- published: 24 Aug 2013
- views: 0
2:39
![](http://web.archive.org./web/20130911102506im_/http://i1.ytimg.com/vi/rZAD1_ndmlU/default.jpg)
Network News Transfer Protocol[Wikipedia article]
The Network News Transfer Protocol is an application protocol used for transporting Usene...
published: 24 Aug 2013
Network News Transfer Protocol[Wikipedia article]
The Network News Transfer Protocol is an application protocol used for transporting Usenet news articles between news servers and for reading and posting articles by end user client applications. Brian Kantor of the University of California, San Diego and Phil Lapsley of the University of California, Berkeley authored RFC 977, the specification for the Network News Transfer Protocol, in March 1986. Other contributors included Stan O. Barber from the Baylor College of Medicine and Erik Fair of Apple Computer.
Usenet was originally designed based on the UUCP network, with most article transfers taking place over direct point-to-point telephone links between news servers, which were powerful time-sharing systems. Readers and posters logged into these computers reading the articles directly from the local disk.
As local area networks and Internet participation proliferated, it became desirable to allow newsreaders to be run on personal computers connected to local networks. Because distributed file systems were not yet widely available, a new protocol was developed based on the client-server model. It resembled the Simple Mail Transfer Protocol (SMTP), but was tailored for exchanging newsgroup articles.
A newsreader, also known as a news client, is a software application that reads articles on Usenet, either directly from the news server's disks or via the NNTP.
The well-known TCP port 119 is reserved for NNTP. When clients connect to a news server with Transport Layer Security (TLS), TCP port 563 is used. This is sometimes referred to as NNTPS.
In October 2006, the IETF released RFC 3977 which updates the NNTP protocol and codifies many of the additions made over the years since RFC 977.
Network News Reader Protocol
During an abortive attempt to update the NNTP standard in the early 1990s, a specialized form of NNTP intended specifically for use by clients, NNRP, was proposed. This protocol was never completed or fully implemented, but the name persisted in InterNetNews's (INN) nnrpd program. As a result, the subset of standard NNTP commands useful to clients is sometimes still referred to as "NNRP".This is a synthesized speech reading of the Wikipedia article "Network News Transfer Protocol" and is intended primarily for blind and visually impaired individuals who can not view Wikipedia. This video can also be used for mobile users who wish to listen to Wikipedia articles on the go, or by those who wish to learn a second language by reading the captions in that language while listening in English.
Original article available at http://en.wikipedia.org/wiki/Network_News_Transfer_Protocol
All text from Wikipedia is licensed under CC-BY-SA:
https://en.wikipedia.org/wiki/Wikipedia:Reusing_Wikipedia_content
"You are free ... to make commercial use of the work":
http://creativecommons.org/licenses/by-sa/3.0/
Text-to-speech synthesized from FestVox, which permits commercial use:
"no restrictions on its use (commercial or otherwise)"
http://festvox.org/festival/downloads.html
Note: all these licenses permit commercial use, and therefore we are permitted to monetize videos derived from these contents.
- published: 24 Aug 2013
- views: 0
17:49
![](http://web.archive.org./web/20130911102506im_/http://i.ytimg.com/vi/8AgQHniArZE/default.jpg)
Load balancing (computing) - Wiki Article
Load balancing is a computer networking method for distributing workloads across multiple ...
published: 19 May 2013
author: wikispeak10
Load balancing (computing) - Wiki Article
Load balancing is a computer networking method for distributing workloads across multiple computers or a computer cluster, network links, central processing ...
- published: 19 May 2013
- views: 69
- author: wikispeak10
5:32
![](http://web.archive.org./web/20130911102506im_/http://i.ytimg.com/vi/og03M3iId7o/default.jpg)
'Regime' by File Transfer Protocol
If only you had cared where we were going to You might have seen the fact that they were s...
published: 03 Jan 2012
author: FILETRANSF3RPROTOCOL
'Regime' by File Transfer Protocol
If only you had cared where we were going to You might have seen the fact that they were snowing you And while you were steeped in your distraction There wer...
