11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

116 cookiesunlike most traditional publications, are under constantrevision <strong>and</strong> review.Once created, material will <strong>of</strong>ten be reused or repurposedfor different projects. Thus an important part <strong>of</strong> most contentmanagement systems is the repository, which makes thematerial easily searchable <strong>and</strong> retrievable for later use. Materialthat is less likely to be used but still must be retained(such as for legal reasons) may be stored in a separate archive(see backup <strong>and</strong> archive systems). Note: The term digitalasset management is also sometimes used for such systems.S<strong>of</strong>twareContent management Systems are usually built upon aframework or programming interface (see applicationprogram interface), <strong>of</strong>ten using languages such as Java,Perl, Python, or PHP. There are many products to choosefrom, including free <strong>and</strong> open-source alternatives.An interesting alternative for some projects is to usea wiki as a content management system (see wikis <strong>and</strong>Wikipedia). Especially for textual content, wikis <strong>of</strong>fer theadvantage <strong>of</strong> already having revision tracking built in, <strong>and</strong>full-scale wikis such as MediaWiki have many additionalfeatures or plug-ins to aid in content management.Further ReadingBoiko, Bob. Content Management Bible. 2nd ed. Indianapolis:Wiley, 2005.CMS Matrix. Available online. URL: http://www.cmsmatrix.org/.Accessed September 4, 2007.CMS Review. Available online. URL: http://www.cmsreview.com/.Accessed September 4, 2007.Hackos, JoAnn T. Content Management for Dynamic Web Delivery.New York: Wiley, 2001.cookiesCookies are simply tiny text files that a Web server sendsto the browser <strong>and</strong> retrieves each time the user accesses theWeb site. The purpose is to maintain a sort <strong>of</strong> pr<strong>of</strong>ile <strong>of</strong> theuser containing such things as preferences as to how theuser wants to view or use the site, shopping cart selectionsfrom previous sessions, <strong>and</strong> so on. In short, cookies enable aWeb site to provide a more customized or personalized form<strong>of</strong> service <strong>and</strong> minimize the amount <strong>of</strong> repetitive data entryon the part <strong>of</strong> the user. (This type <strong>of</strong> cookie is called persistent,since it survives across sessions. There can also be temporarycookies that apply only to the current session.)However, cookies also have benefits for the Web siteowner. They can be used to track which pages or items theuser has looked at in the past. This information can then beused (see data mining) to create generic user pr<strong>of</strong>iles thatcan help with marketing or targeting advertising. In thecase <strong>of</strong> some companies (notably Amazon.com) much moreelaborate pr<strong>of</strong>iles associated with the cookie’s identity canbe used to create personalized recommendations, in effectcontinually directing targeted advertising at the user.Security <strong>and</strong> Privacy ConcernsThere are many popular misconceptions about cookies.Cookies contain only data, not executable code. This meansthey cannot function as worms or viruses or otherwiseinteract with the user’s system. However, while cookies donot in themselves represent a security threat, they do haveprivacy implications. Although most pr<strong>of</strong>iles created usingcookies are anonymous (containing no personal identifyingdata), an unscrupulous site could attach such data (such asaddresses or credit card numbers entered by the user) to apr<strong>of</strong>ile <strong>and</strong> sell it for purposes ranging from spamming toidentity theft.Another risk comes from “third party” cookies such asare <strong>of</strong>ten included in advertisements (see online advertising).Potentially, these could be used to create a much morecomprehensive pr<strong>of</strong>ile <strong>of</strong> a user based on his or her actionson multiple Web sites.Users do have some control over how cookies are stored.Most browsers allow the user to reject all cookies, accept orreject cookies from certain sites, or store cookies only temporarily.However, sites may in turn refuse services to userswho do not accept cookies, <strong>and</strong> at any rate the user wouldsee only a generic rather than a personalized view.There has been a certain amount <strong>of</strong> government regulation<strong>of</strong> Web cookies. The U.S. government has strict rulesfor the use <strong>of</strong> cookies on federal Web sites. The EuropeanUnion also has recommended (but not fully implemented)regulations that require that users be told how the storeddata will be used <strong>and</strong> be given the opportunity to opt out.Further ReadingKuner, Christopher. European Data Privacy Laws <strong>and</strong> Online Business.New York: Oxford University Press, 2003.Kymin, Jennifer. “What are HTTP Cookies?” Available online. URL:http://webdesign.about.com/cs/cookies/a/aa082498a.htm.Accessed September 4, 2007.Levine, John R., Ray Everett-Church, <strong>and</strong> Gregg Stebben. InternetPrivacy for Dummies. New York: Wiley, 2002.cooperative processingHistorically there have been two basic ways to bring greatercomputer power to bear on a task. One is to build morepowerful single computers (see supercomputer). The otheris to link one or more computers or processors together <strong>and</strong>tightly coordinate them to process the data (see grid computing).Both <strong>of</strong> these approaches require great expertise<strong>and</strong> considerable expense.However, there is another quite interesting ad hocapproach to cooperative processing that first appeared withthe SETI@Home project launched in 1999. The basic idea isto take advantage <strong>of</strong> the fact that millions <strong>of</strong> computer usersare already connected via the Internet. The typical PC hasmany processing cycles to spare—idle time when the user isdoing nothing <strong>and</strong> the operating system is doing very little.A program like SETI@Home is designed to be downloadedto volunteer users. The program can run only whenno other applications are being used (one way to ensurethis is to make the program a screen saver), or it can runcontinuously but only use cycles not being requested byanother program.The data to be analyzed (signals from space in this case)is broken up into chunks or “work units” that are parceled

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!