https://wiki.kakupesa.net/index.php?title=From_ENIAC_to_iPad&feed=atom&action=historyFrom ENIAC to iPad - Redigeerimiste ajalugu2024-03-29T14:57:48ZSelle lehekülje redigeerimiste ajaluguMediaWiki 1.39.0https://wiki.kakupesa.net/index.php?title=From_ENIAC_to_iPad&diff=4915&oldid=prevWikiHaldur – 9. jaanuar 2021, kell 15:152021-01-09T15:15:02Z<p></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="et">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">←Vanem redaktsioon</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Redaktsioon: 9. jaanuar 2021, kell 15:15</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l37">37. rida:</td>
<td colspan="2" class="diff-lineno">37. rida:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>In 1947, one of the best-known anecdotal stories in computing took place - a computer operator (most sources suggest that it was 'Grandma COBOL' or [http://en.wikipedia.org/wiki/Grace_hopper Grace Murray Hopper]) searched for a reason of the computer not working, and finding a dead moth between two relay points, [http://en.wikipedia.org/wiki/File:H96566k.jpg taped it to the log book] and added the notice "The first actual case of a bug being found". This is considered the birth of the computing terms of "bug" (error), "debug" (finding and fixing errors) and "debugger" (error finding/fixing software<ref>http://www.agnesscott.edu/lriddle/women/hopper.htm</ref>.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>In 1947, one of the best-known anecdotal stories in computing took place - a computer operator (most sources suggest that it was 'Grandma COBOL' or [http://en.wikipedia.org/wiki/Grace_hopper Grace Murray Hopper]) searched for a reason of the computer not working, and finding a dead moth between two relay points, [http://en.wikipedia.org/wiki/File:H96566k.jpg taped it to the log book] and added the notice "The first actual case of a bug being found". This is considered the birth of the computing terms of "bug" (error), "debug" (finding and fixing errors) and "debugger" (error finding/fixing software<ref>http://www.agnesscott.edu/lriddle/women/hopper.htm</ref>.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>In 1950, [http://en.wikipedia.org/wiki/Alan_turing Alan Turing] formulated the [http://en.wikipedia.org/wiki/Turing_test Turing test] to determine if a machine is capable of intelligent behaviour<del style="font-weight: bold; text-decoration: none;"><ref>http://loebner.net/Prizef/TuringArticle.html</ref></del>. Simply put: the machine is considered intelligent if a human interacting with it cannot determine if he/she is interacting with another human or a machine. During the same year, the first computer named [http://en.wikipedia.org/wiki/History_of_computer_hardware_in_Soviet_Bloc_countries MESM] is also built in the Soviet Union. While the Communist countries had a good share of talented mathematicians to provide a theoretical base for technology, they fell seriously behind in the realm of computing - two main reasons being the closedness as well as the overall ignorance (including labelling of many kinds of actual research like psychology and cybernetics 'Western pseudoscience'<ref>http://www.cs.ut.ee/~varmo/tday-polva/tyugu-slides.pdf</ref>) and ineffectiveness of the regime<del style="font-weight: bold; text-decoration: none;"><ref>http://hrsbstaff.ednet.ns.ca/debcampbell/01-HisPlan12/3-GF/EspionnageLabo/spiesInsideKGBSite.htm</ref></del>.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>In 1950, [http://en.wikipedia.org/wiki/Alan_turing Alan Turing] formulated the [http://en.wikipedia.org/wiki/Turing_test Turing test] to determine if a machine is capable of intelligent behaviour. Simply put: the machine is considered intelligent if a human interacting with it cannot determine if he/she is interacting with another human or a machine. During the same year, the first computer named [http://en.wikipedia.org/wiki/History_of_computer_hardware_in_Soviet_Bloc_countries MESM] is also built in the Soviet Union. While the Communist countries had a good share of talented mathematicians to provide a theoretical base for technology, they fell seriously behind in the realm of computing - two main reasons being the closedness as well as the overall ignorance (including labelling of many kinds of actual research like psychology and cybernetics 'Western pseudoscience'<ref>http://www.cs.ut.ee/~varmo/tday-polva/tyugu-slides.pdf</ref>) and ineffectiveness of the regime.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>During the fifties, two important technologies contributed towards the miniaturization of computing technology - in 1954, Texas Instruments started to mass-produce [http://en.wikipedia.org/wiki/Transistortransistors] (which were actually invented already in 1934) and in 1958, the same company introduces the [http://en.wikipedia.org/wiki/Integrated_circuit integrated circuit].</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>During the fifties, two important technologies contributed towards the miniaturization of computing technology - in 1954, Texas Instruments started to mass-produce [http://en.wikipedia.org/wiki/Transistortransistors] (which were actually invented already in 1934) and in 1958, the same company introduces the [http://en.wikipedia.org/wiki/Integrated_circuit integrated circuit].</div></td></tr>
