(photo of the recent Social Web Barcamp in Paris from Henry Story's website)

I was chatting with Henry Story, creator of Babelfish, the translation engine, just after he presented his current work at the Social Web Barcamp conference in Paris, France. He directed me to his talk about the state of the Semantic Web, http://blogs.sun.com/bblfish/entry/camping_and_hacking_at_har2009 and suggested I view the video online of his talk using Firefox 3.5. The one I am referring to is the first of the 4 on his blog post. What's interesting is that you don't even see these .ogg format videos using another browser than Firefox 3.5, for example Camino on the Mac doesn't render these videos visible at all!

As an aside, Henry points out the Barcamp guidelines, which we'll follow at the upcoming OrlandoJUG meeting Thursday:

* Everybody is a participant
* You make the event
* Feel free to move between sessions if you feel you are not getting what you were looking for at one of them
* Write up your interests on the black board, this will be used to create the time table.

So the sessions were put together on the spot there and then. That seems "hard" but in my experience it's always a great time, and so much better than the norm.

His mention of Metcalfe's Law was an interesting sidenote. He discussed with me the idea of using FOAF + SSL as a single point of entry and signup for a social network. I'm just beginning to understand what he's talking about, and it's phenomenal! Have any of you explored the possibilities of the Friend of a Friend project and possibly used it on a website? Let's discuss...

Views: 78

Replies to This Discussion

using metadata about users on the web has been in discussion for ~ 10 yrs. FOAF is interesting but I think whoever gets the most users will get the most developers, like the Facebook api or googles open social.

http://www.softwaredeveloper.com/features/welcome-to-opensocial-040...
I worked for years on implementing OSI's protocols for X.400 email , X.500 directory, CMIP network managment. X.400 was eventually replaced by SMTP not because SMTP was a better protocol , but because more people were using it. What I learned about standards... the ones that succeed are the ones that have the widest implementation and use.
ADA is another example, remember that
What's ADA, Carol?

Carol McDonald said:
ADA is another example, remember that

RSS

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Presentation: Empower Your Developers: How Open Source Dependencies Risk Management Can Unlock Innovation

Celine Pypaert discusses the ubiquitous nature of open-source software and shares a blueprint for securing modern applications. She explains how to prioritize high-risk vulnerabilities using exploitability data, the role of Software Bill of Materials (SBOM), and the importance of bridging the gap between DevOps and Security through clear accountability and automated governance.

By Celine Pypaert

Zendesk Says AI Makes Code Abundant, Shifting the Bottleneck to “Absorption Capacity”

Zendesk argues that GenAI shifts the bottleneck in software delivery from writing code to “absorption capacity”, which is the organisation’s ability to define problems clearly, integrate changes into the wider system, and turn implementation into reliable value. As code becomes abundant, architectural coherence, review capacity, and delivery flow become the main constraints.

By Eran Stiller

Claude Code Used to Find Remotely Exploitable Linux Kernel Vulnerability Hidden for 23 Years

Anthropic researcher Nicholas Carlini used Claude Code to find a remotely exploitable heap buffer overflow in the Linux kernel's NFS driver, undiscovered for 23 years. Five kernel vulnerabilities have been confirmed so far. Linux kernel maintainers report that AI bug reports have recently shifted from slop to legitimate findings, with security lists now receiving 5-10 valid reports daily.

By Steef-Jan Wiggers

Article: Using AWS Lambda Extensions to Run Post-Response Telemetry Flush

At Lead Bank, synchronous telemetry flushing caused intermittent exporter stalls to become user-facing 504 gateway timeouts. By leveraging AWS Lambda's Extensions API and goroutine chaining in Go, flush work is moved off the response path, returning responses immediately while preserving full observability without telemetry loss.

By Melvin Philips

New Rowhammer Attacks on NVIDIA GPUs Enable Full System Takeover

Security researchers have demonstrated a new class of Rowhammer attacks targeting NVIDIA GPUs that can escalate from memory corruption to full system compromise, marking a significant shift in hardware-level security risks.

By Craig Risi

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service