Misplaced Pages

Gufunes

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

Gufunes ( Icelandic pronunciation: [ˈkʏːvʏˌnɛːs] ) is a historical estate and park for sculptures and artwork in northeastern Reykjavík . Today it lies within the Grafarvogur part of the city, located to the southwest and south of the Eidsvik Cove and Geldinganes Headland . It contains some 25 sculptures by Hallsteinn Sigurðsson amongst others.

#634365

101-577: In 2016 an urban design competition Archived 2016-12-20 at the Wayback Machine has been organized for the future of the Gufunes industry and landscape. jvantspijker and Felixx with Orri Steinarsson won the competition. [REDACTED] Media related to Gufunes at Wikimedia Commons 64°08′49″N 21°48′45″W  /  64.14694°N 21.81250°W  / 64.14694; -21.81250 This article about an Icelandic building or structure

202-529: A declaratory judgment action in the United States District Court for the Northern District of California on January 20, 2006, seeking a judicial determination that Internet Archive did not violate Shell's copyright . Shell responded and brought a countersuit against Internet Archive for archiving her site, which she alleges is in violation of her terms of service . On February 13, 2007,

303-548: A pornographic actor named Daniel Davydiuk tried to remove archived images of himself from the Wayback Machine's archive, first by sending multiple DMCA requests to the archive, and then by appealing to the Federal Court of Canada . The images were removed from the website in 2017. In 2018, archives of stalkerware application FlexiSpy's website were removed from the Wayback Machine. The company claimed to have contacted

404-414: A calendar layout with circles whose width visualizes the number of crawls each day, but no marking of duplicates with asterisks or an advanced search page. A top toolbar was added to facilitate navigating between captures. A bar chart visualizes the frequency of captures per month over the years. Features like "Changes", "Summary", and a graphical site map were added subsequently. In March that year, it

505-536: A ceremony at the University of California, Berkeley . By the time the Wayback Machine launched, it already contained over 10 billion archived pages. The data is stored on the Internet Archive's large cluster of Linux nodes. It revisits and archives new versions of websites on occasion (see technical details below). Sites can also be captured manually by entering a website's URL into the search box, provided that

606-404: A city or fortress that cannot be easily taken by a quick assault, and which refuses to surrender . Sieges involve surrounding the target to block provision of supplies and reinforcement or escape of troops (a tactic known as " investment "). This is typically coupled with attempts to reduce the fortifications by means of siege engines , artillery bombardment, mining (also known as sapping), or

707-477: A given Web page was accessible to the public. These dates are used to determine if a Web page is available as prior art for instance in examining a patent application. There are technical limitations to archiving a website, and as a consequence, opposing parties in litigation can misuse the results provided by website archives. This problem can be exacerbated by the practice of submitting screenshots of web pages in complaints, answers, or expert witness reports when

808-535: A judge for the United States District Court for the District of Colorado dismissed all counterclaims except breach of contract . The Internet Archive did not move to dismiss the copyright infringement claims that Shell asserted arose out of its copying activities, which would also go forward. On April 25, 2007, Internet Archive and Suzanne Shell jointly announced the settlement of their lawsuit. The Internet Archive said it "...has no interest in including materials in

909-419: A minor force could seldom be maintained. A besieging army, encamped in possibly squalid field conditions and dependent on the countryside and its own supply lines for food, could very well be threatened with the disease and starvation intended for the besieged. To end a siege more rapidly, various methods were developed in ancient and medieval times to counter fortifications, and a large variety of siege engines

1010-420: A new data centre in a Sun Modular Datacenter on Sun Microsystems ' California campus. As of 2009 , the Wayback Machine contained approximately three petabytes of data and was growing at a rate of 100 terabytes each month. A new, improved version of the Wayback Machine, with an updated interface and a fresher index of archived content, was made available for public testing in 2011, where captures appear in

1111-494: A predetermined number of hyperlinks based on a preset depth limit, so it cannot archive every hyperlink on every page. In a 2009 case, Netbula, LLC v. Chordiant Software Inc. , defendant Chordiant filed a motion to compel Netbula to disable the robots.txt file on its website that was causing the Wayback Machine to retroactively remove access to previous versions of pages it had archived from Netbula's site, pages that Chordiant believed would support its case. Netbula objected to

SECTION 10

#1732905188635

1212-405: A rebellious Anatolian vassal in the 14th century BC ended when the queen mother came out of the city and begged for mercy on behalf of her people. The Hittite campaign against the kingdom of Mitanni in the 14th century BC bypassed the fortified city of Carchemish . If the main objective of a campaign was not the conquest of a particular city, it could simply be passed by. When the main objective of

