Trending December 2023 # Search Wikia Materializing With Open Sourcing Of Intellisophic & Grub # Suggested January 2024 # Top 12 Popular

You are reading the article Search Wikia Materializing With Open Sourcing Of Intellisophic & Grub updated in December 2023 on the website We hope that the information we have shared is helpful to you. If you find the content interesting and meaningful, please share it with your friends and continue to follow and support us for the latest updates. Suggested January 2024 Search Wikia Materializing With Open Sourcing Of Intellisophic & Grub

Wikia, Inc. and Intellisophic, Inc. announced this week that Intellisophic, which publishes subject-specific taxonomy, thesaurus and vocabulary products for the search, categorization and text-mining industry, will be making its software available via open source in conjunction with the Search Wikia project.

Categorization is the process of organizing information based on a common set of characteristics or concepts, which in terms of Internet searching helps to increase accuracy. By understanding the vocabularies, terminology and relationships of concepts in different categories of content such as finance, gaming, or news, the quality of search results for the related keywords can be significantly increased.

This semantic step by the Search Wikia movement follows their acquisition of the Grub crawler last week which is a shared web crawler which was the ‘original’ shared search compilation project masterminded by LookSmart’s Michael Grubb, who visualized shared search well ahead of its time back in 2000.

The open sourcing of Intellisophic technology and Grub will lend a new rejuvinated breath in open search, which has been spearheaded by the Nutch effort for years. Wikia is taking an interesting leading role in the spread of open source search, based upon these values :

4. Privacy – Must be protected, do not store or transmit any identifying data.

It will be even more interesting to see which existing search companies step up to help fund or build a partnership with the Search Wikia project, as some of the budding start-ups (Facebook) or established companies (Yahoo) may have major interest in the future of transparent and user influenced & governed search. Om Malik suggested Yahoo! on his video cast the other day as the company has “little to lose and everything to gain.” Yahoo would not be a bad idea for a company to get behind and possibly enable open source search within their network, especially with the socially driven element behind Yahoo.

Let’s also remember it was Yahoo who backed Google, and thrust them into the spotlight when Yahoo contracted Google to serve their web results. If Search Wikia could produce a better and more accepted alternative to Google (there are better search engines out there, as better is usually subjective and dependent on the needs of the end user), would it be in Yahoo’s interest to back the project, promote it and perhaps benefit from it?

You're reading Search Wikia Materializing With Open Sourcing Of Intellisophic & Grub

Outfit Your Netbook With Open Source: 21 Tools

These days everyone is looking for a bargain, and laptop manufacturers are eager to deliver. Sure, you can still spend $1,000 (or much more) for state-or-the-art hardware that runs the latest versions of commercial software with ease. But now you can also get a netbook that does everything you really need for under $400.

As you might expect, these cheaper netbooks often lack the performance and security features you’ll find in higher-priced models. Fortunately, you can overcome many of these limitations – without spending an extra cent – by turning to open-source software.

In fact, the open-source philosophy has been at the heart of the recent trend towards less expensive laptops from the very beginning. In 2005, MIT faculty founded the One Laptop Per Child (OLPC) organization with the goal of producing $100 laptops that could be used by children in earth’s poorest countries.

Free and open-source technology helped make it possible for OLPC to create the XO, a rugged, low-power, extremely inexpensive laptop. In 2007, Taiwanese maker Asustek took this concept from its philanthropic roots and made it commercial when it debuted the Eee for $349. As consumers rushed to snap up the Eee, other manufacturers followed suit with their own so-called “mini” or netbook models that trade features for portability and low cost.

By the end of last year, more than 15 million consumers joined the netbook craze. And despite the increasingly bleak outlook for the PC industry as a whole, analysts predict that the mini notebook market will remain hot.

IDC predicts netbooks will account for 12.3 percent of the laptop market with sales of 21 million units this year, and Gartner anticipates that all mobile PC sales will be up 9 percent, with mini notebooks accounting for most of that growth. And the availability of these low cost options has led to lower price for other, more traditional laptops as well.

The down side? Any low-cost laptop you buy will probably be missing something. It might be underpowered, fall short on RAM, lack hard drive space, and/or come without a CD/DVD drive. And it’s almost certainly missing key security features. (Here’s a list of 10 open source security apps.)

The solution? Open-source software. In many cases, manufacturers of these lower cost notebooks are already relying on open-source technology as a means to lower the price.

