https://en.wikipedia.org/w/index.php?action=history&feed=atom&title=Internet Internet - Revision history 2025-01-09T04:25:48Z Revision history for this page on the wiki MediaWiki 1.44.0-wmf.8 https://en.wikipedia.org/w/index.php?title=Internet&diff=1266230519&oldid=prev Winderz IoT: /* World Wide Web */ Changed Edge link to set index article for browser series, matching Internet Explorer, as it seems to be referring to all versions new and old 2024-12-30T18:23:34Z <p><span class="autocomment">World Wide Web: </span> Changed Edge link to set index article for browser series, matching <a href="/wiki/Internet_Explorer" title="Internet Explorer">Internet Explorer</a>, as it seems to be referring to all versions new and old</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 18:23, 30 December 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 141:</td> <td colspan="2" class="diff-lineno">Line 141:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The World Wide Web is a global collection of [[documents]], [[Computer graphics|images]], [[multimedia]], applications, and other resources, logically interrelated by [[hyperlink]]s and referenced with [[Uniform Resource Identifier]]s (URIs), which provide a global system of named references. URIs symbolically identify services, [[web servers]], databases, and the documents and resources that they can provide. [[HyperText Transfer Protocol]] (HTTP) is the main access protocol of the World Wide Web. [[Web service]]s also use HTTP for communication between software systems for information transfer, sharing and exchanging business data and logistics and is one of many languages or protocols that can be used for communication on the Internet.&lt;ref&gt;{{cite web|url=http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp |title=The Difference Between the Internet and the World Wide Web |work=Webopedia |publisher=QuinStreet Inc. |date=24 June 2010 |access-date=1 May 2014 |url-status=live |archive-url=https://web.archive.org/web/20140502001005/http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp |archive-date=2 May 2014 }}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The World Wide Web is a global collection of [[documents]], [[Computer graphics|images]], [[multimedia]], applications, and other resources, logically interrelated by [[hyperlink]]s and referenced with [[Uniform Resource Identifier]]s (URIs), which provide a global system of named references. URIs symbolically identify services, [[web servers]], databases, and the documents and resources that they can provide. [[HyperText Transfer Protocol]] (HTTP) is the main access protocol of the World Wide Web. [[Web service]]s also use HTTP for communication between software systems for information transfer, sharing and exchanging business data and logistics and is one of many languages or protocols that can be used for communication on the Internet.&lt;ref&gt;{{cite web|url=http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp |title=The Difference Between the Internet and the World Wide Web |work=Webopedia |publisher=QuinStreet Inc. |date=24 June 2010 |access-date=1 May 2014 |url-status=live |archive-url=https://web.archive.org/web/20140502001005/http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp |archive-date=2 May 2014 }}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>World Wide Web browser software, such as [[Microsoft]]'s [[Internet Explorer]]/[[Microsoft Edge|Edge]], [[Mozilla Firefox]], [[Opera (web browser)|Opera]], [[Apple Inc.|Apple]]'s [[Safari (web browser)|Safari]], and [[Google Chrome]], enable users to navigate from one web page to another via the hyperlinks embedded in the documents. These documents may also contain any combination of [[computer data]], including graphics, sounds, [[Plain text|text]], [[web video|video]], [[multimedia]] and interactive content that runs while the user is interacting with the page. [[Client-side scripting|Client-side software]] can include animations, [[web game|games]], [[office applications]] and scientific demonstrations. Through [[keyword (Internet search)|keyword]]-driven [[Internet research]] using [[Web search engine|search engines]] like [[Yahoo! Search|Yahoo!]], [[Bing (search engine)|Bing]] and [[Google Search|Google]], users worldwide have easy, instant access to a vast and diverse amount of online information. Compared to printed media, books, encyclopedias and traditional libraries, the World Wide Web has enabled the decentralization of information on a large scale.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>World Wide Web browser software, such as [[Microsoft]]'s [[Internet Explorer]]/[[Microsoft Edge<ins style="font-weight: bold; text-decoration: none;"> (series of web browsers)</ins>|Edge]], [[Mozilla Firefox]], [[Opera (web browser)|Opera]], [[Apple Inc.|Apple]]'s [[Safari (web browser)|Safari]], and [[Google Chrome]], enable users to navigate from one web page to another via the hyperlinks embedded in the documents. These documents may also contain any combination of [[computer data]], including graphics, sounds, [[Plain text|text]], [[web video|video]], [[multimedia]] and interactive content that runs while the user is interacting with the page. [[Client-side scripting|Client-side software]] can include animations, [[web game|games]], [[office applications]] and scientific demonstrations. Through [[keyword (Internet search)|keyword]]-driven [[Internet research]] using [[Web search engine|search engines]] like [[Yahoo! Search|Yahoo!]], [[Bing (search engine)|Bing]] and [[Google Search|Google]], users worldwide have easy, instant access to a vast and diverse amount of online information. Compared to printed media, books, encyclopedias and traditional libraries, the World Wide Web has enabled the decentralization of information on a large scale.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The Web has enabled individuals and organizations to [[publish]] ideas and information to a potentially large [[audience]] online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial [[cost]] and many cost-free services are available. However, publishing and maintaining large, professional websites with attractive, diverse and up-to-date information is still a difficult and expensive proposition. Many individuals and some companies and groups use ''web logs'' or blogs, which are largely used as easily being able to update online diaries. Some commercial organizations encourage [[employees|staff]] to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information and be attracted to the corporation as a result.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The Web has enabled individuals and organizations to [[publish]] ideas and information to a potentially large [[audience]] online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial [[cost]] and many cost-free services are available. However, publishing and maintaining large, professional websites with attractive, diverse and up-to-date information is still a difficult and expensive proposition. Many individuals and some companies and groups use ''web logs'' or blogs, which are largely used as easily being able to update online diaries. Some commercial organizations encourage [[employees|staff]] to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information and be attracted to the corporation as a result.</div></td> </tr> </table> Winderz IoT https://en.wikipedia.org/w/index.php?title=Internet&diff=1265847284&oldid=prev HeyElliott: Added info to refs, added archives, ce 2024-12-28T23:40:47Z <p>Added info to refs, added archives, ce</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 23:40, 28 December 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 252:</td> <td colspan="2" class="diff-lineno">Line 252:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>===Malware===</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>===Malware===</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>[[Malware]] is malicious software used and distributed via the Internet. It includes [[computer virus]]es which are copied with the help of humans, [[computer worm]]s which copy themselves automatically, software for [[denial of service attack]]s, [[ransomware]], [[botnet]]s, and [[spyware]] that reports on the activity and typing of users. Usually, these activities constitute [[cybercrime]]. Defense theorists have also speculated about the possibilities of [[hackers]] using [[cyber warfare]] using similar methods on a large scale.&lt;ref&gt;{{Cite web|last=Andriole|first=Steve|title=Cyberwarfare Will Explode In 2020 (Because It's Cheap, Easy And Effective)|url=https://www.forbes.com/sites/steveandriole/2020/01/14/cyberwarfare-will-explode-in-2020-because-its-cheap-easy--effective/|access-date=2021-05-18|website=Forbes|language=en}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>[[Malware]] is malicious software used and distributed via the Internet. It includes [[computer virus]]es which are copied with the help of humans, [[computer worm]]s which copy themselves automatically, software for [[denial of service attack]]s, [[ransomware]], [[botnet]]s, and [[spyware]] that reports on the activity and typing of users. Usually, these activities constitute [[cybercrime]]. Defense theorists have also speculated about the possibilities of [[hackers]] using [[cyber warfare]] using similar methods on a large scale.&lt;ref&gt;{{Cite web|last=Andriole|first=Steve|title=Cyberwarfare Will Explode In 2020 (Because It's Cheap, Easy And Effective)|url=https://www.forbes.com/sites/steveandriole/2020/01/14/cyberwarfare-will-explode-in-2020-because-its-cheap-easy--effective/<ins style="font-weight: bold; text-decoration: none;"> |date=Jan 14, 2020 </ins>|access-date=2021-05-18|website=Forbes|language=en}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Malware poses serious problems to individuals and businesses on the Internet.&lt;ref&gt;{{Cite journal |last1=Kim |first1=Jin-Young |last2=Bu |first2=Seok-Jun |last3=Cho |first3=Sung-Bae |date=2018-09-01 |title=Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders |url=<del style="font-weight: bold; text-decoration: none;">https</del>://<del style="font-weight: bold; text-decoration: none;">www</del>.<del style="font-weight: bold; text-decoration: none;">sciencedirect</del>.<del style="font-weight: bold; text-decoration: none;">com</del>/<del style="font-weight: bold; text-decoration: none;">science</del>/<del style="font-weight: bold; text-decoration: none;">article</del>/<del style="font-weight: bold; text-decoration: none;">pii</del>/<del style="font-weight: bold; text-decoration: none;">S0020025518303475</del> |journal=Information Sciences |language=en |volume=460–461 |pages=83–102 |doi=10.1016/j.ins.2018.04.092 |issn=0020-0255 |s2cid=51882216 |access-date=2 December 2021}}&lt;/ref&gt;&lt;ref&gt;{{Cite journal |last1=Razak |first1=Mohd Faizal Ab |last2=Anuar |first2=Nor Badrul |last3=Salleh |first3=Rosli |last4=Firdaus |first4=Ahmad |date=2016-11-01 |title=The rise of "malware": Bibliometric analysis of malware study |url=https://linkinghub.elsevier.com/retrieve/pii/S1084804516301904 |journal=Journal of Network and Computer Applications |language=en |volume=75 |pages=58–76 |doi=10.1016/j.jnca.2016.08.022 |access-date=30 April 2022}}&lt;/ref&gt; According to [[NortonLifeLock|Symantec]]'s 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.&lt;ref&gt;{{Cite journal |last1=Xiao |first1=Fei |last2=Sun |first2=Yi |last3=Du |first3=Donggao |last4=Li |first4=Xuelei |last5=Luo |first5=Min |date=2020-03-21 |title=A Novel Malware Classification Method Based on Crucial Behavior |journal=Mathematical Problems in Engineering |volume=2020 |pages=1–12 |doi=10.1155/2020/6804290 |issn=1024-123X |doi-access=free}}&lt;/ref&gt; [[Cybercrime]], which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy US$6 trillion in 2021, and is increasing at a rate of 15% per year.&lt;ref name="Morgan"&gt;{{cite web |last=Morgan |first=Steve |date=13 November 2020 |title=Cybercrime To Cost The World $10.5 Trillion Annually By 2025 |url=https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ |url-status=live |archive-url=https://web.archive.org/web/20220305072352/https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ |archive-date=5 March 2022 |access-date=5 March 2022 |work=Cybercrime magazine website |publisher=Cybersecurity ventures |format= |doi=}}&lt;/ref&gt; Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the [[Electricity infrastructure|electricity distribution network]].&lt;ref&gt;{{Cite journal |last1=Eder-Neuhauser |first1=Peter |last2=Zseby |first2=Tanja |last3=Fabini |first3=Joachim |date=2019-06-01 |title=Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types |journal=Journal of Computer Virology and Hacking Techniques |language=en |volume=15 |issue=2 |pages=109–125 |doi=10.1007/s11416-018-0325-y |issn=2263-8733 |s2cid=255164530 |doi-access=free}}&lt;/ref&gt;&lt;ref&gt;{{Cite journal |last1=Razak |first1=Mohd Faizal Ab |last2=Anuar |first2=Nor Badrul |last3=Salleh |first3=Rosli |last4=Firdaus |first4=Ahmad |date=2016-11-01 |title=The rise of "malware": Bibliometric analysis of malware study |url=https://www.sciencedirect.com/science/article/pii/S1084804516301904 |journal=Journal of Network and Computer Applications |volume=75 |pages=58–76 |doi=10.1016/j.jnca.2016.08.022 |issn=1084-8045}}&lt;/ref&gt; Malware can be designed to evade antivirus software detection algorithms.&lt;ref&gt;{{Cite web |last=Spring |first=Tom |date=2023-06-12 |title=Obfuscation tool 'BatCloak' can evade 80% of AV engines |url=https://www.scmagazine.com/news/obfuscation-batcloak-80-percent-av-engines |access-date=2023-12-21 |website=SC Media |language=en}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |last=Nam |first=Nguyen |date=2023-01-10 |title=Kiểm tra ip |url=http://kiemtraip.vn |access-date=2023-12-21 |language=en-US}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |last=Amos |first=Zac |title=How Ransomware Can Evade Antivirus Software |url=https://gca.isa.org/blog/how-ransomware-can-evade-antivirus-software |access-date=2023-12-21 |website=gca.isa.org |language=en}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Malware poses serious problems to individuals and businesses on the Internet.&lt;ref&gt;{{Cite journal |last1=Kim |first1=Jin-Young |last2=Bu |first2=Seok-Jun |last3=Cho |first3=Sung-Bae |date=2018-09-01 |title=Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders |url=<ins style="font-weight: bold; text-decoration: none;">http</ins>://<ins style="font-weight: bold; text-decoration: none;">sclab.yonsei</ins>.