Archive for the ‘LINKS’ Category.
May 1, 2003, 4:27 pm
Internet2 NetFlow Weekly Reports:
NetFlow data from all core routers of the Abilene network are analyzed
to produce weekly reports of use of the network. In essence, this is a weekly
version of the “Bulk TCP Use
and Performance on Internet2” by
Stanislav Shalunov and
Benjamin Teitelbaum
(note, however, that the paper used one day of data while the reports
use a week of data each and that the paper used data from the busiest
router while the reports present a network-wide view).
The reports are produced automatically using programs written by
Anatoly Karp and
Stanislav Shalunov.
The CWEB program nfstat.w
reads large daily files and produces intermediate results that are
further digested by a collection of Perl programs.
May 1, 2003, 8:54 am
Tim Bray:
Characters vs. Bytes:
«
This is the first of a three-part essay on modern character string processing for computer programmers. Here I explain and illustrate the methods for storing Unicode characters in byte sequences in computers, and discuss their advantages and disadvantages. These methods have well-known names like UTF-8 and UTF-16.
The next essay will consider string handling in the Java, and to a lesser extent C#, computer languages and argue that it is significantly broken, both in terms of efficiency and correctness. The third essay will propose a new approach to string handling in Java.
»
Tim Bray:Programming Languages and Text:
«
Welcome to another installment in ongoing‘s ongoing tour through
text-processing issues.
This one is about programming-language support, and while it makes specific
reference to Java, tries to be generally applicable to modern software
environments.
The conclusion is that Java is OK for some kinds of text processing, but
has real problems when the lifting gets heavy.
Last time out I said this
was going to be a three-part essay, but now I realize I’d already written
two other text-processing-centric pieces before that, one an
intro to Unicode, and the
other entitled
On Character Strings.
The present essay will recapitulate some of the material in that second note,
but no matter how you cut it, we’re already (to quote Douglas Adams) on
volume four of the trilogy.
To make it worse, I’m gestating some essays on full-text-search,
so we’ll just call it a continuing series.
»
April 29, 2003, 12:28 pm
Sieve Home Page
and
RFC3028
Probably not powerful or flexible enough, in my judgment.
April 29, 2003, 7:51 am
InternetRetailer.com – Daily News for Monday, April 28, 2003
Hamlin says the Microsoft/AOL/Yahoo effort will concentrate on two basic goals: reducing the ability of spammers to spoof e-mail recipients with misleading “from” and “subject” headings, and establishing a set of anti-spam policies implemented throughout the e-mail world by both senders and recipients. A central part of this effort will be to leverage existing directories of Internet Protocol addresses, such as the Domain Name System, to verify the actual IP addresses of outbound e-mail. “You can`t spoof an IP address,” he says.
He adds that Microsoft and other participants will publish guidelines on how to configure inbound e-mail systems to work more closely with IP address registries. “It `s a minor effort for individual companies,” he says. “A single IT-person shop can do it.”
Among the other techniques the three companies will work on:
-
Inhibit the delivery of e-mail from network systems determined to be operating with open routers or other technology that leaves a system open to use by unauthorized senders of e-mail;
- Eliminate the ability to create fraudulent e-mail accounts in bulk;
- Define a mechanism that would allow consumers to communicate with e-mail service providers regarding spam complaints;
- Develop better mechanisms for preserving electronic evidence of spamming activity to support enforcement actions;
- Help coordinate industry-wide use of best practices in blocking spam.
April 28, 2003, 12:57 pm
SecurityFocus HOME Columnists: Iraqi Cyberwar: an Ageless Joke
«
Frankly, this is a great story. It’s amusing to remember how it kicked up a storm in 1991 after its initial appearance as an April Fool’s joke in Infoworld magazine.
»