1313-403: A siege might be a surprise attack, attempting to overwhelm the defenders before they were ready or were even aware there was a threat. This was how William de Forz captured Fotheringhay Castle in 1221. The most common practice of siege warfare was to lay siege and just wait for the surrender of the enemies inside or, quite commonly, to coerce someone inside to betray the fortification. During

1414-436: A siege progressed, the surrounding army would build earthworks (a line of circumvallation ) to completely encircle their target, preventing food, water, and other supplies from reaching the besieged city. If sufficiently desperate as the siege progressed, defenders and civilians might have been reduced to eating anything vaguely edible – horses, family pets, the leather from shoes, and even each other . The Hittite siege of

1515-614: A simple battering ram had come into use in the previous millennium, the Assyrians improved siege warfare and used huge wooden tower-shaped battering rams with archers positioned on top. In ancient China, sieges of city walls (along with naval battles) were portrayed on bronze 'hu' vessels , like those found in Chengdu , Sichuan in 1965, which have been dated to the Warring States period (5th to 3rd centuries BC). An attacker's first act in

1616-501: A site blocked the Internet Archive, any previously archived pages from the domain were immediately rendered unavailable as well. In addition, the Internet Archive stated that "Sometimes, a website owner will contact us directly and ask us to stop crawling or archiving a site. We comply with these requests." In addition, the website says: "The Internet Archive is not interested in preserving or offering access to Web sites or other internet documents of persons who do not want their materials in

1717-505: A site might be included in more than one crawl list, so how often a site is crawled varies widely. A "Save Page Now" archiving feature was made available in October 2013, accessible on the lower right of the Wayback Machine's main page. Once a target URL is entered and saved, the web page will become part of the Wayback Machine. Through the Internet address web.archive.org, users can upload to

1818-479: A user commented, "There needs to be a Scientists' March on Washington". The site is used heavily for verification, providing access to references and content creation by Misplaced Pages editors . When new URLs are added to Misplaced Pages, the Internet Archive has been archiving them. In September 2020, a partnership was announced with Cloudflare to automatically archive websites served via its "Always Online" service, which will also allow it to direct users to its copy of

1919-454: A wheeled siege ramp with grappling hooks known as the Cloud Bridge (the protractible, folded ramp slinging forward by means of a counterweight with rope and pulley), and wheeled 'hook-carts' used to latch large iron hooks onto the tops of walls to pull them down. When enemies attempted to dig tunnels under walls for mining or entry into the city, the defenders used large bellows (the type

2020-493: Is a military blockade of a city, or fortress , with the intent of conquering by attrition, or by well-prepared assault. Siege warfare (also called siegecraft or poliorcetics ) is a form of constant, low-intensity conflict characterized by one party holding a strong, static, defensive position. Consequently, an opportunity for negotiation between combatants is common, as proximity and fluctuating advantage can encourage diplomacy . A siege occurs when an attacker encounters

2121-625: Is a stub . You can help Misplaced Pages by expanding it . Wayback Machine The Wayback Machine is a digital archive of the World Wide Web founded by the Internet Archive , an American nonprofit organization based in San Francisco , California . Created in 1996 and launched to the public in 2001, it allows users to go "back in time" to see how websites looked in the past. Its founders, Brewster Kahle and Bruce Gilliat , developed

SECTION 20

#1732905188635

2222-668: Is based in part upon Recommendations for Managing Removal Requests and Preserving Archival Integrity , known as The Oakland Archive Policy , published by the School of Information Management and Systems at University of California, Berkeley in 2002, which gives a website owner the right to block access to the site's archives. Wayback has complied with this policy to help avoid expensive litigation. The Wayback retroactive exclusion policy began to relax in 2017, when it stopped honoring robots on U.S. government and military web sites for both crawling and displaying web pages. As of April 2017, Wayback

2323-414: Is for complex querying, filtering, and analysis of captured data. Historically, the Wayback Machine has respected the robots exclusion standard (robots.txt) in determining if a website would be crawled – or if already crawled, if its archives would be publicly viewable. Website owners had the option to opt out of Wayback Machine through the use of robots.txt. It applied robots.txt rules retroactively; if

2424-466: Is ignoring robots.txt more broadly, not just for U.S. government websites. From its public launch in 2001, the Wayback Machine has been studied by scholars both for the ways it stores and collects data as well as for the actual pages contained in its archive. As of 2013, scholars had written about 350 articles on the Wayback Machine, mostly from the information technology , library science , and social science fields. Social science scholars have used

2525-421: Is known from Egyptian tomb reliefs of the 24th century BC, showing Egyptian soldiers storming Canaanite town walls on wheeled siege ladders. Later Egyptian temple reliefs of the 13th century BC portray the violent Siege of Dapur , a Syrian city, with soldiers climbing scale ladders supported by archers. Assyrian palace reliefs of the 9th to 7th centuries BC display sieges of several Near Eastern cities. Though

