In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall establishes a barrier between a trusted internal network and untrusted external network, such as the Internet. Firewalls are categorized as either network firewalls or host-based firewalls. Network run on network hardware. Host-based firewalls run on host computers and control network traffic out of those machines; the term firewall referred to a wall intended to confine a fire within a building. Uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment; the term was applied in the late 1980s to network technology that emerged when the Internet was new in terms of its global use and connectivity. The predecessors to firewalls for network security were the routers used in the late 1980s, because they separated networks from one another, thus halting the spread of problems from one network to another.
The first reported type of network firewall is called a packet filter. Packet filters act by inspecting packets transferred between computers; when a packet does not match the packet filter's set of filtering rules, the packet filter either drops the packet, or rejects the packet else it is allowed to pass. Packets may be filtered by source and destination network addresses, protocol and destination port numbers; the bulk of Internet communication in 20th and early 21st century used either Transmission Control Protocol or User Datagram Protocol in conjunction with well-known ports, enabling firewalls of that era to distinguish between, thus control, specific types of traffic, unless the machines on each side of the packet filter used the same non-standard ports. The first paper published on firewall technology was in 1988, when engineers from Digital Equipment Corporation developed filter systems known as packet filter firewalls. At AT&T Bell Labs, Bill Cheswick and Steve Bellovin continued their research in packet filtering and developed a working model for their own company based on their original first generation architecture.
From 1989–1990, three colleagues from AT&T Bell Laboratories, Dave Presotto, Janardan Sharma, Kshitij Nigam, developed the second generation of firewalls, calling them circuit-level gateways. Second-generation firewalls perform the work of their first-generation predecessors but maintain knowledge of specific conversations between endpoints by remembering which port number the two IP addresses are using at layer 4 of the OSI model for their conversation, allowing examination of the overall exchange between the nodes; this type of firewall is vulnerable to denial-of-service attacks that bombard the firewall with fake connections in an attempt to overwhelm the firewall by filling its connection state memory. Marcus Ranum, Wei Xu, Peter Churchyard released an application firewall known as Firewall Toolkit in October 1993; this became the basis for Gauntlet firewall at Trusted Information Systems. The key benefit of application layer filtering is that it can understand certain applications and protocols.
This is useful as it is able to detect if an unwanted application or service is attempting to bypass the firewall using a disallowed protocol on an allowed port, or detect if a protocol is being abused in any harmful way. As of 2012, the so-called next-generation firewall is nothing more than the "wider" or "deeper" inspection at the application layer. For example, the existing deep packet inspection functionality of modern firewalls can be extended to include: Intrusion prevention systems User identity management integration Web application firewall. WAF attacks may be implemented in the tool "WAF Fingerprinting utilizing timing side channels" Firewalls are categorized as network-based or host-based. Network-based firewalls are positioned on the gateway computers of WANs and intranets, they are either software appliances running on general-purpose hardware, or hardware-based firewall computer appliances. Firewall appliances may offer other functionality to the internal network they protect, such as acting as a DHCP or VPN server for that network.
Host-based firewalls are positioned on the network node itself and control network traffic in and out of those machines. The host-based firewall may be a daemon or service as a part of the operating system or an agent application such as endpoint security or protection; each has disadvantages. However, each has a role in layered security. Firewalls vary in type depending on where communication originates, where it is intercepted, the state of communication being traced. Network layer firewalls called packet filters, operate at a low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set; the firewall administrator may define the rules. The term "packet filter" originated in the context of BSD operating systems. Network layer firewalls fall into two sub-categories and stateless. Used packet filters on various versions of Unix are ipfw, NPF, PF, ip
E.T. the Extra-Terrestrial
E. T. the Extra-Terrestrial is a 1982 American science fiction film produced and directed by Steven Spielberg, written by Melissa Mathison. It features special effects by Carlo Rambaldi and Dennis Muren, stars Henry Thomas, Dee Wallace, Peter Coyote, Robert MacNaughton, Drew Barrymore, Pat Welsh, it tells the story of Elliott, a boy who befriends an extraterrestrial, dubbed "E. T.", stranded on Earth. Elliott and his siblings help E. T. return to his home planet. The concept was based on an imaginary friend Spielberg created after his parents' divorce in 1960. In 1980, Spielberg met Mathison and developed a new story from the stalled sci-fi horror film project Night Skies, it was filmed from September to December 1981 in California on a budget of $10.5 million USD. Unlike most films, it was shot in rough chronological order, to facilitate convincing emotional performances from the young cast. Released on June 12, 1982, by Universal Pictures, E. T. was an immediate blockbuster, surpassing Star Wars to become the highest-grossing film of all time—a record it held for eleven years until Jurassic Park, another Spielberg-directed film, surpassed it in 1993.
