Agent-Based Social Information Gathering on Internet

Total Page:16

File Type:pdf, Size:1020Kb

Agent-Based Social Information Gathering on Internet From: Proceedings of the Second International Conference on Multiagent Systems. Copyright © 1996, AAAI (www.aaai.org). All rights reserved. Agent-based Social Information Gathering on Internet Eun-Seok LEE Roberto OKADAand Norio SHIRATORI Dept. InformationEngineering GraduateSchool of InformationSciences SKKU(Sung-Kyun-KwanUniversity) TohokuUniversity Seoul, Korea Sendal. ,Japan Background difforent users such that whenone agent alone cannot sat- isfy user request it asks for advices or help to other IJA it The popularization of computers and the Internet have trusts. produced an explosion in the amountof inform~ttion, ntak- Wedivide.d the impleme.ntation task in two phases. In the ing difficult to find the.hi. The. problem with oxisting tirst phase, wefocus on distributed intelligence with the in- information-locating support systemns is that ahhoughthey troduction of several agents and the negotiation aspects in allow user to search througha large, nunfl)e.r of information such a way. that this cooperative agents showan intelligent sources, they provide very limited capabilitie.s for locating. bchaviour. combining and processing informations. The load of find- In the second phase, we focus on autonomousintelligence, ing informationis still on the user. i.e. makingeach of the agents more "’intelligent", where In order to support the user in finding information in we’ll investigate more powerful real-time planning and such environments, we propose, what we called a "com- le.arning algorithms. pletely agent-based framework for Information Gather- ing", named Cooperative Agent Society for In.formation GatheT~ngor CASte: in short. This CASIa is b;Lsed on The prototype the integration of collaborative, interface agents, domain- The multi-alAent system under construction is implemented specific mediators and cooperative informatiou ~mrces. in C and using the libwww. It uses Netscape as a web browser and user interface, mxdthe agents run ‘as sepa- Architecture: rate processes. This system incorporates one UAper user. We dividethe necessary functionalities between the. user several primitive Man(meta-index like) , and the existing andthe distributed information sources basically in three web(including search engines e.g Lycos, Inh)Seek and the typesof agents: documentservers distributed all over the Internet). When (1) User Agent(UA) u,s er-specific agents: one. per user. the. user invokes his personal UA, it opens a personal log It takes care. of user preferences, managepersonal infor- file. to keep meta-information about the documentswhich mation and acts ,as the user’s electronic personal ~ssis- the user flints interesting. This UAalso maintains a talfle tmtt. These age.nts are. sinfilar to the existing interface of "trusted peers", their location and their trust relation- agents, which perform tedious, repetitive and time con- ship - which is updated based on user feedback ~ffter his sumingtasks on behalf of the user or act ,as an abstract- evaluation of retrieved documents. Whenthis UAreceiw,s ing interface bet~.en the. user and the low-level details. the query as a set of keywordsfrom the. user, it first se- In our framework, UAwouhl dialogue, with the user in lect the agents with higher trust values and send them order to acquire user reque.sts, helping him fornmlating the query. The selected UAslook at their per~nal log file the proper query (2) Machine Agent (MA)inf ormation- for documentsretrieved in the past related with the query specific agents: attached to the information sources, con- in question, while the selected Manschoose somesearch trolling access to the information they provide. By do- engines to send this request. This engine selection is done. ing so, negotiation capability, security and consistency of base.d on a trust tahle with the list of knownsearch engines, data can be ensured (3) Manager (Man}tas k-specific their location and a weight indicating howsuccessful they agents: they stand in betweenthe. provide.rs and consumers were in the past answering about this query. Mansreceive of information or services. In this franmwork, they have pointers to candidate solutions from the selected search en- Domain-specific knowledge and plan howto satisfy user gine.s, re.