diff options
author | luxagraf <sng@luxagraf.net> | 2020-04-28 10:21:17 -0400 |
---|---|---|
committer | luxagraf <sng@luxagraf.net> | 2020-04-28 10:21:17 -0400 |
commit | a222e73b9d352f7dd53027832d04dc531cdf217e (patch) | |
tree | ccc1b5c54986980141faee867318ca80e45ebef5 /old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue | |
parent | 1337c4eafe29252d892d2bde0276212ac77382d4 (diff) | |
parent | e67317b0a6f02fd75f198cd22f83c20076c61dcf (diff) |
Merge remote-tracking branch 'wired/master' adding wired to conde
Diffstat (limited to 'old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue')
-rw-r--r-- | old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/google-code.jpg | bin | 0 -> 7116 bytes | |||
-rw-r--r-- | old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/gwt.txt | 1 | ||||
-rw-r--r-- | old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/office-com-server.jpg | bin | 0 -> 8014 bytes | |||
-rw-r--r-- | old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/office-com-server.txt | 1 | ||||
-rw-r--r-- | old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/piratebay-logo.jpg | bin | 0 -> 8650 bytes | |||
-rw-r--r-- | old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/piratebay.txt | 1 | ||||
-rw-r--r-- | old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/reboot.txt | 1 | ||||
-rw-r--r-- | old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/ucla-computer-breach.txt | 1 | ||||
-rw-r--r-- | old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/ucla.jpg | bin | 0 -> 4261 bytes |
9 files changed, 5 insertions, 0 deletions
diff --git a/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/google-code.jpg b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/google-code.jpg Binary files differnew file mode 100644 index 0000000..4afe1da --- /dev/null +++ b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/google-code.jpg diff --git a/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/gwt.txt b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/gwt.txt new file mode 100644 index 0000000..d154ca0 --- /dev/null +++ b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/gwt.txt @@ -0,0 +1 @@ +The [Google Web Toolkit][1] (GWT) is now an open source project. The GWT is a Java development framework designed to help web programmers easily write AJAX applications like Google's own GMail or Maps. The GWT was [announced][2] back in May of this year, but today's open sourcing move means that the previously closed, binary-only, portions of the kit are now available to developers.
With GWT, developers can code and debug AJAX applications in Java and then deploy applications using the GWT compiler to translate the Java application to browser-compliant JavaScript.
The [guidelines for the GWT][4] outline the following workflow:
>1. Use your favorite Java IDE to write and debug an application in the Java language, using as many (or as few) GWT libraries as you find useful.
2. Use GWT's Java-to-JavaScript compiler to distill your application into a set of JavaScript and HTML files that you can serve with any web server.
3. Confirm that your application works in each browser that you want to support, which usually takes no additional work.
One of the reasons Google initially created GWT was to use it for their own development. Programs like GMail are incredibly difficult to create and debug because of myriad of differences between web browsers.
As the GWT homepage puts it, GWT makes creating AJAX applications, "easy for developers who don't speak browser quirks as a second language."
Interestingly, in addition to open-sourcing the code, the GWT developers have also released their entire development process to the public. The new "[Making GWT Better][3]" page includes development discussions, code reviews, future milestones, and the codebase for developers to browse through.
If you're a web developer navigating the treacherous waters of AJAX development, you might want to give GWT a try.
[2]: http://googleblog.blogspot.com/2006/05/making-ajax-development-easier.html "Google Web Toolkit initial announcement"
[1]: http://code.google.com/webtoolkit/ "Google Web Toolkit"
[3]: http://code.google.com/webtoolkit/makinggwtbetter.html "Making GWT Better"
[4]: http://code.google.com/webtoolkit/overview.html "GWT overview"
\ No newline at end of file diff --git a/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/office-com-server.jpg b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/office-com-server.jpg Binary files differnew file mode 100644 index 0000000..2331e03 --- /dev/null +++ b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/office-com-server.jpg diff --git a/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/office-com-server.txt b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/office-com-server.txt new file mode 100644 index 0000000..31661d7 --- /dev/null +++ b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/office-com-server.txt @@ -0,0 +1 @@ +Microsoft will begin testing a new [VoIP server][1] as part of the company's new Office Communications Server. The beta testing phase will begin in the second quarter of 2007 with 2,500 participants.
The new service is aimed at business users and will allow users to click on a name in Office Word, Outlook or Communicator and determine that person's availability and make a phone call.
For example, when a colleague sends you an e-mail, clicking their name in Office Outlook will check their phone availability status and place a person-to-person call or arrange a conference call with others.
Office Communications Server is an extension of the previously named Live Communications Server 2005, which allowed for IM, chat and other protocols, but had no support for VoIP.
The new Office Communications Server will work with many existing corporate communications structures, such as those available from Cisco, Siemens and others.