Considered one of the greatest films made, it was acclaimed by critics as a timeless story of friendship, it ranks as the greatest science fiction film made in a Rotten Tomatoes survey. In 1994, it was selected for preservation in the United States National Film Registry as being "culturally or aesthetically significant", it was re-released in 1985, again in 2002, to celebrate its 20th anniversary, with altered shots and additional scenes. A group of alien botanists secretly visit Earth under cover of night to gather plant specimens in a California forest; when government agents appear on the scene, the aliens flee in their spaceship, but in their haste, one of them is left behind. In a suburban neighborhood in the San Fernando Valley, a ten-year-old boy named Elliott is spending time with his brother and his friends; as he returns from picking up a pizza, he discovers. The alien promptly flees upon being discovered. Despite his family's disbelief, Elliott leaves Reese's Pieces candy to lure the alien to his house.
Before going to sleep, Elliott realizes. He feigns illness the next morning to play with it; that day and their five-year-old sister, meet it. They decide to keep it hidden from Mary; when they ask it about its origin, it levitates several balls to represent its planetary system and demonstrates its powers by reviving dead chrysanthemums. At school the next day, Elliott begins to experience a psychic connection with the alien, including exhibiting signs of intoxication, he begins freeing all the frogs in his biology class; as the alien watches John Wayne kiss Maureen O'Hara in The Quiet Man on television, Elliott kisses a girl he likes in the same manner and he is sent to the principal's office. The alien learns to speak English by repeating what Gertie says as she watches Sesame Street and, at Elliott's urging, dubs itself "E. T." E. T. reads a comic strip where Buck Rogers, calls for help by building a makeshift communication device and is inspired to try it himself. E. T. receives Elliott's help in building a device to "phone home" by using a Spell toy.
Michael notices that E. T.'s health is declining and that Elliott is referring to himself as "we". On Halloween and Elliott dress E. T. as a ghost so they can sneak him out of the house. That night, Elliott and E. T. head through the forest. The next day, Elliott wakes up in the field, only to find E. T. gone. Elliott returns home to his distressed family. Michael searches for and finds E. T. dying next to a culvert. Michael takes E. T. home to Elliott, dying. Mary becomes frightened when she discovers her son's illness and the dying alien, just as government agents invade the house. Scientists set up a hospital at the house, questioning Michael and Gertie while treating Elliott and E. T, their connection disappears and E. T. appears to die while Elliott recovers. A grief-stricken Elliott is left alone with the motionless E. T. when he notices a dead chrysanthemum, the plant E. T. had revived, coming back to life. E. T. reveals that his people are returning. Elliott and Michael steal a van that E. T. had been loaded into and a chase ensues, with Michael's friends joining them as they attempt to evade the authorities by bicycles.
Facing a police roadblock, they escape as E. T. uses telekinesis to lift them into the air and toward the forest, like he had done for Elliott before. Standing near the spaceship, E. T.'s heart glows. Mary, "Keys", a friendly government agent, show up. E. T. says goodbye to Michael and Gertie, as she presents him with the chrysanthemum that he had revived. Before boarding the spaceship, he embraces Elliott and tells him "I'll be right here", pointing his glowing finger to Elliott's forehead, he picks up the chrysanthemum, boards the spaceship, it takes off, leaving a rainbow in the sky as everyone watches it leave. Dee Wallace as Mary Henry Thomas as Elliott Peter Coyote as "Keys" Robert MacNaughton as Michael Drew Barrymore as Gertie Pat Welsh as the voice of E. T. K. C. Martel as Greg Sean Frye as Steve C. Thomas Howell as Tyler Erika Eleniak as the girl Elliott kisses After his parents' divorce in 1960, Spielberg filled the void with an imaginary alien companion, he said that the imaginary alien was "a friend who could be the brother never h
The Internet is the global system of interconnected computer networks that use the Internet protocol suite to link devices worldwide. It is a network of networks that consists of private, academic and government networks of local to global scope, linked by a broad array of electronic and optical networking technologies; the Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web, electronic mail and file sharing. Some publications no longer capitalize "internet"; the origins of the Internet date back to research commissioned by the federal government of the United States in the 1960s to build robust, fault-tolerant communication with computer networks. The primary precursor network, the ARPANET served as a backbone for interconnection of regional academic and military networks in the 1980s; the funding of the National Science Foundation Network as a new backbone in the 1980s, as well as private funding for other commercial extensions, led to worldwide participation in the development of new networking technologies, the merger of many networks.
