Search This Blog

Thursday, November 30, 2023

Component Object Model

From Wikipedia, the free encyclopedia
 
Component Object Model
AbbreviationCOM
StatusIn force
First published1993; 30 years ago
Latest versionLiving standard
2021
OrganizationMicrosoft
SeriesSystem Services
Base standardsMIDL, UUID
Related standards
DomainComponent Interfacing
Websitelearn.microsoft.com/en-us/windows/win32/com/the-component-object-model

Component Object Model (COM) is a binary-interface standard for software components introduced by Microsoft in 1993. It is used to enable inter-process communication object creation in a large range of programming languages. COM is the basis for several other Microsoft technologies and frameworks, including OLE, OLE Automation, Browser Helper Object, ActiveX, COM+, DCOM, the Windows shell, DirectX, UMDF and Windows Runtime. The essence of COM is a language-neutral way of implementing objects that can be used in environments different from the one in which they were created, even across machine boundaries. For well-authored components, COM allows reuse of objects with no knowledge of their internal implementation, as it forces component implementers to provide well-defined interfaces that are separated from the implementation. The different allocation semantics of languages are accommodated by making objects responsible for their own creation and destruction through reference-counting. Type conversion casting between different interfaces of an object is achieved through the QueryInterface method. The preferred method of "inheritance" within COM is the creation of sub-objects to which method "calls" are delegated.

COM is an interface technology defined and implemented as standard only on Microsoft Windows and Apple's Core Foundation 1.3 and later plug-in application programming interface (API). The latter only implements a subset of the whole COM interface. For some applications, COM has been replaced at least to some extent by the Microsoft .NET framework, and support for Web Services through the Windows Communication Foundation (WCF). However, COM objects can be used with all .NET languages through .NET COM Interop. Networked DCOM uses binary proprietary formats, while WCF encourages the use of XML-based SOAP messaging. COM is very similar to other component software interface technologies, such as CORBA and Enterprise JavaBeans, although each has its own strengths and weaknesses. Unlike C++, COM provides a stable application binary interface (ABI) that does not change between compiler releases. This makes COM interfaces attractive for object-oriented C++ libraries that are to be used by clients compiled using different compiler versions.

History

One of the first methods of interprocess communication in Windows was Dynamic Data Exchange (DDE), first introduced in 1987, that allowed sending and receiving messages in so-called "conversations" between applications. Antony Williams, who was involved in the creation of the COM architecture, later distributed two internal papers in Microsoft that embraced the concept of software components: Object Architecture: Dealing With the Unknown – or – Type Safety in a Dynamically Extensible Class Library in 1988 and On Inheritance: What It Means and How To Use It in 1990. These provided the foundation of many of the ideas behind COM. Object Linking and Embedding (OLE), Microsoft's first object-based framework, was built on top of DDE and designed specifically for compound documents. It was introduced with Word for Windows and Excel in 1991, and was later included with Windows, starting with version 3.1 in 1992. An example of a compound document is a spreadsheet embedded in a Word for Windows document: as changes are made to the spreadsheet within Excel, they appear automatically inside the Word document.

In 1991, Microsoft introduced Visual Basic Extensions (VBX) with Visual Basic 1.0. A VBX is a packaged extension in the form of a dynamic-link library (DLL) that allows objects to be graphically placed in a form and manipulated by properties and methods. These were later adapted for use by other languages such as Visual C++. In 1992, when version 3.1 of Windows was released, Microsoft released OLE 2 with its underlying object model. The COM Application binary interface (ABI) was the same as the MAPI ABI (released in 1992), and like it was based on MSRPC and ultimately on the Open Group's DCE/RPC. While OLE 1 was focused on compound documents, COM and OLE 2 were designed to address software components in general. Text conversations and Windows messages had proved not to be flexible enough to allow sharing application features in a robust and extensible way, so COM was created as a new foundation, and OLE changed to OLE2. In 1994 OLE custom controls (OCXs) were introduced as the successor to VBX controls. At the same time, Microsoft stated that OLE 2 would just be known as "OLE", and that OLE was no longer an acronym, but a name for all of the company's component technologies. In early 1996, Microsoft found a new use for OLE Custom Controls, expanding their Web browser's capability to present content, renamed some parts of OLE relating to the Internet "ActiveX", and gradually renamed all OLE technologies to ActiveX, except the compound document technology that was used in Microsoft Office. Later that year, Microsoft extended COM to work across the network with DCOM.

Related technologies

COM was the major software development platform for Windows and, as such, influenced development of a number of supporting technologies. It was likewise heavily influenced by earlier technologies.

DDE

COM replaced DDE as the preferred form of interprocess communication.

DCE/RPC and MSRPC

As a cross-language component model, COM relies on an interface definition language, or IDL, to describe the objects and associated functions. The COM IDL is based heavily on the feature-rich DCE/RPC IDL, with object-oriented extensions. Microsoft's own implementation of DCE/RPC, known as MSRPC, is heavily used as the primary inter-process communication mechanism for Windows NT services and internal components, making it an obvious choice of foundation.

DCOM

DCOM (Distributed COM) extended the reach of COM from merely supporting a single user with separate applications communicating on the Windows desktop, to activating objects running under different security contexts, and on different machines across the network. With this were added necessary features for configuring which users have authority to create, activate and call objects, for identifying the calling user, as well as specifying required encryption for security of calls.

COM+

In order for Microsoft to provide developers with support for distributed transactions, resource pooling, disconnected applications, event publication and subscription, better memory and processor (thread) management, as well as to position Windows as an alternative to other enterprise-level operating systems, Microsoft introduced a technology called Microsoft Transaction Server (MTS) on Windows NT 4. With Windows 2000, that significant extension to COM was incorporated into the operating system (as opposed to the series of external tools provided by MTS) and renamed COM+. At the same time, Microsoft de-emphasized DCOM as a separate entity. Components that made use of COM+ services were handled more directly by the added layer of COM+, in particular by operating system support for interception. In the first release of MTS, interception was tacked on - installing an MTS component would modify the Windows Registry to call the MTS software, and not the component directly. Windows 2000 also revised the Component Services control panel application used to configure COM+ components.

An advantage of COM+ was that it could be run in "component farms". Instances of a component, if coded properly, could be pooled and reused by new calls to its initializing routine without unloading it from memory. Components could also be distributed (called from another machine). COM+ and Microsoft Visual Studio provided tools to make it easy to generate client-side proxies, so although DCOM was used to make the remote call, it was easy to do for developers. COM+ also introduced a subscriber/publisher event mechanism called COM+ Events, and provided a new way of leveraging MSMQ (a technology that provides inter-application asynchronous messaging) with components called Queued Components. COM+ events extend the COM+ programming model to support late-bound (see Late binding) events or method calls between the publisher or subscriber and the event system.

.NET

Microsoft .NET provides means both to provide component technology, and to interact with COM+ (via COM-interop-assemblies); .NET provides wrappers to most of the commonly used COM controls. Microsoft .NET hides most detail from component creation and therefore eases development. .NET can leverage COM+ via the System.EnterpriseServices namespace, and several of the services that COM+ provides have been duplicated in recent releases of .NET. For example, the System.Transactions namespace in .NET provides the TransactionScope class, which provides transaction management without resorting to COM+. Similarly, queued components can be replaced by Windows Communication Foundation with an MSMQ transport. (MSMQ is a native COM component, however.) There is limited support for backward compatibility. A COM object may be used in .NET by implementing a Runtime Callable Wrapper (RCW). NET objects that conform to certain interface restrictions may be used in COM objects by calling a COM callable wrapper (CCW). From both the COM and .NET sides, objects using the other technology appear as native objects. See COM Interop. WCF (Windows Communication Foundation) eases a number of COM's remote execution challenges. For instance, it allows objects to be transparently marshalled by value across process or machine boundaries more easily.

