Applications
Anonymous Documents
Bookmarker
Caller Connection
Dencoder
HTML Chat
Mortgage Calculator
Web Site Classification
Sample Documents
Binary Revolution
Crisis of Credibility
Docs on the Internet
GripesNpetPeeves
Intellectual Property
What We Want
E-mail and News


New User Registration

Add User

Registration is required for new users to access some of the software listed on this page, and also to vote on any poll. The registration form consists of a few tables shown below, with comments on how the different pieces of information are going to be used. Contents of the sidebar explain in a little more details how we are using the image based authentication system. We invite you to take a peek at the login page to see how the information set up during this registration is going to be used. Some other expected questions are answered preemptively at the end of this form.

Optional Information
User ID 32/32 max
Date of Birth
Required to Set up Account
E-mail address 64/64 max
Pass phrase 32/32 max
Confirm it
Pass phrase not confirmed.
Credentials published at the end of your articles (no HTML tags, please)
1024 characters left
Images for log in and to reset forgotten passwords

On this website, we use an alternative login mechanism in addition to the standard method of the combination of an username and a password. It is image based, and works on the user selecting the correct combination of images. At registration time (now), a set of images are presented from which you need to select six. Selected images will mailed to you as the new user on successful registration.

At the time of log in or a request to reset password, a different set of images is presented that contains the selected ones. Correct selection of the images establishes the identity of the person trying to log in. Identifiers for all the images are randomized for protection against hacking. Please select any 6 of the 22 images below by clicking on them,

Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image Selectable Image
Current count of selected images (6 required): 0
Additional Questionnaire for Password Reset

Please select 3 different security questions and provide the answers to the right. A few of these will be asked to verify your identity if/when you need to reset the password.

Validation for a human being

Please evaluate the expression to the right, and acknowledge your acceptance of the terms and conditions below.

8 · 5 · 52 =
20

Digital Signature

Yes, I have read the terms and conditions and usage agreements for this site and I agree with them.

No, I have not read agreements posted on this site to use it or I do not agree with them.


Frequently Asked Questions on New User Registration

  1. Why do I need a User-ID?

    You do not, that is why the field is optional. But imagine yourself having to log in to our site (or for that matter, any other site on the internet) with AllTheUserNamesILikeAreTaken35183@hottestMailOnEarth.com as the user id vs. Alpha Centaurion. Many web sites ask you to use the email address as the only login id. We give you the option to use some other cool name, as long as it is not insensitive or offensive enough to land us into legal troubles.

  2. How would you use my date of birth?

    We will determine if you are an adult physically, i.e.,, 18 years old or older. If you are not, and at some point we get adult contents on our site, we will restrict your access to it. We have no way to figure out your mental age, so we will not even bother. Please do not expect a Happy Birthday card from us, those should be from your dentist and real estate agent.

  3. Why do you want my e-mail address?

    Firstly to communicate with you. Secondly, as an indication or you being a living, breathing and kicking human being who can be held accountable for his/her actions and/or words. This is why we want all our users to have at least one active e-mail account, and we lock down the account until it is validated through that e-mail account.

    As a general rule of thumb, we do not ask for the identification as long as you are using the site for browsing purposes and downloading stuff. The situation changes when you are using certain resources at the web site, e.g. uploading files for your prospective employer or secret lover to download, or publishing articles for the world to read. While we are not interested in the specific contents unless you define it as public, we would like to keep an open channel of communication with you, whether we use it or not.

  4. May I use my work e-mail address at this site?

    Yes, absolutely. We do not plan on sending spams or any other offensive material. However, keep in mind that if that e-mail account is deactivated for some reason (e.g., you finding a better opportunity and moving on) and you need our help to reset the account with us, it may not be possible. If you need to change the e-mail address on your account, the change request must be routed through the old as well as the new address.

  5. Can I use different e-mail addresses to set up multiple accounts?

    Uh huh. We live in the 21st century and in a world of free software, we are all entitled to multiple e-mail accounts and online personalities. We just restrict one e-mail address to one account. Our purpose for this is to restrict voting to one vote per person for the online polls we plan to have. Other than subverting this, you really do not have any reason to use multiple handles, since we are not promoting any product or services. However, be warned that if we detect multiple votes on a poll from the same IP address from different accounts trying to promote anything, we would notify all the account holders and cancel all such accounts and associated privileges.

  6. How is a pass phrase different from other passwords?

    Standard passwords have many restrictions, e.g., no white spaces, should be so difficult to guess or remember that you write it down on a piece of paper and carry it around in your wallet, etc. Some demand special characters, some do not allow it. Others have strange rules and policies in place. We do not have any of that. For us, examples of valid passwords are "et tu", "wuvmaluv", "Pac1f1ER", "New Yorker", "don't4getMe", etc.. This is why we call them pass phrases (they can contain multiple words).