2626-467: Is restricted by the publisher or stored in databases that are not accessible. To overcome inconsistencies in partially cached websites, Archive-It.org was developed in 2005 by the Internet Archive as a means of allowing institutions and content creators to voluntarily harvest and preserve collections of digital content, and create digital archives. Crawls are contributed from various sources, some imported from third parties and others generated internally by

2727-407: Is to build a line of earth-works, consisting of a rampart and trench, surrounding it. During the process of circumvallation, the attacking force can be set upon by another force, an ally of the besieged place, due to the lengthy amount of time required to force it to capitulate. A defensive ring of forts outside the ring of circumvallated forts, called contravallation, is also sometimes used to defend

2828-544: Is under siege ". The Wayback Machine's software has been developed to " crawl " the Web and download all publicly accessible information and data files on webpages, the Gopher hierarchy, the Netnews (Usenet) bulletin board system, and downloadable software. The information collected by these "crawlers" does not include all the information available on the Internet, since much of the data

2929-457: The Huo Long Jing , this manuscript of Jiao Yu recorded an earlier Song-era cast-iron cannon known as the 'flying-cloud thunderclap eruptor' (fei yun pi-li pao). The manuscript stated that ( Wade–Giles spelling): The shells ( phao ) are made of cast iron, as large as a bowl and shaped like a ball. Inside they contain half a pound of 'magic' gunpowder ( shen huo ). They are sent flying towards

3030-701: The Battle of Alesia , the Roman legions created two huge fortified walls around the city. The inner circumvallation, 16 km (10 mi), held in Vercingetorix 's forces, while the outer contravallation kept relief from reaching them. The Romans held the ground in between the two walls. The besieged Gauls, facing starvation, eventually surrendered after their relief force met defeat against Caesar's auxiliary cavalry. The Sicarii Zealots who defended Masada in AD 73 were defeated by

3131-718: The Indus Valley civilization were also fortified. By about 3500 BC, hundreds of small farming villages dotted the Indus River floodplain. Many of these settlements had fortifications and planned streets. The stone and mud brick houses of Kot Diji were clustered behind massive stone flood dikes and defensive walls, for neighbouring communities quarrelled constantly about the control of prime agricultural land. Mundigak (c. 2500 BC) in present-day south-east Afghanistan has defensive walls and square bastions of sun-dried bricks . City walls and fortifications were essential for

Gufunes - Misplaced Pages Continue

3232-685: The Piankhi stela , records how the Nubians laid siege to and conquered several Egyptian cities by using battering rams, archers, and slingers and building causeways across moats. During the Peloponnesian War , one hundred sieges were attempted and fifty-eight ended with the surrender of the besieged area. Alexander the Great 's army successfully besieged many powerful cities during his conquests. Two of his most impressive achievements in siegecraft took place in

3333-596: The State of Zhao , Handan , founded in 386 BC, also had walls that were 20 m (66 ft) wide at the base; they were 15 m (49 ft) tall, with two separate sides of its rectangular enclosure at a length of 1,400 m (1,530 yd). The cities of the Indus Valley Civilization showed less effort in constructing defences, as did the Minoan civilization on Crete . These civilizations probably relied more on

3434-520: The Vietnam War . Until the invention of gunpowder -based weapons (and the resulting higher-velocity projectiles), the balance of power and logistics definitely favored the defender. With the invention of gunpowder, cannon and mortars and howitzers (in modern times), the traditional methods of defense became less effective against a determined siege. Although there are numerous ancient accounts of cities being sacked, few contain any clues to how this

3535-537: The Yuan dynasty in 1271, was very effective, allowing the Mongols to sweep through large areas. Even if they could not enter some of the more well-fortified cities, they used innovative battle tactics to grab hold of the land and the people: By concentrating on the field armies, the strongholds had to wait. Of course, smaller fortresses, or ones easily surprised, were taken as they came along. This had two effects. First, it cut off

3636-676: The concentric castle from the period of the Crusades —and more dangerous to attackers—witness the increasing use of machicolations and murder-holes , as well the preparation of hot or incendiary substances . Arrowslits (also called arrow loops or loopholes), sally ports (airlock-like doors) for sallies and deep water wells were also integral means of resisting siege at this time. Particular attention would be paid to defending entrances, with gates protected by drawbridges , portcullises , and barbicans . Moats and other water defenses, whether natural or augmented, were also vital to defenders. In

3737-519: The early modern period , siege warfare dominated the conduct of war in Europe. Leonardo da Vinci gained some of his renown from design of fortifications. Medieval campaigns were generally designed around a succession of sieges. In the Napoleonic era , increasing use of ever more powerful cannons reduced the value of fortifications. In the 20th century, the significance of the classical siege declined. With