<ins style="font-weight: bold; text-decoration: none;">ac</ins>.<ins style="font-weight: bold; text-decoration: none;">kr</ins>/<ins style="font-weight: bold; text-decoration: none;">publications</ins>/<ins style="font-weight: bold; text-decoration: none;">Papers</ins>/<ins style="font-weight: bold; text-decoration: none;">IJ</ins>/<ins style="font-weight: bold; text-decoration: none;">2018_IS_JYK.pdf |s2cid-access=free |via=Soft Computing Laboratory, Dept. of Computer Science, Yonsei University</ins> |journal=Information Sciences |language=en |volume=460–461 |pages=83–102 |doi=10.1016/j.ins.2018.04.092 |issn=0020-0255 |s2cid=51882216 |access-date=2 December 2021<ins style="font-weight: bold; text-decoration: none;"> |url-status=dead |archive-url= https://web.archive.org/web/20220430072512/http://sclab.yonsei.ac.kr/publications/Papers/IJ/2018_IS_JYK.pdf |archive-date= Apr 30, 2022 </ins>}}&lt;/ref&gt;&lt;ref&gt;{{Cite journal |last1=Razak |first1=Mohd Faizal Ab |last2=Anuar |first2=Nor Badrul |last3=Salleh |first3=Rosli |last4=Firdaus |first4=Ahmad |date=2016-11-01 |title=The rise of "malware": Bibliometric analysis of malware study |url=https://linkinghub.elsevier.com/retrieve/pii/S1084804516301904 |journal=Journal of Network and Computer Applications |language=en |volume=75 |pages=58–76 |doi=10.1016/j.jnca.2016.08.022 |access-date=30 April 2022}}&lt;/ref&gt; According to [[NortonLifeLock|Symantec]]'s 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.&lt;ref&gt;{{Cite journal |last1=Xiao |first1=Fei |last2=Sun |first2=Yi |last3=Du |first3=Donggao |last4=Li |first4=Xuelei |last5=Luo |first5=Min |date=2020-03-21 |title=A Novel Malware Classification Method Based on Crucial Behavior |journal=Mathematical Problems in Engineering |volume=2020 |pages=1–12 |doi=10.1155/2020/6804290 |issn=1024-123X |doi-access=free}}&lt;/ref&gt; [[Cybercrime]], which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy US$6 trillion in 2021, and is increasing at a rate of 15% per year.&lt;ref name="Morgan"&gt;{{cite web |last=Morgan |first=Steve |date=13 November 2020 |title=Cybercrime To Cost The World $10.5 Trillion Annually By 2025 |url=https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ |url-status=live |archive-url=https://web.archive.org/web/20220305072352/https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ |archive-date=5 March 2022 |access-date=5 March 2022 |work=Cybercrime magazine website |publisher=Cybersecurity ventures |format= |doi=}}&lt;/ref&gt; Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the [[Electricity infrastructure|electricity distribution network]].&lt;ref&gt;{{Cite journal |last1=Eder-Neuhauser |first1=Peter |last2=Zseby |first2=Tanja |last3=Fabini |first3=Joachim |date=2019-06-01 |title=Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types |journal=Journal of Computer Virology and Hacking Techniques |language=en |volume=15 |issue=2 |pages=109–125 |doi=10.1007/s11416-018-0325-y |issn=2263-8733 |s2cid=255164530 |doi-access=free}}&lt;/ref&gt;&lt;ref&gt;{{Cite journal |last1=Razak |first1=Mohd Faizal Ab |last2=Anuar |first2=Nor Badrul |last3=Salleh |first3=Rosli |last4=Firdaus |first4=Ahmad |date=2016-11-01 |title=The rise of "malware": Bibliometric analysis of malware study |url=https://www.sciencedirect.com/science/article/pii/S1084804516301904 |journal=Journal of Network and Computer Applications |volume=75 |pages=58–76 |doi=10.1016/j.jnca.2016.08.022 |issn=1084-8045}}&lt;/ref&gt; Malware can be designed to evade antivirus software detection algorithms.&lt;ref&gt;{{Cite web |last=Spring |first=Tom |date=2023-06-12 |title=Obfuscation tool 'BatCloak' can evade 80% of AV engines |url=https://www.scmagazine.com/news/obfuscation-batcloak-80-percent-av-engines |access-date=2023-12-21 |website=SC Media |language=en}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |last=Nam |first=Nguyen |date=2023-01-10 |title=Kiểm tra ip |url=http://kiemtraip.vn |access-date=2023-12-21 |language=en-US}}&lt;/ref&gt;&lt;ref&gt;{{Cite web |last=Amos |first=Zac |title=How Ransomware Can Evade Antivirus Software |url=https://gca.isa.org/blog/how-ransomware-can-evade-antivirus-software |access-date=2023-12-21 |website=gca.isa.org |language=en}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>=== Surveillance ===</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>=== Surveillance ===</div></td> </tr> <!-- diff cache key enwiki:diff:1.41:old-1265842006:rev-1265847284:wikidiff2=table:1.14.1:ff290eae --> </table> HeyElliott https://en.wikipedia.org/w/index.php?title=Internet&diff=1265842006&oldid=prev Apenguinlover: Remove disambiguation link 2024-12-28T23:09:48Z <p>Remove disambiguation link</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 23:09, 28 December 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 141:</td> <td colspan="2" class="diff-lineno">Line 141:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The World Wide Web is a global collection of [[documents]], [[Computer graphics|images]], [[multimedia]], applications, and other resources, logically interrelated by [[hyperlink]]s and referenced with [[Uniform Resource Identifier]]s (URIs), which provide a global system of named references. URIs symbolically identify services, [[web servers]], databases, and the documents and resources that they can provide. [[HyperText Transfer Protocol]] (HTTP) is the main access protocol of the World Wide Web. [[Web service]]s also use HTTP for communication between software systems for information transfer, sharing and exchanging business data and logistics and is one of many languages or protocols that can be used for communication on the Internet.&lt;ref&gt;{{cite web|url=http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp |title=The Difference Between the Internet and the World Wide Web |work=Webopedia |publisher=QuinStreet Inc. |date=24 June 2010 |access-date=1 May 2014 |url-status=live |archive-url=https://web.archive.org/web/20140502001005/http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp |archive-date=2 May 2014 }}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The World Wide Web is a global collection of [[documents]], [[Computer graphics|images]], [[multimedia]], applications, and other resources, logically interrelated by [[hyperlink]]s and referenced with [[Uniform Resource Identifier]]s (URIs), which provide a global system of named references. URIs symbolically identify services, [[web servers]], databases, and the documents and resources that they can provide. [[HyperText Transfer Protocol]] (HTTP) is the main access protocol of the World Wide Web. [[Web service]]s also use HTTP for communication between software systems for information transfer, sharing and exchanging business data and logistics and is one of many languages or protocols that can be used for communication on the Internet.&lt;ref&gt;{{cite web|url=http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp |title=The Difference Between the Internet and the World Wide Web |work=Webopedia |publisher=QuinStreet Inc. |date=24 June 2010 |access-date=1 May 2014 |url-status=live |archive-url=https://web.archive.org/web/20140502001005/http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp |archive-date=2 May 2014 }}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>World Wide Web browser software, such as [[Microsoft]]'s [[Internet Explorer]]/[[Microsoft Edge<del style="font-weight: bold; text-decoration: none;"> (series of web browsers)</del>|Edge]], [[Mozilla Firefox]], [[Opera (web browser)|Opera]], [[Apple Inc.|Apple]]'s [[Safari (web browser)|Safari]], and [[Google Chrome]], enable users to navigate from one web page to another via the hyperlinks embedded in the documents. These documents may also contain any combination of [[computer data]], including graphics, sounds, [[Plain text|text]], [[web video|video]], [[multimedia]] and interactive content that runs while the user is interacting with the page. [[Client-side scripting|Client-side software]] can include animations, [[web game|games]], [[office applications]] and scientific demonstrations. Through [[keyword (Internet search)|keyword]]-driven [[Internet research]] using [[Web search engine|search engines]] like [[Yahoo! Search|Yahoo!]], [[Bing (search engine)|Bing]] and [[Google Search|Google]], users worldwide have easy, instant access to a vast and diverse amount of online information. Compared to printed media, books, encyclopedias and traditional libraries, the World Wide Web has enabled the decentralization of information on a large scale.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>World Wide Web browser software, such as [[Microsoft]]'s [[Internet Explorer]]/[[Microsoft Edge|Edge]], [[Mozilla Firefox]], [[Opera (web browser)|Opera]], [[Apple Inc.|Apple]]'s [[Safari (web browser)|Safari]], and [[Google Chrome]], enable users to navigate from one web page to another via the hyperlinks embedded in the documents. These documents may also contain any combination of [[computer data]], including graphics, sounds, [[Plain text|text]], [[web video|video]], [[multimedia]] and interactive content that runs while the user is interacting with the page. [[Client-side scripting|Client-side software]] can include animations, [[web game|games]], [[office applications]] and scientific demonstrations. Through [[keyword (Internet search)|keyword]]-driven [[Internet research]] using [[Web search engine|search engines]] like [[Yahoo! Search|Yahoo!]], [[Bing (search engine)|Bing]] and [[Google Search|Google]], users worldwide have easy, instant access to a vast and diverse amount of online information. Compared to printed media, books, encyclopedias and traditional libraries, the World Wide Web has enabled the decentralization of information on a large scale.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The Web has enabled individuals and organizations to [[publish]] ideas and information to a potentially large [[audience]] online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial [[cost]] and many cost-free services are available. However, publishing and maintaining large, professional websites with attractive, diverse and up-to-date information is still a difficult and expensive proposition. Many individuals and some companies and groups use ''web logs'' or blogs, which are largely used as easily being able to update online diaries. Some commercial organizations encourage [[employees|staff]] to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information and be attracted to the corporation as a result.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The Web has enabled individuals and organizations to [[publish]] ideas and information to a potentially large [[audience]] online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial [[cost]] and many cost-free services are available. However, publishing and maintaining large, professional websites with attractive, diverse and up-to-date information is still a difficult and expensive proposition. Many individuals and some companies and groups use ''web logs'' or blogs, which are largely used as easily being able to update online diaries. Some commercial organizations encourage [[employees|staff]] to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information and be attracted to the corporation as a result.</div></td> </tr> </table> Apenguinlover https://en.wikipedia.org/w/index.php?title=Internet&diff=1265791628&oldid=prev Winderz IoT: /* World Wide Web */ Update link, minor fix 2024-12-28T17:52:43Z <p><span class="autocomment">World Wide Web: </span> Update link, minor fix</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 17:52, 28 December 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 141:</td> <td colspan="2" class="diff-lineno">Line 141:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The World Wide Web is a global collection of [[documents]], [[Computer graphics|images]], [[multimedia]], applications, and other resources, logically interrelated by [[hyperlink]]s and referenced with [[Uniform Resource Identifier]]s (URIs), which provide a global system of named references. URIs symbolically identify services, [[web servers]], databases, and the documents and resources that they can provide. [[HyperText Transfer Protocol]] (HTTP) is the main access protocol of the World Wide Web. [[Web service]]s also use HTTP for communication between software systems for information transfer, sharing and exchanging business data and logistics and is one of many languages or protocols that can be used for communication on the Internet.&lt;ref&gt;{{cite web|url=http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp |title=The Difference Between the Internet and the World Wide Web |work=Webopedia |publisher=QuinStreet Inc. |date=24 June 2010 |access-date=1 May 2014 |url-status=live |archive-url=https://web.archive.org/web/20140502001005/http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp |archive-date=2 May 2014 }}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The World Wide Web is a global collection of [[documents]], [[Computer graphics|images]], [[multimedia]], applications, and other resources, logically interrelated by [[hyperlink]]s and referenced with [[Uniform Resource Identifier]]s (URIs), which provide a global system of named references. URIs symbolically identify services, [[web servers]], databases, and the documents and resources that they can provide. [[HyperText Transfer Protocol]] (HTTP) is the main access protocol of the World Wide Web. [[Web service]]s also use HTTP for communication between software systems for information transfer, sharing and exchanging business data and logistics and is one of many languages or protocols that can be used for communication on the Internet.&lt;ref&gt;{{cite web|url=http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp |title=The Difference Between the Internet and the World Wide Web |work=Webopedia |publisher=QuinStreet Inc. |date=24 June 2010 |access-date=1 May 2014 |url-status=live |archive-url=https://web.archive.org/web/20140502001005/http://www.webopedia.com/DidYouKnow/Internet/Web_vs_Internet.asp |archive-date=2 May 2014 }}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>World Wide Web browser software, such as [[Microsoft]]'s [[Internet Explorer]]/[[Microsoft Edge|Edge]], [[Mozilla Firefox]], [[Opera (web browser)|Opera]], [[Apple Inc.