The Straight Dope. October 15, 2004. Zabunov, S. "From Annoyance to Pleasure — The Artistic Popup Approach". May 12, 2006. Hover Ad Examples DHTML popup tutorial DHTML popup tutorial via Internet Archive
Online advertising called online marketing or Internet advertising or web advertising, is a form of marketing and advertising which uses the Internet to deliver promotional marketing messages to consumers. Consumers view online advertising as an unwanted distraction with few benefits and have turned to ad blocking for a variety of reasons; when software is used to do the purchasing, it is known as programmatic advertising. It includes email marketing, search engine marketing, social media marketing, many types of display advertising, mobile advertising. Like other advertising media, online advertising involves both a publisher, who integrates advertisements into its online content, an advertiser, who provides the advertisements to be displayed on the publisher's content. Other potential participants include advertising agencies who help generate and place the ad copy, an ad server which technologically delivers the ad and tracks statistics, advertising affiliates who do independent promotional work for the advertiser.
In 2016, Internet advertising revenues in the United States surpassed those of cable television and broadcast television. In 2017, Internet advertising revenues in the United States totaled $83.0 billion, a 14% increase over the $72.50 billion in revenues in 2016. Many common online advertising practices are controversial and subject to regulation. Online ad revenues may not adequately replace other publishers' revenue streams. Declining ad revenue has led some publishers to place their content behind paywalls. In early days of the Internet, online advertising was prohibited. For example, two of the predecessor networks to the Internet, ARPANET and NSFNet, had "acceptable use policies" that banned network "use for commercial activities by for-profit institutions"; the NSFNet began phasing out its commercial use ban in 1991. The first publicized example of online advertising was conducted via electronic mail. On 3 May 1978, a marketer from DEC, Gary Thuerk, sent an email to most of the ARPANET's American west coast users, advertising an open house for a new model of a DEC computer.
Despite the prevailing acceptable use policies, electronic mail marketing expanded and became known as "spam." The first known large-scale non-commercial spam message was sent on 18 January 1994 by an Andrews University system administrator, by cross-posting a religious message to all USENET newsgroups. In January 1994 Mark Eberra started the first email marketing company for opt in email list under the domain Insideconnect.com. He started the Direct Email Marketing Association to help stop unwanted email and prevent spam. Four months Laurence Canter and Martha Siegel, partners in a law firm, broadly promoted their legal services in a USENET posting titled "Green Card Lottery – Final One?" Canter and Siegel's Green Card USENET spam raised the profile of online advertising, stimulating widespread interest in advertising via both Usenet and traditional email. More spam has evolved into a more industrial operation, where spammers use armies of virus-infected computers to send spam remotely. Online banner advertising began in the early 1990s as page owners sought additional revenue streams to support their content.
Commercial online service Prodigy displayed banners at the bottom of the screen to promote Sears products. The first clickable web ad was sold by Global Network Navigator in 1993 to a Silicon Valley law firm. In 1994, web banner advertising became mainstream when HotWired, the online component of Wired Magazine, sold banner ads to AT&T and other companies; the first AT&T ad on HotWired had a 44% click-through rate, instead of directing clickers to AT&T's website, the ad linked to an online tour of seven of the world's most acclaimed art museums. GoTo.com created the first search advertising keyword auction in 1998. Google launched its "AdWords" search advertising program in 2000 and introduced quality-based ranking allocation in 2002, which sorts search advertisements by a combination of bid price and searchers' likeliness to click on the ads. More companies have sought to merge their advertising messages into editorial content or valuable services. Examples include Red Bull's Red Bull Media House streaming Felix Baumgartner's jump from space online, Coca-Cola's online magazines, Nike's free applications for performance tracking.
Advertisers may deliver ads based on a user's suspected geo
Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way, not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as Ukash and cryptocurrency are used for the ransoms, making tracing and prosecuting the perpetrators difficult. Ransomware attacks are carried out using a Trojan, disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment. However, one high-profile example, the "WannaCry worm", traveled automatically between computers without user interaction.
