The IDAutomation Universal 2D Barcode Font is a single font file that is used to generate two-dimensional barcodes from Aztec, DataMatrix,...
Showing results 1 to 20 of 27
ZDNet and TechRepublic have created a free PDF that will help you make the right data center decisions for your organization.
Businesses that accept credit or debit cards have continued to fail at achieving and maintaining compliance with the Payment Card Industry Data Security Standard (PCI DSS), according to a report (PDF) released by Verizon.
A White House memo on how to improve data security in the wake of the publication of hundreds of thousands of leaked US documents on Wikileaks has been leaked.The memo (PDF), which was circulated to the heads of US government departments and agencies on 3 January, was handed to MSNBC news.
On previous trips to Europe I have used Truphone to make calls on my Nokia devices. Over the last couple of years Truphone has rolled out mobile clients for various smartphone operating systems and today they announced (PDF file) their latest service called Truphone Local Anywhere that makes every call a local call. The service is designed for international travelers who could save more than 90 percent on their mobile bills with this new service that provides local number for calls, texts, and data with a single SIM card. The Truphone Local Anywhere service launched today in the US and UK with other countries coming in 2010.
The programe generates and prints most popular 2D barcode symbologies including Aztec Code, Aztec Runes, Data Matrix(ECC 0-140, ECC...
This report from Verion Business (PDF), as reported in the Washington Post, offers some interesting numbers amid the obvious conclusion that cybercrime is conducted by organized crime.100 data breaches involving 285 million consumer records (think you weren't touched)?
Microsoft on Wednesday will unveil its sixth Security Intelligence Report and the tome---all 184 pages of it---has a lot of interesting data points culled from the software giant's antivirus applications. Microsoft concludes that rogue security software is a big threat, lost and stolen equipment is a bigger issue than hacking and PDF and Office extensions are leading vectors.
The 2D Barcode VCL components is a set of components designed for generating and printing barcode symbols in your Delphi or C++ Builder...
AdMob released their February 2009 report (PDF link) that gathers data from ads on more than 6,000 mobile web sites and 1,000 applications around the world. This data does not show sales information, which is tough to really understand because of the way companies count sales and the way data analysis companies count smartphones. Looking at the US smartphone figures, Apple has the lions share of traffic 50% in Febuary 2009 with RIM in second with 21%, Windows Mobile in third with 13%, Palm in fourth with 7% and Android in fifth with 5%.
Guest editorial by Oliver DayIn June 2008, StopBadware published a report with statistics (.pdf) based on our sample of infected website data from Google.
A federal judge ordered (PDF) Google to hand over 12 terabytes of YouTube user data to Viacom, finding that the list of "login IDs" does not qualify as personally identifying information.In opposing Viacom's request for the information, Google had asserted users' privacy rights: "Plaintiffs would likely be able to determine the viewing and video uploading habits of YouTube’s users based on the user’s login ID and the user’s IP address.
According to a new study from researchers at Google, IBM and ETH Zurich, there are about 637 million Google users surfing the Internet with a vulnerable Web browser.Using data from Google search queries and security vulnerability aggregator Secunia, the study (HTML or PDF) found that a whopping 45 percent of Google users "were not using the most secure Web browser version on any working day from January 2007 to June 2008.
Hollywood would have IT pros believe that the biggest threat to network security comes from international super hackers or high school kids trying to download games like global thermonuclear war. In reality, we face a more mundane threat--our end users, particularly those wielding USB storage devices.These pocket-sized devices can store a large amount of data. But even if your users aren't planning to cart off sensitive company files, USB storage devices (external hard drives, camera, memory stick, MP3 players, etc.) can be a headache in other ways. Employees may use your networks to download music to their USB-based MP3 players. New USB flash drives, such as SanDisk's U3 smart drives, can even run software directly from the device--a perfect tool for the end-user who wants to run unauthorized software on your network.If your concerned about USB storage devices on your network and don’t feel a written policy alone will protect your data, disabling the devices is your next step.In this IT Dojo video, Bill Detwiler, TechRepublic's Head Technology Editor, shows you how to disable USB storage devices on both Apple OS X and Windows. The United States National Security Agency (NSA) described the process in a March 2008 document from the agency's Information Assurance Directorate.Once you've watched this IT Dojo video, you can read the original TechRepublic article, download PDF version of this tip, and learn more about mitigating the risks poses by USB storage devices from our IT Dojo blog.
The main programme of this year's World Wide Web Conference gets underway here in Beijing today (Wednesday), but ahead of that yesterday was devoted to workshops.With my colleague Tom Heath one of the co-chairs, a paper (pdf) from colleagues Rob Styles, Nadeem Shabir and (the absent) Danny Ayers, and a paper (pdf) from myself, Rob and Tom, my choice of workshop was an easy one to make; Linked Data on the Web.
