Microsoft Corporation is an American multinational technology company with headquarters in Redmond, Washington. It develops, licenses and sells computer software, consumer electronics, personal computers, related services, its best known software products are the Microsoft Windows line of operating systems, the Microsoft Office suite, the Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface lineup of touchscreen personal computers; as of 2016, it is the world's largest software maker by revenue, one of the world's most valuable companies. The word "Microsoft" is a portmanteau of "microcomputer" and "software". Microsoft is ranked No. 30 in the 2018 Fortune 500 rankings of the largest United States corporations by total revenue. Microsoft was founded by Bill Gates and Paul Allen on April 4, 1975, to develop and sell BASIC interpreters for the Altair 8800, it rose to dominate the personal computer operating system market with MS-DOS in the mid-1980s, followed by Microsoft Windows.
The company's 1986 initial public offering, subsequent rise in its share price, created three billionaires and an estimated 12,000 millionaires among Microsoft employees. Since the 1990s, it has diversified from the operating system market and has made a number of corporate acquisitions, their largest being the acquisition of LinkedIn for $26.2 billion in December 2016, followed by their acquisition of Skype Technologies for $8.5 billion in May 2011. As of 2015, Microsoft is market-dominant in the IBM PC-compatible operating system market and the office software suite market, although it has lost the majority of the overall operating system market to Android; the company produces a wide range of other consumer and enterprise software for desktops and servers, including Internet search, the digital services market, mixed reality, cloud computing and software development. Steve Ballmer replaced Gates as CEO in 2000, envisioned a "devices and services" strategy; this began with the acquisition of Danger Inc. in 2008, entering the personal computer production market for the first time in June 2012 with the launch of the Microsoft Surface line of tablet computers.
Since Satya Nadella took over as CEO in 2014, the company has scaled back on hardware and has instead focused on cloud computing, a move that helped the company's shares reach its highest value since December 1999. In 2018, Microsoft surpassed Apple as the most valuable publicly traded company in the world after being dethroned by the tech giant in 2010. Childhood friends Bill Gates and Paul Allen sought to make a business utilizing their shared skills in computer programming. In 1972 they founded their first company, named Traf-O-Data, which sold a rudimentary computer to track and analyze automobile traffic data. While Gates enrolled at Harvard, Allen pursued a degree in computer science at Washington State University, though he dropped out of school to work at Honeywell; the January 1975 issue of Popular Electronics featured Micro Instrumentation and Telemetry Systems's Altair 8800 microcomputer, which inspired Allen to suggest that they could program a BASIC interpreter for the device. After a call from Gates claiming to have a working interpreter, MITS requested a demonstration.
Since they didn't yet have one, Allen worked on a simulator for the Altair while Gates developed the interpreter. Although they developed the interpreter on a simulator and not the actual device, it worked flawlessly when they demonstrated the interpreter to MITS in Albuquerque, New Mexico. MITS agreed to distribute it, marketing it as Altair BASIC. Gates and Allen established Microsoft on April 4, 1975, with Gates as the CEO; the original name of "Micro-Soft" was suggested by Allen. In August 1977 the company formed an agreement with ASCII Magazine in Japan, resulting in its first international office, "ASCII Microsoft". Microsoft moved to a new home in Bellevue, Washington in January 1979. Microsoft entered the operating system business in 1980 with its own version of Unix, called Xenix. However, it was MS-DOS. After negotiations with Digital Research failed, IBM awarded a contract to Microsoft in November 1980 to provide a version of the CP/M OS, set to be used in the upcoming IBM Personal Computer.
For this deal, Microsoft purchased a CP/M clone called 86-DOS from Seattle Computer Products, which it branded as MS-DOS, though IBM rebranded it to PC DOS. Following the release of the IBM PC in August 1981, Microsoft retained ownership of MS-DOS. Since IBM had copyrighted the IBM PC BIOS, other companies had to reverse engineer it in order for non-IBM hardware to run as IBM PC compatibles, but no such restriction applied to the operating systems. Due to various factors, such as MS-DOS's available software selection, Microsoft became the leading PC operating systems vendor; the company expanded into new markets with the release of the Microsoft Mouse in 1983, as well as with a publishing division named Microsoft Press. Paul Allen resigned from Microsoft in 1983 after developing Hodgkin's disease. Allen claimed that Gates wanted to dilute his share in the company when he was diagnosed with Hodgkin's disease because he didn't think he was working hard enough. After leaving Microsoft, Allen lost billions of dollars on ill-conceived or mistimed technology investments.
