2018 Top Ten of Polemic for Technology

Telephone call
A telephone call is a connection over a telephone network between the called party and the calling party
Digital video fingerprinting
Video fingerprinting or video hashing are a class of dimension reduction techniques in which a system identifies, extracts, and then summarizes characteristic components of a video as a unique or a set of multiple perceptual hashes, enabling that video to be uniquely identified. This technology has proven to be effective at searching and comparing video files
X video extension
The X video extension, often abbreviated as XVideo or Xv, is a video output mechanism for the X Window System. The protocol was designed by David Carver; the specification for version 2 of the protocol was written in July 1991. It is mainly used today to resize video content in the video controller hardware in order to enlarge a given video or to watch it in full screen mode. Without XVideo, X would have to do this scaling on the main CPU. That requires a considerable amount of processing power, which
Guided missiles of India
India has studied, produced and used various strategic and tactical missile systems since its independence. Decades long projects have realised development of all types of missile systems including ballistic, cruise, anti-ship, air-defence, air to air and anti-missile systems. India is one of seven countries in the world with ICBMs and one of four countries with anti-ballistic missile systems. Since 2016, India has been a member of Missile Technology Control Regime (MTCR
Common year starting on Sunday
A common year starting on Sunday is any non-leap year that begins on Sunday, 1 January, and ends on Sunday, 31 December. Its dominical letter hence is A. The most recent year of such kind was 2017 and the next one will be 2023 in the Gregorian calendar, or, likewise, 2007, 2018 and 2029 in the obsolete Julian calendar, see below for more
Identification (information)
For data storage, identification is the capability to find, retrieve, report, change, or delete specific data without ambiguity. This applies especially to information stored in databases. In database normalisation, the process of organizing the fields and tables of a relational database to minimize redundancy and dependency, is the central, defining function of the discipline
Rescue robot
A rescue robot is a robot designed to aid in the search and rescue of humans. They may assist rescue efforts by searching, mapping, removing rubble, delivering supplies, providing medical treatment or evacuating casualties
Proxy auto-config
A proxy auto-config (PAC) file defines how web browsers and other user agents can automatically choose the appropriate proxy server for fetching a given URL
Ten Commandments of Computer Ethics
The Ten Commandments of Computer Ethics were created in 1992 by the Washington, D.C. based Computer Ethics Institute. The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in the ethical use of computers." They follow the Internet Advisory Board's memo on ethics from 1987. The Ten Commandments of Computer Ethics copies the archaic style of the Ten Commandments from the
Client–server model
Client-server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients. Often clients and servers communicate over a computer network on separate hardware, but both client and server may reside in the same system. A server host runs one or more server programs, which share their resources with clients. A client usually does not share any of its resources, but it requests content or