</table>WikiHaldurhttps://wiki.kakupesa.net/index.php?title=From_ENIAC_to_iPad&diff=4914&oldid=prevWikiHaldur – 9. jaanuar 2021, kell 15:112021-01-09T15:11:22Z<p></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="et">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">←Vanem redaktsioon</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Redaktsioon: 9. jaanuar 2021, kell 15:11</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l30">30. rida:</td>
<td colspan="2" class="diff-lineno">30. rida:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div># [http://en.wikipedia.org/wiki/Atanasoff%E2%80%93Berry_Computer ABC] (''Atanasoff-Berry Computer'') was completed a year earlier, in 1942, at the Iowa State College by [http://en.wikipedia.org/wiki/John_Vincent_Atanasoff John Vincent Atanasoff] and [http://en.wikipedia.org/wiki/Clifford_Berry Clifford Berry]<ref>http://www.webcitation.org/query?id=1257001829419648</ref>. It is interesting to note that the bitter rivalry between the two machines and their builders spanned over several decades - while ENIAC was initially considered first, the 1973 court case decided in favour of Atanasoff and Berry<ref>http://www.cbi.umn.edu/collections/inv/cbi00001.html</ref>. On the other hand, several other factors show ENIAC as a more complete machine that also found more use.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div># [http://en.wikipedia.org/wiki/Atanasoff%E2%80%93Berry_Computer ABC] (''Atanasoff-Berry Computer'') was completed a year earlier, in 1942, at the Iowa State College by [http://en.wikipedia.org/wiki/John_Vincent_Atanasoff John Vincent Atanasoff] and [http://en.wikipedia.org/wiki/Clifford_Berry Clifford Berry]<ref>http://www.webcitation.org/query?id=1257001829419648</ref>. It is interesting to note that the bitter rivalry between the two machines and their builders spanned over several decades - while ENIAC was initially considered first, the 1973 court case decided in favour of Atanasoff and Berry<ref>http://www.cbi.umn.edu/collections/inv/cbi00001.html</ref>. On the other hand, several other factors show ENIAC as a more complete machine that also found more use.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div># [http://en.wikipedia.org/wiki/Colossus_computer The Colossus series] were built by British cryptanalysts during the WWII to assist in breaking German codes. Yet, as the ABC, the were not 'complete' computers and were dedicated to a single type of tasks<ref>http://www.ivorcatt.com/47c.htm</ref>. </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div># [http://en.wikipedia.org/wiki/Colossus_computer The Colossus series] were built by British cryptanalysts during the WWII to assist in breaking German codes. Yet, as the ABC, the were not 'complete' computers and were dedicated to a single type of tasks<ref>http://www.ivorcatt.com/47c.htm</ref>. </div></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div># [http://en.wikipedia.org/wiki/Z3_%28computer%29 Z3] and other machines built by [http://en.wikipedia.org/wiki/Konrad_Zuse Konrad Zuse] in Germany. The original Z3 was destroyed in the war and the work of Zuse fell into obscurity. Yet his machines could be perhaps considered the closest to the modern ones<ref>http://web.archive.org/web/20080318184915/http://www.crash-it.com/crash/index.php?page=73</ref>. It used the binary system (contrary to the ENIAC's decimal) and Zuse's programming language called [http://en.wikipedia.org/wiki/Plankalk%C3%BCl Plankalkül] is said to contain most of the features of [http://en.wikipedia.org/wiki/ALGOL ALGOL], the language from the 50s usually considered the first<ref>http://<del style="font-weight: bold; text-decoration: none;">www</del>.zib.de/<del style="font-weight: bold; text-decoration: none;">zuse/Inhalt</del>/<del style="font-weight: bold; text-decoration: none;">Programme/Plankalkuel/Plankalkuel-Report/Plankalkuel-Report.htm</del></ref>. On the other hand, Z3 was an electro-mechanical, not an electronic device. Thus, the whole matter is still largely undecided.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div># [http://en.wikipedia.org/wiki/Z3_%28computer%29 Z3] and other machines built by [http://en.wikipedia.org/wiki/Konrad_Zuse Konrad Zuse] in Germany. The original Z3 was destroyed in the war and the work of Zuse fell into obscurity. Yet his machines could be perhaps considered the closest to the modern ones<ref>http://web.archive.org/web/20080318184915/http://www.crash-it.com/crash/index.php?page=73</ref>. It used the binary system (contrary to the ENIAC's decimal) and Zuse's programming language called [http://en.wikipedia.org/wiki/Plankalk%C3%BCl Plankalkül] is said to contain most of the features of [http://en.wikipedia.org/wiki/ALGOL ALGOL], the language from the 50s usually considered the first<ref>http://<ins style="font-weight: bold; text-decoration: none;">zuse</ins>.zib.de/<ins style="font-weight: bold; text-decoration: none;">album</ins>/<ins style="font-weight: bold; text-decoration: none;">ImvGLEqrWp9c9LA</ins></ref>. On the other hand, Z3 was an electro-mechanical, not an electronic device. Thus, the whole matter is still largely undecided.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
