A Semantic Approach for Web Widget Mashup

Total Page:16

File Type:pdf, Size:1020Kb

A Semantic Approach for Web Widget Mashup A SEMANTIC APPROACH FOR WEB WIDGET MASHUP Jinan Fiaidhi, Adam McLellan and Sabah Mohammed Department of Computer Science, Lakehead University 955 Oliver Road, Thunder Bay, Ontario P7B 5E1, Canada Keywords: Gadgets, Mashup, Semantic web, Widgets. Abstract: The current status of the most popular web widget formats was examined with regard to composition of existing widgets into more complex mashups. A prototype was created demonstrating the creation of a mashup in web widget format using other web widgets as components. A search tool was developed which crawls and indexes in semantic format the metadata of web widgets found in a public repository. This tool provides a web widget interface to find other web widgets, and serves as the first pre-requisite tool for further work in this area. A likely path towards further results in this area is discussed. 1 INTRODUCTION and developers, the development methodology has had little time to mature as yet. Web Widgets/gadgets are serving an important role There remains a great deal of duplicated effort in in the modern web. For example, content producers web widget development, with tens of thousands of seek to syndicate their content in order to reach a widgets available which independently implement broader audience, as well as attracting visitors to common functionality. New tools which could their main sites. Portal providers seek to provide a provide a more modular approach to web widget variety of interesting content to make their website a development would be invaluable, both in reducing valuable destination for their visitors. These goals costs of new development, and in speeding new can be achieved through the use of web widgets. ideas’ transition to implementation and widespread A web widget is a portable, self-contained use. program module which can be inserted into and used This paper reviews currently popular web widget on any standard webpage, without special standards, tests the applicability of the proposed installation requirements. It is essentially a small development advances, and provides the first tools program designed for syndication on the web. Web needed on the path to simpler, modular development widgets are most commonly found on the websites of web widget mashups. of portal providers and other content aggregators, including popular social networking sites, since they provide a modular way to provide a wide variety of 2 WEB WIDGET STANDARDS user-customizable content. Mashups are composite applications that 2.1 Criteria of Comparison combine elements of existing applications to produce a result which is more than the sum of its In order to develop advancements in web widget parts (Hoyer et al., 2008). Mashups typically provide creation and mashup techniques, it is first necessary increased usability and/or functionality compared to to examine and compare the various available using the components separately (Yu et al., 2008). standards for web widgets. Several key criteria were Although mashups are not always formed from web considered in this comparison. widgets as components, it is those mashups which Capability for mashup is the foremost shall be a focus in this paper. consideration, since a standard unable to support Although the popularity of web widgets and web even rudimentary re-use of its widgets would be mashups has been growing rapidly, both with users unsuitable for the purposes of this paper. A standard 178 Fiaidhi J., McLellan A. and Mohammed S.. A SEMANTIC APPROACH FOR WEB WIDGET MASHUP. DOI: 10.5220/0003646301780184 In Proceedings of the 6th International Conference on Software and Database Technologies (ICSOFT-2011), pages 178-184 ISBN: 978-989-8425-76-8 Copyright c 2011 SCITEPRESS (Science and Technology Publications, Lda.) A SEMANTIC APPROACH FOR WEB WIDGET MASHUP may provide varying levels of support for this Table 1: Summary of Popular Web Widget Standards. possibility depending upon its API and security Standard Cross-Widget Licensing model. Since the goal is a modular standard of Communicatio development, ideally the standard should provide the n Support capability for multiple widgets to be instantiated and Widgetbox No Commercial to communicate with each other. SpringWidge No Free1 Finally, the level of openness of the standard and Yahoo Yes Open its associated development tools must be considered. Konfabulator Creation of mashups using web widgets as Widgets components is most useful with a large body of fresh Microsoft Unknown2 Unknown2 and innovative component widgets to build upon. Windows Live Thus the possibilities for mashup are best served Web Gadgets Google Yes, Multiple Open when the standard is easily accessible to the widest Gadgets Types possible range of developers who can provide these (OpenSocial) components. 