Windows Runtime

Microsoft's Windows Runtime (or WinRT, not to be confused with Windows RT) programming and application model is essentially a COM-based API, although it relies on an enhanced COM. Because of its COM-like basis, Windows Runtime allows relatively easy interfacing from multiple languages, just as COM does, but it is essentially an unmanaged, native API. The API definitions are, however, stored in ".winmd" files, which are encoded in ECMA 335 metadata format, the same CLI metadata format that .NET uses with a few modifications. This common metadata format allows for significantly less overhead than P/Invoke when WinRT is invoked from .NET applications, and its syntax is much simpler.

Nano-COM (a.k.a XPCOM)

Nano-COM is an extremely small subset of the Component Object Model that is focused exclusively on the Application Binary Interface (ABI) aspects of COM that enable function and method calls across independently compiled modules/components. Nano-COM can be expressed easily in a single C++ header file that is portable to all C++ compilers. Nano-COM extends the native ABI of the underlying instruction architecture and OS to add support for typed object references (typical ABIs focus only on atomic types, structures, arrays and function calling conventions). The basis of Nano-COM was used by Mozilla to bootstrap Firefox (called XPCOM), and is currently in use as the base ABI technology for DirectX/Direct3D/DirectML.

A Nano-COM header file defines or names at least three types:

  • GUID to identify interface types - this is effectively a 128 bit number
  • HRESULT to identify error codes from method calls - this is effectively a standardized usage of 32-bit ints to well known values (S_OK, E_FAIL, E_OUTOFMEMORY, etc)
  • IUnknown as the base type for all typed object references - this is effectively abstract virtual functions to support dynamic_cast<T>-style acquisition of new interface types and ref counting a la shared_ptr<T>

Many uses of Nano-COM also define two functions to address callee-allocated memory buffers as results

  • <NanoCom>Alloc – called by method implementations to allocate raw buffers (not objects) that are returned to the caller
  • <NanoCom>Free – called by method callers to free callee-allocated buffers once no longer in use

Some implementations of Nano-COM such as Direct3D eschew the allocator functions and restrict themselves to only use caller-allocated buffers.

Nano-COM has no notion of classes, apartments, marshaling, registration, etc. Rather, object references are simply passed across function boundaries and allocated via standard language constructs (e.g., C++ new operator).

Security

COM and ActiveX components are run as native code on the user's machine, with no sandboxing. There are therefore few restrictions on what the code can do. The prior practice of embedding ActiveX components on web pages with Internet Explorer did therefore lead to problems with malware infections. Microsoft recognized the problem with ActiveX as far back as 1996 when Charles Fitzgerald said, "We never made the claim up front that ActiveX is intrinsically secure". Recent versions of Internet Explorer prompt the user before installing ActiveX controls, enabling the user to disallow installation of controls from sites that the user does not trust. The ActiveX controls are signed with digital signatures to guarantee their authenticity. It is also possible to disable ActiveX controls altogether, or to allow only a selected few. The transparent support for out-of-process COM servers still promotes software safety in terms of process isolation. This can be useful for decoupling subsystems of large application into separate processes. Process isolation limits state corruption in one process from negatively affecting the integrity of the other processes, since they only communicate through strictly defined interfaces. Thus, only the affected subsystem needs to be restarted in order to regain valid state. This is not the case for subsystems within the same process, where a rogue pointer in one subsystem can randomly corrupt other subsystems.

Technical details

COM programmers build their software using COM-aware components. Different component types are identified by class IDs (CLSIDs), which are Globally Unique Identifiers (GUIDs). Each COM component exposes its functionality through one or more interfaces. The different interfaces supported by a component are distinguished from each other using interface IDs (IIDs), which are GUIDs too. COM interfaces have bindings in several languages, such as C, C++, Visual Basic, Delphi, Python and several of the scripting languages implemented on the Windows platform. All access to components is done through the methods of the interfaces. This allows techniques such as inter-process, or even inter-computer programming (the latter using the support of DCOM).

Interfaces

All COM components implement the IUnknown (custom) interface, which exposes methods for reference counting and type conversion (casting). A custom IUnknown interface consists of a pointer to a virtual method table that contains a list of pointers to the functions that implement the functions declared in the interface, in the same order that they are declared in the interface. The in-process invocation overhead is therefore comparable to virtual method calls in C++. In addition to custom interfaces, COM also supports dispatch interfaces inheriting from IDispatch. Dispatch interfaces support late binding for OLE Automation. This allows dispatch interfaces to be natively accessed from a wider range of programming languages than custom interfaces.

Classes

A COM class ("coclass") is a concrete implementation of one or more interfaces, and closely resembles classes in object-oriented programming languages. Classes are created based on their class ID (CLSID) or based on their programmatic identifier string (ProgID). Like many object-oriented languages, COM provides a separation of interface from implementation. This distinction is especially strong in COM, where objects cannot be accessed directly, but only through their interfaces. COM also has support for multiple implementations of the same interface, so that clients at runtime can choose which implementation of an interface to instantiate.

Interface Definition Language and type libraries

Type libraries contain metadata to represent COM types. These types are described using Microsoft Interface Definition Language (MSIDL/IDL). IDL files define object-oriented classes, interfaces, structures, enumerations and other user-defined types in a language independent manner. IDL is similar in appearance to C++ declarations with some additional keywords such as "interface" and "library" for defining interfaces and collections of classes. IDL also supports the use of bracketed attributes before declarations to provide additional information, such as interface GUIDs and the relationships between pointer parameters and length fields. IDL files are compiled by the MIDL compiler. For C/C++, the MIDL compiler generates a compiler-independent header file containing struct definitions to match the vtbls of the declared interfaces and a C file containing declarations of the interface GUIDs. C++ source code for a proxy module can also be generated by the MIDL compiler. This proxy contains method stubs for converting COM calls into remote procedure calls to enable DCOM for out-of-process communication. IDL files can also be compiled by the MIDL compiler into a type library (TLB). TLB files contain binary metadata that can be processed by different language compilers and runtime environments (e.g. VB, Delphi, .NET etc.) to generate language-specific constructs to represent the COM types defined in the TLB. For C++, this will convert the TLB back to its IDL representation.

Object framework

Because COM is a runtime framework, types have to be individually identifiable and specifiable at runtime. To achieve this, globally unique identifiers (GUIDs) are used. Each COM type is designated its own GUID for identification at runtime. In order for information on COM types to be accessible at both compile time and runtime, COM uses type libraries. It is through the effective use of type libraries that COM achieves its capabilities as a dynamic framework for the interaction of objects.

Consider the following example coclass definition in an IDL:

coclass SomeClass {
  [default] interface ISomeInterface;
};

The above code fragment declares a COM class named SomeClass which implements an interface named ISomeInterface.

This is conceptually equivalent to defining the following C++ class:

class SomeClass : public ISomeInterface {
  ...
  ...
};

where ISomeInterface is a C++ pure virtual class (sometimes called an abstract base class).

The IDL files containing COM interfaces and classes are compiled into type libraries (TLB) files, which can later be parsed by clients at runtime to determine which interfaces an object supports, and invoke an object's interface methods.

In C++, COM objects are instantiated with the CoCreateInstance function that takes the class ID (CLSID) and interface ID (IID) as arguments. Instantiation of SomeClass can be implemented as follows:

ISomeInterface* interface_ptr = NULL;
HRESULT hr = CoCreateInstance(CLSID_SomeClass, NULL, CLSCTX_ALL,
                              IID_ISomeInterface, (void**)&interface_ptr);

In this example, the COM sub-system is used to obtain a pointer to an object that implements ISomeInterface interface, and coclass CLSID_SomeClass's particular implementation of this interface is required.