The linking of commercial networks and enterprises by the early 1990s marked the beginning of the transition to the modern Internet, generated a sustained exponential growth as generations of institutional and mobile computers were connected to the network. Although the Internet was used by academia since the 1980s, commercialization incorporated its services and technologies into every aspect of modern life. Most traditional communication media, including telephony, television, paper mail and newspapers are reshaped, redefined, or bypassed by the Internet, giving birth to new services such as email, Internet telephony, Internet television, online music, digital newspapers, video streaming websites. Newspaper and other print publishing are adapting to website technology, or are reshaped into blogging, web feeds and online news aggregators; the Internet has enabled and accelerated new forms of personal interactions through instant messaging, Internet forums, social networking. Online shopping has grown exponentially both for major retailers and small businesses and entrepreneurs, as it enables firms to extend their "brick and mortar" presence to serve a larger market or sell goods and services online.
Business-to-business and financial services on the Internet affect supply chains across entire industries. The Internet has no single centralized governance in either technological implementation or policies for access and usage; the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers. The technical underpinning and standardization of the core protocols is an activity of the Internet Engineering Task Force, a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise. In November 2006, the Internet was included on USA Today's list of New Seven Wonders; when the term Internet is used to refer to the specific global system of interconnected Internet Protocol networks, the word is a proper noun that should be written with an initial capital letter.
In common use and the media, it is erroneously not capitalized, viz. the internet. Some guides specify that the word should be capitalized when used as a noun, but not capitalized when used as an adjective; the Internet is often referred to as the Net, as a short form of network. As early as 1849, the word internetted was used uncapitalized as an adjective, meaning interconnected or interwoven; the designers of early computer networks used internet both as a noun and as a verb in shorthand form of internetwork or internetworking, meaning interconnecting computer networks. The terms Internet and World Wide Web are used interchangeably in everyday speech. However, the World Wide Web or the Web is only one of a large number of Internet services; the Web is a collection of interconnected documents and other web resources, linked by hyperlinks and URLs. As another point of comparison, Hypertext Transfer Protocol, or HTTP, is the language used on the Web for information transfer, yet it is just one of many languages or protocols that can be used for communication on the Internet.
The term Interweb is a portmanteau of Internet and World Wide Web used sarcastically to parody a technically unsavvy user. Research into packet switching, one of the fundamental Internet technologies, started in the early 1960s in the work of Paul Baran and Donald Davies. Packet-switched networks such as the NPL network, ARPANET, the Merit Network, CYCLADES, Telenet were developed in the late 1960s and early 1970s; the ARPANET project led to the development of protocols for internetworking, by which multiple separate networks could be joined into a network of networks. ARPANET development began with two network nodes which were interconnected between the Network Measurement Center at the University of California, Los Angeles Henry Samueli School of Engineering and Applied Science directed by Leonard Kleinrock, the NLS system at SRI International by Douglas Engelbart in Menlo Park, California, on 29 October 1969; the third site was the Culler-Fried Interactive Mathematics Center at the University of California, Santa Barbara, followed by the University of
Digital video recorder
A digital video recorder is an electronic device that records video in a digital format to a disk drive, USB flash drive, SD memory card, SSD or other local or networked mass storage device. The term includes set-top boxes with direct to disk recording, portable media players and TV gateways with recording capability, digital camcorders. Personal computers are connected to video capture devices and used as DVRs. Many DVRs are classified as consumer electronic devices. Consumer digital video recorders ReplayTV and TiVo were launched at the 1999 Consumer Electronics Show in Las Vegas, Nevada. Microsoft demonstrated a unit with DVR capability, but this did not become available until the end of 1999 for full DVR features in Dish Network's DISHplayer receivers. TiVo shipped their first units on March 31, 1999. ReplayTV won the "Best of Show" award in the video category with Netscape co-founder Marc Andreessen as an early investor and board member, but TiVo was more successful commercially. Legal action by media companies forced ReplayTV to remove many features such as automatic commercial skip and the sharing of recordings over the Internet, but newer devices have regained these functions while adding complementary abilities, such as recording onto DVDs and programming and remote control facilities using PDAs, networked PCs, Web browsers.
