Encyclopedia
Scholarly Community
Encyclopedia
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
Submit
Entry
Video
Image
and
or
not
All
${ type }
To
Search
Subject:
All Disciplines
Arts & Humanities
Biology & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Medicine & Pharmacology
Physical Sciences
Public Health & Healthcare
Social Sciences
Sort:
Most Viewed
Latest
Alphabetical (A-Z)
Alphabetical (Z-A)
Filter:
All
Topic Review
Biography
Peer Reviewed Entry
Video Entry
Topic Review
QuickView
QuickView is a file viewer in Windows 95, Windows 98 and Windows NT 4.0 operating systems. The viewer can be used to view practically any file. The software has been ported by third parties to support XP, Vista and 7. On 1995-04-03, InfoSoft International, Inc., announced the acquisition of Systems Compatibility Corporation, and the renaming of InfoSoft International, Inc. to Inso Corporation. Inso Corporation later developed Quick View Plus products.
434
04 Nov 2022
Topic Review
Chinese Cyberwarfare
China is both the world's second-largest economy and a nuclear weapons state with the world's second-largest defense budget. Chinese Information Operations and Information Warfare includes the concept of “network warfare”, which is roughly analogous to the United States concept of cyber-warfare. Foreign Policy magazine provided an estimated range for China's "hacker army" personnel, anywhere from 50,000 to 100,000 individuals. Western countries have long accused China of aggressive espionage, and while investigations have traced various attacks on corporate and infrastructure computer systems to have originated in China , "it is nearly impossible to know whether or not an attack is government-sponsored because of the difficulty in tracking true identities in cyberspace." China has denied these accusations of cyber-warfare and has, in turn, accused the United States of engaging in cyber-warfare against China - a claim the US government denies.
430
11 Oct 2022
Topic Review
Hypercycle
In chemistry, a hypercycle is an abstract model of organization of self-replicating molecules connected in a cyclic, autocatalytic manner. It was introduced in an ordinary differential equation (ODE) form by the Nobel Prize winner Manfred Eigen in 1971 and subsequently further extended in collaboration with Peter Schuster. It was proposed as a solution to the error threshold problem encountered during modelling of replicative molecules that hypothetically existed on the primordial Earth (see: abiogenesis). As such, it explained how life on Earth could have begun using only relatively short genetic sequences, which in theory were too short to store all essential information. The hypercycle is a special case of the replicator equation. The most important properties of hypercycles are autocatalytic growth competition between cycles, once-for-ever selective behaviour, utilization of small selective advantage, rapid evolvability, increased information capacity, and selection against parasitic branches.
428
19 Oct 2022
Topic Review
Enterprise Client-server Backup
Enterprise client-server" backup software describes a class of software applications that back up data from a variety of client computers centrally to one or more server computers, with the particular needs of enterprises in mind. They may employ a scripted client–server backup model with a backup server program running on one computer, and with small-footprint client programs (referred to as "agents" in some applications) running on the other computer(s) being backed up—or alternatively as another process on the same computer as the backup server program. Enterprise-specific requirements include the need to back up large amounts of data on a systematic basis, to adhere to legal requirements for the maintenance and archiving of files and data, and to satisfy short-recovery-time objectives. To satisfy these requirements (which World Backup Day (31 March) highlights), it is typical for an enterprise to appoint a backup administrator—who is a part of office administration rather than of the IT staff and whose role is "being the keeper of the data". In a client-server backup application, the server program initiates the backup activity by the client program. This is distinct from a "personal" backup application such as Apple's Time Machine, in which "Time Machine runs on each Mac, independently of any other Macs, whether they're backing up to the same destination or a different one." If the backup server and client programs are running on separate computers, they are connected in either a single platform or a mixed platform network. The client-server backup model was originated when magnetic tape was the only financially-feasible storage medium for doing backups of multiple computers onto a single archive file;[note 1][note 2] because magnetic tape is a sequential access medium, it was imperative (barring "multiplexed backup") that the client computers be backed up one at a time—as initiated by the backup server program. What is described in the preceding paragraph is the "two-tier" configuration (in one application's diagram, the second-tier backup server program is named "server" preceded by the name of the application, and first-tier "agents" are backing up interactive server applications). That configuration controls the backup server program via either an integrated GUI or a separate Administration Console. In some client-server backup applications, a "three-tier" configuration splits off the backup and restore functions of the server program to run on what are called media servers—computers to which devices containing archive files are attached either locally or as Network-attached storage (NAS). In those applications, the decision on which media server a script is to run on is controlled using another program called either a master server or an optional central admin. server.
