X-Nico

unusual facts about Protocol



Abdera

Apache Abdera, an implementation of the Atom Syndication Format and Atom Publishing Protocol

Acrobits Softphone

To address the above shortcomings of the SDES protocol, Phil Zimmermann devised a military

Bahik

The "Village of Behik" is a protocol signed in Constantinople in 1913 which drew most of the Turco-Persian border.

Battle.net

A group of gamers reverse engineered the network protocol used by Battle.net and Blizzard games, and released a free (under the GNU GPL) Battle.net emulation package called bnetd.

CcTalk

ccTalk protocol stacks have been implemented on a range of devices from tiny Microchip microcontrollers with 512 bytes of ROM to powerful ARM7 32-bit processors.

Child euthanasia

This Protocol prompted a very critical response from Elio Sgreccia, the head of the Pontifical Academy for Life.

Climm

It is internationalized; German, English, and other translations are available, and it supports sending and receiving acknowledged and non-acknowledged Unicode-encoded messages (it even understands UTF-8 messages for message types the ICQ protocol does not use them for).

Dallas Protocol

Dallas Protocol is a public-private partnership between the City of Dallas in the U.S. state of Texas and the World Affairs Council of Dallas/Fort Worth, established in March 2003.

Digital private mobile radio

dPMR is very similar to NXDN protocol implementation by Kenwood and Icom; both now offer dual-standard equipment (July 2013).

Elephants Dream

The film was released for download directly and via BitTorrent on the Official Orange Project website on May 18, 2006, along with all production files.

Government Secure Intranet

GSi uses SMTP as mail transport protocol, and the conversion from the then prevalent X.400 email facilities to SMTP proved for many departments an improvement in reliability and speed.

Ident

Ident protocol, an Internet protocol that helps identify the user of a particular TCP connection

Industrial USB

Industrial USB is the name given to the use of the USB protocol in an industrial environment, for data acquisition, automation, and production machine control.

Inter-Switch Link

Cisco Inter-Switch Link (ISL) is a Cisco proprietary protocol that maintains VLAN information as traffic flows between switches and routers.

Intermountain Healthcare

Life Flight can can provide a medical control physician 24/7 so it staff does not have to rely solely on standing orders or protocols, as do many other similar air medical services.

IronMQ

IronMQ uses HTTP/REST-based protocol and supports JSON messages up to 64k; guarantees order (FIFO); guarantees once only delivery; no delays retrieving messages.

IWARP

Networking services implemented over iWARP include those offered in the OpenFabrics Enterprise Distribution (OFED) by the OpenFabrics Alliance for Linux operating systems, and the Winsock Direct protocol for Microsoft Windows.

Kaseya Network Monitor

Security and data integrity is achieved by using the SSH 2.0 communication protocol.

The SSH 2.0 protocol encrypts data with public key algorithms and protects connections from man-in-the-middle attacks.

Local area network

Although this market segment is now much reduced, the technologies developed in this area continue to be influential on the Internet and in both Linux and Apple Mac OS X networking—and the TCP/IP protocol has now almost completely replaced IPX, AppleTalk, NBF, and other protocols used by the early PC LANs.

Madrid system

In Europe, resistance to the Protocol was brought by trademark attorneys who were afraid of losing business because a Community Trade Mark application could be filed directly through the Madrid Protocol process.

Media Access Project

One of the bigger cases that lead to current net neutrality rules was in 2007 when internet service provider Comcast was caught directly manipulating or blocking their subscriber’s access to the popular file sharing service BitTorrent.

Nortel Discovery Protocol

The Nortel Discovery Protocol (NDP) is a Data Link Layer (OSI Layer 2) network protocol for discovery of Nortel networking devices and certain products from Avaya and Ciena.

Novell Embedded Systems Technology

NEST consisted primarily of a Novell protocol driver stack implemented in ANSI C.

Oille

Olla podrida, a Spanish dish, which, at one time in France, protocol decreed be served to Spanish dignitaries.

Public switched telephone network

The call is switched using a call set up protocol (usually ISUP) between the telephone exchanges under an overall routing strategy.

Ralph Nelson

He was the father of Project Xanadu (precursor and main inspiration of the World Wide Web's HTML format and HTTP protocol) inventor Ted Nelson (by his first wife, actress Celeste Holm), and, by his other marriage(s): Ralph, Peter, and Meredith Nelson.

