Jump to content

User:Ajgorhoe/sandbox/Subpage

From Wikipedia, the free encyclopedia

Sandbox Subpage: This is a subpage of my Sandbox, used in particular for preparation of new articles. See also My Deleted Articles. Ajgorhoe (talk) 12:19, 31 January 2016 (UTC)



Interesting references[edit]

Interesting references to use in articles:

Blockchain & applications like cryptocurrencies:

Comtrade[edit]

Manipulation[edit]

International Project Management Association[edit]

The International Project Management Association (IPMA) was founded in Europe in 1967, [1] as a federation of several national project management associations. IPMA maintains its federal structure today and now includes member associations on every continent except Antarctica. IPMA offers a four level certification program based on the IPMA competence baseline (ICB). [2] The ICB covers technical, contextual, and behavioral competencies.


[3]


[4]

[5]


To include[edit]


Social media[edit]

To be palaced below Social_media#Critique ofactivism

Abuse for promoting violence, hate speech and for oppression of liberties[edit]

Since 2010, a positive role of social media in democratic movements in various societies has often been emphasized, a prominent example being the Arab spring. For some time, a prevailing view was that social media will play a significant role in accelerated democratization in countries with authoritarian regimes and contribute to improvement of general awareness regarding human rights. [6][7]



However, it was later becoming more evident that social media can as well serve for stirring violence, spreading intolerance and promotion of authoritatian rulers. [8] [9]

[10]

[11]


[12]


[13]


A paper by University of Warwick researchers found that Facebook usage was linked to anti-refugee attacks in Germany.[14][15][16] In a 2017 article, Bloomberg describes how Philippine government uses Facebook as a tool in campaigns to destroy its critics.[17]


Examples where Social media still plays a positive role[edit]

Venezuelan Crisis:

The above examples does not mean that in certain circumstances social media can not play a positive role in opposing regime repression. As of beginning of 2019, a recent crisis in Venezuela shows how social media may be used to access information in situations where regime imposes severe censorship on media and information, and can be used by people to spread information about regime's violent actions. [18] [19] [20]

The Venezuelan government has responded by trying to block access to some social media and in general to web sites publishing information that is not supportive to the government (including Wikipedia). This kind of response has intensified during the presidential crisis in January 2019. [21] [22] [23]


Blocking of social media or even complete shutdown of the internet occurred around elections and other events in several African countries. According to the 2016 International Policy Digest article and the Freedom House, no African country had access to free, local media in 2015, and many countries have restrictive media laws which allow the encroachment upon freedom of press and speech. [24] Therefore, the importance of social media as a means of communication and source of information is growing and such media are often targeted by the government.

In 2011, Egypt was cut off from the internet and social media for political reasons.

In January 2015, government in the Democratic Republic of Congo cut the internet and SMS services for several days while the population protested against President Joseph Kabila. Presidential elections in the country were scheduled for 27th November 2016 but were carried out only in December 2019. In the Republic of Congo, elections were held in March 2016 with a 48 hours’ blackout of internet, telephone and SMS services. The incumbent resident Denis Sassou Nguesso was again elected into the office which he, has occupied since 1979, apart from a five-year break. In April 2015, social media was disconnected for several days in Burundi when protests arose president Pierre Nkurunziza announced that he would be running for a third term in office, which was regarded unconstitutional. Nkurunziza suppressed the protest and remained in office. The government of Uganda cut telecommunication services on election day in February 2016 and in May during the inauguration of President Yoweri Museveni for his fifth presidential term. Kenya, Egypt, Central African Republic and Niger also experienced temporary outages of social media during elections. From April 2016, the day of the presidential election, to December 2, 2016, there was a government-ordered blackout of social media platforms and messaging applications in Chad, costing more than 18 million euros to the Chadian economy. Shutdown of social media platforms and messaging services in Chad was also reported in April 2018, along with blocking important news website such as BBC. [25]


Following the 2018 Democratic Republic of the Congo election, the country's government has shut down the internet for 20 days, since December 31 till January 20 2018. [26] It also blocked the signal of Radio France Internationale and cut the SMS services. While government officials stated that internet and SMS services were cut to preserve public order after fictious results began circulating on social media, opposition activists said the true reason was to prevent people circulating information that could allow the official count to be challenged when it is announced. [27]



Template:

[28]

Blazor[edit]

Blazor is a web UI framework based on C#, Razor, and HTML that runs in the web browsers via WebAssembly. Blazor was designed to simplify the task of building fast single-page applications that run in any browser. It enables web developers to write .NET-based web apps that run client-side in web browsers using open web standards.

