A Framework for Working with Cross-Application Social Tagging Data

Total Page:16

File Type:pdf, Size:1020Kb

A Framework for Working with Cross-Application Social Tagging Data TECHNISCHE UNIVERSITÄT MÜNCHEN FAKULTÜT FÜR INFORMATIK Forschungs- und Lehreinheit XI Angewandte Informatik / Kooperative Systeme A Framework for Working with Cross-Application Social Tagging Data Walter Christian Kammergruber Vollständiger Abdruck der von der Fakultät für Informatik der Technischen Universität München zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften (Dr. rer. nat.) genehmigten Dissertation. Vorsitzender: Univ.-Prof. Dr. Helmut Krcmar Prüfer der Dissertation: 1. Univ.-Prof. Dr. Johann Schlichter 2. Univ.-Prof. Dr. Florian Matthes Die Dissertation wurde am 26.06.2014 bei der Technischen Universität München eingere- icht und durch die Fakultät für Informatik am 26.11.2014 angenommen. Zusammenfassung Mit dem zunehmenden Erfolg des Web 2.0 wurde und wird Social-Tagging immer beliebter, und es wurde zu einem wichtigen Puzzle-Stück dieses Phänomens. Im Unterschied zu ausgefeilteren Methoden um Ressourcen zu organisieren, wie beispielsweise Taxonomien und Ontologien, ist Social-Tagging einfach einzusetzen und zu verstehen. Bedingt durch die Einfachheit finden sich keine expliziten und formalen Strukturen vor. Das Fehlen von Struktur führt zu Problemen beim Wiederaufinden von Informationen, da beispielsweise Mehrdeutigkeiten in Suchanfragen nicht aufgelöst werden können. Zum Beispiel kann ein Tag „dog“ (im Englischen) für des Menschen bester Freund stehen, aber auch für das Lieblingsessen mancher Personen, einem Hot Dog. Ein Bild einer Katze kann mit„angora cat“, „cat“, „mammal“, „animal“oder „creature“getagged sein. Die Art der Tags hängt sehr stark vom individuellen Nutzer ab. Weiterhin sind Social-Tagging-Daten auf verschiedene Applikationen verteilt. Ein gemeinsamer Mediator ist nicht vorhanden. Beispielsweise kann ein Nutzer auf vielen verschiedenen Applikationen Entitäten taggen. Für das Internet kann das Flickr, Delicious, Twitter, Facebook and viele mehr sein. Innerhalb großer Fir- men, wie Siemens, werden viele verschiedene Social-Software-Applikationen verwendet, wobei die meisten eine Form des Tagging verwenden. Ein gemeinsamer Mediator fehlt. Social-Tagging-Daten werden nicht wiederverwendet. In dieser Arbeit wird ein Framework beschrieben, mit dem sich Social-Tagging-Daten von verschiedenen Applikationen aggregieren lassen. Zudem werden die Daten mit Relationen angereichert. Ein einfaches und generisches Datenaustauschformat wurde definiert, ein Aggregationsmechanismus entwickelt. Das Tagging-Framework speichert die Tag-Daten zwischen und stellt den angeschlossenen Applikationen Services zur Verfügung. Das Verwalten der Daten und die Kontrolle verbleibt bei den jeweiligen Applikationen. Drei verschiedene Ansätze, die zu leichtgewichtigen Strukturen führen, wurden gestal- tet: Statistische Analysen von Social-Tagging-Daten, Abbildung von Tags auf vorhandene Ontologien oder anderen strukturierten Quellen und ein kollaborative Thesauruserzeu- gung. Weitere Data-Mining-Anwendungen wurden ausgewählt und angepasst. Dies bein- haltet das Clustern von Nutzern anhand ihrer Social-Tagging-Praxis und die verbesserte Verteilung von Fragen in einer Question-And-Answer-Plattform. Teile der Implementierung des beschriebenen Frameworks befinden sich seit geraumen im Produktiveinsatz im Intranet der Siemens AG. Als ein Ergebnis konnte die Anzahl der internen Email-Notifikationen für ein Siemens Social-Media-Werkzeug um ein Faktor von mehreren Hunderttausend pro Monat reduziert werden. abstract Social tagging has become very popular with the rise of Web 2.0, making it an important piece of the puzzle that forms this phenomenon. In contrast to more elaborate ways of organizing resources, such as taxonomies or ontologies, tagging is very easy to use and un- derstand. Because of its simplicity tagging does not create explicit, formalized structures. The lack of structure leads to problems in information retrieval, since for example ambi- guities in queries cannot be resolved. For example, a tag “dog” can stand for a man’s best friend or for some people’s favorite food, a frankfurter. A picture of an angora cat can be tagged e.g. with “angora cat,” “cat,” “mammal,” “animal,” or “creature”. The choice of tag strongly depends on the individual user. Further, social tagging data is spread across many different applications. For example, a user can tag entities in many different applications. In the case of the Internet this can be Flickr, Delicious, Twitter, Facebook, and many other. Inside a larger corporation, such as Siemens, there are many social software tools in use. Most of them use some kind of tagging mechanism. A common mediator is here missing. Social tagging data is not reused across application