-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathindex.html
698 lines (694 loc) · 57.5 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="WRIO Internet OS hub">
<meta name="author" content="webRunes">
<meta name="keywords" content="WRIO Internet OS, semantic, web 3.0, secure, decentralization">
<title>WRIO Internet OS</title>
<script type="application/ld+json">
{
"@context": "https://schema.org",
"@type": "ItemList",
"name": "WRIO Internet OS cover and offer list",
"itemListElement": [
{
"@type": "ItemList",
"name": "Cover",
"description": "WRIO Internet OS cover list",
"image": "https://wrioos.com/img/cover1-200x200.jpg",
"url": "https://wrioos.com/cover/?cover"
},
{
"@type": "ItemList",
"name": "Offer",
"description": "WRIO Internet OS offer list",
"image": "https://wrioos.com/img/offer-development-200x200.jpg",
"url": "https://wrioos.com/offer/?cover"
}
]
}
</script>
<script type="application/ld+json">
{
"@context": "https://schema.org",
"@type": "Article",
"inLanguage": "En",
"keywords": "WRIO Internet OS, semantic, web 3.0, secure, decentralization",
"name": "WRIO Internet OS",
"about": "WRIO Internet OS, or simple WRIO OS is a cloud service with open source code, designed to navigate through decentralized, semantic and secure Internet. Some call it Web 3.0, and it is an evolutionary replacement of today’s Web 2.0. The project is based on blockchain technology enhanced with the functionality of a Intelligent Assistant.",
"articleBody": [
"/* Disclaimer: This White Paper is intended for general readers. You do not need to be sound on how the Internet works to understand underlying concepts. However, those readers that wish to go deeply into the technicals can find more details in “WRIO OS Architecture” section of this book.",
"/* The project is in the initial stage of development. The functions described below will be added as it progresses."
],
"hasPart": [
{
"@type":"SocialMediaPosting",
"datePublished":"2016-11-21T19:08:20.000Z",
"headline":"WRIO Internet OS Pitch Deck",
"sharedContent":{
"@type":"WebPage",
"url":"https://www.youtube.com/watch?v=ntQulTFH7hk"
}
},
{
"@type": "Article",
"name": "About",
"articleBody": [
"WRIO Internet OS, or simply WRIO OS, is your window to the world of decentralized, semantic and secure Internet based on the blockchain technology, with the function of Intelligent Assistant. The name originates from the acronym of “webRunes Input/Output Internet Operating System”, and it intends to replace desktop OS’s in the future.",
"At the dawn of the computer era, due to the stand-alone nature of computers there was a need in desktop operating systems. Now, at the Internet age, we have an opportunity to use network resources, which contributed to the rise of numerous cloud services such as Dropbox or Netflix. Web-technologies provide an opportunity to get rid of the necessity to install desktop applications, yet WRIO OS goes even further: by developing and uniting cloud services we arrive at the situation when we do not need the desktop OS at all. Access to the Internet allows to replace it with just a browser thus excluding the need in powerful processors and large memory size, and broadband access does the same for high capacity HDDs.",
"There were many attempts to develop a web based OS. However, those were a copy of desktop OS, which resulted in the development of a system designed to perform cloud tasks through the desktop approach, and, consequently, such attempts failed.",
"In order to understand why it happened, we will consider two cases: operation of a desktop OS and WRIO OS. Each modern device (computer, smartphone, tablet and etc.) has an operating system, such as Windows or Linux. All these OSs differ greatly but have the same weak points: they become morally obsolete, need to be updated, have their own sets of drivers, low or no compatibility with each other; certain technical knowledge is required to be able to install, setup or repair them; they are vulnerable to viruses, key loggers and other malware, and etc. The only their advantage is that they do not require Internet for operation, that is they are stand-alone. Yet, it is no secret that every day more and more people solve their professional and personal tasks just using a browser. Going on with using a desktop OS we add a set of Internet threats to the problems mentioned above: malware scripts, fraud and phishing, the risk of losing access to numerous accounts of various services due to the absence of transferability – we have to register in each and every new service over and over again. The problem was to a certain extent solved by logins through social media, but this leads to a greater risk – our private data no longer belong to us: social media sell them to third parties and transfer to government entities. Fortunately, day by day more and more people become concerned and begin to understand that the loss of control over personal data will lead to the loss of freedom.",
"WRIO Internet OS deals with the mentioned problems, and in subsequent chapters we will consistently describe the solution of each of them. For now it shall be noted that desktop OSs may and shall be replaced with web-OSs resulting in the creation of simple, and hence more reliable, cost-cutting and affordable devices with a minimalistic and lightweight operational system being merely a browser. Such systems will weigh just dozens of megabytes, i.e. hundreds or thousands of times less than today’s desktop monsters. Instant boot, minimal or no need in updates aside from pure browser updates, reliability and maximum protection due to the ability to load in a virtual container will be key features of such systems.",
"WRIO OS is an easy to use shell organized as a set of web-applications functioning as desktop programs. The user’s ability to pick up a completely customized set of web-applications will result in the change of the Internet paradigm and birth of a user-centered web. A system of such kind will always stay up-to-date and will not require any technical expertise to install or setup, while access to the personal cloud from any device using a multi-factor authentication will solve the problem of personal data loss or theft.",