Reference counting

All COM objects utilize reference counting to manage object lifetimes. The reference counts are controlled by the clients through the AddRef and Release methods in the mandatory IUnknown interface that all COM objects implement. COM objects are then responsible for freeing their own memory when the reference count drops to zero. Certain languages (e.g. Visual Basic) provide automatic reference counting so that COM object developers need not explicitly maintain any internal reference counter in their source codes. In C++, a coder may either perform explicit reference counting or use smart pointers to automatically manage the reference counts.

The following are guidelines for when to call AddRef and Release on COM objects:

  • Functions and methods that return interface references (via return value or via "out" parameter) shall increment the reference count of the returned object before returning.
  • Release must be called on an interface pointer before the pointer is overwritten or goes out of scope.
  • If a copy is made on an interface reference pointer, AddRef should be called on that pointer.
  • AddRef and Release must be called on the specific interface which is being referenced since an object may implement per-interface reference counts in order to allocate internal resources only for the interfaces which are being referenced.

Not all reference count calls are sent to remote objects over the wire; a proxy keeps only one reference on the remote object and maintains its own local reference count. To simplify COM development, Microsoft introduced ATL (Active Template Library) for C++ developers. ATL provides for a higher-level COM development paradigm. It also shields COM client application developers from the need to directly maintain reference counting, by providing smart pointer objects. Other libraries and languages that are COM-aware include the Microsoft Foundation Classes, the VC Compiler COM Support, VBScript, Visual Basic, ECMAScript (JavaScript) and Borland Delphi.

Programming

COM is a language agnostic binary standard that can be developed in any programming language capable of understanding and implementing its binary defined data types and interfaces. COM implementations are responsible for entering and leaving the COM environment, instantiating and reference-counting COM objects, querying objects for supported interfaces, as well as handling errors. The Microsoft Visual C++ compiler supports extensions to the C++ language referred to as C++ Attributes. These extensions are designed to simplify COM development and remove much of the boilerplate code required to implement COM servers in C++.

Registry usage

In Windows, COM classes, interfaces and type libraries are listed by GUIDs in the registry, under HKEY_CLASSES_ROOT\CLSID for classes and HKEY_CLASSES_ROOT\Interface for interfaces. COM libraries use the registry to locate either the correct local libraries for each COM object or the network location for a remote service.

Registration-free COM

Registration-Free COM (RegFree COM) is a technology introduced with Windows XP that allows Component Object Model (COM) components to store activation metadata and CLSID (Class ID) for the component without using the registry. Instead, the metadata and CLSIDs of the classes implemented in the component are declared in an assembly manifest (described using XML), stored either as a resource in the executable or as a separate file installed with the component. This allows multiple versions of the same component to be installed in different directories, described by their own manifests, as well as XCOPY deployment. This technique has limited support for EXE COM servers and cannot be used for system-wide components such as MDAC, MSXML, DirectX or Internet Explorer.

During application loading, the Windows loader searches for the manifest. If it is present, the loader adds information from it to the activation context. When the COM class factory tries to instantiate a class, the activation context is first checked to see if an implementation for the CLSID can be found. Only if the lookup fails, the registry is scanned.

Manually instantiating COM objects

COM objects can also be created manually, given the path of the DLL file and GUID of the object. This does not require the DLL or GUID to be registered in the system registry, and does not make use of manifest files. A COM DLL exports a function named DllGetClassObject. Calling DllGetClassObject with the desired GUID and IID_IClassFactory provides an instance of a factory object. The Factory object has a CreateInstance method, which can create instances of an object given an interface GUID. This is the same process internally used when creating instances of registered COM components.

If the created COM object instantiates another COM object using the generic CoCreateInstance API, it will try to do so in the usual generic way, using the registry or manifest files. But it can create internal objects (which may not be registered at all), and hand out references to interfaces to them, using its own private knowledge.

Process and network transparency

COM objects can be transparently instantiated and referenced from within the same process (in-process), across process boundaries (out-of-process), or remotely over the network (DCOM). Out-of-process and remote objects use marshalling to serialize method calls and return values over process or network boundaries. This marshalling is invisible to the client, which accesses the object as if it were a local in-process object.

Threading

In COM, threading is addressed through a concept known as apartments. An individual COM object lives in exactly one apartment, which might either be single-threaded or multi-threaded. There are three types of apartments in COM: Single-Threaded Apartment (STA), Multi-Threaded Apartment (MTA), and Thread Neutral Apartment (NA). Each apartment represents one mechanism whereby an object's internal state may be synchronized across multiple threads. A process can consist of multiple COM objects, some of which may use STA and others of which may use MTA. All threads accessing COM objects similarly live in one apartment. The choice of apartment for COM objects and threads are determined at run-time, and cannot be changed.

Apartment type Description
Single-Threaded Apartment (STA), (ThreadingModel=Apartment) A single thread is dedicated to execute the methods of the object. In such an arrangement, method calls from threads outside of the apartment are marshalled and automatically queued by the system (via a standard Windows message queue). Thus, the COM run-time provides automatic synchronization to ensure that each method call of an object is always executed to completion before another is invoked. The developer therefore does not need to worry about thread locking or race conditions.
Multi-Threaded Apartment (MTA), (ThreadingModel=Free) The COM run-time provides no synchronization, and multiple threads are allowed to call COM objects simultaneously. COM objects therefore need to perform their own synchronization to prevent simultaneous access from multiple threads from causing a race condition. Calls to an MTA object from a thread in an STA are also marshalled.
Dynamically determined apartment (ThreadingModel=Both) In the Both apartment mode, the server auto-selects STA or MTA at object creation to match the apartment type of the calling thread. This can be useful to avoid marshaling overhead when MTA servers are accessed by a STA thread.
Thread Neutral Apartment (NA), (ThreadingModel=Neutral) A special apartment without any assigned threads. When an STA or MTA thread calls an NA object in the same process, then the calling thread temporarily leaves its apartment and executes code directly in the NA without any thread switching. Therefore, one can think of NA as an optimization for efficient interapartment method calls.

Threads and objects which belong to the same apartment follow the same thread access rules. Method calls which are made inside the same apartment are therefore performed directly without any assistance from COM. Method calls made across apartments are achieved via marshalling. This requires the use of proxies and stubs.

Criticisms

Since COM has a fairly complex implementation, programmers can be distracted by some of the "plumbing" issues.

Message pumping

When an STA is initialized it creates a hidden window that is used for inter-apartment and inter-process message routing. This window must have its message queue regularly "pumped". This construct is known as a "message pump". On earlier versions of Windows, failure to do so could cause system-wide deadlocks. This problem is complicated by some Windows APIs that initialize COM as part of their implementation, which causes a "leak" of implementation details.

Reference counting

Reference counting within COM may cause problems if two or more objects are circularly referenced. The design of an application must take this into account so that objects are not left orphaned. Objects may also be left with active reference counts if the COM "event sink" model is used. Since the object that fires the event needs a reference to the object reacting to the event, the latter's reference count will never reach zero. Reference cycles are typically broken using either out-of-band termination or split identities. In the out-of-band termination technique, an object exposes a method which, when called, forces it to drop its references to other objects, thereby breaking the cycle. In the split identity technique, a single implementation exposes two separate COM objects (also known as identities). This creates a weak reference between the COM objects, preventing a reference cycle.