3838-473: The siege of Tyre and the siege of the Sogdian Rock . His engineers built a causeway that was originally 60 m (200 ft) wide and reached the range of his torsion-powered artillery, while his soldiers pushed siege towers housing stone throwers and light catapults to bombard the city walls. Most conquerors before him had found Tyre , a Phoenician island-city about 1 km (1,100 yd) from

3939-546: The Archive would have to delete pages from its system upon request of the creator. The exclusion policies for the Wayback Machine may be found in the FAQ section of the site. Some cases have been brought against the Internet Archive specifically for its Wayback Machine archiving efforts. In late 2002, the Internet Archive removed various sites that were critical of Scientology from the Wayback Machine. An error message stated that this

4040-845: The Archive. For example, crawls are contributed by the Sloan Foundation and Alexa , crawls run by Internet Archive on behalf of NARA and the Internet Memory Foundation , mirrors of Common Crawl . The "Worldwide Web Crawls" have been running since 2010 and capture the global Web. In September 2020, the Internet Archive announced a partnership with Cloudflare – an American content delivery network service provider – to automatically index websites served via its "Always Online" services. Documents and resources are stored with time stamp URLs such as 20241124103401 . Pages' individual resources such as images and style sheets and scripts, as well as outgoing hyperlinks , are linked to with

4141-450: The Chinese commonly used in heating up a blast furnace for smelting cast iron ) to pump smoke into the tunnels in order to suffocate the intruders. Advances in the prosecution of sieges in ancient and medieval times naturally encouraged the development of a variety of defensive countermeasures. In particular, medieval fortifications became progressively stronger—for example, the advent of

Gufunes - Misplaced Pages Continue

4242-731: The European Middle Ages , virtually all large cities had city walls— Dubrovnik in Dalmatia is a well-preserved example—and more important cities had citadels , forts , or castles . Great effort was expended to ensure a good water supply inside the city in case of siege. In some cases, long tunnels were constructed to carry water into the city. Complex systems of tunnels were used for storage and communications in medieval cities like Tábor in Bohemia , similar to those used much later in Vietnam during

4343-596: The Internet Archive, presumably to remove the archives of its website. Archive.org is blocked in China . The Internet Archive was blocked in its entirety in Russia in 2015–16, ostensibly for hosting a Jihad outreach video. Since 2016, the website has been back, available in its entirety, although in 2016 Russian commercial lobbyists were suing the Internet Archive to ban it on copyright grounds. Siege A siege ( Latin : sedere , lit.   'to sit')

4444-407: The Northern District of California, San Jose Division, rejected Netbula's arguments and ordered them to disable the robots.txt blockage temporarily in order to allow Chordiant to retrieve the archived pages that they sought. In an October 2004 case, Telewizja Polska USA, Inc. v. Echostar Satellite , No. 02 C 3293, 65 Fed. R. Evid. Serv. 673 (N.D. Ill. October 15, 2004), a litigant attempted to use

4545-679: The Roman legions, who built a ramp 100 metres (330 ft) high up to the fortress's west wall. During the Roman–Persian Wars , siege warfare was extensively being used by both sides. In the Middle Ages, the Mongol Empire 's campaign against China (then comprising the Western Xia dynasty , Jin dynasty , and Southern Song dynasty ) by Genghis Khan until Kublai Khan , who eventually established

4646-754: The Southern Song Chinese held out against the enormous barrage of Mongol attacks. Much of this success in defense lay in the world's first use of gunpowder (i.e. with early flamethrowers , grenades , firearms , cannons, and land mines ) to fight back against the Khitans , the Tanguts , the Jurchens , and then the Mongols. The Chinese of the Song period also discovered the explosive potential of packing hollowed cannonball shells with gunpowder. Written later c.  1350 in

4747-422: The Wayback Machine a large variety of contents, including PDF and data compression file formats. The Wayback Machine creates a permanent local URL of the upload content, that is accessible in the web, even if not listed while searching in the https://archive.org official website. Starting in October 2019, users were limited to 15 archival requests and retrievals per minute. As technology has developed over

4848-463: The Wayback Machine archives as a source of admissible evidence, perhaps for the first time. Telewizja Polska is the provider of TVP Polonia and EchoStar operates the Dish Network . Prior to the trial proceedings, EchoStar indicated that it intended to offer Wayback Machine snapshots as proof of the past content of Telewizja Polska's website. Telewizja Polska brought a motion in limine to suppress

4949-423: The Wayback Machine contained over 25 petabytes of data. As of December 2020, the Wayback Machine contained over 70 petabytes of data. The Wayback Machine service offers three public APIs, SavePageNow, Availability, and CDX. SavePageNow can be used to archive web pages. Availability API for checking the archive availability status for a web page, checking whether an archive for the web page exists or not. CDX API

