Why don’t browsers have up and down buttons?

February 27, 2012

Browsers have a forward and back button. These help you navigate within your recent browser history. But, when you land on a site from an external link you sometimes want to, for example, go up the URL path to higher ‘folders’ within the site.

Example, your at http://somewhere.com/land/animals/waterbuffalo.html. How do you get to the land folder? Maybe there is something there, or how do I get to somewhere.com itself. The answer is you click on the address bar and edit the URL. Yuck! What is this, the 1800’s? Plus on any kind of smartphone this is pain to do. Plus, did you ever try to guide over the phone a non-compute savvy person to navigate on a site by editing a URL? Even more painful.

The old Google add-ons for various browsers used to have a page up widget. On FireFox I now use “Dir Up”.

Links
Dir Up


Project support by micropayment for link use?

February 27, 2012

There are many projects that provide a valuable resource. Funds are required to continue operations, grow, and improve. Perhaps if commercial entities are using these projects they should contribute using a form of micropayment, somewhat in the same manner advertising is supported.

Wikimedia example
Lets use Wikimedia as an example. If a corporate hosted web site refers users to a WikiMedia article, and someone triggers that link, then that would trigger a micropayment to Wikimedia. Wikimedia gains an audience and if it also “advertises” its sponsors, just as public radio and TV does, the micropayment contribution is worth the good word.

Just thinking out loud….

Further reading

Sorry Wikimedia. No micropayment on above link to your article. WordPress doesn’t pay me for drawing clicks to their site.


Terje Rypdal – Avskjed


A Quest For A Personal Dashboard?

February 27, 2012

The author of a post on this subject gives a User Requirements for a type of information aggregation application that results in a Dashboard for personal use.  This is one of the “unfulfilled” needs of the computer age.  Like a usable Decision Making application, the Dashboard is nowhere to be found. Instead we have silos of information predation.

Sure there are applications that provide the raw materials for making one; the Browser is itself a good vehicle for this,   and, there are Suites that do this such as Lotus Notes, MS Office, and in the enterprise sphere there are a plethora of integrated management systems that allow one to drill into information within the systems, from SAP, Anderson, CS, etc.  There are also various Semantic Web research projects that could serve as springboards to a Personal Desktop.

Jon Udel on this post:  “The personal service management console”, also calls for a new type of application that would be required to accompany a Personal Dashboard.  After all, what good is an integrated view if your management of the resources is fragmented?

So why isn’t there one?

A new contender in this field is Mozilla’s Project Raindrop.

What happened to HayStack?  That was supposed to be a big deal as presented in this paper:  “Haystack: A General Purpose Information Management Tool for End Users of Semistructured Data”.

I originally wrote this in 2009. Just noticed it was in my drafts. How time flies!

For anyone who intends creating a dashboard there are many visualization options available. See this chart.

Some links

  1. My Quest For A Personal Dashboard
  2. Productivity Tools: Personal Dashboards
  3. Dashboard (management information systems)
  4. PersonalBrain as Personal Dashboard
  5. Mind Maps as Personal Dashboards
  6. Google releases Dashboard privacy tool
  7. Software Project Dashboards – Episode 1

From Tags To Categories

February 5, 2012

Tags are usually non-hierarchical fine grained descriptors of a resource. They are the opposite of categories which are usually part of a semantic hierarchy. Categories are really old-school, killed by the effectiveness of Search and the expanding mash-up universe.

However, while tags provide rapid access to resources and easier sharing of them, tags do not enrich knowledge. We can see this if we consider knowledge as one of the tiers toward wisdom: data, information, knowledge, wisdom. Tags are data on information, metadata. Categories are information on knowledge.

Since data is used to create information, the data on information, tags, can be harnessed to increase the information on knowledge by the automated creation of categories. We simply create the directed cyclic graphs of tags around resources and detect clusters. The naming of categories come from the resources themselves.

This is how the internet will wake up. It will create an ontology and it will act. Hopefully, humans are part of a necessary category.