DLL Hell

Because in-process COM components are implemented in DLL files and registration only allows for a single version per CLSID, they might in some situations be subject to the "DLL Hell" effect. Registration-free COM capability eliminates this problem for in-process components; registration-free COM is not available for out-of-process servers.

Java applet

From Wikipedia, the free encyclopedia
A Java applet that was created as supplementary demonstration material for a scientific publication
A Java applet that uses 3D hardware acceleration to visualize 3D files in .pdb format downloaded from a server
Using applet for nontrivial animation illustrating biophysical topic (randomly moving ions pass through voltage gates)
Using a Java applet for computation – intensive visualization of the Mandelbrot set
Applets' running speed is sufficient for making e.g. nontrivial computer games that play chess.
NASA World Wind (open source) is a second generation applet that makes heavy use of OpenGL and on-demand data downloading to provide a detailed 3D map of the world.
Web access to the server console at the hardware level with the help of a Java applet
Demonstration of image processing using two dimensional Fourier transform

Java applets were small applications written in the Java programming language, or another programming language that compiles to Java bytecode, and delivered to users in the form of Java bytecode. The user launched the Java applet from a web page, and the applet was then executed within a Java virtual machine (JVM) in a process separate from the web browser itself. A Java applet could appear in a frame of the web page, a new application window, Sun's AppletViewer, or a stand-alone tool for testing applets.

Java applets were introduced in the first version of the Java language, which was released in 1995. Beginning in 2013, major web browsers began to phase out support for the underlying technology applets used to run, with applets becoming completely unable to be run by 2015–2017. Java applets were deprecated by Java 9 in 2017.

Java applets were usually written in Java, but other languages such as Jython, JRuby, Pascal, Scala, NetRexx, or Eiffel (via SmartEiffel) could be used as well.

Java applets run at very fast speeds and until 2011, they were many times faster than JavaScript.[citation needed] Unlike JavaScript, Java applets had access to 3D hardware acceleration, making them well-suited for non-trivial, computation-intensive visualizations. As browsers have gained support for hardware-accelerated graphics thanks to the canvas technology (or specifically WebGL in the case of 3D graphics), as well as just-in-time compiled JavaScript, the speed difference has become less noticeable.

Since Java bytecode is cross-platform (or platform independent), Java applets could be executed by clients for many platforms, including Microsoft Windows, FreeBSD, Unix, macOS and Linux. They could not be run on mobile devices, which do not support running standard Oracle JVM bytecode. Android devices can run code written in Java compiled for the Android Runtime.

Overview

The applets are used to provide interactive features to web applications that cannot be provided by HTML alone. They can capture mouse input and also have controls like buttons or check boxes. In response to user actions, an applet can change the provided graphic content. This makes applets well-suited for demonstration, visualization, and teaching. There are online applet collections for studying various subjects, from physics to heart physiology.

An applet can also be a text area only; providing, for instance, a cross-platform command-line interface to some remote system. If needed, an applet can leave the dedicated area and run as a separate window. However, applets have very little control over web page content outside the applet's dedicated area, so they are less useful for improving the site appearance in general, unlike other types of browser extensions (while applets like news tickers or WYSIWYG editors are also known). Applets can also play media in formats that are not natively supported by the browser.

Pages coded in HTML may embed parameters within them that are passed to the applet. Because of this, the same applet may have a different appearance depending on the parameters that were passed.

As applets were available before HTML5, modern CSS and JavaScript interface DOM were standard, they were also widely used for trivial effects such as mouseover and navigation buttons. This approach, which posed major problems for accessibility and misused system resources, is no longer in use and was strongly discouraged even at the time.

Technical information

Most browsers executed Java applets in a sandbox, preventing applets from accessing local data like the file system. The code of the applet was downloaded from a web server, after which the browser either embedded the applet into a web page or opened a new window showing the applet's user interface.

The first implementations involved downloading an applet class by class. While classes are small files, there are often many of them, so applets got a reputation as slow-loading components. However, since .jars were introduced, an applet is usually delivered as a single file that has a size similar to an image file (hundreds of kilobytes to several megabytes).

Java system libraries and runtimes are backwards-compatible, allowing one to write code that runs both on current and on future versions of the Java virtual machine.

Similar technologies

Many Java developers, blogs and magazines recommended that the Java Web Start technology be used in place of applets. Java Web Start allowed the launching of unmodified applet code, which then ran in a separate window (not inside the invoking browser).

A Java Servlet is sometimes informally compared to be "like" a server-side applet, but it is different in its language, functions, and in each of the characteristics described here about applets.

Embedding into a web page

The applet would be displayed on the web page by making use of the deprecated applet HTML element, or the recommended object element. The embed element can be used with Mozilla family browsers (embed was deprecated in HTML 4 but is included in HTML 5). This specifies the applet's source and location. Both object and embed tags can also download and install Java virtual machine (if required) or at least lead to the plugin page. applet and object tags also support loading of the serialized applets that start in some particular (rather than initial) state. Tags also specify the message that shows up in place of the applet if the browser cannot run it due to any reason.

However, despite object being officially a recommended tag in 2010, the support of the object tag was not yet consistent among browsers and Sun kept recommending the older applet tag for deploying in multibrowser environments, as it remained the only tag consistently supported by the most popular browsers. To support multiple browsers, using the object tag to embed an applet would require JavaScript (that recognizes the browser and adjusts the tag), usage of additional browser-specific tags or delivering adapted output from the server side.

The Java browser plug-in relied on NPAPI, which nearly all web browser vendors have removed support for, or do not implement, due to its age and security issues. In January 2016, Oracle announced that Java runtime environments based on JDK 9 will discontinue the browser plug-in.

Advantages

A Java applet could have any or all of the following advantages:

  • It was simple to make it work on FreeBSD, Linux, Microsoft Windows and macOS – that is, to make it cross-platform. Applets were supported by most web browsers through the first decade of the 21st century; since then, however, most browsers have dropped applet support for security reasons.
  • The same applet would work on "all" installed versions of Java at the same time, rather than just the latest plug-in version only. However, if an applet requires a later version of the Java Runtime Environment (JRE) the client would be forced to wait during the large download.
  • Most web browsers cached applets so they were quick to load when returning to a web page. Applets also improved with use: after a first applet is run, the JVM was already running and subsequent applets started quickly (the JVM will need to restart each time the browser starts afresh). JRE versions 1.5 and greater restarted the JVM when the browser navigates between pages, as a security measure which removed that performance gain.
  • It moved work from the server to the client, making a web solution more scalable with the number of users/clients.
  • If a standalone program (like Google Earth) talks to a web server, that server normally needs to support all prior versions for users who have not kept their client software updated. In contrast, a browser loaded (and cached) the latest applet version, so there is no need to support legacy versions.
  • Applet naturally supported changing user state, such as figure positions on the chessboard.
  • Developers could develop and debug an applet directly simply by creating a main routine (either in the applet's class or in a separate class) and calling init() and start() on the applet, thus allowing for development in their favorite Java SE development environment. All one had to do was to re-test the applet in the AppletViewer program or a web browser to ensure it conforms to security restrictions.
  • An untrusted applet had no access to the local machine and can only access the server it came from. This makes applets much safer to run than the native executables that they would replace. However, a signed applet could have full access to the machine it is running on, if the user agreed.
  • Java applets were fast, with similar performance to natively installed software.