-order themand return this orde.red list of pointers requirements in their domain of expertise. This type of to candidate, solutions as an HTMLdocument. This doeu- agents have been researched at different levels of complex- me.at is presentedto the user, he selects one pointer causing ity, from ve~" simple routers for supporting communica- the documentto be retrieved. The user evaluates this doc- tion to complexmediators with task division, ,allocation ument and provides a positive or negative feedback. This and planning capabilities. causes the update of the weights of the trust relationships of this UAto the agent which proposed this solution and In thispaper, we focuson twoaspects: (I) the UA wlfich the trust weights of the Manto the search engines as well (i)monitors user actions for finding information, (ii)learns as the user’s personal profile. userpreference and keeps it as a personaldata in user’s personalprofile, (iii) builds a trust relationship withother Acknowledgement: agentsbased on pastexperiences and (2)the. social aspect The authors would like to tllank Hideto Kihara for his i.e. the mechanismfor interaction between UAowned by contribution in the prototype implementation. 448 ICMAS-96 From: Proceedings of the Second International Conference on Multiagent Systems. Copyright © 1996, AAAI (www.aaai.org). All rights reserved. A Multiagent Meeting Organizer that satisfies Soft Constraints Joo-Hwee Lira t, Jiankang Wut f~~ Siet-Leng Lag tRWCPNovel ISS Laboratory ~Center for ComputerStudies Institute of Systems Science Ngee Ann Polytechnic IIeng Mui Keng Terrace, Singapore 119597 535, Clementi Road, Singapore 599489 Email: (joohwee, jiankang}@iss.nus.sg Email: [email protected] As a distrihuted resour(~ allocation problem, meet- be conveniently expressed as preferrences (soft con- ing sdmduling is a tedious and time-consuming pro- straints) since satisfaction-seeking is more realistic cess. This paper proposes a multiAgent MEETing than optimality-seeking. Indeed, in fuzzy decision organiZER (AMEETZER)that respresents and rea- making, the decision set is the intersection (denoted sons with soft constraints related to the meeting at- as A) (or more general, confluence) of the goals and t~mdees and resources. An AMEETZERaccepts call- the constraints, for-meetingrequest fron| its user(host) and conmmni- cateswith otherAMEETZERs of the proposedatten- ItDCX’) = m~xb,G(X) ^ t,c(X)} 0) dees and withthe agentmanaging the meetingrooms where D, G, C are decision set, goal fuzzy set, con- to arriveat somecommonly free time slot, taking into straint filzzy set respectively and I~D,PC,, PCare ttmir ~u:countthe pre-specified and dynmnicallycreated hard membership fimctions respectively, X" is the optimal and softconstraints of all attendeesand meetingre- solution in tim domain over whic~ X ranges. sources.Whcn necessar);the AMEETZERcould per- In AMEETZER,conventional crisp constraints (n- formnegotiation of mc~.ting time or relaxationof con- ary relations) are extended to fuzzy constraints straintswith or withoutthe intervention of its user. founded upon filzzy relations. Constraints imposed on Last but not least,the AMEETZERreminds its user meeting time by the attendees or meeting rooms can of forthcondng meetings aC appropriate times. be expressed as filzzy relations defined on the Carte- With distrihuted AMEETZERs,meeting requests sian product space of Day (in a week) x Time (in that involve disjoint se.ts of attendees and resources day), denoted as T. In a simple case, a time preference can be scheduled concurrently, as contrast to a cen- is represented as tralized approadl which faces conmnmication and pro- crossing bottlenecks as well as fanlt tolerance mid com- ci = {l,(t)lt E (2) plex scheduh., maintemmceissues. To filrther increase whereI~(t) ¯ [0, 1] represents the preference for a meet- the concurrency of the system, eacJl AMEETZERis ing to be scheduled at time t as seen by the system, dc~composedinto four subagents, Receptionist (inter- an attendee., or a meeting room. While l~(t) = 0 de- ~:ts with user to manage his calendar and prefer- notes ml impossible time for meeting possibly due to cnces and can’ies out meeting proposal and negotiation other commitment, l~(t) = 1 indicates maximal pref- ctc), Scheduler (infers the optimal time (and room) erence. Priorities among attendees (or meeting re- for a meeting under hard and .soft constraints etc), sources) and meetings can easily be incorporated by Messenger (connmmic:~tes with other AMEETZERs), introducing weighting coefiieients for ci or sieving ci and Learner (learns scheduling preferences). Together through modifiers (or linguistic hedges). the calendm’s and preferences are used to g~merate in- Using the framework of (1), AMEETZERinfers the stmme.sof soft constraint set that specify the preferv.nce most preferred time t" by all N attendees as ~tlues- (E [0, l]) on the meeting times. These prefi~.r once values are conmnmicatedto and inferenced by the I,(t’) = max/trainci(t)} (3) host AMEETZERto generate utility-optimal time for t -i_~N the meeting. whic]| provides a we.U-defined utility measure (optimal Another challenging asl)eCt in real life scheduling degree of joint constraint satisfaction). l~rohlem is the representation mid reasoning of hard Ameetzer is implemented in Java to take advantage and soft constraints. In real life, goal.s can also of its object-orientation anti platform independence. Lira 449.