5050-608: The Wayback Machine has been unable to display YouTube comments when saving videos' watch pages, as, according to the Archive Team, comments are no longer "loaded within the page itself." The Wayback Machine's web crawler has difficulty extracting anything not coded in HTML or one of its variants, which can often result in broken hyperlinks and missing images. Due to this, the web crawler cannot archive "orphan pages" that are not linked to by other pages. The Wayback Machine's crawler only follows

5151-433: The Wayback Machine of persons who do not wish to have their Web content archived. We recognize that Ms. Shell has a valid and enforceable copyright in her Web site and we regret that the inclusion of her Web site in the Wayback Machine resulted in this litigation." Shell said, "I respect the historical value of Internet Archive's goal. I never intended to interfere with that goal nor cause it any harm." Between 2013 and 2016,

SECTION 50

#1732905188635

5252-583: The Wayback Machine to analyze how the development of websites from the mid-1990s to the present has affected the company's growth. When the Wayback Machine archives a page, it usually includes most of the hyperlinks, keeping those links active when they just as easily could have been broken by the Internet's instability. Researchers in India studied the effectiveness of the Wayback Machine's ability to save hyperlinks in online scholarly publications and found that it saved slightly more than half of them. "Journalists use

5353-431: The Wayback Machine to provide "universal access to all knowledge" by preserving archived copies of defunct web pages. Launched on May 10, 1996, the Wayback Machine had saved more than 38.2 billion web pages by the end of 2009. As of November 2024, the Wayback Machine has archived more than 916 billion web pages and well over 100 petabytes of data. The Internet Archive began archiving cached web pages in 1996. One of

5454-451: The Wayback Machine to view dead websites, dated news reports, and changes to website contents. Its content has been used to hold politicians accountable and expose battlefield lies." In 2014, an archived social media page of Igor Girkin , a separatist rebel leader in Ukraine, showed him boasting about his troops having shot down a suspected Ukrainian military airplane before it became known that

5555-458: The Wayback Machine's storage capacity by 700 terabytes. In January 2013, the company announced a milestone of 240 billion URLs. In October 2013, the company introduced the "Save a Page" feature, which allows any Internet user to archive the contents of a URL, and quickly generates a permanent link unlike the preceding liveweb feature. In December 2014, the Wayback Machine contained 435 billion web pages—almost nine petabytes of data, and

5656-556: The advent of mobile warfare , a single fortified stronghold is no longer as decisive as it once was. While traditional sieges do still occur, they are not as common as they once were due to changes in modes of battle, principally the ease by which huge volumes of destructive power can be directed onto a static target. Modern sieges are more commonly the result of smaller hostage, militant, or extreme resisting arrest situations. The Assyrians deployed large labour forces to build new palaces, temples, and defensive walls. Some settlements in

5757-487: The ancient Near East in historical sources and in art, there are very few examples of siege systems that have been found archaeologically. Of the few examples, several are noteworthy: The earliest representations of siege warfare have been dated to the Protodynastic Period of Egypt , c.  3000 BC . These show the symbolic destruction of city walls by divine animals using hoes. The first siege equipment

5858-419: The archive calls a "three-dimensional index". Kahle and Gilliat created the machine hoping to archive the entire Internet and provide "universal access to all knowledge". The name "Wayback Machine" is a reference to a fictional time-traveling device in the animated cartoon The Adventures of Rocky and Bullwinkle and Friends from the 1960s. In a segment of the cartoon entitled "Peabody's Improbable History",

5959-519: The attackers from outside. Ancient cities in the Middle East show archaeological evidence of fortified city walls . During the Warring States period of ancient China , there is both textual and archaeological evidence of prolonged sieges and siege machinery used against the defenders of city walls . Siege machinery was also a tradition of the ancient Greco-Roman world . During the Renaissance and

6060-655: The booty of his conquest undamaged, and retain his men and equipment intact, for the price of a well-placed bribe to a disgruntled gatekeeper. The Assyrian siege of Jerusalem in the 8th century BC came to an end when the Israelites bought them off with gifts and tribute, according to the Assyrian account, or when the Assyrian camp was struck by mass death, according to the Biblical account. Due to logistics, long-lasting sieges involving

6161-468: The campaign had been fulfilled, the Hittite army returned to Carchemish and the city fell after an eight-day siege. Disease was another effective siege weapon, although the attackers were often as vulnerable as the defenders. In some instances, catapults or similar weapons were used to fling diseased animals over city walls in an early example of biological warfare . If all else failed, a besieger could claim

SECTION 60

#1732905188635

6262-412: The characters Mister Peabody and Sherman use the " Wayback Machine " to travel back in time to witness and participate in famous historical events. From 1996 to 2001, the information was kept on digital tape, with Kahle occasionally allowing researchers and scientists to tap into the "clunky" database . When the archive reached its fifth anniversary in 2001, it was unveiled and opened to the public in

