Online
"Works Well with Others"
www.webtechniques.com/archives/2000/12/homepage
"Corporate Caring"
www.webtechniques.com/archives/2000/11/book
"Medical, Dental, Vision, and RAM"
www.webtechniques.com/archives/2000/06/corp
![]() |
![]() |
|
![]() | ||
April 2001
Justice for All |
Who's Watching the Web? | |
By Henry W. (Hank) Jones III, and K. Lawson Pedigo | |
Much attention has been focused on patching security holes with software upgrades. However, as Henry and Lawson point out, the real protection will come from the law. | |
Can CORBA Sidestep Open-Source Licensing? | |
By Michael Trachtman | |
If you develop a valuable addition based on open-source code, you don't have to release it to public domain. Michael explains how to use oft-ignored CORBA for circumventing OS licenses. | |
S T R A T E G Y : | |
Legal Code
We've all heard of the long arm of the law, but just how far does that reach extend? Bret A. Fausett explains that sometimes it reaches across international borders.
Mimi Rosenheim shows you how your business can take shelter when it's raining lawsuits.
Trademarks can help you stake claim to your share of the online market. Claire L. Wudowsky wants you to make sure yours are protected.
Artesia Technologies Teams 4.0.
|
|
D E S I G N : | |
Scalable Vector Graphics is up for Candidate Recommendation before the w3c. Will it be a Flash killer, wonders Molly E. Holzschlag?
Because a copyright infringement causes harm to the progress of science and art, it's also a wrong against society. Linus Kafka expounds on what he considers a criminal offense. Batik SVG Toolkit and Jasc WebDraw. |
|
P R O G R A M M I N G : | |
Java@Work
Programming with Perl
Presenting Content One Slide at a Time
Visitors want less work for more payoff. You'll capture their attention by using John Dimm's Perl scripts to create a slide show.
XML@Large
Product Reviews
|
|
I N F R A S T R U C T U R E : | |
Connections
Everyone knows it's importantso why have so few companies invested in protecting themselves? John N. Stewart takes a look back to see what we can learn from the history of online (in)security.
Server Security: Layer by Layer
Zope 2.2.4.
|
|
E N D TO E N D : | |
Editor in Chief Amit Asaravala takes a look back from the five year mark: We've managed to completely change the way we do business, yet we're still working 9 to 5.
Lincoln D. Stein discusses click-wrap agreements: You may get more than you bargained for when you hit the accept button.
California's power struggle reminds us that it's time to become more involved in the politics of issues affecting our daily lives. Dale Dougherty encourages us not to ignore the legal and political process.
Guest Webmaster Richard Yoo tackles your questions about loading balancing, form checking, and plug-in detection.
Is hindsight 20-20? Eugene Eric Kim reviews How the Web Was Born.
Internet privacy is but an illusion, and the laws pertaining to it may afford you less privacy than you've been led to believe. Michael Swaine gives the business view and the government view.
|
Table 2
Summary of functions for string manipulation.
Expression | Description |
---|---|
string | Converts an object to a Unicode character string. |
concat | Concatenates two strings and returns the result. |
contains | Determines whether a substring is contained within a string. |
starts-with | Takes two string arguments: If the second string starts with the characters in the first string, this function returns with a value of true. |
substring-before | Returns the substring preceding a specified character. |
substring-after | Returns the substring following a specified character. |
normalize-space | Removes leading/trailing white space and reduces extra white space to a single space. |
translate | Translates a string of characters. |
Table 1
Operators for controlling step patterns.
Character | Description |
---|---|
| | Expresses alternatives; for example, (emph|b ). |
. | Selects the current node. |
/ | Sometimes called a step, used to compose a longer pattern. |
// | Matches all descendants instead of immediate children. |
.. | Selects the parent of the current node. |
* | Wildcard character; matches with all nodes. |
@ | Selects an attribute. |
Online
Anti-Cybersquatting Consumer Protection Act
www.law.nyu.edu/engelbergcenter/legislativewatchnational/s1255.html
Lanham Trademark Act
www4.law.cornell.edu/uscode/15/ch22.html
Playboy Enterprises, Inc. v. Calvin Designer Label
www.jmls.edu/cyber/cases/calvin1.html
Uniform Domain Name Dispute Resolution Policy and Rules
www.icann.org
United States Patent and Trademark Office
www.uspto.gov
World International Property Organization
www.wipo.int
Other Intellectual Property Offices (in the U.S. and International)
www.uspto.gov/web/menu/other.html