Recommended publications
  • Microsoft's Internet Exploration: Predatory Or Competitive?
    Cornell Journal of Law and Public Policy Volume 9 Article 3 Issue 1 Fall 1999 Microsoft’s Internet Exploration: Predatory or Competitive Thomas W. Hazlett Follow this and additional works at: http://scholarship.law.cornell.edu/cjlpp Part of the Law Commons Recommended Citation Hazlett, Thomas W. (1999) "Microsoft’s Internet Exploration: Predatory or Competitive," Cornell Journal of Law and Public Policy: Vol. 9: Iss. 1, Article 3. Available at: http://scholarship.law.cornell.edu/cjlpp/vol9/iss1/3 This Article is brought to you for free and open access by the Journals at Scholarship@Cornell Law: A Digital Repository. It has been accepted for inclusion in Cornell Journal of Law and Public Policy by an authorized administrator of Scholarship@Cornell Law: A Digital Repository. For more information, please contact [email protected]. MICROSOFT'S INTERNET EXPLORATION: PREDATORY OR COMPETITIVE? Thomas W. Hazlettt In May 1998 the U.S. Department of Justice ("DOJ") accused Microsoft of violatirig the Sherman Antitrust Act by vigorously compet- ing against Netscape's Navigator software with Microsoft's rival browser, Internet Explorer. The substance of the allegation revolves around defensive actions taken by Microsoft to protect the dominant po- sition enjoyed by Microsoft's Windows operating system. The DOJ's theory is that, were it not for Microsoft's overly aggressive reaction to Netscape, Navigator software would have been more broadly distributed, thus enabling competition to Windows. This competition would have come directly from Java, a computer language developed by Sun Microsystems and embedded in Netscape software, allowing applications to run on any underlying operating system.
    [Show full text]
  • Netscape 6.2.3 Software for Solaris Operating Environment
    What’s New in Netscape 6.2 Netscape 6.2 builds on the successful release of Netscape 6.1 and allows you to do more online with power, efficiency and safety. New is this release are: Support for the latest operating systems ¨ BETTER INTEGRATION WITH WINDOWS XP q Netscape 6.2 is now only one click away within the Windows XP Start menu if you choose Netscape as your default browser and mail applications. Also, you can view the number of incoming email messages you have from your Windows XP login screen. ¨ FULL SUPPORT FOR MACINTOSH OS X Other enhancements Netscape 6.2 offers a more seamless experience between Netscape Mail and other applications on the Windows platform. For example, you can now easily send documents from within Microsoft Word, Excel or Power Point without leaving that application. Simply choose File, “Send To” to invoke the Netscape Mail client to send the document. What follows is a more comprehensive list of the enhancements delivered in Netscape 6.1 CONFIDENTIAL UNTIL AUGUST 8, 2001 Netscape 6.1 Highlights PR Contact: Catherine Corre – (650) 937-4046 CONFIDENTIAL UNTIL AUGUST 8, 2001 Netscape Communications Corporation ("Netscape") and its licensors retain all ownership rights to this document (the "Document"). Use of the Document is governed by applicable copyright law. Netscape may revise this Document from time to time without notice. THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN NO EVENT SHALL NETSCAPE BE LIABLE FOR INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY KIND ARISING FROM ANY ERROR IN THIS DOCUMENT, INCLUDING WITHOUT LIMITATION ANY LOSS OR INTERRUPTION OF BUSINESS, PROFITS, USE OR DATA.