6363-440: The collection." On April 17, 2017, reports surfaced of sites that had gone defunct and became parked domains that were using robots.txt to exclude themselves from search engines, resulting in them being inadvertently excluded from the Wayback Machine. Following this, the Internet Archive changed the policy to require an explicit exclusion request to remove sites from the Wayback Machine. Wayback's retroactive exclusion policy

6464-520: The defence of the first cities in the ancient Near East . The walls were built of mudbricks, stone, wood, or a combination of these materials, depending on local availability. They may also have served the dual purpose of showing potential enemies the might of the kingdom. The great walls surrounding the Sumerian city of Uruk gained a widespread reputation. The walls were 9.5 km (5.9 mi) in length, and up to 12 m (39 ft) in height. Later,

6565-458: The defence of their outer borders or sea shores. Unlike the ancient Minoan civilization, the Mycenaean Greeks emphasized the need for fortifications alongside natural defences of mountainous terrain, such as the massive Cyclopean walls built at Mycenae and other adjacent Late Bronze Age (c. 1600–1100 BC) centers of central and southern Greece. Although there are depictions of sieges from

6666-609: The demands on stored food and water. During the Warring States period in China (481–221 BC), warfare lost its honorable, gentlemen's duty that was found in the previous era of the Spring and Autumn period , and became more practical, competitive, cut-throat, and efficient for gaining victory. The Chinese invention of the hand-held, trigger-mechanism crossbow during this period revolutionized warfare, giving greater emphasis to infantry and cavalry and less to traditional chariot warfare. The philosophically pacifist Mohists (followers of

6767-437: The earliest known pages was archived on May 10, 1996, at 2:08   p.m. ( UTC ). Internet Archive founders Brewster Kahle and Bruce Gilliat launched the Wayback Machine in San Francisco , California , in October 2001, primarily to address the problem of web content vanishing whenever it gets changed or when a website is shut down. The service enables users to see archived versions of web pages across time, which

6868-454: The enemy camp from an eruptor ( mu phao ); and when they get there a sound like a thunder-clap is heard, and flashes of light appear. If ten of these shells are fired successfully into the enemy camp, the whole place will be set ablaze... During the Ming dynasty (AD 1368–1644), the Chinese were very concerned with city planning in regards to gunpowder warfare. The site for constructing the walls and

6969-541: The field, he was unable to capture Rome itself. The legionary armies of the Roman Republic and Empire are noted as being particularly skilled and determined in siege warfare. An astonishing number and variety of sieges, for example, formed the core of Julius Caesar 's mid-1st-century BC conquest of Gaul (modern France). In his Commentarii de Bello Gallico ( Commentaries on the Gallic War ), Caesar describes how, at

7070-490: The first night while laying siege to a city, the leader of the Mongol forces would lead from a white tent : if the city surrendered, all would be spared. On the second day, he would use a red tent: if the city surrendered, the men would all be killed, but the rest would be spared. On the third day, he would use a black tent: no quarter would be given. However, the Chinese were not completely defenseless, and from AD 1234 until 1279,

7171-403: The fortification's walls, could allow the attackers to fire down upon the defenders and also advance troops to the wall with less danger than using ladders. In addition to launching projectiles at the fortifications or defenders, it was also quite common to attempt to undermine the fortifications, causing them to collapse. This could be accomplished by digging a tunnel beneath the foundations of

7272-443: The improbably high numbers which he used for both the Mongols and the defenders do give one a sense of the large numbers of machines used at a single siege. Another Mongol tactic was to use catapults to launch corpses of plague victims into besieged cities. The disease-carrying fleas from the bodies would then infest the city, and the plague would spread, allowing the city to be easily captured, although this transmission mechanism

7373-520: The initial lawsuit was filed, the Archive should have removed all previous copies of the plaintiff website from the Wayback Machine, however, some material continued to be publicly visible on Wayback. The lawsuit was settled out of court after Wayback fixed the problem. Activist Suzanne Shell filed suit in December 2005, demanding Internet Archive pay her US$ 100,000 for archiving her website profane-justice.org between 1999 and 2004. Internet Archive filed

7474-529: The mainland, impregnable. The Macedonians built a mole , a raised spit of earth across the water, by piling stones up on a natural land bridge that extended underwater to the island, and although the Tyrians rallied by sending a fire ship to destroy the towers, and captured the mole in a swarming frenzy, the city eventually fell to the Macedonians after a seven-month siege. In complete contrast to Tyre, Sogdian Rock

7575-472: The medieval period, negotiations would frequently take place during the early part of the siege. An attacker – aware of a prolonged siege's great cost in time, money, and lives – might offer generous terms to a defender who surrendered quickly. The defending troops would be allowed to march away unharmed, often retaining their weapons. However, a garrison commander who was thought to have surrendered too quickly might face execution by his own side for treason. As