boundaries. This thesis describes a framework for aggregating social tagging data from different ap- plications. An approach for enriching its social tagging data with semantic relations has been developed. For fetching social tagging data a simple and generic data exchange for- mat has been created. For retrieving social tagging data from different sources, a mecha- nism has been designed. The tagging framework caches social tagging data and only acts as a service for associated applications. The actual storage and control over the tagging data stays with the individual application. Three different methods that lead to lightweight structures have been developed: statis- tical analysis of social tagging data, mapping tags to existing ontologies or other structured input and collaborative tag thesaurus creation. Further data mining applications have been selected and adopted. This includes clustering of users based on their social tagging prac- tice and improved channeling of requests in a question and answer platform. Parts of the implementation of the described framework are in productive use within the Intranet of Siemens AG. As one result, internal email notifications for a Siemens social media tool could be reduced by the factor of hundreds of thousands emails per month. Acknowledgements Many people have helped make this research possible; adequately acknowledging them has been one of the most challenging writing tasks of this dissertation. Above all, I would like to thank to Prof. Dr. Johann Schlichter, my supervisor at the Technical University of Munich. Prof. Schlichter was a guiding mentor that helped me a lot in leading this work in the right and fruitful direction. Additionally, the fellow PhD students and assistant teachers (Dr. Wolfgang Wörndl and Dr. Georg Groh) at the Technical University of Munich where very helpful with their constructive feedback. Especially, the doctoral seminars were highlights during the time working on this research. This thesis has been done in cooperation with Siemens Corporate Technologies in Mu- nich. I would like to acknowledge the support provided by my colleagues at Siemens Cor- porate Technologies, especially Dr. Manfred Langen and Dr. Karsten Ehms but also Werner Zucker, Dr. Maximilian Viermetz, Bernd Lindner and Dr. Albert Eckert for their support and inspiration. I would like to express my gratitude towards Mike Burgold, who has helped a lot in trans- forming a prototypical implementation of a tagging framework developed within this thesis into a production ready implementation. Furthermore, I wish to thank to thank Prof. Dr. Jiˇrí Panyr, who departed from us too soon, for some interesting discussions and literature recommendations. Feedback given by Dr. Isabella Peters on information science topics has been a great help in refining the corresponding chapter. I would like to express my gratitude to Dr. Axel Rauschmayer for his advice on structural aspects of my dissertation and tips on writing styles. Additionally, I would like to thank the team related to the Siemens TechnoWeb for their agile, friendly, and professional cooperation: Dr. Michael Heiss, Thomas Mayerdorfer, Clemens Wiener, and Dr. Thomas Lackner. This PhD thesis has been created within the framework of the Theseus project, more precisely the Use Case Alexandria. The project was funded by the German Federal Ministry of Economy and Technology under the promotional reference “01MQ07012”. Contents 1 Introduction1 1.1 About Social Tagging..................................1 1.2 Three Major Social Software Applications at Siemens...............3 1.3 Research Issues.....................................7 1.4 Proposed Approach...................................7 1.5 Thesis Outline...................................... 11 2 Meta-data or Indexing Approaches 13 2.1 Introduction....................................... 14 2.2 Natural Language Vocabularies............................ 16 2.2.1 Free Keywords.................................. 16 2.2.2 Social Tagging.................................. 16 2.2.3 Glossary..................................... 26 2.3 Controlled Vocabularies................................ 27 2.3.1 Taxonomy.................................... 27 2.3.2 Thesaurus.................................... 30 2.3.3 Ontology..................................... 31 2.4 Others........................................... 34 3 Related and Existing Work 37 3.1 Data Mining and Statistical Algorithm........................ 37 3.1.1 Co-Occurrence Analysis and Clustering................... 38 3.1.2 Association Rule Mining............................ 39 3.2 Mapping of External Structured Sources...................... 39 3.3 Social Tagging Clustering and Social Network Analysis.............. 40 3.4 Tagging Ontologies................................... 42 3.5 Thesaurus Editor...................................
