(photo of the recent Social Web Barcamp in Paris from Henry Story's website)

I was chatting with Henry Story, creator of Babelfish, the translation engine, just after he presented his current work at the Social Web Barcamp conference in Paris, France. He directed me to his talk about the state of the Semantic Web, http://blogs.sun.com/bblfish/entry/camping_and_hacking_at_har2009 and suggested I view the video online of his talk using Firefox 3.5. The one I am referring to is the first of the 4 on his blog post. What's interesting is that you don't even see these .ogg format videos using another browser than Firefox 3.5, for example Camino on the Mac doesn't render these videos visible at all!

As an aside, Henry points out the Barcamp guidelines, which we'll follow at the upcoming OrlandoJUG meeting Thursday:

* Everybody is a participant
* You make the event
* Feel free to move between sessions if you feel you are not getting what you were looking for at one of them
* Write up your interests on the black board, this will be used to create the time table.

So the sessions were put together on the spot there and then. That seems "hard" but in my experience it's always a great time, and so much better than the norm.

His mention of Metcalfe's Law was an interesting sidenote. He discussed with me the idea of using FOAF + SSL as a single point of entry and signup for a social network. I'm just beginning to understand what he's talking about, and it's phenomenal! Have any of you explored the possibilities of the Friend of a Friend project and possibly used it on a website? Let's discuss...

Views: 61

Replies to This Discussion

using metadata about users on the web has been in discussion for ~ 10 yrs. FOAF is interesting but I think whoever gets the most users will get the most developers, like the Facebook api or googles open social.

http://www.softwaredeveloper.com/features/welcome-to-opensocial-040...
I worked for years on implementing OSI's protocols for X.400 email , X.500 directory, CMIP network managment. X.400 was eventually replaced by SMTP not because SMTP was a better protocol , but because more people were using it. What I learned about standards... the ones that succeed are the ones that have the widest implementation and use.
ADA is another example, remember that
What's ADA, Carol?

Carol McDonald said:
ADA is another example, remember that

RSS

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

How to Defend Amazon S3 Buckets From Ransomware Exploiting SSE-C Encryption

A new ransomware campaign, dubbed Codefinger, has been targeting Amazon S3 users by exploiting compromised AWS credentials to encrypt data using Server-Side Encryption with Customer-Provided Keys (SSE-C). Attackers then demand ransom payments for the symmetric AES-256 keys required to decrypt the data. AWS has released recommendations to help users mitigate the risk of ransomware attacks on S3.

By Renato Losio

AWS Reduces Latency and Costs for Key/Value Datastores with AZ Affinity Routing and GLIDE Valkey

AWS recently introduced Availability Zone (AZ) awareness in version 1.2 of the open source Valkey General Language Independent Driver for Enterprise (GLIDE) client library. By implementing AZ affinity routing in the open source key/value datastore, developers can reduce latency and costs by directing requests to replicas within the same AZ as the client.

By Renato Losio

Uber's Cloud Journey: Embracing ARM in an x86 World

Uber embarked on a strategic migration from on-premise data centers to Oracle Cloud Infrastructure (OCI) and Google Cloud Platform in February 2023. A key component of this migration was integrating ARM-based computers into their predominantly x86 fleet to reduce costs, improve price performance, and ensure hardware flexibility amid supply chain uncertainties.

By Claudio Masolo

Google Gemini's Long-term Memory Vulnerable to a Kind of Phishing Attack

AI security hacker Johann Rehberger described a prompt injection attack against Google Gemini able to modify its long-term memories using a technique he calls delayed tool invocation. The researcher described the attack as a sort of social engineering/phishing attack triggered by the user interacting with a malicious document.

By Sergio De Simone

Azure AI Agent Service Now in Public Preview for Developers in AI Foundry SDK and Portal

Introducing the Azure AI Agent Service: a groundbreaking platform that empowers developers to design, deploy, and manage intelligent AI agents seamlessly integrated within the Microsoft ecosystem. Automate tasks, access real-time data, and monitor performance, all while benefiting from easy setup and advanced orchestration. Transform your business with AI-driven efficiency and innovation.

By Steef-Jan Wiggers

© 2025   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service