2.3.2 SpringWidgets™ 2.2 Rich Internet Application Frameworks SpringWidgets provides a large repository of approximately 50,000 widgets. Some metadata is Rich internet application frameworks are widely available for each widget. Internally, the widget known on the web and are certainly put to many engine provides a number of Flash methods; widgets uses, including web widgets. The most popular rich using this standard must be implemented using internet application (RIA) frameworks are Adobe® Adobe Flash. Flash®, Microsoft® Silverlight™, and Oracle® JavaFX™. Each of these is well capable of 2.3.3 Yahoo!® Widgets producing a wide variety of powerful internet applications, including web widgets. Widgets are defined using an XML-based format However, none are intended specifically as a web and can provide various items of metadata. The widget standard; these frameworks are designed as widget engine provides an extensive API exposing general-purpose programming environments. Cross- numerous features to widget developers, including widget communication could be implemented via some items with potential to be used for cross- some form of shared client-server networking, but it widget communication. Approximately 6,000 is not provided out of the box. There is no widgets are listed in the Yahoo! Widgets repository. centralized repository of widget-like applications with detailed and standardized metadata. 2.3.4 Microsoft® Windows Live™ Web Although any of these frameworks could be used Gadgets as a basis for further work, they would require re- Currently, it is difficult to find developer implementation of features already provided by documentation on Microsoft’s Web Gadgets. existing widget standards intended for that purpose. However, like Yahoo! Widgets, this standard 2.3 Web Widget Standards appears to lack popular support, with approximately 5,000 gadgets listed in the Live Web Gadgets repository. There are many web widget standards; only those considered the most widely used are examined. 2.3.5 Google™ Gadgets (OpenSocial) 2.3.1 Widgetbox™ Google Gadgets were originally developed as a standard for Google’s portal site, iGoogle. However, Widgetbox provides a very large repository of web the standard has since been opened and used as the widgets, well over 200,000. Most widgets provide a basis for the OpenSocial gadget standard. visually-attractive array of user customization OpenSocial is now a widely-accepted format options. Also provides tools to allow end-users to accepted on other well-known sites including easily create certain types of widgets from templates Yahoo!, MySpace, orkut, hi5, and LinkedIn. The with no programming knowledge. repository of Google Gadgets available for syndication lists over 200,000 gadgets. 179 ICSOFT 2011 - 6th International Conference on Software and Data Technologies 3 SELECTION OF A STANDARD 4.2 Implementation Options After considering the criteria of comparison, the There are many options including Google Gadget standard was selected as the most 1- Adobe Flash which is the most widely installed appropriate for continuing this research. The Google RIA framework on the web. It is available for a wide Gadget standard is an open standard, widely- variety of browsers and operating systems. Notably accepted across popular websites, and able to be unable to view Flash content are Apple’s popular embedded in those without native support. It is iOS devices: the iPhone, iPad, and iPod Touch. easily accessible to developers at no cost, and is well-supported with a base body of over 200,000 2- Microsoft® Silverlight ™ that has the lowest gadgets to work from as potential components. install base of the major three RIA frameworks Perhaps most critically, the standard provides (Flash, Java, and Silverlight). Additionally, multiple methods of cross-gadget communication. Silverlight is not supported under Linux or iOS These communication channels can be utilized to based platforms. make possible the use of Google Gadgets as 3- Google® Web Toolkit (GWT) is yet again components in a mashup gadget. different from all other options. This free, open- The Google Gadget standard requires use of a source project by Google consists of a compiler and gadget server which can render the XML-based supporting libraries which transform developer- gadget specification into the appropriate HTML and written Java code into JavaScript. As developers JavaScript content for a web browser’s use. write code in Java, the software is strongly-typed, Google’s iGoogle portal site provides one publicly permits use of most Java as well as JavaScript available option. The Apache Shindig project also libraries, and can be seamlessly integrated with provides a free, open-source implementation of a server-side code using the same shared object gadget server according to the OpenSocial definitions. When the client-side code is compiled, specification. For the purposes of this research, most multiple permutations are generated for different development and testing was done using WSO2 browser and platform combinations, and a small Gadget Server, a much expanded open-source section of bootstrap JavaScript selects and launches project which builds upon Apache Shindig as a base, the most compatible version at runtime according to but also provides a portal interface much like the the user’s environment. iGoogle site. This will be addressed further when discussing the gadget search tool.