426
14 Oct 2022
Topic Review
XTS-400
The XTS-400 is a multilevel secure computer operating system. It is multiuser and multitasking that uses multilevel scheduling in processing data and information. It works in networked environments and supports Gigabit Ethernet and both IPv4 and IPv6. The XTS-400 is a combination of Intel x86 hardware and the Secure Trusted Operating Program (STOP) operating system. XTS-400 was developed by BAE Systems, and originally released as version 6.0 in December 2003. STOP provides high-assurance security and was the first general-purpose operating system with a Common Criteria assurance level rating of EAL5 or above. The XTS-400 can host, and be trusted to separate, multiple, concurrent data sets, users, and networks at different sensitivity levels. The XTS-400 provides both an untrusted environment for normal work and a trusted environment for administrative work and for privileged applications. The untrusted environment is similar to traditional Unix environments. It provides binary compatibility with Linux applications running most Linux commands and tools as well as most Linux applications without the need for recompiling. This untrusted environment includes an X Window System GUI, though all windows on a screen must be at the same sensitivity level. To support the trusted environment and various security features, STOP provides a set of proprietary APIs to applications. In order to develop programs that use these proprietary APIs, a special software development environment (SDE) is needed. The SDE is also needed in order to port some complicated Linux/Unix applications to the XTS-400. A new version of the STOP operating system, STOP 7 has since been introduced, with claims to have improved performance and new features such as RBAC.
425
08 Oct 2022
Topic Review
Cartan Formalism
The vierbein or tetrad theory much used in theoretical physics is a special case of the application of Cartan connection in four-dimensional manifolds. It applies to metrics of any signature. (See metric tensor.) This section is an approach to tetrads, but written in general terms. In dimensions other than 4, words like triad, pentad, zweibein, fünfbein, elfbein etc. have been used. Vielbein covers all dimensions. (In German, vier means four, zwei means two, fünf means five, elf means eleven and, in general, viel means many.) For a basis-dependent index notation, see tetrad (index notation).
425
04 Nov 2022
Topic Review
Open Science Data
Open science data or Open Research Data is a type of open data focused on publishing observations and results of scientific activities available for anyone to analyze and reuse. A major purpose of the drive for open data is to allow the verification of scientific claims, by allowing others to look at the reproducibility of results, and to allow data from many sources to be integrated to give new knowledge. While the idea of open science data has been actively promoted since the 1950s, the rise of the Internet has significantly lowered the cost and time required to publish or obtain data.
424
19 Oct 2022
Topic Review
Assertion (Software Development)
In computer programming, specifically when using the imperative programming paradigm, an assertion is a predicate (a Boolean-valued function over the state space, usually expressed as a logical proposition using the variables of a program) connected to a point in the program, that always should evaluate to true at that point in code execution. Assertions can help a programmer read the code, help a compiler compile it, or help the program detect its own defects. For the latter, some programs check assertions by actually evaluating the predicate as they run. Then, if it is not in fact true – an assertion failure – the program considers itself to be broken and typically deliberately crashes or throws an assertion failure exception.
421
31 Oct 2022
Topic Review
Most Frequent K Characters
In information theory, MostFreqKDistance is a string metric technique for quickly estimating how similar two ordered sets or strings are. The scheme was invented by Sadi Evren Seker (2014), and initially used in text mining applications like author recognition. The method is originally based on a hashing function MaxFreqKChars classical author recognition problem and idea first came out while studying on data stream mining. The algorithm is suitable for coding in any turing complete programming language.