Compared to its commercial counterparts, open-source software generally requires fewer resources and provides greater security. By going with open source on your laptop, you probably won’t feel the effects of a slower processor and less memory, and you’ll be less likely to be victimized by hackers.

Some may argue that the availability of Web apps and cloud computing means that you don’t need software on your laptop at all. However, if you ever want to use your laptop when an Internet connection isn’t available (and after all, the point of a laptop is that you can use it anywhere), you really need installed software.

If you’ve already purchased a low-price laptop or are now considering it, here are open-source software to “fill in the holes” and overcome the slower performance:

The Basics

2) Operating System: Ubuntu

Unless you’re buying your laptop second-hand, it’s going to come with the OS pre-installed. If you haven’t yet made your purchase, you may want to consider one of the many models that uses Ubuntu Linux. It uses dramatically fewer resources than Windows (the other most common operating system option on low-cost laptops) and it’s generally considered more secure. In addition, Ubuntu includes many of the most popular open-source applications, such as chúng tôi Firefox, and others.

2) Browser: Firefox

Even if you purchase a Windows-based laptop with Internet Explorer pre-installed, you should consider switching to Firefox. It’s more secure (which helps if you’re using a laptop that lacks security features), and it’s fast and easy to use.

Next Page: Open source for security, communication

“Dream With Eyes Open,” Bishop Peter Weaver Tells Graduates

“Dream with Eyes Open,” Bishop Peter Weaver Tells Graduates Baccalaureate address suggests path in a sad world

Bishop Peter Weaver gave the 2013 Baccalaureate address in Marsh Chapel Sunday morning. Photo by Cydney Scott

In the five weeks since the Boston Marathon bombings, graduating seniors have witnessed the cruelties of the world even as they dreamed of their impending future in it. That weaving of sorrow and hope shows the need for “dreaming with eyes open,” BU’s Baccalaureate speaker told Sunday morning worshippers at Marsh Chapel.

Bishop Peter Weaver (STH’75), former leader of New England Methodists and a former University trustee, borrowed that quote as the theme of his address from Elie Wiesel (Hon.’74), a Nobel laureate and BU’s Andrew W. Mellon Professor in the Humanities. Weaver interpreted Wiesel’s phrase to mean that wishing for justice and peace must be accompanied by hard work and honest recognition of worldly impediments to them.

“To dream with eyes open,” Weaver told graduating seniors and others in the audience, means that “dreams without deeds are simply daydreaming—and deeds unrooted in dreams can simply be a way of sleepwalking through life.”

Delivered with a practiced preacher’s precision—undulating between energetic and emphatic and solemn and low-toned—Weaver’s talk suggested that to understand what he meant, his listeners take the MBTA to Boston’s neighborhoods, where the work of justice must be carried out. One of those neighborhoods is Dorchester, “where eight-year-old Martin Richard talked of coming to BU and held up his dream on a blue poster board: ‘No more hurting people. Peace.’” (A picture of the boy and his sign ricocheted around the world after his murder by the Marathon bombers.)

The bombings also took the life of Lu Lingzi (GRS’14), remembered by Weaver in a line borrowed from her parents’ memorial tribute: “We want to encourage others who have Lingzi’s ambition and dreams and want to make the world a better place to continue moving forward.”

Weaver recounted how he attended last year’s Baccalaureate service and afterward heard a senior tell his family that graduation was “a dream come true. His dad responded, ‘So what’s your next dream?’” Weaver’s listeners laughed, but the bishop said, “It’s a good question….This has been an institution that’s never been content with mimicking others. Its history has been about dreams nurturing action.”

Indeed, one of BU’s founders, Isaac Rich, turned his fortune over to build the school of his dreams before it had buildings, faculty, or students, Weaver said.

Weaver has spent a lifetime practicing what he preached in his address. As a pastor and bishop in Pennsylvania and New England, he led congregations’ efforts to care for homeless women, AIDS patients, the poor, immigrants, and victims of natural disasters.

He joked about his surprise at being chosen as Baccalaureate speaker over another of this year’s honorary degree recipients. “Morgan Freeman is here,” Weaver said, “and he has been God—twice.”

The service struck a more sober note, as Brother Lawrence Whitney (STH’09,’15), the University’s chaplain for community life, prayed not just for the graduating seniors, but for the half dozen members of their class who died in the last year in various accidents and crimes. He asked consolation for their families “as we rejoice with those who rejoice and weep with those who weep.”