[29] [30] [31] [32] [33] [34]

See also[edit]

Sticky pad[edit]

<< Proposed for deletion immediately after creation: >>

Considerations[edit]

  • physical properties:
    • Friction versus adhesion. Adhesive contact: sticks; while frictional doesn't (can be easily detached)


Some helpful links[edit]

Reviews:


Inspiration from nature:


Static friction in metal forming processes - PhD thesis

- Surface design for High and Low friction - PhD thesis

New development[edit]

Article:[edit]

Sticky pad is a friction device used to prevent objects from sliding on a surface, by effectively increasing the friction between the object and the surface.

Sticky pads are used to fix items to otherwise smooth surface that is leaned or that moves, so that objects put on that surface could off due to insufficient friction when the surface inclines or moves. [35] The pad has large friction coefficient both with the base surface and with the item laid on it, which prevent both the sticky pad from moving with respect to the surface, and objects laid on the pad from moving relative to the pad. Sticky pads are commonly used on car dashboards where forces caused by acceleration of the vehicle would cause objects put on dashboards slip off the otherwise smooth surface of the dashboard.

Contrary to fasteners, sticky pads do not affix objects to the surface. They merely prevent objects from slipping on the surface until the threshold acceleration or inclination angle is exceeded. Sticky pads also usually don't make use of adhesives. Because of this they are easily detached form the surface, and they need gravity to serve their purpose. In particular, the force acting on the object must have a component perpendicular on the surface and directed towards it. This is different from Microsuction tape where adhesion of object is achieved by microscopic bubbles on the surface that function as small suction cups. Sticky pads are made of rubber-like materials. This help dissipate kinetic energy when the base surface vibrates, such that object on the pad keep maintaining large enough contact surface with the pad and tangential friction forces keep preventing objects from slipping relative to the pad.

Principle of operation[edit]

Although basic principles of sticky pads are simple, physics behind may be complex due to many specific and sometimes conflicting requirements arising from practical use. Mechanisms involved in high friction materials go beyond simple Coulomb friction. [36] [37] These can be combined by other mechanisms such as energy dissipation in viscous materials or adhesion.

The above requirements impose many design challenges. To operate well on vibrating surfaces, pads are usually made of soft, rubber like materials with very high friction coefficients. Designs seek to achieve certain level of adhesion (e.g. for use on vertical or very steep surfaces) without compromising easy detachment and continuous use without residual left-over. Some applications (such as sticking smartphones or tablets to vertical surface) require high degree of reliability, which is difficult to achieve without strong sticking to the surfaces.

Various innovative approaches and engineered materials are used to keep in line with requirements. Some designs apply sticking based on vacuum in addition to high friction and softness (see e.g. micro-suction tapes). [38] Other development includes designs that find inspiration in nature, especially in animals that are able to climb walls and ceilings such as geckos, [39] [40] [41] [42] [43] various species of insects [44] , tree frogs [45] , or chameleons [46] .

Mechanisms of insects that can scale walls and ceilings help understand how to produce surfaces with extremely high friction that don't exhibit too much sticking for practical applications. [44] Abilities of geckos have been intensively studied to find out how sticking of vertical walls or ceilings can be joined with ability of easy and quick detachment that enables geckos quick movement. [39] It has been discovered that Van der Waals force rather than friction or adhesion is the most important mechanism behing gecko's abilities. [40] This implies that artificial designs mimicking geckos' feet should rely on maximizing surface contact between object and the pad, which is less practical in some situations, for example when pads are used on non-flat surfaces or when objects put on the pad don't have flat surfaces. On the other hand, mechanisims in geckos' feet help design materials with reliable sticking and easy detachment at the same time. [39] Mechanisms used in geckos, tree frogs and some insects were also studied for self-cleaning ability,[44] [45] which would enable artificial materials retain the ability to prevent sliding after continuous use in dirty environments.

References[edit]

