In a previous essay, I wrote about the cognitive aspect of tagging - describing how people tag, and why they find it easy. There is another, equally important aspect of tagging that I did not touch upon - the "why" of tagging. Why do people tag? For many,
Using RhNav - Rhizome Navigation I wrote a data aggregator for Technorati's API. The first result is a video which visualizes blog domains by analysing Technorati's Cosmos (the blogs which link to a particular URL). The video is a screencast of RhNav fetc
Bebo is the next generation social networking site where members can stay in touch with their College friends, connect with friends, share photos, discover new interests and just hang out.
Sampling, Mashing, Sharing This is a community music site featuring remixes licensed under Creative Commons, where you can listen to, sample, mash-up, or interact with music in whatever way you want.
Web spam pages use various techniques to achieve
higher-than-deserved rankings in a search engine’s
results. While human experts can identify
spam, it is too expensive to manually evaluate a
large number of pages. Instead, we propose techniques
to semi-automatically separate reputable,
good pages from spam. We first select a small set
of seed pages to be evaluated by an expert. Once
we manually identify the reputable seed pages, we
use the link structure of the web to discover other
pages that are likely to be good. In this paper
we discuss possible ways to implement the seed
selection and the discovery of good pages. We
present results of experiments run on the World
Wide Web indexed by AltaVista and evaluate the
performance of our techniques. Our results show
that we can effectively filter out spam from a significant
fraction of the web, based on a good seed
set of less than 200 sites.
“Are you my friend? Yes or no?” This question, while fundamentally odd, is a key component of social network sites. Participants must select who on the system they deem to be ‘Friends.’ Their choice is publicly displayed for all to see and becomes
“Are you my friend? Yes or no?” This question, while fundamentally odd, is a key component of social network sites. Participants must select who on the system they deem to be ‘Friends.’ Their choice is publicly displayed for all to see and becomes
httptunnel creates a bidirectional virtual data connection tunnelled in HTTP requests. The HTTP requests can be sent via an HTTP proxy if so desired.
This can be useful for users behind restrictive firewalls. If WWW access is allowed through a HTTP proxy, it's possible to use httptunnel and, say, telnet or PPP to connect to a computer outside the firewall.
a secure, fast, compliant and very flexible web-server which has been optimized for high-performance environments. It has a very low memory footprint compared to other webservers and takes care of cpu-load.
Failover clusters are used to ensure high availability of system services and applications even through crashes, hardware failures, and environmental mishaps. In this article, I'll show you how to implement a rock-solid two-node high availability Apache c
RT @makemoney526 What Is Social Capital?: There are many forms of capital. Besides the usual definition of .. http://tinyurl.com/amf3n3 [from http://twitter.com/jomiralb/statuses/1216867618]
web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are
'NTLM Authorization Proxy Server' (APS) is a proxy software that allows you to authenticate via an MS Proxy Server using the proprietary NTLM protocol. Since version 0.9.5 APS has an ability to behave as a standalone proxy server and authenticate http clients at web servers using NTLM method. It can change arbitrary values in your client's request header so that those requests will look like they were created by MS IE. It is written in Python v1.5.2 language.
can identify and stop sites trying to phish (steal) your personal information or money. The OpenDNS phishing protection works with all operating systems and browsers, and complements any other security measures already in use, such as a firewall and anti-
Hi! If you think I add value to your network, do drop me a recommendation at http://mrtweet.net/jomiralb?gr Much appreciated! [from http://twitter.com/jomiralb/statuses/1218488446]
This site host diki - the distributed knowledge infrastructure. It is a friend-to-friend (p2p-like) based infrastructure that aims at providing a social semantic web without central servers. Thus it provides the privacy that most application still lack of.
offers the free service to timestamp any publicly available digital document. Timestamping creates evidence, that some digital data already existed at a specific date.
ResearchGate is a network dedicated to science and research. Connect, collaborate and discover scientific publications, jobs and conferences. All for free.
I posted an updated tech demo of RhNav - Rhizome Navigation visualizing user behavior of this blog. The graph is now centered around the page where most time is spent. Noise created by search engine robots is filtered which should clear things up quite a
B. Yu, und M. Singh. Cooperative Information Agents IV - The Future of Information Agents in Cyberspace, Volume 1860 von Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, (2000)
B. Berendt, A. Hotho, und G. Stumme. Web Semantics: Science, Services and Agents on the World Wide Web, 8 (2-3):
95 - 96(2010)Bridging the Gap--Data Mining and Social Network Analysis for Integrating Semantic Web and Web 2.0; The Future of Knowledge Dissemination: The Elsevier Grand Challenge for the Life Sciences.
B. Berendt, A. Hotho, und G. Stumme. Web Semantics: Science, Services and Agents on the World Wide Web, 8 (2-3):
95 - 96(2010)Bridging the Gap--Data Mining and Social Network Analysis for Integrating Semantic Web and Web 2.0; The Future of Knowledge Dissemination: The Elsevier Grand Challenge for the Life Sciences.
B. Berendt, A. Hotho, und G. Stumme. Web Semantics: Science, Services and Agents on the World Wide Web, 8 (2-3):
95 - 96(2010)Bridging the Gap--Data Mining and Social Network Analysis for Integrating Semantic Web and Web 2.0; The Future of Knowledge Dissemination: The Elsevier Grand Challenge for the Life Sciences.
B. Berendt, A. Hotho, und G. Stumme. Web Semantics: Science, Services and Agents on the World Wide Web, 8 (2-3):
95 - 96(2010)Bridging the Gap--Data Mining and Social Network Analysis for Integrating Semantic Web and Web 2.0; The Future of Knowledge Dissemination: The Elsevier Grand Challenge for the Life Sciences.
G. Geleijnse, und J. Korst. Proceedings of the 6th International Semantic Web Conference and 2nd Asian Semantic Web Conference (ISWC/ASWC2007), Busan, South Korea, Volume 4825 von LNCS, Seite 155--168. Berlin, Heidelberg, Springer Verlag, (November 2007)
G. Geleijnse, und J. Korst. Proceedings of the 6th International Semantic Web Conference and 2nd Asian Semantic Web Conference (ISWC/ASWC2007), Busan, South Korea, Volume 4825 von LNCS, Seite 155--168. Berlin, Heidelberg, Springer Verlag, (November 2007)