He invested in low-tech sectors, sports teams, commercial real estate. Despite having begun jointly developing a new operating system, OS/2, with IBM in
A command-line interface or command language interpreter known as command-line user interface, console user interface and character user interface, is a means of interacting with a computer program where the user issues commands to the program in the form of successive lines of text. A program which handles the interface is called shell; the CLI was the primary means of interaction with most computer systems on computer terminals in the mid-1960s, continued to be used throughout the 1970s and 1980s on OpenVMS, Unix systems and personal computer systems including MS-DOS, CP/M and Apple DOS. The interface is implemented with a command line shell, a program that accepts commands as text input and converts commands into appropriate operating system functions. Today, many end users if use command-line interfaces and instead rely upon graphical user interfaces and menu-driven interactions. However, many software developers, system administrators and advanced users still rely on command-line interfaces to perform tasks more efficiently, configure their machine, or access programs and program features that are not available through a graphical interface.
Alternatives to the command line include, but are not limited to text user interface menus, keyboard shortcuts, various other desktop metaphors centered on the pointer. Examples of this include the Windows versions 1, 2, 3, 3.1, 3.11, DosShell, Mouse Systems PowerPanel. Programs with command-line interfaces are easier to automate via scripting. Command-line interfaces for software other than operating systems include a number of programming languages such as Tcl/Tk, PHP, others, as well as utilities such as the compression utility WinZip, some FTP and SSH/Telnet clients. Compared with a graphical user interface, a command line requires fewer system resources to implement. Since options to commands are given in a few characters in each command line, an experienced user finds the options easier to access. Automation of repetitive tasks is simplified - most operating systems using a command line interface support some mechanism for storing used sequences in a disk file, for re-use. A command-line history can be kept, allowing repetition of commands.
A command-line system may require paper or online manuals for the user's reference, although a "help" option provides a concise review of the options of a command. The command-line environment may not provide the graphical enhancements such as different fonts or extended edit windows found in a GUI, it may be difficult for a new user to become familiar with all the commands and options available, compared with the drop-down menus of a graphical user interface, without repeated reference to manuals. Operating system command line interfaces are distinct programs supplied with the operating system. A program that implements such a text interface is called a command-line interpreter, command processor or shell. Examples of command-line interpreters include DEC's DIGITAL Command Language in OpenVMS and RSX-11, the various Unix shells, CP/M's CCP, DOS's COMMAND. COM, as well as the OS/2 and the Windows CMD. EXE programs, the latter groups being based on DEC's RSX-11 and RSTS CLIs. Under most operating systems, it is possible to replace the default shell program with alternatives.
Although the term'shell' is used to describe a command-line interpreter speaking a'shell' can be any program that constitutes the user-interface, including graphically oriented ones. For example, the default Windows GUI is a shell program named EXPLORER. EXE, as defined in the SHELL=EXPLORER. EXE line in the WIN. INI configuration file; these programs are shells, but not CLIs. Application programs may have command line interfaces. An application program may support none, any, or all of these three major types of command line interface mechanisms: Parameters: Most operating systems support a means to pass additional information to a program when it is launched; when a program is launched from an OS command line shell, additional text provided along with the program name is passed to the launched program. Interactive command line sessions: After launch, a program may provide an operator with an independent means to enter commands in the form of text. OS inter-process communication: Most operating systems support means of inter-process communication.