  1. ^ Bjarne Kousholt (2007). Project Management –. Theory and practice.. Nyt Teknisk Forlag. ISBN 87-571-2603-8. p.59.
  2. ^ ipma.ch
  3. ^ Bjarne Kousholt (2015). Project Management – Theory and practice. DIGIT.B1 Advisory Service, European Commmission.
  4. ^ Athanasios Maraslis, Nicos Kourounakis (2015). The PM² Project Management Methodology Guide (2.5 (2015) ed.). DIGIT.B1 Advisory Service, European Commmission.
  5. ^ Nicos Kourounakis & Athanasios Maraslis (January 2016). The PM² Project Management Methodology Guide – Open Edition (PDF). DIGIT.B1, European Commission. ISBN 978-92-79-63872-5. Archived from the original on 2017-07-02. Retrieved 2017-07-02.
  6. ^ "MIT Technology Review's Latest Issue Provides the Definitive Explanation of How Big Data Will Save Politics". MIT Technology Review (press release). MIT. January 8, 2013. {{cite web}}: |archive-date= requires |archive-url= (help)
  7. ^ Gadi Wolfsfeld, Elad Segev, Tamir Sheafer (2013). "Social Media and the Arab Spring: Politics Comes First". The International Journal of Press/Politics. Sage. Archived from the original on 2019-01-25.{{cite web}}: CS1 maint: multiple names: authors list (link)
  8. ^ "Do social media threaten democracy?". The Economist. November 4, 2017. Archived from the original on 2019-01-18.
  9. ^ Hillary Grigonis (March 21, 2018). "Social (Net)Work: How does social media influence democracy?". Digital Trends. Archived from the original on 2019-01-26.
  10. ^ Mathew Ingram (May 30, 2018). "Can Social Media Have a Positive Effect on Democracy?". Columbia Journalism Review. Archived from the original on 2019-01-26.
  11. ^ Evgeny Morozov (July 2002). "How the NET Aids Dictatorships". TEDGlobal 2009. TED Conferences. Archived from the original on 2019-01-26.
  12. ^ Rebecca MacKinnon (2011). "Let's take back the Internet!". TEDGlobal 2011. TED Conferences. Archived from the original on 2019-01-26.
  13. ^ Samantha Bradshaw, Philip N. Howard (July 2017). "Troops, Trolls and Troublemakers: A Global Inventory of Organized Social Media Manipulation" (PDF). University of Oxford. Archived from the original (PDF) on 2019-01-26.
  14. ^ "Facebook Fueled Anti-Refugee Attacks in Germany, New Research Suggests". Retrieved August 21, 2018.
  15. ^ MMller, Karsten; Schwarz, Carlo (2017). "Fanning the Flames of Hate: Social Media and Hate Crime". doi:10.2139/ssrn.3082972. ISSN 1556-5068. SSRN 3082972. {{cite journal}}: Cite journal requires |journal= (help)
  16. ^ Beauchamp, Zack (January 22, 2019). "Social media is rotting democracy from within". Vox. Archived from the original on 2019-01-25.
  17. ^ Etter, Lauren (December 7, 2017). "What Happens When the Government Uses Facebook as a Weapon?". Bloomberg. Archived from the original on 2019-01-24.
  18. ^ Cristina Guevara (January 1, 2013). "Censorship in Venezuela Fuels Social Media Growth". World News. International Policy Digest. Archived from the original on 2019-01-26.
  19. ^ Jasmine Garsd (September 11, 2018). "For Many In Venezuela, Social Media Is A Matter Of Life And Death". National Public Radio. Archived from the original on 2019-01-26.
  20. ^ Max Filip Sundqvist (October 24, 2018). "Social Media and Crisis in Venezuela". Disaste Response. Archived from the original on 2019-01-26.
  21. ^ Kieren McCarthy (May 25, 2017). "Venezuela Increases Internet Censorship and Surveillance in Crisis". The Register. Archived from the original on 2019-01-26.
  22. ^ "Social Media Shutdown in Venezuela is a Warning of What is to Come as Political Tensions Rise". Freedom of Expression. Access Now. January 22, 2019. Archived from the original on 2019-01-26.
  23. ^ Verónica Arroyo, Javier Pallero (January 1, 2013). "A Bill in Venezuela Seeks to Give the Government Absolute Control Over the Internet". Freedom of Expression. Access Now. Archived from the original on 2019-01-26.
  24. ^ Eva Nolle (August 11, 2016). "Social Media and its Influence on Democratization in Africa". International Policy Digest. Archived from the original on 2019-01-28.
  25. ^ "Chad is Blocking Social Media and Messaging Apps... Again!". Internet Sans Frontières. April 5, 2018. Archived from the original on 2019-01-28.
  26. ^ DR Congo internet restored after 20-day suspension over elections Al Jazeera. Published 20 January 2019.
