Monday, May 30, 2005

Heritrix Web Crawler

Heritrix is the Internet Archive's open-source, extensible, web-scale, archival-quality web crawler project.

It comes in a clean, concise and structured Java package...

Wanna crawl the web today? Now your limitation is the processing power and the disk space. Not the technology.

Tuesday, May 24, 2005

Java HTTPClient

Java built-in HTTP Client is not ready (and not easy) to be use on intensive web tasks.
Handling connection timeout is a pain and opening connection on multiple threads simply kill your program performance and stability.

Instead of using the jdk's "URLConnection", try using this package:

You can handle response codes, cookies, timeouts and many more!

Monday, May 23, 2005

Downloadable Brains and Depressed Computers In the Future

According to a leading British futurologist, death could become a thing of the past by the mid-21st century as computer technology becomes sophisticated enough for the contents of a brain to be "downloaded" on to a supercomputer.

[He] also predicts the prospect of computer systems being able to feel emotions - eventually involving such things as planes being programmed to be even more terrified of crashing than their passengers, causing them to do whatever they can to stay airborne.


Friday, May 20, 2005

Universities to offer degree in game development

Last year, the University of Denver became one of the first four-year universities to open an undergraduate major in game development, by merging elements from the school's computer-science and design programs.

Do Quebec Universities dare to get in the Game? With major players like Ubisoft that is expanding in Montreal and Quebec city, the timing cannot be better...

[full article]

Wednesday, May 18, 2005

Roshambo on the web

Play Rock Paper Scisor againt a computer...
It's easy to tie ... at first.

(see also results of a rock paper scisor programming contest)

"zero-day exploit", the new buzzword in this so-safe Internet world

A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known.

According to the infoAnarchy wiki, "14-day" groups and "7-day" groups carry out an exploit within 14 or 7 days of a product's market release.

Conducting a zero-day exploit establishes crackers as members of the elite...

Tuesday, May 17, 2005

Code Generation for Java

Code Generation could definitively be the next big breakthrough (Gartner).

Here's a ressource page for code gen in Java. Find books, articles, code, IDE plugins, more... A good start toward making your programming life easier.

Monday, May 16, 2005

Copernic Extractor for the Palm Desktop

This guy implemented a Palm Desktop file extractor for Copernic. He plans to release the code on sourceforge.

Tuesday, May 10, 2005

Vlado NLP Research Links

Vlado' list may be the most extensive and varied ressource for NLP tools and corpora. The list is arranged by topic and freshly updated.

Saturday, May 07, 2005

Covering Canadia AI'2005

I'll be covering the Eighteenth Canadian Conference on Artificial Intelligence (AI'2005) using this special edition of Pythonner Zone!

Find comments on the presented papers, interesting new ideas that will be discussed, a special "best paper award" and also photos of Victoria, BC.

Thursday, May 05, 2005

Copernic Ranks #1 Among 12 Leading Desktop Search Tools

Copernic Desktop Search was selected as the best overall desktop search tool this week in a benchmark study conducted by the University of Wisconsin-Madison's E-Business Consortium.


"Copernic is the most well-balanced desktop search tool among those evaluated. The tool is intuitive and easy to use. [...] The application has a small technology footprint and providesdetailed index controls."

Wednesday, May 04, 2005

Bike design works the angles

This design from a team at Purdue University took first place in the 9th International Bicycle Design Competition...

I take the occasion to make my coming out and add "biking" in my list of interests :)

Tuesday, May 03, 2005

The Most Critical New Vulnerabilities

This site contains a list of critical new vulnerabilities (newly discovered... and not always patched), grouped by the vulnerability categories. Each vulnerability is summarized with a brief assessment of the impact of exploiting the vulnerabilities and pointers to more detailed information.

see also the The Twenty Most Critical Internet Security Vulnerabilities page for 2004.

Monday, May 02, 2005

Psst! Want Internet phone service?

The next generation of selling Tupperware and Avon products door to door is here, as people sell Internet-based phone service to their friends and neighbors.

link to an "Easy to start turnkey VOIP business"