Recommended publications
  • Source Code Patterns of Cross Site Scripting in PHP Open Source Projects
    Source Code Patterns of Cross Site Scripting in PHP Open Source Projects Felix Schuckert12, Max Hildner1, Basel Katt2 ,∗ and Hanno Langweg12 1 HTWG Konstanz, Department of Computer Science, Konstanz, Baden-W¨urttemberg, Germany [email protected] [email protected] [email protected] 2 Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, NTNU, Norwegian University of Science and Technology, Gjøvik, Norway [email protected] Abstract To get a better understanding of Cross Site Scripting vulnerabilities, we investigated 50 randomly selected CVE reports which are related to open source projects. The vulnerable and patched source code was manually reviewed to find out what kind of source code patterns were used. Source code pattern categories were found for sources, concatenations, sinks, HTML context and fixes. Our resulting categories are compared to categories from CWE. A source code sample which might have led developers to believe that the data was already sanitized is described in detail. For the different HTML context categories, the necessary Cross Site Scripting prevention mechanisms are described. 1 Introduction Cross Site Scripting (XSS) is on the fourth place in Common Weakness Enumeration (CWE) top 25 2011 [3] and on the seventh place in Open Wep Application Security Project (OWASP) top 10 2017 [4]. Accordingly, Cross Site Scripting is still a common issue in web security. To discover the reason why the same vulnerabilities are still occurring, we investigated the vulnerable and patched source code from open source projects. Similar methods, functions and operations are grouped together and are called source code patterns.
    [Show full text]
  • Postgresql Flyer
    PostgreSQL - English Usage Examples Further Information Development system PostgreSQL (2nd Edition), Korry Douglas, Sams Publishing, ISBN: 0672327562 A small system just for developing, running on any supported platform (Unix, Linux, Mac OS, Windows). Beginning Databases with PostgreSQL:From Novice to This system does not need much system resources. Professional, Second Edition, Neil Matthew, Apress, The result can be exported and used in the production ISBN: 1590594789 PostgreSQL system. PostgreSQL Developer's Handbook, Ewald Geschwinde, Sams Publishing, ISBN 0672322609 Beginning PHP and PostgreSQL 8, W. Jason Gilmore, Small to mid-level database server Apress, ISBN 1590595475 A small to mid-level database server has just small PHP and PostgreSQL Advanced Web Programming, hardware requirements. PostgreSQL is not running ex- Ewald Geschwinde and Robert Treat, Sams Publishing, clusive on this system but shares the resources with ISBN 0672323826 other services. A webserver (Blog, CMS) with a data- base backend is a good example. PostgreSQL homepage: www.postgresql.org pgAdmin III: http://www.pgadmin.org Large database server PgFoundry: http://pgfoundry.org phpPgAdmin: http://phppgadmin.sourceforge.net A large database server has extensive hardware re- PostGIS: postgis.refractions.net quirements and is usually dedicated to a single appli- cation or project. PostgreSQL can use the full power Slony: slony.info of the hardware without the need to share resources. PostgreSQL 8.3 What is PostgreSQL? PostgreSQL 8.3, released in early 2008, includes a record PostgreSQL is an object-relational database management number of new and improved features which will greatly system (ORDBMS). It is freely available and usable with- enhance PostgreSQL for application designers, database out licensing fee.