Red Goodbye

In summer 2009, several months after rock band Creed announced that their reunion album would be titled Full Circle, hundreds of torrents appeared on peer-to-peer file sharing sites labeled as a leaked copy of Full Circle but actually containing Red Goodbye's One Time Mountain, with modified file names and ID3 Tags.

Regional climate change initiatives in the United States

On February 16, 2005, Seattle Mayor Greg Nickels launched an initiative to advance the goals of the Kyoto Protocol through leadership and action by at least 141 American cities, and as of October, 2006, 319 mayors representing over 51.4 million Americans had accepted the challenge.

Security and safety features new to Windows Vista

Windows Vista Service Pack 1 includes Secure Socket Tunneling Protocol, a new Microsoft proprietary VPN protocol which provides a mechanism to transport Point-to-Point Protocol (PPP) traffic (including IPv6 traffic) through an SSL channel.

Skinny Call Control Protocol

Other companies like Symbol Technologies, SocketIP, and Digium have implemented this protocol in VoIP Terminals (phones), Media Gateway Controllers, and Softswitches.

SRTP

Service Request Transport Protocol, GE-Fanuc automation protocol for programmable logic controller

Stanford University Network

The PARC Universal Packet protocol was initially used on the local parts of the network, which was the experimental version of Ethernet with a data rate under 3 Megabits/second.

Sun Open Storage

Core features provided by Solaris include the operating environment, the ZFS file-system, an analytics tool based on Dtrace, the Network File System (NFS) and CIFS protocol interfaces and other core features.

Synthesis of 2-amino-2-deoxysugars

The azidonitration protocol developed by Lemieux and Ratcliffe is a case in point (Scheme 2).

Teredo

Teredo tunneling, a protocol in computer communications for transmission of IPv6 datagrams

Terminal node controller

A typical model consists of a microprocessor, a modem, and software (in EPROM) that implements the AX.25 protocol and provides a command line interface to the user.

Terrance Christopher

Terrance Christopher, OMM, LVO, CD is a retired Canadian Naval Officer and former Usher of the Black Rod for the Senate of Canada, the most senior protocol office in Parliament.

The Questions We Ask at Night

It leaked onto the internet via blogs and BitTorrent in 2006, but there was such minimal online success, the band took no further action.

The Yes Men Fix the World

Due to the movie being sued by United States Chamber of Commerce, a special edition of the movie is distributed through bittorrent through VODO and other prominent torrent sites like The Pirate Bay and EZTV.

Thomas Baron

After the Apollo 1 fire Baron wrote a 500-page report on NASA safety protocol violations, which he gave to Rep. Olin E. Teague's investigation at Cape Kennedy, Florida on April 21, 1967.

ThreeBallot

ThreeBallot is a voting protocol invented by Ron Rivest.

ULE

Unidirectional Lightweight Encapsulation, protocol for network layer packets over MPEG transport streams

United Nations Climate Change conference

# Flexible Mechanisms: The "flexibility" mechanisms which the United States had strongly favored when the Protocol was initially put together, including emissions trading; Joint Implementation (JI); and the Clean Development Mechanism (CDM) which allow industrialized countries to fund emissions reduction activities in developing countries as an alternative to domestic emission reductions.

User Datagram Protocol

The practical limit for the data length which is imposed by the underlying IPv4 protocol is 65,507 bytes (65,535 − 8 byte UDP header − 20 byte IP header).

Venturi Transport Protocol

The protocol is employed by various wireless broadband internet service providers such as Verizon Wireless and Unwired (Unwired calls the Venturi Client application that provides transparent VTP connectivity the Unwired Optimizer) in order to speed up their network and to overcome latency issues.

VoIP VPN

The recent publication of new VoIP encryption standards built into the protocol, such as ZRTP and SRTP, allow the VoIP client to run without the VPN overhead, integrating with standard features of VoIP PBX without having to manage both the VPN gateway and the PBX.

Yamigo

::"We would like to stress the fact that we see a benefit in using some chat clients over others. For example, most of the existing Nokia and Ericsson phones use a compressed version of the data exchange protocol, known as WBXML, while Motorola chat clients use plain XML. Motorola generate data transfers ten times higher than Nokia and Sony-Ericsson phones."

YMODEM

However, despite this protocol potentially being faster than ZMODEM it was still rarely used.

ZRTP

ZRTP can be used with any signaling protocol, including SIP, H.323, Jingle, and distributed hash table systems.


see also