</table>WikiHaldurhttps://wiki.kakupesa.net/index.php?title=From_ENIAC_to_iPad&diff=4911&oldid=prevWikiHaldur – 29. jaanuar 2020, kell 21:082020-01-29T21:08:23Z<p></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="et">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">←Vanem redaktsioon</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Redaktsioon: 29. jaanuar 2020, kell 21:08</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l152">152. rida:</td>
<td colspan="2" class="diff-lineno">152. rida:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Pok%C3%A9mon_Go Pokemon Go] of 2016 created a global phenomenon with thousands of (seemingly) normal people hunting virtual monsters...</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Pok%C3%A9mon_Go Pokemon Go] of 2016 created a global phenomenon with thousands of (seemingly) normal people hunting virtual monsters...</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>* 2017 proved quite eventful in IT. The continuing conflict in Ukraine brought along the outbreaks of Petya [https://en.wikipedia.org/wiki/Petya_(malware) Petya] (and later, NotPetya) malware that transcended the place of origin. Another epidemic occurred in [https://en.wikipedia.org/wiki/WannaCry_ransomware_attack WannaCry] ransomware that reached more than 230 000 computers<ref>https://www.theguardian.com/technology/2017/jun/27/petya-ransomware-cyber-attack-who-what-why-how</ref>. The original optimism surrendering the 'Smart Devices' or 'Internet of Things' starts to fade due to clueless manufacturers and default passwords (so it is sometimes referred to as the Internet of Bad Things). The U.S. embraces [https://en.wikipedia.org/wiki/Net_neutrality Net Neutrality]. [https://en.wikipedia.org/wiki/Equifax Equifax], a credit reporting agency (in fact, a personal information broker) gets breached due to weak security, leaking personal information of about 143 million Americans online.[https://en.wikipedia.org/wiki/Estonian_ID_card The Estonian ID card] gets its security seriously challenged for the first time<del style="font-weight: bold; text-decoration: none;">. And IT College got eaten by TTU, resulting in a serious SNAFU</del>.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>* 2017 proved quite eventful in IT. The continuing conflict in Ukraine brought along the outbreaks of Petya [https://en.wikipedia.org/wiki/Petya_(malware) Petya] (and later, NotPetya) malware that transcended the place of origin. Another epidemic occurred in [https://en.wikipedia.org/wiki/WannaCry_ransomware_attack WannaCry] ransomware that reached more than 230 000 computers<ref>https://www.theguardian.com/technology/2017/jun/27/petya-ransomware-cyber-attack-who-what-why-how</ref>. The original optimism surrendering the 'Smart Devices' or 'Internet of Things' starts to fade due to clueless manufacturers and default passwords (so it is sometimes referred to as the Internet of Bad Things). The U.S. embraces [https://en.wikipedia.org/wiki/Net_neutrality Net Neutrality]. [https://en.wikipedia.org/wiki/Equifax Equifax], a credit reporting agency (in fact, a personal information broker) gets breached due to weak security, leaking personal information of about 143 million Americans online.[https://en.wikipedia.org/wiki/Estonian_ID_card The Estonian ID card] gets its security seriously challenged for the first time.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* 2018 - Right at the beginning, news arrived about [https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) Meltdown] and [https://en.wikipedia.org/wiki/Spectre_(security_vulnerability) Spectre]. In March, the [https://en.wikipedia.org/wiki/Cambridge_Analytica Cambridge Analytica] scandal rocks the world. Net neutrality fights in the US continue and cryptocurrency mining is becoming a major trend in malware. The European Union adopts the [https://en.wikipedia.org/wiki/General_Data_Protection_Regulation GDPR] (''General Data Protection Regulation'') that creates its fair share of controversy. In summer, Microsoft announces the purchase of [https://en.wikipedia.org/wiki/GitHub GitHub] and in autumn, IBM follows suit with [https://en.wikipedia.org/wiki/Red_Hat Red Hat]. At the end of the year, a major data leak is uncovered in Estonia (approximately 460 000 addresses in .ee domain). </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* 2018 - Right at the beginning, news arrived about [https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) Meltdown] and [https://en.wikipedia.org/wiki/Spectre_(security_vulnerability) Spectre]. In March, the [https://en.wikipedia.org/wiki/Cambridge_Analytica Cambridge Analytica] scandal rocks the world. Net neutrality fights in the US continue and cryptocurrency mining is becoming a major trend in malware. The European Union adopts the [https://en.wikipedia.org/wiki/General_Data_Protection_Regulation GDPR] (''General Data Protection Regulation'') that creates its fair share of controversy. In summer, Microsoft announces the purchase of [https://en.wikipedia.org/wiki/GitHub GitHub] and in autumn, IBM follows suit with [https://en.wikipedia.org/wiki/Red_Hat Red Hat]. At the end of the year, a major data leak is uncovered in Estonia (approximately 460 000 addresses in .ee domain). </div></td></tr>
</table>WikiHaldurhttps://wiki.kakupesa.net/index.php?title=From_ENIAC_to_iPad&diff=4910&oldid=prevWikiHaldur – 29. jaanuar 2020, kell 21:062020-01-29T21:06:16Z<p></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="et">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">←Vanem redaktsioon</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Redaktsioon: 29. jaanuar 2020, kell 21:06</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l154">154. rida:</td>