Recommended publications
  • Opensocial: from Social Networks to Social Ecosystem
    2007 Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2007) OpenSocial: From Social Networks to Social Ecosystem Juliana Mitchell-WongI, Ryszard Kowalczyk', Albena Rosheloval, Bruce Joy2 and Henry Tsai2 'Centre for Information Technology Research, Swinburne University, Hawthorn, VIC, Australia e-mail: (jmitchellwong, rkowalczyk, aroshelova)@ict.swin.edu.au 2Everyday Interactive Networks, Hawthorn, VIC, Australia, e-mail: (brucejoy, henrytsai)@ein.com.au ties to be managed using the one application. GAIM' and Abstract-Unlike the physical world where social ecosys- Trillian2 are two example applications for instant messaging tems are formed from the integrated and managed relation- communities. These applications however do not address ships between individuals and organisations, the online digital any of the fundamental issues: the independent and isolated world consists of many independent, isolated and incompatible nature of communities, the ignorance to overlapping rela- social networks established by organisations that have over- lapping and manually managed relationships. To bring the tionships in different communities, or the manual manage- online digital world in-line with the physical world, integration ment of relationships. of social networks, identification of overlapping relationships Communities on the other hand have moved towards in social networks, and automation of relationship manage- forming alliances with other communities to enable content ment in social networks are required. OpenSocial is a frame- search and retrieval between them by using common ontol- work that enables social networks to interlink and self- use common organise into a social ecosystem guided by the policies of indi- ogy [1]. The of ontology enables communities viduals and organisations. to interlink, but each of these communities assumes that their policies are agreeable by every community in the alli- Index Terms-social framework, self-organised, self- ance.
    [Show full text]
  • What Is Dart?
    1 Dart in Action By Chris Buckett As a language on its own, Dart might be just another language, but when you take into account the whole Dart ecosystem, Dart represents an exciting prospect in the world of web development. In this green paper based on Dart in Action, author Chris Buckett explains how Dart, with its ability to either run natively or be converted to JavaScript and coupled with HTML5 is an ideal solution for building web applications that do not need external plugins to provide all the features. You may also be interested in… What is Dart? The quick answer to the question of what Dart is that it is an open-source structured programming language for creating complex browser based web applications. You can run applications created in Dart by either using a browser that directly supports Dart code, or by converting your Dart code to JavaScript (which happens seamlessly). It is class based, optionally typed, and single threaded (but supports multiple threads through a mechanism called isolates) and has a familiar syntax. In addition to running in browsers, you can also run Dart code on the server, hosted in the Dart virtual machine. The language itself is very similar to Java, C#, and JavaScript. One of the primary goals of the Dart developers is that the language seems familiar. This is a tiny dart script: main() { #A var d = “Dart”; #B String w = “World”; #C print(“Hello ${d} ${w}”); #D } #A Single entry point function main() executes when the script is fully loaded #B Optional typing (no type specified) #C Static typing (String type specified) #D Outputs “Hello Dart World” to the browser console or stdout This script can be embedded within <script type=“application/dart”> tags and run in the Dartium experimental browser, converted to JavaScript using the Frog tool and run in all modern browsers, or saved to a .dart file and run directly on the server using the dart virtual machine executable.
    [Show full text]
  • TIBCO Activematrix® BPM Web Client Developer's Guide Software Release 4.3 April 2019 2
    TIBCO ActiveMatrix® BPM Web Client Developer's Guide Software Release 4.3 April 2019 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF A LICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. ANY SOFTWARE ITEM IDENTIFIED AS THIRD PARTY LIBRARY IS AVAILABLE UNDER SEPARATE SOFTWARE LICENSE TERMS AND IS NOT PART OF A TIBCO PRODUCT. AS SUCH, THESE SOFTWARE ITEMS ARE NOT COVERED BY THE TERMS OF YOUR AGREEMENT WITH TIBCO, INCLUDING ANY TERMS CONCERNING SUPPORT, MAINTENANCE, WARRANTIES, AND INDEMNITIES. DOWNLOAD AND USE OF THESE ITEMS IS SOLELY AT YOUR OWN DISCRETION AND SUBJECT TO THE LICENSE TERMS APPLICABLE TO THEM. BY PROCEEDING TO DOWNLOAD, INSTALL OR USE ANY OF THESE ITEMS, YOU ACKNOWLEDGE THE FOREGOING DISTINCTIONS BETWEEN THESE ITEMS AND TIBCO PRODUCTS.