- published: 03 Jan 2012
- views: 331
- author: FILETRANSF3RPROTOCOL
2:47
![](http://web.archive.org./web/20130911102506im_/http://i1.ytimg.com/vi/zFjmj0kDgBo/default.jpg)
Network model[Wikipedia article]
The network model is a database model conceived as a flexible way of representing objects ...
published: 25 Aug 2013
Network model[Wikipedia article]
The network model is a database model conceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, is not restricted to being a hierarchy or lattice.
Overview
While the hierarchical database model structures data as a tree of records, with each record having one parent record and many children, the network model allows each record to have multiple parent and child records, forming a generalized graph structure. This property applies at two levels: the schema is a generalized graph of record types connected by relationship types (called "set types" in CODASYL), and the database itself is a generalized graph of record occurrences connected by relationships (CODASYL "sets"). Cycles are permitted at both levels. The chief argument in favour of the network model, in comparison to the hierarchic model, was that it allowed a more natural modeling of relationships between entities. Although the model was widely implemented and used, it failed to become dominant for two main reasons. Firstly, IBM chose to stick to the hierarchical model with semi-network extensions in their established products such as IMS and DL/I. Secondly, it was eventually displaced by the relational model, which offered a higher-level, more declarative interface. Until the early 1980s the performance benefits of the low-level navigational interfaces offered by hierarchical and network databases were persuasive for many large-scale applications, but as hardware became faster, the extra productivity and flexibility of the relational model led to the gradual obsolescence of the network model in corporate enterprise usage.
Database systems
Some well-known database systems that use the network model include:
Integrated Data Store (IDS)
IDMS (Integrated Database Management System)
RDM Embedded
RDM Server
TurboIMAGE
Univac DMS-1100
History
The network model's original inventor was Charles Bachman, and it was developed into a standard specification published in 1969 by the Conference on Data Systems Languages (CODASYL) Consortium. This was followed by a second publication in 1971, which became the basis for most implementations. Subsequent work continued into the early 1980s, culminating in an ISO specification, but this had little influence on products.
Image source and licensing details: http://wikipedia.org/wiki/File:Network_Model.svgThis is a synthesized speech reading of the Wikipedia article "Network model" and is intended primarily for blind and visually impaired individuals who can not view Wikipedia. This video can also be used for mobile users who wish to listen to Wikipedia articles on the go, or by those who wish to learn a second language by reading the captions in that language while listening in English.
Original article available at http://en.wikipedia.org/wiki/Network_model
All text from Wikipedia is licensed under CC-BY-SA:
https://en.wikipedia.org/wiki/Wikipedia:Reusing_Wikipedia_content
"You are free ... to make commercial use of the work":
http://creativecommons.org/licenses/by-sa/3.0/
Text-to-speech synthesized from FestVox, which permits commercial use:
"no restrictions on its use (commercial or otherwise)"
http://festvox.org/festival/downloads.html
Original article available at http://en.wikipedia.org/wiki/Network_model
Note: all these licenses permit commercial use, and therefore we are permitted to monetize videos derived from these contents.
- published: 25 Aug 2013
- views: 0
4:38
![](http://web.archive.org./web/20130911102506im_/http://i1.ytimg.com/vi/0Prg8veCwCM/default.jpg)
Technology transfer[Wikipedia article]
Technology Transfer, also called Transfer of Technology and Technology Commercialisation,...
published: 25 Aug 2013
Technology transfer[Wikipedia article]
Technology Transfer, also called Transfer of Technology and Technology Commercialisation, is the process of transferring skills, knowledge, technologies, methods of manufacturing, samples of manufacturing and facilities among governments or universities and other institutions to ensure that scientific and technological developments are accessible to a wider range of users who can then further develop and exploit the technology into new products, processes, applications, materials or services. It is closely related to knowledge transfer.
Some also consider technology transfer as a process of moving promising research topics into a level of maturity ready for bulk manufacturing or production.
Technology brokers are people who discovered how to bridge the disparate worlds and apply scientific concepts or processes to new situations or circumstances. A related term, used almost synonymously, is "technology valorisation". While conceptually the practice has been utilized for many years (in ancient times, Archimedes was notable for applying science to practical problems), the present-day volume of research, combined with high-profile failures at Xerox PARC and elsewhere, has led to a focus on the process itself.