<td colspan="2" class="diff-lineno">154. rida:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* 2017 proved quite eventful in IT. The continuing conflict in Ukraine brought along the outbreaks of Petya [https://en.wikipedia.org/wiki/Petya_(malware) Petya] (and later, NotPetya) malware that transcended the place of origin. Another epidemic occurred in [https://en.wikipedia.org/wiki/WannaCry_ransomware_attack WannaCry] ransomware that reached more than 230 000 computers<ref>https://www.theguardian.com/technology/2017/jun/27/petya-ransomware-cyber-attack-who-what-why-how</ref>. The original optimism surrendering the 'Smart Devices' or 'Internet of Things' starts to fade due to clueless manufacturers and default passwords (so it is sometimes referred to as the Internet of Bad Things). The U.S. embraces [https://en.wikipedia.org/wiki/Net_neutrality Net Neutrality]. [https://en.wikipedia.org/wiki/Equifax Equifax], a credit reporting agency (in fact, a personal information broker) gets breached due to weak security, leaking personal information of about 143 million Americans online.[https://en.wikipedia.org/wiki/Estonian_ID_card The Estonian ID card] gets its security seriously challenged for the first time. And IT College got eaten by TTU, resulting in a serious SNAFU.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* 2017 proved quite eventful in IT. The continuing conflict in Ukraine brought along the outbreaks of Petya [https://en.wikipedia.org/wiki/Petya_(malware) Petya] (and later, NotPetya) malware that transcended the place of origin. Another epidemic occurred in [https://en.wikipedia.org/wiki/WannaCry_ransomware_attack WannaCry] ransomware that reached more than 230 000 computers<ref>https://www.theguardian.com/technology/2017/jun/27/petya-ransomware-cyber-attack-who-what-why-how</ref>. The original optimism surrendering the 'Smart Devices' or 'Internet of Things' starts to fade due to clueless manufacturers and default passwords (so it is sometimes referred to as the Internet of Bad Things). The U.S. embraces [https://en.wikipedia.org/wiki/Net_neutrality Net Neutrality]. [https://en.wikipedia.org/wiki/Equifax Equifax], a credit reporting agency (in fact, a personal information broker) gets breached due to weak security, leaking personal information of about 143 million Americans online.[https://en.wikipedia.org/wiki/Estonian_ID_card The Estonian ID card] gets its security seriously challenged for the first time. And IT College got eaten by TTU, resulting in a serious SNAFU.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>* 2018 - Right at the beginning, news arrived about [https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) Meltdown] and [https://en.wikipedia.org/wiki/Spectre_(security_vulnerability) Spectre]. In March, the [https://en.wikipedia.org/wiki/Cambridge_Analytica Cambridge Analytica] scandal rocks the world. Net neutrality fights in the US continue and cryptocurrency mining is becoming a major trend in malware. The European Union adopts the [https://en.wikipedia.org/wiki/General_Data_Protection_Regulation GDPR] (''General Data Protection Regulation'') that creates its fair share of controversy. In summer, Microsoft announces the purchase of [https://en.wikipedia.org/wiki/GitHub GitHub] and in autumn, IBM follows suit with [https://en.wikipedia.org/wiki/Red_Hat Red Hat]. At the end of the year, a major data leak is uncovered in Estonia (approximately 460 000 addresses in .ee domain). <del style="font-weight: bold; text-decoration: none;">Security </del>and <del style="font-weight: bold; text-decoration: none;">privacy</del>, Big Data and data mining as well as AI continue as 'hot topics' in IT.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>* 2018 - Right at the beginning, news arrived about [https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) Meltdown] and [https://en.wikipedia.org/wiki/Spectre_(security_vulnerability) Spectre]. In March, the [https://en.wikipedia.org/wiki/Cambridge_Analytica Cambridge Analytica] scandal rocks the world. Net neutrality fights in the US continue and cryptocurrency mining is becoming a major trend in malware. The European Union adopts the [https://en.wikipedia.org/wiki/General_Data_Protection_Regulation GDPR] (''General Data Protection Regulation'') that creates its fair share of controversy. In summer, Microsoft announces the purchase of [https://en.wikipedia.org/wiki/GitHub GitHub] and in autumn, IBM follows suit with [https://en.wikipedia.org/wiki/Red_Hat Red Hat]. At the end of the year, a major data leak is uncovered in Estonia (approximately 460 000 addresses in .ee domain). </div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">* 2019 - [https://en.wikipedia.org/wiki/Huawei Huawei], a major provider of mobile and network technology, is accused of leaking information to Chinese government by the U.S. [https://en.wikipedia.org/wiki/Google%2B Google+] </ins>and <ins style="font-weight: bold; text-decoration: none;">[https://en.wikipedia.org/wiki/Yahoo!_Groups Yahoo! Groups] are closed down, marking another step towards phasing out the previous generation of online services. Google (actually [https://en.wikipedia.org/wiki/Wing_(company) Wing], a parallel auxiliary under the same umbrella corporation, [https://en.wikipedia.org/wiki/Alphabet_Inc. Alphabet]) starts drone-based delivery of packages in some locations (in the U.S. they are considered an airline</ins>, <ins style="font-weight: bold; text-decoration: none;">thus a [https://en.wikipedia.org/wiki/Federal_Aviation_Administration FAA] certificate is required). </ins>Big Data and data mining as well as AI continue as 'hot topics' in IT.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