Microsoft's VoIP will use the [Session Initiation Protocol][2], the standard signaling protocol for Internet conferencing and telephony, unlike Skype for instance, which uses its own proprietary network.
The new Office Communications Server also supports audio, video and web conferencing as well as the ability to handle call waiting, forwarding and transfers.
According the Reuters report, Microsoft Chief Executive Steve Ballmer has predicted that within 10 years all business communications will be Web-based, meaning hundreds of millions of people will change how they communicate.
[2]: http://en.wikipedia.org/wiki/Session_Initiation_Protocol
[1]: http://today.reuters.com/news/articlenews.aspx?type=technologyNews&storyid=2006-12-12T055233Z_01_N11256623_RTRUKOC_0_US-MICROSOFT-VOIP.xml&src=rss
\ No newline at end of file diff --git a/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/piratebay-logo.jpg b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/piratebay-logo.jpg Binary files differnew file mode 100644 index 0000000..a285275 --- /dev/null +++ b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/piratebay-logo.jpg diff --git a/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/piratebay.txt b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/piratebay.txt new file mode 100644 index 0000000..70b2b61 --- /dev/null +++ b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/piratebay.txt @@ -0,0 +1 @@ +As I mentioned in [the morning reboot][3], Swedish website The Pirate Bay (TPB) has decided to [block the Swedish ISP Perspektiv Broadband's users][1] from accessing the TPB's website. The move comes in response to ISP Perspektiv's decision to block its users from accessing the Russian website, allofmp3.com.
The interesting thing to note is that for Swedish users there is no legal reason for Perspektiv to block traffic to allofmp3, rather the broadband provider elected to do so, according the The Pirate Bay, after meeting with Swedish and Danish anti-piracy organizations.
The Pirate Bay claims that Perspektiv Bredband "clearly states in their press release that it is a moral and not legal standpoint." I can't read Swedish, so I can't confirm that Perspektiv did in fact say that, but either way, given that allofmp3.com is not illegal in Sweden, Perspektiv's move to block the site is a bit odd at the least.
For some background on the Pirate Bay see Quinn Norton's [recent coverage][2] for Wired.com.
Many might be tempted to dismiss the whole thing as irrelevant given the questionable legality of TPB in the U.S., but what's interesting about this story is not necessarily the isolated case, but the larger implications.
What happens when your favorite site blocks you from accessing it because the ISP that provides your internet connection does something your favorite site objects to?
I'm not suggesting that ISP's have the right to block content, but it does happen. And this is hardly the first time a site has blocked incoming users, Google blocks all kinds of traffic coming from China as part of its partnership with the Chinese government.
Protest and protest actions like boycotting a product or company have a long history in the United States, but I'm not sure that such actions transfer well to the internet.
For instance, if consumers are unhappy with Acme widgets they can boycott Acme widgets, tell all their friends to boycott Acme Widgets and Acme Widgets may choose to change their policies based on lost revenue.
But even in the midst of such a boycott if you did not agree with the boycott, you can still go to Acme Widget and buy whatever you want. In other words the consumer is not directly effected.
However in this case the consumer is caught in the middle. Now not only can Perspektiv Broadband users not access allofmp3, but now they can't access TPB either. The end result *could* be that enough Perspektiv users complain that company gets rid of its blocking software, but either way the burden of boycott is not on Perspektiv directly, but rather its customer base who must complain enough to initiate change.
It's easy to understand the Pirate Bay's position (and please keep in mind that The Pirate Bay is one of the largest sites in Sweden and that allofmp3 is legal under Swedish copyright law), but the decision to target the users of an ISP rather than the ISP directly seems unwise.
While I agree that Perspektiv's site ban is ultimately a far more chilling threat to concepts like net neutrality, I also hope that we aren't headed toward a future where individual sites begin blocking users as an indirect way of sending a message to abusive companies.
[1]: http://piratbyran.org/perspektiv/english.php "Pirate Bay blocks Perspektive Broadband"
[2]: http://www.wired.com/news/technology/0,71543-0.html "Secrets of the Pirate Bay"
[3]: http://blog.wired.com/monkeybites/2006/12/the_morning_reb_7.html "Monkey Bites' Morning Reboot Dec 12"
\ No newline at end of file diff --git a/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/reboot.txt b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/reboot.txt new file mode 100644 index 0000000..1f10605 --- /dev/null +++ b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/reboot.txt @@ -0,0 +1 @@ +<img alt="Any_key_3" title="Any_key_3" src="http://blog.wired.com/photos/uncategorized/any_key_2.jpg" border="0" style="float: right; margin: 0px 0px 5px 5px;" />Bringing you the freshest nuggets to start your day right, the morning reboot:
* Yesterday a Microsoft patent [surfaced that reveals][1] the company has filed for a patent for "DVR-based targeted advertising." According the the document Microsoft wants to create a database of ads on DVR players to serve up "fresh" advertisements on your DVR recordings. And here we thought DVR's main feature was to skip ads.