Starting from around 2012 the use of ransomware scams has grown internationally. There were 181.5 million ransomware attacks in the first six months of 2018. This marks a 229% increase over this same time frame in 2017. In June 2013, vendor McAfee released data showing that it had collected more than double the number of samples of ransomware that quarter than it had in the same quarter of the previous year. CryptoLocker was successful, procuring an estimated US $3 million before it was taken down by authorities, CryptoWall was estimated by the US Federal Bureau of Investigation to have accrued over US $18m by June 2015; the concept of file encrypting ransomware was invented and implemented by Young and Yung at Columbia University and was presented at the 1996 IEEE Security & Privacy conference. It is called cryptoviral extortion and it was inspired by the fictional facehugger in the movie Alien. Cryptoviral extortion is the following three-round protocol carried out between the attacker and the victim.
The attacker places the corresponding public key in the malware. The malware is released. To carry out the cryptoviral extortion attack, the malware generates a random symmetric key and encrypts the victim's data with it, it uses the public key in the malware to encrypt the symmetric key. This is known as hybrid encryption and it results in a small asymmetric ciphertext as well as the symmetric ciphertext of the victim's data, it zeroizes the original plaintext data to prevent recovery. It puts up a message to the user how to pay the ransom; the victim sends the asymmetric e-money to the attacker. The attacker receives the payment, deciphers the asymmetric ciphertext with the attacker's private key, sends the symmetric key to the victim; the victim deciphers the encrypted data with the needed symmetric key thereby completing the cryptovirology attack. The symmetric key will not assist other victims. At no point is the attacker's private key exposed to victims and the victim need only send a small ciphertext to the attacker.
Ransomware attacks are carried out using a Trojan, entering a system through, for example, a malicious attachment, embedded link in a Phishing email, or a vulnerability in a network service. The program runs a payload, which locks the system in some fashion, or claims to lock the system but does not. Payloads may display a fake warning purportedly by an entity such as a law enforcement agency, falsely claiming that the system has been used for illegal activities, contains content such as pornography and "pirated" media; some payloads consist of an application designed to lock or restrict the system until payment is made by setting the Windows Shell to itself, or modifying the master boot record and/or partition table to prevent the operating system from booting until it is repaired. The most sophisticated payloads encrypt files, with many using strong encryption to encrypt the victim's files in such a way that only the malware author has the needed decryption key. Payment is always the goal, the victim is coerced into paying for the ransomware to be removed—which may or may not occur—either by supplying a program that can decrypt the files, or by sending an unlock code that undoes the payload's changes.
A key element in making ransomware work for the attacker is a convenient payment system, hard to trace. A range of such payment methods have been used, including wire transfers, premium-rate text messages, pre-paid voucher services such as paysafecard, the digital currency bitcoin. A 2016 survey commissioned by Citrix claimed that larger businesses are holding bitcoin as contingency plans; the first known malware extortion attack, the "AIDS Trojan" written by Joseph Popp in 1989, had a design failure so severe it was not necessary to pay the extortionist at all. Its payload hid the files on the hard drive and encrypted only their names, displayed a message claiming that the user's license to use a certain piece of software had expired; the user was asked to pay US$189 to "PC Cyborg Corporation" in order to obtain a repair tool though the decryption key could be extracted from the code of the Trojan. The Trojan was known as "PC Cyborg". Popp was declared mentally unfit to stand trial for his actions, but he promised to donate the profits from the malware to fund AIDS research.
The idea of abusing anonymous cash systems to safely collect ransom from human kidnapping was introduced in 1992 by Sebastiaan von Solms and David Naccache. This electronic money collec
Adobe Flash is a deprecated multimedia software platform used for production of animations, rich Internet applications, desktop applications, mobile applications, mobile games and embedded web browser video players. Flash displays text, vector graphics and raster graphics to provide animations, video games and applications, it allows streaming of audio and video, can capture mouse, keyboard and camera input. Related development platform Adobe AIR continues to be supported. Artists may produce Flash animations using Adobe Animate. Software developers may produce applications and video games using Adobe Flash Builder, FlashDevelop, Flash Catalyst, or any text editor when used with the Apache Flex SDK. End-users can view Flash content via AIR or third-party players such as Scaleform. Adobe Flash Player enables end-users to view Flash content using web browsers. Adobe Flash Lite enabled viewing Flash content on older smartphones, but has been discontinued and superseded by Adobe AIR; the ActionScript programming language allows the development of interactive animations, video games, web applications, desktop applications and mobile applications.