"User data protection is one of the key priorities of WRIO OS: the universal use of cryptography and encryption along with the provision of anonymity will ensure maximum security. And the symbiosis with various anonymous networks will enable the use of advanced technologies without the need to understand them.",
"WRIO OS is an isomorphic JavaScript application. These are advanced systems that work equally well both on a client and a server. Such adaptive applications can actualize various levels of client-server processing depending on the channel width and client capacities. In our case we go beyond the approach described in the link above. There is no need to divide transferred data into data for users and search bots.",
"WRIO OS is not just a cloud OS. It creates a peer-to-peer distributed system and utilizes computing power of all consolidated computers, providing user only with the results of data processing and computations.",
"It shall be noted that despite of the fact that the system requires an access to the Internet to ensure its fully-featured operation, WRIO OS can be also used offline to a limited extent: reading of earlier downloaded news, viewing of video clips, listening to music, management of documents with subsequent synchronization online, and some other functions. With each passing day Internet infrastructure’s cost goes down while its quality goes up, thus the problem with access to the Internet is diminished.",
"Not only WRIO OS paves a way into the future where any device will have just a browser installed, but also, which is more important, it will change the Internet and will bring it to a brand new level that some call web 3.0 or semantic web. Instead of today's obsolete sites we work with pure semantic data and personalized recommendation system, and blockchain performs the function of a generally available and uncensored global catalogue. Web 3.0 will lead to the Internet-of-Things.",
"The WRIO OS’s support of third-party sites 2.0 will help to ensure a phased transition to the new level, and the semantic web revolution will pass unnoticed by the majority of users as a smooth evolution."
]
},
{
"@type": "Article",
"name": "Mission",
"articleBody": [
"Nowadays Internet is marked by a number of drawbacks. The most significant of them is its centralized nature, which makes the Internet exposed to restrictions and censorship on the part of corporations and governments. The mixing of data and representation results in technical flaws. Apart from the data you may need, every web-page contains an “envelope” – the rules that a browser uses to interpret how the page shall be displayed. As the Internet developed, such envelopes became so heavy that useful data sometimes accounts for only 5-10% of a page size. At first glance this may seem unimportant, though the page size not only influences the cost of Internet-services (which may be essential in case of mobile Internet), but also has a direct effect on the download speed, and therefore your latency time. The mixing of data and representation makes computer parsing significantly more complex and hinders the sorting and cataloging of information by search engines, which undermines the accuracy and relevancy of their responses to your search queries. Unfortunately, Internet pages look like a mish-mash, from which it is difficult for search engines to withdraw data. The result is that the Internet lacks what it was originally planned for by the web inventor Tim Berners-Lee – semantics.",
"WRIO OS is meant to rectify the above mentioned flaws and is committed to achieve the following goals:",
"* the Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries. The term was coined by Tim Berners-Lee for a web of data that can be processed by machines (Wikipedia). Such a Web will allow users to find the appropriate information with ease and accuracy unavailable nowadays. Semantics leads to another important feature – openness",
"* the openness enables an unrestricted reading of data stored on third-party servers. It means the use of data from the original sources without a need in multiple duplication and loss of consistency. Today data are secured. That is if you want to use them on your own page, you either need to copy them, or obtain them through API, which is often means technical or financial restrictions. Besides, there might be problems with the hated-by-all-free-Internet copyright, which will be discussed separately in the Open Copyright section",
"* decentralization. In its turn the web openness allows to create a decentralized Internet, which will not only provide a free access to information, but will also terminate corporations’ and social media’s control over public user data. If you consider that being a phony issue and cling to the notion that you are of no importance, then read “Alternative: I Have Nothing to Hide” section of the book",
"* the decentralization also means the immunity to persistent control and censorship attempts on the part of the government, as well as mass surveillance",
"* security. Every time you visit an unfamiliar website you take the risk of running into spam, viruses, malware, and other Internet threats. This is all because the code embedded into web-pages, apart from adding interactivity and functionality, may pose a threat, download and run abusers’ programs. Security issues and how WRIO OS can help to deal with them will be discussed in a separate chapter",
"These are not all the drawbacks of the nowadays Internet that we described. More of them are consistently discussed in the following chapters. For now it is just worthwhile to note that solving any of the problems opens new opportunities for us as users. And every chapter read will provide new details on how young the Internet still is, that we are yet at the beginning of its development, and the potential of this great invention is far from being fully unleashed. The book describes a number of different wondrous technologies that will help to bring the web to a whole new level; it will show what can become of it, what is required, what effect it will have, and how it will eventually change each of us, the society and the world in general."
]
},
{
"@type": "Article",
"name": "Features",
"articleBody": [
"Coming."
]
},
{
"@type": "Article",
"name": "How it works",
"articleBody": [
"Coming."