Explore Related Topics:

List Of Malicious Pdf Files You Should Not Open

Do you know that a simple task such as opening PDF files can infect your computer with malware? This is a very common method used by hackers to install malicious software on your system and gain access to it.

Adobe Reader comes with support for javscript embedded in PDF file. Hackers can simply add malicious javascript code to the PDF file to exploit this vulnerability. When you open the PDF file, the malicious javascript get executed and install malware on your computer, all without you knowing it.

Many people don’t pay enough attention to the fact that PDF files can contain viruses and open them without scanning them. Recently, Microsoft Malware Protection Center released a list of commonly infected PDF files that have been detected over the past few months.

Here is the list of files that has been released:






5661f[1].pdf 7927

9fbe0[1].pdf 7065


The question that remains here is how can you protect yourself from getting infected through this method? The answer to this question is pretty simple. As most of the PDF exploits the vulnerabilities using JavaScript, one way to protect your system would be to disable JavaScript on your PDF reader.

How to Disable JavaScript in Adobe Reader?

From the sidebar, select JavaScript and uncheck “Enable Acrobat JavaScript”.

Other Ways to Protect Yourself

First you need to ensure that you never open an email or download anything that is sent to you by an unknown person/source. It is recommended that you always check the name of the file in the email before opening it on your computer or web browser. If you use Gmail, it scans every attachment that is delivered to your Inbox and blocks the infected file if it’s already in your Inbox. Although opening an email is safe, it is still recommended that you avoid opening emails that have attachments or links from unknown senders.

Second, ensure that you update your Windows and your antivirus program. It is very important to perform a regular system scan to check if your computer is infected or not. If you are not sure of the PDF files that you have downloaded, you can scan them with Virustotal to make sure they are virus-free .

Final Words

As hackers are finding new ways to attack you, you should take all the precautionary steps to make sure your system does not get infected. On the other hand, the antivirus companies are also on the verge of releasing new virus definitions every day. So, it is highly recommended that you install good antivirus software such as Kaspersky or BitDefender, and set them to update definitions automatically. You can also try tips to protect yourself from viruses and malware.


Hammad is a Business student and computer geek who cover latest technology news and reviews at AppsDaily. Apart from that, I like to review web services and softwares which can be helpful for the readers.

Subscribe to our newsletter!

Our latest tutorials delivered straight to your inbox

Sign up for all newsletters.

By signing up, you agree to our Privacy Policy and European users agree to the data transfer policy. We will not share your data and you can unsubscribe at any time.

Open Source Java: Interview With An Apache Harmony Project Founder

Harmony, an open source Java implementation, is currently in incubator status at the Apache Software Foundation. The Harmony project mission is to create a compatible, independent implementation of J2SE 5 under the Apache License v2, and “create a community-developed modular runtime (VM and class library) architecture to allow independent implementations to share runtime components, and allow independent innovation in runtime components.”

There is a lot of open source activity currently surrounding Java, from JBoss and Geronimo (open source application servers) to MyFaces and Spring (open source web application frameworks), but Java itself is the last proprietary piece of the puzzle. If Harmony is successful, will Sun still matter?

I asked Dalibor Topic, one of the project founders, to tell us more about the history of the project, its importance to the Java community, and plans for the future.

LinuxPlanet: How did the Harmony project get started?

Dalibor Topic: Not being an Apache Software Foundation member, I can not speak authoritatively on the early history on Apache’s side, so I’ll give you a personal account of how we started to build the bridges that led to Apache Harmony. I am a co-maintainer of the chúng tôi virtual machine, and a developer on the GNU Classpath class library project, which are both long running sister projects to provide a full free software Java implementation.

In 2003 I was involved with making sure that some of Apache Software Foundation’s projects like Apache Ant run well on the then current version of the chúng tôi virtual machine. That started off the merge of Kaffe and GNU Classpath projects and resulted in some first contacts between Kaffe, GNU Classpath and Apache developers. chúng tôi started to gradually switch to GNU Classpath for its class libraries, driven by the needs of the users to run some of the excellent Apache software on a fully free stack.

Later in 2004, Mark Wielaard from GNU Classpath and me started looking at ways to improve the quality of GNU Classpath and Kaffe through automatic regression testing with popular free software written in Java. That immediately led us to the Apache Gump project, a continuous integration project that allows bugs preventing popular software from running to be noticed and caught as they happen, before they slip into releases. With the generous help of Leo Simons and Stefano Mazzochi, both Apache developers, we managed to set up Apache Gump with Kaffe and to set up a regression testing environment on top of it.