    [Show full text]
  • Folksonomies - Cooperative Classification and Communication Through Shared Metadata
    Folksonomies - Cooperative Classification and Communication Through Shared Metadata Adam Mathes Computer Mediated Communication - LIS590CMC Graduate School of Library and Information Science University of Illinois Urbana-Champaign December 2004 Abstract This paper examines user-generated metadata as implemented and applied in two web services designed to share and organize digital me- dia to better understand grassroots classification. Metadata - data about data - allows systems to collocate related information, and helps users find relevant information. The creation of metadata has generally been approached in two ways: professional creation and author creation. In li- braries and other organizations, creating metadata, primarily in the form of catalog records, has traditionally been the domain of dedicated profes- sionals working with complex, detailed rule sets and vocabularies. The primary problem with this approach is scalability and its impracticality for the vast amounts of content being produced and used, especially on the World Wide Web. The apparatus and tools built around professional cataloging systems are generally too complicated for anyone without spe- cialized training and knowledge. A second approach is for metadata to be created by authors. The movement towards creator described docu- ments was heralded by SGML, the WWW, and the Dublin Core Metadata Initiative. There are problems with this approach as well - often due to inadequate or inaccurate description, or outright deception. This paper examines a third approach: user-created metadata, where users of the documents and media create metadata for their own individual use that is also shared throughout a community. 1 The Creation of Metadata: Professionals, Con- tent Creators, Users Metadata is often characterized as “data about data.” Metadata is information, often highly structured, about documents, books, articles, photographs, or other items that is designed to support specific functions.
    [Show full text]
  • Serendipity in Recommender Systems JYVÄSKYLÄ STUDIES in COMPUTING 281
    JYVÄSKYLÄ STUDIES IN COMPUTING 281 Denis Kotkov Serendipity in Recommender Systems JYVÄSKYLÄ STUDIES IN COMPUTING 281 Denis Kotkov Serendipity in Recommender Systems Esitetään Jyväskylän yliopiston informaatioteknologian tiedekunnan suostumuksella julkisesti tarkastettavaksi yliopiston Agora-rakennuksen Alfa-salissa kesäkuun 7. päivänä 2018 kello 12. Academic dissertation to be publicly discussed, by permission of the Faculty of Information Technology of the University of Jyväskylä, in building Agora, Alfa hall, on June 7, 2018 at 12 o’clock noon. UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄ 2018 Serendipity in Recommender Systems JYVÄSKYLÄ STUDIES IN COMPUTING 281 Denis Kotkov Serendipity in Recommender Systems UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄ 2018 Editors Marja-Leena Rantalainen Faculty of Information Technology, University of Jyväskylä Pekka Olsbo, Ville Korkiakangas Publishing Unit, University Library of Jyväskylä Permanent link to this publication: http://urn.fi/URN:ISBN:978-951-39-7438-1 URN:ISBN:978-951-39-7438-1 ISBN 978-951-39-7438-1 (PDF) ISBN 978-951-39-7437-4 (nid.) ISSN 1456-5390 Copyright © 2018, by University of Jyväskylä Jyväskylä University Printing House, Jyväskylä 2018 ABSTRACT Kotkov, Denis Serendipity in Recommender Systems Jyväskylä: University of Jyväskylä, 2018, 72 p. (+included articles) (Jyväskylä Studies in Computing ISSN 1456-5390; 281) ISBN 978-951-39-7437-4 (nid.) ISBN 978-951-39-7438-1 (PDF) Finnish summary Diss. The number of goods and services (such as accommodation or music streaming) offered by e-commerce websites does not allow users to examine all the avail- able options in a reasonable amount of time. Recommender systems are auxiliary systems designed to help users find interesting goods or services (items) on a website when the number of available items is overwhelming.