]
}
],
"mentions": [
{
"@type": "Article",
"name": "",
"about": "A white paper is an authoritative report or guide that informs readers concisely about a complex issue and presents the issuing body's philosophy on the matter. It is meant to help readers understand an issue, solve a problem, or make a decision.",
"url": "https://en.wikipedia.org/wiki/White_paper?'White Paper':3,20,external"
},
{
"@type": "Article",
"name": "WRIO OS Architecture",
"about": "No info yet.",
"url": "#?'WRIO OS Architecture':3,247"
},
{
"@type": "Article",
"name": "",
"about": "Internet operating system, or Internet OS, is a term used in the computer industry to refer to any type of operating system designed to run all of its applications and services through an Internet client, generally a web browser.",
"url": "https://en.wikipedia.org/wiki/Internet_OS?'Internet OS':5,5,external"
},
{
"@type": "Article",
"name": "",
"about": "A decentralised system in systems theory is a system in which lower level components operate on local information to accomplish global goals. The global pattern of behaviour is an emergent property of dynamical mechanisms that act upon local components, such as indirect communication, rather than the result of a central ordering influence.",
"url": "https://en.wikipedia.org/wiki/Decentralised_system?'decentralized':5,68,external"
},
{
"@type": "Article",
"name": "",
"about": "The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries. The term was coined by Tim Berners-Lee for a web of data that can be processed by machines.",
"url": "https://en.wikipedia.org/wiki/Semantic_Web?'semantic':5,83,external"
},
{
"@type": "Article",
"name": "security",
"about": "No info yet.",
"url": "#?'secure':3,96"
},
{
"@type": "Article",
"name": "",
"about": "A blockchain — originally, block chain — is a distributed database that maintains a continuously-growing list of data records hardened against tampering and revision. It consists of data structure blocks—which hold exclusively data in initial blockchain implementations, and both data and programs in some of the more recent implementations—with each block holding batches of individual transactions and the results of any blockchain executables. Each block contains a timestamp and information linking it to a previous block.",
"url": "https://en.wikipedia.org/wiki/Blockchain_(database)?'blockchain technology':5,125,external"
},
{
"@type": "Article",
"name": "",
"about": "No info yet.",
"url": "https://ia.wrioos.com/?'Intelligent Assistant':5,169"
},
{
"@type": "Article",
"name": "",
"about": "An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs. The operating system is a component of the system software in a computer system. Application programs usually require an operating system to function.",
"url": "https://en.wikipedia.org/wiki/Operating_system?'desktop operating systems':6,96,external"
},
{
"@type": "Article",
"name": "",
"about": "Cloud computing is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services), which can be rapidly provisioned and released with minimal management effort. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. It relies on sharing of resources to achieve coherence and economy of scale, similar to a utility (like the electricity grid) over a network.",
"url": "https://en.wikipedia.org/wiki/Cloud_computing?'cloud services':6,240,external"
},
{
"@type": "Article",
"name": "Scenario 5",
"about": "No info yet.",
"url": "#?'high capacity HDDs':6,699"
},
{
"@type": "Article",
"name": "",
"about": "In computing, a web application or web app is a client–server software application which the client (or user interface) runs in a web browser.",
"url": "https://en.wikipedia.org/wiki/Web_application?'web based OS':7,38,external"
},
{
"@type": "Article",
"name": "",
"about": "In computing, a device driver (commonly referred to as a driver) is a computer program that operates or controls a particular type of device that is attached to a computer. A driver provides a software interface to hardware devices, enabling operating systems and other computer programs to access hardware functions without needing to know precise details of the hardware being used.",
"url": "https://en.wikipedia.org/wiki/Device_driver?'drivers':8,350,external"
},
{
"@type": "Article",
"name": "",
"about": "Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.",
"url": "https://en.wikipedia.org/wiki/Malware?'malware':8,539,external"
},
{
"@type": "Article",
"name": "",
"about": "Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.",
"url": "https://en.wikipedia.org/wiki/Phishing?'phishing':8,913,external"
},
{
"@type": "Article",
"name": "",
"about": "Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by governments or governmental organisations, but may also be carried out by corporations, either on behalf of governments or at their own initiative. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies.",