  27. ^ Jason Burke (December 31, 2018). "DRC electoral fraud fears rise as internet shutdown continues". The Guardian. Archived from the original on 2019-01-28.
  28. ^ . January 1, 2013. {{cite web}}: |archive-date= requires |archive-url= (help); Missing or empty |title= (help); Missing or empty |url= (help)
  29. ^ Strahl, Rick (July 31, 2018). "Web Assembly and Blazor: Re-assembling the Web". Archived from the original (HTML) on 2018-10-22. Retrieved 2018-10-22. {{cite web}}: Cite has empty unknown parameter: |1= (help)
  30. ^ Tomassetti, Federico (September 4, 2018). "Blazor: .NET in the Browser". Archived from the original (HTML) on 2018-10-22. Retrieved 2018-10-22. {{cite web}}: Cite has empty unknown parameter: |1= (help)
  31. ^ Stropek, Rainer (September 2018). "Learn Blazor". Archived from the original (HTML) on 2018-10-22. Retrieved 2018-10-22. {{cite web}}: Cite has empty unknown parameter: |1= (help)
  32. ^ "Web Development - C# in the Browser with Blazor". MSDN Magazine. September 2018. Archived from the original (HTML) on 2018-10-22. Retrieved 2018-10-22. {{cite web}}: Cite has empty unknown parameter: |1= (help)
  33. ^ "Get started building .NET web apps that run in the browser with Blazor" (HTML). ASP.NET Blog. March 22, 2018. Retrieved 2018-10-22. {{cite web}}: |archive-date= requires |archive-url= (help); Cite has empty unknown parameter: |1= (help)
  34. ^ Ball, Kevin (June 26, 2018). "How WebAssembly is Accelerating the Future of Web Development". Archived from the original (HTML) on 2018-10-22. Retrieved 2018-10-22. {{cite web}}: |archive-date= / |archive-url= timestamp mismatch; 2018-09-25 suggested (help); Cite has empty unknown parameter: |1= (help)
  35. ^ Carolyn Shearlock (Jan 2012). "Sticky Pads". The Boat Galley. Archived from the original on 2017-09-02. Retrieved 2017-09-02.
  36. ^ Elena Loredana Deladi (2006). Static Friction in Rubber-metal Contacts with Application to Rubber Pad Forming Process (PDF) (Thesis). University of Twente. Archived from the original (PDF) on 2017-09-05. Retrieved 2017-09-05.
  37. ^ Ulrika Petterson (2005). Surface design for High and Low friction (PDF) (Thesis). University of Uppsala. Archived from the original (PDF) on 2017-09-05. Retrieved 2017-09-05.
  38. ^ Ozcanli, Osman Can (March 16, 2010). "Looking For The Next Post-It". Forbes. Archived from the original on 2017-09-02. Retrieved 2017-09-02.
  39. ^ a b c Quan Xu, Yiyang Wan, Travis Shihao Hu, Tony X. Liu, Dashuai Tao, Peter H. Niewiarowski, Yu Tian, Yue Liu, Liming Dai, Yanqing Yang & Zhenhai Xia (20 November 2015). "Robust self-cleaning and micromanipulation capabilities of gecko spatulae and their bio-mimics". Nature Communications. Archived from the original on 2017-09-05. Retrieved 2017-09-05.{{cite web}}: CS1 maint: multiple names: authors list (link)
  40. ^ a b Mena R. Klittich, Michael C. Wilson, Craig Bernard, Rochelle M. Rodrigo, Austin J. Keith, Peter H. Niewiarowski & Ali Dhinojwala (13 March 2017). "Influence of substrate modulus on gecko adhesion". Nature. Archived from the original on 2017-09-05. Retrieved 2017-09-05.{{cite web}}: CS1 maint: multiple names: authors list (link)
  41. ^ "Gecko Tape". University of Stanford. Archived from the original on 2017-09-05. Retrieved 2017-09-05.
  42. ^ Richard Black (June 1, 2003). "Gecko inspires sticky tape". BBC. Archived from the original on 2017-09-05. Retrieved 2017-09-05.
  43. ^ A. K. GEIM, S. V. DUBONOS1, I. V. GRIGORIEVA, K. S. NOVOSELOV, A. A. ZHUKOV and S. YU. SHAPOVAL (1 June 2003). "Microfabricated adhesive mimicking gecko foot-hair" (PDF). Archived from the original (PDF) on 2017-09-05. Retrieved 2017-09-05.{{cite web}}: CS1 maint: multiple names: authors list (link) CS1 maint: numeric names: authors list (link)
  44. ^ a b c "How stick insects honed friction to grip without sticking". Phys.org News. Phys.org. February 19, 2014. Archived from the original on 2017-09-05. Retrieved 2017-09-05.
  45. ^ a b "Frog feet could solve a sticky problem". Phys.org News. Phys.org. July 3, 2011. Retrieved 2017-09-05. {{cite news}}: Check |archive-url= value (help)
  46. ^ Marlene Spinner, Guido Westhoff and Stanislav N. Gorb. "Subdigital setae of chameleon feet: Friction-enhancing microstructures for a wide range of substrate roughness". Nature. Archived from the original on 2017-09-05. Retrieved 2017-09-05.

