Did you know ... Search Documentation:

Wouter Beek earned cum laude PhD!

0 upvotes 0 0 downvotes
Picture of user Jan Wielemaker.

Wouter Beek successfully defended his thesis "The ‘K’ in ‘Semantic Web’ stands for ‘Knowledge’" at the VU. He earned cum laude PhD, which happens to only about 5% of the computer science PhDs in the Netherlands!

Wouter's work depends to a large extend on the SWI-Prolog semantic web infrastructure. He contributed with many bug reports and patiently explained all the subtle things about the relevant W3C standards to me. In addition he developed the semweb/rdf11 library, providing a much cleaner API to deal with RDF than the original semweb/rdf_db. Wouter's contributions made the SWI-Prolog semantic web libraries robust and standard compliant. It is now to use them for expressing knowledge!

Wouter, congratulations and thanks for the (still ongoing) collaboration!

SWI-Prolog Class!

0 upvotes 0 0 downvotes
Picture of user Anne Ogborn.

We're offering an 8 week course in SWI-Prolog.

It will cover not only the usual material of a basic Prolog course, but as much of the SWI-Prolog system as we can fit in what looks like it's going to be 8 very intensive weeks.

Starts June 8. The textbook will be Clocksin and Mellish, Programming in Prolog, using the ISO standard, 5th ed.

Read more and enroll here.

Version 7.6.1 released

0 upvotes 0 0 downvotes
Picture of user Jan Wielemaker.

Version 7.6.1 has been released. Highlights:

  • Several race conditions in atom, functor and predicate `supervisor' installation have been fixed. Thanks to Keri, being a perfect detective! This work includes the installation of memory barriers, needed to avoid reordering memory access on e.g., ARM and powerpc.
  • Race condition in windows sockets. Keri.
  • Port: ARM: unsigned char issue in RDF Turtle parser. Added recognising ARM and powerpc in configure.ac to build by default as a shared object configuration.
  • Avoid unnecessary creation of modules for several built-ins.

Security Vulnerability in Pengines

0 upvotes 0 0 downvotes
Picture of user Anne Ogborn.

This weekend Vladislav Zorov reported a vulnerability in pengine sandboxing.

This vulnerability allows any user who can create a pengine to execute unconstrained prolog code, including process_create.

The vulnerability can be triggered simply by loading pengines.

This vulnerability was patched with commit


We recommend all pengines users upgrade to this release or later.

Big thanks to Vladislav.