"url": "https://en.wikipedia.org/wiki/Mass_surveillance?'transfer to government entities':8,1296,external"
},
{
"@type": "Article",
"name": "",
"about": "The nothing to hide argument states that government surveillance programs do not threaten privacy unless they uncover illegal activities, and that if they do uncover illegal activities, the person committing these activities does not have the right to keep them private. Hence, a person who favors this argument may state “I've got nothing to hide” and therefore does not express opposition to government surveillance. An individual using this argument may say that a person should not have worries about government or surveillance if he/she has “nothing to hide.”",
"url": "https://en.wikipedia.org/wiki/Nothing_to_hide_argument?'loss of freedom':8,1476,external"
},
{
"@type": "Article",
"name": "A user-centered web",
"about": "No info yet.",
"url": "#?'a user-centered web':10,272"
},
{
"@type": "Article",
"name": "",
"about": "The dark web is the World Wide Web content that exists on darknets, overlay networks which use the public Internet but which require specific software, configurations or authorization to access. The dark web forms a small part of the deep web, the part of the Web not indexed by search engines, although sometimes the term “deep web” is confusingly used to refer specifically to the dark web.",
"url": "https://en.wikipedia.org/wiki/Semantic_Web#Web_3.0?'symbiosis with various anonymous networks':11,187,external"
},
{
"@type": "Article",
"name": "Isomorphic JavaScript Applications — the Future of the Web?",
"about": "One of the best known mottos around the web is Java’s Write once, run everywhere. But does this motto apply to Java only? Can we use it to describe JavaScript too? The answer is Yes.",
"url": "http://www.sitepoint.com/isomorphic-javascript-applications/?'isomorphic JavaScript application':12,14,external"
},
{
"@type": "Article",
"name": "",
"about": "Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or work loads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes.",
"url": "https://en.wikipedia.org/wiki/Peer-to-peer?'peer-to-peer':13,45,external"
},
{
"@type": "Article",
"name": "",
"about": "No info yet.",
"url": "#?'data processing and computations':13,177"
},
{
"@type": "Article",
"name": "Web 3.0",
"about": "People keep asking what Web 3.0 is. I think maybe when you've got an overlay of scalable vector graphics – everything rippling and folding and looking misty – on Web 2.0 and access to a semantic Web integrated across a huge space of data, you'll have access to an unbelievable data resource … — Tim Berners-Lee, 2006.",
"url": "https://en.wikipedia.org/wiki/Semantic_Web#Web_3.0?'веб 3.0':15,215,external"
},
{
"@type": "Article",
"name": "Personalized recommendation system",
"about": "No info yet.",
"url": "#?'personalized recommendation system':15,310"
},
{
"@type": "Article",
"name": "",
"about": "The internet of things (IoT) is the network of physical devices, vehicles, buildings and other items—embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data.",
"url": "https://en.wikipedia.org/wiki/Internet_of_things?'Internet-of-Things':15,466,external"
},
{
"@type": "Article",
"name": "Websites 2.0",
"about": "No info yet.",
"url": "#?'sites 2.0':16,37"
},
{
"@type": "Article",
"name": "",
"about": "Parsing or syntactic analysis is the process of analysing a string of symbols, either in natural language or in computer languages, conforming to the rules of a formal grammar. The term parsing comes from Latin pars (orationis), meaning part (of speech).",
"url": "https://en.wikipedia.org/wiki/Parsing?'parsing':18,865,external"
},
{
"@type": "Article",
"name": "",
"about": "Sir Timothy John Berners-Lee (born 8 June 1955), also known as TimBL, is an English computer scientist, best known as the inventor of the World Wide Web.",
"url": "https://en.wikipedia.org/wiki/Tim_Berners-Lee?'Tim Berners-Lee':18,1270,external"
},
{
"@type": "Article",
"name": "",
"about": "The Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries. The term was coined by Tim Berners-Lee for a web of data that can be processed by machines.",
"url": "https://en.wikipedia.org/wiki/Semantic_Web?'Semantic Web':20,6,external"
},
{
"@type": "Article",
"name": "Connectivity",
"about": "No info yet.",
"url": "#?'use of data from the original sources':21,99"
},
{
"@type": "Article",
"name": "",
"about": "In computer programming, an application programming interface (API) is a set of routine definitions, protocols, and tools for building software and applications.",
"url": "https://en.wikipedia.org/wiki/Application_programming_interface?'API':21,328,external"
},
{
"@type": "Article",
"name": "",
"about": "No description yet.",
"url": "https://opencopyright.wrioos.com/?'Open Copyright':21,514"
},
{
"@type": "Article",
"name": "",
"about": "No description yet.",
"url": "#?'Alternative: I Have Nothing to Hide':22,345"
},
{
"@type": "Article",
"name": "",