Command lines from client processes may be redirected to a CLI program by one of these methods. Some applications support only a CLI, presenting a CLI prompt to the user and acting upon command lines as they are entered. Other programs support both a CLI and a GUI. In some cases, a GUI is a wrapper around a separate CLI executable file. In other cases, a program may provide a CLI as an optional alternative to its GUI. CLIs and GUIs support different functionality. For example, all features of MATLAB, a numerical analysis computer program, are available via the CLI, whereas the MATLAB GUI exposes only a subset of features; the early Sierra games, such as the first three King's Quest games, used commands from an internal command line to move the character around in the graphic window. The command-line interface evolved from a form of dialog once conducted by humans over teleprinter machines, in which human operators remotely exchanged inf
Eric S. Raymond
Eric Steven Raymond referred to as ESR, is an American software developer, author of the cited 1997 essay and 1999 book The Cathedral and the Bazaar and other works, open-source software advocate. He wrote a guidebook for the Roguelike game NetHack. In the 1990s, he edited and updated the Jargon File in print as The New Hacker's Dictionary. Raymond was lived in Venezuela as a child, his family moved to Pennsylvania in 1971. He has suffered from cerebral palsy since birth. Raymond began his programming career writing proprietary software, between 1980 and 1985. In 1990, noting that the Jargon File had not been maintained since about 1983, he adopted it. Paul Dourish maintains an archived original version of the Jargon File, because, he says, Raymond's updates "essentially destroyed what held it together."In 1996 Raymond took over development of the open-source email software "popclient", renaming it to Fetchmail. Soon after this experience, in 1997, he wrote the essay "The Cathedral and the Bazaar", detailing his thoughts on open-source software development and why it should be done as as possible.
The essay was based in part on his experience in developing Fetchmail. He first presented his thesis at the annual Linux Kongress on May 27, 1997, he expanded the essay into a book, The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary, in 1999. The internal white paper by Frank Hecker that led to the release of the Mozilla source code in 1998 cited The Cathedral and the Bazaar as "independent validation" of ideas proposed by Eric Hahn and Jamie Zawinski. Hahn would describe the 1999 book as "clearly influential". From the late 1990s onward, due in part to the popularity of his essay, Raymond became a prominent voice in the open source movement, he co-founded the Open Source Initiative in 1998, taking on the self-appointed role of ambassador of open source to the press and public. He remains active in OSI, stepped down as president of the initiative in February 2005. In 1998 Raymond received and published a Microsoft document expressing worry about the quality of rival open-source software.
Eric named this document, together with others subsequently leaked, "the Halloween Documents". In 2000–2002 he created CML2, a source code configuration system. Raymond attributed this rejection to "kernel list politics". Linus Torvalds on the other hand said in a 2007 mailing list post that as a matter of policy, the development team preferred more incremental changes, his 2003 book The Art of Unix Programming discusses user tools for programming and other tasks. Raymond is the administrator of the project page for the GPS data tool gpsd; some versions of NetHack include his guide. He has contributed code and content to the free software video game The Battle for Wesnoth. Raymond coined an aphorism he dubbed "Linus's Law", inspired by Linus Torvalds: "Given enough eyeballs, all bugs are shallow", it first appeared in his book the Bazaar. Raymond has refused to speculate on whether the "bazaar" development model could be applied to works such as books and music, not wanting to "weaken the winning argument for open-sourcing software by tying it to a potential loser".
Raymond has had a number of public disputes with other figures in the free software movement. As head of the Open Source Initiative, he argued that advocates should focus on the potential for better products; the "very seductive" moral and ethical rhetoric of Richard Stallman and the Free Software Foundation fails, he said, "not because his principles are wrong, but because that kind of language... does not persuade anybody". In a 2008 essay he "defended the right of programmers to issue work under proprietary licenses because I think that if a programmer wants to write a program and sell it, it's neither my business nor anyone else's but his customer's what the terms of sale are". In the same essay he said that the "logic of the system" puts developers into "dysfunctional roles", with bad code the result. Raymond is a member of the Libertarian Party, he is a gun rights advocate. He has endorsed the open source firearms organization Defense Distributed, calling them "friends of freedom" and writing "I approve of any development that makes it more difficult for governments and criminals to monopolize the use of force.
As 3D printers become less expensive and more ubiquitous, this could be a major step in the right direction."In 2015 Raymond accused the Ada Initiative and other women in tech groups of attempting to entrap male open source leaders and accuse them of rape, saying "Try to avoid being alone because there is a chance that a'women in tech' advocacy group is going to try to collect your scalp."Raymond is known for claiming that “Gays experimented with unfettered promiscuity in the 1970s and got AIDS as a consequence” and that “Police who react to a random black male behaving suspiciously who might be in the critical age range as though he is an near-imminent lethal threat, are being rational, not racist.” Progressive campaign The Great Slate was successful in raising funds for candidates in part by asking for contributions from tech workers in return for not posting similar quotes by Raymond. Matasano Security employee and Great Slate fundraiser Thomas Ptacek said, “I’ve been torturing Twitter with lurid Eric S. Raymond quotes for years.