|Apple]]'s [[Safari (web browser)|Safari]], and [[Google Chrome]], enable users to navigate from one web page to another via the hyperlinks embedded in the documents. These documents may also contain any combination of [[computer data]], including graphics, sounds, [[Plain text|text]], [[web video|video]], [[multimedia]] and interactive content that runs while the user is interacting with the page. [[Client-side scripting|Client-side software]] can include animations, [[web game|games]], [[office applications]] and scientific demonstrations. Through [[keyword (Internet search)|keyword]]-driven [[Internet research]] using [[Web search engine|search engines]] like [[Yahoo! Search|Yahoo!]], [[Bing (search engine)|Bing]] and [[Google Search|Google]], users worldwide have easy, instant access to a vast and diverse amount of online information. Compared to printed media, books, encyclopedias and traditional libraries, the World Wide Web has enabled the decentralization of information on a large scale.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>World Wide Web browser software, such as [[Microsoft]]'s [[Internet Explorer]]/[[Microsoft Edge<ins style="font-weight: bold; text-decoration: none;"> (series of web browsers)</ins>|Edge]], [[Mozilla Firefox]], [[Opera (web browser)|Opera]], [[Apple Inc.|Apple]]'s [[Safari (web browser)|Safari]], and [[Google Chrome]], enable users to navigate from one web page to another via the hyperlinks embedded in the documents. These documents may also contain any combination of [[computer data]], including graphics, sounds, [[Plain text|text]], [[web video|video]], [[multimedia]] and interactive content that runs while the user is interacting with the page. [[Client-side scripting|Client-side software]] can include animations, [[web game|games]], [[office applications]] and scientific demonstrations. Through [[keyword (Internet search)|keyword]]-driven [[Internet research]] using [[Web search engine|search engines]] like [[Yahoo! Search|Yahoo!]], [[Bing (search engine)|Bing]] and [[Google Search|Google]], users worldwide have easy, instant access to a vast and diverse amount of online information. Compared to printed media, books, encyclopedias and traditional libraries, the World Wide Web has enabled the decentralization of information on a large scale.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The Web has enabled individuals and organizations to [[publish]] ideas and information to a potentially large [[audience]] online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial [[cost]] and many cost-free services are available. However, publishing and maintaining large, professional <del style="font-weight: bold; text-decoration: none;">web sites</del> with attractive, diverse and up-to-date information is still a difficult and expensive proposition. Many individuals and some companies and groups use ''web logs'' or blogs, which are largely used as easily being able to update online diaries. Some commercial organizations encourage [[employees|staff]] to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information and be attracted to the corporation as a result.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The Web has enabled individuals and organizations to [[publish]] ideas and information to a potentially large [[audience]] online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial [[cost]] and many cost-free services are available. However, publishing and maintaining large, professional <ins style="font-weight: bold; text-decoration: none;">websites</ins> with attractive, diverse and up-to-date information is still a difficult and expensive proposition. Many individuals and some companies and groups use ''web logs'' or blogs, which are largely used as easily being able to update online diaries. Some commercial organizations encourage [[employees|staff]] to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information and be attracted to the corporation as a result.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>[[Online advertising|Advertising]] on popular web pages can be lucrative, and [[e-commerce]], which is the sale of products and services directly via the Web, continues to grow. Online advertising is a form of [[marketing]] and advertising which uses the Internet to deliver [[promotion (marketing)|promotional]] marketing messages to consumers. It includes email marketing, [[search engine marketing]] (SEM), social media marketing, many types of [[display advertising]] (including [[web banner]] advertising), and [[mobile advertising]]. In 2011, Internet advertising revenues in the United States surpassed those of [[cable television]] and nearly exceeded those of [[broadcast television]].&lt;ref name="IAB2012"&gt;{{cite web |url = http://www.iab.net/media/file/IAB_Internet_Advertising_Revenue_Report_FY_2012_rev.pdf |title = IAB Internet advertising revenue report: 2012 full year results |date = April 2013 |publisher = PricewaterhouseCoopers, Internet Advertising Bureau |access-date = 12 June 2013 |archive-url = https://web.archive.org/web/20141004001439/http://www.iab.net/media/file/IAB_Internet_Advertising_Revenue_Report_FY_2012_rev.pdf |archive-date = 4 October 2014 }}&lt;/ref&gt;{{rp|19}} Many common online advertising practices are controversial and increasingly subject to regulation.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>[[Online advertising|Advertising]] on popular web pages can be lucrative, and [[e-commerce]], which is the sale of products and services directly via the Web, continues to grow. Online advertising is a form of [[marketing]] and advertising which uses the Internet to deliver [[promotion (marketing)|promotional]] marketing messages to consumers. It includes email marketing, [[search engine marketing]] (SEM), social media marketing, many types of [[display advertising]] (including [[web banner]] advertising), and [[mobile advertising]]. In 2011, Internet advertising revenues in the United States surpassed those of [[cable television]] and nearly exceeded those of [[broadcast television]].&lt;ref name="IAB2012"&gt;{{cite web |url = http://www.iab.net/media/file/IAB_Internet_Advertising_Revenue_Report_FY_2012_rev.pdf |title = IAB Internet advertising revenue report: 2012 full year results |date = April 2013 |publisher = PricewaterhouseCoopers, Internet Advertising Bureau |access-date = 12 June 2013 |archive-url = https://web.archive.org/web/20141004001439/http://www.iab.net/media/file/IAB_Internet_Advertising_Revenue_Report_FY_2012_rev.pdf |archive-date = 4 October 2014 }}&lt;/ref&gt;{{rp|19}} Many common online advertising practices are controversial and increasingly subject to regulation.</div></td> </tr> </table> Winderz IoT https://en.wikipedia.org/w/index.php?title=Internet&diff=1264487297&oldid=prev Constant314: Restored revision 1260570568 by Whizz40 (talk): Use plain language 2024-12-22T04:50:42Z <p>Restored revision 1260570568 by <a href="/wiki/Special:Contributions/Whizz40" title="Special:Contributions/Whizz40">Whizz40</a> (<a href="/wiki/User_talk:Whizz40" title="User talk:Whizz40">talk</a>): Use plain language</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 04:50, 22 December 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 261:</td> <td colspan="2" class="diff-lineno">Line 261:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The vast majority of computer surveillance involves the monitoring of [[data mining|data]] and [[traffic analysis|traffic]] on the Internet.&lt;ref name="sciam-internet"&gt;{{cite news|url=http://www.sciam.com/article.cfm?id=internet-eavesdropping|title=Internet Eavesdropping: A Brave New World of Wiretapping|last=Diffie|first=Whitfield|author2=Susan Landau|date=August 2008|work=Scientific American|access-date=13 March 2009|archive-url=https://web.archive.org/web/20081113212137/http://www.sciam.com/article.cfm?id=internet-eavesdropping|archive-date=13 November 2008|url-status=live}}&lt;/ref&gt; In the United States for example, under the [[Communications Assistance For Law Enforcement Act]], all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.&lt;ref name="eff-calea-archive"&gt;{{cite web|url=http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html |archive-url=https://web.archive.org/web/20081025074518/http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html |archive-date=25 October 2008 |title=CALEA Archive|work=Electronic Frontier Foundation (website) |access-date=14 March 2009 }}&lt;/ref&gt;&lt;ref name="eff-calea-summary"&gt;{{cite web|url=https://www.eff.org/issues/calea |title=CALEA: The Perils of Wiretapping the Internet |work=Electronic Frontier Foundation (website) |access-date=14 March 2009 |url-status=live |archive-url=https://web.archive.org/web/20090316041313/http://www.eff.org/issues/calea |archive-date=16 March 2009 }}&lt;/ref&gt;&lt;ref name="eff-calea-faq"&gt;{{cite web|url=https://www.eff.org/pages/calea-faq |title=CALEA: Frequently Asked Questions |work=Electronic Frontier Foundation (website) |access-date=14 March 2009 |url-status=live |archive-url=https://web.archive.org/web/20090501072553/http://www.eff.org/pages/calea-faq |archive-date=1 May 2009 |date=20 September 2007 }}&lt;/ref&gt; [[Packet capture]] is the monitoring of data traffic on a [[computer network]]. Computers communicate over the Internet by breaking up messages (emails, images, videos, web pages, files, etc.) into small chunks called "packets", which are routed through a network of computers, until they reach their destination, where they are assembled back into a complete "message" again. [[Packet Capture Appliance]] intercepts these packets as they are traveling through the network, in order to examine their contents using other programs. A packet capture is an information ''gathering'' tool, but not an ''analysis'' tool. That is it gathers "messages" but it does not analyze them and figure out what they mean. Other programs are needed to perform [[traffic analysis]] and sift through intercepted data looking for important/useful information. Under the [[Communications Assistance For Law Enforcement Act]] all U.S. telecommunications providers are required to install packet sniffing technology to allow Federal law enforcement and intelligence agencies to intercept all of their customers' [[broadband Internet]] and VoIP traffic.&lt;ref&gt;{{cite web|url=http://www.baller.com/pdfs/ACE.pdf|archive-url=https://web.archive.org/web/20120907032500/http://www.baller.com/pdfs/ACE.pdf|title=American Council on Education vs. FCC, Decision, United States Court of Appeals for the District of Columbia Circuit|date=9 June 2006|access-date=8 September 2013|archive-date=7 September 2012}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The vast majority of computer surveillance involves the monitoring of [[data mining|data]] and [[traffic analysis|traffic]] on the Internet.&lt;ref name="sciam-internet"&gt;{{cite news|url=http://www.sciam.com/article.cfm?id=internet-eavesdropping|title=Internet Eavesdropping: A Brave New World of Wiretapping|last=Diffie|first=Whitfield|author2=Susan Landau|date=August 2008|work=Scientific American|access-date=13 March 2009|archive-url=https://web.archive.org/web/20081113212137/http://www.sciam.com/article.cfm?id=internet-eavesdropping|archive-date=13 November 2008|url-status=live}}&lt;/ref&gt; In the United States for example, under the [[Communications Assistance For Law Enforcement Act]], all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.&lt;ref name="eff-calea-archive"&gt;{{cite web|url=http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html |archive-url=https://web.archive.org/web/20081025074518/http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html |archive-date=25 October 2008 |title=CALEA Archive|work=Electronic Frontier Foundation (website) |access-date=14 March 2009 }}&lt;/ref&gt;&lt;ref name="eff-calea-summary"&gt;{{cite web|url=https://www.eff.org/issues/calea |title=CALEA: The Perils of Wiretapping the Internet |work=Electronic Frontier Foundation (website) |access-date=14 March 2009 |url-status=live |archive-url=https://web.archive.org/web/20090316041313/http://www.eff.org/issues/calea |archive-date=16 March 2009 }}&lt;/ref&gt;&lt;ref name="eff-calea-faq"&gt;{{cite web|url=https://www.eff.org/pages/calea-faq |title=CALEA: Frequently Asked Questions |work=Electronic Frontier Foundation (website) |access-date=14 March 2009 |url-status=live |archive-url=https://web.archive.org/web/20090501072553/http://www.eff.org/pages/calea-faq |archive-date=1 May 2009 |date=20 September 2007 }}&lt;/ref&gt; [[Packet capture]] is the monitoring of data traffic on a [[computer network]]. Computers communicate over the Internet by breaking up messages (emails, images, videos, web pages, files, etc.) into small chunks called "packets", which are routed through a network of computers, until they reach their destination, where they are assembled back into a complete "message" again. [[Packet Capture Appliance]] intercepts these packets as they are traveling through the network, in order to examine their contents using other programs. A packet capture is an information ''gathering'' tool, but not an ''analysis'' tool. That is it gathers "messages" but it does not analyze them and figure out what they mean. Other programs are needed to perform [[traffic analysis]] and sift through intercepted data looking for important/useful information. Under the [[Communications Assistance For Law Enforcement Act]] all U.S. telecommunications providers are required to install packet sniffing technology to allow Federal law enforcement and intelligence agencies to intercept all of their customers' [[broadband Internet]] and VoIP traffic.&lt;ref&gt;{{cite web|url=http://www.baller.com/pdfs/ACE.pdf|archive-url=https://web.archive.org/web/20120907032500/http://www.baller.com/pdfs/ACE.pdf|title=American Council on Education vs. FCC, Decision, United States Court of Appeals for the District of Columbia Circuit|date=9 June 2006|access-date=8 September 2013|archive-date=7 September 2012}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The large amount of data gathered from packet capture requires <del style="font-weight: bold; text-decoration: none;">data filtering</del> software that filters and reports relevant information, such as the use of certain words or phrases, the access to certain types of web sites, or communicating via email or chat with certain parties.