See also[edit]

Microsuction tape[edit]

<< Proposed for deletion immediately after creation: >>

Article:[edit]

Microsuction tape is is a device for sticking objects to surfaces such as furniture, dashboards, walls, etc. One side is usually attached to the base surface by a classical adhesive. Objects are attached to another side by pressing them against the tape. They stick to the tape due to small bubbles (cavities) on the surface of the tape. [1] [2] [3] These contain air, which is squeezed out when surface of an object is pressed against the surface of the tape. Due to sealing properties of the material, when object is pulled off the surface, vacuum is created in the cavities. Due to external air pressure, this creates a force that prevents the object from being removed from the surface, a mechanism being similar as in suction cup.[1]

References[edit]

  1. ^ a b Ozcanli, Osman Can (March 16, 2010). "Looking For The Next Post-It". Forbes. Archived from the original on 2017-09-02. Retrieved 2017-09-02.
  2. ^ Trent Crawford. "Microsuction: The Tape of the Future". Swell Direct. Archived from the original on 2017-09-02. Retrieved 2017-09-02.
  3. ^ James Burchill. "Micro-Suction Tape". Material Intuition. Archived from the original on 2017-09-02. Retrieved 2017-09-02. {{cite web}}: |archive-date= / |archive-url= timestamp mismatch; 2017-09-03 suggested (help)

See also[edit]


PM2 (project management methodology)[edit]

PM2 (stylized PM², sometimes pronounced as P M square) is a project management methodology developed and endorsed by the European Commission. [1] [2]

PM² certification exams are available in the 28 EU countries via Prometric , but are only available to EU institutions' staff. In 2017, the European Commission issued an open guide to the PM² methodology, freely available through the EC. However, as of July 2017, the certification program is still available only to the EU institutions' staff. [3] [4] [5]


History[edit]

The PM2 methodology was developed in 2007, and the first version was released via the PM2 Wiki in 2008. Some milestones in the development of methodology include: [1]

  • 2007: Introduction of roles and responsibilitied for IT projects.
  • 2008: Introduction of PM²
  • 2009: Pilot implementation of PM²
  • 2009 Project management courses for PM²
  • 2011: Endorsement by CTI.
  • 2012: Release of the PM² Training Programme for IT Projects
  • 2012: Release of the PM² Guide, 1st Edition (PDF)
  • 2012: Training Courses for Business Managers
  • 2013: Release of the PM² Methodology 2.0 and the PM² Guide, 2st Edition (PDF)
  • 2013: Introduction of PM² Certification Level-2
  • 2014: Release of Agile@EC
  • 2016: Release of Agile@EC Guide, 1st Edition
  • 2015: Release of the PM² Methodology Guide ver. 2.5 [1]
  • 2016: Release of the the PM² Guide, Open Edition [2]

Overview of PM2[edit]

PM² is the official project management methodology of the European Commission (EC). It incorporated elements from a range of widely accepted best practices in project management, and builds heavily on PMBOK, Prince2, IPMA-ICB, CMMI, TEMPO, and operational experience from EC institutions. In essence, the PM² methodology provides: [1]

  • Project governance structure
  • Process guidelines
  • Artefact templates
  • Guidelines for using the artefacts
  • Set of effective mindsets

See also[edit]

External links[edit]


References[edit]

  1. ^ a b c d Athanasios Maraslis, Nicos Kourounakis (2015). The PM² Project Management Methodology Guide (2.5 (2015) ed.). DIGIT.B1 Advisory Service, European Commmission.
  2. ^ a b Nicos Kourounakis & Athanasios Maraslis (January 2016). The PM² Project Management Methodology Guide – Open Edition (PDF). DIGIT.B1, European Commission. ISBN 978-92-79-63872-5. Archived from the original on 2017-07-02. Retrieved 2017-07-02.
  3. ^ Henny Portman (Jan 29, 2017). "EU Commission released new PM Methodology (PM2) guide". WordPress. Archived from the original on 2017-07-02. Retrieved 2017-07-02.
  4. ^ Dmitry Kharebov (Feb 13, 2017). "PM² - a Project Management methodology by EU Commission". IPMA. Archived from the original on 2017-07-02. Retrieved 2017-07-02.
  5. ^ Reinhard Wagner (Jan 29, 2017). "EU Commission released new PM Methodology (PM2) guide". IPMA - International Project Manager Association. Retrieved 2017-07-02. {{cite web}}: Check |archive-url= value (help)


List of Graphics Libraries[edit]

[1]

[6]

[7]

Fireball (software)[edit]

Fireball is a browser hijacking malware discovered in 2017 by the security company Check Point. It takes over target browsers and turns them into zombies. [2] [3] [4] [5] [6]

Malware has the ability of running any code on victim computers, such as downloading an arbitrary file and hijacking and manipulating infected user's web traffic in order to generate advertisement revenue. It installs plugins and additional configurations to boost its advertisements, and has potential to turn into a distributor for any additional malware. Malware is spread mostly via bundling. It is installed on a victim's machine alongside a wanted program, often without the user’s consent. [3] Digital marketing agency Rafotech has been indicated as producer of the software. The same company has been accused to host fake search engines, which redirect the queries to yahoo.com or google.com. The fake search engines include tracking pixels used to collect private information from users. Fireball manipulates the infected browsers and turn their default search engines and home pages into the above mentioned fake search engines, which enable the software to spy on users of the infected browsers.