    [Show full text]
  • Attacking AJAX Web Applications Vulns 2.0 for Web 2.0
    Attacking AJAX Web Applications Vulns 2.0 for Web 2.0 Alex Stamos Zane Lackey [email protected] [email protected] Blackhat Japan October 5, 2006 Information Security Partners, LLC iSECPartners.com Information Security Partners, LLC www.isecpartners.com Agenda • Introduction – Who are we? – Why care about AJAX? • How does AJAX change Web Attacks? • AJAX Background and Technologies • Attacks Against AJAX – Discovery and Method Manipulation – XSS – Cross-Site Request Forgery • Security of Popular Frameworks – Microsoft ATLAS – Google GWT –Java DWR • Q&A 2 Information Security Partners, LLC www.isecpartners.com Introduction • Who are we? – Consultants for iSEC Partners – Application security consultants and researchers – Based in San Francisco • Why listen to this talk? – New technologies are making web app security much more complicated • This is obvious to anybody who reads the paper – MySpace – Yahoo – Worming of XSS – Our Goals for what you should walk away with: • Basic understanding of AJAX and different AJAX technologies • Knowledge of how AJAX changes web attacks • In-depth knowledge on XSS and XSRF in AJAX • An opinion on whether you can trust your AJAX framework to “take care of security” 3 Information Security Partners, LLC www.isecpartners.com Shameless Plug Slide • Special Thanks to: – Scott Stender, Jesse Burns, and Brad Hill of iSEC Partners – Amit Klein and Jeremiah Grossman for doing great work in this area – Rich Cannings at Google • Books by iSECer Himanshu Dwivedi – Securing Storage – Hackers’ Challenge 3 • We are
    [Show full text]
  • Xbook: Redesigning Privacy Control in Social Networking Platforms
    xBook: Redesigning Privacy Control in Social Networking Platforms Kapil Singh∗ Sumeer Bhola∗ Wenke Lee SchoolofComputerScience Google SchoolofComputerScience Georgia Institute of Technology [email protected] Georgia Institute of Technology [email protected] [email protected] Abstract in social networks. Social networking websites have recently evolved from With the advent of Web 2.0 technologies, web appli- being service providers to platforms for running third cation development has become much more distributed party applications. Users have typically trusted the so- with a growing number of users acting as developers and cial networking sites with personal data, and assume that source of online content. This trend has also influenced their privacy preferences are correctly enforced. However, social networks that now act as platforms allowing de- they are now being asked to trust each third-party applica- velopers to run third-party content on top of their frame- tion they use in a similar manner. This has left the users’ work. Facebook opened up for third-party application private information vulnerable to accidental or malicious development by releasing its development APIs in May leaks by these applications. 2007 [22]. Since the release of the Facebook platform, In this work, we present a novel framework for build- several other sites have joined the trend by supporting ing privacy-preservingsocial networking applications that Google’s OpenSocial [10], a cross-site social network de- retains the functionality offered by the current social net- velopment platform. works. We use information flow models to control what These third-party applications further escalate the pri- untrusted applications can do with the information they vacy concerns as user data is shared with these applica- receive.
    [Show full text]
  • Apachecon US 2008 with Apache Shindig
    ApacheCon US 2008 Empowering the social web with Apache Shindig Henning Schmiedehausen Sr. Software Engineer – Ning, Inc. November 3 - 7 • New Orleans Leading the Wave of Open Source The Official User Conference of The Apache Software Foundation Freitag, 7. November 2008 1 • How the web became social • Get out of the Silo – Google Gadgets • OpenSocial – A social API • Apache Shindig • Customizing Shindig • Summary November 3 - 7 • New Orleans ApacheCon US 2008 Leading the Wave of Open Source The Official User Conference of The Apache Software Foundation Freitag, 7. November 2008 2 ApacheCon US 2008 In the beginning... Freitag, 7. November 2008 3 ApacheCon US 2008 ...let there be web 2.0 Freitag, 7. November 2008 4 • Web x.0 is about participation • Users have personalized logins Relations between users are graphs • "small world phenomenon", "six degrees of separation", Erdös number, Bacon number November 3 - 7 • New Orleans ApacheCon US 2008 Leading the Wave of Open Source The Official User Conference of The Apache Software Foundation Freitag, 7. November 2008 5 ApacheCon US 2008 The Silo problem Freitag, 7. November 2008 6 • How the web became social • Get out of the Silo – Google Gadgets • OpenSocial – A social API • Apache Shindig • Customizing Shindig • Summary November 3 - 7 • New Orleans ApacheCon US 2008 Leading the Wave of Open Source The Official User Conference of The Apache Software Foundation Freitag, 7. November 2008 7 ApacheCon US 2008 iGoogle Freitag, 7. November 2008 8 • Users adds Gadgets to their homepages Gadgets share screen space • Google experiments with Canvas view Javascript, HTML, CSS • A gadget runs on the Browser! Predefined Gadgets API • Core APIs for IO, JSON, Prefs; optional APIs (e.g.