  7. Why pick 6 images and not more (or less)?

    We found a nice strategy or algorithm to save the artifacts for 6 images in a compressed and space efficient format. It will not work for 7 or more, and will be redundant and (spacewise) wasteful for 5 or less. picking 6 out of 22 gives a user more than 74,600 combinations, very unlikely that it would be the same as another user. Even if it is the same as another user, it really does not matter, because the collection is checked against the e-mail address or user id, which are unique for every user. It is the same situations as 2 users having the exact same passwords.

    At the time of login, trying to pick 6 images out of 24 has more than 132,000 combinations. After 3 unsuccessful attempts, the system locks down and will not process any more requests. We feel it is safe to assume that a password cracking system cannot figure out the combination in 3 attempts. The system can be thought of a collection of 6 passwords, where each password is dynamically altered at every login. Because of dynamic ordering of the images, it will take a human being to watch the image and note down its corresponding code even to figure out what the obfuscation algorithm is doing. This is highly unlikely, and using 6 such images makes the login mechanism more robust and secure.

  8. What if I forget the set of images I am picking now?

    We need to validate the account by making sure you receive the e-mail sent out by us. We will include the images in that e-mail for you to save. Just save the e-mail and it will refresh your memory if you ever need it. Remember that the order of the images does not matter, it is the collection that counts.

  9. Who are you people?

    A bunch of geeks, or nerds, if you prefer. We are gainfully employed, mature, law abiding, active, legal and overtaxed citizens, financially responsible, culturally compassionate, spiritually open minded and politically independent. We are software professionals, building this web site in our spare time as a hobby for having fun, solving technical challenges (read the article to your right), and upgrading our skillset, exercising a modest dose of creativity while living a balanced life in a capitalistic economy. If you happen to like that description, feel free to join us and share your own ideas.

Download
Welcome to Apidobi

This is a private web site, and we thank you for visiting. Before you continue further, we would request you to agree with the terms and conditions for using this web site and associated services posted here. Thank you, and have a wonderful day!

Summary

Download
The overriding and guiding principle for the development of a modern web application is to throw away most of the object oriented programming principles developed during the last century in favour of expediency in pushing out the application onto the testing environment and as the next step, onto the production system. The article on the left provides a detailed explanation of why the following paradigms are seldom observed any more:

Data Abstraction Encapsulation
Inheritance Polymorphism

We also discuss some concerns on productivity in the modern development environment and highlight a few examples to share our views on the results of such developments. The concluding remarks are posted below.

Conclusions

Abstraction of knowledge from the problem in a specific domain to the realm of bits and bytes is one of the key concepts in software design. Only after this abstraction, the requirements can be paraphrased using a high level computing language in the attempt to find a solution. Modern applications intentionally sidestep this activity in the race to build a prototype and then productize it as soon as possible.

Browser inconsistenties in the interpretation of the style sheets and lack of Javascript documentation by the developer of the web browsers in terms of what exactly is supported and how the text, image and other media are rendered on the screen are the main bottlenecks in the development of web applications.

Computer Scientists, Programmers and Software Developers have developed a strange proclivity to find the solution to a problem even before the problem is defined and the requirements are set. This results in the used of canned libraries which are undocumented, unstable, and often irrelevant to the problem being solved.

Design Patterns have been the new buzzwords in the parlance of software developers, although such patterns are also growing old and losing their novelty. These patterns are usually used in library development, and seldom have an impact of the domain problem being solved. But as long as there is money in talking such patterns and implementing them, we need not be concerned about the qualities inherent in object oriented designs.

Elegant design has not been the target of web application developers in recent days, and we can expect to see this trend to continue in the foreseeable future. If it aint losing money, we're not gonna fix it. Spell checkers are good but not full proof, but if the audience can make out what the speaker is saying, a business will not care about grammar and punctuations in its content.

Fully functional and relatively bug free software is a thing of past, unless it is funded continuously by some business or government entity with deep pockets or political interest. Examples include the Stuxnet virus or software that enable drones flying around the world fire missiles at suspected targets with pinpoint accuracy. The rest of us will have to manage with the Beta versions of evolving software, hopefully making us all a strong believer in evolution.

GUI, the graphical user interface used for the end user to communicate with a software has come a long way. However, the Web browsers can understand only html, with a little styling help from custom style sheets. Jquery provides some of the most stunning effects visible on modern web pages, but it is only a collection of Javascript functions. In conclusion, the GUI for a web application is essentially limited by what a combination of the trio of Html, Javascript and Style sheets can achieve.

Help as the right most item on the menubar of an application is possibly on its way to extinction. The only logical reason must be that it is more expensive to hire a tech writer write up that document as opposed to having people manning the phone line and chat windows for a more personalized assistance.

Internationalization, like everything else, has its time and place. When I am planning a romantic trip to Greece or a business expedition to Latin America, I do not want the map to be in the local languages - it will be all Greek and Latin to me! I can say Mushi mushi on the phone, and even muster Namaste or Nihao, but if I need to learn Thai, Mandarin or the different Japanese script to read the map while I am there, the software generating that map become pretty much useless to me.

