of from the original website. Secondly, using Akamai’s edge servers allowed customers to reduce their...

Words: 584 - Pages: 3

Premium Essay

Disadvantages Of Educational Technology

...“Education is not the learning of facts, but training of the mind to think”. - Albert Einstein. Educational technology is defined by the Association for Educational Communications and Technology (AECT) as "the study and ethical practice of facilitating learning and improving performance by creating, using, and managing appropriate technological processes and resources."(Robinson,2007). Further, Educational technology is defined as “the process of integrating technology into education in a positive manner that promotes a more diverse learning environment and a way for students to learn how to use technology as well as their common assignments”. (Benjamin Herold, 2015) defines that “Anything that enhances classroom learning in the utilization of blended or online learning is considered as Education technology” and such technology encompasses Web based Education systems (e-learning, Technology Enhanced Learning (TEL), Internet-based training), Computer-Based Training (CBT), Information and communication technology (ICT) in education, Virtual education, Virtual learning environments (VLE) and Learning Management Systems (LMS). Each of these numerous terms has had its advocates, who point up potential distinctive features. (Moorea,2011). The use of...

Words: 993 - Pages: 4

Free Essay

4g Networks

... 3 Abstract 4 The Origin and Definition 5 IMT – Advanced Requirements 5 Development 6 The Influence of 4G 8 The Future of 4G 8 Works Cited 10 My technical report entitled “4G Networks” is presented in partial fulfillment of the requirements for CPET2324, Computer Network Systems. The 4G network was chosen for this topic because of the impact it has on wireless communications. I think the most important tool a person can carry these days is the cell phone. My essay attempts to show how critical the 4G networks is to our beloved cell phone and other wireless devices. Abstract The 4G Networks In telecommunications, 4G is the fourth generation of mobile communication technology standards. It is a successor of the third generation (3G) standard. While all 4G service is called “4G,” the underlying technology is not the same. Sprint, for example, uses WiMax technology for its 4G network, while Verizon Wireless uses a technology called Long Term Evolution, or LTE. No matter what technology is behind it, 4G wireless is designed to deliver speed. The Origin and Definition of the Term The fourth generation is a promising generation of the mobile communications that is characterized by a high data rate and high-quality voice communications. Advanced technologies that make data communications at a rate...

Words: 1585 - Pages: 7

Free Essay

Dependent Generation

...are dependent on technology, of course, but also dependent on parents. My generation is addicted to technology. The multitude of devices now readily available explains the origin of our dependence. Even teachers now use technology as part of their curriculum. Considering this fact, an argument stating that students do not actually need their many devices is proven invalid. Students indeed require their phones to be successful in school. For example, in physics, my classmates and I used our phones to videotape an oscillating spring to gather data for a lab. Therefore, the vital incorporation of technology into education forces students to own phones and partially justifies the use of technology, but it does not rationalize the obsessive use of technology. Inside and outside of school, all that matters is Facebook, Google, and Snapchat. Technology consumes three hours and sixteen minutes of our lives every day. (Woollaston) People today believe that they cannot live without our IPhones and Macs. Interestingly enough, many of these people have actually experienced a technology-free world, and therefore, know that it is possible to live without checking Facebook every two seconds. There is, though, a major difference between the older generations and our dependent generation. Our parents and grandparents learned the vital skills of life like cooking and cleaning, in school and at home. Thus, these generations cannot be considered completely dependent on technology. Our era is revolutionary...

Words: 603 - Pages: 3

Free Essay

Test

...for over 90% of a users wait time. Content Delivery Networks (CDNs) help address part of this problem by reducing network latency. However, even larger performance gains can be achieved through Frontend Optimization (FEO) techniques that streamline the Web page HTML code and resources. I Trends Driving the Frontend Bottleneck A web page’s performance can be split into backend and frontend. Backend time includes generating the page’s HTML and resources. The frontend time includes downloading the resources and processing them in the Browser. There are four important trends making the frontend an important performance issue today and potentially even more important in the years to come: 1. Rich content. Viewing a chart of size vs. time, it goes up and to the right. Since 1995, the average size of a page has grown over 35x, and the number of objects per page has grown 28x. Larger, link heavy pages are driving up frontend load times. 2. Client side code. Not so long ago most sites were fairly simple combinations of HTML and graphics. All the “heavy lifting” was done on the backend. Now almost all sites have some JavaScript code. More sophisticated sites are using AJAX and now HTML5. As we move to replace desktop apps with Web apps, client side code is going to get more...