    [Show full text]
  • Tracking Known Security Vulnerabilities in Third-Party Components
    Tracking known security vulnerabilities in third-party components Master’s Thesis Mircea Cadariu Tracking known security vulnerabilities in third-party components THESIS submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE in COMPUTER SCIENCE by Mircea Cadariu born in Brasov, Romania Software Engineering Research Group Software Improvement Group Department of Software Technology Rembrandt Tower, 15th floor Faculty EEMCS, Delft University of Technology Amstelplein 1 - 1096HA Delft, the Netherlands Amsterdam, the Netherlands www.ewi.tudelft.nl www.sig.eu c 2014 Mircea Cadariu. All rights reserved. Tracking known security vulnerabilities in third-party components Author: Mircea Cadariu Student id: 4252373 Email: [email protected] Abstract Known security vulnerabilities are introduced in software systems as a result of de- pending on third-party components. These documented software weaknesses are hiding in plain sight and represent the lowest hanging fruit for attackers. Despite the risk they introduce for software systems, it has been shown that developers consistently download vulnerable components from public repositories. We show that these downloads indeed find their way in many industrial and open-source software systems. In order to improve the status quo, we introduce the Vulnerability Alert Service, a tool-based process to track known vulnerabilities in software projects throughout the development process. Its usefulness has been empirically validated in the context of the external software product quality monitoring service offered by the Software Improvement Group, a software consultancy company based in Amsterdam, the Netherlands. Thesis Committee: Chair: Prof. Dr. A. van Deursen, Faculty EEMCS, TU Delft University supervisor: Prof. Dr. A.
    [Show full text]
  • How to Generate P12 Key
    Lepide Active Directory Self Service Generate P12 Key This document explains the steps to successfully install SSL security. Lepide Active Directory Self Service Generate P12 Key How to generate P12 key Lepide Active Directory Self Service allows Password Synchronization of Google Apps and IBM accounts. In order to enable Google Apps Password synchronization, you need to generate a P12 key by making certain settings in your Google service account. Follow the below mentioned steps to generate the P12 key for Google App Service Account. 1. Open Google Developer Console Project for Google Cloud Platform - https://console.developers.google.com/project in Web browser, preferably Google Chrome. 2. Enter the email address of your Google Service Account and click "Next". © Lepide Software Pvt. Ltd. Page 2 Lepide Active Directory Self Service Generate P12 Key 3. Enter the password of your Google Service Account and click "Sign In". It takes you to the Google Service Projects page. 4. Click "Create Project" to access "New Project" pop-up. © Lepide Software Pvt. Ltd. Page 3 Lepide Active Directory Self Service Generate P12 Key 5. The Project ID is assigned as per the project name. If you want to provide a manual project ID, click "Edit" link. You can also click "Show advanced options..." to access the advanced options. 6. Enter the Project Name, Project ID, and select the advanced option. Click "Create" to create the project. © Lepide Software Pvt. Ltd. Page 4 Lepide Active Directory Self Service Generate P12 Key 7. Once created, the dashboard comes up. Click "Enable and Manage APIs" in "Use Google APIs" section.
    [Show full text]
  • Monitoring Google Cloud Platform
    Monitoring Google Cloud Platform Google Cloud Platform *BETA* PowerPack version 100 Table of Contents Introduction 3 What is Google Cloud Platform? 3 What Does the Google Cloud Platform *BETA* PowerPack Monitor? 4 What are GCP Regions and Zones? 4 Installing the Google Cloud Platform *BETA* PowerPack 5 Configuring Google Cloud Platform for Monitoring 7 Creating a Google Cloud Platform Service Account 7 Enabling Google Cloud Platform APIs 9 Creating an SSH/Key Credential for Google Cloud Platform 10 Creating a Google Cloud Platform Virtual Device 12 Aligning the Google Cloud Platform Dynamic Applications 13 Discovering Google Cloud Platform Component Devices 13 Viewing Google Cloud Platform Component Devices 15 Relationships Between Component Devices 17 Chapter 1 1 Introduction Overview This manual describes how to monitor Google Cloud Platform (GCP) resources in the ScienceLogic platform using the Google Cloud Platform *BETA* PowerPack. The following sections provide an overview of GCP and the Google Cloud Platform *BETA* PowerPack: What is Google Cloud Platform? 3 What Does the Google Cloud Platform *BETA* PowerPack Monitor? 4 What are GCP Regions and Zones? 4 Installing the Google Cloud Platform *BETA* PowerPack 5 NOTE: ScienceLogic provides this documentation for the convenience of ScienceLogic customers. Some of the configuration information contained herein pertains to third-party vendor software that is subject to change without notice to ScienceLogic. ScienceLogic makes every attempt to maintain accurate technical information and cannot be held responsible for defects or changes in third-party vendor software. There is no written or implied guarantee that information contained herein will work for all third-party variants.