Programmers can implement Flash software using an IDE such as Adobe Animate, Adobe Flash Builder, Adobe Director, FlashDevelop and Powerflasher FDT. Adobe AIR enables full-featured desktop and mobile applications to be developed with Flash and published for Windows, macOS, Android, iOS, Xbox One, PlayStation 4, Nintendo Wii U, Switch. Although Flash was a dominant platform for online multimedia content, it is being abandoned as Adobe favors a transition to HTML5. Flash Player has been deprecated and has an official end-of-life at the end of 2020. However, Adobe will continue to develop Adobe AIR, a related technology for building stand-alone applications and games. In the early 2000s, Flash was installed on desktop computers, was used to display interactive web pages, online games, to playback video and audio content. In 2005, YouTube was founded by former PayPal employees, it used Flash Player as a means to display compressed video content on the web. Between 2000 and 2010, numerous businesses used Flash-based websites to launch new products, or to create interactive company portals.
Notable users include Nike, Hewlett-Packard, General Electric, World Wildlife Fund, HBO, Cartoon Network and Motorola. After Adobe introduced hardware-accelerated 3D for Flash, Flash websites saw a growth of 3D content for product demonstrations and virtual tours. In 2007, YouTube offered videos in HTML5 format to support the iPhone and iPad, which did not support Flash Player. After a controversy with Apple, Adobe stopped developing Flash Player for Mobile, focussing its efforts on Adobe AIR applications and HTML5 animation. In 2015, Google introduced Google Swiffy to convert Flash animation to HTML5, a tool Google would use to automatically convert Flash web ads for mobile devices. In 2016, Google discontinued its support. In 2015, YouTube switched to HTML5 technology on all devices. After Flash 5 introduced ActionScript in 2000, developers combined the visual and programming capabilities of Flash to produce interactive experiences and applications for the Web; such Web-based applications came to be known as "Rich Internet Applications".
In 2004, Macromedia Flex was released, targeted the application development market. Flex introduced new user interface components, advanced data visualization components, data remoting, a modern IDE. Flex competed with Microsoft Silverlight during its tenure. Flex was upgraded to support integration with remote data sources, using AMF, BlazeDS, Adobe LiveCycle, Amazon Elastic Compute Cloud, others; as of 2015, Flex applications can be published for desktop platforms using Adobe AIR. Between 2006 and 2016, the Speedtest.net web service conducted over 9.0 billion speed tests using an RIA built with Adobe Flash. In 2016, the service shifted to HTML5 due to the decreasing availability of Adobe Flash Player on PCs; as of 2016, Web applications and RIAs can be developed with Flash using the ActionScript 3.0 programming language and related tools such as Adobe Flash Builder. Third-party IDEs such as FlashDevelop and Powerflasher FDT enable developers to create Flash games and applications, are similar to Microsoft Visual Studio.
