See also TBTF for 2000-03-31, 1999-08-30, 06-14, 02-15, 01-26, 01-13, 1998-12-15, 08-31, 05-18, 05-11, 04-27, more...
Harry George <hgeorge at eskimo dot com> decided to re-implement the classic Numerical Recipes algorithms in Modula-3, and found that a software copyright can be just as thorny as a software patent. Some background:
Numerical Recipes: The Art of Scientific Computing is a series of books published by Cambridge University Press beginning in 1986. The books, and software to correspond, are available for a variety of computer languages: initially C and Fortran, more recently Basic, Pascal, and Modula-2.
Modula 3 is a modern computer language that shares many design goals with Java. It descends from Mesa, Modula-2, and Cedar, and resembles Oberon and Euclid. Its features include objects and classes, exception handling, garbage collection, lightweight processes (threads), and the isolation of unsafe features. Its adherents swear by it. George writes: "I am typcally an order of magnitude faster in M3 than in C, Lisp, Ada, Perl, C++, or (god forbid) COBOL, Fortran, or Assembler. (Java at least has similar semanics, but the syntax is a mess.)"
George posted about the project and his progress to the Usenet newsgroup comp.lang.modula3 and kept the work-in-progress on his Web site. Some way into the project he contacted the NR people about the work, suspecting that there might be some copyright issues. Indeed there were. He was told that the only legal way to proceed with the project would be a "clean room" approach, involving a collaborator who had never been exposed to the NR books.
Here is the letter George received from Bill Press at Numerical Recipes and posted to comp.lang.modula3 in late January. It appears on the TBTF archive by permission.
Thanks to Olly Stephens <olly at dylan dot zycad dot com> for alerting me to this story.
Fabrizio Bartolomucci <fabry at flashnet dot it> has devoted considerable thought to the strategic import of recent actions by these pivotal players in the emerging Internet market. See his treatise, An Across the Ocean Account on Browsers and Machines, which he updates from time to time. While some subsets of these companies temporarily form tactical alliances, Bartolomucci's analysis treats them as rivals in an n-way struggle for position at the beginning of a new era in computing. Assuredly Bill Gates thinks this way; I'm less certain that some of the other players, especially Apple in its recent turmoil, are as single-minded and focused as Bartolomucci's ex-post-facto analysis assumes. But his perspective is certainly thought-provoking, and one of these companies ought to get in touch with him and pay him a retainer for exclusive access to his insights.
This class of software tools, long the exclusive purview of system administrators wearing pointy hats, gained wider attention last April with the free public release of a tool called SATAN (Security Administrator Tool for Analyzing Networks) -- an event that got one of its inventors, Dan Farmer, fired from Silicon Graphics. (He was immediately picked up by Sun.) NSSs analyze an Internet host or a network and report on possible security vulnerabilities. Since last year several commercial scanners have come on the market, and in a posting dated 1995-03-05 PC Week reviews Internet Scanner 3.2, PingWare 2.01, and NetProbe against the now-venerable freeware SATAN. A pointer to this article came across the security alert mailing list included in the TBTF Essential Tools collection. Internet Security System Inc.'s Internet Scanner 3.2 came out on top in this review.
Cnet Online reviews ten search engines and nine search multiplexors (which they call meta-search engines) -- thanks to Don Rota <drota at atria dot com> for pointing it out. This exhaustive review is a good starting point for someone with no experience as to which engines might be useful for what kinds of searches.
The Communications Decency Act
See also TBTF for 1999-02-01, 1998-12-15, 12-07, 10-27, 10-19, 10-12, 09-14, 07-27, 1997-11-17, 06-30, 03-21, more...
On Monday 2/26 the Citizens Internet Empowerment Coalition (CIEC) filed a court action to block the Communications Decency Act. The federal court quickly consolidated this new lawsuit with the original suit filed by the American Civil Liberties Union and others moments after President Clinton signed the telecommunications reform bill that contains the CDA. Testimony before Philadelphia Federal court will begin on 1996-03-21.