In contrast to VCRs, hard-disk based digital video recorders make "time shifting" more convenient and allow for functions such as pausing live TV, instant replay, chasing playback and skipping over advertising during playback. Many DVRs use the MPEG format for compressing the digital video. Video recording capabilities have become an essential part of the modern set-top box, as TV viewers have wanted to take control of their viewing experiences; as consumers have been able to converge increasing amounts of video content on their set-tops, delivered by traditional'broadcast' cable and terrestrial as well as IP networks, the ability to capture programming and view it whenever they want has become a must-have function for many consumers. At the 1999 CES, Dish Network demonstrated the hardware that would have DVR capability with the assistance of Microsoft software. Which included WebTV Networks internet TV. By the end of 1999 the Dishplayer had full DVR capabilities and within a year, over 200,000 units were sold.
In the UK, digital video recorders are referred to as "plus boxes". Freeview+ have been around in the UK since the late 2000s. British Sky Broadcasting markets a popular combined receiver and DVR as Sky+. TiVo launched a UK model in 2000, is no longer supported, except for third party services, the continuation of TiVo through Virgin Media in 2010. South African based Africa Satellite TV beamer Multichoice launched their DVR, available on their DStv platform. In addition to ReplayTV and TiVo, there are a number of other suppliers of digital terrestrial DVRs, including Thomson, Fusion, Pace Micro Technology, Humax, VBox Communications, AC Ryan Playon and Advanced Digital Broadcast. Many satellite, cable and IPTV companies are incorporating digital video recording functions into their set-top box, such as with DirecTiVo, DISHPlayer/DishDVR, Scientific Atlanta Explorer 8xxx from Time Warner, Total Home DVR from AT&T U-verse, Motorola DCT6412 from Comcast and others, Moxi Media Center by Digeo, or Sky+.
Astro introduced their DVR system, called Astro MAX, the first PVR in Malaysia but was phased out two years after its introduction. In the case of digital television, there is no encoding necessary in the DVR since the signal is a digitally encoded MPEG stream; the digital video recorder stores the digital stream directly to disk. Having the broadcaster involved with, sometimes subsidizing, the design of the DVR can lead to features such as the ability to use interactive TV on recorded shows, pre-loading of programs, or directly recording encrypted digital streams, it can, however force the manufacturer to implement non-skippable advertisements and automatically expiring recordings. In the United States, the FCC has ruled that starting on July 1, 2007, consumers will be able to purchase a set-top box from a third-party company, rather than being forced to purchase or rent the set-top box from their cable company; this ruling only applies to "navigation devices," otherwise known as a cable television set-top box, not to the security functions that control the user's access to the content of the cable operator.
The overall net effect on digital video recorders and related technology is unlikely to be substantial as standalone DVRs are readily available on the open market. In Europe Free-To-Air and Pay TV TV gateways with multiple tuners have whole house recording capabilities allowing recording of TV programs to Network Attached Storage or attached USB storage, recorded programs are shared across the home network to tablet, smartphone, PC, Smart TV. In 2003 many Satellite and Cable providers introduced dual-tuner digital video recorders. In the UK, BSkyB introduced their first PVR Sky+ with dual tuner support in 2001; these machines have two independent tuners within the same receiver. The main use for this feature is the capability to record a live program while watching another live program or
Digital rights management
Digital rights management tools or technological protection measures are a set of access control technologies for restricting the use of proprietary hardware and copyrighted works. DRM technologies try to control the use and distribution of copyrighted works, as well as systems within devices that enforce these policies; the use of digital rights management is not universally accepted. Proponents of DRM argue that it is necessary to prevent intellectual property from being copied just as physical locks are needed to prevent personal property from being stolen, that it can help the copyright holder maintain artistic control, that it can ensure continued revenue streams; those opposed to DRM contend there is no evidence that DRM helps prevent copyright infringement, arguing instead that it serves only to inconvenience legitimate customers, that DRM helps big business stifle innovation and competition. Furthermore, works can become permanently inaccessible if the DRM scheme changes or if the service is discontinued.
