In a previous article I describe how, in order to have a true Semantic Web, we would need to have a user action to direct the program. I would like to examine some of the motivations for this point of view.
Online banking continues to be an increasing method of choice for conducting business and paying bills. According to a recent Pew report, fifty-one percent of U.S. adults, or 61% of internet users, bank online. Is online banking safe?
The original concept was for the system to display a number of images on a tabbed-page HTML layout. Each tab/page of images needed to be centered and allow a user to touch a thumbnail to bring up larger rendering of that image.
Most search engines do an adequate job at sorting out some of these FLUFF sites but they still somehow show up in search results. Maybe what we need in the search engine tools arsenal is a FLUFF filter.
Within the next few years, we will see an exponential growth in micro touch screen devices that can be unfolded from 3x6 to 12x6 (and other sizes) to form a touch screen. These devices will have no hard drive, no CD/DVD, no memory other than an ultra-thin EPROM, and no external ports.
When talking about the Semantic Web there are a few premises one must acknowledge. One premise is that any data exchange on the internet is originally initiated by a human. There is no information retrieval without a request for that information and that request can be directly tied to a human request for the information.
Twitter is fighting back against cyber-crime and malicious activity in its recent actions toward Tor users and Isis.
A critical vulnerability in glibc, a core Linux library, can be exploited remotely through PHP applications.
As the Sony hack investigation unfolds, revelations regarding its possible origin, type of hack used, and the damage it is purported to have caused, are starting to be revealed.
Google is pioneering another innovation which may someday replace the need for passwords. The device they are introducing is a pluggable USB device that acts as the authentication mechanism to login. By inserting the device into a USB port and touching it a process is started that authenticates the user through that physical device.