    [Show full text]
  • Projects on the Move
    LINUXCOVERCOMMUNITY USERSTORY SchlagwortSchlagwortFree Software sollte sollte Projectshier hier stehen stehen Schlagwort sollte hier stehen COVER STORY An up-to-date look at free software and its makers PROJECTS ON THE MOVE Free software covers such a diverse range of utilities, applications, and assorted projects that it is sometimes difficult to find the perfect tool. We pick the best of the bunch. This month we cover blogging – the latest buzz, the latest on the DPL elections, and more trouble at Debian. BY MARTIN LOSCHWITZ he EU is entering the second use, install, and configure. For example, extensible. B2 Evolution also has themes round of the battle over software administrators do not need to create a to allow users to design their own blogs. Tpatents. While supporters have database or waste time trying to set one Like the other solutions, Serendipity successfully had the directive passed by up, as Blosxom uses simple text files. [3] aims for ease of use. Themes and the EU Council of Ministers, opponents Entries can be created in the web inter- skins allow users to modify the blog soft- of patents are increasing the pressure face and uploaded via FTP or WebDAV. ware’s appearance. Version 0.8, which is prior to the second reading. The number Plugins add all kinds of functionality to still under development, even supports of pages warning about the danger of Blosxom. The default package supports Smarty framework [4] templates. software patents continues to grow. And RSS feeding of blog entries, and themes Serendipity can also manage multiple it appears unlikely – although by no give the Blosxom blog a pleasing appear- user accounts.
    [Show full text]
  • The Data Journalism Handbook
    THE DATA JOURNALISM HANDBOOK Towards a Critical Data Practice Edited by Liliana Bounegru and Jonathan Gray 1 Bounegru & Gray (eds.) The Data Journalism Handbook “This is a stellar collection that spans applied and scholarly perspectives on practices of data journalism, rich with insights into the work of making data tell stories.” − Kate Crawford, New York University + Microsoft Research New York; author of Atlas of AI “Researchers sometimes suffer from what I call journalist-envy. Journalists, after all, write well, meet deadlines, and don’t take decades to complete their research. But the journalistic landscape has changed in ways that scholars should heed. A new, dynamic field—data journalism—is flourishing, one that makes the boundaries between our fields less rigid and more interesting. This exciting new volume interrogates this important shift, offering journalists and researchers alike an engaging, critical introduction to this field. Spanning the globe, with an impressive variety of data and purposes, the essays demonstrate the promise and limits of this form of journalism, one that yields new investigative strategies, one that warrants analysis. Perhaps new forms of collaboration will also emerge, and envy can give way to more creative relations.” − Wendy Espeland, Northwestern University; co-author of Engines of Anxiety: Academic Rankings, Reputation, and Accountability “It is now established that data is entangled with politics and embedded in history and society. This bountiful book highlights the crucial role of data journalists
    [Show full text]
  • Between Ontologies and Folksonomies
    BOF Between Ontologies and Folksonomies Michigan State University-Mi, US June 28, 2007 Workshop held in conjunction with Preface Today on-line communities, as well as individuals, produce a substantial amount of unstructured (and extemporaneous) content, arising from tacit and explicit knowledge sharing. Various approaches, both in the managerial and computer science fields, are seek- ing ways to crystallize the - somewhat volatile, but often highly valuable - knowl- edge contained in communities "chatters". Among those approaches, the most relevants appear to be those aimed at developing and formalizing agreed-upon semantic representations of specific knowledge domains (i.e. domain ontologies). Nonetheless, the intrinsic limits of technologies underpinning such approaches tend to push communities members towards the spontaneous adoption of less cumbersome tools, usually offered in the framework of the Web 2.0 (e.g. folkso- nomies, XML-based tagging, etc.), for sharing and retrieving knowledge. Inside this landscape, community members should be able to access and browse community knowledge transparently and in a personalized way, through tools that should be at once device-independent and context- and user-dependent, in order to manage and classify content for heterogeneous interaction channels (wired/wireless network workstations, smart-phones, PDA, and pagers) and dispa- rate situations (while driving, in a meeting, on campus). The BOF- Between Ontologies and Folksonomies workshop, held in conjunction with the third Communities and Technologies conference in June 2007 1, aimed at the development of a common understanding of the frontier technologies for shar- ing knowledge in communities. We are proposing here a selection of conceptual considerations, technical issues and "real-life case studies" presented during the workshop.