421
10 Nov 2022
Topic Review
Encyclopedia of Chicago
The Encyclopedia of Chicago is an historical reference work covering Chicago and the entire Chicago metropolitan area published by the University of Chicago Press. Released in October 2004, the work is the result of a ten-year collaboration between the Newberry Library and the Chicago Historical Society. It exists in both a hardcover print edition and an online format, known as the Electronic Encyclopedia of Chicago. The print edition is 1117 pages and includes 1400 entries, 2000 biographical sketches, 250 significant business enterprise descriptions, and hundreds of maps. Initially, the internet edition included 1766 entries, 1000 more images and sources. The concept was fueled by other regional encyclopedias that had met with commercial success in 1980s and 1990s. Eventually, the vision to create the book found initial financing from the National Endowment for the Humanities. The book was well received and became a bestseller during the 2004 Christmas season following its October 2004 release. The following May the Electronic Encyclopedia of Chicago was released. Northwestern University joined the Newberry Library/Chicago Historical Society collaboration to publish the internet edition. The internet edition was the second of its kind for a U.S. city.
419
11 Nov 2022
Topic Review
Heurist
Heurist is an online database designed for digital research objects including bibliographic records, web bookmarks, historical events, document annotations, images, contemporary stories and other data which is rich in text and classification data, and often heterogeneous. Heurist was originally designed by Ian Johnson (from 2005) and developed by the (now disbanded) Arts eResearch unit (AeR) at the University of Sydney. It continues to be developed within the Faculty of Arts. It was released as Open Source software in May 2013 (version 3.1.0), originally on Google Code, later moved to GitHub, and a free web service for low-demand academic databases is available at http://heurist.sydney.edu.au - other free services are listed in the project web site (http://HeuristNetwork.org). Heurist was developed to overcome two problems identified as common to researchers in the Humanities (and others): It aims to tackle the first issue by providing a web service supporting the on-demand creation and configuration of new databases through a web interface. It aims to tackle the second issue by allowing the storage and interlinking of a wide variety of research data, notes, annotations and digital attachments in a single shared database, while providing individual ‘views’ on this data and workgroup-owned and private areas for research in progress.
417
14 Oct 2022
Topic Review
GenI Process
The GenI process (/dʒiːnaɪ/ for Generic Intelligence) models team decision making by launching a chaotic competition between so-called ideas, where one idea after another dwindles out until exactly one remains. The decision statistics are completely determined by the process start configuration and match those known from quantum measurements. The random process accomplishes this in a natural way without any fine adjustment. Therefore, it is also of interest for the interpretation of physical processes. In mathematical terms, the GenI process describes a time-discrete stochastic process [math]\displaystyle{ X: [0,1] \times \mathbb{N}_0 \rightarrow 2^E }[/math] in the state space of the finite subsets of a countable set E, together with a mapping [math]\displaystyle{ 2^E \rightarrow \mathbb{C}^n }[/math] of the power set on E into an n-dimensional complex vector space. In principle, it can be classified as a Markov chain of first order, with variable transition probabilities [math]\displaystyle{ P(X_{n+1} \mid X_n) }[/math]. There are two expressions of the GenI process, for [math]\displaystyle{ n \geq 2 }[/math] and for [math]\displaystyle{ n=2 }[/math].
417
29 Sep 2022
Topic Review
Libraries in Second Life
Second Life (SL) is an immersive 3D environment that can be used for entertainment and educational purposes. Due to increasing interest in digital services, some libraries have established virtual services on Second Life.
416
26 Oct 2022
Topic Review
Wordfilter
A wordfilter (sometimes referred to as just "filter" or "censor") is a script typically used on Internet forums or chat rooms that automatically scans users' posts or comments as they are submitted and automatically changes or censors particular words or phrases. The most basic wordfilters search only for specific strings of letters, and remove or overwrite them regardless of their context. More advanced wordfilters make some exceptions for context (such as filtering "butt" but not "butter"), and the most advanced wordfilters may use regular expressions.