Disadvantages

Java applets had the following disadvantages compared to other client-side web technologies:

  • Java applets would depend on a Java Runtime Environment (JRE), a complex and heavy-weight software package. They also normally required a plug-in for the web browser. Some organizations only allow software installed by an administrator. As a result, users were unable to view applets unless one was important enough to justify contacting the administrator to request installation of the JRE and plug-in.
  • If an applet requires a newer JRE than available on the system, the user running it the first time will need to wait for the large JRE download to complete.
  • Mobile browsers on iOS or Android, never run Java applets at all. Even before the deprecation of applets on all platforms, desktop browsers phased out Java applet support concurrently with the rise of mobile operating systems.
  • There was no standard to make the content of applets available to screen readers. Therefore, applets harmed the accessibility of a web site to users with special needs.
  • As with any client-side scripting, security restrictions made it difficult or even impossible for some untrusted applets to achieve their desired goals. Only by editing the java.policy file in the JAVA JRE installation could one grant access to the local filesystem or system clipboard, or to network sources other than the one that served the applet to the browser.
  • Most users did not care about the difference between untrusted and trusted applets, so this distinction did not help much with security. The ability to run untrusted applets was eventually removed entirely to fix this, before all applets were removed.

Compatibility-related lawsuits

Sun made considerable efforts to ensure compatibility is maintained between Java versions as they evolve, enforcing Java portability by law if required. Oracle seems to be continuing the same strategy.

1997: Sun vs Microsoft

The 1997 lawsuit, was filed after Microsoft created a modified Java Virtual Machine of their own, which shipped with Internet Explorer. Microsoft added about 50 methods and 50 fields into the classes within the java.awt, java.lang, and java.io packages. Other modifications included removal of RMI capability and replacement of Java Native Interface from JNI to RNI, a different standard. RMI was removed because it only easily supports Java to Java communications and competes with Microsoft DCOM technology. Applets that relied on these changes or just inadvertently used them worked only within Microsoft's Java system. Sun sued for breach of trademark, as the point of Java was that there should be no proprietary extensions and that code should work everywhere. Microsoft agreed to pay Sun $20 million, and Sun agreed to grant Microsoft limited license to use Java without modifications only and for a limited time.

2002: Sun vs Microsoft

Microsoft continued to ship its own unmodified Java virtual machine. Over the years it became extremely outdated yet still default for Internet Explorer. A later study revealed that applets of this time often contain their own classes that mirror Swing and other newer features in a limited way. In 2002, Sun filed an antitrust lawsuit, claiming that Microsoft's attempts at illegal monopolization had harmed the Java platform. Sun demanded Microsoft distribute Sun's current, binary implementation of Java technology as part of Windows, distribute it as a recommended update for older Microsoft desktop operating systems and stop the distribution of Microsoft's Virtual Machine (as its licensing time, agreed in the prior lawsuit, had expired). Microsoft paid $700 million for pending antitrust issues, another $900 million for patent issues and a $350 million royalty fee to use Sun's software in the future.

Security

There were two applet types with very different security models: signed applets and unsigned applets. Starting with Java SE 7 Update 21 (April 2013) applets and Web-Start Apps are encouraged to be signed with a trusted certificate, and warning messages appear when running unsigned applets. Further, starting with Java 7 Update 51 unsigned applets were blocked by default; they could be run by creating an exception in the Java Control Panel.

Unsigned

Limits on unsigned applets were understood as "draconian": they have no access to the local filesystem and web access limited to the applet download site; there are also many other important restrictions. For instance, they cannot access all system properties, use their own class loader, call native code, execute external commands on a local system or redefine classes belonging to core packages included as part of a Java release. While they can run in a standalone frame, such frame contains a header, indicating that this is an untrusted applet. Successful initial call of the forbidden method does not automatically create a security hole as an access controller checks the entire stack of the calling code to be sure the call is not coming from an improper location.

As with any complex system, many security problems have been discovered and fixed since Java was first released. Some of these (like the Calendar serialization security bug) persisted for many years with nobody being aware. Others have been discovered in use by malware in the wild.

Some studies mention applets crashing the browser or overusing CPU resources but these are classified as nuisances and not as true security flaws. However, unsigned applets may be involved in combined attacks that exploit a combination of multiple severe configuration errors in other parts of the system. An unsigned applet can also be more dangerous to run directly on the server where it is hosted because while code base allows it to talk with the server, running inside it can bypass the firewall. An applet may also try DoS attacks on the server where it is hosted, but usually people who manage the web site also manage the applet, making this unreasonable. Communities may solve this problem via source code review or running applets on a dedicated domain.

The unsigned applet can also try to download malware hosted on originating server. However it could only store such file into a temporary folder (as it is transient data) and has no means to complete the attack by executing it. There were attempts to use applets for spreading Phoenix and Siberia exploits this way, but these exploits do not use Java internally and were also distributed in several other ways.

Signed

A signed applet contains a signature that the browser should verify through a remotely running, independent certificate authority server. Producing this signature involves specialized tools and interaction with the authority server maintainers. Once the signature is verified, and the user of the current machine also approves, a signed applet can get more rights, becoming equivalent to an ordinary standalone program. The rationale is that the author of the applet is now known and will be responsible for any deliberate damage. This approach allows applets to be used for many tasks that are otherwise not possible by client-side scripting. However, this approach requires more responsibility from the user, deciding whom he or she trusts. The related concerns include a non-responsive authority server, wrong evaluation of the signer identity when issuing certificates, and known applet publishers still doing something that the user would not approve of. Hence signed applets that appeared from Java 1.1 may actually have more security concerns.

Self-signed

Self-signed applets, which are applets signed by the developer themselves, may potentially pose a security risk; java plugins provide a warning when requesting authorization for a self-signed applet, as the function and safety of the applet is guaranteed only by the developer itself, and has not been independently confirmed. Such self-signed certificates are usually only used during development prior to release where third-party confirmation of security is unimportant, but most applet developers will seek third-party signing to ensure that users trust the applet's safety.

Java security problems are not fundamentally different from similar problems of any client-side scripting platform. In particular, all issues related to signed applets also apply to Microsoft ActiveX components.

As of 2014, self-signed and unsigned applets are no longer accepted by the commonly available Java plugins or Java Web Start. Consequently, developers who wish to deploy Java applets have no alternative but to acquire trusted certificates from commercial sources.

Alternatives

Alternative technologies exist (for example, WebAssembly and JavaScript) that satisfy all or more of the scope of what was possible with an applet. JavaScript could coexist with applets in the same page, assist in launching applets (for instance, in a separate frame or providing platform workarounds) and later be called from the applet code. As JavaScript gained in features and performance, the support for and use of applets declined, until their eventual removal.

Wikisource

From Wikipedia, the free encyclopedia

Wikisource is an online digital library of free-content textual sources on a wiki, operated by the Wikimedia Foundation. Wikisource is the name of the project as a whole and the name for each instance of that project (each instance usually representing a different language); multiple Wikisources make up the overall project of Wikisource. The project's aim is to host all forms of free text, in many languages, and translations. Originally conceived as an archive to store useful or important historical texts (its first text was the Déclaration universelle des Droits de l'Homme), it has expanded to become a general-content library. The project officially began on November 24, 2003, under the name Project Sourceberg, a play on the famous Project Gutenberg. The name Wikisource was adopted later that year and it received its own domain name.

The project holds works that are either in the public domain or freely licensed; professionally published works or historical source documents, not vanity products. Verification was initially made offline, or by trusting the reliability of other digital libraries. Now works are supported by online scans via the ProofreadPage extension, which ensures the reliability and accuracy of the project's texts.

Some individual Wikisources, each representing a specific language, now only allow works backed up with scans. While the bulk of its collection are texts, Wikisource as a whole hosts other media, from comics to film to audiobooks. Some Wikisources allow user-generated annotations, subject to the specific policies of the Wikisource in question. The project has come under criticism for lack of reliability but it is also cited by organisations such as the National Archives and Records Administration.