</table>WikiHaldurhttps://wiki.kakupesa.net/index.php?title=From_ENIAC_to_iPad&diff=4868&oldid=prevWikiHaldur – 2. veebruar 2019, kell 14:292019-02-02T14:29:43Z<p></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="et">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">←Vanem redaktsioon</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Redaktsioon: 2. veebruar 2019, kell 14:29</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l154">154. rida:</td>
<td colspan="2" class="diff-lineno">154. rida:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* 2017 proved quite eventful in IT. The continuing conflict in Ukraine brought along the outbreaks of Petya [https://en.wikipedia.org/wiki/Petya_(malware) Petya] (and later, NotPetya) malware that transcended the place of origin. Another epidemic occurred in [https://en.wikipedia.org/wiki/WannaCry_ransomware_attack WannaCry] ransomware that reached more than 230 000 computers<ref>https://www.theguardian.com/technology/2017/jun/27/petya-ransomware-cyber-attack-who-what-why-how</ref>. The original optimism surrendering the 'Smart Devices' or 'Internet of Things' starts to fade due to clueless manufacturers and default passwords (so it is sometimes referred to as the Internet of Bad Things). The U.S. embraces [https://en.wikipedia.org/wiki/Net_neutrality Net Neutrality]. [https://en.wikipedia.org/wiki/Equifax Equifax], a credit reporting agency (in fact, a personal information broker) gets breached due to weak security, leaking personal information of about 143 million Americans online.[https://en.wikipedia.org/wiki/Estonian_ID_card The Estonian ID card] gets its security seriously challenged for the first time. And IT College got eaten by TTU, resulting in a serious SNAFU.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* 2017 proved quite eventful in IT. The continuing conflict in Ukraine brought along the outbreaks of Petya [https://en.wikipedia.org/wiki/Petya_(malware) Petya] (and later, NotPetya) malware that transcended the place of origin. Another epidemic occurred in [https://en.wikipedia.org/wiki/WannaCry_ransomware_attack WannaCry] ransomware that reached more than 230 000 computers<ref>https://www.theguardian.com/technology/2017/jun/27/petya-ransomware-cyber-attack-who-what-why-how</ref>. The original optimism surrendering the 'Smart Devices' or 'Internet of Things' starts to fade due to clueless manufacturers and default passwords (so it is sometimes referred to as the Internet of Bad Things). The U.S. embraces [https://en.wikipedia.org/wiki/Net_neutrality Net Neutrality]. [https://en.wikipedia.org/wiki/Equifax Equifax], a credit reporting agency (in fact, a personal information broker) gets breached due to weak security, leaking personal information of about 143 million Americans online.[https://en.wikipedia.org/wiki/Estonian_ID_card The Estonian ID card] gets its security seriously challenged for the first time. And IT College got eaten by TTU, resulting in a serious SNAFU.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>* 2018 - Right at the beginning, news arrived about [https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) Meltdown] and [https://en.wikipedia.org/wiki/Spectre_(security_vulnerability) Spectre]. Net neutrality fights in the US continue and cryptocurrency mining is becoming a major trend in malware.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>* 2018 - Right at the beginning, news arrived about [https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) Meltdown] and [https://en.wikipedia.org/wiki/Spectre_(security_vulnerability) Spectre]<ins style="font-weight: bold; text-decoration: none;">. In March, the [https://en.wikipedia.org/wiki/Cambridge_Analytica Cambridge Analytica] scandal rocks the world</ins>. Net neutrality fights in the US continue and cryptocurrency mining is becoming a major trend in malware. <ins style="font-weight: bold; text-decoration: none;">The European Union adopts the [https://en.wikipedia.org/wiki/General_Data_Protection_Regulation GDPR] (''General Data Protection Regulation'') that creates its fair share of controversy. In summer, Microsoft announces the purchase of [https://en.wikipedia.org/wiki/GitHub GitHub] and in autumn, IBM follows suit with [https://en.wikipedia.org/wiki/Red_Hat Red Hat]. At the end of the year, a major data leak is uncovered in Estonia (approximately 460 000 addresses in .ee domain). Security and privacy, Big Data and data mining as well as AI continue as 'hot topics' in IT.</ins></div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== References ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== References ==</div></td></tr>
</table>WikiHaldurhttps://wiki.kakupesa.net/index.php?title=From_ENIAC_to_iPad&diff=4848&oldid=prevWikiHaldur: /* The New Millennium */2018-02-05T14:23:55Z<p><span dir="auto"><span class="autocomment">The New Millennium</span></span></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="et">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">←Vanem redaktsioon</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Redaktsioon: 5. veebruar 2018, kell 14:23</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l152">152. rida:</td>