Flex applications are built using Flex frameworks such as PureMVC. Flash video games were popular on the Internet, with portals like Newgrounds and Armor Games dedicated to hosting of Flash-based games. Popular games developed with Flash include Angry Birds, Clash of Clans, FarmVille, AdventureQuest, Hundreds, N, QWOP and Solipskier. Adobe introduced various technologies to help build video games, including Adobe AIR, Adobe Scout, CrossBridge, Stage3D. 3D frameworks like Away3D and Flare3D simplified creation of 3D content for Flash. Adobe AIR allows creation of Flash-based mobile games, which may be published to the Google Play and Apple app stores. Flash is used to build interfaces and HUDs for 3D video games using Scaleform GFx, a technology that renders Flash content within non-Flash video games. Scaleform is supported by more than 10 major video game engines including Unreal Engine, UDK, CryEngine and PhyreEngine, has been used to provide 3D interfaces for more than 150 majo
Windows XP is a personal computer operating system produced by Microsoft as part of the Windows NT family of operating systems. It was released to manufacturing on August 24, 2001, broadly released for retail sale on October 25, 2001. Development of Windows XP began in the late 1990s as "Neptune", an operating system built on the Windows NT kernel, intended for mainstream consumer use. An updated version of Windows 2000 was originally planned for the business market; as such, Windows XP was the first consumer edition of Windows not to be based on MS-DOS. Upon its release, Windows XP received positive reviews, with critics noting increased performance and stability, a more intuitive user interface, improved hardware support, expanded multimedia capabilities. However, some industry reviewers were concerned by the new licensing model and product activation system. Extended support for Windows XP ended on April 8, 2014, after which the operating system ceased receiving further support or security updates to most users.
As of March 2019, 1.75% of Windows PCs run Windows XP, the OS is still most popular in some countries with up to 38% of the Windows share. In the late 1990s, initial development of what would become Windows XP was focused on two individual products. However, the projects proved to be too ambitious. In January 2000, shortly prior to the official release of Windows 2000, technology writer Paul Thurrott reported that Microsoft had shelved both Neptune and Odyssey in favor of a new product codenamed "Whistler", after Whistler, British Columbia, as many Microsoft employees skied at the Whistler-Blackcomb ski resort; the goal of Whistler was to unify both the consumer and business-oriented Windows lines under a single, Windows NT platform: Thurrott stated that Neptune had become "a black hole when all the features that were cut from were re-tagged as Neptune features. And since Neptune and Odyssey would be based on the same code-base anyway, it made sense to combine them into a single project". At PDC on July 13, 2000, Microsoft announced that Whistler would be released during the second half of 2001, unveiled the first preview build, 2250.
The build notably introduced an early version of Windows XP's visual styles system. Microsoft released the first beta build of Whistler, build 2296, on October 31, 2000. Subsequent builds introduced features that users of the release version of Windows XP would recognise, such as Internet Explorer 6.0, the Microsoft Product Activation system and the Bliss desktop background. On February 5, 2001, Microsoft announced that Whistler would be known as Windows XP, where XP stands for "eXPerience". In June 2001, Microsoft indicated that it was planning to, in conjunction with Intel and other PC makers, spend at least 1 billion US dollars on marketing and promoting Windows XP; the theme of the campaign, "Yes You Can", was designed to emphasize the platform's overall capabilities. Microsoft had planned to use the slogan "Prepare to Fly", but it was replaced due to sensitivity issues in the wake of the September 11 attacks. On August 24, 2001, Windows XP build. During a ceremonial media event at Microsoft Redmond Campus, copies of the RTM build were given to representatives of several major PC manufacturers in briefcases, who flew off on decorated helicopters.
While PC manufacturers would be able to release devices running XP beginning on September 24, 2001, XP was expected to reach general, retail availability on October 25, 2001. On the same day, Microsoft announced the final retail pricing of XP's two main editions, "Home" and "Professional". While retaining some similarities to previous versions, Windows XP's interface was overhauled with a new visual appearance, with an increased use of alpha compositing effects, drop shadows, "visual styles", which changed the appearance of the operating system; the number of effects enabled are determined by the operating system based on the computer's processing power, can be enabled or disabled on a case-by-case basis. XP added ClearType, a new subpixel rendering system designed to improve the appearance of fonts on liquid-crystal displays. A new set of system icons was introduced; the default wallpaper, Bliss, is a photo of a landscape in the Napa Valley outside Napa, with rolling green hills and a blue sky with stratocumulus and cirrus clouds.