Transfer process
Many companies, universities and governmental organizations now have an Office of Technology Transfer (TTO, also known as "Tech Transfer" or "TechXfer") dedicated to identifying research which has potential commercial interest and strategies for how to exploit it. For instance, a research result may be of scientific and commercial interest, but patents are normally only issued for practical processes, and so someone—not necessarily the researchers—must come up with a specific practical process. Another consideration is commercial value; for example, while there are many ways to accomplish nuclear fusion, the ones of commercial value are those that generate more energy than they require to operate.
The process to commercially exploit research varies widely. It can involve licensing agreements or setting up joint ventures and partnerships to share both the risks and rewards of bringing new technologies to market. Other corporate vehicles, e.g. spin-outs, are used where the host organization does not have the necessary will, resources or skills to develop a new technology. Often these approaches are associated with raising of venture capital (VC) as a means of funding the development process, a practice more common in the United States than in the European Union, which has a more conservative approach to VC funding. Research spin-off companies are a popular vehicle of commercialisation in Canada, where the rate of licensing of Canadian university research remains far below that of the US.
Technology transfer offices may work on behalf of research institutions, governments and even large multinationals. Where start-ups and spin-outs are the clients, commercial fees are sometimes waived in lieu of an equity stake in the business. As a result of the potential complexity of the technology transfer process, technology transfer organizations are often multidisciplinary, including economists, engineers, lawyers, marketers and scientists. The dynamics of the technology transfer process has attracted attention in its own right, and there are several dedicated societies and journals.
There has been a marked increase in technology transfer intermediaries specialized in their field since 1980, stimulated in large part by the Bayh-Dole Act and equivalent legislation in other countries, which provided additional incentives for research exploitation.
Drawbacks
Despite incentives to move research into production, the practical aspects are sometimes difficult to perform in practice. Using DoD Technology Readiness Levels as a criterion (for example), Research tends to focus on TRL 1-3, while readiness for production tends to focus on TRL 6-7 or higher. Bridging TRL-3 to TRL-6 has proven to be difficult in some organizThis is a synthesized speech reading of the Wikipedia article "Technology transfer" and is intended primarily for blind and visually impaired individuals who can not view Wikipedia. This video can also be used for mobile users who wish to listen to Wikipedia articles on the go, or by those who wish to learn a second language by reading the captions in that language while listening in English.
Original article available at http://en.wikipedia.org/wiki/Technology_transfer
All text from Wikipedia is licensed under CC-BY-SA:
https://en.wikipedia.org/wiki/Wikipedia:Reusing_Wikipedia_content
"You are free ... to make commercial use of the work":
http://creativecommons.org/licenses/by-sa/3.0/
Text-to-speech synthesized from FestVox, which permits commercial use:
"no restrictions on its use (commercial or otherwise)"
http://festvox.org/festival/downloads.html
Note: all these licenses permit commercial use, and therefore we are permitted to monetize videos derived from these contents.
- published: 25 Aug 2013
- views: 1
7:33
![](http://web.archive.org./web/20130911102506im_/http://i1.ytimg.com/vi/8ReKe0syEAo/default.jpg)
file URI scheme[Wikipedia article]
The file URI scheme is a URI scheme specified in RFC 1630 and RFC 1738, typically used to ...
published: 25 Aug 2013
file URI scheme[Wikipedia article]
The file URI scheme is a URI scheme specified in RFC 1630 and RFC 1738, typically used to retrieve files from within one's own computer.
Format
A file URL takes the form of
where host is the fully qualified domain name of the system on which the path is accessible, and path is a hierarchical directory path of the form directory/directory/.../name. If host is omitted, it is taken to be "localhost", the machine from which the URL is being interpreted. Note that when omitting host you do not omit the slash ("file:///foo.txt" is okay, while "file://foo.txt" is not, although some interpreters manage to handle the latter).
Meaning of slash character
The slash character (/), depending on its position, has different meanings within a file URL.
The // after the file: is part of the general syntax of URLs. (The double slash // should always appear in a file URL according to the specification, but in practice many Web browsers allow you to omit it)
The single slash between host and path is part of the syntax of URLs.
And the slashes in path separate directory names in a hierarchical system of directories and subdirectories. In this usage, the slash is a general, system-independent way of separating the parts, and in a particular host system it might be used as such in any pathname (as in Unix systems).