"about": "Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by governments or governmental organisations, but may also be carried out by corporations, either on behalf of governments or at their own initiative. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies.",
"url": "https://en.wikipedia.org/wiki/Mass_surveillance?'mass surveillance':23,135,external"
},
{
"@type": "Article",
"name": "",
"about": "Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.",
"url": "https://en.wikipedia.org/wiki/Malware?'malware':24,104,external"
},
{
"@type": "Article",
"name": "Security",
"about": "No description yet.",
"url": "#?'separate chapter':25,384"
},
{
"@type": "Article",
"name": "Облачные вычисления",
"about": "Информационно-технологическая концепция, подразумевающая обеспечение повсеместного и удобного сетевого доступа по требованию к общему пулу (англ. pool) конфигурируемых вычислительных ресурсов (например, сетям передачи данных, серверам, устройствам хранения данных, приложениям и сервисам — как вместе, так и по отдельности), которые могут быть оперативно предоставлены и освобождены с минимальными эксплуатационными затратами или обращениями к провайдеру.",
"url": "https://ru.wikipedia.org/wiki/Облачные_вычисления?'облачные вычисления':28,318,external"
},
{
"@type": "Article",
"name": "Mobile Overtakes Desktops in 2013: Microsoft Be Warned",
"about": "Time is ticking for Microsoft. With the sales of mobile devices having already overtaken PCs, the total number of in-use Internet-connected mobile devices will overtake desktop computers some time this year, and Microsoft is still fumbling in the mobile arena. If the company can't get mobile right, investors will pay the price for Microsoft's missteps.",
"url": "http://www.fool.com/investing/general/2013/01/19/mobile-overtakes-desktops-in-2013-microsoft-be-war.aspx?'Китае это произошло еще в 2013 году':29,237,external"
},
{
"@type": "Article",
"name": "Архитектура WRIO OS",
"about": "Описание архитектуры проекта.",
"url": "#?'Архитектура WRIO OS':29,688"
},
{
"@type": "Article",
"name": "Шифрование",
"about": "Описание.",
"url": "#?'Шифрование':32,412"
},
{
"@type": "Article",
"name": "IA — индивидуальный помощник",
"about": "Описание.",
"url": "https://ia.wrioos.com/ru/?'IA':33,317"
},
{
"@type": "Article",
"name": "Scale-free network",
"about": "A scale-free network is a network whose degree distribution follows a power law, at least asymptotically.",
"url": "https://en.wikipedia.org/wiki/Scale-free_network?'облачные вычисления':33,460,external"
},
{
"@type": "Article",
"name": "BitTorrent (протокол)",
"about": "Пиринговый (P2P) сетевой протокол для кооперативного обмена файлами через Интернет. Файлы передаются частями, каждый torrent-клиент, получая (скачивая) эти части, в то же время отдаёт (закачивает) их другим клиентам, что снижает нагрузку и зависимость от каждого клиента-источника и обеспечивает избыточность данных.",
"url": "https://ru.wikipedia.org/wiki/BitTorrent_(протокол)?'торрент-протокол':33,936,external"
},
{
"@type": "Article",
"name": "Агентство национальной безопасности",
"about": "Подразделение радиотехнической и электронной разведки Министерства обороны США, входящее в состав Разведывательного сообщества на правах независимого разведывательного органа.",
"url": "https://ru.wikipedia.org/wiki/Агентство_национальной_безопасности?'АНБ':34,50,external"
},
{
"@type": "Article",
"name": "Эдвард Сноуден",
"about": "Американский технический специалист и спецагент, бывший сотрудник ЦРУ и Агентства национальной безопасности (АНБ) США. В начале июня 2013 года Сноуден передал газетам The Guardian и The Washington Post секретную информацию АНБ, касающуюся тотальной слежки американских спецслужб за информационными коммуникациями между гражданами многих государств по всему миру при помощи существующих информационных сетей и сетей связи, включая сведения о проекте PRISM, а также X-Keyscore и Tempora.",
"url": "https://ru.wikipedia.org/wiki/Сноуден,_Эдвард?'Эдвардом Сноуденом':34,87,external"
},
{
"@type": "Article",
"name": "PROTECT IP Act",
"about": "Законопроект, цель которого — дать правительству США и владельцам авторских прав дополнительные инструменты для блокирования «жульнических сайтов, предлагающих контрафактные товары и нарушающих авторское право», в особенности зарегистрированных за пределами США.",
"url": "https://ru.wikipedia.org/wiki/PROTECT_IP_Act?'PIPA':34,156,external"
},
{
"@type": "Article",
"name": "Stop Online Piracy Act",
"about": "Законопроект расширяет возможности американских правоохранительных органов и правообладателей в борьбе с нелегальным контентом в Интернете, торговлей интеллектуальной собственностью, защищённой авторским правом, и контрафактом.",
"url": "https://ru.wikipedia.org/wiki/Stop_Online_Piracy_Act?'SOPA':34,163,external"
},
{
"@type": "Article",
"name": "Цепочка блоков транзакций",
"about": "Выстроенная по определённым правилам цепочка из формируемых блоков транзакций. Впервые термин появился как название распределённой базы данных, реализованной в криптовалюте «Биткойн».",