    [Show full text]
  • Attachment to Pih Notice 2000-34
    Office of Public and Indian Housing SEMAP (Section 8 Management Assessment Program) Certification Technical Requirements · Computer with Pentium processor or higher · 100 Mb or larger hard drive · 16 Mb or more RAM · VGA Monitor · 28.8KBps or higher modem connected to an outside telephone line or a direct connection to the Internet · Operating system capable of Internet access · Internet Browser: Netscape 4.0 or higher, Internet Explorer 4.0 or higher* *It is possible to use the PIC to submit information by using either Netscape 3.2 or Internet Explorer 3.2. However, several features that enhance usability (for example, certain colors) are not available unless Netscape 4.0 or higher, Internet Explorer 4.0 or higher is used. Setting up Internet Service In order to obtain an Internet Service Provider in your area, you can look in the Yellow Pages of the telephone book under "Computers.” Usually there is a section called "On-Line Access Providers" which will give you a list of companies in your area that can provide Internet access. It may be helpful to call two or three providers to compare prices and services. Only basic Internet service is needed to use the SEMAP system to submit SEMAP certifications. In most cases, the Internet Service Provider will provide Internet browser software and will provide assistance for installing the software, configuring a modem, and accessing the Internet. You should ensure that the provider you select does, in fact, provide the browser software and provides some support. Once the browser software is installed, you will require a connection from your computer to a regular phone line to access the Internet.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Copyrighted Material
    05_096970 ch01.qxp 4/20/07 11:27 PM Page 3 1 Introducing Cascading Style Sheets Cascading style sheets is a language intended to simplify website design and development. Put simply, CSS handles the look and feel of a web page. With CSS, you can control the color of text, the style of fonts, the spacing between paragraphs, how columns are sized and laid out, what back- ground images or colors are used, as well as a variety of other visual effects. CSS was created in language that is easy to learn and understand, but it provides powerful control over the presentation of a document. Most commonly, CSS is combined with the markup languages HTML or XHTML. These markup languages contain the actual text you see in a web page — the hyperlinks, paragraphs, headings, lists, and tables — and are the glue of a web docu- ment. They contain the web page’s data, as well as the CSS document that contains information about what the web page should look like, and JavaScript, which is another language that pro- vides dynamic and interactive functionality. HTML and XHTML are very similar languages. In fact, for the majority of documents today, they are pretty much identical, although XHTML has some strict requirements about the type of syntax used. I discuss the differences between these two languages in detail in Chapter 2, and I also pro- vide a few simple examples of what each language looks like and how CSS comes together with the language to create a web page. In this chapter, however, I discuss the following: ❑ The W3C, an organization that plans and makes recommendations for how the web should functionCOPYRIGHTED and evolve MATERIAL ❑ How Internet documents work, where they come from, and how the browser displays them ❑ An abridged history of the Internet ❑ Why CSS was a desperately needed solution ❑ The advantages of using CSS 05_096970 ch01.qxp 4/20/07 11:27 PM Page 4 Part I: The Basics The next section takes a look at the independent organization that makes recommendations about how CSS, as well as a variety of other web-specific languages, should be used and implemented.