<td colspan="2" class="diff-lineno">152. rida:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Pok%C3%A9mon_Go Pokemon Go] of 2016 created a global phenomenon with thousands of (seemingly) normal people hunting virtual monsters...</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Pok%C3%A9mon_Go Pokemon Go] of 2016 created a global phenomenon with thousands of (seemingly) normal people hunting virtual monsters...</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>* 2017 proved quite eventful in IT. The continuing conflict in Ukraine brought along the outbreaks of Petya [https://en.wikipedia.org/wiki/Petya_(malware) Petya] (and later, NotPetya) malware that transcended the place of origin. Another epidemic occurred in [https://en.wikipedia.org/wiki/WannaCry_ransomware_attack WannaCry] ransomware that reached more than 230 computers<ref>https://www.theguardian.com/technology/2017/jun/27/petya-ransomware-cyber-attack-who-what-why-how</ref>. The original optimism surrendering the 'Smart Devices' or 'Internet of Things' starts to fade due to clueless manufacturers and default passwords (so it is sometimes referred to as the Internet of Bad Things). The U.S. embraces [https://en.wikipedia.org/wiki/Net_neutrality Net Neutrality]. [https://en.wikipedia.org/wiki/Equifax Equifax], a credit reporting agency (in fact, a personal information broker) gets breached due to weak security, leaking personal information of about 143 million Americans online.[https://en.wikipedia.org/wiki/Estonian_ID_card The Estonian ID card] gets its security seriously challenged for the first time. And IT College got eaten by TTU, resulting in a serious SNAFU.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>* 2017 proved quite eventful in IT. The continuing conflict in Ukraine brought along the outbreaks of Petya [https://en.wikipedia.org/wiki/Petya_(malware) Petya] (and later, NotPetya) malware that transcended the place of origin. Another epidemic occurred in [https://en.wikipedia.org/wiki/WannaCry_ransomware_attack WannaCry] ransomware that reached more than 230 <ins style="font-weight: bold; text-decoration: none;">000 </ins>computers<ref>https://www.theguardian.com/technology/2017/jun/27/petya-ransomware-cyber-attack-who-what-why-how</ref>. The original optimism surrendering the 'Smart Devices' or 'Internet of Things' starts to fade due to clueless manufacturers and default passwords (so it is sometimes referred to as the Internet of Bad Things). The U.S. embraces [https://en.wikipedia.org/wiki/Net_neutrality Net Neutrality]. [https://en.wikipedia.org/wiki/Equifax Equifax], a credit reporting agency (in fact, a personal information broker) gets breached due to weak security, leaking personal information of about 143 million Americans online.[https://en.wikipedia.org/wiki/Estonian_ID_card The Estonian ID card] gets its security seriously challenged for the first time. And IT College got eaten by TTU, resulting in a serious SNAFU.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* 2018 - Right at the beginning, news arrived about [https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) Meltdown] and [https://en.wikipedia.org/wiki/Spectre_(security_vulnerability) Spectre]. Net neutrality fights in the US continue and cryptocurrency mining is becoming a major trend in malware.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* 2018 - Right at the beginning, news arrived about [https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) Meltdown] and [https://en.wikipedia.org/wiki/Spectre_(security_vulnerability) Spectre]. Net neutrality fights in the US continue and cryptocurrency mining is becoming a major trend in malware.</div></td></tr>
</table>WikiHaldurhttps://wiki.kakupesa.net/index.php?title=From_ENIAC_to_iPad&diff=4847&oldid=prevWikiHaldur: /* The New Millennium */2018-02-05T14:23:04Z<p><span dir="auto"><span class="autocomment">The New Millennium</span></span></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="et">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">←Vanem redaktsioon</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Redaktsioon: 5. veebruar 2018, kell 14:23</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l122">122. rida:</td>
<td colspan="2" class="diff-lineno">122. rida:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* the cybersecurity boom</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* the cybersecurity boom</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Some interesting examples from the last <del style="font-weight: bold; text-decoration: none;">decade</del>:</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Some interesting examples from the last <ins style="font-weight: bold; text-decoration: none;">decades</ins>:</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [http://en.wikipedia.org/wiki/SCO_Group The SCO lawsuit] 2003-2011 (could even continue in the future) - the claim by SCO Group that Linux kernel 2.4 contains some code belonging to them. Most sources agree that the motivation was to force IBM to buy out the company. Interesting factors include</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [http://en.wikipedia.org/wiki/SCO_Group The SCO lawsuit] 2003-2011 (could even continue in the future) - the claim by SCO Group that Linux kernel 2.4 contains some code belonging to them. Most sources agree that the motivation was to force IBM to buy out the company. Interesting factors include</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>** for the better part of the suit, the software in question has been outdated and replaced by new 2.6 kernel series (i.e. is not in use anymore)</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>** for the better part of the suit, the software in question has been outdated and replaced by new 2.6 kernel series (i.e. is not in use anymore)</div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l140">140. rida:</td>