As of November 2023, there are Wikisource subdomains active for 74 languages comprising a total of 5,880,603 articles and 2,537 recently active editors.

History

The original concept for Wikisource was as storage for useful or important historical texts. These texts were intended to support Wikipedia articles, by providing primary evidence and original source texts, and as an archive in its own right. The collection was initially focused on important historical and cultural material, distinguishing it from other digital archives such as Project Gutenberg.

Composite photograph showing an iceberg both above and below the waterline.
The original Wikisource logo

The project was originally called Project Sourceberg during its planning stages (a play on words for Project Gutenberg).

In 2001, there was a dispute on Wikipedia regarding the addition of primary-source materials, leading to edit wars over their inclusion or deletion. Project Sourceberg was suggested as a solution to this. In describing the proposed project, user The Cunctator said, "It would be to Project Gutenberg what Wikipedia is to Nupedia", soon clarifying the statement with "we don't want to try to duplicate Project Gutenberg's efforts; rather, we want to complement them. Perhaps Project Sourceberg can mainly work as an interface for easily linking from Wikipedia to a Project Gutenberg file, and as an interface for people to easily submit new work to PG." Initial comments were skeptical, with Larry Sanger questioning the need for the project, writing "The hard question, I guess, is why we are reinventing the wheel, when Project Gutenberg already exists? We'd want to complement Project Gutenberg—how, exactly?", and Jimmy Wales adding "like Larry, I'm interested that we think it over to see what we can add to Project Gutenberg. It seems unlikely that primary sources should in general be editable by anyone — I mean, Shakespeare is Shakespeare, unlike our commentary on his work, which is whatever we want it to be."

The project began its activity at ps.wikipedia.org. The contributors understood the "PS" subdomain to mean either "primary sources" or Project Sourceberg. However, this resulted in Project Sourceberg occupying the subdomain of the Pashto Wikipedia (the ISO language code of the Pashto language is "ps").

Project Sourceberg officially launched on November 24, 2003, when it received its own temporary URL, at sources.wikipedia.org, and all texts and discussions hosted on ps.wikipedia.org were moved to the temporary address. A vote on the project's name changed it to Wikisource on December 6, 2003. Despite the change in name, the project did not move to its permanent URL (at http://wikisource.org/) until July 23, 2004.

Logo and slogan

Since Wikisource was initially called "Project Sourceberg", its first logo was a picture of an iceberg. Two votes conducted to choose a successor were inconclusive, and the original logo remained until 2006. Finally, for both legal and technical reasons—because the picture's license was inappropriate for a Wikimedia Foundation logo and because a photo cannot scale properly—a stylized vector iceberg inspired by the original picture was mandated to serve as the project's logo.

The first prominent use of Wikisource's slogan—The Free Library—was at the project's multilingual portal, when it was redesigned based upon the Wikipedia portal on August 27, 2005, (historical version). As in the Wikipedia portal the Wikisource slogan appears around the logo in the project's ten largest languages.

Clicking on the portal's central images (the iceberg logo in the center and the "Wikisource" heading at the top of the page) links to a list of translations for Wikisource and The Free Library in 60 languages.

Tools built

Screen shot of Norwegian Wikisource. The text can be seen on the left of the screen with the scanned image displayed on the right.
The ProofreadPage extension in action

A MediaWiki extension called ProofreadPage was developed for Wikisource by developer ThomasV to improve the vetting of transcriptions by the project. This displays pages of scanned works side by side with the text relating to that page, allowing the text to be proofread and its accuracy later verified independently by any other editor. Once a book, or other text, has been scanned, the raw images can be modified with image processing software to correct for page rotations and other problems. The retouched images can then be converted into a PDF or DjVu file and uploaded to either Wikisource or Wikimedia Commons.

This system assists editors in ensuring the accuracy of texts on Wikisource. The original page scans of completed works remain available to any user so that errors may be corrected later and readers may check texts against the originals. ProofreadPage also allows greater participation, since access to a physical copy of the original work is not necessary to be able to contribute to the project once images have been uploaded.

Milestones

A student doing proof reading during her project at New Law College (Pune) India

Within two weeks of the project's official start at sources.wikipedia.org, over 1,000 pages had been created, with approximately 200 of these being designated as actual articles. On January 4, 2004, Wikisource welcomed its 100th registered user. In early July, 2004 the number of articles exceeded 2,400, and more than 500 users had registered.

On April 30, 2005, there were 2667 registered users (including 18 administrators) and almost 19,000 articles. The project passed its 96,000th edit that same day.

On November 27, 2005, the English Wikisource passed 20,000 text-units in its third month of existence, already holding more texts than did the entire project in April (before the move to language subdomains).

On May 10, 2006, the first Wikisource Portal was created.

On February 14, 2008, the English Wikisource passed 100,000 text-units with Chapter LXXIV of Six Months at the White House, a memoir by painter Francis Bicknell Carpenter.

In November, 2011, 250,000 text-units milestone was passed.

But counting was difficult because what constitutes a text-unit could not be clearly defined.

Library contents

A Venn diagram of the inclusion criteria for works to be added to Wikisource. The three overlapping circles are labelled "Sourced", "Published" and "Licensed". The area where they all overlap is shown in green. The areas where just two overlap are shown in yellow (except the Sourced-Published overlap, which remains blank)
Wikisource inclusion criteria expressed as a Venn diagram. Green indicates the best possible case, where the work satisfies all three primary requirements. Yellow indicates acceptable but not ideal cases.

Wikisource collects and stores in digital format previously published texts; including novels, non-fiction works, letters, speeches, constitutional and historical documents, laws and a range of other documents. All texts collected are either free of copyright or released under the Creative Commons Attribution/Share-Alike License. Texts in all languages are welcome, as are translations. In addition to texts, Wikisource hosts material such as comics, films, recordings and spoken-word works. All texts held by Wikisource must have been previously published; the project does not host "vanity press" books or documents produced by its contributors.

A scanned source is preferred on many Wikisources and required on some. Most Wikisources will, however, accept works transcribed from offline sources or acquired from other digital libraries. The requirement for prior publication can also be waived in a small number of cases if the work is a source document of notable historical importance. The legal requirement for works to be licensed or free of copyright remains constant.

Annotations and translations – the difference to Wikibooks

The only original pieces accepted by Wikisource are annotations and translations. Wikisource, and its sister project Wikibooks, has the capacity for annotated editions of texts. On Wikisource, the annotations are supplementary to the original text, which remains the primary objective of the project. By contrast, on Wikibooks the annotations are primary, with the original text as only a reference or supplement, if present at all. Annotated editions are more popular on the German Wikisource. The project also accommodates translations of texts provided by its users. A significant translation on the English Wikisource is the Wiki Bible project, intended to create a new, "laissez-faire translation" of The Bible.

Structure

Language subdomains

A separate Hebrew version of Wikisource (he.wikisource.org) was created in August 2004. The need for a language-specific Hebrew website derived from the difficulty of typing and editing Hebrew texts in a left-to-right environment (Hebrew is written right-to-left). In the ensuing months, contributors in other languages including German requested their own wikis, but a December vote on the creation of separate language domains was inconclusive. Finally, a second vote that ended May 12, 2005, supported the adoption of separate language subdomains at Wikisource by a large margin, allowing each language to host its texts on its own wiki.

An initial wave of 14 languages was set up by Brion Vibber on August 23, 2005. The new languages did not include English, but the code en: was temporarily set to redirect to the main website (wikisource.org). At this point the Wikisource community, through a mass project of manually sorting thousands of pages and categories by language, prepared for a second wave of page imports to local wikis. On September 11, 2005, the wikisource.org wiki was reconfigured to enable the English version, along with 8 other languages that were created early that morning and late the night before. Three more languages were created on March 29, 2006, and then another large wave of 14 language domains was created on June 2, 2006.