    [Show full text]
  • Privacy by Design in Big Data an Overview of Privacy Enhancing Technologies in the Era of Big Data Analytics
    Privacy by design in big data An overview of privacy enhancing technologies in the era of big data analytics FINAL 1.0 PUBLIC DECEMBER 2015 www.enisa.europa.eu European Union Agency For Network And Information Security Privacy by design in big data FINAL | 1.0 | Public | December 2015 About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU member states in implementing relevant EU legislation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu. Authors Giuseppe D' Acquisto (Garante per la protezione dei dati personali), Josep Domingo-Ferrer (Universitat Rovira i Virgili), Panayiotis Kikiras (AGT), Vicenç Torra (University of Skövde), Yves-Alexandre de Montjoye (MIT), Athena Bourka (ENISA) Editors European Union Agency for Network and Information Security ENISA responsible officers: Athena Bourka, Prokopios Drogkaris For contacting the authors please use [email protected]. For media enquiries about this paper, please use [email protected]. Acknowledgements We would like to thank Gwendal Le Grand (CNIL) for his support and advice during the project. Acknowledgements should also be given to Stefan Schiffner (ENISA) for his help and support in producing this document.
    [Show full text]
  • Serendipity and Strategy in Rapid Innovation T
    Serendipity and strategy in rapid innovation T. M. A. Fink∗†, M. Reevesz, R. Palmaz and R. S. Farry yLondon Institute for Mathematical Sciences, Mayfair, London W1K 2XF, UK ∗Centre National de la Recherche Scientifique, Paris, France zBCG Henderson Institute, The Boston Consulting Group, New York, USA Abstract. Innovation is to organizations what evolution is to organ- process. isms: it is how organisations adapt to changes in the environment Serendipity. On the other hand, a serendipitous approach is and improve. Yet despite steady advances in our understanding of seen in firms like Apple, which is notoriously opposed to mak- evolution, what drives innovation remains elusive. On the one hand, ing innovation choices based on incremental consumer demands, organizations invest heavily in systematic strategies to accelerate in- novation. On the other, historical analysis and individual experience and Tesla, which has invested for years in their vision of long- suggest that serendipity plays a significant role in the discovery pro- distance electric cars [13]. In science, many of the most impor- cess. To unify these two perspectives, we analyzed the mathematics of tant discoveries have serendipitous origins, in contrast to their innovation as a search process for viable designs across a universe of published step-by-step write-ups, such as penicillin, heparin, component building blocks. We then tested our insights using histor- X-rays and nitrous oxide [9]. The role of vision and intuition ical data from language, gastronomy and technology. By measuring the number of makeable designs as we acquire more components, tend to be under-reported: a study of 33 major discoveries in we observed that the relative usefulness of different components is biochemistry \in which serendipity played a crucial role" con- not fixed, but cross each other over time.
    [Show full text]
  • Canadian Election Analysis Points De Vue Sur L'élection
    ALEX MARLAND AND THIERRY GIASSON, EDS CANADIAN ELECTION ANALYSIS Communication, Strategy, and Democracy POINTS DE VUE SUR 2015 L’ÉLECTION CANADIENNE Communication, stratégie et démocratie About UBC Press The University of British Columbia Press is Canada’s leading social sciences publisher. With an international reputation for publishing high-quality works of original scholarship, our books draw on and reflect cutting-edge research, pushing the boundaries of academic discourse in innovative directions. Each year UBC Press publishes seventy new titles in a number of fields, including Aboriginal studies, Asian studies, Canadian history, environmental studies, gender and women’s studies, geography, health and food studies, law, media and communications, military and security studies, planning and urban studies, and political science. UBC Press | thought that counts About Samara Samara Canada is dedicated to reconnecting citizens to politics. Established as a charity in 2009, Samara has become Canada’s most trusted, non-partisan champion of increased civic engagement and a more positive public life. Samara’s research and educational programming shines new light on Canada’s democratic system and encourages greater political participation across the country to build better politics and a better Canada for everyone. About the Editors Alex Marland is an associate professor of political science and associate dean of arts at Memorial University of Newfoundland. His area of research concerns the use of communication and marketing in Canadian politics, government, and public policy. Alex is the author of Brand Command: Canadian Politics and Democracy in the Age of Message Control, to be published by UBC Press in early 2016. Thierry Giasson is an associate professor of political science at Université Laval, in Québec City.