<td colspan="2" class="diff-lineno">140. rida:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [http://en.wikipedia.org/wiki/Ipad iPad] - first released in 2010, it has defined the tablet computer for many users.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [http://en.wikipedia.org/wiki/Ipad iPad] - first released in 2010, it has defined the tablet computer for many users.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>* [http://en.wikipedia.org/wiki/ACTA ACTA] and its countercampaign in 2012 - while Europe had not <del style="font-weight: bold; text-decoration: none;">experienced </del>'Facebook revolutions' similar to the [http://en.wikipedia.org/wiki/Arab_Spring Arab Spring] or the [http://en.wikipedia.org/wiki/Occupy_movement Occupy movement], the large-scale public outlash was still remarkable.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>* [http://en.wikipedia.org/wiki/ACTA ACTA] and its countercampaign in 2012 - while Europe had not <ins style="font-weight: bold; text-decoration: none;">ey perienced </ins>'Facebook revolutions' similar to the [http://en.wikipedia.org/wiki/Arab_Spring Arab Spring] or the [http://en.wikipedia.org/wiki/Occupy_movement Occupy movement], the large-scale public outlash was still remarkable.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Steam_%28software%29 Steam] has significantly diversified the gaming industry - even if Windows has remained a primary platform for gamers, both OS X and Linux have developed a steady niche following.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Steam_%28software%29 Steam] has significantly diversified the gaming industry - even if Windows has remained a primary platform for gamers, both OS X and Linux have developed a steady niche following.</div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l151">151. rida:</td>
<td colspan="2" class="diff-lineno">151. rida:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Pok%C3%A9mon_Go Pokemon Go] of 2016 created a global phenomenon with thousands of (seemingly) normal people hunting virtual monsters...</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Pok%C3%A9mon_Go Pokemon Go] of 2016 created a global phenomenon with thousands of (seemingly) normal people hunting virtual monsters...</div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">* 2017 proved quite eventful in IT. The continuing conflict in Ukraine brought along the outbreaks of Petya [https://en.wikipedia.org/wiki/Petya_(malware) Petya] (and later, NotPetya) malware that transcended the place of origin. Another epidemic occurred in [https://en.wikipedia.org/wiki/WannaCry_ransomware_attack WannaCry] ransomware that reached more than 230 computers<ref>https://www.theguardian.com/technology/2017/jun/27/petya-ransomware-cyber-attack-who-what-why-how</ref>. The original optimism surrendering the 'Smart Devices' or 'Internet of Things' starts to fade due to clueless manufacturers and default passwords (so it is sometimes referred to as the Internet of Bad Things). The U.S. embraces [https://en.wikipedia.org/wiki/Net_neutrality Net Neutrality]. [https://en.wikipedia.org/wiki/Equifax Equifax], a credit reporting agency (in fact, a personal information broker) gets breached due to weak security, leaking personal information of about 143 million Americans online.[https://en.wikipedia.org/wiki/Estonian_ID_card The Estonian ID card] gets its security seriously challenged for the first time. And IT College got eaten by TTU, resulting in a serious SNAFU.</ins></div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">* 2018 - Right at the beginning, news arrived about [https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) Meltdown] and [https://en.wikipedia.org/wiki/Spectre_(security_vulnerability) Spectre]. Net neutrality fights in the US continue and cryptocurrency mining is becoming a major trend in malware.</ins></div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== References ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== References ==</div></td></tr>
</table>WikiHaldurhttps://wiki.kakupesa.net/index.php?title=From_ENIAC_to_iPad&diff=4471&oldid=prevWikiHaldur: /* The New Millennium */2016-09-06T08:52:48Z<p><span dir="auto"><span class="autocomment">The New Millennium</span></span></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="et">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">←Vanem redaktsioon</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Redaktsioon: 6. september 2016, kell 08:52</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l143">143. rida:</td>