Languages without subdomains are locally incubated. As of September 2020, 182 languages are hosted locally.

As of November 2023, there are Wikisource subdomains for 76 languages of which 74 are active and 2 are closed. The active sites have 5,880,603 articles and the closed sites have 13 articles. There are 4,811,992 registered users of which 2,537 are recently active.

The top ten Wikisource language projects by mainspace article count:

No. Language Wiki Good Total Edits Admins Users Active users Files
1 Polish pl 1,108,783 1,145,964 3,508,475 14 36,762 61 114
2 English en 1,020,780 4,173,488 13,675,733 22 3,101,792 407 16,247
3 Russian ru 620,135 1,088,588 5,074,897 5 117,513 112 45,914
4 German de 550,859 602,985 4,307,889 18 81,511 140 6,922
5 French fr 517,498 4,064,609 13,747,861 17 143,017 258 3,673
6 Chinese zh 452,985 1,088,933 2,306,246 8 103,479 134 231
7 Hebrew he 241,208 1,683,702 2,820,528 16 38,018 89 541
8 Ukrainian uk 196,242 333,296 652,542 7 16,624 57 135
9 Italian it 191,955 766,350 3,273,515 9 70,260 88 968
10 Arabic ar 84,022 227,114 487,036 9 65,662 31 4,051

For a complete list with totals see Wikimedia Statistics:

wikisource.org

During the move to language subdomains, the community requested that the main wikisource.org website remain a functioning wiki, in order to serve three purposes:

  1. To be a multilingual coordination site for the entire Wikisource project in all languages. In practice, use of the website for multilingual coordination has not been heavy since the conversion to language domains. Nevertheless, there is some policy activity at the Scriptorium, and multilingual updates for news and language milestones at pages such as Wikisource:2007.
  2. To be a home for texts in languages without their own subdomains, each with its own local main page for self-organization. As a language incubator, the wiki currently provides a home for over 30 languages that do not yet have their own language subdomains. Some of these are very active, and have built libraries with hundreds of texts (such as Esperanto and Volapuk).
  3. To provide direct, ongoing support by a local wiki community for a dynamic multilingual portal at its Main Page, for users who go to http://wikisource.org. The current Main Page portal was created on August 26, 2005, by ThomasV, who based it upon the Wikipedia portal.

The idea of a project-specific coordination wiki, first realized at Wikisource, also took hold in another Wikimedia project, namely at Wikiversity's Beta Wiki. Like wikisource.org, it serves Wikiversity coordination in all languages, and as a language incubator. But unlike Wikisource, its Main Page does not serve as its multilingual portal (which is not a wiki page).

Reception

Wikipedia co-founder Larry Sanger has criticised Wikisource, and sister project Wiktionary, because the collaborative nature and technology of these projects means there is no oversight by experts and therefore their content is not reliable.

Bart D. Ehrman, a New Testament scholar and professor of religious studies at the University of North Carolina at Chapel Hill, has criticised the English Wikisource's project to create a user-generated translation of the Bible saying "Democratization isn't necessarily good for scholarship." Richard Elliott Friedman, an Old Testament scholar and professor of Jewish studies at the University of Georgia, identified errors in the translation of the Book of Genesis as of 2008.

In 2010, Wikimedia France signed an agreement with the Bibliothèque nationale de France (National Library of France) to add scans from its own Gallica digital library to French Wikisource. Fourteen hundred public domain French texts were added to the Wikisource library as a result via upload to the Wikimedia Commons. The quality of the transcriptions, previously automatically generated by optical character recognition (OCR), was expected to be improved by Wikisource's human proofreaders. 

In 2011, the English Wikisource received many high-quality scans of documents from the US National Archives and Records Administration (NARA) as part of their efforts "to increase the accessibility and visibility of its holdings." Processing and upload to Commons of these documents, along with many images from the NARA collection, was facilitated by a NARA Wikimedian in residence, Dominic McDevitt-Parks. Many of these documents have been transcribed and proofread by the Wikisource community and are featured as links in the National Archives' own online catalog.

Slippery slope

From Wikipedia, the free encyclopedia
Black and white cartoon of a tall woman in a dress reaching her knees and a shorter man holding a bouquet. Both are in front of a robed figure. Each of the marrying couples has a couple of their same-sex and similar attire behind.
This 1895 cartoon makes a slippery-slope argument of how weddings would look in 2001 if women got the right to vote.

A slippery slope fallacy (SSF), in logic, critical thinking, political rhetoric, and caselaw, is a fallacious argument in which a party asserts that a relatively small first step leads to a chain of related events culminating in some significant (usually negative) effect. The core of the slippery slope argument is that a specific decision under debate is likely to result in unintended consequences. The strength of such an argument depends on whether the small step really is likely to lead to the effect. This is quantified in terms of what is known as the warrant (in this case, a demonstration of the process that leads to the significant effect). This type of argument is sometimes used as a form of fearmongering in which the probable consequences of a given action are exaggerated in an attempt to scare the audience.

The fallacious sense of "slippery slope" is often used synonymously with continuum fallacy, in that it ignores the possibility of middle ground and assumes a discrete transition from category A to category B. In this sense, it constitutes an informal fallacy. Other idioms for the slippery slope fallacy are the thin end/edge of the wedge, the camel's nose in the tent, or If You Give a Mouse a Cookie.

Slopes, arguments, and fallacies

Some writers distinguish between a slippery slope event and a slippery slope argument. A slippery slope event can be represented by a series of conditional statements, namely:

if p then q; if q then r; if r then  z.

The idea being that through a series of intermediate steps p will imply z. Some writers point out that strict necessity isn't required and it can still be characterized as a slippery slope if at each stage the next step is plausible. This is important for with strict implication p will imply z but if at each step the probability is say 90% then the more steps there are the less likely it becomes that p will cause z.

A slippery slope argument is typically a negative argument where there is an attempt to discourage someone from taking a course of action because if they do it will lead to some unacceptable conclusion. Some writers point out that an argument with the same structure might be used in a positive way in which someone is encouraged to take the first step because it leads to a desirable conclusion.

If someone is accused of using a slippery slope argument then it is being suggested they are guilty of fallacious reasoning, and while they are claiming that p implies z, for whatever reason, this is not the case. In logic and critical thinking textbooks, slippery slopes and slippery slope arguments are normally discussed as a form of fallacy, although there may be an acknowledgement that non-fallacious forms of the argument can also exist.

Types of argument

Different writers have classified slippery slope arguments in different and often contradictory ways, but there are two basic types of argument that have been described as slippery slope arguments. One type has been called the causal slippery slope, and the distinguishing feature of this type is that the various steps leading from p to z are events with each event being the cause of the next in the sequence. The second type might be called the judgmental slippery slope with the idea being that the 'slope' does not consist of a series of events but is such that, for whatever reason, if a person makes one particular judgment they will rationally have to make another and so on. The judgmental type may be further sub-divided into conceptual slippery slopes and decisional slippery slopes.

Conceptual slippery slopes, which Trudy Govier calls the fallacy of slippery assimilation, are closely related to the sorites paradox so, for example, in the context of talking about slippery slopes Merilee Salmon can say, "The slippery slope is an ancient form of reasoning. According to van Fraassen (The Scientific Image), the argument is found in Sextus Empiricus that incest is not immoral, on the grounds that 'touching your mother's big toe with your little finger is not immoral, and all the rest differs only by degree.'"

