ClockA clock or chronometer is a device used to measure and indicate time. The clock is one of the oldest human inventions, meeting the need to measure intervals of time shorter than the natural units such as the day, the lunar month, and the year. Devices operating on several physical processes have been used over the millennia. Some predecessors to the modern clock may be considered "clocks" that are based on movement in nature: A sundial shows the time by displaying the position of a shadow on a flat surface.
Electric clockAn electric clock is a clock that is powered by electricity, as opposed to a mechanical clock which is powered by a hanging weight or a mainspring. The term is often applied to the electrically powered mechanical clocks that were used before quartz clocks were introduced in the 1980s. The first experimental electric clocks were constructed around the 1840s, but they were not widely manufactured until mains electric power became available in the 1890s. In the 1930s, the synchronous electric clock replaced mechanical clocks as the most widely used type of clock.
Proactive cyber defenceProactive cyber defence, means acting in anticipation to oppose an attack through cyber and cognitive domains. Proactive cyber defence can be understood as options between offensive and defensive measures. It includes interdicting, disrupting or deterring an attack or a threat's preparation to attack, either pre-emptively or in self-defence. Proactive cyber defence differs from active defence, in that the former is pre-emptive (does not waiting for an attack to occur).
Performative utteranceIn the philosophy of language and speech acts theory, performative utterances are sentences which not only describe a given reality, but also change the social reality they are describing. In a 1955 lecture series, later published as How to Do Things with Words, J. L. Austin argued against a positivist philosophical claim that the utterances always "describe" or "constate" something and are thus always true or false.
CyberwarfareCyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare. There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists. One view is that the term is a misnomer since no cyber attacks to date could be described as a war.
Key (cryptography)A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be different sizes and varieties, but in all cases, the strength of the encryption relies on the security of the key being maintained. A key's security strength is dependent on its algorithm, the size of the key, the generation of the key, and the process of key exchange.
Pendulum clockA pendulum clock is a clock that uses a pendulum, a swinging weight, as its timekeeping element. The advantage of a pendulum for timekeeping is that it is an approximate harmonic oscillator: It swings back and forth in a precise time interval dependent on its length, and resists swinging at other rates. From its invention in 1656 by Christiaan Huygens, inspired by Galileo Galilei, until the 1930s, the pendulum clock was the world's most precise timekeeper, accounting for its widespread use.
PerformativityPerformativity is the concept that language can function as a form of social action and have the effect of change. The concept has multiple applications in diverse fields such as anthropology, social and cultural geography, economics, gender studies (social construction of gender), law, linguistics, performance studies, history, management studies and philosophy. The concept is first described by philosopher of language John L. Austin when he referred to a specific capacity: the capacity of speech and communication to act or to consummate an action.
Precision Time ProtocolThe Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a local area network, it achieves clock accuracy in the sub-microsecond range, making it suitable for measurement and control systems. PTP is employed to synchronize financial transactions, mobile phone tower transmissions, sub-sea acoustic arrays, and networks that require precise timing but lack access to satellite navigation signals. The first version of PTP, IEEE 1588-2002, was published in 2002.
Cyber spyingCyber spying, cyber espionage, or cyber-collection is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information using methods on the Internet, networks or individual computers through the use of proxy servers, cracking techniques and malicious software including Trojan horses and spyware. Cyber espionage can be used to target various actors- individuals, competitors, rivals, groups, governments, and others- in order to obtain personal, economic, political or military advantages.