"url": "https://ru.wikipedia.org/wiki/Цепочка_блоков_транзакций?'блокчеин':35,140,external"
},
{
"@type": "Article",
"name": "Блокчеин-браузер",
"about": "Описание.",
"url": "#?'блокчеин-браузер':35,211"
},
{
"@type": "Article",
"name": "Taglang",
"about": "Описание.",
"url": "#?'Taglang':35,419"
},
{
"@type": "Article",
"name": "Рекомендательная система",
"about": "Описание.",
"url": "#?'рекомендательной системой':35,429"
},
{
"@type": "Article",
"name": "Поиск",
"about": "Описание.",
"url": "#?'поиска':35,526"
},
{
"@type": "Article",
"name": "Опасности социальных сетей",
"about": "Описание.",
"url": "#?'поговорим отдельно':36,123"
},
{
"@type": "Article",
"name": "Stream",
"about": "Описание.",
"url": "#?'поговорим отдельно':36,297"
},
{
"@type": "Article",
"name": "The Number of Active Websites on the Internet",
"about": "If you are running a blog or website, you must have wondered how big is the Internet and how many websites that we need to compete. When I create a new website, I often see it soon reaches the Alexa rank of over 27 millions and I thought that there are just above 30 million sites. However, according the a recent web server survey from Netcraft, the total number of active websites are much higher than we can imagine.",
"url": "http://www.techwalls.com/number-active-websites-on-internet-2011/?'постоянно увеличивается':36,483,external"
},
{
"@type": "Article",
"name": "Open Copyright",
"about": "Описание.",
"url": "https://opencopyright.wrioos.com/ru/?'Open Copyright':37,186"
},
{
"@type": "Article",
"name": "Донейты",
"about": "Описание.",
"url": "#?'микроплатежи':37,203"
},
{
"@type": "Article",
"name": "Общественное творчество",
"about": "Описание.",
"url": "#?'независимой культуры':37,346"
},
{
"@type": "Article",
"name": "Одноранговая сеть",
"about": "Это оверлейная компьютерная сеть, основанная на равноправии участников. Часто в такой сети отсутствуют выделенные серверы, а каждый узел (peer) является как клиентом, так и выполняет функции сервера. В отличие от архитектуры клиент-сервера, такая организация позволяет сохранять работоспособность сети при любом количестве и любом сочетании доступных узлов. Участниками сети являются пиры.",
"url": "https://ru.wikipedia.org/wiki/Одноранговая_сеть?'одноранговых сетей':38,13,external"
},
{
"@type": "Article",
"name": "Web of Trust",
"about": "In cryptography, a web of trust is a concept used in PGP, GnuPG, and other OpenPGP-compatible systems to establish the authenticity of the binding between a public key and its owner. Its decentralized trust model is an alternative to the centralized trust model of a public key infrastructure (PKI), which relies exclusively on a certificate authority (or a hierarchy of such). As with computer networks, there are many independent webs of trust, and any user (through their identity certificate) can be a part of, and a link between, multiple webs.",
"url": "https://en.wikipedia.org/wiki/Web_of_trust?'Web of Trust':38,304,external"
},
{
"@type": "Article",
"name": "Chrome OS",
"about": "Главной особенностью является доминирование веб-приложений над обычными функциями ОС. Ключевая роль при этом отводится браузеру. Стратегия создания нового продукта подразумевает архитектуру, нетребовательную к аппаратным ресурсам персонального компьютера, используемого для входа (log-in) в сеть Интернет.",
"url": "https://ru.wikipedia.org/wiki/Chrome_OS?'Chrome OS':39,286,external"
},
{
"@type": "Article",
"name": "Синергия",
"about": "Суммирующий эффект взаимодействия двух или более факторов, характеризующийся тем, что их действие существенно превосходит эффект каждого отдельного компонента в виде их простой суммы, эмерджентность.",
"url": "https://ru.wikipedia.org/wiki/Синергия?'нечто большее':39,551,external"
},
{
"@type": "Article",
"name": "Мэшап",
"about": "Это веб-приложение, объединяющее данные из нескольких источников в один интегрированный инструмент; например, при объединении картографических данных Google Maps с данными о недвижимости с Craigslist получается новый уникальный веб-сервис, изначально не предлагаемый ни одним из источников данных.",
"url": "https://ru.wikipedia.org/wiki/Мэшап_(веб)?'мэшап':39,637,external"
},
{
"@type": "Article",
"name": "Titter",
"about": "Описание.",
"url": "https://titter.wrioos.com/ru/?'Titter':39,716"
},
{
"@type": "Article",
"name": "webGold",
"about": "Описание.",
"url": "https://webgold.wrioos.com/ru/?'webGold':39,763"
},
{
"@type": "Article",
"name": "Share",
"about": "Описание.",
"url": "#?'Share':39,812"
},
{
"@type": "Article",
"name": "Эгоцентричный интернет",
"about": "Описание.",
"url": "#?'эгоцентричного веба':40,776"
},
{
"@type": "Article",
"name": "Модульный принцип",
"about": "Принцип модульности требует, чтобы каждый модуль в система имел чётко определенную функциональность и набор интерфейсов и мог быть легко и без непредвиденных побочных эффектов соединён с другими модулями системы.",