Every time I do, 20 people beg me to stop.” It is estimated that as of March 2018 over $30,000 has been raised in this way
Chlorophytum comosum called spider plant but known as airplane plant, St. Bernard's lily, spider ivy, ribbon plant, hen and chickens is a species of perennial flowering plant, it is native to tropical and southern Africa, but has become naturalized in other parts of the world, including western Australia. Chlorophytum comosum is easy to grow as a houseplant. Chlorophytum comosum grows to about 60 centimetres high, it has fleshy, tuberous roots, about 5–10 cm long. The long narrow leaves reach a length of 20 -- 45 are around 6 -- 25 millimetres wide. Flowers are produced in a long branched inflorescence, which can reach a length of up to 75 cm and bends downwards. Flowers occur in clusters of 1–6 at intervals along the stem of the inflorescence; each cluster is at the base of a bract, which ranges from 2–8 cm in length, becoming smaller towards the end of the inflorescence. Most of the flowers which are produced die off, so that the inflorescences are sparsely flowered. Individual flowers are greenish-white.
Each flower has six three-veined tepals which are 6–9 mm long hooded or boat-shaped at their tips. The stamens consist of a pollen-producing anther about 3.5 mm long with a filament about the same length or longer. The central style is 3–8 mm long. Seeds are produced in a capsule 3 -- 8 mm long on stalks; the inflorescences carry plantlets at the tips of their branches, which droop and touch the soil, developing adventitious roots. The stems of the inflorescence are called "stolons" in some sources, but this term is more used for stems which do not bear flowers, have roots at the nodes. Chlorophytum comosum was first formally described by the Swedish naturalist Carl Peter Thunberg as Anthericum comosum in the 1794 volume of Prodromus Plantarum Capensium, Thunberg's work on the plants of South Africa, it was subsequently moved to a number of different genera, including Phalangium, Hartwegia Nees and Hollia, before receiving its current placement in Chlorophytum by Jacques in 1862. The species has been confused with Chlorophytum capense Voss by some authors, but this is a different species.
There are three described varieties of the species: the autonym C. comosum var. comosum has strap-shaped narrow leaves and is found along forest margins, C. comosum var. bipindense has broader, petiolate leaves with stripes on the underside and the inflorescences are 2-3 times the length of the leaves, C. comosum var. sparsiflorum has broader leaves that narrow to the base and lacks a petiole and the striping on the underside of the leaf and the inflorescences are up to two times the length of the leaves. The latter two are rain forest-dwelling taxa that had earlier been described as separate species, but botanists Axel Dalberg Poulsen and Inger Nordal reduced the taxa to varieties of C. comosum in 2005. Delimitation of species boundaries within the genus Chlorophytum is reported to be difficult because of several evolutionary radiations into forest environments that led to morphological aspects that are too similar to reliably distinguish separate species; the evidence given to support this is the widespread distribution of most taxa in the genus and poor seed dispersal, leading to the conclusion of deeper evolutionary divergence among the taxa.
The three described varieties in C. comosum could be an example of this convergent evolution of leaf shape among the forest-dwelling varieties from species of disparate origin, leading to the species C. comosum being polyphyletic, instead of the traditional view of morphological divergence among the varieties within the species with the assumption of a common origin. The widespread C. comosum var. comosum has slender, near linear leaves that lack a petiole similar to plants found in cultivation and is only found growing at the margins of the rain forest. The two other varieties, C. comosum var. sparsiflorum and C. comosum var. bipindense, possess petioles and have broader leaves necessary for collecting more light in the shady Guineo-Congolean rain forest. A study published in 2005 used 16 morphological characters and was unable to delimit species boundaries among these three taxa, so they were relegated to varietal status. A follow-up study published in 2008 provided preliminary evidence from phylogenetic analysis of plastid and nuclear DNA sequences that established samples from disparate collections sites identified as C. comosum were polyphyletic.