Going from that collaboration effort, strong ties to other Apache developers were created, most notably to Geir Magnusson Jr. from Apache Geronimo, and Davanum Srinivas from the Apache Axis project. Tom Tromey from Free Software Foundation’s gcj project, Bruno Souza from SouJava, Sun’s head of the Java Community Process Onno Kluyt, Geir, Mark and me met at the Red Hat Free Runtimes summit in Boston in late 2004, to discuss how to make a free software implementation of Java a reality.

While Sun had no interest in opening up their own implementation, Onno assured us that Sun Microsystems has removed the legal obstacles that existed before, which made it impossible for a free software implementation to be certified as compatible with the proprietary runtimes. Geir has worked together with Onno before to make sure that Apache’s Geronimo, a free software implementation of J2EE, could happen, so he was interested in seeing a certified free software J2SE implementation happen as well, and Bruno has a lot of experience with the JCP.

In spring 2005, Geir, Bruno and me met again at the CafeBrazil conference. We discussed how to build a modular Java runtime and class libraries, similar to the concepts embodied in Apache Geronimo.

One idea was to have well-defined interfaces for parts of the VM and the class libraries where other modules can be plugged in transparently, so companies and independent developers can work together on some parts, and compete on others. The concept of “collaborative competition” has worked great for GNU Classpath, which now covers about 90% of 1.5 APIs, and is used by more than two dozen runtimes, which both compete and collaborate on runtime components and the class library.

Given Apache Software Foundation’s successful dealing with the JCP and Sun Microsystems in the past, the possibility of such a project being attractive to both independent developers and companies developing proprietary Java runtimes, and ASF’s good reputation among Java developers, the ASF’s incubator made for a good, prospective home.

After further discussion within Apache, the Apache Harmony project was proposed for incubation, accepted, and we started to work on the legal framework for contributions, merging in first large contributions from Archie Cobbs, IBM and Intel.

This article was first published on chúng tôi

How To: Use Wildcard Search With Various Google Services

Here’s how you can play with it in various Google services:

General Google Search + Wildcard

General Google search allows a lot of flexibility with its wildcard operator.

How it works: * is substituted by one or more words.

When it comes particularly in handy: In combination with “” (exact match) search to control the proximity within a set phrase. This trick can turn particularly useful for content inspiration as well as for keyword research (to expand your initial query):

You can also achieve unexpected results when using the wildcard operator in combination with other search commands. Try:

intext:”diabetic * diets”

intitle:”diabetic * diets”

“diabetic * diets” -food


Other Google Search Services + Wildcard

While many people are aware of wildcard search for “Universal” / “blended” results, few users also use the wildcard operator for other types of search results. Wildcard operator is also supported by multiple search engines run by Google:

Google images

Google video and Youtube;

Blog search;

Google news;

Google Shopping


How it works: * is substituted by one or more words.

When it comes particularly in handy:

Here are a few example of how the search operator can turn particularly useful:

Find video content inspiration; example: [“blogging * wordpress”]

Customize your Google News RSS feed (to use it to track your brand mentions or to monitor new opportunities); example: [“guest * post *”]

Expand your search to include various possible variations; for example, to track new articles by “guest author” (and thus track new guest blogging opportunities), use this query in Google Blog Search: [inpostauthor:”guest * author” OR inpostauthor:”guest author”]

Google Reader + Wildcard

How it works: * is substituted by one word. To get two words within your phrase, use two asterisks.

When it comes particularly in handy: Google Reader is your personal collection of relevant feeds. Using it for keyword and content inspiration may turn much more effective than using generic search results.

Gmail Search + Wildcard

How it works: * is substituted by one or more words.

When it comes particularly in handy: Gmail is another useful collection of resources and links dirctly related to you, what you read and what you are subscribed to. I have once shared how Gmail search can turn a great help in your keyword and content research. With wildcard, this idea is even more effective.

A wildcard operator can also turn a great help for searching Gmail attachments: filename:google*.doc – This one filters emails to only those that have doc files attached and these files have [google] in the beginning of the name (whereas filename:*google*.doc searches for messages that have documents attached with “google” mentioned somewhere in the middle of the file name).

Here’s the example set of this search and the results it triggers:

Now, go play with search results to your heart’d content!

Update the detailed information about Search Wikia Materializing With Open Sourcing Of Intellisophic & Grub on the website. We hope the article's content will meet your needs, and we will regularly update the information to provide you with the fastest and most accurate information. Have a great day!