Jquery, JScript, Jguru and all the other sons of J must be in love with that letter. May be it gives them a business advantage over that evil emperor of the PC world. They ought to be very, very careful though, because the company that invented the letter got taken over by the wizard of O.

Kind hearted individuals known as bloggers should be accredited for providing almost all of the revlevant information required for programming in the modern world. Authors of technical books take a distant second place with their obsolete and outdated books and journalists covering the technical aspects of the software world are pretty close to adhering to the oldest profession known to humanity.

Love is difficult to find on the internet unless one is prepared to shell out blobs of money. There is a lot of enticing pictures and provocative videos available free of cost, if that is our cup of tea.

Money is becoming the driving force for the development of almost all internet based applicaions, whether for the desktop or handheld devices. This is to be expected and not come to us as a surprise, since our honeymoon with the internet has been over about a decade and a half back.

New architecture or a novelty in design is hard to come by, since it will be untested by definition and not very cost efficient for implementation in a commercial system. Most of the time we need to put up with old technology in a new and expensive package. But, if the business leaders are OK with such business practices, software professionals should not be overly concerned.

Orthogonal development efforts in content management and its presentation are divergent and poses a problem for project management. The main reason is that the two groups will come up with incompatible solutions and both will have to reengineer their parts to come upto a middle ground. If there is no time for this, we shall end up with a lousy product.

Plagiarism is an accepted form of information exchange these days, as long as a link is posted to the source. There are 2 reasons for this: (1) Bytes are cheap, so instead of making up alphanumeric citation indices like [MS1974], we could copy and paste entire paragraphs of text, as long as we acknowledge the source, and (2) The source Url might vanish some day unless they are maintained online by an organization like IEEE chapter on the Sea of Links. It is better to capture more of the text in our documents.

Quiet and silent applications still rule, despite all the improvements in multimedia technologies. The reason is that as human beings, we like to keep one of our sense organs available to respond to emergencies or phone calls while working with the application.

Robust applications are no longer in style or even being built. They are expensive, and we need just enough functionality for it to meet the requirements and not break. This is why banks still use their AS400 systems and the people who could be writing robust software have mostly retired. The other issue is sellability, if we build a robust version of anything, it will be difficult to sell the next version. This is why we need so many patches and frequent upgrades, although software components are not supposed to decay like like perishable consumer products.

Server side development is all we can expect for any project. As we have described in the main article, all the client side software is embedded in the web browser over which we have no control.

Top down design is a myth from the past. We do not architect nothing no more. It is all abstracted out and compiled into libraries free to download. They say all the logic for a program should be written in XML, letting the libraries do the rest. We are not sure why we need a programming language any more.

Underground blogs, chat networks and file sharing serve the best interests of the citizenry. Most of these are free and the folks working at these networks are genuinely helpful and sincere, unlike our fake businesses and leaders who have lost their moral compass and ethical grounds in their quest for short term profits and golden parachutes.

Voice controlled applications are gaining ground in [auto] mobile industries. From the success of recent voice controlled personal assistants, we can infer that in near future, such assistants will provide personal companionship of a more intimate nature, the way our society is getting more and more fragmented.

World Wide Wait is not going to get saturated anytime soon. The bandwidth is just going to be another commodity. It remains to be seen who will pay for the petabytes of spam on the internet. It is sort of amusing that we create the spam engines to generate all the garbage and then write spam filters to filter them out of the mail boxes.

Xenomania is an inordinate amount of attachment to or a mania for foreign customs, institutions, manners, fashions, and cheaper workers. We can expect more jobs in every economic field outsourced to or gobbled up by foreign corporations, because of this xenomania of our business executives. Yes, money is an important concern, too.

Y2k was the last problem solved by the Computer Scientists. More than a decade has passed since then, and there has been no creative development, not a single language design, no architecture in the CPU (we are still stuck with the old CMOS technology), and we expect this trend to continue for a while.

Zeroing in on a solution is every bit as important as starting out and looking for a solution. Philosophically speaking, the path is as important, if not more, than the destination. OK, so we got all that high level of talk the other way, and hopefully no one will ever notice. Anyways, we are in the quest to solve little problems on our own, and that is what this web site is about. Thank you for reading.

Top of Page
Bonus!       Free!       Unmasked!
Additional material not to be found anywhere else on this web site!

By the way, if you are interested on what the browser check failures mean near the top of the page, here is the box again, with explanation of the errors. A quick note on block indentations: the indentation for this block should be identical to the one preceding up, up there. One of our test browsers is doing it correctly, the other is adding a few more pixels for the top one. More browser bug, but this one is not a killer bug. Anyway, please ignore this section in case you are using a super browser with full CSS compliance and did not have any of the errors. In fact, if you have such a browser, we would like to hear about it it too, and would request you to share the information, just in case it is not a piece of secret and proprietary software. Here are some of the results that we are seeing:

Comparison using 2 browsers

Floating up by text not working How it is expected to be
Title, image hiding below header, poor line break How it is expected to be
CCBot/2.0 (http://commoncrawl.org/faq/)