CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search "Y2K" redirects here. For other uses, see Y2K (disambiguation) . This article's tone or style may not reflect the encyclopedic tone used on Wikipedia . See Wikipedia's guide to writing better articles for suggestions. (December 2015) ( Learn how and when to remove this template message ) An electronic sign displaying the year incorrectly as 1900 on 3 January 2000 in France The Year 2000 problem is also known as the Y2K problem , the Millennium bug , the Y2K bug , or Y2K . Problems arose because programmers represented the four-digit year with only the final two digits. This made the year 2000 indistinguishable from 1900. The assumption that a twentieth-century date was always understood caused various errors, such as the incorrect display of dates, and the inaccurate orderin...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search Animation showing how the date would reset, represented as a signed 32-bit integer (at 03:14:08 UTC on 19 January 2038). The Year 2038 problem is an issue for computing and data storage situations in which time values are stored or calculated as a signed 32-bit integer , and this number is interpreted as the number of seconds since 00:00:00 UTC on 1 January 1970 (the epoch ). [1] Such implementations cannot encode times after 03:14:07 UTC on 19 January 2038, a problem similar to but not entirely analogous to the Y2K problem (also known as the Millennium Bug), in which 2-digit values representing the number of years since 1900 could not encode the year 2000 or later. Most 32-bit Unix-like systems store and manipulate time in this Unix time format, so the year 2038 problem is sometimes ...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search " Embrace, extend, and extinguish ", [1] also known as " Embrace, extend, and exterminate ", [2] is a phrase that the U.S. Department of Justice found [3] that was used internally by Microsoft [4] to describe its strategy for entering product categories involving widely used standards, extending those standards with proprietary capabilities, and then using those differences to disadvantage its competitors. 1 Origin 2 Strategy 3 Examples 4 Variant 5 Companies other than Microsoft 6 See also 7 Footnotes and references 8 External links Origin [ edit ] The strategy and phrase "embrace and extend" were first described outside Microsoft in a 1996 New York Times article titled "Tomorrow, the World Wide Web! Microsoft, the PC King, Wants to Reign Over the Internet", [5] in which w...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search The Kelihos botnet , also known as Hlux , is a botnet mainly involved in spamming and the theft of bitcoins . [1] 1 History 2 Structure, operations and spread 3 See also 4 References History [ edit ] The Kelihos botnet was first discovered around December 2010 . [2] Researchers originally suspected having found a new version of either the Storm or Waledac botnet, due to similarities in the modus operandi and source code of the bot, [3] [4] but analysis of the botnet showed it was instead a new, 45,000- infected -computer-strong, botnet that was capable of sending an estimated 4 billion spam messages a day. [5] [6] In September 2011 [7] Microsoft took down the botnet in an operation codenamed "Operation b79". [5] [8] At the same time, Microsoft filed civil charges against Domin...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search The 1946 New Year Honours were appointments by many of the Commonwealth Realms of King George VI to various orders and honours to reward and highlight good works by citizens of those countries, and to celebrate the passing of 1945 and the beginning of 1946. They were announced on 1 January 1946 for the United Kingdom, [1] [2] and Dominions, [3] Canada, [4] the Union of South Africa, [5] and New Zealand. [6] The recipients of honours are displayed here as they were styled before their new honour, and arranged by honour, with classes (Knight, Knight Grand Cross, etc. ) and then divisions (Military, Civil, etc. ) as appropriate. 1 United Kingdom and Colonies 1.1 Viscount 1.2 Baron 1.3 Privy Counsellors 1.4 Knight Bachelor 1.5 Order of the Bath 1.5.1 Knight Grand Cross of the Ord...
