Orcmid's Lair

<$BlogItemTitle$> Welcome to Orcmid's Lair, the playground for family connections, pastimes, and scholarly vocation -- the collected professional and recreational work of Dennis E. Hamilton

This page is powered by Blogger. Isn't yours?

2003-01-11

 

Loose Ends

Knuth: Help Wanted Williams, Francis A., Jr. (worked with Bob Bemer and H J Smith at IBM White Plains, published in CACM June 59, Dec 60, May 61).  Someone that Knuth is looking for.  I need to mention it to Bob Bemer, who might have more contacts.  He should send a note to Knuth at the e-mail given on this page.

 

The Mind Electric

Yet another name for the global grain.

The Mind Electric� - ElectricXML Toolkit.  A Java toolkit for parsing and manipulating XML, including serialization and deserialization, reputedly much easier and faster than DOM, etc, though W3C DOM interfaces are supported.  There is an advanced ElectricXML+ that may have a fee.  I am reading farther ...

 
The Mind Electric�.  The gaia product provides a service-oriented grid computing platform.  This is important to look at in the context of the network being the computer and the hive approaches that are being proposed now.

 

More Loose Ends

Knowledge Base - Document Number: RG1072161.  A procedure I need to know about when I upgrade the Centro (Dell Dimension XPS T600) to XP Pro.  I need something similar for Compagno, my Dell Inspiron 7000, which is currently upgraded but I don't have all of the Dell personality present (and maybe never will).

2003-01-10

 
Scalable Vector Graphics (SVG).  Here is information on SVG, authoring, and viewing.

 
Document Object Model (DOM) Level 2 HTML Specification.  A link to the latest version, with information on history and sources of dowloads in a variety of formats.

 
CNET.com: W3C releases scripting standard, caveat.  New information on DOM Level 2 scripting and also recommendation that plain standards may be preferable: SVG and SMIL.

 
InfoWorld Special Report: Disruptive technologies.  Includes low-cost, simple web logging and collaboration approaches.

 
Implementation Guidelines.  AIIM ARP 1-2002, Implementation Guidelines and Standards Associated with Web-based Document Management Technologies, an AIIM Recommended Practice.

 
AIIM PDF-Archive.  This committee has taken on specifying PDF tags for the archival storage of electronic documents.  Another new but visibly-active group.

 
AIIM Integrated EDM/ERM Functional Requirements.  This group is out to establish a single set of integrated EDMS/ERMS functional requirements that must be shared between two types of systems as well as functional requirements unique to each kind of system. This is a highly active group with much visible material.

 
AIIM Digital Image Quality & Preservation Committee.  Responsibe for varous aspects of preserving digital information.

 
AIIM C29, XML/Metadata Standards.  This committee has two active working groups: XML Working Group for defining an XML wrapper on document images, and Metadata Working Group responsible for identifying metadata schemas appropriate for document imaging systems.

 
AIIM C19, Terminology Standards.

 
AIIM C18 Public Records, Libraries & Archives Standards.

 
AIIM C22, Evidentiary Support standards.  Collecting information on the different standards activities within AIIM.

 

Computer Technology

Shared Computing

IBM steps into shared computing

USATODAY.com - High tech's latest bright idea: Shared computing.  "IBM, say is one of the most promising new technologies in years.  Dubbed shared computing, the technology allows companies to harness the processing power in every computer � at all times � and to combine it to crunch big computing tasks that before required expensive supercomputers.  Shared computing also lets companies, or researchers, shift computing power via a network to where it's needed. That cuts costs and increases computing productivity.

"'It is the next big thing,' says IBM Vice President Irving Wladawsky-Berger."

"But eventually, small businesses and even consumers may be able to tap the processing power of a supercomputer as tech companies build shared-power networks for public use. PC maker Gateway recently announced plans to rent out the muscle of 7,800 PCs that sit idle at night in its stores. Someday, 'You will plug into the wall (to get computing power) the same way you do to get electrical power,' says University of Pennsylvania professor Robert Hollebeek."

