305,323 research outputs found

    Full Data Controlled Web-Based Feed Aggregator

    Full text link
    Feed syndication is analogous to electronic newsletters, both are aimed at delivering feeds to subscribers; the difference is that while newsletter subscription requires e-mail and exposed you to spam and security challenges, feed syndication ensures that you only get what you requested for. This paper reports a review on the state of the art of feed aggregation technology and the development of a locally hosted web based feed aggregator as a research tool using the core features of WordPress; the software was further enhanced with plugins and widgets for dynamic content publishing, database and object caching, social web syndication, back-up and maintenance, among others. The results highlight the current developments in software re-use and describes; how open source content management systems can be used for both online and offline publishing, a means whereby feed aggregator users can control and share feed data, as well as how web developers can focus on extending the features of built-in software libraries in applications rather than reinventing the wheel.Comment: 14 page

    SIGURNOST CMS-A

    Get PDF
    Content Management Systems (CMS) are often used for website development. Websites are targets of various malicious attackers, and therefore it is necessary to be familiar with the security level of websites.The paper describes some basic features of the well-known open source CMS platforms: WordPress, Joomla and Drupal. It also explains the ten most common web vulnerabilities. Web vulnerability testing has been carried out by means of various software tools. The basic installations of the CMS systems have been tested. After having tested each web vulnerability, a possible additional web security measurement for each CMS is indicated. The web vulnerabilities which cannot be directly affected by the CMS security settings have been explained. It has been shown that the basic installations of the CMSs fail to ensure safety requirements due to irresistance to some threats. Necessary software tools for the tested CMSs have been specified in order to ensure the resistance to threats which have not been provided in the basic installation of the tested CMSs. A questionnaire has been developed for the purpose of examining the security level on the websites of business entities in Croatia, and a survey has been conducted in Croatian business entities engaged in computer science, accounting and industry.Za razvoj web-sjedišta danas se često koriste CMS-ovi. Web-sjedišta meta su raznim malicioznim napadačima, stoga je potrebno poznavati razinu sigurnosti web-sjedišta i postaviti maksimalnu moguću razinu sigurnosti. U radu su prikazane osnovne značajke poznatijih CMS-ova u otvorenom pristupu Wordpress, Joomla i Drupal. Objašnjeno je deset najčešćih web-ranjivosti. Izvršeno je testiranje web-ranjivosti pomoću različitih programskih alata. Testirane su osnovne instalacije CMS-ova. Nakon testiranja svake web-ranjivosti za svaki CMS navedena je moguća dodatna mjera sigurnosti. Objašnjene su web-ranjivosti na koje sigurnosne postavke CMS-ova ne mogu direktno utjecati. Pokazano je da osnovne instalacije CMS-ova ne zadovoljavaju sigurnosne zahtjeve jer nisu otporne na neke prijetnje. Specificirani su potrebni programski dodaci na testirane CMS-ove kako bi se osigurala otpornost na prijetnje koje osnovne instalacije testiranih CMS-ova nisu osigurale. Za potrebe provjere stanja sigurnosti na web-sjedištima poslovnih subjekata u Hrvatskoj izrađen je anketni upitnik i provedena je anketa nad poslovnim subjektima u Hrvatskoj za djelatnosti informatika, računovodstvo, industrija

    KAPTUR: technical analysis report

    Get PDF
    Led by the Visual Arts Data Service (VADS) and funded by the JISC Managing Research Data programme (2011-13) KAPTUR will discover, create and pilot a sectoral model of best practice in the management of research data in the visual arts in collaboration with four institutional partners: Glasgow School of Art; Goldsmiths, University of London; University for the Creative Arts; and University of the Arts London. This report is framed around the research question: which technical system is most suitable for managing visual arts research data? The first stage involved a literature review including information gathered through attendance at meetings and events, and Internet research, as well as information on projects from the previous round of JISCMRD funding (2009-11). During February and March 2012, the Technical Manager carried out interviews with the four KAPTUR Project Officers and also met with IT staff at each institution. This led to the creation of a user requirement document (Appendix A), which was then circulated to the project team for additional comments and feedback. The Technical Manager selected 17 systems to compare with the user requirement document (Appendix B). Five of the systems had similar scores so these were short-listed. The Technical Manager created an online form into which the Project Officers entered priority scores for each of the user requirements in order to calculate a more accurate score for each of the five short-listed systems (Appendix C) and this resulted in the choice of EPrints as the software for the KAPTUR project

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Technical principles for institutional technologies

    Get PDF

    A look at cloud architecture interoperability through standards

    Get PDF
    Enabling cloud infrastructures to evolve into a transparent platform while preserving integrity raises interoperability issues. How components are connected needs to be addressed. Interoperability requires standard data models and communication encoding technologies compatible with the existing Internet infrastructure. To reduce vendor lock-in situations, cloud computing must implement universal strategies regarding standards, interoperability and portability. Open standards are of critical importance and need to be embedded into interoperability solutions. Interoperability is determined at the data level as well as the service level. Corresponding modelling standards and integration solutions shall be analysed
    corecore