    [Show full text]
  • Peer Participation and Software
    Peer Participation and Software This report was made possible by the grants from the John D. and Cath- erine T. MacArthur Foundation in connection with its grant-making initiative on Digital Media and Learning. For more information on the initiative visit www.macfound.org. The John D. and Catherine T. MacArthur Foundation Reports on Digital Media and Learning Peer Participation and Software: What Mozilla Has to Teach Government by David R. Booth The Future of Learning Institutions in a Digital Age by Cathy N. Davidson and David Theo Goldberg with the assistance of Zoë Marie Jones The Future of Thinking: Learning Institutions in a Digital Age by Cathy N. Davidson and David Theo Goldberg with the assistance of Zoë Marie Jones New Digital Media and Learning as an Emerging Area and “Worked Examples” as One Way Forward by James Paul Gee Living and Learning with New Media: Summary of Findings from the Digital Youth Project by Mizuko Ito, Heather Horst, Matteo Bittanti, danah boyd, Becky Herr-Stephenson, Patricia G. Lange, C. J. Pascoe, and Laura Robinson with Sonja Baumer, Rachel Cody, Dilan Mahendran, Katynka Z. Martínez, Dan Perkel, Christo Sims, and Lisa Tripp Young People, Ethics, and the New Digital Media: A Synthesis from the GoodPlay Project by Carrie James with Katie Davis, Andrea Flores, John M. Francis, Lindsay Pettingill, Margaret Rundle, and Howard Gardner Confronting the Challenges of Participatory Culture: Media Education for the 21st Century by Henry Jenkins (P.I.) with Ravi Purushotma, Margaret Weigel, Katie Clinton, and Alice J. Robison The Civic Potential of Video Games by Joseph Kahne, Ellen Middaugh, and Chris Evans Peer Production and Software What Mozilla Has to Teach Government David R.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • Web Browser Set-Up Guide for New BARC
    Web Browser Set-up Guide for new BARC The new BARC system is web-based and is designed to work best with Netscape 4.79. Use the chart below to determine the appropriate set-up for your web browser to use new BARC. What type of computer do you use? What you will need to do in order to use the new BARC system… I am a Thin Client user. You do not need to do anything. The version of Netscape available to Thin Client users (version 4.75) will work with the new BARC system. I use a PC and the following statement about the Netscape web browser applies to my workstation…. I don’t have Netscape. Proceed to Section 2 of this document for instructions on how you can download and install Netscape 4.79. I only have Netscape 6.x or Netscape 7.x. Proceed to Section 2 of this document for instructions on how you can download and install Netscape 4.79. I currently have Netscape 4.79. You do not need to do anything. The new BARC system was designed to work best with the version of Netscape you have. I currently have Netscape 4.75 or Netscape 4.76. You do not need to do anything. Even though the new BARC system is designed to work best in Netscape 4.79, the application will work fine with Netscape 4.75 and Netscape 4.76. I have a version of Netscape 4, but it is not Proceed to Section 1 of this document Netscape 4.75, Netscape 4.76 or Netscape 4.79 and to uninstall the current version of I have an alternative web browser (such as Microsoft Netscape you have and then continue Internet Explorer, Netscape 6.x or Netscape 7.x) on to Section 2 to download and on my workstation.
    [Show full text]
  • Web Browsers
    WEB BROWSERS Page 1 INTRODUCTION • A Web browser acts as an interface between the user and Web server • Software application that resides on a computer and is used to locate and display Web pages. • Web user access information from web servers, through a client program called browser. • A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web Page 2 FEATURES • All major web browsers allow the user to open multiple information resources at the same time, either in different browser windows or in different tabs of the same window • A refresh and stop buttons for refreshing and stopping the loading of current documents • Home button that gets you to your home page • Major browsers also include pop-up blockers to prevent unwanted windows from "popping up" without the user's consent Page 3 COMPONENTS OF WEB BROWSER 1. User Interface • this includes the address bar, back/forward button , bookmarking menu etc 1. Rendering Engine • Rendering, that is display of the requested contents on the browser screen. • By default the rendering engine can display HTML and XML documents and images Page 4 HISTROY • The history of the Web browser dates back in to the late 1980s, when a variety of technologies laid the foundation for the first Web browser, WorldWideWeb, by Tim Berners-Lee in 1991. • Microsoft responded with its browser Internet Explorer in 1995 initiating the industry's first browser war • Opera first appeared in 1996; although it have only 2% browser usage share as of April 2010, it has a substantial share of the fast-growing mobile phone Web browser market, being preinstalled on over 40 million phones.
    [Show full text]
  • Why Websites Can Change Without Warning
    Why Websites Can Change Without Warning WHY WOULD MY WEBSITE LOOK DIFFERENT WITHOUT NOTICE? HISTORY: Your website is a series of files & databases. Websites used to be “static” because ​ there were only a few ways to view them. Now we have a complex system, and telling your webmaster what device, operating system and browser is crucial, here’s why: TERMINOLOGY: You have a desktop or mobile “device”. Desktop computers and mobile ​ ​ ​ devices have “operating systems” which are software. To see your website, you’ll pull up a ​ ​ ​ ​ “browser” which is also software, to surf the Internet. Your website is a series of files that ​ ​ needs to be 100% compatible with all devices, operating systems and browsers. Your website is built on WordPress and gets a weekly check up (sometimes more often) to ​ ​ ​ see if any changes have occured. Your site could also be attacked with bad files, links, spam, comments and other annoying internet pests! Or other components will suddenly need updating which is nothing out of the ordinary. WHAT DOES IT LOOK LIKE IF SOMETHING HAS CHANGED? Any update to the following can make your website look differently: There are 85 operating ​ systems (OS) that can update (without warning). And any of the most popular roughly 7 ​ ​ ​ browsers also update regularly which can affect your site visually and other ways. (Lists below) ​ Now, with an OS or browser update, your site’s 18 website components likely will need ​ ​ updating too. Once website updates are implemented, there are currently about 21 mobile ​ devices, and 141 desktop devices that need to be viewed for compatibility.