The Start menu received its first major overhaul in XP, switching to a two-column layout with the ability to list and display used applications opened documents, the traditional cascading "All Programs" menu. The taskbar can now group windows opened by a single application into one taskbar button, with a popup menu listing the individual windows; the notification area hides "inactive" icons by default. A "common tasks" list was added, Windows Explorer's sidebar was updated to use a new task-based design with lists of common actions. Fast user switching allows additional users to log into a Windows XP machine without existing users having to close their programs and loggin
United States Patent and Trademark Office
The United States Patent and Trademark Office is an agency in the U. S. Department of Commerce that issues patents to inventors and businesses for their inventions, trademark registration for product and intellectual property identification; the USPTO is "unique among federal agencies because it operates on fees collected by its users, not on taxpayer dollars". Its "operating structure is like a business in that it receives requests for services—applications for patents and trademark registrations—and charges fees projected to cover the cost of performing the services provide"; the USPTO is based in Alexandria, after a 2005 move from the Crystal City area of neighboring Arlington, Virginia. The offices under Patents and the Chief Information Officer that remained just outside the southern end of Crystal City completed moving to Randolph Square, a brand-new building in Shirlington Village, on April 27, 2009; the current Under Secretary of Commerce for Intellectual Property and Director of the USPTO is Andrei Iancu.
He began his role as Director on February 8, 2018. Iancu was nominated by President Trump in August 2017, unanimously confirmed by the U. S. Senate. Prior to joining the USPTO, he was the Managing Partner at Irell & Manella LLP, where his practice focused on intellectual property litigation; the USPTO cooperates with the European Patent Office and the Japan Patent Office as one of the Trilateral Patent Offices. The USPTO is a Receiving Office, an International Searching Authority and an International Preliminary Examination Authority for international patent applications filed in accordance with the Patent Cooperation Treaty; the USPTO maintains a permanent, interdisciplinary historical record of all U. S. patent applications in order to fulfill objectives outlined in the United States Constitution. The legal basis for the United States patent system is Article 1, Section 8, wherein the powers of Congress are defined, it states, in part: The Congress shall have Power... To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.
The PTO's mission is to promote "industrial and technological progress in the United States and strengthen the national economy" by: Administering the laws relating to patents and trademarks. The USPTO is headquartered at the Alexandria Campus, consisting of 11 buildings in a city-like development surrounded by ground floor retail and high rise residential buildings between the Metro stations of King Street station and Eisenhower Avenue station where the actual Alexandria Campus is located between Duke Street to Eisenhower Avenue, between John Carlyle Street to Elizabeth Lane in Alexandria, Virginia. An additional building in Arlington, was opened in 2009; the USPTO was expected by 2014 to open its first satellite offices in Detroit, Dallas and Silicon Valley to reduce backlog and reflect regional industrial strengths. The first satellite office opened in Detroit on July 13, 2012. In 2013, due to the budget sequestration, the satellite office for Silicon Valley, home to one of the nation's top patent-producing cities, was put on hold.
However and infrastructure updates continued after the sequestration, the Silicon Valley location opened in the San Jose City Hall in 2015. As of September 30, 2009, the end of the U. S. government's fiscal year, the PTO had 9,716 employees, nearly all of whom are based at its five-building headquarters complex in Alexandria. Of those, 6,242 were patent examiners and 388 were trademark examining attorneys. While the agency has noticeably grown in recent years, the rate of growth was far slower in fiscal 2009 than in the recent past. Patent examiners make up the bulk of the employees at USPTO, they hold degrees in various scientific disciplines, but do not hold law degrees. Unlike patent examiners, trademark examiners must be licensed attorneys. All examiners work under a strict, "count"-based production system. For every application, "counts" are earned by composing and mailing a first office action on the merits, upon disposal of an application; the Commissioner for Patents oversees three main bodies, headed by former Deputy Commissioner for Patent Operations Peggy Focarino, the Deputy Commissioner for Patent Examination Policy Andrew Hirshfeld as Acting Deputy, the Commissioner for Patent Resources and Planning, vacant.