Some possible related reading

  1. Ontology on Wikipedia
  2. New Common Tag Format
  3. Semantic Web Use Cases and Case Studies. Case Study: Semantic tags
  4. Ontology is Overrated: Categories, Links, and Tags

Email addresses should be more securely handled

April 4, 2011

Email addresses are entered in the clear, passed around, and even used for identification. Yet, these are not subject to many security concerns that other items such as user name and passwords. Why not?

They should be. Not only are email addresses identifiable pieces of one’s profile on any network, they are also attack vectors for nefarious schemes, smut, spam, and just plain nuisance. Yet, people don’t treat email addresses as that important.

Did you ever get a joke email sent to you about some amusing web page or You Tube video and on the cc address there were hundreds of other people’s email address? What is up with that? If you tell people that this is unwise or to just use bcc addresses, you get a blank stare (from even technical people).

I just got an email from a company telling me that their email provider’s database was compromised. They say that only the email addresses were stolen (yea, I believe that).

Yes, email addresses are valuable and should be treated as such.

Further Reading
Email Privacy Concerns
Users Still Careless With Email


Twixt: Tweet Continuations

January 17, 2011

Just had a thought. Tweets should be extendable.

My approach, what I call Twixt©, consists of two simple methods.

  • Threaded: In this approach, a tweet being created (edited) that goes over the limit is subdivided into multiple tweets, and each resulting tweet links to the next so that a consumer of the tweet (human or process) can recreate the intended content.
  • Linked: In this method, a tweet that overflows, will be subdivided so that the created tweet points to the rest of the content on an external server.
    An advantage with the linked approach is that this same server can create conventional content and then post the linker tweet, like an RSS substitute. That’s tsweet!

Of course, this would require Twitter clients that could support this and the server infrastructure and API for the linking if required (I’m not involved in Twitter minutiae).

Example
I tweeted (s’cuse me), and in the tweet I put a link to a tiddler on a TiddlyWiki page.

Now if I knew how to link to a tweet, I could show you the tweet. Oh well, you get the whole idea.

Editing a TiddlyWiki page gave me this idea. A tiddler is very much a supercharged tweet except it’s locked into a single page, though a highly functional Single-Page Application (SPA) type. “Twixt” was just used in place of betwixt, but I’ll lie and say it stands for “TWeet Interaction eXtension”. :)

I was just informed on the TiddlyWiki forum about an awesome related use of TiddlyWiki see TwitterTabs.

A real implementation of Twixt would best be a server side service or cloud hosted application.

Implications
So what is the big deal? Well, you can still tweet what you had for breakfast, but it should also be easier to topple dictators too.

Further Reading


Setup SSL Issues On Tomcat

September 23, 2010

I was trying to setup an external HTTP server so that I can test SSL connections from my Java app. I’ve done this with Tomcat server before. It was easy, just follow the instructions on Tomcat’s document site. All done.

    Environment

  • Windows XP Professional
  • Tomcat 6.0.29
  • Java 1.6

Not this time. A host of problems:

1.   javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
    at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:150)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1584)

2.  SEVERE: Error initializing endpoint
java.lang.Exception: No Certificate file specified or invalid file format
	at org.apache.tomcat.jni.SSLContext.setCertificate(Native Method)
	at org.apache.tomcat.util.net.AprEndpoint.init(AprEndpoint.java:721)


3.  SEVERE: Error starting endpoint
java.lang.Exception: Socket bind failed: [730048] Only one usage of each socket address (protocol/network address/port) is normally permitted.  
    at org.apache.tomcat.util.net.AprEndpoint.init(AprEndpoint.java:647)
    at org.apache.tomcat.util.net.AprEndpoint.start(AprEndpoint.java:754)
    at org.apache.coyote.http11.Http11AprProtocol.start(Http11AprProtocol.java:137)
    at org.apache.catalina.connector.Connector.start(Connector.java:1087)

The last issue above is very weird. I ran netstat and no other apps are using the ports that Tomcat is trying to use.

I won’t bore you with the details, suffice to say, I just removed the native library, tcnative-1.dll, from the Tomcat folder and everything works.

Well, not everything, I’m still getting,

        javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

But, that is more tractable.

Links
Copy of this post: http://octodecillion.com/blog/setup-ssl-issues-on-tomcat/


Follow

Get every new post delivered to your Inbox.