Friday, January 31, 2003
Thursday, January 30, 2003
The security, trust and privacy issues that arise from the vision of the Semantic Web as a global information integration environment are mainly unsolved or even unrecognized. This resource guide collects papers, ontologies, schemata and standards that could be building blocks for a future Semantic Web Trust and Security Framework.
On how to connect a remote debugger to a java process, from Adrian.
If you have been looking for a software conference that focuses on the practical technical aspects of the J2EE, XML, Web Services, Agile Methodologies, Open Source and Best Practices, then you have found it here.
Wednesday, January 29, 2003
Tuesday, January 28, 2003
In this article, we'll discuss some options for implementing one-to-many relationships in XML. We'll consider three different techniques: Containment relationship, Intra-document relationships, Inter-document relationships.
Monday, January 27, 2003
A public report on mapping triple stores and RDBMS concentrating on surveying the schemas used and discussing mapping approaches to and from relational schemas. It describes current best practice for using such systems for Semantic Web data including feature comparisons, recommendations for particular applications and advice on tradeoffs.
Friday, January 24, 2003
Move over, 802.11b. It's 54Mbps and backwards compatible.
This note describes a project for describing & retrieving (digitized) photos with (RDF) metadata. It describes the RDF schemas, a data-entry program for quickly entering metadata for large numbers of photos, a way to serve the photos and the metadata over HTTP, and some suggestions for search methods to retrieve photos based on their descriptions.
Thursday, January 23, 2003
The last example is my favorite way.
However, the lack of very concise logical definition of such things had not been a problem, until the formal systems started to use them. There were no formal systems addressing this sort of issue (as far as I know, except for Dan Connolly's Larch work [@@]), until the Semantic Web introduced languages such as RDF which have well-defined logical properties and are used to describe (among other things) web operations.
Wednesday, January 22, 2003
Tuesday, January 21, 2003
The theory underlying UIMA is the Combination Hypothesis, which states that statistical machine learning--the sort of data-ranking intelligence behind search site Google--syntactical artificial intelligence, and other techniques can be married in the relatively near future.
Chart outlining the difference between the two.
Monday, January 20, 2003
How to calculate processor usage on Linux.
Friday, January 17, 2003
After two humiliating technology failures, six major news services are disbanding VNS, a consortium formed to count votes and conduct Election Day surveys. How could the system have been overhauled before disaster struck twice?
Using Jaxen (java xpath engine) and Jena (java rdf engine) to perform xpath queries on an RDF model. There are some queries it can't perform, but is a cool way to get info out of a RDF model using existing technologies.
RDF visualization in SVG. Can visualize foaf models.
Thursday, January 16, 2003
Makes testing webapps much easier than native JUnit/HttpUnit. It's a layer above those two. So easy, in fact, that I bet QA could write scripts that can parsed into code that gets generated and run. Speaking of, I bet someone has already done this.
Sun[tm] ONE Identity Server 6.0 software is a standards-based product designed to help organizations manage secure access to Web and non Web-based applications both on the intranet and extranet.
From OASIS. XACML is an XML schema for representing authorization and entitlement policies. However, it is important to note that a compliant Policy Decision Point (PDP) may choose an entirely different representation for its internal evaluation and decision-making processes. That is, it is entirely permissible for XACML to be regarded simply as a policy interchange format, with any given implementation translating the XACML policy to its own local/native/proprietary/alternate policy language sometime prior to evaluation. XACML is expected to address fine grained control of authorized activities, the effect of characteristics of the access requestor, the protocol over which the request is made, authorization based on classes of activities, and content introspection (i.e. authorization based on both the requestor and potentially attribute values within the target where the values of the attributes may not be known to the policy writer). XACML is also expected to suggest a policy authorization model to guide implementers of the authorization mechanism.
Separate your security policy from your business logic.
Promising technique for search engines. "Regular keyword searches approach a document collection with a kind of accountant mentality: a document contains a given word or it doesn't, with no middle ground. Latent semantic indexing adds an important step to the document indexing process. In addition to recording which keywords a document contains, the method examines the document collection as a whole, to see which other documents contain some of those same words. LSI considers documents that have many words in common to be semantically close, and ones with few words in common to be semantically distant."
Wednesday, January 15, 2003
The process of deducing new conclusions from facts already known.
Tuesday, January 14, 2003
News organizations and other VNS subscribers were repeatedly instructed to log off their machines, so the new servers running BEA Systems' WebLogic application server could be rebooted. ". Yeah, we know how that goes. Should've used JBoss...
Monday, January 13, 2003
First-order logic permits reasoning about the propositional connectives (as in propositional logic) and also about quantification ("all" or "some"). RDF is, if I'm not mistaken (and I'm going down a path I've only begun to study) a FOPL language.
I bet it would work really well for use case and action diagrams. It will automatically generate class stubs in Java from diagrams, but unfortunately it only does it in reverse in C++.
RESTLog is a weblog application that tries to follow the REST architectural style. The application is completely defined by its interface and that interface in turn is completely described by HTTP transactions, the defined set of URLs, and the format of the XML files that are transferred.
Friday, January 10, 2003
"By annotations we mean comments, notes, explanations, or other types of external remarks that can be attached to any Web document or a selected part of the document without actually needing to touch the document. When the user gets the document he or she can also load the annotations attached to it from a selected annotation server or several servers and see what his peer group thinks."
It attempts to provide this essential part of the WAP infrastructure freely to everyone so that the market potential for WAP services, both from wireless operators and specialized service providers, will be realized as efficiently as possible.Kannel also works as an SMS gateway for GSM networks. Almost all GSM phones can send and receive SMS messages, so this is a way to serve many more clients than just those using a new WAP phone.
Ooooh I want it!
Thursday, January 9, 2003
This note describes an experimental software development in which RDF/N3 is used to code query and report generation functions performed on RDF data.
Wednesday, January 8, 2003
WILL MISSION-CRITICAL enterprise business logic someday reside on distributed application infrastructures rather than in corporate datacenters and thus span the globe to deliver improved performance? A recent flurry of announcements has put a spotlight on "edge computing" as the newest entrant in the race toward distributed computing, alongside grid computing, peer-to-peer architectures, and Web services. Microsoft and IBM have recently announced deals with companies such as Akamai and Exodus to distribute .Net and J2EE (Java 2 Enterprise Edition) edge servers and related infrastructure software to hundreds of POPs (points of presence) worldwide, and are planning to launch edge application delivery services as early as this fall. Other CDNs (content delivery networks) such as Mirror Image, Volera, and InfoLibria are building out distributed POPs with J2EE and .Net capabilities and are planning to market their networks as value-added edge delivery platforms for Web services.
"Looking forward, we aim to develop ontologies, RDF vocabularies and rules for making trust assessments based on existing security standards and other available information, and use these to demonstrate ways to improve security and dependability in open networked systems."
Tuesday, January 7, 2003
From our friends at O'Reilly.