It is estimated that 250 million computers are infected worldwide. Check Point researches also claim that this malware might have infected computers on 20% of corporate networks, making it a high volume internet threat. According to this source, the highest infection rates were discovered in Indonesia, India and Brasil. It is speculated that the related browser hijackers operations form possibly the largest infection operation in history. [2]

References[edit]

  1. ^ Vita Cajnko Javornik (June 5 2008). Zakaj Hermes SoftLab ni postal kot ComTrade. Retrieved 2017-07-05. {{cite book}}: |archive-date= requires |archive-url= (help); |work= ignored (help); Check date values in: |date= (help)
  2. ^ a b "FIREBALL – The Chinese Malware of 250 Million Computers Infected". Check Point. June 2017. Archived from the original on 2017-06-02. Retrieved 2017-06-02. {{cite web}}: |archive-date= / |archive-url= timestamp mismatch; 2017-06-07 suggested (help)
  3. ^ a b Leyden, John (2 June 2017). "Goodness gracious, great Chinese 'Fireball' malware infects 250m systems worldwide". The Register. Archived from the original on 2017-06-02. Retrieved 2017-06-02. {{cite web}}: |archive-date= / |archive-url= timestamp mismatch; 2017-06-07 suggested (help)
  4. ^ Morris, David (3 June 2017). "Hack Brief: Dangerous 'Fireball' Adware Infects a Quarter Billion PCs". Fortune. Archived from the original on 2017-06-08. Retrieved 2017-06-08.
  5. ^ Greenberg, Andy (2 June 2017). "Hack Brief: Dangerous 'Fireball' Adware Infects a Quarter Billion PCs". Wired. Archived from the original on 2017-06-08. Retrieved 2017-06-08.
  6. ^ Loeb, Larry (5 June 2017). "Fireball Malware Explodes Around the World". Security Intelligence. Archived from the original on 2017-06-08. Retrieved 2017-06-08.



References - explicit[edit]

Check Point Threat Intelligence Research Team: FIREBALL – The Chinese Malware of 250 Million Computers Infected [1] Second reference: [1]

John Leyden: Goodness gracious, great Chinese 'Fireball' malware infects 250m systems worldwide [2] Third reference: [2]

David Z. Morris: Chinese ‘Fireball’ Malware Infects 250 Million Computers [3]

Andy Greenberg: Hack Brief: Dangerous 'Fireball' Adware Infects a Quarter Billion PCs [4]

Larry Loeb: Fireball Malware Explodes Around the World [5]

AOMEI Backupper[edit]

Aomei Backupper a freemium disk backup, recovery and cloning software for Windows operating systems (versions 7 to 10) developed by Aomei Tech. [6] [7] [8] [9] [10] [11]

It is distributed as free Standard edition, Pro edition, Server Edition (aimed for server backups) and Technician Edition (aimed for consultants providing charged technical services and for companies with many computers). [12]

Features[edit]

The standard edition complete backup and restore of disks (including system disks), partitions, files and folders. It provides ability of scheduled, incremental and differential backups. Feature called universal restore enables migration of an operating system to physical computers or virtual machines with dissimilar hardware.[6] [7] System and data backups make use of the Microsoft's VSS technology, which enables creating backups without interrupting running applications. [7] Software can create a bootable recovery optical disk (or just its ISO image) based either on Linux or on Windows PE (either legacy BIOS or UEFI-bootable). [7] [8] Language support includes English, French, German, Japanese, Simplified Chinese and Traditional Chinese languages.

The software's site has extensive help pages that guide users through desired tasks. [13]

See Also[edit]

External Links[edit]

References[edit]

  1. ^ a b Cite error: The named reference CheckPoint1 was invoked but never defined (see the help page).
  2. ^ a b Cite error: The named reference LeydenJohn was invoked but never defined (see the help page).
  3. ^ Cite error: The named reference MorrisDavid was invoked but never defined (see the help page).
  4. ^ Cite error: The named reference GreenbergAndy was invoked but never defined (see the help page).
  5. ^ Cite error: The named reference LoebLarry was invoked but never defined (see the help page).
  6. ^ a b Fisher, Tim (16 January 2014). "AOMEI Backupper Standard v3.2. Technical review". AboutTech. Archived from the original on 2016-04-12. Retrieved 2016-04-12. {{cite web}}: |archive-date= / |archive-url= timestamp mismatch; 2016-04-23 suggested (help)
  7. ^ a b c d Preece, Jeph (11 August 2014). "Aomei Backupper Free Imaging – Test & Review". TopTenReviews. Archived from the original on 2016-04-21. Retrieved 2016-04-21. {{cite web}}: |archive-date= / |archive-url= timestamp mismatch; 2016-04-23 suggested (help)
  8. ^ a b Opris, Elena (29 April 2014). "AOMEI Backupper Standard Review". Softpedia. Archived from the original on 2016-04-21. Retrieved 2016-04-21. {{cite web}}: |archive-date= / |archive-url= timestamp mismatch; 2016-04-23 suggested (help)
  9. ^ Peris, Alex (20 October 2015). "AOMEI Backupper Standard 3.2 Review". AptGadget. Archived from the original on 2016-04-21. Retrieved 2016-04-21. {{cite web}}: |archive-date= / |archive-url= timestamp mismatch; 2016-04-23 suggested (help)
  10. ^ Williams, Mike (17 July 2015). "AOMEI Backupper Standard 3.0". Pc Advisor. Archived from the original on 2016-04-23. Retrieved 2016-04-23.
  11. ^ Hillier, Jim (16 January 2014). "AOMEI Backupper 2 Review". DavesComputerTips. Archived from the original on 2016-04-21. Retrieved 2016-04-21. {{cite web}}: |archive-date= / |archive-url= timestamp mismatch; 2016-04-23 suggested (help)
  12. ^ "AOMEI Backupper Products". Aomei Tech. Archived from the original on 2016-04-21. Retrieved 2016-04-21. {{cite web}}: |archive-date= / |archive-url= timestamp mismatch; 2016-04-23 suggested (help)
  13. ^ "AOMEI Backupper Help Guides". Aomei Tech. Archived from the original on 2016-04-21. Retrieved 2016-04-21. {{cite web}}: |archive-date= / |archive-url= timestamp mismatch; 2016-04-23 suggested (help)