&lt;ref name="usatoday-chatroom"&gt;{{cite news|url=https://www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm|title=Government funds chat room surveillance research|last=Hill|first=Michael|date=11 October 2004|agency=Associated Press|newspaper=USA Today|access-date=19 March 2009|url-status=live|archive-url=https://web.archive.org/web/20100511220550/http://www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm|archive-date=11 May 2010}}&lt;/ref&gt; Agencies, such as the [[Information Awareness Office]], [[NSA]], [[GCHQ]] and the [[FBI]], spend billions of dollars per year to develop, purchase, implement, and operate systems for interception and analysis of data.&lt;ref name="zdnet-fbi"&gt;{{cite news|url=http://news.zdnet.com/2100-9595_22-151059.html|archive-url=https://web.archive.org/web/20100407040227/http://news.zdnet.com/2100-9595_22-151059.html|title=FBI turns to broad new wiretap method|last=McCullagh|first=Declan|date=30 January 2007|work=ZDNet News|access-date=13 March 2009|archive-date=7 April 2010}}&lt;/ref&gt; Similar systems are operated by [[Ministry of Intelligence and National Security of Iran|Iranian secret police]] to identify and suppress dissidents. The required hardware and software were allegedly installed by German [[Siemens AG]] and Finnish [[Nokia]].&lt;ref&gt;{{cite web|url=http://www.debka.com/article/3509/|title=First round in Internet war goes to Iranian intelligence|website=[[Debkafile]]|date=28 June 2009|url-access=subscription|archive-url=https://web.archive.org/web/20131221173608/http://www.debka.com/article/3509/ |archive-date=21 December 2013}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The large amount of data gathered from packet capture requires <ins style="font-weight: bold; text-decoration: none;">surveillance</ins> software that filters and reports relevant information, such as the use of certain words or phrases, the access to certain types of web sites, or communicating via email or chat with certain parties.&lt;ref name="usatoday-chatroom"&gt;{{cite news|url=https://www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm|title=Government funds chat room surveillance research|last=Hill|first=Michael|date=11 October 2004|agency=Associated Press|newspaper=USA Today|access-date=19 March 2009|url-status=live|archive-url=https://web.archive.org/web/20100511220550/http://www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm|archive-date=11 May 2010}}&lt;/ref&gt; Agencies, such as the [[Information Awareness Office]], [[NSA]], [[GCHQ]] and the [[FBI]], spend billions of dollars per year to develop, purchase, implement, and operate systems for interception and analysis of data.&lt;ref name="zdnet-fbi"&gt;{{cite news|url=http://news.zdnet.com/2100-9595_22-151059.html|archive-url=https://web.archive.org/web/20100407040227/http://news.zdnet.com/2100-9595_22-151059.html|title=FBI turns to broad new wiretap method|last=McCullagh|first=Declan|date=30 January 2007|work=ZDNet News|access-date=13 March 2009|archive-date=7 April 2010}}&lt;/ref&gt; Similar systems are operated by [[Ministry of Intelligence and National Security of Iran|Iranian secret police]] to identify and suppress dissidents. The required hardware and software were allegedly installed by German [[Siemens AG]] and Finnish [[Nokia]].&lt;ref&gt;{{cite web|url=http://www.debka.com/article/3509/|title=First round in Internet war goes to Iranian intelligence|website=[[Debkafile]]|date=28 June 2009|url-access=subscription|archive-url=https://web.archive.org/web/20131221173608/http://www.debka.com/article/3509/ |archive-date=21 December 2013}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>=== Censorship ===</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>=== Censorship ===</div></td> </tr> </table> Constant314 https://en.wikipedia.org/w/index.php?title=Internet&diff=1263900404&oldid=prev Proudbharati: The term 'data filtering software' more accurately describes the function of the technology used to process and analyze large volumes of data, rather than implying a broader and potentially misleading scope of surveillance. 2024-12-19T07:46:55Z <p>The term &#039;data filtering software&#039; more accurately describes the function of the technology used to process and analyze large volumes of data, rather than implying a broader and potentially misleading scope of surveillance.</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 07:46, 19 December 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 261:</td> <td colspan="2" class="diff-lineno">Line 261:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The vast majority of computer surveillance involves the monitoring of [[data mining|data]] and [[traffic analysis|traffic]] on the Internet.&lt;ref name="sciam-internet"&gt;{{cite news|url=http://www.sciam.com/article.cfm?id=internet-eavesdropping|title=Internet Eavesdropping: A Brave New World of Wiretapping|last=Diffie|first=Whitfield|author2=Susan Landau|date=August 2008|work=Scientific American|access-date=13 March 2009|archive-url=https://web.archive.org/web/20081113212137/http://www.sciam.com/article.cfm?id=internet-eavesdropping|archive-date=13 November 2008|url-status=live}}&lt;/ref&gt; In the United States for example, under the [[Communications Assistance For Law Enforcement Act]], all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.&lt;ref name="eff-calea-archive"&gt;{{cite web|url=http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html |archive-url=https://web.archive.org/web/20081025074518/http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html |archive-date=25 October 2008 |title=CALEA Archive|work=Electronic Frontier Foundation (website) |access-date=14 March 2009 }}&lt;/ref&gt;&lt;ref name="eff-calea-summary"&gt;{{cite web|url=https://www.eff.org/issues/calea |title=CALEA: The Perils of Wiretapping the Internet |work=Electronic Frontier Foundation (website) |access-date=14 March 2009 |url-status=live |archive-url=https://web.archive.org/web/20090316041313/http://www.eff.org/issues/calea |archive-date=16 March 2009 }}&lt;/ref&gt;&lt;ref name="eff-calea-faq"&gt;{{cite web|url=https://www.eff.org/pages/calea-faq |title=CALEA: Frequently Asked Questions |work=Electronic Frontier Foundation (website) |access-date=14 March 2009 |url-status=live |archive-url=https://web.archive.org/web/20090501072553/http://www.eff.org/pages/calea-faq |archive-date=1 May 2009 |date=20 September 2007 }}&lt;/ref&gt; [[Packet capture]] is the monitoring of data traffic on a [[computer network]]. Computers communicate over the Internet by breaking up messages (emails, images, videos, web pages, files, etc.) into small chunks called "packets", which are routed through a network of computers, until they reach their destination, where they are assembled back into a complete "message" again. [[Packet Capture Appliance]] intercepts these packets as they are traveling through the network, in order to examine their contents using other programs. A packet capture is an information ''gathering'' tool, but not an ''analysis'' tool. That is it gathers "messages" but it does not analyze them and figure out what they mean. Other programs are needed to perform [[traffic analysis]] and sift through intercepted data looking for important/useful information. Under the [[Communications Assistance For Law Enforcement Act]] all U.S. telecommunications providers are required to install packet sniffing technology to allow Federal law enforcement and intelligence agencies to intercept all of their customers' [[broadband Internet]] and VoIP traffic.&lt;ref&gt;{{cite web|url=http://www.baller.com/pdfs/ACE.pdf|archive-url=https://web.archive.org/web/20120907032500/http://www.baller.com/pdfs/ACE.pdf|title=American Council on Education vs. FCC, Decision, United States Court of Appeals for the District of Columbia Circuit|date=9 June 2006|access-date=8 September 2013|archive-date=7 September 2012}}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The vast majority of computer surveillance involves the monitoring of [[data mining|data]] and [[traffic analysis|traffic]] on the Internet.&lt;ref name="sciam-internet"&gt;{{cite news|url=http://www.sciam.com/article.cfm?id=internet-eavesdropping|title=Internet Eavesdropping: A Brave New World of Wiretapping|last=Diffie|first=Whitfield|author2=Susan Landau|date=August 2008|work=Scientific American|access-date=13 March 2009|archive-url=https://web.archive.org/web/20081113212137/http://www.sciam.com/article.cfm?id=internet-eavesdropping|archive-date=13 November 2008|url-status=live}}&lt;/ref&gt; In the United States for example, under the [[Communications Assistance For Law Enforcement Act]], all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.&lt;ref name="eff-calea-archive"&gt;{{cite web|url=http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html |archive-url=https://web.archive.org/web/20081025074518/http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html |archive-date=25 October 2008 |title=CALEA Archive|work=Electronic Frontier Foundation (website) |access-date=14 March 2009 }}&lt;/ref&gt;&lt;ref name="eff-calea-summary"&gt;{{cite web|url=https://www.eff.org/issues/calea |title=CALEA: The Perils of Wiretapping the Internet |work=Electronic Frontier Foundation (website) |access-date=14 March 2009 |url-status=live |archive-url=https://web.archive.org/web/20090316041313/http://www.eff.org/issues/calea |archive-date=16 March 2009 }}&lt;/ref&gt;&lt;ref name="eff-calea-faq"&gt;{{cite web|url=https://www.eff.org/pages/calea-faq |title=CALEA: Frequently Asked Questions |work=Electronic Frontier Foundation (website) |access-date=14 March 2009 |url-status=live |archive-url=https://web.archive.org/web/20090501072553/http://www.eff.org/pages/calea-faq |archive-date=1 May 2009 |date=20 September 2007 }}&lt;/ref&gt; [[Packet capture]] is the monitoring of data traffic on a [[computer network]]. Computers communicate over the Internet by breaking up messages (emails, images, videos, web pages, files, etc.) into small chunks called "packets", which are routed through a network of computers, until they reach their destination, where they are assembled back into a complete "message" again. [[Packet Capture Appliance]] intercepts these packets as they are traveling through the network, in order to examine their contents using other programs. A packet capture is an information ''gathering'' tool, but not an ''analysis'' tool. That is it gathers "messages" but it does not analyze them and figure out what they mean. Other programs are needed to perform [[traffic analysis]] and sift through intercepted data looking for important/useful information. Under the [[Communications Assistance For Law Enforcement Act]] all U.S. telecommunications providers are required to install packet sniffing technology to allow Federal law enforcement and intelligence agencies to intercept all of their customers' [[broadband Internet]] and VoIP traffic.&lt;ref&gt;{{cite web|url=http://www.baller.com/pdfs/ACE.pdf|archive-url=https://web.archive.org/web/20120907032500/http://www.baller.com/pdfs/ACE.pdf|title=American Council on Education vs. FCC, Decision, United States Court of Appeals for the District of Columbia Circuit|date=9 June 2006|access-date=8 September 2013|archive-date=7 September 2012}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The large amount of data gathered from packet capture requires <del style="font-weight: bold; text-decoration: none;">surveillance</del> software that filters and reports relevant information, such as the use of certain words or phrases, the access to certain types of web sites, or communicating via email or chat with certain parties.&lt;ref name="usatoday-chatroom"&gt;{{cite news|url=https://www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm|title=Government funds chat room surveillance research|last=Hill|first=Michael|date=11 October 2004|agency=Associated Press|newspaper=USA Today|access-date=19 March 2009|url-status=live|archive-url=https://web.archive.org/web/20100511220550/http://www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm|archive-date=11 May 2010}}&lt;/ref&gt; Agencies, such as the [[Information Awareness Office]], [[NSA]], [[GCHQ]] and the [[FBI]], spend billions of dollars per year to develop, purchase, implement, and operate systems for interception and analysis of data.&lt;ref name="zdnet-fbi"&gt;{{cite news|url=http://news.zdnet.com/2100-9595_22-151059.html|archive-url=https://web.archive.org/web/20100407040227/http://news.zdnet.com/2100-9595_22-151059.html|title=FBI turns to broad new wiretap method|last=McCullagh|first=Declan|date=30 January 2007|work=ZDNet News|access-date=13 March 2009|archive-date=7 April 2010}}&lt;/ref&gt; Similar systems are operated by [[Ministry of Intelligence and National Security of Iran|Iranian secret police]] to identify and suppress dissidents. The required hardware and software were allegedly installed by German [[Siemens AG]] and Finnish [[Nokia]].&lt;ref&gt;{{cite web|url=http://www.debka.com/article/3509/|title=First round in Internet war goes to Iranian intelligence|website=[[Debkafile]]|date=28 June 2009|url-access=subscription|archive-url=https://web.archive.org/web/20131221173608/http://www.debka.com/article/3509/ |archive-date=21 December 2013}}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The large amount of data gathered from packet capture requires <ins style="font-weight: bold; text-decoration: none;">data filtering</ins> software that filters and reports relevant information, such as the use of certain words or phrases, the access to certain types of web sites, or communicating via email or chat with certain parties.&lt;ref name="usatoday-chatroom"&gt;{{cite news|url=https://www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm|title=Government funds chat room surveillance research|last=Hill|first=Michael|date=11 October 2004|agency=Associated Press|newspaper=USA Today|access-date=19 March 2009|url-status=live|archive-url=https://web.archive.org/web/20100511220550/http://www.usatoday.com/tech/news/surveillance/2004-10-11-chatroom-surv_x.htm|archive-date=11 May 2010}}&lt;/ref&gt; Agencies, such as the [[Information Awareness Office]], [[NSA]], [[GCHQ]] and the [[FBI]], spend billions of dollars per year to develop, purchase, implement, and operate systems for interception and analysis of data.