"url": "https://ru.wikipedia.org/wiki/Модульный_принцип?'модульного подхода':41,66,external"
},
{
"@type": "Article",
"name": "Создание независимой ноды",
"about": "Описание.",
"url": "#?'собственную независимую ноду':41,288"
},
{
"@type": "Article",
"name": "Принципы разработки",
"about": "Описание.",
"url": "https://webrunes.com/ru/#Принципы_разработки?'open source':41,334"
},
{
"@type": "Article",
"name": "Chrome OS",
"about": "Главной особенностью является доминирование веб-приложений над обычными функциями ОС. Ключевая роль при этом отводится браузеру. Стратегия создания нового продукта подразумевает архитектуру, нетребовательную к аппаратным ресурсам персонального компьютера, используемого для входа (log-in) в сеть Интернет.",
"url": "https://ru.wikipedia.org/wiki/Chrome_OS?'Chrome OS':42,375,external"
},
{
"@type": "Article",
"name": "Firefox OS",
"about": "Свободная операционная система, предназначенная для смартфонов и планшетных компьютеров.",
"url": "https://ru.wikipedia.org/wiki/Firefox_OS?'Firefox OS':42,387,external"
},
{
"@type": "Article",
"name": "Alternative",
"about": "Эксперементальный проект. Его цель — попытка предоставить децентрализованные решения в сфере финансов, бизнеса, законов и всех остальных сфер общества с минимальным, а в идеале вовсе без вмешательства государства.",
"url": "https://alternative.webrunes.org/ru/?'Alternative':43,424"
},
{
"@type": "Article",
"name": "Архитектура WRIO OS",
"about": "Описание архитектуры проекта.",
"url": "#?'Архитектура WRIO OS':47,118"
},
{
"@type": "Article",
"name": "HTML",
"about": "От англ. HyperText Markup Language — «язык гипертекстовой разметки» — стандартизированный язык разметки документов во Всемирной паутине. Большинство веб-страниц содержат описание разметки на языке HTML (или XHTML). Язык HTML интерпретируется браузерами; полученный в результате интерпретации форматированный текст отображается на экране монитора компьютера или мобильного устройства.",
"url": "https://ru.wikipedia.org/wiki/HTML?'HTML разметки':48,475,external"
},
{
"@type": "Article",
"name": "JavaScipt",
"about": "JavaScript обычно используется как встраиваемый язык для программного доступа к объектам приложений. Наиболее широкое применение находит в браузерах как язык сценариев для придания интерактивности веб-страницам.",
"url": "https://ru.wikipedia.org/wiki/JavaScipt?'JavaScipt':48,490,external"
},
{
"@type": "Article",
"name": "CSS",
"about": "Англ. Cascading Style Sheets — каскадные таблицы стилей — формальный язык описания внешнего вида документа, написанного с использованием языка разметки. Преимущественно используется как средство описания, оформления внешнего вида веб-страниц, написанных с помощью языков разметки HTML и XHTML, но может также применяться к любым XML-документам, например, к SVG или XUL.",
"url": "https://ru.wikipedia.org/wiki/CSS?'CSS':48,501,external"
},
{
"@type": "Article",
"name": "Мегабайт",
"about": "Единица измерения количества информации, обозначающая, в зависимости от контекста, 1 000 000 или 1 048 576 байт.",
"url": "https://ru.wikipedia.org/wiki/Мегабайт?'MB':48,688,external"
},
{
"@type": "Article",
"name": "Wikipedia:Stub",
"about": "A stub is an article deemed too short to provide encyclopedic coverage of a subject. The objective of this page is to provide a general guide for dealing with stubs.",
"url": "https://en.wikipedia.org/wiki/Wikipedia:Stub?'статью-заготовку':49,19,external"
},
{
"@type": "Article",
"name": "Кэш",
"about": "Промежуточный буфер с быстрым доступом, содержащий информацию, которая может быть запрошена с наибольшей вероятностью. Доступ к данным в кэше осуществляется быстрее, чем выборка исходных данных из более медленной памяти или удаленного источника, однако её объём существенно ограничен по сравнению с хранилищем исходных данных.",
"url": "https://ru.wikipedia.org/wiki/Кэш?'кэша':49,550,external"
},
{
"@type": "Article",
"name": "DPI",
"about": "Технология накопления статистических данных, проверки и фильтрации сетевых пакетов по их содержимому. В отличие от брандмауэров, Deep Packet Inspection анализирует не только заголовки пакетов, но и полное содержимое трафика на уровнях модели OSI со второго и выше. Deep Packet Inspection способно обнаруживать и блокировать вирусы, фильтровать информацию, не удовлетворяющую заданным критериям.",
"url": "https://ru.wikipedia.org/wiki/DPI?'DPI':52,434,external"
},
{
"@type": "Article",
"name": "Прокси-сервер",
"about": "Cервер (комплекс программ) в компьютерных сетях, позволяющий клиентам выполнять косвенные запросы к другим сетевым службам. Сначала клиент подключается к прокси-серверу и запрашивает какой-либо ресурс (например, e-mail), расположенный на другом сервере. Затем прокси-сервер либо подключается к указанному серверу и получает ресурс у него, либо возвращает ресурс из собственного кэша (в случаях, если прокси имеет свой кэш). В некоторых случаях запрос клиента или ответ сервера может быть изменён прокси-сервером в определённых целях. Прокси-сервер позволяет защищать компьютер клиента от некоторых сетевых атак и помогает сохранять анонимность клиента.",