XWT[edit]

Extensible Web Toolkit (XWT) Extensible Web Toolkit

Extensible Web Toolkit(XWT) is a development toolkit for building high performance ASP.NET Web application by using JQuery and other custom controls. XWT uses minified CSS and Script files to reduce the file size and to increase the download speed.

XWT - External Links[edit]

Material[edit]

GUI builders:


Features

Here are some details about what’s currently supported by XWT:

   XWT currently supports 3 backends with different level of development: GTK, Cocoa (Mac) and WPF (Windows).
   XWT can instantiate more than one backend at a time, and run those side by side (with some limitations). For example, you can have XWT use Gtk and Cocoa in the same application, depending on what is hosting your code.
   The basic widget library is mostly complete.
   It has a drawing API, very similar to Cairo.
   There is no visual designer yet, nor any markup language for representing windows. My plan is to use XAML or a simplified version of it.
   XWT can be extended in different ways.
   Applications can create subclasses of XWT widgets, or create new widgets.
   New backends can be plugged into XWT
   Existing backends can be extended
   The API is not yet stable and can change at any time.


Final Article: XWT (toolkit)[edit]

Xwt is a .NET cross-platform user interface toolkit. It enables building GUI-based desktop applications that run on multiple platforms without having to customizing code for different platforms. Xwt API is mapped to a set of native controls on each supported platform. Features that are not available on specific platforms are emulated by using native widgets, which is referred to as hosting in the Xwt context.[1] Xwt was partially used as GUI toolkit (beside GTK#) in the development of the Xamarin Studio.[2]

Xwt creates an engine at runtime that will map API calls to the underlying platform. The following engines are currently supported:[3]

  • Windows: WPF engine, Gtk engine (using Gtk#)
  • MacOS X: Cocoa engine (using MonoMac) and Gtk engine (using Gtk#)
  • Linux: Gtk engine (using Gtk#)

External Links[edit]


Final article: XWT (disambiguation)[edit]

XWT may refer to:

Albert Gillis von Baumhauer[edit]

Albert Gillis von Baumhauer (Heerenveen, October October 1891 - Alder, 18 March 1939) was a Dutch aviation pioneer notable for his design of the first Dutch helicopter and the related inventions, in particular the cyclic and collective control and a single rotor design.

Early Years[edit]

In 1910 Von Baumhauer built a biplane glider along with the Six brothers. In 1913 he built a model of a helicopter with two counter-rotating rotors. The helicopter flew but it was not stable enough.

After having completed studies in Delft, Von Baumhauer studied for some time aerodynamics at Göttingen and then went to study at the Technical University of Zürich. There he met professor Theodor von Kármán and mathematician and aviation expert, professor Ludwig Prandtl.

In 1910 Baumhauer joined Spyker car factory and in 1919 he became chief engineer at Van Berkel , where he was responsible for the development of the Van Berkel W-B, a seaplane for the Dutch Naval Air Service. On May 12 of that year he married Johanna Hildegonda Oldenhuis Gratama, with whom he eventually had three children.

After closure of the aircraft division of Van Berkel in 1921, von Baumhauer joined the National Research Centre for Aviation where he was a deputy director for some time. Here he devoted himself to various fields of abiation, especially safety in the air, both in wind tunnel tests and in scientific studies.