&lt;ref name="zdnet-fbi"&gt;{{cite news|url=http://news.zdnet.com/2100-9595_22-151059.html|archive-url=https://web.archive.org/web/20100407040227/http://news.zdnet.com/2100-9595_22-151059.html|title=FBI turns to broad new wiretap method|last=McCullagh|first=Declan|date=30 January 2007|work=ZDNet News|access-date=13 March 2009|archive-date=7 April 2010}}&lt;/ref&gt; Similar systems are operated by [[Ministry of Intelligence and National Security of Iran|Iranian secret police]] to identify and suppress dissidents. The required hardware and software were allegedly installed by German [[Siemens AG]] and Finnish [[Nokia]].&lt;ref&gt;{{cite web|url=http://www.debka.com/article/3509/|title=First round in Internet war goes to Iranian intelligence|website=[[Debkafile]]|date=28 June 2009|url-access=subscription|archive-url=https://web.archive.org/web/20131221173608/http://www.debka.com/article/3509/ |archive-date=21 December 2013}}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>=== Censorship ===</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>=== Censorship ===</div></td> </tr> </table> Proudbharati https://en.wikipedia.org/w/index.php?title=Internet&diff=1260570568&oldid=prev Whizz40: c/e, overlinked 2024-12-01T14:14:37Z <p>c/e, overlinked</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 14:14, 1 December 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 11:</td> <td colspan="2" class="diff-lineno">Line 11:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>&lt;!-- The Internet and the World Wide Web are different concepts – please do not muddle them in this article :) --&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>&lt;!-- The Internet and the World Wide Web are different concepts – please do not muddle them in this article :) --&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The '''Internet''' (or '''internet'''){{efn|See [[Capitalization of Internet|Capitalization of ''Internet'']]&lt;!-- Added per discussion currently underway on the Talk page --&gt;}} is the [[Global network|global system]] of interconnected [[computer network]]s that uses the [[Internet protocol suite]] (TCP/IP){{Efn|Despite the name, TCP/IP also includes UDP traffic, which is significant.&lt;ref&gt;{{cite web |url=https://www.cc.gatech.edu/~dovrolis/Courses/8803_F03/amogh.ppt |author=Amogh Dhamdhere |title=Internet Traffic Characterization |access-date=2022-05-06}}&lt;/ref&gt;}} to communicate between <del style="font-weight: bold; text-decoration: none;">[[computer network]]s</del> and devices. It is a [[internetworking|network of networks]] that consists of [[Private network|private]], public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, [[Wireless network|wireless]], and [[optical networking]] technologies. The Internet carries a vast range of information resources and services, such as the interlinked [[hypertext]] documents and [[Web application|applications]] of the [[World Wide Web]] (WWW), [[email|electronic mail]], [[internet telephony]], and [[file sharing]].</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The '''Internet''' (or '''internet'''){{efn|See [[Capitalization of Internet|Capitalization of ''Internet'']]&lt;!-- Added per discussion currently underway on the Talk page --&gt;}} is the [[Global network|global system]] of interconnected [[computer network]]s that uses the [[Internet protocol suite]] (TCP/IP){{Efn|Despite the name, TCP/IP also includes UDP traffic, which is significant.&lt;ref&gt;{{cite web |url=https://www.cc.gatech.edu/~dovrolis/Courses/8803_F03/amogh.ppt |author=Amogh Dhamdhere |title=Internet Traffic Characterization |access-date=2022-05-06}}&lt;/ref&gt;}} to communicate between <ins style="font-weight: bold; text-decoration: none;">networks</ins> and devices. It is a [[internetworking|network of networks]] that consists of [[Private network|private]], public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, [[Wireless network|wireless]], and [[optical networking]] technologies. The Internet carries a vast range of information resources and services, such as the interlinked [[hypertext]] documents and [[Web application|applications]] of the [[World Wide Web]] (WWW), [[email|electronic mail]], [[internet telephony]], and [[file sharing]].</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The origins of the Internet date back to research that enabled the [[time-sharing]] of computer resources, the development of [[packet switching]] in the 1960s and the design of <del style="font-weight: bold; text-decoration: none;">[[Computer</del> <del style="font-weight: bold; text-decoration: none;">network]]s</del> for [[data communication]].&lt;ref name="The Washington Post"&gt;{{Cite news|url=https://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/|title=A Flaw in the Design|date=30 May 2015|newspaper=The Washington Post|quote=The Internet was born of a big idea: Messages could be chopped into chunks, sent through a network in a series of transmissions, then reassembled by destination computers quickly and efficiently. Historians credit seminal insights to Welsh scientist Donald W. Davies and American engineer Paul Baran. ... The most important institutional force ... was the Pentagon's Advanced Research Projects Agency (ARPA) ... as ARPA began work on a groundbreaking computer network, the agency recruited scientists affiliated with the nation's top universities.|access-date=20 February 2020|archive-date=8 November 2020|archive-url=https://web.archive.org/web/20201108111512/https://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/|url-status=live}}&lt;/ref&gt;&lt;ref name=":6"&gt;{{Cite book |last=Yates |first=David M. |url=https://books.google.com/books?id=ToMfAQAAIAAJ&amp;q=packet+switch |title=Turing's Legacy: A History of Computing at the National Physical Laboratory 1945-1995 |date=1997 |publisher=National Museum of Science and Industry |isbn=978-0-901805-94-2 |pages=132–4 |language=en |quote=Davies's invention of packet switching and design of computer communication networks ... were a cornerstone of the development which led to the Internet}}&lt;/ref&gt; The set of rules ([[communication protocol]]s) to enable [[internetworking]] on the Internet arose from research and development commissioned in the 1970s by the [[Defense Advanced Research Projects Agency]] (DARPA) of the [[United States Department of Defense]] in collaboration with universities and researchers across the [[United States]] and in the [[United Kingdom]] and [[France]].&lt;ref name="Abbatep3"&gt;{{harvnb|Abbate|1999|p=[https://books.google.com/books?id=9BfZxFZpElwC&amp;pg=PA3 3] "The manager of the ARPANET project, Lawrence Roberts, assembled a large team of computer scientists ... and he drew on the ideas of network experimenters in the United States and the United Kingdom. Cerf and Kahn also enlisted the help of computer scientists from England, France and the United States"}}&lt;/ref&gt;&lt;ref&gt;{{cite web |date=27 October 2009 |title=The Computer History Museum, SRI International, and BBN Celebrate the 40th Anniversary of First ARPANET Transmission, Precursor to Today's Internet |url=https://www.sri.com/newsroom/press-releases/computer-history-museum-sri-international-and-bbn-celebrate-40th-anniversary |archive-url=https://web.archive.org/web/20190329134941/https://www.sri.com/newsroom/press-releases/computer-history-museum-sri-international-and-bbn-celebrate-40th-anniversary |archive-date=March 29, 2019 |access-date=25 September 2017 |publisher=SRI International |quote=But the ARPANET itself had now become an island, with no links to the other networks that had sprung up. By the early 1970s, researchers in France, the UK, and the U.S. began developing ways of connecting networks to each other, a process known as internetworking.}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author1=by Vinton Cerf, as told to Bernard Aboba |date=1993 |title=How the Internet Came to Be |url=http://elk.informatik.hs-augsburg.de/tmp/cdrom-oss/CerfHowInternetCame2B.html |archive-url=https://web.archive.org/web/20170926042220/http://elk.informatik.hs-augsburg.de/tmp/cdrom-oss/CerfHowInternetCame2B.html |archive-date=September 26, 2017 |access-date=25 September 2017 |quote=We began doing concurrent implementations at Stanford, BBN, and University College London. So effort at developing the Internet protocols was international from the beginning.}}&lt;/ref&gt; The [[ARPANET]] initially served as a backbone for the interconnection of regional academic and military networks in the United States to enable [[resource sharing]]. The funding of the [[National Science Foundation Network]] as a new backbone in the 1980s, as well as private funding for other commercial extensions, encouraged worldwide participation in the development of new networking technologies and the merger of many networks using DARPA's [[Internet protocol suite]].&lt;ref&gt;{{cite web|url=http://www.livinginternet.com/i/ii_summary.htm|title=Internet History – One Page Summary|archive-url=https://web.archive.org/web/20140702210150/http://www.livinginternet.com/i/ii_summary.htm |archive-date=2 July 2014|website=The Living Internet|first=Bill|last=Stewart|date=January 2000}}&lt;/ref&gt; The linking of commercial networks and enterprises by the early 1990s, as well as the advent of the [[World Wide Web]],&lt;ref&gt;{{Cite book |title=The Desk Encyclopedia of World History |publisher=[[Oxford University Press]] |year=2006 |isbn=978-0-7394-7809-7 |editor-last=Wright |editor-first=Edmund |location=New York |page=312}}&lt;/ref&gt; marked the beginning of the transition to the modern Internet,&lt;ref&gt;"#3 1982: the ARPANET community grows" in [https://www.vox.com/a/internet-maps ''40 maps that explain the internet''] {{webarchive|url=https://web.archive.org/web/20170306161657/http://www.vox.com/a/internet-maps|date=6 March 2017}}, Timothy B. Lee, Vox Conversations, 2 June 2014. Retrieved 27 June 2014.&lt;/ref&gt; and generated sustained exponential growth as generations of institutional, [[personal computer|personal]], and [[mobile device|mobile]] [[computer]]s were connected to the internetwork. Although the Internet was widely used by [[academia]] in the 1980s, the subsequent [[commercialization of the Internet]] in the 1990s and beyond incorporated its services and technologies into virtually every aspect of modern life.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The origins of the Internet date back to research that enabled the [[time-sharing]] of computer resources, the development of [[packet switching]] in the 1960s and the design of <ins style="font-weight: bold; text-decoration: none;">computer</ins> <ins style="font-weight: bold; text-decoration: none;">networks</ins> for [[data communication]].&lt;ref name="The Washington Post"&gt;{{Cite news|url=https://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/|title=A Flaw in the Design|date=30 May 2015|newspaper=The Washington Post|quote=The Internet was born of a big idea: Messages could be chopped into chunks, sent through a network in a series of transmissions, then reassembled by destination computers quickly and efficiently. Historians credit seminal insights to Welsh scientist Donald W. Davies and American engineer Paul Baran. ... The most important institutional force ... was the Pentagon's Advanced Research Projects Agency (ARPA) ... as ARPA began work on a groundbreaking computer network, the agency recruited scientists affiliated with the nation's top universities.|access-date=20 February 2020|archive-date=8 November 2020|archive-url=https://web.archive.org/web/20201108111512/https://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/|url-status=live}}&lt;/ref&gt;&lt;ref name=":6"&gt;{{Cite book |last=Yates |first=David M. |url=https://books.google.com/books?id=ToMfAQAAIAAJ&amp;q=packet+switch |title=Turing's Legacy: A History of Computing at the National Physical Laboratory 1945-1995 |date=1997 |publisher=National Museum of Science and Industry |isbn=978-0-901805-94-2 |pages=132–4 |language=en |quote=Davies's invention of packet switching and design of computer communication networks ... were a cornerstone of the development which led to the Internet}}&lt;/ref&gt; The set of rules ([[communication protocol]]s) to enable [[internetworking]] on the Internet arose from research and development commissioned in the 1970s by the [[Defense Advanced Research Projects Agency]] (DARPA) of the [[United States Department of Defense]] in collaboration with universities and researchers across the [[United States]] and in the [[United Kingdom]] and [[France]].&lt;ref name="Abbatep3"&gt;{{harvnb|Abbate|1999|p=[https://books.google.com/books?id=9BfZxFZpElwC&amp;pg=PA3 3] "The manager of the ARPANET project, Lawrence Roberts, assembled a large team of computer scientists ... and he drew on the ideas of network experimenters in the United States and the United Kingdom. Cerf and Kahn also enlisted the help of computer scientists from England, France and the United States"}}&lt;/ref&gt;&lt;ref&gt;{{cite web |date=27 October 2009 |title=The Computer History Museum, SRI International, and BBN Celebrate the 40th Anniversary of First ARPANET Transmission, Precursor to Today's Internet |url=https://www.sri.com/newsroom/press-releases/computer-history-museum-sri-international-and-bbn-celebrate-40th-anniversary |archive-url=https://web.archive.org/web/20190329134941/https://www.sri.com/newsroom/press-releases/computer-history-museum-sri-international-and-bbn-celebrate-40th-anniversary |archive-date=March 29, 2019 |access-date=25 September 2017 |publisher=SRI International |quote=But the ARPANET itself had now become an island, with no links to the other networks that had sprung up. By the early 1970s, researchers in France, the UK, and the U.S. began developing ways of connecting networks to each other, a process known as internetworking.}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author1=by Vinton Cerf, as told to Bernard Aboba |date=1993 |title=How the Internet Came to Be |url=http://elk.informatik.hs-augsburg.de/tmp/cdrom-oss/CerfHowInternetCame2B.html |archive-url=https://web.archive.org/web/20170926042220/http://elk.informatik.hs-augsburg.de/tmp/cdrom-oss/CerfHowInternetCame2B.html |archive-date=September 26, 2017 |access-date=25 September 2017 |quote=We began doing concurrent implementations at Stanford, BBN, and University College London. So effort at developing the Internet protocols was international from the beginning.}}&lt;/ref&gt; The [[ARPANET]] initially served as a backbone for the interconnection of regional academic and military networks in the United States to enable [[resource sharing]]. The funding of the [[National Science Foundation Network]] as a new backbone in the 1980s, as well as private funding for other commercial extensions, encouraged worldwide participation in the development of new networking technologies and the merger of many networks using DARPA's [[Internet protocol suite]].