The Patent Operations of the office is divided into nine different technology centers that deal with various arts. Prior to 2012, decisions of patent examiners may be appealed to the Board of Patent Appeals and Interferences, an administrative law body of the USPTO. Decisions of the BPAI could further be appealed to the United States Court of Appeals for the Federal Circuit, or a civil suit may be brought against the Commissioner of Patents in the United States District Court for the Eastern District of Virginia; the United States Supreme Court may decide on a patent case. Under the America Invents Act, the BPAI was converted to the Patent Trial and Appeal Board or "PTAB". Simila
Graphical user interface
The graphical user interface is a form of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation. GUIs were introduced in reaction to the perceived steep learning curve of command-line interfaces, which require commands to be typed on a computer keyboard; the actions in a GUI are performed through direct manipulation of the graphical elements. Beyond computers, GUIs are used in many handheld mobile devices such as MP3 players, portable media players, gaming devices and smaller household and industrial controls; the term GUI tends not to be applied to other lower-display resolution types of interfaces, such as video games, or not including flat screens, like volumetric displays because the term is restricted to the scope of two-dimensional display screens able to describe generic information, in the tradition of the computer science research at the Xerox Palo Alto Research Center.
Designing the visual composition and temporal behavior of a GUI is an important part of software application programming in the area of human–computer interaction. Its goal is to enhance the efficiency and ease of use for the underlying logical design of a stored program, a design discipline named usability. Methods of user-centered design are used to ensure that the visual language introduced in the design is well-tailored to the tasks; the visible graphical interface features of an application are sometimes referred to as chrome or GUI. Users interact with information by manipulating visual widgets that allow for interactions appropriate to the kind of data they hold; the widgets of a well-designed interface are selected to support the actions necessary to achieve the goals of users. A model–view–controller allows flexible structures in which the interface is independent from and indirectly linked to application functions, so the GUI can be customized easily; this allows users to select or design a different skin at will, eases the designer's work to change the interface as user needs evolve.
Good user interface design relates to users more, to system architecture less. Large widgets, such as windows provide a frame or container for the main presentation content such as a web page, email message or drawing. Smaller ones act as a user-input tool. A GUI may be designed for the requirements of a vertical market as application-specific graphical user interfaces. Examples include automated teller machines, point of sale touchscreens at restaurants, self-service checkouts used in a retail store, airline self-ticketing and check-in, information kiosks in a public space, like a train station or a museum, monitors or control screens in an embedded industrial application which employ a real-time operating system. By the 1980s, cell phones and handheld game systems employed application specific touchscreen GUIs. Newer automobiles use GUIs in their navigation systems and multimedia centers, or navigation multimedia center combinations. Sample graphical desktop environments A GUI uses a combination of technologies and devices to provide a platform that users can interact with, for the tasks of gathering and producing information.
A series of elements conforming a visual language have evolved to represent information stored in computers. This makes it easier for people with few computer skills to use computer software; the most common combination of such elements in GUIs is the windows, menus, pointer paradigm in personal computers. The WIMP style of interaction uses a virtual input device to represent the position of a pointing device, most a mouse, presents information organized in windows and represented with icons. Available commands are compiled together in menus, actions are performed making gestures with the pointing device. A window manager facilitates the interactions between windows and the windowing system; the windowing system handles hardware devices such as pointing devices, graphics hardware, positioning of the pointer. In personal computers, all these elements are modeled through a desktop metaphor to produce a simulation called a desktop environment in which the display represents a desktop, on which documents and folders of documents can be placed.
Window managers and other software combine to simulate the desktop environment with varying degrees of realism. Smaller mobile devices such as personal digital assistants and smartphones use the WIMP elements with different unifying metaphors, due to constraints in space and available input devices. Applications for which WIMP is not well suited may use newer interaction techniques, collectively termed post-WIMP user interfaces; as of 2011, some touchscreen-based operating systems such as Apple's iOS and Android use the class of GUIs named post-WIMP. These support styles of interaction using more than one finger in contact with a display, which allows actions such as pinching and rotating, which are unsupported by one pointer and mouse. Human interface devices, for the efficient interaction with a GUI include a computer keyboard used together with keyboard shortcuts, pointing devices for the cursor control: mouse, pointing stick, trackball, virtual keyboards, head-up displays. There are actions performed by programs that affect the GUI.
For example, there are components like inotify or D-Bus to facilitate communication between computer programs. Ivan Sutherland developed Sketchpad in 1963 held as the first graphical co