Chlorophytum comosum has a widespread native distribution in Africa, being native to six of the 10 World Geographical Scheme for Recording Plant Distributions regions of Africa. Chlorophytum comosum is a popular houseplant; the species with all-green leaves forms only a small proportion of plants sold. More common are two variegated cultivars: C. comosum'Vittatum' has mid-green leaves with a broad central white stripe. It is sold in hanging baskets to display the plantlets; the long stems are white. C. comosum'Variegatum' has darker green leaves with white margins. It is smaller than the previous cultivar; the long stems are green. Both cultivars have gained the Royal Horticultural Society's Award of Garden Merit. Spider plants are easy to grow, they will tolerate temperatures down to 2 °C, but grow best at temperatures between 18 °C and 32 °C. P
A cypherpunk is any activist advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since the late 1980s; until about the 1970s, cryptography was practiced in secret by military or spy agencies. However, that changed when two publications brought it out of the closet into public awareness: the US government publication of the Data Encryption Standard, a block cipher which became widely used; the technical roots of Cypherpunk ideas have been traced back to work by cryptographer David Chaum on topics such as anonymous digital cash and pseudonymous reputation systems, described in his paper "Security without Identification: Transaction Systems to Make Big Brother Obsolete". In the late 1980s, these ideas coalesced into something like a movement.
In late 1992, Eric Hughes, Timothy C. May and John Gilmore founded a small group that met monthly at Gilmore's company Cygnus Solutions in the San Francisco Bay Area, was humorously termed cypherpunks by Jude Milhon at one of the first meetings - derived from cipher and cyberpunk. In November 2006, the word was added to the Oxford English Dictionary; the Cypherpunks mailing list was started in 1992, by 1994 had 700 subscribers. At its peak, it was a active forum with technical discussion ranging over mathematics, computer science and philosophical discussion, personal arguments and attacks, etc. with some spam thrown in. An email from John Gilmore reports an average of 30 messages a day from December 1, 1996 to March 1, 1999, suggests that the number was higher earlier; the number of subscribers is estimated to have reached 2000 in the year 1997. In early 1997, Jim Choate and Igor Chudov set up the Cypherpunks Distributed Remailer, a network of independent mailing list nodes intended to eliminate the single point of failure inherent in a centralized list architecture.
At its peak, the Cypherpunks Distributed Remailer included at least seven nodes. By mid-2005, al-qaeda.net ran the only remaining node. In mid 2013, following a brief outage, the al-qaeda.net node's list software was changed from Majordomo to GNU Mailman and subsequently the node was renamed to cpunks.org. The CDR architecture is now defunct, though the list administrator stated in 2013 that he was exploring a way to integrate this functionality with the new mailing list software. For a time, the cypherpunks mailing list was a popular tool with mailbombers, who would subscribe a victim to the mailing list in order to cause a deluge of messages to be sent to him or her; this precipitated the mailing list sysop to institute a reply-to-subscribe system. Two hundred messages a day was typical for the mailing list, divided between personal arguments and attacks, political discussion, technical discussion, early spam; the cypherpunks mailing list had extensive discussions of the public policy issues related to cryptography and on the politics and philosophy of concepts such as anonymity, pseudonyms and privacy.
These discussions continue both on the remaining node and elsewhere as the list has become moribund. Events such as the GURPS Cyberpunk raid lent weight to the idea that private individuals needed to take steps to protect their privacy. In its heyday, the list discussed public policy issues related to cryptography, as well as more practical nuts-and-bolts mathematical, computational and cryptographic matters; the list had a range of viewpoints and there was no unanimous agreement on anything. The general attitude, though put personal privacy and personal liberty above all other considerations; the list was discussing questions about privacy, government monitoring, corporate control of information, related issues in the early 1990s that did not become major topics for broader discussion until ten years or so later. Some list participants were more radical on these issues than anyone else; those wishing to understand the context of the list might refer to the history of cryptography. The US government had tried to subvert cryptography through schemes such as key escrow.