&lt;ref&gt;{{cite web|url=http://www.livinginternet.com/i/ii_summary.htm|title=Internet History – One Page Summary|archive-url=https://web.archive.org/web/20140702210150/http://www.livinginternet.com/i/ii_summary.htm |archive-date=2 July 2014|website=The Living Internet|first=Bill|last=Stewart|date=January 2000}}&lt;/ref&gt; The linking of commercial networks and enterprises by the early 1990s, as well as the advent of the [[World Wide Web]],&lt;ref&gt;{{Cite book |title=The Desk Encyclopedia of World History |publisher=[[Oxford University Press]] |year=2006 |isbn=978-0-7394-7809-7 |editor-last=Wright |editor-first=Edmund |location=New York |page=312}}&lt;/ref&gt; marked the beginning of the transition to the modern Internet,&lt;ref&gt;"#3 1982: the ARPANET community grows" in [https://www.vox.com/a/internet-maps ''40 maps that explain the internet''] {{webarchive|url=https://web.archive.org/web/20170306161657/http://www.vox.com/a/internet-maps|date=6 March 2017}}, Timothy B. Lee, Vox Conversations, 2 June 2014. Retrieved 27 June 2014.&lt;/ref&gt; and generated sustained exponential growth as generations of institutional, [[personal computer|personal]], and [[mobile device|mobile]] [[computer]]s were connected to the internetwork. Although the Internet was widely used by [[academia]] in the 1980s, the subsequent [[commercialization of the Internet]] in the 1990s and beyond incorporated its services and technologies into virtually every aspect of modern life.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Most traditional communication media, including [[telephone]], [[radio]], [[television]], paper mail, and newspapers, are reshaped, redefined, or even bypassed by the Internet, giving birth to new services such as [[email]], [[Internet telephone]], [[Internet television]], [[online music]], digital newspapers, and [[video streaming]] websites. Newspapers, books, and other print publishing have adapted to [[Web site|website]] technology or have been reshaped into [[blogging]], [[web feed]]s, and online [[news aggregator]]s. The Internet has enabled and accelerated new forms of personal interaction through [[instant messaging]], [[Internet forum]]s, and [[social networking service]]s. [[Online shopping]] has grown exponentially for major retailers, [[small business]]es, and [[entrepreneur]]s, as it enables firms to extend their "[[brick and mortar]]" presence to serve a larger market or even [[Online store|sell goods and services entirely online]]. [[Business-to-business]] and [[financial services]] on the Internet affect [[supply chain]]s across entire industries.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Most traditional communication media, including [[telephone]], [[radio]], [[television]], paper mail, and newspapers, are reshaped, redefined, or even bypassed by the Internet, giving birth to new services such as [[email]], [[Internet telephone]], [[Internet television]], [[online music]], digital newspapers, and [[video streaming]] websites. Newspapers, books, and other print publishing have adapted to [[Web site|website]] technology or have been reshaped into [[blogging]], [[web feed]]s, and online [[news aggregator]]s. The Internet has enabled and accelerated new forms of personal interaction through [[instant messaging]], [[Internet forum]]s, and [[social networking service]]s. [[Online shopping]] has grown exponentially for major retailers, [[small business]]es, and [[entrepreneur]]s, as it enables firms to extend their "[[brick and mortar]]" presence to serve a larger market or even [[Online store|sell goods and services entirely online]]. [[Business-to-business]] and [[financial services]] on the Internet affect [[supply chain]]s across entire industries.</div></td> </tr> </table> Whizz40 https://en.wikipedia.org/w/index.php?title=Internet&diff=1260446617&oldid=prev Finell: /* top */ Wikify, copy edit 2024-11-30T20:30:07Z <p><span class="autocomment">top: </span> Wikify, copy edit</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 20:30, 30 November 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 11:</td> <td colspan="2" class="diff-lineno">Line 11:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>&lt;!-- The Internet and the World Wide Web are different concepts – please do not muddle them in this article :) --&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>&lt;!-- The Internet and the World Wide Web are different concepts – please do not muddle them in this article :) --&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The '''Internet''' (or '''internet'''){{efn|See [[Capitalization of Internet|Capitalization of ''Internet'']]&lt;!-- Added per discussion currently underway on the Talk page --&gt;}} is the [[Global network|global system]] of interconnected [[computer network]]s that uses the [[Internet protocol suite]] (TCP/IP){{Efn|Despite the name, TCP/IP also includes UDP traffic, which is significant.&lt;ref&gt;{{cite web |url=https://www.cc.gatech.edu/~dovrolis/Courses/8803_F03/amogh.ppt |author=Amogh Dhamdhere |title=Internet Traffic Characterization |access-date=2022-05-06}}&lt;/ref&gt;}} to communicate between [[<del style="font-weight: bold; text-decoration: none;">Computer</del> network<del style="font-weight: bold; text-decoration: none;">|networks</del>]] and devices. It is a <del style="font-weight: bold; text-decoration: none;">''</del>[[internetworking|network of networks]]<del style="font-weight: bold; text-decoration: none;">''</del> that consists of [[Private network|private]], public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, [[Wireless network|wireless]], and [[optical networking]] technologies. The Internet carries a vast range of information resources and services, such as the interlinked [[hypertext]] documents and [[Web application|applications]] of the [[World Wide Web]] (WWW), [[email|electronic mail]], [[internet <del style="font-weight: bold; text-decoration: none;">telephony|</del>telephony]], and [[file sharing]].</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The '''Internet''' (or '''internet'''){{efn|See [[Capitalization of Internet|Capitalization of ''Internet'']]&lt;!-- Added per discussion currently underway on the Talk page --&gt;}} is the [[Global network|global system]] of interconnected [[computer network]]s that uses the [[Internet protocol suite]] (TCP/IP){{Efn|Despite the name, TCP/IP also includes UDP traffic, which is significant.&lt;ref&gt;{{cite web |url=https://www.cc.gatech.edu/~dovrolis/Courses/8803_F03/amogh.ppt |author=Amogh Dhamdhere |title=Internet Traffic Characterization |access-date=2022-05-06}}&lt;/ref&gt;}} to communicate between [[<ins style="font-weight: bold; text-decoration: none;">computer</ins> network]]<ins style="font-weight: bold; text-decoration: none;">s</ins> and devices. It is a [[internetworking|network of networks]] that consists of [[Private network|private]], public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, [[Wireless network|wireless]], and [[optical networking]] technologies. The Internet carries a vast range of information resources and services, such as the interlinked [[hypertext]] documents and [[Web application|applications]] of the [[World Wide Web]] (WWW), [[email|electronic mail]], [[internet telephony]], and [[file sharing]].</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The origins of the Internet date back to research that enabled the [[time-sharing]] of computer resources, the development of [[packet switching]] in the 1960s and the design of [[Computer network<del style="font-weight: bold; text-decoration: none;">|computer networks</del>]] for [[data communication]].&lt;ref name="The Washington Post"&gt;{{Cite news|url=https://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/|title=A Flaw in the Design|date=30 May 2015|newspaper=The Washington Post|quote=The Internet was born of a big idea: Messages could be chopped into chunks, sent through a network in a series of transmissions, then reassembled by destination computers quickly and efficiently. Historians credit seminal insights to Welsh scientist Donald W. Davies and American engineer Paul Baran. ... The most important institutional force ... was the Pentagon's Advanced Research Projects Agency (ARPA) ... as ARPA began work on a groundbreaking computer network, the agency recruited scientists affiliated with the nation's top universities.|access-date=20 February 2020|archive-date=8 November 2020|archive-url=https://web.archive.org/web/20201108111512/https://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/|url-status=live}}&lt;/ref&gt;&lt;ref name=":6"&gt;{{Cite book |last=Yates |first=David M. |url=https://books.google.com/books?id=ToMfAQAAIAAJ&amp;q=packet+switch |title=Turing's Legacy: A History of Computing at the National Physical Laboratory 1945-1995 |date=1997 |publisher=National Museum of Science and Industry |isbn=978-0-901805-94-2 |pages=132–4 |language=en |quote=Davies's invention of packet switching and design of computer communication networks ... were a cornerstone of the development which led to the Internet}}&lt;/ref&gt; The set of rules ([[communication protocol]]s) to enable [[internetworking]] on the Internet arose from research and development commissioned in the 1970s by the [[Defense Advanced Research Projects Agency]] (DARPA) of the [[United States Department of Defense]] in collaboration with universities and researchers across the [[United States]] and in the [[United Kingdom]] and [[France]].&lt;ref name="Abbatep3"&gt;{{harvnb|Abbate|1999|p=[https://books.google.com/books?id=9BfZxFZpElwC&amp;pg=PA3 3] "The manager of the ARPANET project, Lawrence Roberts, assembled a large team of computer scientists ... and he drew on the ideas of network experimenters in the United States and the United Kingdom. Cerf and Kahn also enlisted the help of computer scientists from England, France and the United States"}}&lt;/ref&gt;&lt;ref&gt;{{cite web |date=27 October 2009 |title=The Computer History Museum, SRI International, and BBN Celebrate the 40th Anniversary of First ARPANET Transmission, Precursor to Today's Internet |url=https://www.sri.com/newsroom/press-releases/computer-history-museum-sri-international-and-bbn-celebrate-40th-anniversary |archive-url=https://web.archive.org/web/20190329134941/https://www.sri.com/newsroom/press-releases/computer-history-museum-sri-international-and-bbn-celebrate-40th-anniversary |archive-date=March 29, 2019 |access-date=25 September 2017 |publisher=SRI International |quote=But the ARPANET itself had now become an island, with no links to the other networks that had sprung up. By the early 1970s, researchers in France, the UK, and the U.S. began developing ways of connecting networks to each other, a process known as internetworking.}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author1=by Vinton Cerf, as told to Bernard Aboba |date=1993 |title=How the Internet Came to Be |url=http://elk.informatik.hs-augsburg.de/tmp/cdrom-oss/CerfHowInternetCame2B.html |archive-url=https://web.archive.org/web/20170926042220/http://elk.informatik.hs-augsburg.de/tmp/cdrom-oss/CerfHowInternetCame2B.html |archive-date=September 26, 2017 |access-date=25 September 2017 |quote=We began doing concurrent implementations at Stanford, BBN, and University College London. So effort at developing the Internet protocols was international from the beginning.}}&lt;/ref&gt; The [[ARPANET]] initially served as a backbone for the interconnection of regional academic and military networks in the United States to enable [[resource sharing]]. The funding of the [[National Science Foundation Network]] as a new backbone in the 1980s, as well as private funding for other commercial extensions, encouraged worldwide participation in the development of new networking technologies and the merger of many networks using DARPA's [[Internet protocol suite]].&lt;ref&gt;{{cite web|url=http://www.livinginternet.com/i/ii_summary.htm|title=Internet History – One Page Summary|archive-url=https://web.archive.org/web/20140702210150/http://www.livinginternet.com/i/ii_summary.htm |archive-date=2 July 2014|website=The Living Internet|first=Bill|last=Stewart|date=January 2000}}&lt;/ref&gt; The linking of commercial networks and enterprises by the early 1990s, as well as the advent of the [[World Wide Web]],&lt;ref&gt;{{Cite book |title=The Desk Encyclopedia of World History |publisher=[[Oxford University Press]] |year=2006 |isbn=978-0-7394-7809-7 |editor-last=Wright |editor-first=Edmund |location=New York |page=312}}&lt;/ref&gt; marked the beginning of the transition to the modern Internet,&lt;ref&gt;"#3 1982: the ARPANET community grows" in [https://www.vox.com/a/internet-maps ''40 maps that explain the internet''] {{webarchive|url=https://web.archive.org/web/20170306161657/http://www.vox.com/a/internet-maps|date=6 March 2017}}, Timothy B. Lee, Vox Conversations, 2 June 2014. Retrieved 27 June 2014.&lt;/ref&gt; and generated sustained exponential growth as generations of institutional, [[personal computer|personal]], and [[mobile device|mobile]] [[computer]]s were connected to the <del style="font-weight: bold; text-decoration: none;">network</del>. Although the Internet was widely used by [[academia]] in the 1980s, the subsequent [[commercialization of the Internet<del style="font-weight: bold; text-decoration: none;">|commercialization</del>]] in the 1990s and beyond incorporated its services and technologies into virtually every aspect of modern life.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The origins of the Internet date back to research that enabled the [[time-sharing]] of computer resources, the development of [[packet switching]] in the 1960s and the design of [[Computer network]]<ins style="font-weight: bold; text-decoration: none;">s</ins> for [[data communication]].&lt;ref name="The Washington Post"&gt;{{Cite news|url=https://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/|title=A Flaw in the Design|date=30 May 2015|newspaper=The Washington Post|quote=The Internet was born of a big idea: Messages could be chopped into chunks, sent through a network in a series of transmissions, then reassembled by destination computers quickly and efficiently. Historians credit seminal insights to Welsh scientist Donald W. Davies and American engineer Paul Baran. ... The most important institutional force ... was the Pentagon's Advanced Research Projects Agency (ARPA) ... as ARPA began work on a groundbreaking computer network, the agency recruited scientists affiliated with the nation's top universities.