background preloader

Disco Hyperdata Browser

Disco Hyperdata Browser
The Disco - Hyperdata Browser is a simple browser for navigating the Semantic Web as an unbound set of data sources. The browser renders all information, that it can find on the Semantic Web about a specific resource, as an HTML page. This resource description contains hyperlinks that allow you to navigate between resources. While you move from resource to resource, the browser dynamically retrieves information by dereferencing HTTP URIs and by following rdfs:seeAlso links. News 04.03.2007: SemanticWebCentral provides another Linked Data browser called Objectviewer. 03.10.2007: OpenLink has published a new Data Web Browser which, like Disco, also enables you to browse Linked Data on the Web. 01.16.2007: Ivan Herman has written a Disco Bookmarklet. 1. The browser is a server-side application that can be used without installing anything on your machine. The screenshot below shows the browser user interface: You start browsing the Semantic Web by entering a URI into the navigation box. 2. Related:  okos

VisiNav VisiNav is a system to search and navigate web data, collected from a multitude of sources. In summary, the system demonstrates how to combine data from multiple sources into a single unified view, how to search and navigate the aggregated dataset, and how to re-use query results from web data in external applications. On a conceptual level, VisiNav deals with objects. Some of the funcationality of VisiNav can nowadays be found in Google's KnowledgeGraph and Facebook's Graph Search. The dataset in the online system has been collected from the web (view top 99 sources - requires SVG-capable browser). Now, the system allows for searching objects teleporting between objects faceted browsing to incrementally restrict a result set set-based link navigation to navigate between object sets You can visualise query results in a table, graph, map, or timeline view. The following video demonstrates the capabilities of the system. Andreas Harth. Andreas Harth. Andreas Harth.

About DBpedia is a crowd-sourced community effort to extract structured information from Wikipedia and make this information available on the Web. DBpedia allows you to ask sophisticated queries against Wikipedia, and to link the different data sets on the Web to Wikipedia data. We hope that this work will make it easier for the huge amount of information in Wikipedia to be used in some new interesting ways. Furthermore, it might inspire new mechanisms for navigating, linking, and improving the encyclopedia itself. Upcoming Events News Call for Ideas and Mentors for GSoC 2014 DBpedia + Spotlight joint proposal (please contribute within the next days)We started to draft a document for submission at Google Summer of Code 2014: are still in need of ideas and mentors. The DBpedia Knowledge Base Knowledge bases are playing an increasingly important role in enhancing the intelligence of Web and enterprise search and in supporting information integration. Within the

The Wolfram Education Portal Is Here! January 18, 2012 — Wolfram Blog Team Teachers, are you looking for a new way to integrate technology into your classroom? How about through a dynamic textbook or pre-generated lesson plans? Students, are you looking for some extra help or practice in your classes? We are happy to announce the launch of the free Beta version of the Wolfram Education Portal. We developed the interactive textbook by working with the CK-12 Foundation, a non-profit organization with the mission to produce free and open source K-12 materials aligned to state curriculum standards and customized to meet student and teacher needs. In the future we hope to add many cool and exciting features for teachers and students to explore, including community features, problem generators, web-based course apps, and the ability to create your very own personalized content! The Wolfram Education Portal was built with the technology from Mathematica, and Wolfram|Alpha, and the Computable Document Format (CDF).

Linked Data | Linked Data - Connect Distributed Data across the SamyGO, Samsung Firmware on the GO - Comodo IceDragon Creating, Deploying and Exploiting Linked Data Yes, because it facilitates: Broadening our perspectives (pivoting on data behind documents) Serendipitous Discovery of relevant things via the Web Exploitation of collective intelligence via Discourse, Discovery and Participation

Affordable encrypted VoIP - Comodo IceDragon Product TiviPhone is a market-leading VoIP softphone for various smartphone platforms. It also encrypts voice and video with the scientifically proven, open-source ZRTP. Provider We are Tivi, the developer and marketer of TiviPhone client software. Partner Tivi solves your telecommunications problems in terms of costs, multimedia, platform interoperability, billing and privacy. Is there wiretapping of VoIP calls? Yes, if your voice travels over insecure networks such as the internet. Protection against wiretapping? Install and use our safe and encrypted VoIP software: TiviPhone with ZRTP technology. Easy, affordable, compatible TiviPhone is downloadable instantly. Installing and trying Tivi Phone is easy, and you can purchase the encrypting version at any time via Tivi.com. For the user, safeguarding his or her voice/video call requires just one manual step: the checking of short authentication strings (SAS) on the screen of their mobile phone or computer. Check indicators - it's encrypted!