DRM can restrict users from exercising their legal rights under the copyright law, such as backing up copies of CDs or DVDs, lending materials out through a library, accessing works in the public domain, or using copyrighted materials for research and education under the fair use doctrine. The Electronic Frontier Foundation and the Free Software Foundation consider the use of DRM systems to be an anti-competitive practice. Worldwide, many laws have been created which criminalize the circumvention of DRM, communication about such circumvention, the creation and distribution of tools used for such circumvention; such laws are part of the United States' Digital Millennium Copyright Act, the European Union's Copyright Directive. The rise of digital media and analog-to-digital conversion technologies has vastly increased the concerns of copyright-owning individuals and organizations within the music and movie industries. While analog media lost quality with each copy generation, in some cases during normal use, digital media files may be duplicated an unlimited number of times with no degradation in the quality.
The rise of personal computers as household appliances has made it convenient for consumers to convert media in a physical, analog or broadcast form into a universal, digital form for portability or viewing later. This, combined with the Internet and popular file-sharing tools, has made unauthorized distribution of copies of copyrighted digital media much easier. In 1983, a early implementation of Digital Rights Management was the Software Service System devised by the Japanese engineer Ryuichi Moriya. and subsequently refined under the name superdistribution. The SSS was based on encryption, with specialized hardware that controlled decryption and enabled payments to be sent to the copyright holder; the underlying principle of the SSS and subsequently of superdistribution was that the distribution of encrypted digital products should be unrestricted and that users of those products would not just be permitted to redistribute them but would be encouraged to do so. Common DRM techniques include restrictive licensing agreements: The access to digital materials and public domain is restricted to consumers as a condition of entering a website or when downloading software.
Encryption, scrambling of expressive material and embedding of a tag, designed to control access and reproduction of information, including backup copies for personal use. DRM technologies enable content publishers to enforce their own access policies on content, such as restrictions on copying or viewing; these technologies have been criticized for restricting individuals from copying or using the content such as by fair use. DRM is in common use by the entertainment industry. Many online music stores, such as Apple's iTunes Store, e-book publishers and vendors, such as OverDrive use DRM, as do cable and satellite service operators, to prevent unauthorized use of content or services. However, Apple dropped DRM from all iTunes music files around 2009. Industry has expanded the usage of DRM to more traditional hardware products, such as Keurig's coffeemakers, Philips' light bulbs, mobile device power chargers, John Deere's tractors. For instance, tractor companies try to prevent farmers from making DIY repairs under usage of DRM-laws as DMCA.
Computer games sometimes use DRM technologies to limit the number of systems the game can be installed on by requiring authentication with an online server. Most games with this restriction allow three or five installs, although some allow an installation to be'recovered' when the game is uninstalled; this not only limits users who have more than three or five computers in their homes, but can prove to be a problem if the user has to unexpectedly perform certain tasks like upgrading operating systems or reformatting the computer's hard drive, tasks which, depending on how the DRM is implemented, count a game's subsequent reinstall as a new installation, making the game unusable after a certain period if it is only used on a single computer. In mid-2008, the Windows version of Mass Effect marked the start of a wave of titles making use of SecuROM for DRM and requiring authentication with a server; the use of t
Sony BMG copy protection rootkit scandal
A scandal erupted in 2005 regarding Sony BMG's implementation of deceptive and harmful copy protection measures on about 22 million CDs. When inserted into a computer, the CDs installed one of two pieces of software which provided a form of digital rights management by modifying the operating system to interfere with CD copying. Neither program could be uninstalled, they created vulnerabilities that were exploited by unrelated malware. Sony claims. One of the programs installed if the user refused its end-user license agreement, would still "phone home" with reports on the user's private listening habits. Sony BMG denied that the rootkits were harmful, it released, for one of the programs, an "uninstaller" that only un-hid the program, installed additional software which could not be removed, collected an email address from the user, introduced further security vulnerabilities. Following public outcry, government investigations, class-action lawsuits in 2005 and 2006, Sony BMG addressed the scandal with consumer settlements, a recall of about 10% of the affected CDs, the suspension of CD copy protection efforts in early 2007.