Decisional slippery slopes are similar to conceptual slippery slopes in that they rely on there being a continuum with no clear dividing lines such that if you decide to accept one position or course of action then there will, either now or in the future, be no rational grounds for not accepting the next position or course of action in the sequence.

The difficulty in classifying slippery slope arguments is that there is no clear consensus in the literature as to how terminology should be used. It has been said that whilst these two fallacies "have a relationship which may justify treating them together", they are also distinct, and "the fact that they share a name is unfortunate". Some writers treat them side by side but emphasize how they differ. Some writers use the term slippery slope to refer to one kind of argument but not the other, but don't agree on which one, whilst others use the term to refer to both. So, for example,

  • Christopher Tindale gives a definition that only fits the causal type. He says, "Slippery Slope reasoning is a type of negative reasoning from consequences, distinguished by the presence of a causal chain leading from the proposed action to the negative outcome."
  • Merrilee Salmon describes the fallacy as a failure to recognise that meaningful distinctions can be drawn and even casts the "domino theory" in that light.
  • Douglas N. Walton says that an essential feature of slippery slopes is a "loss of control" and this only fits with the decisional type of slippery slope. He says that, "The domino argument has a sequence of events in which each one in the sequence causes the next one to happen in such a manner that once the first event occurs it will lead to the next event, and so forth, until the last event in the sequence finally occurs…(and)…is clearly different from the slippery slope argument, but can be seen as a part of it, and closely related to it."

Metaphor and its alternatives

The metaphor of the "slippery slope" dates back at least to Cicero's essay Laelius de Amicitia (XII.41). The title character Gaius Laelius Sapiens uses the metaphor to describe the decline of the Republic upon the impending election of Gaius Gracchus: "Affairs soon move on, for they glide readily down the path of ruin when once they have taken a start."

Thin end of a wedge

Walton suggests Alfred Sidgwick should be credited as the first writer on informal logic to describe what would today be called a slippery slope argument.

"We must not do this or that, it is often said, because if we did we should be logically bound to do something else which is plainly absurd or wrong. If we once begin to take a certain course there is no knowing where we shall be able to stop within any show of consistency; there would be no reason for stopping anywhere in particular, and we should be led on, step by step into action or opinions that we all agree to call undesirable or untrue."

Sidgwick says this is "popularly known as the objection to a thin end of a wedge" but might be classified now as a decisional slippery slope. However, the wedge metaphor also captures the idea that unpleasant end result is a wider application of a principle associated with the initial decision which is often a feature of decisional slippery slopes due to their incremental nature but may be absent from causal slippery slopes.

Domino fallacy

T. Edward Damer, in his book Attacking Faulty Reasoning, describes what others might call a causal slippery slope but says,

"While this image may be insightful for understanding the character of the fallacy, it represents a misunderstanding of the nature of the causal relations between events. Every causal claim requires a separate argument. Hence, any "slipping" to be found is only in the clumsy thinking of the arguer, who has failed to provide sufficient evidence that one causally explained event can serve as an explanation for another event or for a series of events."

Instead Damer prefers to call it the domino fallacy. Howard Kahane suggests that the domino variation of the fallacy has gone out of fashion because it was tied the domino theory for the United States becoming involved in the war in Vietnam and although the U.S. lost that war "it is primarily communist dominoes that have fallen".

Dam burst

Frank Saliger notes that "in the German-speaking world the dramatic image of the dam burst seems to predominate, in English speaking circles talk is more of the slippery slope argument" and that "in German writing dam burst and slippery slope arguments are treated as broadly synonymous. In particular the structural analyses of slippery slope arguments derived from English writing are largely transferred directly to the dam burst argument."

In exploring the differences between the two metaphors he comments that in the dam burst the initial action is clearly in the foreground and there is a rapid movement towards the resulting events whereas in the slippery slope metaphor the downward slide has at least equal prominence to the initial action and it "conveys the impression of a slower 'step-by-step' process where the decision maker as participant slides inexorably downwards under the weight of its own successive (erroneous) decisions." Despite these differences Saliger continues to treat the two metaphors as being synonymous. Walton argues that although the two are comparable "the metaphor of the dam bursting carries with it no essential element of a sequence of steps from an initial action through a gray zone with its accompanying loss of control eventuated in the ultimate outcome of the ruinous disaster. For these reasons, it seems best to propose drawing a distinction between dam burst arguments and slippery slope arguments."

Other metaphors

Eric Lode notes that "commentators have used numerous different metaphors to refer to arguments that have this rough form. For example, people have called such arguments "wedge" or "thin edge of the wedge", "camel's nose" or "camel's nose in the tent", "parade of horrors" or "parade of horribles", "domino", "Boiling Frog" and "this could snowball" arguments. All of these metaphors suggest that allowing one practice or policy could lead us to allow a series of other practices or policies." Bruce Waller says it is lawyers who often call it the "parade of horribles" argument while politicians seem to favor "the camel's nose is in the tent".

Defining features of slippery slope arguments

Given the disagreement over what constitutes a genuine slippery slope argument, it is to be expected that there are differences in the way they are defined. Lode says that "although all SSAs share certain features, they are a family of related arguments rather than a class of arguments whose members all share the same form."

Various writers have attempted to produce a general taxonomy of these different kinds of slippery slope. Other writers have given a general definition that will encompass the diversity of slippery slope arguments. Eugene Volokh says, "I think the most useful definition of a slippery slope is one that covers all situations where decision A, which you might find appealing, ends up materially increasing the probability that others will bring about decision B, which you oppose."

Those who hold that slippery slopes are causal generally give a simple definition, provide some appropriate examples and perhaps add some discussion as to the difficulty of determining whether the argument is reasonable or fallacious. Most of the more detailed analysis of slippery slopes has been done by those who hold that genuine slippery slopes are of the decisional kind.

Lode, having claimed that SSAs are not a single class of arguments whose members all share the same form, nevertheless goes on to suggest the following common features.

  1. The series of intervening and gradual steps
  2. The idea that the slope lacks a non-arbitrary stopping place
  3. The idea that the practice under consideration is, in itself, unobjectionable

Rizzo and Whitman identify slightly different features. They say, "Although there is no paradigm case of the slippery slope argument, there are characteristic features of all such arguments. The key components of slippery slope arguments are three:

  1. An initial, seemingly acceptable argument and decision;
  2. A "danger case"—a later argument and decision that are clearly unacceptable;
  3. A "process" or "mechanism" by which accepting the initial argument and making the initial decision raise the likelihood of accepting the later argument and making the later decision."

Walton notes that these three features will be common to all slippery slopes but objects that there needs to be more clarity on the nature of the 'mechanism' and a way of distinguishing between slippery slope arguments and arguments from negative consequences.

Corner et al. say that a slippery slope has "four distinct components:

  1. An initial proposal (A).
  2. An undesirable outcome (C).
  3. The belief that allowing (A) will lead to a re-evaluation of (C) in the future.
  4. The rejection of (A) based on this belief.

The alleged danger lurking on the slippery slope is the fear that a presently unacceptable proposal (C) will (by any number of psychological processes—see, e.g., Volokh 2003) in the future be re-evaluated as acceptable."

Walton adds the requirement that there must be a loss of control. He says, there are four basic components, "One is a first step, an action or policy being considered. A second is a sequence in which this action leads to other actions. A third is a so-called gray zone or area of indeterminacy along the sequence where the agent loses control. The fourth is the catastrophic outcome at the very end of the sequence. The idea is that as soon as the agent in question takes the first step he will be impelled forward through the sequence, losing control so that in the end he will reach the catastrophic outcome. Not all of these components are typically made explicit..."

Introduction to entropy

From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Introduct...