22:
199:
165:
KIS consists of two distinct types of modules that interact with each other (typically across a network) to provide the service. One module is a user agent module that runs on the KIS mail host machine. The second module is a remote server module (possibly on a different machine) that interrogates
154:. By submitting a single query to KIS, a user can search a set of remote white pages services and see the results of the search in a uniform format. There are several interfaces to the KIS service including
166:
various database services across the network and provides the results to the user agent module in a uniform fashion. Interactions between the two modules can be via messages between
263:
244:
138:
on the
Internet as it queried more than a single network for information. It provided a uniform user interface to a variety of remote directory services such as
39:
86:
237:
58:
105:
65:
278:
273:
283:
230:
72:
43:
54:
32:
134:
that debuted in
December 1989. Although it searched users, not content, it could be argued to be the first
268:
79:
214:
206:
179:
143:
257:
135:
131:
184:
21:
210:
151:
167:
159:
155:
198:
147:
139:
15:
162:. Another KIS interface imitates the Berkeley whois command.
180:
http://www.ou.edu/research/electron/internet/knowbot.htm
218:
46:. Unsourced material may be challenged and removed.
185:http://www.cnri.reston.va.us/home/koe/index.html
238:
8:
245:
231:
106:Learn how and when to remove this message
264:Internet Protocol based network software
7:
195:
193:
44:adding citations to reliable sources
170:or by actual movement of knowbots.
217:. You can help Knowledge (XXG) by
14:
197:
20:
31:needs additional citations for
1:
55:"Knowbot Information Service"
120:Knowbot Information Service
300:
192:
279:History of the Internet
274:Internet search engines
284:Network software stubs
130:, is an Internet user
40:improve this article
226:
225:
126:), also known as
116:
115:
108:
90:
291:
247:
240:
233:
201:
194:
111:
104:
100:
97:
91:
89:
48:
24:
16:
299:
298:
294:
293:
292:
290:
289:
288:
254:
253:
252:
251:
190:
176:
112:
101:
95:
92:
49:
47:
37:
25:
12:
11:
5:
297:
295:
287:
286:
281:
276:
271:
266:
256:
255:
250:
249:
242:
235:
227:
224:
223:
202:
188:
187:
182:
175:
174:External links
172:
114:
113:
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
296:
285:
282:
280:
277:
275:
272:
270:
269:1989 software
267:
265:
262:
261:
259:
248:
243:
241:
236:
234:
229:
228:
222:
220:
216:
213:article is a
212:
208:
203:
200:
196:
191:
186:
183:
181:
178:
177:
173:
171:
169:
163:
161:
157:
153:
149:
145:
141:
137:
136:search engine
133:
132:search engine
129:
125:
121:
110:
107:
99:
96:December 2017
88:
85:
81:
78:
74:
71:
67:
64:
60:
57: –
56:
52:
51:Find sources:
45:
41:
35:
34:
29:This article
27:
23:
18:
17:
219:expanding it
204:
189:
164:
127:
123:
119:
117:
102:
93:
83:
76:
69:
62:
50:
38:Please help
33:verification
30:
258:Categories
128:netaddress
66:newspapers
209:-related
211:software
168:knowbots
152:MCI Mail
207:network
80:scholar
160:telnet
156:e-mail
150:, and
144:finger
82:
75:
68:
61:
53:
205:This
148:X.500
140:whois
87:JSTOR
73:books
215:stub
158:and
118:The
59:news
124:KIS
42:by
260::
146:,
142:,
246:e
239:t
232:v
221:.
122:(
109:)
103:(
98:)
94:(
84:·
77:·
70:·
63:·
36:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.