In August 2000, statements by Sony Pictures Entertainment US senior VP Steve Heckler foreshadowed the events of late 2005. Heckler told attendees at the Americas Conference on Information Systems "The industry will take whatever steps it needs to protect itself and protect its revenue streams... It will not lose that revenue stream, no matter what... Sony is going to take aggressive steps to stop this. We will develop technology. We will firewall Napster at source – we will block it at your cable company. We will block it at your phone company. We will block it at your ISP. We will firewall it at your PC... These strategies are being aggressively pursued because there is too much at stake."In Europe, BMG created a minor scandal in 2001 when it released Natalie Imbruglia's second album, White Lilies Island, without warning labels stating that the CD had copy protection. The CDs were replaced. BMG and Sony both released copy-protected versions of certain releases in certain markets in late 2001, a late 2002 report indicated that all BMG CDs sold in Europe would have some form of copy protection.
The two pieces of copy-protection software at issue in the 2005–2007 scandal were included on over 22 million CDs marketed by Sony BMG, the record company formed by the 2004 merger of Sony and BMG's recorded music divisions. About two million of those CDs, spanning 52 titles, contained First 4 Internet's Extended Copy Protection, installed on Microsoft Windows systems after the user accepted the EULA which made no mention of the software; the remaining 20 million CDs, spanning 50 titles, contained SunnComm's MediaMax CD-3, installed on either Microsoft Windows or Mac OS X systems after the user was presented with the EULA, regardless of whether the user accepted it. The scandal erupted on October 31, 2005, when Winternals researcher Mark Russinovich posted to his blog a detailed description and technical analysis of F4I's XCP software that he ascertained had been installed on his computer by a Sony BMG music CD. Russinovich compared the software to a rootkit due to its surreptitious installation and its efforts to hide its existence.
He noted that the EULA does not mention the software, he asserted emphatically that the software is illegitimate and that digital rights management had "gone too far". Anti-virus firm F-Secure concurred: "Although the software isn't directly malicious, the used rootkit hiding techniques are the same used by malicious software to hide themselves; the DRM software will cause many similar false alarms with all AV software that detect rootkits.... Thus it is inappropriate for commercial software to use these techniques." After public pressure and other anti-virus vendors included detection for the rootkit in their products as well, Microsoft announced it would include detection and removal capabilities in its security patches. Russinovich discovered numerous problems with XCP: It creates security holes that can be exploited by malicious software such as worms or viruses, it runs in the background and excessively consumes system resources, slowing down the user's computer, regardless of whether there is a protected CD playing.
It employs unsafe procedures to stop, which could lead to system crashes. It has no uninstaller, is installed in such a way that inexpert attempts to uninstall it can lead to the operating system to fail to recognize existing drives. Soon after Russinovich's first post, there were several trojans and worms exploiting XCP's security holes; some people used the vulnerabilities to cheat in online games. Sony BMG released software to remove the rootkit component of XCP from affected Microsoft Windows computers, but after Russinovich analyzed the utility, he reported in his blog that it only exacerbated the security problems and raised further concerns about privacy. Russinovich noted that the removal program unmasked the hidden files installed by the rootkit, but did not remove the rootkit, he reported that it installed additional software that could not be uninstalled. In order to download the uninstaller, he found it was necessary to provide an e
Adobe Inc. is an American multinational computer software company headquartered in San Jose, California. It has focused upon the creation of multimedia and creativity software products, with a more recent foray towards digital marketing software. Adobe is best known for its Adobe Flash web software ecosystem, Photoshop image editing software, Acrobat Reader, the Portable Document Format, Adobe Creative Suite, as well as its successor Adobe Creative Cloud. Adobe was founded in December 1982 by John Warnock and Charles Geschke, who established the company after leaving Xerox PARC in order to develop and sell the PostScript page description language. In 1985, Apple Computer licensed PostScript for use in its LaserWriter printers, which helped spark the desktop publishing revolution; as of 2018, Adobe has about 19,000 employees worldwide, about 40% of whom work in San Jose. Adobe has major development operations in Newton, Massachusetts, it has major development operations in Noida and Bangalore in India The company was started in John Warnock's garage.