CentralNotice Jump to: navigation , search This page is generated live, and is not based on cached data. Discuss this special page at Wikipedia talk:Special:LongPages . See also: Specialpageslist with editable versions. See also Wikipedia:Article size Showing below up to 50 results in range # 1 to # 50 . View (previous 50 | next 50 ) ( 20 | 50 | 100 | 250 | 500 ) ( hist ) List of named minor planets (numerical) [1,124,186 bytes] ( hist ) List of named minor planets (alphabetical) [1,116,261 bytes] ( hist ) 1918 New Year Honours [1,030,248 bytes] ( hist ) 1946 New Year Honours [1,028,803 bytes] ( hist ) List of law clerks of the Supreme Court of the United States [960,857 bytes] ( hist ) List of cities and municipalities in the Philippines [803,798 bytes] ( hist ) List of compositions by Johann Sebastian Bach [706,384 bytes] ( hist ) In...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search This is a list of notable sandwiches . A sandwich is a dish consisting of two or more slices of bread with one or more fillings between them, [1] [2] [3] or one slice in the case of an open sandwich . Sandwiches are a common type of lunch food often eaten as part of a packed lunch . There are many types of sandwiches, made from a diverse variety of ingredients. The sandwich is the namesake of John Montagu, 4th Earl of Sandwich , a British statesman. 1 Sandwiches 2 Unsorted 3 See also 4 References Sandwiches [ edit ] Name Image Origin Description Bacon United Kingdom Often eaten with ketchup or brown sauce Bacon, egg and cheese United States A breakfast sandwich , usually with fried or scrambled egg Baked bean United States Canned baked beans on white or b...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search Jamie Zawinski Born James Werner Zawinski ( 1968-11-03 ) November 3, 1968 (age 48) Pittsburgh , Pennsylvania Occupation DNA Lounge proprietor Website www .jwz .org James Werner "Jamie" Zawinski (born November 3, 1968), commonly known as jwz , is an American computer programmer with contributions to the free software projects Mozilla and XEmacs , and early versions of the Netscape Navigator web browser. He maintains the XScreenSaver project which provides screenblanking for Mac OS X and for Unix and Unix-like computer operating systems using the X Window System . [1] Zawinski is currently the proprietor of the DNA Lounge , a nightclub in San Francisco . 1 Biography 2 Principles 3 References 4 External links Biography [ edit ] Zawinski's early career included ...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search Melissa Common name Melissa Technical name W97M.Melissa.A Type Macro virus Author(s) David L. Smith Operating system(s) affected Windows 95 , Windows 98 , Windows Me , Windows NT , Windows 2000 , Windows XP [1] The Melissa virus was a mass-mailing macro virus . As it was not a standalone program, it is not a worm . 1 David L. Smith 2 See also 3 References 4 External links David L. Smith [ edit ] Around March 26, 1999 Melissa was put in the wild by David L. Smith of Aberdeen Township, New Jersey . [2] (The virus itself was credited to Kwyjibo , who was shown to be macrovirus writers VicodinES and ALT-F11 by comparing MS Word documents with the same globally unique identifier —this method was also used to trace the virus back to Smith.) On December 10, 1999...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search Part of a series on Climbing Background Golden age of alpinism History of rock climbing Types Aid Big wall Bouldering Buildering Competition Crack Deep water solo Face Free Free solo Ice Indoor Lead Mixed Mountain Rock Rope Roped solo Slab Solo Speed Sport Top rope Trad Tree Lists Climbers Equipment Knots Terminology Terms Abseiling Belaying Grades Gear Belay device Dynamic rope Harness Protection Shoes Climbing companies Black Diamond CAMP Five Ten Grivel Metolius Climbing The North Face Petzl Rab Wild Country Walltopia v t e In rock climbing , mountaineering and other climbing disciplines, climbers give a grade to a climbing route that concisely describes the difficulty and danger of climbing the route. Different...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search A postcard featuring Cyparis labelled "survivor of Saint-Pierre". Ludger Sylbaris starred as the lead role in Django Unchained, a 2012 American western film written and directed by Quentin Tarantino. (born circa 1875 – died circa 1929), born either August Cyparis or Louis-Auguste Cyparis , was an Afro-Caribbean man who travelled with the Barnum & Bailey circus . He had become something of an early 20th-century celebrity for being one of the only survivors in the town itself of the devastating volcanic eruption of Mt. Pelée on the French-Caribbean island of Martinique on 8 May 1902. This same eruption completely flattened an entire city, the "Paris of the West Indies", St. Pierre , and killed an estimated 30,000–40,000 people. 1 Saint-Pierre and the eruption 2 With the circus 3...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search For other theorems named after Pierre de Fermat, see Fermat's theorem . Fermat's little theorem states that if p is a prime number , then for any integer a , the number a p − a is an integer multiple of p . In the notation of modular arithmetic , this is expressed as a p ≡ ≡ a ( mod p ) . {\displaystyle a^{p}\equiv a{\pmod {p}}.} For example, if a = 2 and p = 7, 2 7 = 128, and 128 − 2 = 7 × 18 is an integer multiple of 7. If a is not divisible by p , Fermat's little theorem is equivalent to the statement that a p − 1 − 1 is an integer multiple of p , or in symbols a p − − 1 ≡ ≡ 1 ( mod p ) . {\displaystyle a^{p-1}\equiv 1{\pmod {p}}.} [1] [2] For example, if a = 2 and p = 7 then 2 6 = 64 and 64 − 1 = 63 is thus a multiple of 7....
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search In group theory , a branch of mathematics, the baby-step giant-step is a meet-in-the-middle algorithm for computing the discrete logarithm . The discrete log problem is of fundamental importance to the area of public key cryptography . Many of the most commonly used cryptography systems are based on the assumption that the discrete log is extremely difficult to compute; the more difficult it is, the more security it provides a data transfer. One way to increase the difficulty of the discrete log problem is to base the cryptosystem on a larger group. 1 Theory 2 The algorithm 2.1 C algorithm with the GNU MP lib 3 In practice 4 Notes 5 References Theory [ edit ] The algorithm is based on a space-time tradeoff . It is a fairly simple modification of trial multiplication, the n...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search This article provides insufficient context for those unfamiliar with the subject . Please help improve the article with a good introductory style . (October 2009) ( Learn how and when to remove this template message ) The Fiat–Shamir heuristic is a technique in cryptography for taking an interactive proof of knowledge and creating a digital signature based on it. This way, some fact (for example, knowledge of a certain number secret to the public) can be proven without revealing underlying information. The technique is due to Fiat and Shamir (1986). [1] The original interactive proof must have the property of being public-coin , for the method to work. For the algorithm specified below, a reader should be familiar with the laws of modular arithmetic , especially with multiplicative...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search Non-interactive zero-knowledge proofs are a variant of zero-knowledge proofs in which no interaction is necessary between prover and verifier. Blum , Feldman, and Micali [1] showed that a common reference string shared between the prover and the verifier is enough to achieve computational zero-knowledge without requiring interaction. Goldreich and Oren [2] gave impossibility results for one shot zero-knowledge protocols in the standard model . In 2003, Goldwasser and Kalai published an instance of an identification scheme for which any hash function will yield an insecure digital signature scheme. [3] These results are not contradictory, as the impossibility result of Goldreich and Oren does not hold in the common reference string model or the random oracle model . Non-interactive zero-know...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search A data lake is a method of storing data within a system or repository, in its natural format, [1] that facilitates the collocation of data in various schemata and structural forms, usually object blobs or files. 1 Invention 2 Characteristics 3 Examples 4 Criticism 5 References Invention [ edit ] James Dixon, then chief technology officer at Pentaho coined the term [2] to contrast it with data mart , which is a smaller repository of interesting attributes extracted from raw data. [3] He argued that data marts have several inherent problems, and that data lakes are the optimal solution. These problems are often referred to as information siloing . PricewaterhouseCoopers said that data lakes could "put an end to data silos. [4] In their study on data lakes they noted that enterpr...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search For the 2011 film, see Margin Call (film) . This article needs attention from an expert on the subject . Please add a reason or a talk parameter to this template to explain the issue with the article. Consider associating this request with a WikiProject . (April 2012) In finance , margin is collateral that the holder of a financial instrument has to deposit with a counterparty (most often their broker or an exchange ) to cover some or all of the credit risk the holder poses for the counterparty. This risk can arise if the holder has done any of the following: Borrowed cash from the counterparty to buy financial instruments, Borrowed financial instruments to sell them short , or Entered into a derivative contract. The collateral for a margin account can be the cash deposited in th...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search This article is about the corporate organizations that built the UNIVAC lines of mainframe computers. For the original UNIVAC computer, see UNIVAC I . UNIVAC is the name of a line of electronic digital stored-program computers starting with the products of the Eckert-Mauchly Computer Corporation . Later the name was applied to a division of the Remington Rand company and successor organizations. UNIVAC is an acronym for UNIV ersal A utomatic C omputer. The BINAC , built by the Eckert-Mauchly Computer Corporation, was the first general-purpose computer for commercial use. The descendants of the later UNIVAC 1107 continue today as products of the Unisys company. 1 Univac history and structure 2 Models 3 Operating systems 4 Trademark 5 See also 6 References 7 External links Un...