Prevayler – wow, why haven’t I seen this before? This is the memory database that Jot uses (via Life with Alacrity).

Note, that while Calcanis thinks this is a commodity business, well, you might not think blogging would be what is has been when you first heard about it… From an enterprise perspective, I can say that this is definitely exciting, and from on the larger-scope (think Memex, Xanadu [or as Jot likes to put it, Excel]), it’s even more promising. Of course, I could be biased.

ahh, that’s better. Oh, by popular request (Mr. Crosby is the legal contact at theplanet):

Ref: R3434
Re:
http://randomfoo.net/junk/200409/U2%20-%202004%20-%20Vertigo%20(Single)/
Dear Lance Crosby,
I am contacting you on behalf of the International Federation of the
Phonographic Industry (IFPI) and its member record companies.  The IFPI is a
trade association whose member companies are some 1,500 major and
independent record companies in the US and internationally who create,
manufacture and distribute sound recordings. Under penalty of perjury, we
submit that the IFPI is authorized to act on behalf of its member companies
in matters involving the infringement of their sound recordings, including
enforcing their copyrights and common law rights on the Internet.
We have learned that your service is hosting infringing files on its network
(see above-referenced directory).  These files contain sound recordings by
the artists known as U2.  These sound recordings are owned by one of our
member companies and have not been authorized for this kind of use.  We have
a good faith belief that the above-described activity is not authorized by
the copyright owner, its agent, or the law.  We assert that the information
in this notification is accurate, based upon the data available to us.
We are asking for your immediate assistance in stopping this unauthorized
activity.  Specifically, we request that you remove the infringing files
from your system or that you disable access to the infringing files.  In
addition, please inform the site operator of the illegality of his or her
conduct.
You should understand that this letter constitutes notice to you that this
site operator may be liable for the infringing activity occurring on your
service. In addition, under the Digital Millennium Copyright Act, if you
ignore this notice, you and/or your company may also be liable for any
resulting infringement. This letter does not constitute a waiver of any
right to recover damages incurred by virtue of any such unauthorized
activities, and such rights as well as claims for other relief are expressly
retained.
You may contact me at IFPI Secretariat, 54 Regent Street, London W1B 5RE,
United Kingdom or email Notices@ifpi.org, to discuss this notice.  We await
your response.
Sincerely,
Mr Paul Mitchell
Internet Anti-Piracy Administrator
IFPI Secretariat
54 Regent Street
London W1B 5RE
United Kingdom
Tel: +44 (0)20 7878 7915
Fax: +44 (0)20 7878 6832
E-mail: Notices@ifpi.org
Website: www.ifpi.org

You Call That a Major Policy Address? – at this point, is anyone surprised? The only policy that the Bush administration has is about keeping power.

Did CNN and MSNBC get hoodwinked this morning? Yesterday, the White House announced that President Bush would be delivering a “major policy address” on terrorism today. The cable news networks broadcast it live and in full. Yet the “address ” turned out to be a standard campaign stump speech before a Pennsylvania crowd that seemed pumped on peyote, cheering, screaming, or whooping at every sentence.

The president announced no new policy, uttered not one new word about terrorism, foreign policy, or anything else. He did all the things he wanted to do in last Thursday’s debate, accuse his opponent of weakness, bad judgment, vacillation, and other forms of flip-floppery, though this time without a moderator to hush the audience, much less an opponent to bite back. And Bush loved it, smiling, smirking, raising his eyebrows, as if to say, “How ’bout that zinger?”

The rest of the column is quite good btw, and does discuss policy.

4 more years of Bush will be a validation both of Rove’s underhanded campaign tactics, and of the idea that the Presidential office is now fair game purely for power grabs and cronyism. That’s not the America I want.

  • Carnegie Foundation: Knowledge Media Laboratory – The Knowledge Media Laboratory (KML) develops tools and resources to exchange information, share knowledge and produce innovations that can transform teaching and learning at many levels.
  • KEEP Toolkit – one of the KML’s projects
  • XWiki – Radeox-based Java Wiki
  • PARC: Sparrow – The current state of the web is strongly biased towards reading previously authored documents. Changes and additions to Web pages are solely the purview of the original author. Sparrow Web promotes a different genre of web page: the community-shared page. Like any web page, a community-shared page is originally crafted by a single author, who defines the initial content and scope of the document. But unlike other web pages, a community-shared page can be modified or added to by any interested contributor, and the barriers for doing so are lessened by allowing changes to be made in a lightweight manner. Community-shared pages increase the collaborative capability of the web — interesting, by Bay-Wei Chang (publications, CiteSeer), whom I met last week
  • Google eyes Sparrow to simplify Web collaboration
  • Metawiki – hmm, this I haven’t seen before. Wish I could read French (yeah, yeah, yeah systrans)

[rdfweb-dev] Plink – plink.org is going down due to the inability for FOAF to be expired. Lack of control of proliferation of personal information is one of the major hurdles (a subset of the larger question of publishing control [see: Towards Semi-Permeable Blogging] and data control/faceting [see: Capabilities Theory]) in moving towards larger (hopefully open) identity management and relationship management systems.

Certainly, one way to do it is along the lines of using PKI and encryption to create classes of data encrypted on per-user, per-group bases. Keys could then be directly managed and revoked to limit continued availability within the system regardless of the distribution of the encrypted data (spread it over Freenet or other P2P for caching!). There are also other ways of expiring data, but those should remain in confidence for now.