OpenSourceNut writes: "The iPhone has been hacked offering access to third party programs. Businessweek has a full article explaining the various functions of the programs now being used. Hello World!"
What will the internet look like in 20 years? No one knows. But this morning at the Stanford Summit, an annual tech industry conference in Palo Alto, a panel of Silicon Valley experts laid down a few guesses.
Mark D. Drapeau writes: "Could biological metaphors about networking and systems shed light on one of the most difficult issues of our time — terrorism? According to a new op-ed in the 31 July 2007 Washington Times, and a new book entitled The Starfish and the Spider, the answer is a resounding "Yes". An excerpt from the op-ed reads:
*** Most large institutions are organized hierarchically with centralized leadership. Corporations have CEOs, armies have generals, countries have presidents. When competing against centralized organizations, promoting diffusion and disrupting cohesion are considered progressive.
However, al Qaeda has a constantly mutating, horizontal structure composed of an inspirational catalyst in the form of Osama bin Laden and other central figures joined with numerous small groups brought together not by orders but ideology. Here, lack of structure is a strength. Little thought is given, however, to how such a decentralized terrorist network structure affects the strategy for combating it.
"The Starfish and the Spider," a new book about corporate strategy written for a business audience, has a wider application — combating terrorism — and sheds light on this issue.***
Read more here:
IndioMan writes: Both mashups and Ajax are now firmly entrenched in the Web landscape. Put them together and you have the makings for Rich Web applications. This article explains the Rich Web Application Backplane, currently a W3C Note, which is designed to bring standardization to the field, proving a set of common building blocks, or components, these applications tend to use.