TechnoBuzz

A Techno Blog, mainly about Java

SOA Talk

Service Oriented Architecture and Enterprise Service Bus

Advertisements

April 27, 2005 Posted by | SOA | Leave a comment

http://www.newsobserver.com/news/q/story/2342342p-8720451c.html

Listening Post
Ideas and issues under discussion in the Triangle



Meyer

Bloggers’ vulnerability

From USA Today, a commentary by Philip Meyer, the Knight professor of journalism at UNC-Chapel Hill, considers who is a journalist.

Rat on your source or go to jail. When a journalist for a print or broadcast medium faces that choice, he or she usually has the benefit of a deep-pocketed employer who will pay legal fees and keep the paychecks coming.

But two species of journalists — book authors and bloggers — usually lack that comfort. If you are a blogger or are thinking about becoming one, you should worry about that.

In California, Apple Computer is going after three bloggers who it says revealed important trade secrets in their online publications. A state judge has ruled that the bloggers must cough up the names of the person or persons who gave them the information.

Journalism today operates under a kind of feudal system. Just as serfs once provided their labor to the lord of the castle in exchange for protection, reporters today rely on the corporations that hire them to give them the legal clout to take risks in digging out the truth.

Neither the freelance book author nor the lonely blogger typing away in a basement has that protection. The record for time spent in jail to protect a source is held not by a television or newspaper reporter, but by Vanessa Leggett, an unaffiliated and unpublished author who was investigating a murder case. She served 168 days behind bars in Houston. The court finally let her go with the expiration of the term of the grand jury that wanted her secret.

Hers was a federal case. The Department of Justice, which approves subpoenas of journalists, stayed out of it, deciding that Leggett wasn’t a journalist.

Now the issue of who is a journalist is back. Bloggers, with their lightning response time and great variety of viewpoints and resources, are going around the traditional gatekeepers of news. The California bloggers had hoped the courts would recognize their influence and treat them as journalists so they could be covered by California’s shield law, which gives qualified protection to reporters guarding confidential sources.

Santa Clara County Superior Court Judge James Kleinberg sidestepped the issue of defining journalists by ruling that California law does not protect even recognized journalists in cases that involve theft of trade secrets.

The judge’s ruling, now under appeal, was thus a double disappointment to members of the blogging community who crave recognition as journalists. Traditional journalists should support them. There is neither sound moral nor legal justification for claiming that those who work for major news organizations have stronger First Amendment rights than the rest of us.

Thirty-one states and the District of Columbia have qualified shield laws, and court decisions have left grounds for arguing that the First Amendment has the same effect in federal cases. A federal shield law has been proposed by Sens. Richard Lugar, an Indiana Republican, and Christopher Dodd, a Connecticut Democrat. For certain cases, "it is the very promise of secrecy by a journalist," they have argued, "that ultimately protects the public’s right to know."

But all such laws are subject to unpredictable interpretation by the courts, and none tells what to do about bloggers.

As the power to disperse information moves from castle to cottage, bloggers need to band together, find patrons to protect them, or both. That is starting to happen. The recipients of the California subpoenas are getting pro bono legal services from the Electronic Frontier Foundation, established with Silicon Valley money in 1990.

The foundation was created after the Secret Service seized the computers of a small book publisher, Steve Jackson Games, in Austin. Agents thought Steve Jackson’s company was involved in the theft and distribution of a BellSouth document that hackers could use to disrupt the 911 emergency system. It wasn’t, but Jackson had to lay off employees when he lost the use of his computers, and important electronic mail was deleted when he finally got the computers back.

None of the groups to which Jackson turned for aid understood the technology enough to appreciate the civil-liberties issue.

Three men who did understand it finally got together to form the foundation: Mitch Kapor, former president of Lotus Development; John Gilmore, an early employee of Sun Microsystems; and Perry Barlow, lyricist for the Grateful Dead. And they supported Jackson’s company in a lawsuit that established the rule that electronic mail deserves as much protection as telephone conversations.

Since then, the organization has grown to 15,000 dues-paying members. It has an international presence in its support for civil-rights issues involving high technology.

Bloggers are often compared with the lonely pamphleteers who flourished in the 15th century when printing with movable type was a new technology. Professional associations and support groups will make them less lonely.

As for Vanessa Leggett, her true-crime book is still in progress. She has a publisher and a New York agent. But book authorship, still a low-tech enterprise, is likely to remain a solitary task.

April 25, 2005 Posted by | Uncategorized | Leave a comment

http://www.newsobserver.com/news/q/story/2342342p-8720451c.html

Listening Post
Ideas and issues under discussion in the Triangle



Meyer

Bloggers’ vulnerability

From USA Today, a commentary by Philip Meyer, the Knight professor of journalism at UNC-Chapel Hill, considers who is a journalist.

Rat on your source or go to jail. When a journalist for a print or broadcast medium faces that choice, he or she usually has the benefit of a deep-pocketed employer who will pay legal fees and keep the paychecks coming.

But two species of journalists — book authors and bloggers — usually lack that comfort. If you are a blogger or are thinking about becoming one, you should worry about that.

In California, Apple Computer is going after three bloggers who it says revealed important trade secrets in their online publications. A state judge has ruled that the bloggers must cough up the names of the person or persons who gave them the information.

Journalism today operates under a kind of feudal system. Just as serfs once provided their labor to the lord of the castle in exchange for protection, reporters today rely on the corporations that hire them to give them the legal clout to take risks in digging out the truth.

Neither the freelance book author nor the lonely blogger typing away in a basement has that protection. The record for time spent in jail to protect a source is held not by a television or newspaper reporter, but by Vanessa Leggett, an unaffiliated and unpublished author who was investigating a murder case. She served 168 days behind bars in Houston. The court finally let her go with the expiration of the term of the grand jury that wanted her secret.

Hers was a federal case. The Department of Justice, which approves subpoenas of journalists, stayed out of it, deciding that Leggett wasn’t a journalist.

Now the issue of who is a journalist is back. Bloggers, with their lightning response time and great variety of viewpoints and resources, are going around the traditional gatekeepers of news. The California bloggers had hoped the courts would recognize their influence and treat them as journalists so they could be covered by California’s shield law, which gives qualified protection to reporters guarding confidential sources.

Santa Clara County Superior Court Judge James Kleinberg sidestepped the issue of defining journalists by ruling that California law does not protect even recognized journalists in cases that involve theft of trade secrets.

The judge’s ruling, now under appeal, was thus a double disappointment to members of the blogging community who crave recognition as journalists. Traditional journalists should support them. There is neither sound moral nor legal justification for claiming that those who work for major news organizations have stronger First Amendment rights than the rest of us.

Thirty-one states and the District of Columbia have qualified shield laws, and court decisions have left grounds for arguing that the First Amendment has the same effect in federal cases. A federal shield law has been proposed by Sens. Richard Lugar, an Indiana Republican, and Christopher Dodd, a Connecticut Democrat. For certain cases, "it is the very promise of secrecy by a journalist," they have argued, "that ultimately protects the public’s right to know."

But all such laws are subject to unpredictable interpretation by the courts, and none tells what to do about bloggers.

As the power to disperse information moves from castle to cottage, bloggers need to band together, find patrons to protect them, or both. That is starting to happen. The recipients of the California subpoenas are getting pro bono legal services from the Electronic Frontier Foundation, established with Silicon Valley money in 1990.

The foundation was created after the Secret Service seized the computers of a small book publisher, Steve Jackson Games, in Austin. Agents thought Steve Jackson’s company was involved in the theft and distribution of a BellSouth document that hackers could use to disrupt the 911 emergency system. It wasn’t, but Jackson had to lay off employees when he lost the use of his computers, and important electronic mail was deleted when he finally got the computers back.

None of the groups to which Jackson turned for aid understood the technology enough to appreciate the civil-liberties issue.

Three men who did understand it finally got together to form the foundation: Mitch Kapor, former president of Lotus Development; John Gilmore, an early employee of Sun Microsystems; and Perry Barlow, lyricist for the Grateful Dead. And they supported Jackson’s company in a lawsuit that established the rule that electronic mail deserves as much protection as telephone conversations.

Since then, the organization has grown to 15,000 dues-paying members. It has an international presence in its support for civil-rights issues involving high technology.

Bloggers are often compared with the lonely pamphleteers who flourished in the 15th century when printing with movable type was a new technology. Professional associations and support groups will make them less lonely.

As for Vanessa Leggett, her true-crime book is still in progress. She has a publisher and a New York agent. But book authorship, still a low-tech enterprise, is likely to remain a solitary task.

April 25, 2005 Posted by | Uncategorized | Leave a comment

Industry Experiences

Link: Are Rogue Programmers Running Rampant in IT?

Link: Enterprise Development is Hard

April 17, 2005 Posted by | Web Design | Leave a comment

IBM WS 6.0

Link: developerWorks: Plenty of coverage on RAD6 / WAS 6.0

April 8, 2005 Posted by | SW Tools | Leave a comment

sw architecture site

Link: Software Architecture Articles.

April 6, 2005 Posted by | Patterns & UML | Leave a comment

StringBuffer and String

Link: AlwaysUseStringBufferMisconception

Webpshere Best Practices: "String concatenation is the textbook bad practice that illustrates the adverse performance impact of creating large numbers of temporary Java objects. Because Strings are immutable objects, String concatenation results in temporary object creation that increases Java garbage collection and consequently CPU utilization as well. The textbook solution is to use java.lang.StringBuffer instead of string concatenation."

Take from the The Server Side

Being immutable means that that once Strings are created they can not be changed.  Operations that appear to modify String objects actually generate completely new ones.

The creation of new String objects occurrs for:

  • overlaoded mathematical operations
  • concat
  • replace
  • substring
  • trim

 

April 4, 2005 Posted by | J2EE | Leave a comment