Manned Helicopter Flight[edit]

In 1924 the British Ministry of Aviation announced a contest on the construction of a helicopter, which contained several severe requirements for that time such as flying a closed circuit with a filght speed of 100 km/h, vertical take-of and climb to up to 600 m and glide and safe landing with a stopped engine. The prize of 50.000 £ attracted many contestors, with end data of May 25 1925, which was later extended by one year. n Baumhauer went straight to work and enrolled in 1924. On 5 November 1924 he founded, together with one of the brothers Six, the First Dutch Helicopter Aviation, in order to accomplish construction and perform the flichts. The helicopter was ready inn April 1925 and the first flight was made in September 1925 by lt. F.H. van Heyst in Soesterberg. On February 10, 1926 Van Heyst managed to keep the machine several meters off the ground for 5 minutes.

After the first test flights, the helicopter was transferred to Schiphol in 1926, where B. Grass and later Peter .J. Six acted as test pilots. British contest had been canceled due to a fatal accident in England, but von Baumhauer continued the experiments until 1930. Several improvements have been made, with the flights also getting better, although they still often had a somewhat indefinite direction. On August 28, 1930 von Baumhauer himself made a half an hour flight. The next day, a hinge bolt of one of the rotor blades failed due to fatigue crack, and the helicopter fell on the ground. It helicopter was completely destroyed but von Baumhauer was unharmed. Since the money almost run out, the machine was not rebuild, but on Baumhauer's interest in helicopter development continued to until the end of his life.

Von Baumhauer's design made some major achievement which greatly influenced further development of helicopters. It used a single rotor, as opposed to two counter-rotating rotors on which most contemporary designs were based. He was one of the first to use the tail rotor to counteract the torque produced by the main rotor. The tail rotor was powered by its own engine (for easier control) and its angle of incidence could not be adjusted during flight. Another notable achievement was use of collective and cyclic pitch control. The the swashplate principle was applied. Below the rotor, two concentric rings were mounted, connected to each other with bearings. The non-rotating inner ring coulf be tilted and moved along the rotor shaft. The outer ring rotated with the rotor and adjusted blade angles via rods. This enabled to adjust blade pitch according to blade's current angle, a mechanism which is still used in modern helicopters.

Other work in Aviation[edit]

In 1937 von Baumhauer was appointed ad engineer at the Civil Aviation Administration of the Ministry of Public Works, where his tasks included testing and inspection of new aircraft types. In March 1939 he went on a study trip to the United States, where he was killed in the accident with the prototype of the four-engine Boeing Stratoliner airliner in Aider, Washington state. At the time of his death, nomination was ready for his appointment as professor at TU Delft. He also found widespread recognition abroad and was appointed as a Fellow of the Royal Aeronautical Society, corresponding member of the Deutsche Akademie für Luftfahrtwissenschaften and representative of the Netherlands for the Daniel Guggenheim Fund (USA), responsible for aviation safety.

References[edit]

Baumhauer Bibliography [4] Next mentions [4]

The Aviation History- mention of cyclic and collectiive controls [5] Next mentions [5]


Review of Two Helicopters Designed in the Netherlands: [6] Next mentions [6]

The Transmission of Helicopter Technology: [7] Next mentions [7]



, Vol. 83 No. 1, January 2013, 119–40.




Example ref.: [8]

External links[edit]


Material[edit]

, Vol. 83 No. 1, January 2013, 119–40.

Technology (terminology):

Other

  1. ^ Narayanaswamy, Anand (23 Nov 2012). "Build Cross Platform Applications with Xwt". InfoQ. Archived from the original on 2016-04-15. Retrieved 2016-04-15.
  2. ^ de Icaza, Miguel (22 February 2013). "The Making of Xamarin Studio". InfoQ. Archived from the original on 2016-04-15. Retrieved 2016-04-15.
  3. ^ "Xwt Read Me". Xwt on GitHub. 15 Jan 2012. Archived from the original on 2016-04-15. Retrieved 2016-04-15.
  4. ^ a b Hazewinkel, H.J. Baumhauer, Albert Gillis von (1891-1939). Huygens ING - Den Haag. Bronvermelding, 2013. [8] Web extract
  5. ^ a b Relly Victoria Petrescu and Florian Ioon Petrescu The Aviation History, page 74. USA, 2013, ISBN 978-3-8482-6639-5.
  6. ^ a b H.J.G.C. Vodegel and K.P. Jessurun. A Historical Review of Two Helicopters Designed in the Netherlands. 21th European Rotocraft Forum, 1995, Saint Petersburg, Russia. [9] Web extract
  7. ^ a b Alex de Voogt. The Transmission of Helicopter Technology, 1920‐1939: Exchanges with von Baumhauer. Int. j. for the history of eng. & tech., Vol. 83 No. 1, January 2013, 119–40. [10] Web extract
  8. ^ Leishman, J. Gordon. Principles of Helicopter Aerodynamics. Cambridge aerospace series, 18. Cambridge: Cambridge University Press, 2006. ISBN 978-0-521-85860-1. [11] Web extract