"url": "https://ru.wikipedia.org/wiki/Прокси-сервер?'прокси-сервера':52,467,external"
},
{
"@type": "Article",
"name": "VPN",
"about": "Англ. Virtual Private Network — виртуальная частная сеть — обобщённое название технологий, позволяющих обеспечить одно или несколько сетевых соединений (логическую сеть) поверх другой сети (например, Интернет). Несмотря на то, что коммуникации осуществляются по сетям с меньшим или неизвестным уровнем доверия (например, по публичным сетям), уровень доверия к построенной логической сети не зависит от уровня доверия к базовым сетям благодаря использованию средств криптографии (шифрования, аутентификации, инфраструктуры открытых ключей, средств для защиты от повторов и изменений, передаваемых по логической сети сообщений).",
"url": "https://ru.wikipedia.org/wiki/VPN?'VPN':52,487,external"
},
{
"@type": "Article",
"name": "PROTECT IP Act",
"about": "Законопроект, цель которого — дать правительству США и владельцам авторских прав дополнительные инструменты для блокирования «жульнических сайтов, предлагающих контрафактные товары и нарушающих авторское право», в особенности зарегистрированных за пределами США.",
"url": "https://ru.wikipedia.org/wiki/PROTECT_IP_Act?'PIPA':53,202,external"
},
{
"@type": "Article",
"name": "Stop Online Piracy Act",
"about": "Законопроект расширяет возможности американских правоохранительных органов и правообладателей в борьбе с нелегальным контентом в Интернете, торговлей интеллектуальной собственностью, защищённой авторским правом, и контрафактом.",
"url": "https://ru.wikipedia.org/wiki/Stop_Online_Piracy_Act?'SOPA':53,209,external"
},
{
"@type": "Article",
"name": "The overweight web: Average web page size is up 15% in 2014",
"about": "Bigger isn’t better when it comes to web pages, but the internet has continued to put on weight this year. According to the 2014 report from the HTTP Archive, the average size of a web page is up 15 percent this year to 1,935Kb — just shy of 2Mb (or 2,048 Kb) per page. This includes an average of 95 HTTP pull requests per page.",
"url": "https://gigaom.com/2014/12/29/the-overweight-web-average-web-page-size-is-up-15-in-2014/?'The overweight web: Average web page size is up 15% in 2014':56,2,external"
}
],
"image": [
{
"@type": "ImageObject",
"author": "webRunes",
"contentUrl": "https://wrioos.com/img/standard_browsing.jpg?33,0",
"name": "Стандартная интернет-навигация",
"description": [
"Сегодняшняя типичная схема взаимодействия пользователя с сайтами выглядит так:",
"вебсайт 1: браузер пользователя отправляет запрос к сайту и последовательно получает разметку (HTML+UI), стили (CSS) и скрипты (JS), отвечающие за интерактивность взаимодействия. Сервисы зачастую предоставляют третьим сторонам личные данные пользователей.",
"вебсайт 2: сайты могут быть под контролем мошенников или содержать вредоносный код.",
"вебсайт 3: веб-ресурсы могут быть заблокированы провайдером."
]
},
{
"@type": "ImageObject",
"author": "webRunes",
"contentUrl": "https://wrioos.com/img/semantic_browsing.jpg?33,0",
"name": "Семантическая интернет-навигация",
"description": [
"Нет разделения на сайты и веб предоставляет собой единую взаимосвязанную семантическую сеть данных.",
"Данные могут быть зашифрованы пользователем и не доступны третьим сторонам и мошенникам.",
"Текстовая природа данных исключает возможность внедрения вредоносного кода при соблюдении некоторых условий.",
"Возможность создания собственной ноды позволяет обходить блокировку ресурсов даже в случае блокировки официальной WRIO ноды."
]
},
{
"@type": "ImageObject",
"author": "webRunes",
"contentUrl": "https://wrioos.com/img/wikipedia.png?49,0",
"name": "Википедия"
},
{
"@type": "ImageObject",
"contentUrl": "https://wrioos.com/img/control_of_internet_speech.jpg?54,0",
"name": "Контроль свободы слова"
}
],
"author": "",
"editor": "",
"comment": "798999643522813952"
}
</script>
<script type="application/ld+json">
{
"@context": "http://schema.org",
"@type": "ItemList",
"name": "DAO",
"itemListElement": [
{
"@type": "ItemList",
"name": "DAO",
"description": "The page contains links to sections with all information on the structure, finances and development strategy of WRIO Internet OS.",
"image": "https://wrioos.com/img/cover1-200x200.jpg",
"url": "https://wrioos.com/dao/"
}
]
}
</script>
<script>
(function (i, s, o, g, r, a, m) {
i['GoogleAnalyticsObject'] = r; i[r] = i[r] || function () {
(i[r].q = i[r].q || []).push(arguments)
}, i[r].l = 1 * new Date(); a = s.createElement(o),
m = s.getElementsByTagName(o)[0]; a.async = 1; a.src = g; m.parentNode.insertBefore(a, m)
})(window, document, 'script', 'https://www.google-analytics.com/analytics.js', 'ga');
ga('create', 'UA-80056587-2', 'auto');
ga('send', 'pageview');
</script>
</head>
<body>
<script type="text/javascript" src="https://wrioos.com/start.js"></script>
</body>
</html>