7676-430: The motion on the ground that defendants were asking to alter Netbula's website and that they should have subpoenaed Internet Archive for the pages directly. An employee of Internet Archive filed a sworn statement supporting Chordiant's motion, however, stating that it could not produce the web pages by any other means "without considerable burden, expense and disruption to its operations." Magistrate Judge Howard Lloyd in

7777-417: The philosopher Mozi ) of the 5th century BC believed in aiding the defensive warfare of smaller Chinese states against the hostile offensive warfare of larger domineering states. The Mohists were renowned in the smaller states (and the enemies of the larger states) for the inventions of siege machinery to scale or destroy walls. These included traction trebuchet catapults , 8-foot (2.4 m) high ballistas ,

7878-532: The plaintiff were invalid, based on the content of their website from several years prior. The plaintiff, Healthcare Advocates, then amended their complaint to include the Internet Archive, accusing the organization of copyright infringement as well as violations of the DMCA and the Computer Fraud and Abuse Act . Healthcare Advocates claimed that, since they had installed a robots.txt file on their website, even if after

7979-513: The plane actually was a civilian Malaysian Airlines jet ( Malaysia Airlines Flight 17 ), after which he deleted the post and blamed Ukraine's military for downing the plane. In 2017, the March for Science originated from a discussion on Reddit that indicated someone had visited Archive.org and discovered that all references to climate change had been deleted from the White House website. In response,

8080-428: The principal city from communicating with other cities where they might expect aid. Secondly, refugees from these smaller cities would flee to the last stronghold. The reports from these cities and the streaming hordes of refugees not only reduced the morale of the inhabitants and garrison of the principal city, it also strained their resources. Food and water reserves were taxed by the sudden influx of refugees. Soon, what

8181-434: The siege was of a location on a coastline, from ships launched from the harbor of the location. The universal method for defending against siege is the use of fortifications, principally walls and ditches , to supplement natural features. A sufficient supply of food and water was also important to defeat the simplest method of siege warfare: starvation . On occasion, the defenders would drive 'surplus' civilians out to reduce

8282-410: The site if it cannot reach the original host. In 2014, there was a six-month lag time between when a website was crawled and when it became available for viewing in the Wayback Machine. As of 2024, the lag time is 3 to 10 hours. The Wayback Machine offers only limited search facilities. Its "Site Search" feature allows users to find a site based on words describing the site, rather than words found on

8383-411: The snapshots on the grounds of hearsay and unauthenticated source, but Magistrate Judge Arlander Keys rejected Telewizja Polska's assertion of hearsay and denied TVP's motion in limine to exclude the evidence at trial. At the trial, however, District Court Judge Ronald Guzman, the trial judge, overruled Magistrate Keys' findings, and held that neither the affidavit of the Internet Archive employee nor

8484-615: The thickness of the walls in Beijing's Forbidden City were favoured by the Chinese Yongle Emperor (r. 1402–1424) because they were in pristine position to resist cannon volley and were built thick enough to withstand attacks from cannon fire. For more, see Technology of the Song dynasty . The introduction of gunpowder and the use of cannons brought about a new age in siege warfare. Cannons were first used in Song dynasty China during

8585-545: The time stamp of the currently viewed page, so they are redirected automatically to their individual captures that are the closest in time. The frequency of snapshot captures varies per website. Websites in the "Worldwide Web Crawls" are included in a "crawl list", with the site archived once per crawl. A crawl can take months or even years to complete, depending on size. For example, "Wide Crawl Number 13" started on January 9, 2015, and completed on July 11, 2016. However, there may be multiple crawls ongoing at any one time, and

8686-415: The underlying links are not exposed and therefore, can contain errors. For example, archives such as the Wayback Machine do not fill out forms and therefore, do not include the contents of non- RESTful e-commerce databases in their archives. In Europe, the Wayback Machine could be interpreted as violating copyright laws. Only the content creator can decide where their content is published or duplicated so

8787-547: The underlying pages (i.e., the Telewizja Polska website) were admissible as evidence. Judge Guzman reasoned that the employee's affidavit contained both hearsay and inconclusive supporting statements, and the purported web page, printouts were not self-authenticating. The United States Patent and Trademark Office and the European Patent Office will accept date stamps from the Internet Archive as evidence of when

8888-401: The use of deception or treachery to bypass defenses. Failing a military outcome, sieges can often be decided by starvation, thirst, or disease, which can afflict either the attacker or defender. This form of siege, though, can take many months or even years, depending upon the size of the stores of food the fortified position holds. The attacking force can circumvallate the besieged place, which