    [Show full text]
  • Creating a Simple Website
    TUTORIAL Creating a Simple Website Why having a website? Table of Contents Table of Contents .................................................................................................................................... 2 Step 1: create a Google account (Gmail) ................................................................................................. 3 Step 2: create a Google website .............................................................................................................. 4 Step 3: edit a page ................................................................................................................................... 6 Add an hyperlink ................................................................................................................................. 7 Create a new page: .............................................................................................................................. 8 Add an image....................................................................................................................................... 9 Step 4: website page setting .................................................................................................................. 10 The header ......................................................................................................................................... 10 The side bar ......................................................................................................................................
    [Show full text]
  • Cliente Twitter Con Compresión De Datos
    PROYECTO FIN DE GRADO GRADO EN INGENIERÍA INFROMÁTICA CLIENTE TWITTER CON COMPRESIÓN DE DATOS Autor: Plácido Fernández Declara Tutores: Luis Miguel Sánchez García Rafael Sotomayor Fernández Colmenarejo, Febrero de 2013 RESUMEN La popular red social Twitter es usada hoy en día en diversos lugares y momentos, gracias también a las redes móviles que nos proporcionan conexión a internet en casi cualquier lugar. Twitter permite publicar y mandar mensajes cortos de texto plano con un máximo de 140 caracteres, así como la lectura de estos mensajes cortos de otros usuarios a los que podemos seguir para tal propósito. Hacer uso de este servicio en zonas con buena cobertura, o cuando usamos Wi-fi no supone generalmente ningún problema. Es cuando nos encontramos en zonas de poca cobertura cuando vemos problemas para hacer uso de este servicio, ya que las velocidades de descarga pueden disminuir hasta el punto de necesitar decenas de segundos para disponer de los mensajes cortos, los “Tweets”. A esto hay que añadir que los planes de datos actuales están limitados de alguna forma (al alcanzar un número de Mb), por lo que la cantidad de Mb usada es hoy también un factor importante. Para ello esta aplicación ofrece la experiencia de un cliente Twitter sencillo en el que consultar los “Tweets” de a quien seguimos, así como publicar “Tweets”, haciendo uso de un Proxy que comprime estos datos considerablemente de forma que se reducen los tiempos de descarga para las zonas de poca cobertura y además se reduce el número de Mb consumidos por el dispositivo móvil. Índice de contenido RESUMEN .................................................................................................................................
    [Show full text]
  • Juror Misconduct in the Digital Age
    GOOGLE, GADGETS, AND GUILT: JUROR MISCONDUCT IN THE DIGITAL AGE THADDEUS HOFFMEISTER* This Article begins by examining the traditional reasons for juror research. The Article then discusses how the Digital Age has created new rationales for juror research while simultaneously affording jurors greater opportunities to conduct such research. Next, the Article examines how technology has also altered juror-to-juror communications and juror-to-non-juror communications. Part I concludes by analyzing the reasons jurors violate court rules about discussing the case. In Part II, the Article explores possible steps to limit the negative impact of the Digital Age on juror research and communications. While no single solution or panacea exists for these problems, this Article focuses on several reform measures that could address and possibly reduce the detrimental effects of the Digital Age on jurors. The four remedies discussed in this Article are (1) penalizing jurors, (2) investigating jurors, (3) allowing jurors to ask questions, and (4) improving juror instructions. During the discussion on jury instructions, this Article analyzes two sets of jury instructions to see how well they adhere to the suggested changes proposed by this Article. This is followed by a draft model jury instruction. * Associate Professor of Law, University of Dayton School of Law. In addition to researching and writing on issues impacting jurors, the author edits a blog titled Juries. Prior to teaching, he served in the military, clerked for a federal judge, and worked on Capitol Hill. He earned his BA (French) from Morgan State University, JD from Northeastern University School of Law, and LLM from Georgetown University Law Center.
    [Show full text]