The CIEC is coordinated by the Center for Democracy and Technology, America Online, the American Library Association, and others including People for the American Way. Follow the link for a list of 24 named plaintiffs in the suit -- including Microsoft, Apple Computer, and Wired Magazine -- and an additional 17 organizational members of the CIEC.
A unique feature of the lawsuit is a provision allowing individuals to join it, until 1996-03-15. When I added my name on Wednesday evening 2/28 I was the 2,087th person to do so; the tally was over 5,000 by Friday afternoon. Follow this link if you want to sign up to join the suit. Since this page is hosted by the Center for Democracy and Technology, it prominently features a privacy statement spelling out the limits on the use CDT will make of any information you supply.
As a plaintiff in the CIAC lawsuit (see above), Microsoft favors individual control of what people see on the Internet, as opposed to government mandate. Microsoft announced on Thursday 2/29 that the next version of its Internet Explorer browser will support a voluntary content rating system called RSAC-I. The system will let parents and teachers block a computer's access to Web sites based on criteria such as nudity, violence, or sexual themes.(The ratings system was developed by the Recreational Software Advisory Council.)
RSAC-I is one of a number of rating schemes built on the industry-defined Platform for Internet Content Selection, or PICS, which is supported by the World Wide Web Consortium and a group of 22 online firms. For a detailed description see the SafeSurf page. Upon learning of the PICS rating system one frequent poster to the Cypherpunks mailing list, Lewis McCarthy <lmccarth at cs dot umass dot edu>, just had to use it to paint his page scarlet:
> I couldn't resist the temptation. I rushed out and rated my home page
> as evil incarnate, at least according to the SafeSurf rating system.
> No innocent rugrats are gonna be learning anything about my work in
> crypto and symbolic computation on the web!
McCarthy's home page is now flagged thus to any browser that honors the SafeSurf ratings:
> Recommended Age: Explicitly for Adults
> Profanity: Explicit and Crude
> Heterosexual Themes: Explicit and Crude or Explicitly Inviting Participation
> Homosexual Themes: Explicit and Crude or Explicitly Inviting Participation
> Nudity: Explicit and Crude
> Violence: Encouraging Personal Participation, Weapon Making
> Sex Violence and Profanity: Explicit and Crude
> Intolerance: Advocating Violent or Hateful Action
> Drug Use: Soliciting Personal Participation
> Other Adult Themes: Explicit and Crude or Explicitly Inviting Participation
> Gambling: Providing Means with Stakes
If you would like to paint your own page with a scarlet letter, put the following code directly after the <HEAD> statement of your HTML document:
<META http-equiv="PICS-Label" content='(PICS 1.0 "http://www.classify.org/safesurf/" l r (SS~~000 9 SS~~001 9 SS~~002 9 SS~~003 9 SS~~004 9 SS~~005 9 SS~~006 9 SS~~007 9 SS~~008 9 SS~~009 9 SS~~00A 9 SS~~100 1))'>
Thanks to Peter Langston <psl at wolfenet dot com> for forwarding the scarlet letter.
[ 1] <http://mm.iit.uni-miskolc.hu/Data/amiga/AR/ar311_Sections/feature5.HTML>
[ 2] <http://www.tbtf.com/resource/sw-patents.html>
[ 3] <http://www.nr.com/>
[ 4] <http://www.vlsi.polymtl.ca/m3/>
[ 5] <http://www.tbtf.com/resource/nr-copyright.html>
[ 6] <http://www.thru.com/art/uk/ocean.html>
[ 7] <http://www.zdnet.com/~pcweek/netweek/0205/tdaem.html>
[ 8] <http://www.tbtf.com/essential-tools.html>
[ 9] <http://www.cnet.com/Content/Reviews/Compare/Search/>
>>Internet Patent News Service -- mail email@example.com with
> message: help .