Words: 2207 - Pages: 9

Free Essay

History

...peoples of the ancient world. They, together with other communities, helped shape the way society was organised, how work, money and the economy were planned, and how human culture was created and developed. Together with their continental cousins in Mexico, Guatemala, Peru and elsewhere, the ancient Caribbean communities engaged with and used their environment in dynamic and creative ways. The Caribbean, then, was home to an old and ancient cultural civilisation that continues to shape and inform our present-day understanding and identity. In this chapter we will learn about: 1. The culture of indigenous Caribbean people 2. The Ciboney 3. The Taino 4. The Kalinago 5. Continental cousins: Maya, Aztec, and Inca 1 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-0-521-43544-4 - Liberties Lost: Caribbean Indigenous Societies and Slave Systems Hilary McD. Beckles and Verene A. Shepherd Excerpt More information 1 The culture of indigenous Caribbean people It has taken over 7,000 years for a Caribbean civilisation and culture to evolve. Throughout its history different groups of people like the Taino, Kalinago and Maya brought a range of beliefs, practices and traditions to create the foundations of the rich Caribbean culture that still exists today. Researchers generally agree that before 1492 the populations of the Caribbean region were very...

Words: 3305 - Pages: 14

Premium Essay

Week 13 Unemployment Research Paper

...unemployment, frictional unemployment, seasonal unemployment, and cyclical unemployment. All of which are key elements in defining unemployment. Structural unemployment is usually when there is advancement in technology or changes in market conditions that overtake certain jobs in the workforce. It correlates with the mismatch of jobs and workers due to a lack of a skill or simply the wrong area desired for work (Experimental). Structural unemployment depends on the social needs of the economy and dynamic...

Words: 647 - Pages: 3

Free Essay

E Governance

...governance * The word “electronic” in the term e government implies technology driven governance. (Siars, 2005) * is the application of Information and Communication Technology (ICT) for delivering government services, exchange of information communication transaction, integration of various stand alone systems and services between government-to-citizens(G2C), government-to-business(G2B), government-to-government (G2G) as well as back office processes and interactions within the entire government framework. (Siars, 2005) * The employment of the internet and the word-wide-web for delivering government information and services to the citizens. (United Nations, 2012) * Through e governance, the government services will be maid available to the citizens in a convenient, efficient and transparent manners. * The employment of the internet and the word-wide-web for delivering government information and services to the citizens. (United Nations, 2012) * Through e governance, the government services will be maid available to the citizens in a convenient, efficient and transparent manners. * The employment of the internet and the word-wide-web for delivering government information and services to the citizens. (United Nations, 2012) * Through e governance, the government services will be maid available to the citizens in a convenient, efficient and transparent manners. Origin of Egovernance * With the birth and proliferation of the internet, the...

Words: 417 - Pages: 2

Premium Essay

Internet

...system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and peer-to-peer networks for file sharing. Although the Internet protocol suite has been widely used by academia and the military industrial complex since the early 1980s, events of the late 1980s and 1990s such as more powerful and affordable computers, the advent of fiber optics, the popularization of HTTP and the Web browser, and a push towards opening the technology to commerce eventually incorporated its services and technologies into virtually every aspect of contemporary life. The impact of the Internet has been so immense that it has been referred to as the "8th continent". The origins of the Internet date back to research and development commissioned by the United States government, the Government of the UK and France in the 1960s to build robust, fault-tolerant communication via computer networks. This work, led to the primary precursor networks, the ARPANET, in the United States, the Mark 1 NPL network in the United...

Words: 545 - Pages: 3