Examples
Unix
Here are two Unix examples pointing to the same /etc/fstab file:
Windows
Here are some examples which may be accepted by some applications on Windows systems, referring to the same, local file c:\WINDOWS\clock.avi
Here is the URI as understood by the Windows Shell API:
Things to consider
Windows
On Microsoft Windows systems, the normal colon (:) after a device letter has sometimes been replaced by a vertical bar (|) in file URLs. This reflected the original URL syntax, which made the colon a reserved character in a path part.
Since Internet Explorer 4, file URIs have been standardized on Windows, and should follow the following scheme. This applies to all applications which use URLMON or SHLWAPI for parsing, fetching or binding to URIs. To convert a path to a URL, use UrlCreateFromPath, and to convert a URL to a path, use PathCreateFromUrl.
To access a file "the file.txt", the following might be used.
For a network location:
Or for a local file, the hostname is omitted, but the slash is not (note the third slash):
This is not the same as providing the string "localhost" or the dot "." in place of the hostname. The string "localhost" will attempt to access the file as \localhost\c:\path o he file.txt, which will not work since the colon is not allowed in a share name. The dot "." results in the string being passed as \.\c:\path o he file.txt, which will work for local files, but not shares on the local system. For example file://./sharename/path/to/the%20file.txt will not work, because it will result in sharename being interpreted as part of the DOSDEVICES namespace, not as a network share.
The following outline roughly describes the requirements.
The colon should be used, and should not be replaced with a vertical bar for Internet Explorer.
Forward slashes should be used to delimit paths. note that while DOS requires backslashes, the Win32 API will accept either a forward or back slash.
Characters such as the hash (#) or question mark (?) which are part of the filename should be percent-encoded.
Characters which are not allowed in URIs, but which are allowed in filenames, must also be percent-encoded. For example, any of "{}`^ " and all control characters. In the example above, the space in the filename is encoded as %20.
Characters which are allowed in both URIs and filenames must NOT be percent-encoded.
Must not use legacy ACP encodings. (ACP code pages are specified by DOS CHCP or Windows Control Panel language setting.)
Unicode characters outside of the ASCII range must be UTF-8 encoded, and those UTF-8 encodings must be percent-encoded.
Use the provided functions if you can. If you muThis is a synthesized speech reading of the Wikipedia article "file URI scheme" and is intended primarily for blind and visually impaired individuals who can not view Wikipedia. This video can also be used for mobile users who wish to listen to Wikipedia articles on the go, or by those who wish to learn a second language by reading the captions in that language while listening in English.
Original article available at http://en.wikipedia.org/wiki/File_URI_scheme
All text from Wikipedia is licensed under CC-BY-SA:
https://en.wikipedia.org/wiki/Wikipedia:Reusing_Wikipedia_content
"You are free ... to make commercial use of the work":
http://creativecommons.org/licenses/by-sa/3.0/
Text-to-speech synthesized from FestVox, which permits commercial use:
"no restrictions on its use (commercial or otherwise)"
http://festvox.org/festival/downloads.html
Note: all these licenses permit commercial use, and therefore we are permitted to monetize videos derived from these contents.
- published: 25 Aug 2013
- views: 0
11:17
![](http://web.archive.org./web/20130911102506im_/http://i1.ytimg.com/vi/m1LrG-tu8as/default.jpg)
Time-sharing[Wikipedia article]
In computing, time-sharing is the sharing of a computing resource among many users by mean...
published: 24 Aug 2013
Time-sharing[Wikipedia article]
In computing, time-sharing is the sharing of a computing resource among many users by means of multiprogramming and multi-tasking. Its introduction in the 1960s, and emergence as the prominent model of computing in the 1970s, represents a major technological shift in the history of computing.
By allowing a large number of users to interact concurrently with a single computer, time-sharing dramatically lowered the cost of providing computing capability, made it possible for individuals and organizations to use a computer without owning one, and promoted the interactive use of computers and the development of new interactive applications.
History
Batch processing
The earliest computers were extremely expensive devices, and very slow. Machines were typically dedicated to a particular set of tasks and operated by control panels, the operator manually entering small programs via switches in order to load and run a series of programs. These programs might take hours, or even weeks, to run. As computers grew in speed, run times dropped, and soon the time taken to start up the next program became a concern. Batch processing methodologies evolved to decrease these "dead periods" by queuing up programs so that as soon as one program completed, the next would start.