It was not known that all communications were logged by government agencies though this was taken as an obvious axiom by list members. The original cypherpunk mailing list, the first list spin-off, were hosted on John Gilmore's toad.com, but after a falling out with the sysop over moderation, the list was migrated to several cross-linked mail-servers in what was called the "distributed mailing list." The coderpunks list, open by invitation only, existed for a time. Coderpunks had less discussion of public policy implications. There are several lists today that can trace their lineage directly to the original Cypherpunks list: the cryptography list, the financial cryptography list, a small group of closed
Creative Commons is an American non-profit organization devoted to expanding the range of creative works available for others to build upon and to share. The organization has released several copyright-licenses, known as Creative Commons licenses, free of charge to the public; these licenses allow creators to communicate which rights they reserve and which rights they waive for the benefit of recipients or other creators. An easy-to-understand one-page explanation of rights, with associated visual symbols, explains the specifics of each Creative Commons license. Creative Commons licenses are based upon it, they replace individual negotiations for specific rights between copyright owner and licensee, which are necessary under an "all rights reserved" copyright management, with a "some rights reserved" management employing standardized licenses for re-use cases where no commercial compensation is sought by the copyright owner. The result is an agile, low-overhead and low-cost copyright-management regime, benefiting both copyright owners and licensees.
The organization was founded in 2001 by Lawrence Lessig, Hal Abelson, Eric Eldred with the support of Center for the Public Domain. The first article in a general interest publication about Creative Commons, written by Hal Plotkin, was published in February 2002; the first set of copyright licenses was released in December 2002. The founding management team that developed the licenses and built the Creative Commons infrastructure as we know it today included Molly Shaffer Van Houweling, Glenn Otis Brown, Neeru Paharia, Ben Adida. In 2002 the Open Content Project, a 1998 precursor project by David A. Wiley, announced the Creative Commons as successor project and Wiley joined as CC director. Aaron Swartz played a role in the early stages of Creative Commons; as of May 2018 there were an estimated 1.4 billion works licensed under the various Creative Commons licenses. Wikipedia uses one of these licenses; as of May 2018, Flickr alone hosts over 415 million Creative Commons licensed photos. Creative Commons is governed by a board of directors.
Their licenses have been embraced by many as a way for creators to take control of how they choose to share their copyrighted works. Creative Commons has been described as being at the forefront of the copyleft movement, which seeks to support the building of a richer public domain by providing an alternative to the automatic "all rights reserved" copyright, has been dubbed "some rights reserved". David Berry and Giles Moss have credited Creative Commons with generating interest in the issue of intellectual property and contributing to the re-thinking of the role of the "commons" in the "information age". Beyond that, Creative Commons has provided "institutional and legal support for individuals and groups wishing to experiment and communicate with culture more freely."Creative Commons attempts to counter what Lawrence Lessig, founder of Creative Commons, considers to be a dominant and restrictive permission culture. Lessig describes this as "a culture in which creators get to create only with the permission of the powerful, or of creators from the past."
Lessig maintains that modern culture is dominated by traditional content distributors in order to maintain and strengthen their monopolies on cultural products such as popular music and popular cinema, that Creative Commons can provide alternatives to these restrictions. Until April 2018 Creative Commons had over 100 affiliates working in over 75 jurisdictions to support and promote CC activities around the world. In 2018 this affiliate network has been restructured into a network organisation; the network no longer relies on affiliate organisation but on individual membership organised in Chapter. Creative Commons Japan is the affiliated network of Creative Commons in Japan. In 2003, the International University GLOCOM hold a meeting for the CC Japan preparing. In March 2004, CC Japan was initiated by that University, that, the second CC created among the world. In March 2006, the CC Japan be in motion. In the same year of March, the CC founder Lawrence Lessig came to Japan to be one of the main holder of the open ceremony.
Within same year of May to June, different international events hold in Japan which include iSummit 06 and the first to third round CCJP held. In 2007 of February, ICC x ClipLife 15 sec CM open. In June, iSummit 07 held on. After that month, the fourth CCJP held on. In the 25/7/2007, Tokyo approve Nobuhiro Nakayamato become the NGO chairman of CCJP. In 2008, Taipie ACIA join CCJP; the main theme music which chose by CCJP announced. In 2009, INTO INFINITY shown in Sapporo. I-phone held the shows with Audio Visual Mixer for INTO INFINITY. 2012, the 10 anniversary ceremony held on Japan. 2015, the renew version of CCJP overt. Creative Commons Japan Zero overt. Creative Commons Korea is the affiliated network of Creative Commons in South Korea. In March 2005, CC Korea was initiated by Jongsoo Yoon, a Presiding Judge of Incheon District Court, as a project of Korea Association for Infomedia Law; the major Korean portal sites, including Daum and Naver, have been participating in the use of Creative Commons licences.