8989-529: The walls of Babylon , reinforced by towers, moats, and ditches, gained a similar reputation. In Anatolia , the Hittites built massive stone walls around their cities atop hillsides, taking advantage of the terrain. In Shang dynasty China, at the site of Ao, large walls were erected in the 15th century BC that had dimensions of 20 m (66 ft) in width at the base and enclosed an area of some 1,900 m (2,100 yd) squared. The ancient Chinese capital for

9090-534: The walls, and then deliberately collapsing or exploding the tunnel. This process is known as mining . The defenders could dig counter-tunnels to cut into the attackers' works and collapse them prematurely. Fire was often used as a weapon when dealing with wooden fortifications. The Roman Empire used Greek fire , which contained additives that made it hard to extinguish. Combined with a primitive flamethrower , it proved an effective offensive and defensive weapon. A sallying out might also occur with such weapons, or if

9191-486: The web pages themselves. The Wayback Machine does not include every web page ever made due to the limitations of its web crawler. The Wayback Machine cannot completely archive web pages that contain interactive features such as Flash platforms and forms written in JavaScript and progressive web applications , because those functions require interaction with the host website. This means that, since approximately July 9, 2013,

9292-404: The website allows the Wayback Machine to " crawl " it and save the data. On October 30, 2020, the Wayback Machine began fact-checking content. As of January 2022, domains of ad servers are disabled from capturing. In May 2021, for Internet Archive's 25th anniversary, the Wayback Machine introduced the "Wayforward Machine" which allows users to "travel to the Internet in 2046, where knowledge

9393-568: The years, the storage capacity of the Wayback Machine has grown. In 2003, after only two years of public access, the Wayback Machine was growing at a rate of 12 terabytes per month. The data is stored on PetaBox rack systems custom designed by Internet Archive staff. The first 100TB rack became fully operational in June 2004, although it soon became clear that they would need much more storage than that. The Internet Archive migrated its customized storage architecture to Sun Open Storage in 2009, and hosts

9494-634: Was achieved. Some popular tales existed on how the cunning heroes succeeded in their sieges. The best-known is the Trojan Horse of the Trojan War , and a similar story tells how the Canaanite city of Joppa was conquered by the Egyptians in the 15th century BC. The Biblical Book of Joshua contains the story of the miraculous Battle of Jericho . A more detailed historical account from the 8th century BC, called

9595-404: Was captured by stealthy attack. Alexander used commando-like tactics to scale the cliffs and capture the high ground, and the demoralized defenders surrendered. The importance of siege warfare in the ancient period should not be underestimated. One of the contributing causes of Hannibal 's inability to defeat Rome was his lack of siege engines , thus, while he was able to defeat Roman armies in

9696-434: Was developed for use by besieging armies. Ladders could be used to escalade over the defenses. Battering rams and siege hooks could also be used to force through gates or walls, while catapults , ballistae , trebuchets , mangonels , and onagers could be used to launch projectiles to break down a city's fortifications and kill its defenders. A siege tower , a substantial structure built to equal or greater height than

9797-470: Was growing at about 20 terabytes a week. In July 2016, the Wayback Machine reportedly contained around 15 petabytes of data. In October 2016, it was announced that the way web pages are counted would be changed, resulting in the decrease of the archived pages counts shown. Embedded objects such as pictures, videos, style sheets, JavaScripts are no longer counted as a "web page", whereas HTML, PDF, and plain text documents remain counted. In September 2018,

9898-447: Was in response to a "request by the site owner". Later, it was clarified that lawyers from the Church of Scientology had demanded the removal and that the site owners did not want their material removed. In 2003, Harding Earley Follmer & Frailey defended a client from a trademark dispute using the Archive's Wayback Machine. The attorneys were able to demonstrate that the claims made by

9999-617: Was not known at the time. In 1346, the bodies of Mongol warriors of the Golden Horde who had died of plague were thrown over the walls of the Crimean city of Kaffa (now Feodosiya ) during the Siege of Caffa . It has been speculated that this operation may have been responsible for the advent of the Black Death in Europe. The Black Death is estimated to have killed 30%–60% of Europe's population. On

10100-507: Was once a formidable undertaking became easy. The Mongols were then free to lay siege without interference of the field army, as it had been destroyed. At the siege of Aleppo , Hulagu used twenty catapults against the Bab al-Iraq ( Gate of Iraq ) alone. In Jûzjânî, there are several episodes in which the Mongols constructed hundreds of siege machines in order to surpass the number which the defending city possessed. While Jûzjânî surely exaggerated,

10201-512: Was said on the Wayback Machine forum that "the Beta of the new Wayback Machine has a more complete and up-to-date index of all crawled materials into 2010, and will continue to be updated regularly. The index driving the classic Wayback Machine only has a little bit of material past 2008, and no further index updates are planned, as it will be phased out this year." Also in 2011, the Internet Archive installed their sixth pair of PetaBox racks which increased

#634365