To support a batch processing operation, a number of comparatively inexpensive card punch or paper tape writers were used by programmers to write their programs "offline". When typing (or punching) was complete, the programs were submitted to the operations team, which scheduled them to be run. Important programs were started quickly; how long before less-important programs were started was unpredictable. When the program run was finally completed, the output (generally printed) was returned to the programmer. The complete process might take days, during which time the programmer might never see the computer.
The alternative of allowing the user to operate the computer directly was generally far too expensive to consider. This was because users might have long periods of entering code while the computer remained idle. This situation limited interactive development to those organizations that could afford to waste computing cycles: large universities for the most part. Programmers at the universities decried the inhumanist behaviors that batch processing imposed, to the point that Stanford students made a short film humorously critiquing it. They experimented with new ways to interact directly with the computer, a field today known as human-computer interaction.
Time-sharing
Time-sharing was developed out of the realization that while any single user was inefficient, a large group of users together was not. This was due to the pattern of interaction: Typically an individual user entered bursts of information followed by long pauses; but a group of users working at the same time would mean that the pauses of one user would be filled by the activity of the others. Given an optimal group size, the overall process could be very efficient. Similarly, small slices of time spent waiting for disk, tape, or network input could be granted to other users.
Implementing a system able to take advantage of this would be difficult. Batch processing was really a methodological development on top of the earliest systems; computers still ran single programs for single users at any time, all that batch processing changed was the time delay between one program and the next. Developing a system that supported multiple users at the same time was a completely different concept; the "state" of each user and their programs would have to be kept in the machine, and then switched between quickly. This would take up computer cycles, and on the slow machines of the era this was a concern. However, as computers rapidly improved in speed, and especially in size of core memory in which users' states were retained, the overhead of time-sharing continually decreased, relatively.
The concept was first This is a synthesized speech reading of the Wikipedia article "Time-sharing" and is intended primarily for blind and visually impaired individuals who can not view Wikipedia. This video can also be used for mobile users who wish to listen to Wikipedia articles on the go, or by those who wish to learn a second language by reading the captions in that language while listening in English.
Original article available at http://en.wikipedia.org/wiki/Time-sharing
All text from Wikipedia is licensed under CC-BY-SA:
https://en.wikipedia.org/wiki/Wikipedia:Reusing_Wikipedia_content
"You are free ... to make commercial use of the work":
http://creativecommons.org/licenses/by-sa/3.0/
Text-to-speech synthesized from FestVox, which permits commercial use:
"no restrictions on its use (commercial or otherwise)"
http://festvox.org/festival/downloads.html
Note: all these licenses permit commercial use, and therefore we are permitted to monetize videos derived from these contents.
- published: 24 Aug 2013
- views: 0
2:13
![](http://web.archive.org./web/20130911102506im_/http://i1.ytimg.com/vi/otxHMD7DKx8/default.jpg)
Connect To Usenet
This video is a SLIDESHOW OF CAPTIONS, read to you by StartMenuTaskbarRobot :)
If you sti...
published: 04 Aug 2013
Connect To Usenet
This video is a SLIDESHOW OF CAPTIONS, read to you by StartMenuTaskbarRobot :)
If you still need more info, at the end of this video you'll find links to more related sites with more info on this subject.
Follow us on twitter https://twitter.com/HelperRobot and thanks for watching!
- published: 04 Aug 2013
- views: 6
2:58
![](http://web.archive.org./web/20130911102506im_/http://i.ytimg.com/vi/7atGU93Ad-o/default.jpg)
HTTPS - New Tibetan Short Film 2013
HTTPS is a New Tibetan Short Film by Student for Free Tibet telling about Hypertext Transf...
published: 28 Feb 2013
author: urskhechok
HTTPS - New Tibetan Short Film 2013
HTTPS is a New Tibetan Short Film by Student for Free Tibet telling about Hypertext Transfer Protocol Secure (HTTPS) which is a widely used communications pr...