413
28 Sep 2022
Topic Review
DNS Zone Transfer
DNS zone transfer, also sometimes known by the inducing DNS query type AXFR, is a type of DNS transaction. It is one of the many mechanisms available for administrators to replicate DNS databases across a set of DNS servers. A zone transfer uses the Transmission Control Protocol (TCP) for transport, and takes the form of a client–server transaction. The client requesting a zone transfer may be a secondary server requesting data from a primary server, historically referred to as master and slave. The portion of the database that is replicated is a zone.
413
18 Oct 2022
Topic Review
Malayalam – Island of Mysteries
Malayalam – Island of Mysteries is a puzzle adventure video game developed by MJK Games in 2007-2008, and released as freeware for Windows on November 10, 2008. The game is a vague crossover between a Robinson Crusoe-themed survival game and a mysterious adventure similar to the Lost (TV series), presented in a cartoonesque style with hand-drawn graphics and animation.
413
18 Oct 2022
Topic Review
Net Neutrality (Last Week Tonight)
"Net Neutrality" is the first segment of the HBO news satire television series Last Week Tonight with John Oliver devoted to net neutrality in the United States. It aired for 13 minutes on June 1, 2014, as part of the fifth episode of Last Week Tonight's first season. During this segment, as well Oliver's follow-up segment entitled "Net Neutrality II", comedian John Oliver discusses the threats to net neutrality. Under the administration of President Barack Obama, the Federal Communications Commission (FCC) was considering two options for net neutrality in early 2014. The FCC proposed permitting fast and slow broadband lanes, which would compromise net neutrality, but was also considering reclassifying broadband as a telecommunication service, which would preserve net neutrality. After a surge of comments supporting net neutrality that were inspired by Oliver's episode, the FCC voted to reclassify broadband as a utility in 2015.
413
17 Oct 2022
Topic Review
Rob Redding
Robert "Rob" Redding, Jr. (born January 13, 1976) is an American media proprietor, award-winning radio talk show host, political commentator, independent journalist, a best-selling American author, a best-selling American music artist and songwriter, visual artist and social entrepreneur. Redding is known as the founder and publisher of Redding News Review and host of a talk radio show and podcast. In 2003, he was among few blacks to be named to Talkers Magazine's "100 Most Important Radio Talk Show Hosts in America" and has received a proclamation for his work by the Atlanta City Council the same year. He made history being the only black program director in white-dominated talk radio station in 2009. His web site Redding News Review has earned three consecutive Black Web Awards. He currently runs the web's oldest black news aggregation outlet and first and most successful stand-alone subscriber-based web site and talk show.
410
10 Oct 2022
Topic Review
Prompt (Command)
This article presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list. In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
410
24 Oct 2022
Topic Review
Time Control
A time control is a mechanism in the tournament play of almost all two-player board games so that each round of the match can finish in a timely way and the tournament can proceed. Time controls are typically enforced by means of a game clock, where the times below are given per player. Time pressure (or time trouble or Zeitnot) is the situation of having very little time on a player's clock to complete their remaining moves.
408
21 Oct 2022
Page
of
47
Featured Entry Collections
>>
Featured Books
>>
Encyclopedia of Social Sciences
Chief Editor:
Kum Fai Yuen
Encyclopedia of COVID-19
Chief Editor:
Stephen Bustin
Encyclopedia of Fungi
Chief Editor:
Luis V. Lopez-Llorca
Encyclopedia of Digital Society, Industry 5.0 and Smart City
Chief Editor:
Sandro Serpa
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
New Entry
New Video
New Images
About
Terms and Conditions
Privacy Policy
Advisory Board
Contact
Partner
ScholarVision Creations
Feedback
Top
Feedback
×
Help Center
Browse our user manual, common Q&A, author guidelines, etc.
Rate your experience
Let us know your experience and what we could improve.
Report an error
Is something wrong? Please let us know!
Other feedback
Other feedback you would like to report.
×
Did you find what you were looking for?
Love
Like
Neutral
Dislike
Hate
0
/500
Email
Do you agree to share your valuable feedback publicly on
Encyclopedia
’s homepage?
Yes, I agree. Encyclopedia can post it.
No, I do not agree. I would not like to post my testimonial.
Webpage
Upload a screenshot
(Max file size 2MB)
Submit
Back
Close
×