<td colspan="2" class="diff-lineno">143. rida:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Steam_%28software%29 Steam] has significantly diversified the gaming industry - even if Windows has remained a primary platform for gamers, both OS X and Linux have developed a steady niche following.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Steam_%28software%29 Steam] has significantly diversified the gaming industry - even if Windows has remained a primary platform for gamers, both OS X and Linux have developed a steady niche following.</div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">* In 2014, three big vulnerabilities - [https://en.wikipedia.org/wiki/Heartbleed Heartbleed], [https://en.wikipedia.org/wiki/Shellshock_(software_bug) Shellshock] and [https://en.wikipedia.org/wiki/POODLE POODLE] - remind people that even well-designed and open-source systems may get serious security holes.</ins></div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Windows_10 Windows 10] marks a shift in Microsoft's strategy, as it was delivered for free as an upgrade or for people willing to participate in testing. Yet again, concerns of privacy and snooping run strong.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Windows_10 Windows 10] marks a shift in Microsoft's strategy, as it was delivered for free as an upgrade or for people willing to participate in testing. Yet again, concerns of privacy and snooping run strong.</div></td></tr>
</table>WikiHaldurhttps://wiki.kakupesa.net/index.php?title=From_ENIAC_to_iPad&diff=4459&oldid=prevWikiHaldur: /* The New Millennium */2016-08-23T08:49:30Z<p><span dir="auto"><span class="autocomment">The New Millennium</span></span></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="et">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">←Vanem redaktsioon</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Redaktsioon: 23. august 2016, kell 08:49</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l144">144. rida:</td>
<td colspan="2" class="diff-lineno">144. rida:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Steam_%28software%29 Steam] has significantly diversified the gaming industry - even if Windows has remained a primary platform for gamers, both OS X and Linux have developed a steady niche following.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Steam_%28software%29 Steam] has significantly diversified the gaming industry - even if Windows has remained a primary platform for gamers, both OS X and Linux have developed a steady niche following.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Windows_10] marks a shift in Microsoft's strategy, as it was delivered for free as an upgrade or for people willing to participate in testing. Yet again, concerns of privacy and snooping run strong.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Windows_10 <ins style="font-weight: bold; text-decoration: none;">Windows 10</ins>] marks a shift in Microsoft's strategy, as it was delivered for free as an upgrade or for people willing to participate in testing. Yet again, concerns of privacy and snooping run strong.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Apple_Watch Apple Watch] is the first widespread smart watch, heralding the rise of [https://en.wikipedia.org/wiki/Wearable_computer wearable computers].</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Apple_Watch Apple Watch] is the first widespread smart watch, heralding the rise of [https://en.wikipedia.org/wiki/Wearable_computer wearable computers].</div></td></tr>
</table>WikiHaldurhttps://wiki.kakupesa.net/index.php?title=From_ENIAC_to_iPad&diff=4458&oldid=prevWikiHaldur: /* The New Millennium */2016-08-23T08:48:48Z<p><span dir="auto"><span class="autocomment">The New Millennium</span></span></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="et">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">←Vanem redaktsioon</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Redaktsioon: 23. august 2016, kell 08:48</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l143">143. rida:</td>
<td colspan="2" class="diff-lineno">143. rida:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Steam_%28software%29 Steam] has significantly diversified the gaming industry - even if Windows has remained a primary platform for gamers, both OS X and Linux have developed a steady niche following.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Steam_%28software%29 Steam] has significantly diversified the gaming industry - even if Windows has remained a primary platform for gamers, both OS X and Linux have developed a steady niche following.</div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">* [https://en.wikipedia.org/wiki/Windows_10] marks a shift in Microsoft's strategy, as it was delivered for free as an upgrade or for people willing to participate in testing. Yet again, concerns of privacy and snooping run strong.</ins></div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Apple_Watch Apple Watch] is the first widespread smart watch, heralding the rise of [https://en.wikipedia.org/wiki/Wearable_computer wearable computers].</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* [https://en.wikipedia.org/wiki/Apple_Watch Apple Watch] is the first widespread smart watch, heralding the rise of [https://en.wikipedia.org/wiki/Wearable_computer wearable computers].</div></td></tr>
</table>WikiHaldur