In January 2009, the Creative Commons Korea Association was founded as a non-profit incorporated association. Since CC Korea has been promoting the liberal and open culture of creation as well as leading the diffusion of Creative Common in the country. Creative Commons Korea Creative Commons Asia Conference 2010
A web server is server software, or hardware dedicated to running said software, that can satisfy World Wide Web client requests. A web server can, in general, contain one or more websites. A web server processes incoming network requests over several other related protocols; the primary function of a web server is to store and deliver web pages to clients. The communication between client and server takes place using the Hypertext Transfer Protocol. Pages delivered are most HTML documents, which may include images, style sheets and scripts in addition to the text content. A user agent a web browser or web crawler, initiates communication by making a request for a specific resource using HTTP and the server responds with the content of that resource or an error message if unable to do so; the resource is a real file on the server's secondary storage, but this is not the case and depends on how the web server is implemented. While the primary function is to serve content, a full implementation of HTTP includes ways of receiving content from clients.
This feature is used for submitting web forms, including uploading of files. Many generic web servers support server-side scripting using Active Server Pages, PHP, or other scripting languages; this means that the behaviour of the web server can be scripted in separate files, while the actual server software remains unchanged. This function is used to generate HTML documents dynamically as opposed to returning static documents; the former is used for retrieving or modifying information from databases. The latter is much faster and more cached but cannot deliver dynamic content. Web servers can be found embedded in devices such as printers, routers and serving only a local network; the web server may be used as a part of a system for monitoring or administering the device in question. This means that no additional software has to be installed on the client computer since only a web browser is required. In March 1989 Sir Tim Berners-Lee proposed a new project to his employer CERN, with the goal of easing the exchange of information between scientists by using a hypertext system.
The project resulted in Berners-Lee writing two programs in 1990: A Web browser called WorldWideWeb The world's first web server known as CERN httpd, which ran on NeXTSTEPBetween 1991 and 1994, the simplicity and effectiveness of early technologies used to surf and exchange data through the World Wide Web helped to port them to many different operating systems and spread their use among scientific organizations and universities, subsequently to the industry. In 1994 Berners-Lee decided to constitute the World Wide Web Consortium to regulate the further development of the many technologies involved through a standardization process. Web servers are able to map the path component of a Uniform Resource Locator into: A local file system resource An internal or external program name For a static request the URL path specified by the client is relative to the web server's root directory. Consider the following URL as it would be requested by a client over HTTP: http://www.example.com/path/file.html The client's user agent will translate it into a connection to www.example.com with the following HTTP 1.1 request: GET /path/file.html HTTP/1.1 Host: www.example.com The web server on www.example.com will append the given path to the path of its root directory.
On an Apache server, this is /home/www. The result is the local file system resource: /home/www/path/file.html The web server reads the file, if it exists, sends a response to the client's web browser. The response will describe the content of the file and contain the file itself or an error message will return saying that the file does not exist or is unavailable. A web server can be either incorporated in user space. Web servers that run in user-mode have to ask the system for permission to use more memory or more CPU resources. Not only do these requests to the kernel take time, but they are not always satisfied because the system reserves resources for its own usage and has the responsibility to share hardware resources with all the other running applications. Executing in user mode can mean useless buffer copies which are another handicap for user-mode web servers. A web server has defined load limits, because it can handle only a limited number of concurrent client connections per IP address and it can serve only a certain maximum number of requests per second depending on: its own settings, the HTTP request type, whether the content is static or dynamic, whether the content is cached, the hardware and software limitations of the OS of the computer on which the web server runs.
When a web server is near to or over its limit, it becomes unresponsive. At any time web servers can be overloaded due to: Excess legitimate web traffic. Thousands or millions of clients connecting to the web site in a short interval, e.g. Slashdot effect. A denial-of-service attack or distributed denial-of-service attack is an attempt to make a computer or network resource unavailable to its intended users.