The White House was running a "primitive" email archiving system with a high risk of losing data, a computer expert who worked on the system told the House Oversight Committee.In a memo to committee members (PDF), Congressional staffers detailed a mind-boggling scenario that smacks of willful violation of laws requiring presidential email archiving, IT incompetence and a strong whiff of intentional destruction of evidence.
This is a powerful system that enables server administrators to very quickly restore data that may have been lost due to viruses, user error or hardware failure.
The Economist. Tim O'Reilly. Nova Spivack. Danny Ayers. Read/Write Web's Alex Iskold. Kingsley Idehen. Brad Feld. Over the last few days all of them have been amongst those writing to clarify their understanding of the Semantic Web and where it's going.Each piece is thoughtful, each piece is well worth a read, and each differs somewhat from the others in outlook as they delve into 'ontologies', 'classic approaches', 'machine intelligence', 'SPARQL', 'Turtle' and other geekiness [meant in the nicest possible way]. I do wonder, though, if all of them are bypassing some fundamental points as they seek to clarify their own perspectives to themselves, to one another, and to the world; points with which I suspect that each may actually agree.First, I definitely don't think that a company, technology or approach can only be either 'Web 2.0' or 'Semantic Web'. Sure, some companies will see themselves (or pitch themselves) in one space or the other, but there's going to be an ever-increasing number that reside firmly in both. Ultimately, of course (and figures in the FT this week, suggesting that “The pull-back was particularly acute in Silicon Valley, as big Web 2.0 investors such as Benchmark Capital, Kleiner Perkins Caufield & Byers and Omidyar Networks, the private financing vehicle of Ebay founder Pierre Omidyar, cut back on their investments.”might more logically be interpreted as supporting this argument) companies won't be Web 2.0 or Semantic Web. They will be companies that solve a particular set of problems for a particular set of audiences. Some of the tools in the toolbox they use to do this will be Web 2.0-ish, some will be Semantic Web-ish, some will be both, and some will be neither. Those things that currently differentiate us - and to which we apply labels in order to reinforce the differentiation - will become mainstream, run of the mill, mundane, and simply expected. That's progress, and it's a good thing. Web 2.0 won't go away. The Semantic Web won't go away. Shouting about either might, and it doesn't have to mean that their importance has diminished.Second, 'collective intelligence' applies equally to both. Tim O'Reilly's absolutely right that it's been a key differentiator of many Web 2.0 darlings; “By contrast, I've argued that one of the core attributes of 'web 2.0' (another ambiguous and widely misused term) is 'collective intelligence.' That is, the application is able to draw meaning and utility from data provided by the activity of its users, usually large numbers of users performing a very similar activity. So, for example, collaborative filtering applications like Amazon's 'people who bought item this also bought' or last.fm's music recommendations, use specialized algorithms to match users with each other on the basis of their purchases or listening habits. There are many other examples: digg users voting up stories, or wikipedia's crowdsourced encyclopedia and news stories.”It's also front and centre in Semantic Web work, though. For example that from ourselves, Radar Networks and others. See this white paper [PDF] for one, and watch here and here for public sight of internal developments... soon. The connections that RDF makes so manifest are a perfect way to express, traverse, and mine the habits, behaviours and desires of the collective.Third, 'a formal ontology' is not a requirement, and nor is pushing structure in the face of the user.Tim makes a good point here; “The Semantic Web is a bit of a slog, with a lot of work required to build enough data for the applications to become useful. Web 2.0 applications often do a half-assed job of tackling the same problem, but because they harness self-interest, they typically gather much more data. And then solve for their deficiencies with statistics or other advantages of scale.”I'm not sure, though, that SemWeb/ Web 2.0 is the dichotomy here? Rather, it's a split between purist, all-encompassing, and hugely flexible on the one hand and pragmatic and 'good enough' on the other. I would agree that stereotype would often place Semantic Web developers on one side of that divide and Web 2.0 startups on the other. The technology is not the point there, though, so much as the mindset. Believe me, we can do some great stuff to harness self-interest, gather much more data, and solve the deficiencies with statistics and other advantages of scale in a Semantic Web-ey Platform... :-) “But I predict that we'll soon see a second wave of social networking sites, or upgrades to existing ones, that provide for the encoding of additional nuance. In addition, there will be specialized sites -- take Geni, for example, which encodes geneaology -- that will provide additional information about the relationships between people. Rather than there being a single specification capturing all the information about relationships between people, there will be many overlapping (and gapping) applications, and an opportunity for someone to aggregate the available information into something more meaningful.”Too right, Tim. But I'd definitely suggest that those building the second wave should be talking to Talis, to Radar Networks, to Metaweb and to some of the other proponents of a new and far more Web 2.0-inspired Semantic Web paradigm. There are way too many synergies there to ignore...Dan Brickley's comments in response to one aspect of Danny's argument are also interesting; “Let me clear something up. Danny mentions a discussion with Tim O’Reilly about SemWeb themes. Much as I generally agree with Danny, I’m reaching for a ten-foot bargepole on this one point: 'While Facebook may have achieved pretty major adoption for their approach, it’s only very marginally useful because of their overly simplistic treatment of relationships.' Facebook, despite the trivia, the endless wars between the ninja zombies and the pirate vampires; despite being centralised, despite [insert grumble] is massively useful. Proof of that pudding: it is massively used. 