    [Show full text]
  • Unsuitable 1.0
    Unsuitable 1.0 The World’s First Blog Engine Wri:en in Forth. Problems (July 2009) • Web HosDng Provider Folding in Few Weeks • Using Serendipity with PostgreSQL Database • Need to install new blog, retaining content – Local InstallaDon of Serendipity with MySQL • Sounds simple to migrate! Problems • Local Serendipity Failed to Import from Remote Serendipity Instance – Only first 20 or so arDcles succeeded – No comments were imported Problems • Serendipity Suffers Numerous Page-Rendering Bugs too. – Code lisDngs were always double-spaced. – SomeDmes you needed \ to escape its wiki- inspired format codes, someDmes not. Problems • Decided to try Wordpress. – Themes broken out of the box!! Ouch! – Could not fix them by changing themes. Ouch! – Failed to import comments from Serendipity. Problems • Decided to try Wordpress. – I am not alone: 29 complaints in last 3 months Problems • Decided to try Movable Type – Could not import anything from Serendipity. – ConfiguraDon was a pain. • Intended for large-scale sites with dedicated support personnel. • I had to pay for the theme I wanted. Ouch! Problems • It Becomes Personal! “My crusade in this post is that Forth is empha4cally not the right tool for the job.” – lars_ (reddit.com) Light Bulb! • By this Dme, I had only one day le` of hosDng. I grabbed an SQL dump, intending to import material into whatever blog engine I eventually se:led on. • But then I remembered all those previous arDcles where I said, “I should write my own blog in Forth someday.” It was now or never! Simplificaons • Comments – Not worth the effort to implement! – 99% spam by volume.
    [Show full text]
  • Metatron Documentation Release 0.2.0
    Metatron Documentation Release 0.2.0 The Serendipity Team Nov 11, 2017 Contents 1 Usage 3 1.1 Keeping Metatron up to date.......................................3 2 Commands 5 2.1 Diagnostics................................................5 2.2 User....................................................5 2.3 Cache...................................................6 2.4 Comments................................................6 2.5 Plugins..................................................6 2.6 Metatron configuration..........................................6 2.7 Backup..................................................7 3 Contributing 9 4 Testing 11 5 Credits 13 6 License 15 7 Installation 17 7.1 Install the metatron.phar file....................................... 17 7.2 Install Metatron from source using Composer.............................. 17 7.3 Requirements............................................... 17 8 Indices and tables 19 i ii Metatron Documentation, Release 0.2.0 A command line tool (written in PHP) for developers and admins of Serendipity. Contents: Contents 1 Metatron Documentation, Release 0.2.0 2 Contents CHAPTER 1 Usage Right now, there are only a few commands. Change to your Serendipity root directory and make sure you have read permissions to serendipity_config_local.inc.php. You get a list of all available commands by entering: $ php metatron.phar list If you need help running a command, type: $ php metatron.phar help <command> 1.1 Keeping Metatron up to date As of version 0.1.1, Metatron is able to update itself to the latest version. Just run $ php metatron.phar self-update 3 Metatron Documentation, Release 0.2.0 4 Chapter 1. Usage CHAPTER 2 Commands 2.1 Diagnostics 2.1.1 Serendipity version Prints the current S9y version. $ php metatron.phar diag:version 2.1.2 Information about the current installation Prints basic information about the current S9y installation.
    [Show full text]