Linked Data An introductory overview of Linked Open Data in the context of cultural institutions. In computing, linked data (often capitalized as Linked Data) describes a method of publishing structured data so that it can be interlinked and become more useful. It builds upon standard Web technologies such as HTTP, RDF and URIs, but rather than using them to serve web pages for human readers, it extends them to share information in a way that can be read automatically by computers. Tim Berners-Lee, director of the World Wide Web Consortium, coined the term in a design note discussing issues around the Semantic Web project.[2] Principles[edit] Tim Berners-Lee outlined four principles of linked data in his Design Issues: Linked Data note,[2] paraphrased along the following lines: All kinds of conceptual things, they have names now that start with HTTP.I get important information back. Components[edit] Linking open-data community project[edit] Instance linkages within the linking open data datasets

How to recover TrueCrypt encryption password | unprotect.info - Comodo IceDragon Before using the unprotect.info software, first you need to download it to your computer. After downloading the installation file, run it to install the unprotect.info software. After the installation is complete, the software is ready to use. To recover a password to an encrypted volume, run unprotect.info software (by double-clicking on its Desktop icon, or by choosing the unprotect.info command from Windows Start - All Programs menu. You should see the following window open: Press the Begin button and select the file that contains the encrypted volume for which you want to recover the password. You can use this window to select the character sets from which you want to try the passwords. Lowercase characters abcdefghijklmnopqrstuvwxyz Uppercase characters Digits Punctuation characters Other special characters After selecting the character sets, press the Start button to begin the password recovery.

Linked Data - Design Issues Up to Design Issues The Semantic Web isn't just about putting data on the web. It is about making links, so that a person or machine can explore the web of data. With linked data, when you have some of it, you can find other, related, data. Like the web of hypertext, the web of data is constructed with documents on the web. Use URIs as names for things Use HTTP URIs so that people can look up those names. Simple. The four rules I'll refer to the steps above as rules, but they are expectations of behavior. The first rule, to identify things with URIs, is pretty much understood by most people doing semantic web technology. The second rule, to use HTTP URIs, is also widely understood. The third rule, that one should serve information on the web against a URI, is, in 2006, well followed for most ontologies, but, for some reason, not for some major datasets. The basic format here for RDF/XML, with its popular alternative serialization N3 (or Turtle). Basic web look-up or in RDF/XML Followup

Hacker 10 – Security Hacker | Computer security | Page 5 I have been using Countermail for over a year on a weekly basis and this review is based on my experience with them during this time. The service is free to try for a few days, after that you will be asked for payment which can be done with credit card, Paypal, wire transfer or Bitcoin. Credit card corporations force businesses to keep payment details stored for two weeks, Countermail claims to automatically destroy the records after that length of time but the credit card company and Paypal will likely preserve payment details for years although they will not be able to link them to any specific Countermail account or nick. If you pay with Bitcoin you will make tracing payment origin much more difficult but there is a surcharge. Signing up is simple, not requiring any personal information other than choosing a username and password, you only need Java installed in your computer, after account creation you can get rid of Java and use IMAP and SMTP with Thunderbird and Enigmail.

Interview: Sophie Calle | World news Picture this. You're one of France's best-known living conceptual artists. You're 51 and visiting Berlin. Your mobile beeps, it's an email from your boyfriend. In a hideously self-absorbed message about human emotion, he dumps you electronically, saying it hurts him more than you. Sophie Calle has filled the French pavilion of the Venice Biennale with a praised exhibition about her emailed dumping letter. "The idea came to me very quickly, two days after he sent it," she said. At first it was therapy; then art took over. Sitting under a pair of stuffed bull's heads in Calle's warehouse home south of Paris, surveyed by her taxidermy housemates (a bear in a rocking chair, a tiger in a necklace and a zebra), it's hard not to wonder what man would send her a monstrous email like this. He must have known he would be immortalised by French art's game-player in chief, the Marcel Duchamp of emotional dirty laundry. Was she looking for revenge? "It became almost an obsession.

Facebook Privacy Watcher Browser Extension Facebook Privacy Watcher is an addon for Mozilla Firefox and Google Chrome, that has been developed at Center for Advanced Security Research Darmstadt (CASED) in association with TU Darmstadt (Technical University of Darmstadt). It provides a new and very simple interface to manage your privacy settings on Facebook. Know your privacy settings Since the default privacy settings on Facebook are more and more open with each update, it is very important to be able to easily grasp and change the privacy settings, to be protected from unintended oversharing. However, the settings are quite detailed, and thus it's hard to keep track of them. PublicFriendsOnly meCustom Simple and clear The idea of Facebook Privacy Watcher is, to colorize every single item depending on its visibility to your friends and strangers. After the extension is installed, no further steps are necessary. Change settings with just two clicks Changing the settings is just as simple as recognizing them: Adaptable

Related: