Rich Internet ApplicationA Rich Internet Application (also known as a rich web application, RIA or installable Internet application) is a web application that has many of the characteristics of desktop application software. The concept is closely related to a single-page application, and may allow the user interactive features such as drag and drop, background menu, WYSIWYG editing, etc. The concept was first introduced in 2002 by Macromedia to describe Macromedia Flash MX product (which later became Adobe Flash).
Data analysisData analysis is the process of inspecting, cleansing, transforming, and modeling data with the goal of discovering useful information, informing conclusions, and supporting decision-making. Data analysis has multiple facets and approaches, encompassing diverse techniques under a variety of names, and is used in different business, science, and social science domains. In today's business world, data analysis plays a role in making decisions more scientific and helping businesses operate more effectively.
Self-replicating spacecraftThe concept of self-replicating spacecraft, as envisioned by mathematician John von Neumann, has been described by futurists including physicist Michio Kaku and discussed across a wide breadth of hard science fiction novels and stories. Self-replicating probes are sometimes referred to as von Neumann probes. Self-replicating spacecraft would in some ways either mimic or echo the features of living organisms or viruses.
AbuseAbuse is the improper usage or treatment of a thing, often to unfairly or improperly gain benefit. Abuse can come in many forms, such as: physical or verbal maltreatment, injury, assault, violation, rape, unjust practices, crimes, or other types of aggression. To these descriptions, one can also add the Kantian notion of the wrongness of using another human being as means to an end rather than as ends in themselves. Some sources describe abuse as "socially constructed", which means there may be more or less recognition of the suffering of a victim at different times and societies.
Copyright law of CanadaThe copyright law of Canada governs the legally enforceable rights to creative and artistic works under the laws of Canada. Canada passed its first colonial copyright statute in 1832 but was subject to imperial copyright law established by Britain until 1921. Current copyright law was established by the Copyright Act of Canada which was first passed in 1921 and substantially amended in 1988, 1997, and 2012. All powers to legislate copyright law are in the jurisdiction of the Parliament of Canada by virtue of section 91(23) of the Constitution Act, 1867.
Computer security modelA computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical grounding at all. A computer security model is implemented through a computer security policy. For a more complete list of available articles on specific security models, see . Access control list (ACL) Attribute-based access control (ABAC) Bell–LaPadula model Biba mo
Cross-site scriptingCross-site scripting (XSS) is a type of security vulnerability that can be found in some web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy. Cross-site scripting carried out on websites accounted for roughly 84% of all security vulnerabilities documented by Symantec up until 2007.
Gray gooGray goo (also spelled as grey goo) is a hypothetical global catastrophic scenario involving molecular nanotechnology in which out-of-control self-replicating machines consume all biomass on Earth while building many more of themselves, a scenario that has been called ecophagy . The original idea assumed machines were designed to have this capability, while popularizations have assumed that machines might somehow gain this capability by accident.
Psychological abusePsychological abuse, often called emotional abuse, is a form of abuse characterized by a person subjecting or exposing another person to a behavior that may result in psychological trauma, including anxiety, chronic depression, or post-traumatic stress disorder. It is often associated with situations of power imbalance in abusive relationships, and may include bullying, gaslighting, and abuse in the workplace.
Disk mirroringIn data storage, disk mirroring is the replication of logical disk volumes onto separate physical hard disks in real time to ensure continuous availability. It is most commonly used in RAID 1. A mirrored volume is a complete logical representation of separate volume copies. In a disaster recovery context, mirroring data over long distance is referred to as storage replication. Depending on the technologies used, replication can be performed synchronously, asynchronously, semi-synchronously, or point-in-time.