The name of the company, comes from Adobe Creek in Los Altos, which ran behind Warnock's house. Adobe's corporate logo features a stylized "A" and was designed by Marva Warnock, graphic designer and John Warnock's wife. Steve Jobs asked to buy the company for five million dollars in 1982, but Warnock and Geschke refused, their investors urged them to work something out with Jobs, so they agreed to sell him shares worth 19 percent of the company, for which Jobs paid a five-times multiple of their company's valuation at the time, plus a five-year license fee for PostScript, in advance. The purchase and advance made Adobe the first company in the history of Silicon Valley to become profitable in its first year. Warnock and Geschke considered various business options including a copy-service business and a turnkey system for office printing, they chose to focus on developing specialized printing software, created the Adobe PostScript page description language. PostScript was the first international standard for computer printing as it included algorithms describing the letter-forms of many languages.
Adobe added kanji printer products in 1988. Warnock and Geschke were able to bolster the credibility of Postscript by connecting with a typesetting manufacturer, they weren't able to work with Compugraphic, but worked with Linotype to license the Helvetica and Times Roman fonts. By 1987, PostScript had become the industry-standard printer language with more than 400 third-party software programs and licensing agreements with 19 printer companies. Warnock described the language as "extensible", in its ability to apply graphic arts standards to office printing. Adobe's first products after PostScript were digital fonts, which they released in a proprietary format called Type 1. Apple subsequently developed a competing standard, TrueType, which provided full scalability and precise control of the pixel pattern created by the font's outlines, licensed it to Microsoft. In the mid-1980s, Adobe entered the consumer software market with Illustrator, a vector-based drawing program for the Apple Macintosh.
Illustrator, which grew from the firm's in-house font-development software, helped popularize PostScript-enabled laser printers. Adobe entered NASDAQ in August 1986, its revenue has grown from $1 billion in 1999 to $4 billion in 2012. Adobe's fiscal years run from December to November. For example, the 2007 fiscal year ended on November 30, 2007. In 1989, Adobe introduced what was to become its flagship product, a graphics editing program for the Macintosh called Photoshop. Stable and full-featured, Photoshop 1.0 was ably soon dominated the market. In 1993, Adobe introduced PDF, the Portable Document Format, its Adobe Acrobat and Reader software. PDF is now an International Standard: ISO 32000-1:2008. In December 1991, Adobe released Adobe Premiere, which Adobe rebranded as Adobe Premiere Pro in 2003. In 1992, Adobe acquired Inc.. In 1994, Adobe acquired Aldus and added PageMaker and After Effects to its product line in the year. In the same year, Adobe acquired Compution Inc.. In 1995, Adobe added FrameMaker, the long-document DTP application, to its product line after Adobe acquired Frame Technology Corp.
In 1996, Adobe Inc added Ares Software Corp. In 2002, Adobe acquired Canadian company Accelio. On December 12, 2005, Adobe acquired its main rival, Macromedia, in a stock swap valued at about $3.4 billion, adding ColdFusion, Captivate, Adobe Connect, Dreamweaver, Flash, FlashPaper, FreeHand, HomeSite, JRun and Authorware to Adobe's product line. Adobe released Adobe Media Player in April 2008. On April 27, Adobe discontinued development and sales of its older HTML/web development software, GoLive in favor of Dreamweaver. Adobe offered a discount on Dreamweaver for GoLive users and supports those who still use GoLive with online tutorials and migration assistance. On June 1, Adobe launched a series of web applications geared for collaborative work. Creative Suite 4, which includes Design, Production Premium, Master Collection came out in October 2008 in six configurations at prices from about US$1,700 to $2,500 or by individual application; the Windows version of Photoshop includes 64-bit processing.
On December 3, 2008, Adobe laid off 600 of its employees citing the weak economic environment. On November 10, 2009, the company laid off a further 680 emplo