|access-date=20 February 2020|archive-date=8 November 2020|archive-url=https://web.archive.org/web/20201108111512/https://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/|url-status=live}}&lt;/ref&gt;&lt;ref name=":6"&gt;{{Cite book |last=Yates |first=David M. |url=https://books.google.com/books?id=ToMfAQAAIAAJ&amp;q=packet+switch |title=Turing's Legacy: A History of Computing at the National Physical Laboratory 1945-1995 |date=1997 |publisher=National Museum of Science and Industry |isbn=978-0-901805-94-2 |pages=132–4 |language=en |quote=Davies's invention of packet switching and design of computer communication networks ... were a cornerstone of the development which led to the Internet}}&lt;/ref&gt; The set of rules ([[communication protocol]]s) to enable [[internetworking]] on the Internet arose from research and development commissioned in the 1970s by the [[Defense Advanced Research Projects Agency]] (DARPA) of the [[United States Department of Defense]] in collaboration with universities and researchers across the [[United States]] and in the [[United Kingdom]] and [[France]].&lt;ref name="Abbatep3"&gt;{{harvnb|Abbate|1999|p=[https://books.google.com/books?id=9BfZxFZpElwC&amp;pg=PA3 3] "The manager of the ARPANET project, Lawrence Roberts, assembled a large team of computer scientists ... and he drew on the ideas of network experimenters in the United States and the United Kingdom. Cerf and Kahn also enlisted the help of computer scientists from England, France and the United States"}}&lt;/ref&gt;&lt;ref&gt;{{cite web |date=27 October 2009 |title=The Computer History Museum, SRI International, and BBN Celebrate the 40th Anniversary of First ARPANET Transmission, Precursor to Today's Internet |url=https://www.sri.com/newsroom/press-releases/computer-history-museum-sri-international-and-bbn-celebrate-40th-anniversary |archive-url=https://web.archive.org/web/20190329134941/https://www.sri.com/newsroom/press-releases/computer-history-museum-sri-international-and-bbn-celebrate-40th-anniversary |archive-date=March 29, 2019 |access-date=25 September 2017 |publisher=SRI International |quote=But the ARPANET itself had now become an island, with no links to the other networks that had sprung up. By the early 1970s, researchers in France, the UK, and the U.S. began developing ways of connecting networks to each other, a process known as internetworking.}}&lt;/ref&gt;&lt;ref&gt;{{cite web |author1=by Vinton Cerf, as told to Bernard Aboba |date=1993 |title=How the Internet Came to Be |url=http://elk.informatik.hs-augsburg.de/tmp/cdrom-oss/CerfHowInternetCame2B.html |archive-url=https://web.archive.org/web/20170926042220/http://elk.informatik.hs-augsburg.de/tmp/cdrom-oss/CerfHowInternetCame2B.html |archive-date=September 26, 2017 |access-date=25 September 2017 |quote=We began doing concurrent implementations at Stanford, BBN, and University College London. So effort at developing the Internet protocols was international from the beginning.}}&lt;/ref&gt; The [[ARPANET]] initially served as a backbone for the interconnection of regional academic and military networks in the United States to enable [[resource sharing]]. The funding of the [[National Science Foundation Network]] as a new backbone in the 1980s, as well as private funding for other commercial extensions, encouraged worldwide participation in the development of new networking technologies and the merger of many networks using DARPA's [[Internet protocol suite]].&lt;ref&gt;{{cite web|url=http://www.livinginternet.com/i/ii_summary.htm|title=Internet History – One Page Summary|archive-url=https://web.archive.org/web/20140702210150/http://www.livinginternet.com/i/ii_summary.htm |archive-date=2 July 2014|website=The Living Internet|first=Bill|last=Stewart|date=January 2000}}&lt;/ref&gt; The linking of commercial networks and enterprises by the early 1990s, as well as the advent of the [[World Wide Web]],&lt;ref&gt;{{Cite book |title=The Desk Encyclopedia of World History |publisher=[[Oxford University Press]] |year=2006 |isbn=978-0-7394-7809-7 |editor-last=Wright |editor-first=Edmund |location=New York |page=312}}&lt;/ref&gt; marked the beginning of the transition to the modern Internet,&lt;ref&gt;"#3 1982: the ARPANET community grows" in [https://www.vox.com/a/internet-maps ''40 maps that explain the internet''] {{webarchive|url=https://web.archive.org/web/20170306161657/http://www.vox.com/a/internet-maps|date=6 March 2017}}, Timothy B. Lee, Vox Conversations, 2 June 2014. Retrieved 27 June 2014.&lt;/ref&gt; and generated sustained exponential growth as generations of institutional, [[personal computer|personal]], and [[mobile device|mobile]] [[computer]]s were connected to the <ins style="font-weight: bold; text-decoration: none;">internetwork</ins>. Although the Internet was widely used by [[academia]] in the 1980s, the subsequent [[commercialization of the Internet]] in the 1990s and beyond incorporated its services and technologies into virtually every aspect of modern life.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Most traditional communication media, including [[telephone]], [[radio]], [[television]], paper mail, and newspapers, are reshaped, redefined, or even bypassed by the Internet, giving birth to new services such as [[email]], [[Internet telephone]], [[Internet television]], [[online music]], digital newspapers, and [[video streaming]] websites. Newspapers, books, and other print publishing have adapted to [[Web site|website]] technology or have been reshaped into [[blogging]], [[web feed]]s, and online [[news aggregator]]s. The Internet has enabled and accelerated new forms of personal interaction through [[instant messaging]], [[Internet forum]]s, and [[social networking service]]s. [[Online shopping]] has grown exponentially for major retailers, [[small business]]es, and [[entrepreneur]]s, as it enables firms to extend their "[[brick and mortar]]" presence to serve a larger market or even [[Online store|sell goods and services entirely online]]. [[Business-to-business]] and [[financial services]] on the Internet affect [[supply chain]]s across entire industries.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Most traditional communication media, including [[telephone]], [[radio]], [[television]], paper mail, and newspapers, are reshaped, redefined, or even bypassed by the Internet, giving birth to new services such as [[email]], [[Internet telephone]], [[Internet television]], [[online music]], digital newspapers, and [[video streaming]] websites. Newspapers, books, and other print publishing have adapted to [[Web site|website]] technology or have been reshaped into [[blogging]], [[web feed]]s, and online [[news aggregator]]s. The Internet has enabled and accelerated new forms of personal interaction through [[instant messaging]], [[Internet forum]]s, and [[social networking service]]s. [[Online shopping]] has grown exponentially for major retailers, [[small business]]es, and [[entrepreneur]]s, as it enables firms to extend their "[[brick and mortar]]" presence to serve a larger market or even [[Online store|sell goods and services entirely online]]. [[Business-to-business]] and [[financial services]] on the Internet affect [[supply chain]]s across entire industries.</div></td> </tr> </table> Finell https://en.wikipedia.org/w/index.php?title=Internet&diff=1259208551&oldid=prev Achmad Rachmani: /* History */ Altered authors 1-2. Added author links 1-2. 2024-11-23T23:29:14Z <p><span class="autocomment">History: </span> Altered authors 1-2. Added author links 1-2.</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 23:29, 23 November 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 50:</td> <td colspan="2" class="diff-lineno">Line 50:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>As technology advanced and commercial opportunities fueled reciprocal growth, the volume of [[Internet traffic]] started experiencing similar characteristics as that of the scaling of [[MOS transistor]]s, exemplified by [[Moore's law]], doubling every 18 months. This growth, formalized as [[Edholm's law]], was catalyzed by advances in [[MOS technology]], [[laser]] light wave systems, and [[Noise (signal processing)|noise]] performance.&lt;ref name="Jindal"&gt;{{cite book |last1=Jindal |first1=R. P. |title=2009 2nd International Workshop on Electron Devices and Semiconductor Technology |chapter=From millibits to terabits per second and beyond - over 60 years of innovation |s2cid=25112828 |year=2009 |volume=49 |pages=1–6 |doi=10.1109/EDST.2009.5166093 |chapter-url=https://events.vtools.ieee.org/m/195547 |isbn=978-1-4244-3831-0 |access-date=24 August 2019 |archive-url=https://web.archive.org/web/20190823230141/https://events.vtools.ieee.org/m/195547 |archive-date=23 August 2019 }}&lt;/ref&gt;</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>As technology advanced and commercial opportunities fueled reciprocal growth, the volume of [[Internet traffic]] started experiencing similar characteristics as that of the scaling of [[MOS transistor]]s, exemplified by [[Moore's law]], doubling every 18 months. This growth, formalized as [[Edholm's law]], was catalyzed by advances in [[MOS technology]], [[laser]] light wave systems, and [[Noise (signal processing)|noise]] performance.&lt;ref name="Jindal"&gt;{{cite book |last1=Jindal |first1=R. P. |title=2009 2nd International Workshop on Electron Devices and Semiconductor Technology |chapter=From millibits to terabits per second and beyond - over 60 years of innovation |s2cid=25112828 |year=2009 |volume=49 |pages=1–6 |doi=10.1109/EDST.2009.5166093 |chapter-url=https://events.vtools.ieee.org/m/195547 |isbn=978-1-4244-3831-0 |access-date=24 August 2019 |archive-url=https://web.archive.org/web/20190823230141/https://events.vtools.ieee.org/m/195547 |archive-date=23 August 2019 }}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Since 1995, the Internet has tremendously impacted culture and commerce, including the rise of near-instant communication by email, [[instant messaging]], telephony ([[Voice over Internet Protocol]] or VoIP), [[Video chat|two-way interactive video calls]], and the World Wide Web&lt;ref&gt;{{cite news|url=http://news.bbc.co.uk/2/hi/science/nature/5242252.stm|title=How the web went world wide|archive-url=https://web.archive.org/web/20111121092636/http://news.bbc.co.uk/2/hi/science/nature/5242252.stm |archive-date=21 November 2011|first=Mark|last=Ward|website=Technology Correspondent|date=3 August 2006|publisher=BBC News|access-date=24 January 2011}}&lt;/ref&gt; with its [[discussion forums]], blogs, [[social networking service]]s, and [[online shopping]] sites. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1&amp;nbsp;Gbit/s, 10&amp;nbsp;Gbit/s, or more. The Internet continues to grow, driven by ever-greater amounts of online information and knowledge, commerce, entertainment and social networking services.&lt;ref&gt;{{cite web|url=http://clickz.com/showPage.html?page=3626274 |archive-url=https://web.archive.org/web/20081004000237/http://www.clickz.com/showPage.html?page=3626274|title=Brazil, Russia, India and China to Lead Internet Growth Through 2011 |publisher=Clickz.com |access-date=28 May 2009|archive-date=4 October 2008}}&lt;/ref&gt; During the late 1990s, it was estimated that traffic on the public Internet grew by 100 percent per year, while the mean annual growth in the number of Internet users was thought to be between 20% and 50%.&lt;ref&gt;{{cite web |url=http://www.dtc.umn.edu/~odlyzko/doc/internet.size.pdf |title=The size and growth rate of the Internet |access-date=21 May 2007 |author1=Coffman, K.G |author2=<del style="font-weight: bold; text-decoration: none;">[[</del>Odlyzko<del style="font-weight: bold; text-decoration: none;">]]</del>, A.M. |publisher=AT&amp;T Labs |date=2 October 1998 |archive-url=https://web.archive.org/web/20070614012344/http://www.dtc.umn.edu/~odlyzko/doc/internet.size.pdf |archive-date=14 June 2007 }}&lt;/ref&gt; This growth is often attributed to the lack of central administration, which allows organic growth of the network, as well as the non-proprietary nature of the Internet protocols, which encourages vendor interoperability and prevents any one company from exerting too much control over the network.&lt;ref&gt;{{cite book | last = Comer | first = Douglas | title = The Internet book | publisher = Prentice Hall | page = [https://archive.org/details/internetbookever00come_0/page/64 64] | isbn = 978-0-13-233553-9 | year = 2006 | url-access = registration | url = https://archive.org/details/internetbookever00come_0/page/64 }}&lt;/ref&gt; {{as of|2011|March|31}}, the estimated total number of Internet users was 2.095&amp;nbsp;billion (30% of [[world population]]).&lt;ref name="stats1"&gt;{{cite web|url=http://www.internetworldstats.com/stats.htm|title=World Internet Users and Population Stats|date=22 June 2011|work=Internet World Stats|publisher=Miniwatts Marketing Group|archive-url=https://web.archive.org/web/20110623200007/http://www.internetworldstats.com/stats.htm|archive-date=23 June 2011|access-date=23 June 2011}}&lt;!-- previous cite {{cite web|url=http://www.50x15.com/en-us/internet_usage.aspx |title=AMD 50x15 – World Internet Usage |publisher=50x15.com |access-date=6 November 2009 |archive-url=https://web.archive.org/web/20090831063352/http://www.50x15.com/en-us/internet_usage.aspx |archive-date=31 August 2009 |df= }} --&gt;&lt;/ref&gt; It is estimated that in 1993 the Internet carried only 1% of the information flowing through two-way [[telecommunication]]. By 2000 this figure had grown to 51%, and by 2007 more than 97% of all telecommunicated information was carried over the Internet.&lt;ref&gt;{{cite journal|title=The World's Technological Capacity to Store, Communicate, and Compute Information |first1=Martin |last1=Hilbert |first2=Priscila |last2=López |s2cid=206531385 |date=April 2011 |journal=[[Science (journal)|Science]] |volume=332 |pages=60–65 |doi=10.1126/science.1200970 |issue=6025 |bibcode=2011Sci...332...60H |pmid=21310967 |doi-access=free }}&lt;/ref&gt;</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Since 1995, the Internet has tremendously impacted culture and commerce, including the rise of near-instant communication by email, [[instant messaging]], telephony ([[Voice over Internet Protocol]] or VoIP), [[Video chat|two-way interactive video calls]], and the World Wide Web&lt;ref&gt;{{cite news|url=http://news.bbc.co.uk/2/hi/science/nature/5242252.stm|title=How the web went world wide|archive-url=https://web.archive.org/web/20111121092636/http://news.bbc.co.uk/2/hi/science/nature/5242252.stm |archive-date=21 November 2011|first=Mark|last=Ward|website=Technology Correspondent|date=3 August 2006|publisher=BBC News|access-date=24 January 2011}}&lt;/ref&gt; with its [[discussion forums]], blogs, [[social networking service]]s, and [[online shopping]] sites. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1&amp;nbsp;Gbit/s, 10&amp;nbsp;Gbit/s, or more. The Internet continues to grow, driven by ever-greater amounts of online information and knowledge, commerce, entertainment and social networking services.&lt;ref&gt;{{cite web|url=http://clickz.com/showPage.html?page=3626274 |archive-url=https://web.archive.org/web/20081004000237/http://www.clickz.com/showPage.html?page=3626274|title=Brazil, Russia, India and China to Lead Internet Growth Through 2011 |publisher=Clickz.com |access-date=28 May 2009|archive-date=4 October 2008}}&lt;/ref&gt; During the late 1990s, it was estimated that traffic on the public Internet grew by 100 percent per year, while the mean annual growth in the number of Internet users was thought to be between 20% and 50%.&lt;ref&gt;{{cite web |url=http://www.dtc.umn.edu/~odlyzko/doc/internet.size.pdf |title=The size and growth rate of the Internet |access-date=21 May 2007 |author1=Coffman, K.G |author2=Odlyzko, A.M.<ins style="font-weight: bold; text-decoration: none;"> |author-link2=Andrew Odlyzko</ins> |publisher=AT&amp;T Labs |date=2 October 1998 |archive-url=https://web.archive.org/web/20070614012344/http://www.dtc.umn.edu/~odlyzko/doc/internet.size.pdf |archive-date=14 June 2007 }}&lt;/ref&gt; This growth is often attributed to the lack of central administration, which allows organic growth of the network, as well as the non-proprietary nature of the Internet protocols, which encourages vendor interoperability and prevents any one company from exerting too much control over the network.&lt;ref&gt;{{cite book | last = Comer | first = Douglas | title = The Internet book | publisher = Prentice Hall | page = [https://archive.org/details/internetbookever00come_0/page/64 64] | isbn = 978-0-13-233553-9 | year = 2006 | url-access = registration | url = https://archive.org/details/internetbookever00come_0/page/64 }}&lt;/ref&gt; {{as of|2011|March|31}}, the estimated total number of Internet users was 2.095&amp;nbsp;billion (30% of [[world population]]).&lt;ref name="stats1"&gt;{{cite web|url=http://www.internetworldstats.com/stats.htm|title=World Internet Users and Population Stats|date=22 June 2011|work=Internet World Stats|publisher=Miniwatts Marketing Group|archive-url=https://web.archive.org/web/20110623200007/http://www.internetworldstats.com/stats.htm|archive-date=23 June 2011|access-date=23 June 2011}}&lt;!-- previous cite {{cite web|url=http://www.50x15.com/en-us/internet_usage.aspx |title=AMD 50x15 – World Internet Usage |publisher=50x15.com |access-date=6 November 2009 |archive-url=https://web.archive.org/web/20090831063352/http://www.50x15.com/en-us/internet_usage.aspx |archive-date=31 August 2009 |df= }} --&gt;&lt;/ref&gt; It is estimated that in 1993 the Internet carried only 1% of the information flowing through two-way [[telecommunication]]. By 2000 this figure had grown to 51%, and by 2007 more than 97% of all telecommunicated information was carried over the Internet.&lt;ref&gt;{{cite journal|title=The World's Technological Capacity to Store, Communicate, and Compute Information |first1=Martin |last1=Hilbert |first2=Priscila |last2=López |s2cid=206531385 |date=April 2011 |journal=[[Science (journal)|Science]] |volume=332 |pages=60–65 |doi=10.1126/science.1200970 |issue=6025 |bibcode=2011Sci...332...60H |pmid=21310967 |doi-access=free }}&lt;/ref&gt;</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Governance ==</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Governance ==</div></td> </tr> </table> Achmad Rachmani https://en.wikipedia.org/w/index.php?title=Internet&diff=1259004970&oldid=prev Tenebre Rosso Sangue: ¨updatable¨ isnt proper 2024-11-22T21:29:48Z <p>¨updatable¨ isnt proper</p> <table style="background-color: #fff; color: #202122;" data-mw="interface"> <col class="diff-marker" /> <col class="diff-content" /> <col class="diff-marker" /> <col class="diff-content" /> <tr class="diff-title" lang="en"> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Previous revision</td> <td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 21:29, 22 November 2024</td> </tr><tr> <td colspan="2" class="diff-lineno">Line 65:</td> <td colspan="2" class="diff-lineno">Line 65:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>{{See also|List of countries by number of Internet users|List of countries by Internet connection speeds}}</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>{{See also|List of countries by number of Internet users|List of countries by Internet connection speeds}}</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>[[File:World map of submarine cables.png|thumb|2007 map showing submarine fiberoptic telecommunication cables around the world]]</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>[[File:World map of submarine cables.png|thumb|2007 map showing submarine fiberoptic telecommunication cables around the world]]</div></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The communications infrastructure of the Internet consists of its hardware components and a system of software layers that control various aspects of the architecture. As with any computer network, the Internet physically consists of [[router (computing)|router]]s, media (such as cabling and radio links), repeaters, modems etc. However, as an example of [[internetworking]], many of the network nodes are not necessarily Internet equipment per se.<del style="font-weight: bold; text-decoration: none;"> </del> The internet packets are carried by other full-fledged networking protocols with the Internet acting as a homogeneous networking standard, running across [[heterogeneous]] hardware, with the packets guided to their destinations by IP routers.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The communications infrastructure of the Internet consists of its hardware components and a system of software layers that control various aspects of the architecture. As with any computer network, the Internet physically consists of [[router (computing)|router]]s, media (such as cabling and radio links), repeaters, modems etc. However, as an example of [[internetworking]], many of the network nodes are not necessarily Internet equipment per se. The internet packets are carried by other full-fledged networking protocols with the Internet acting as a homogeneous networking standard, running across [[heterogeneous]] hardware, with the packets guided to their destinations by IP routers.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>=== Service tiers ===</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>=== Service tiers ===</div></td> </tr> <tr> <td colspan="2" class="diff-lineno">Line 143:</td> <td colspan="2" class="diff-lineno">Line 143:</td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>World Wide Web browser software, such as [[Microsoft]]'s [[Internet Explorer]]/[[Microsoft Edge|Edge]], [[Mozilla Firefox]], [[Opera (web browser)|Opera]], [[Apple Inc.|Apple]]'s [[Safari (web browser)|Safari]], and [[Google Chrome]], enable users to navigate from one web page to another via the hyperlinks embedded in the documents. These documents may also contain any combination of [[computer data]], including graphics, sounds, [[Plain text|text]], [[web video|video]], [[multimedia]] and interactive content that runs while the user is interacting with the page. [[Client-side scripting|Client-side software]] can include animations, [[web game|games]], [[office applications]] and scientific demonstrations. Through [[keyword (Internet search)|keyword]]-driven [[Internet research]] using [[Web search engine|search engines]] like [[Yahoo! Search|Yahoo!]], [[Bing (search engine)|Bing]] and [[Google Search|Google]], users worldwide have easy, instant access to a vast and diverse amount of online information. Compared to printed media, books, encyclopedias and traditional libraries, the World Wide Web has enabled the decentralization of information on a large scale.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>World Wide Web browser software, such as [[Microsoft]]'s [[Internet Explorer]]/[[Microsoft Edge|Edge]], [[Mozilla Firefox]], [[Opera (web browser)|Opera]], [[Apple Inc.|Apple]]'s [[Safari (web browser)|Safari]], and [[Google Chrome]], enable users to navigate from one web page to another via the hyperlinks embedded in the documents. These documents may also contain any combination of [[computer data]], including graphics, sounds, [[Plain text|text]], [[web video|video]], [[multimedia]] and interactive content that runs while the user is interacting with the page. [[Client-side scripting|Client-side software]] can include animations, [[web game|games]], [[office applications]] and scientific demonstrations. Through [[keyword (Internet search)|keyword]]-driven [[Internet research]] using [[Web search engine|search engines]] like [[Yahoo! Search|Yahoo!]], [[Bing (search engine)|Bing]] and [[Google Search|Google]], users worldwide have easy, instant access to a vast and diverse amount of online information. Compared to printed media, books, encyclopedias and traditional libraries, the World Wide Web has enabled the decentralization of information on a large scale.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker" data-marker="−"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The Web has enabled individuals and organizations to [[publish]] ideas and information to a potentially large [[audience]] online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial [[cost]] and many cost-free services are available. However, publishing and maintaining large, professional web sites with attractive, diverse and up-to-date information is still a difficult and expensive proposition. Many individuals and some companies and groups use ''web logs'' or blogs, which are largely used as easily <del style="font-weight: bold; text-decoration: none;">updatable</del> online diaries. Some commercial organizations encourage [[employees|staff]] to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information and be attracted to the corporation as a result.</div></td> <td class="diff-marker" data-marker="+"></td> <td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The Web has enabled individuals and organizations to [[publish]] ideas and information to a potentially large [[audience]] online at greatly reduced expense and time delay. Publishing a web page, a blog, or building a website involves little initial [[cost]] and many cost-free services are available. However, publishing and maintaining large, professional web sites with attractive, diverse and up-to-date information is still a difficult and expensive proposition. Many individuals and some companies and groups use ''web logs'' or blogs, which are largely used as easily <ins style="font-weight: bold; text-decoration: none;">being able to update</ins> online diaries. Some commercial organizations encourage [[employees|staff]] to communicate advice in their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information and be attracted to the corporation as a result.</div></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br /></td> </tr> <tr> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>[[Online advertising|Advertising]] on popular web pages can be lucrative, and [[e-commerce]], which is the sale of products and services directly via the Web, continues to grow. Online advertising is a form of [[marketing]] and advertising which uses the Internet to deliver [[promotion (marketing)|promotional]] marketing messages to consumers. It includes email marketing, [[search engine marketing]] (SEM), social media marketing, many types of [[display advertising]] (including [[web banner]] advertising), and [[mobile advertising]]. In 2011, Internet advertising revenues in the United States surpassed those of [[cable television]] and nearly exceeded those of [[broadcast television]].&lt;ref name="IAB2012"&gt;{{cite web |url = http://www.iab.net/media/file/IAB_Internet_Advertising_Revenue_Report_FY_2012_rev.pdf |title = IAB Internet advertising revenue report: 2012 full year results |date = April 2013 |publisher = PricewaterhouseCoopers, Internet Advertising Bureau |access-date = 12 June 2013 |archive-url = https://web.archive.org/web/20141004001439/http://www.iab.net/media/file/IAB_Internet_Advertising_Revenue_Report_FY_2012_rev.pdf |archive-date = 4 October 2014 }}&lt;/ref&gt;{{rp|19}} Many common online advertising practices are controversial and increasingly subject to regulation.</div></td> <td class="diff-marker"></td> <td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>[[Online advertising|Advertising]] on popular web pages can be lucrative, and [[e-commerce]], which is the sale of products and services directly via the Web, continues to grow. Online advertising is a form of [[marketing]] and advertising which uses the Internet to deliver [[promotion (marketing)|promotional]] marketing messages to consumers. It includes email marketing, [[search engine marketing]] (SEM), social media marketing, many types of [[display advertising]] (including [[web banner]] advertising), and [[mobile advertising]]. In 2011, Internet advertising revenues in the United States surpassed those of [[cable television]] and nearly exceeded those of [[broadcast television]].&lt;ref name="IAB2012"&gt;{{cite web |url = http://www.iab.net/media/file/IAB_Internet_Advertising_Revenue_Report_FY_2012_rev.pdf |title = IAB Internet advertising revenue report: 2012 full year results |date = April 2013 |publisher = PricewaterhouseCoopers, Internet Advertising Bureau |access-date = 12 June 2013 |archive-url = https://web.archive.org/web/20141004001439/http://www.iab.net/media/file/IAB_Internet_Advertising_Revenue_Report_FY_2012_rev.pdf |archive-date = 4 October 2014 }}&lt;/ref&gt;{{rp|19}} Many common online advertising practices are controversial and increasingly subject to regulation.</div></td> </tr> </table> Tenebre Rosso Sangue