    [Show full text]
  • Microsoft's Internet Exploration: Predatory Or Competitive?
    MICROSOFT'S INTERNET EXPLORATION: PREDATORY OR COMPETITNE? Thomas W Hazlettt In May 1998 the U.S. Department of Justice ("DOJ") accused Microsoft of violatirtg the Sherman Antitrust Act by vigorously compet­ ing against Netscape's Navigator software with Microsoft's rival browser, Internet Explorer. The substance of the allegation revolves around defensive actions taken by Microsoft to protect the dominant po­ sition enjoyed by Microsoft's Windows operating system. The DOJ' s theory is that, were it not for Microsoft's overly aggressive reaction to Netscape, Navigator software would have been more broadly distributed, thus enabling competition to Windows. This competition would have come directly from Java, a computer language developed by Sun Microsystems and embedded in Netscape software, allowing applications to run on any underlying operating system. Fearing the spread of Java would render a Windows monopoly moot, the DOJ argues, Microsoft engaged in predatory behavior to pre-empt Netscape and, therefore, Java. This set of allegations can most usefully be analyzed under a four-part test for predation examining opportunity, intent, conduct, and effect. The analysis hereunder shows that while Microsoft's aggressive actions have likely injured specific competitors, the "browser jihad" featured as Ex­ hibit A in the DOJ' s antitrust case is a dramatic illustration of the pro­ consumer consequences of robust market rivalry. I. THE GOVERNMENT'S CASE: PREDATION "To protect its valuable Windows monopoly against such potential competitive threats [from Netscape and other new software products], and to extend its operating system monopoly into other software markets, Microsoft has engaged in a series of anticompetitive activities.
    [Show full text]
  • BROWSERS: a Brief Historyof Securityvulnerabilities
    BROWSERS: A brief history oF PROJECT BY GROUP 5 SNEHA BALIGA / JULIA CHLASTACZ / DANG TRUNG NGUYEN / MARIJA NIKOLIC / BOGDAN NOVAKOVIC / PREETI PURI / security vulnerabilities CHENYUN ZENG 2.8.9 Lynx Vulnerabilities refer to Thomas Netscape Navigator 8.1.3 the Common Vulnerabilities Dickey Netscape and Exposures (CVE) - a system 75.1 that provides a reference method for publicly known information - K-Meleon security vulnerabilities and exposures. Netscape Netscape created the Mozilla Organization in Vulnerabilities 1998 to co-ordinate the development of the 69 Mozilla Application Suite. Netscape acquired AOL Firefox Risk severity in 1999 and went on to create multiple browsers. AOL Phoenix Critical 1.5 High AOL Medium 2.49 Low Seamonkey Risk refers to the potential that 28.7 the threat will be realized for a particular vulnerability. Palemoon 12.18 Number of open Opera vulnerabilities Opera Software 1,200 11.0 1,000 800 Internet 600 Explorer 400 Microsoft 44.0 200 Microsoft created Edge in 2015 in an 0 attempt to phase out Internet Explorer. Edge Open vulnerabilities refer to 11.4 the number of vulnerabilities open Amaya and unresolved in that year. W3C, INRIA 3.34 Konqueror Usage share KDE 0.11 ELinks 0% Twibright 5.2 Relationship lines Labs Maxthon 1 50% Maxthon International 3.34 Company Name GNOME Web 100% Epiphany 1 1 Successor browser GNOME Project Usage share refers to the 12.1 percentage of user share in Forked from another browser the browser market. Safari Apple Only 7 browsers accomodate 19 usage share of more than 1%. Symbols
    [Show full text]