"IBM's new CEO, Samuel Palmisano, recently said shared computing and related technologies will drive IBM's growth � and the company made a $10 billion investment to prove it. Last year, Microsoft plowed $1 million into a shared-computing research organization called the Globus Project. Sun Microsystems is even giving away some of its shared-computing software to drum up interest.
   "Dell Computer, the No. 1 PC maker, also sells shared-computing software and, like IBM, will help companies figure out how to use it.
   "'We're pretty pleased with the opportunity to compete with supercomputers and mainframes,' says CEO Michael Dell."

"The shared-computing networks, developed by Oxford University, the University of Pennsylvania and other research groups, will increase storage and make it easier for doctors to access mammograms and compare them with millions of others. That will help cancer diagnosis, says Oxford University researcher Mike Brady, who heads the European project."

"Research labs are pushing even more ambitious projects that could someday find their way to the business world. Purdue University professor Alok Chaturvedi has built a shared-computing network out of supercomputers to train rescue personnel to handle terrorist attacks. ...
   "The University of Houston, too, is building a shared-computing network that it hopes to link with Texas A&M University this year. ...
   "... The companies that figure out how to make the software stable and safe 'will make a lot of money,' says Ian Foster, a shared-computing pioneer and University of Chicago professor.
   "'The payback is very substantial,' says Songnian Zhou, chief technology officer of Platform Computing. But, he warns, it will take awhile for it to mature. 'There's a lot of excitement, and some are promising the moon.'"

2003-01-07

 
Agentcities Web.  Toward self-organizing agent-based software systems.  This is an example of an effort to realize agent-based coordinated activities.  Let's see how the orchestration of all this goes.

 
Microsoft PressPass - Craig Mundie Keynote Trusted Computing Forum 2001.  A transcript of Craig Mundie's speach at the November 5, 2001, Trusted Computing Forum.

 
Wired News: MS Takes Hard Line on Security.  A 2002-11-14 report on Craig Mundie presentation.

 
Packet Attack - Home Page.  More on security and networking.  Lousy color scheme though.  Still, a possible resource.

 
SecurityFocus Corporate Site.  A security firm that looks at what might be the most effective approach.  Broad coverage of issues and news.

 
Computer Bytes Man.  Consultant Richard M. Smith's page on Privacy, Security, and related issues and concerns.

 
CERT/CC Statistics 1988-2002.  A good place for information, including statistics on vulnerabilities, incidents, etc, over time.  The growth curve is phenomenal on incidents, of course.  It appears that the number of distinct incidents is not growing so fast as the number of distinct vulnerabilities, by any means.

 
Wired News: So Many Holes, So Few Hacks.  Suggestion that more effort might be expended tracking down malicious hackers than finding and covering all those holes that are not exploited (?).

 
National Post: IT Graduates Swimming Against Economic Tide/.  A Canadian report of the difficulty of placing interns and the number of students having difficulty finding placements in IT and math.

 
Philly.com: Internet users find barriers to sites at school, work, library.  In addition to the social concerns, it is also valuable to point out that the use of decontextualized computational procedures (e.g., server based generic spam filters, and list-server virus protectors) is problematic in the first place.  The number of mis-fires and the pourosity of these mechanisms is pretty outrageous.  So naturally, the promise is for more and better, when the the approach is based on a fundamentally flawed assumption about the existence of an algorithm that can do what is expected.

 
NYT: Experts See Vulnerability as Outsiders Code Software.  The general difficulty of vulnerabilities in outsourced code, as well as the general struggle against off-shore outsourcing, are delved into here.

 
http://www.glaz.org/.  Wim Glas has completed his dissertation for the University of Liverpool on-line M.Sc in IT.  The dissertation, slide presentation, and defense notes are posted here.  Not surprisingly (I have been thinking along the same lines), the dissertation is about distance collaboration, especially meetings.  It is cool that Floriana Grasso was on Wim's dissertation committee.  It is her presence in the program that made it clear to me that I wanted to do this program.  I will have to let her know that at some point.

Hard Hat Area

an nfoCentrale.net site

created 2002-10-28-07:25 -0800 (pst) by orcmid
$$Author: Orcmid $
$$Date: 03-09-06 20:49 $
$$Revision: 4 $

Home