Autor: Tim Strehle
-
Inference in Topic Maps using tolog
Fascinating – Topic Map Inference rules in tolog: „The parent-of rule parent-of($A, $B) :- { parenthood($B : child, $A : mother, $F : father) | parenthood($B : child, $M : mother, $A : father) }. What this rule says is that A is the parent-of B if A is either the mother or father of…
-
Oracle on the „keep-it-simple“ spirit of PHP
The Oracle Technology Network has a friendly article on PHP: „Remember the heady days of HTML version 1.0 to version 2.0, when mastering a new Web language was as simple as looking at the code behind a Web site? Remember the ease of learning that came with basic HTML? Remember being able to hack out…
-
Security-aware PHP programming
David Sklar: PHP and the OWASP Top Ten Security Vulnerabilities John Coggeshall at ONLamp.com: ONLamp.com: PHP Security, Part 1, Part 2, and Part 3. Clancy Malcolm at ONLamp.com: Ten Security Checks for PHP, Part 1, and Part 2. Jordan Dimov at PHPAdvisory.com: On the Security of PHP (Part 1) Quite old: Shaun Clowes‘ A Study…
-
Babeldoc
Babeldoc seems to have a sound concept. Excerpts from their Whitepaper (PDF): „Babeldoc is based around the concept of pipeline processing. Pipeline processing is where an input document is subjected to a linear succession of processing. The document is successively transformed into useful information. Examples of this might be to convert a purchase order document…
-
SiteMesh
SiteMesh sounds like a good idea (found this through PHP-Mesh): „SiteMesh intercepts requests to any static or dynamically generated HTML page requested through the web-server, parses the page, obtains properties and data from the content and generates an appropriate final page with modifications to the original. This is based upon the well-known GangOfFour Decorator design…
-
Blogs, homepages and privacy
Andy Oram points to a fascinating Swedish court decision: „Mrs Lindqvist also described the work done by her colleagues and their hobbies in mildly humorous terms. In several cases their family circumstances, their telephone number and other information were given. She also mentioned that one of her colleagues had injured her foot and was working…
-
Connecting XUL Applications with PHP
phpPatterns: „So, you have looked at XUL and think it’s pretty cool stuff. But, you hate programming with javascript and are stuggling to leverage the power of your favorite scripting language, PHP. There are ways around this, but the minefield of the Gecko security model is a little to much work to figure out. Well,…
-
The unpublished book on Microsoft insecurity
Jason Coombs on Bugtraq: „I wrote an information security book last year under contract with Microsoft Press. The book was never published — among other things it explains truthfully the poor security condition of Windows and offers detailed instructions and advice for defending against Microsoft’s bad business practices and incorrect security decisions. URLs for the…
-
Mining message metadata
Jon Udell: „Point-to-point integration is out; event-driven communication across a common message bus is in. When you build a system this way, message queues are the first and best way to take the pulse of its real-time state.“
-
Clay Shirky on The Semantic Web
Clay Shirky does a great job explaining why the Semantic Web is a myth: „Descriptions of the Semantic Web exhibit an inversion of trivial and hard issues because the core goal does as well. The Semantic Web takes for granted that many important aspects of the world can be specified in an unambiguous and universally…