http://www.wiwiss.fu-berlin.de/suhl/bizer/SWTSGuide/index.htm The security, trust and privacy issues that arise from the vision of the Semantic Web as a global information integration environment are mainly unsolved or even unrecognized. This resource guide collects papers, ontologies, schemata and standards that could be building blocks for a future Semantic Web Trust and Security Framework.
http://www.developer.com/xml/article.php/10929_1575731_1 In this article, we'll discuss some options for implementing one-to-many relationships in XML. We'll consider three different techniques: Containment relationship, Intra-document relationships, Inter-document relationships.
http://www.w3.org/2001/sw/Europe/reports/scalable_rdbms_mapping_report/ A public report on mapping triple stores and RDBMS concentrating on surveying the schemas used and discussing mapping approaches to and from relational schemas. It describes current best practice for using such systems for Semantic Web data including feature comparisons, recommendations for particular applications and advice on tradeoffs.
http://www.w3.org/TR/photo-rdf/ This note describes a project for describing & retrieving (digitized) photos with (RDF) metadata. It describes the RDF schemas, a data-entry program for quickly entering metadata for large numbers of photos, a way to serve the photos and the metadata over HTTP, and some suggestions for search methods to retrieve photos based on their descriptions.
http://www.w3.org/DesignIssues/HTTP-URI.html However, the lack of very concise logical definition of such things had not been a problem, until the formal systems started to use them. There were no formal systems addressing this sort of issue (as far as I know, except for Dan Connolly's Larch work [@@]), until the Semantic Web introduced languages such as RDF which have well-defined logical properties and are used to describe (among other things) web operations.
http://news.com.com/2100-1001-981256.html The theory underlying UIMA is the Combination Hypothesis, which states that statistical machine learning--the sort of data-ranking intelligence behind search site Google--syntactical artificial intelligence, and other techniques can be married in the relatively near future.
http://www.baselinemag.com/article2/0,3959,826676,00.asp After two humiliating technology failures, six major news services are disbanding VNS, a consortium formed to count votes and conduct Election Day surveys. How could the system have been overhauled before disaster struck twice?
http://home.attbi.com/~eggbertsearle/jaxen.html Using Jaxen (java xpath engine) and Jena (java rdf engine) to perform xpath queries on an RDF model. There are some queries it can't perform, but is a cool way to get info out of a RDF model using existing technologies.
http://jwebunit.sourceforge.net/ Makes testing webapps much easier than native JUnit/HttpUnit. It's a layer above those two. So easy, in fact, that I bet QA could write scripts that can parsed into code that gets generated and run. Speaking of, I bet someone has already done this.
http://www.oasis-open.org/committees/xacml/index.shtml From OASIS. XACML is an XML schema for representing authorization and entitlement policies. However, it is important to note that a compliant Policy Decision Point (PDP) may choose an entirely different representation for its internal evaluation and decision-making processes. That is, it is entirely permissible for XACML to be regarded simply as a policy interchange format, with any given implementation translating the XACML policy to its own local/native/proprietary/alternate policy language sometime prior to evaluation. XACML is expected to address fine grained control of authorized activities, the effect of characteristics of the access requestor, the protocol over which the request is made, authorization based on classes of activities, and content introspection (i.e. authorization based on both the requestor and potentially attribute values within the target where the values of the attributes may not be known to the polic…
http://javelina.cet.middlebury.edu/lsa/out/lsa_intro.htm Promising technique for search engines. "Regular keyword searches approach a document collection with a kind of accountant mentality: a document contains a given word or it doesn't, with no middle ground. Latent semantic indexing adds an important step to the document indexing process. In addition to recording which keywords a document contains, the method examines the document collection as a whole, to see which other documents contain some of those same words. LSI considers documents that have many words in common to be semantically close, and ones with few words in common to be semantically distant."
http://www.baselinemag.com/article2/0,3959,826676,00.asp News organizations and other VNS subscribers were repeatedly instructed to log off their machines, so the new servers running BEA Systems' WebLogic application server could be rebooted. ". Yeah, we know how that goes. Should've used JBoss...
http://www.rbjones.com/rbjpub/logic/log019.htm First-order logic permits reasoning about the propositional connectives (as in propositional logic) and also about quantification ("all" or "some"). RDF is, if I'm not mistaken (and I'm going down a path I've only begun to study) a FOPL language.
http://uml.sourceforge.net/ I bet it would work really well for use case and action diagrams. It will automatically generate class stubs in Java from diagrams, but unfortunately it only does it in reverse in C++.
http://wellformedweb.org/news/2 RESTLog is a weblog application that tries to follow the REST architectural style. The application is completely defined by its interface and that interface in turn is completely described by HTTP transactions, the defined set of URLs, and the format of the XML files that are transferred.
http://www.w3.org/2001/Annotea/ "By annotations we mean comments, notes, explanations, or other types of external remarks that can be attached to any Web document or a selected part of the document without actually needing to touch the document. When the user gets the document he or she can also load the annotations attached to it from a selected annotation server or several servers and see what his peer group thinks."
http://www.kannel.org/ It attempts to provide this essential part of the WAP infrastructure freely to everyone so that the market potential for WAP services, both from wireless operators and specialized service providers, will be realized as efficiently as possible.Kannel also works as an SMS gateway for GSM networks. Almost all GSM phones can send and receive SMS messages, so this is a way to serve many more clients than just those using a new WAP phone.
http://www.infoworld.com/articles/fe/xml/02/05/27/020527feedgetci.xml WILL MISSION-CRITICAL enterprise business logic someday reside on distributed application infrastructures rather than in corporate datacenters and thus span the globe to deliver improved performance? A recent flurry of announcements has put a spotlight on "edge computing" as the newest entrant in the race toward distributed computing, alongside grid computing, peer-to-peer architectures, and Web services. Microsoft and IBM have recently announced deals with companies such as Akamai and Exodus to distribute .Net and J2EE (Java 2 Enterprise Edition) edge servers and related infrastructure software to hundreds of POPs (points of presence) worldwide, and are planning to launch edge application delivery services as early as this fall. Other CDNs (content delivery networks) such as Mirror Image, Volera, and InfoLibria are building out distributed POPs with J2EE and .Net capabilities and are planning to marke…
http://www.ninebynine.org/SWAD-E/Security-formats.html "Looking forward, we aim to develop ontologies, RDF vocabularies and rules for making trust assessments based on existing security standards and other available information, and use these to demonstrate ways to improve security and dependability in open networked systems."