- published: 28 Feb 2013
- views: 7134
- author: urskhechok
24:53
![](http://web.archive.org./web/20130911102506im_/http://i.ytimg.com/vi/as_3Pp_yGq4/default.jpg)
'Bitcoin steals power from both banks & gangsters'
Digital currency Bitcoin is gaining popularity around the globe as people become more and ...
published: 27 Jul 2013
author: RussiaToday
'Bitcoin steals power from both banks & gangsters'
Digital currency Bitcoin is gaining popularity around the globe as people become more and more dissatisfied with the conventional banking system. Instant, sa...
- published: 27 Jul 2013
- views: 15033
- author: RussiaToday
10:05
![](http://web.archive.org./web/20130911102506im_/http://i.ytimg.com/vi/qzKu_FWE_gY/default.jpg)
Implementation of File Transfer Protocol over Internet.avi
Internet....
published: 11 Dec 2012
author: Kevin Chen
Implementation of File Transfer Protocol over Internet.avi
Internet.
- published: 11 Dec 2012
- views: 9
- author: Kevin Chen
37:26
![](http://web.archive.org./web/20130911102506im_/http://i.ytimg.com/vi/7c7fgvKmwZg/default.jpg)
Usenet - Wiki Article
Usenet is a worldwide distributed Internet discussion system. It was developed from the ge...
published: 20 May 2013
author: wikispeak10
Usenet - Wiki Article
Usenet is a worldwide distributed Internet discussion system. It was developed from the general purpose UUCP architecture of the same name. Duke University g...
- published: 20 May 2013
- views: 23
- author: wikispeak10
0:06
![](http://web.archive.org./web/20130911102506im_/http://i.ytimg.com/vi/1rVrrVlLUhw/default.jpg)
transfer
Copying or moving data from one place to another, typically via some kind of network (e.g....
published: 09 Aug 2012
author: aslstemforum00003
transfer
Copying or moving data from one place to another, typically via some kind of network (e.g. Asynchronous Transfer Mode, File Transfer Protocol) or local data ...
- published: 09 Aug 2012
- views: 10
- author: aslstemforum00003
Youtube results:
16:50
![](http://web.archive.org./web/20130911102506im_/http://i.ytimg.com/vi/Qtucy8QTX_E/default.jpg)
Web page - Wiki Article
Kweku Amo-Mensah is a 21st Century entrepreneur, politician and a leader by birth. is a we...
published: 21 May 2013
author: wikispeak10
Web page - Wiki Article
Kweku Amo-Mensah is a 21st Century entrepreneur, politician and a leader by birth. is a web document that is suitable for the World Wide Web and the web brow...
- published: 21 May 2013
- views: 10
- author: wikispeak10
9:26
![](http://web.archive.org./web/20130911102506im_/http://i.ytimg.com/vi/B12T4NU4ZBA/default.jpg)
Episode 3 Mobile Device Security Part 1
Hello and welcome to the 3RD episode of Security by B3h3m0th. This topic is another fluid ...
published: 13 Sep 2012
author: MightyJocephus
Episode 3 Mobile Device Security Part 1
Hello and welcome to the 3RD episode of Security by B3h3m0th. This topic is another fluid topic meaning that while it is based on facts now, its applicabilit...
- published: 13 Sep 2012
- views: 230
- author: MightyJocephus
1:55
![](http://web.archive.org./web/20130911102506im_/http://i.ytimg.com/vi/aeJypDupALc/default.jpg)
Bitcoin Robot Generates $34,000+ in Revenues
http://www.icone20.org - After being featured in iCovert Network, the news about the first...
published: 21 Jul 2013
author: Michael James Fuertes
Bitcoin Robot Generates $34,000+ in Revenues
http://www.icone20.org - After being featured in iCovert Network, the news about the first electronic currency Bitcoin robot generating a revenue of $34175 ...
- published: 21 Jul 2013
- views: 1
- author: Michael James Fuertes
16:39
![](http://web.archive.org./web/20130911102506im_/http://i.ytimg.com/vi/iN0pdPRZ6Wc/default.jpg)
Website - Wiki Article
A website, also written as Web site, web site, or simply site, is a set of related web pag...
published: 16 May 2013
author: wikispeak10
Website - Wiki Article
A website, also written as Web site, web site, or simply site, is a set of related web pages served from a single web domain. A website is hosted on at least...
- published: 16 May 2013
- views: 5
- author: wikispeak10