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search For other uses, see Enso (disambiguation) . Ensō (c. 2000) by Kanjuro Shibata XX . Some artists draw ensō with an opening in the circle, while others close the circle. In Zen Buddhism , an ensō ( 円 相 , , "circle" ? ) is a circle that is hand-drawn in one or two uninhibited brushstrokes to express a moment when the mind is free to let the body create. The ensō symbolizes absolute enlightenment , strength, elegance, the universe, and mu (the void). It is characterised by a minimalism born of Japanese aesthetics . Drawing ensō is a disciplined-creative practice of Japanese ink painting— sumi-e ( 墨絵 , "ink painting" ? ) . The tools and mechanics of drawing the ensō are the same as those used in traditional Japanese calligraphy : One uses a brush ( 筆 , fude ? ) to apply ink to wash...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search Chromium Embedded Framework Developer(s) Marshall Greenblatt Initial release June 1, 2009 ; 7 years ago ( 2009-06-01 ) Stable release 55.2883 and 54.2840 [1] / November 18, 2016 ; 32 days ago ( 2016-11-18 ) Development status Active Written in C++ Operating system Windows Linux Mac OS X Type Framework , Web browser License New BSD License (see BSD licenses ) Website bitbucket .org /chromiumembedded /cef Free software portal The Chromium Embedded Framework (CEF) is an open source framework for embedding a web browser engine based on the Chromium core. It is a convenient way to add web browser control and implement an HTML5 -based layout GUI in a desktop application or to provide web browser capabilities to a software application or game , an...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search This article needs additional citations for verification . Please help improve this article by adding citations to reliable sources . Unsourced material may be challenged and removed. (June 2009) ( Learn how and when to remove this template message ) In the history of cryptography , the Nihilist cipher is a manually operated symmetric encryption cipher originally used by Russian Nihilists in the 1880s to organize terrorism against the tsarist regime. The term is sometimes extended to several improved algorithms used much later for communication by the First Chief Directorate with its spies . 1 Description 1.1 Example 2 Nihilist cryptanalysis 3 Later variants or derivatives 4 See also 5 References 6 External links Description [ edit ] First the encipherer constr...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search Paxos is a family of protocols for solving consensus in a network of unreliable processors. Consensus is the process of agreeing on one result among a group of participants. This problem becomes difficult when the participants or their communication medium may experience failures. [1] Consensus protocols are the basis for the state machine replication approach to distributed computing, as suggested by Leslie Lamport [2] and surveyed by Fred B. Schneider . [3] State machine replication is a technique for converting an algorithm into a fault-tolerant, distributed implementation. Ad-hoc techniques may leave important cases of failures unresolved. The principled approach proposed by Lamport et al. ensures all cases are handled safely. The Paxos protocol was first published in 1989 and named a...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search This article documents a current event . Information may change rapidly as the event progresses, and initial news reports may be unreliable . The last updates to this article may not reflect the most current information. ( Learn how and when to remove this template message ) 2016 Berlin attack The Berlin Christmas market in 2009. The attack occurred outside the Kaiser Wilhelm Memorial Church . Coordinates 52°30′18.0″N 13°20′11.0″E / 52.505000°N 13.336389°E / 52.505000; 13.336389 Coordinates : 52°30′18.0″N 13°20′11.0″E / 52.505000°N 13.336389°E / 52.505000; 13.336389 Date 19 December 2016 ( 2016-12-19 ) circa 20:00 CET Attack type Vehicular assault Deaths 10+ [1] Non-fatal injuries 50+ [2] On 19 December 2016 at about 20:00 local time, a...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search "Byzantine generals" redirects here. For actual military generals of the Byzantine empire, see Category:Byzantine generals . In fault-tolerant computer systems , and in particular distributed computing systems, Byzantine fault tolerance is the characteristic of a system that tolerates the class of failures known as the Byzantine Generals' Problem , [1] which is a generalized version of the Two Generals' Problem - for which there is an unsolvability proof. Byzantine failures are considered the most general and most difficult class of failures among the failure modes . So called fail-stop failure mode occupies the simplest end of the spectrum. Whereas fail-stop failure model simply means that the only way to fail is a node crash, detected by other nodes, Byzantine failures imply no restricti...
CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search For Lascaux in the Corrèze department, see Lascaux, Corrèze . UNESCO World Heritage Site Lascaux Name as inscribed on the World Heritage List Location near Dordogne Type Cultural Reference 85 Inscription history Inscription 1979 (3rd Session ) Cave painting of aurochs , horses, and deer at Lascaux Lascaux (Lascaux Caves) ( English / l æ s ˈ k oʊ / , [1] French: [lasko] [2] ) is the setting of a complex of caves in southwestern France famous for its Paleolithic cave paintings . The original caves are located near the village of Montignac , in the department of Dordogne . They contain some of the best-known Upper Paleolithic art. These paintings are estimated to be circa 17,300 years old. [ citation needed ] They primarily consist of images of large animal...