'Marginal' doesn’t come into it.”Too true. I've complained about Facebook, too [for example here and here]. But I use it, and millions of others use it. And it serves a purpose. That doesn't mean it can't be better.Turning, finally, to Alex' post; “The first problem is that RDF and OWL are complicated. Even for scientists and mathematicians these graph-based languages take time to learn and for less-technical people they are nearly impossible to understand. Because the designers were shooting for flexibility and completeness, the end result are documents that are confusing, verbose and difficult to analyze.”Well, yes and no. That's what tools are for. And in a large number of cases the RDF may actually be auto-generated as part of some process of aggregation or value addition of which the data creator or manager need have no explicit awareness. The RDF may very well be generating an aggregation of tiny snippets of data from large numbers of transactions; the interaction of a single user with a single resource doesn't have to result in a whole RDF document of its own. More on that later.And, also from Alex; “Going back to John Markoff's example of a computer booking a perfect vacation, one can't help but think of a travel agency. In the good old days, you would go to the same agent over and over again. Why? Because just like your friends, your doctor, your teacher, the travel agent needs to know you personally to be able to serve you better. The travel agent remembers that you've been to Prague and Paris, which is why he offers you a trip to Rome. The travel agent remembers that you're a vegetarian and orders the pasta meal for you on your flight. Over time people learn and memorize facts about life and each other. Until machines can do the same, knowledge of semantics, limited or full is not going to be enough to replace humans.”Exactly. And that's where network effects, collective intelligence, behavioural observation and all the rest kick in. The knowledge comes from observation of an awful lot of behaviour; not from having the traveller fill in some long-winded and tedious form detailing an RDF graph representation of their travel preferences for all situations. Context matters. I, for example, want a window seat on short-haul flights, and an aisle seat on long-haul flights. It's not a simple preference one way or the other. I don't have a preferred airport to depart from, as so many other factors come into play. I'll go to a more distant departure airport for a better departure or travel time, for example. I won't always travel with the airlines I've got frequent flier cards for... but they don't have to be cheapest before I can or will. It's more complex than that. Current systems don't understand. “Perhaps the worst challenge facing the semantic web is the business challenge. What is the consumer value? How is it to be marketed? What business can be built on top of the semantic web that can not exist today? Clearly the example of instant travel match is not a 'wow.' It's primitive and, in a way, uninteresting because many of us are already quite adept at being our own travel agent using existing tools. But assuming that there are problems that can be solved faster, there is still a question of specific end user utility.”Talis. Radar Networks. Joost. Metaweb. Garlik. Need I go on? (I can... :-) ) “The way the semantic web is presented today makes it very difficult to market. The 'we are a semantic web company' slogan is likely to raise eyebrows and questions. RDF and OWL clearly need to be kept under the hood. So the challenge is to formulate the end user value in ways that will resonate with people.”Absolutely right! SWEO is part of the answer. Companies like ours getting out and showing what can be done, and why it's valuable is crucial too... and we're getting there.And to answer my initial question; No, I don't think everyone is confused by or about the Semantic Web. We do, though, have a lot of different niche views of value (or lack thereof), clamouring for attention. These overlapping - and not necessarily incorrect - perspectives certainly could appear to be a result of confusion, if viewed from the outside. Language is a complicated thing, and these are complex ideas. Describing one with the other requires a number of iterations to arrive at clarity, but we're getting there.There's a lot more to say, but this post has now gone on long enough (especially as I initially meant to simply point you at some interesting blog posts...).
What their report (PDF) finds, basically, is that routine patches often aren't made to hospital programs, that standard security monitors often aren't used, and that no one group has yet established best practices, especially in the area of securing the data.
This information is also available as a TechRepublic PDF download. The modern PC has become the storage and entertainment hub of the home for many consumers and some people are gobbling up terabytes of data per year storing their DVD library, downloads, TV episodes, and other "stuff" that Seagate's CEO so candidly admits he's helping you I mean someone you know store.
A Democratic congresswoman is "horrified" that ISPs aren't backing her proposal (PDF) to require routine data retention. Law enforcement says deletion has "hampered" investigations.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 31 ways to improve your iPhone's battery life
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 Hands-on with Windows 10: Installing the latest Technical Preview
- 5 Best 10 smartphones at the close of 2014