[1]: http://www.engadget.com/2006/12/10/microsoft-patents-dvr-application-to-provide-targeted-advertisin/ "Engadget on Microsoft DVR patent"
* Yahoo [opened its "Panama" advertising system][2] up to new users yesterday. The service was previously only available to existing customers, but yesterday marked the beginning of Yahoo's plan to phase out the old system by the end of Q1 2007.
[2]: http://today.reuters.com/news/articlenews.aspx?type=internetNews&storyid=2006-12-12T135537Z_01_N11163848_RTRUKOC_0_US-YAHOO-ADVERTISING.xml&src=rss "Yahoo to switch to Panama Advertising system"
* Yet another [flaw in Microsoft Word ][3]has been discovered. This one allows attackers to gain remote access to user's system. There's currently no patch, but the Microsoft advisory claims "the vulnerability is being exploited on a very, very limited and targeted basis." The flaw affects Word 2000, 2002 and 2003, but does not affect the upcoming Word 2007.
[3]: http://blogs.technet.com/msrc/archive/2006/12/10/new-report-of-a-word-zero-day.aspx
* The Dutch are official the first nation to [pull the plug on analog television][4]. According the AP report, hardly anyone noticed the change which should be music to many a government ear. Similar plans are in place for the US as governments around the world try to free up much needed bandwidth in the broadcast spectrum.
[4]: http://abcnews.go.com/Entertainment/wireStory?id=2716983&CMP=OTC-RSSFeeds0312
* The Pirate Bay is [fighting back][6] against a Swedish ISP that blocked Swedish comsumers from visiting the controversial Russian site allofmp3.com. According the press release, The Pirate Bay will block all traffic from the Swedish ISP, Perspektiv Bredband. Could this be the start of a new trend -- a roundabout way for site owners to get back at draconian ISP regulation?
[5]: http://piratbyran.org/perspektiv/english.php "Pirate Bay blocks Swedish ISP"
* And finally, as a blast from the past, Wired's Christopher Null has a great look back at the [10 gadgets That Changed The World][6].
[6]: http://blog.wired.com/wiredphotos6/2006/12/1_rca_model_630.html
\ No newline at end of file diff --git a/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/ucla-computer-breach.txt b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/ucla-computer-breach.txt new file mode 100644 index 0000000..cb52bb1 --- /dev/null +++ b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/ucla-computer-breach.txt @@ -0,0 +1 @@ +UCLA has [revealed][1] what might be the largest computer security breach ever at an American university. University officials say hackers broke into a database containing personal information on about 800,000 current and former students, faculty and staff members.
UCLA officials say the database accessed by the attackers contained personal records with the names, Social Security numbers, birth dates, home addresses and other contact information. The database in question did not contain any banking or credit card information, but given the amount of personal data it did contain, the attackers could potentially steal the victim's identities.
So far the University says that there is no evidence that information has been used in any way, but UCLA officials will be sending out a letter later today to those effected by the breach encouraging them to keep an eye on their consumer credit files and consider enabling fraud protection.
According to the UCLA announcement:
>an unauthorized person exploited a previously undetected software flaw and fraudulently accessed the database between October 2005 and November 2006. When UCLA discovered this activity on Nov. 21, 2006, computer security staff immediately blocked all access to Social Security numbers and began an emergency investigation.
As noted above, the exploit and attacks appear to have been going on for just over a year. UCLA security technicians discovered the exploit when they noticed a series of suspicious database queries.
In the [UCLA press release][2] Acting Chancellor Norman Abrams says, "We take our responsibility to safeguard personal information very seriously." He went on to assure students, "my primary concern is to make sure this does not happen again and to provide to the people whose data is stored in the database important information on how to minimize the risk of potential identity theft and fraud."
The Los Angeles Times [reports][3] that there are no "comprehensive statistics on computer break-ins at colleges do not exist." However, the Times goes on to say, "in the first six months of this year alone, there were at least 29 security failures at colleges nationwide, jeopardizing the records of 845,000 people."
[1]: http://www.identityalert.ucla.edu/index.htm "UCLA security breach"
[2]: http://www.identityalert.ucla.edu/press_release.htm "UCLA press release"
[3]: http://www.latimes.com/news/local/la-me-ucla12dec12,0,7111141.story?coll=la-home-headlines "LATimes on UCLA security breach"
\ No newline at end of file diff --git a/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/ucla.jpg b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/ucla.jpg Binary files differnew file mode 100644 index 0000000..2a593e7 --- /dev/null +++ b/old/published/Webmonkey/Monkey_Bites/2006/12.11.06/Tue/ucla.jpg |