Digital humanities Specialist

Central Plains Network for Digital Asset Management (CPN-DAM) was founded in October 2015. It has a regional focus encompassing Kansas, Missouri, Nebraska, Colorado and Oklahoma.
The network’s vision is to provide professional development, networking and collaborating opportunities for professionals involved or interested in digital asset management.
The network is open to all professionals from all backgrounds, including programmers, system administrators, librarians, digital humanities specialists and cultural heritage professionals.
To serve the regional focus as the leading educational and networking resource for professionals involved with or interested in digital asset management, as a mission, CPN-DAM has too an open and active community at Google+ that may be of your interest when stumbling.

Why? Simple. You may be a digital humanities specialist with a will to learn about preservation and classification of cultural heritage, read case studies of incorporating linked data controlled vocabularies in existing systems, know about case studies of linked data implementations, or case studies of using -- or Bibframe a conversion programs that apply the Library of Congress conversion specifications -- if you or your company are located to provide structured data on the Web.

Personal and public interests that may benefit from the advantages, case studies and practical professional development in all stages of digital asset management. All of them applied to design, business intelligence or business information, to name a few special cultural or technical profiles.

if you figure,as I do, that data is an asset, and management is a must, or if you wonder What is a digital project for businesses/corporations? , How are completed digital projects being marketed to increase traffic to them? there is a welcome hosts and attendants to its Practicing Digital Asset Management: Present and Future (2017)

A one, two-day conference this yours truly was kindly invited last year. A place where, as a professional of all backgrounds, I am kindly invited to attend this year's virtul conference.

 Moreover, this post is not sponsored, dude, there was just the noble intention to share my virtual location next on November 7th, 2017.

It seems that fortunately, Britons are welcome, too. Yum!.

Original Software

The Facebook has announced that it will release its popular open source React, Jest, Flow and Immutable.js projects under the MIT license, abandoning the Facebook BSD+Patents license for those projects.

Facebook re-licensing React.js is good news for all you, WordPress developers.

From my point of view, there is an understanding and couple of reasonable facts about the arguments and reasons why a company like Facebook, would still preserve its right on its own property, opening the code to third parties, which is still misunderstood as being open-sourced.

First, we all know what open-source means you take something from the community or from the earth (like water or wind) and you make use of it for your purposes. No reader of this blog, invented the first computer device, I guess. Open source enables a development method for software that harnesses the power of distributed peer review and transparency of process.

Secondly, you distribute the source code you have developed, through the proper powered distribution channels provided by the community such as repositories: distribution through embedded models in the same application< and third parties can and should inspect it and review it, with the proper tool. We do all agree with the transparency ethical attribute when working in code.

After investing you time, licensing the code, there is the notated open-sourced obligation to allow modifications and derived works, to must allow them to be distributed under the same terms as the license of the original software.

Here comes trouble.

Derived works means giving free drinks around to your competitors, face it before you full your mouth with kind words. No one can assure quality in derived works. And quality is the essence of well-written software.

In the case your code is the root upon your company stands up  -- and some companies, like Facebook, have been building, writing and even litigating for code reasons unnecessarily, over the last decade -- licensing under heavy manners may be negative for you and all your team. Your society does not fill well into the open society and its enemies.
Negativeness solely based on the vision and added value you company holds. Do not misunderstood me, please. This is nothing against public wealth, but against the vision some mates like that Proudhon has on private property. A devastating vision product of a lunatic visionary who wrote in french language. And this vision impregnates the idea of open-source.

Interfaces, communication or integration, are built in our era mostly using CMS tools, no matter if they are open nor closed, neither free ( the last in the list is the term you wrongly associate with source).

For this purpose, the move The Facebook has done changing its license terms is good for the community. it means some other methods of revenue have to be found. and means that your social platform, maybe, just maybe, one day will no longer be free of use in terms of subscription.
React a Javascript library to build interfaces, now is open source.
Immutable, a functional tool, intended for functional programming, is also free of use, under the Apache License terms.
Community, it's time to work to make better these tools. No bugs, please.
because of it is my guess, most of these tools (libraries) were built having in mind processes The Facebook offers to its clients: voting, ad insertion, and other feauterettes, your business model may not need at all.
Widgets oriented to business of which your neutral and open code may not benefit from. Because of code is built and written with a single purpose in mind. As when using a tool you won-t be using the SQL language to write templates for webpages, nor Javscript with the single purpose to validate forms in the client side.


Even the infamous K. Marx showed a little respect and consideration for private property, and oriented aspects, if property does not means alienation. This is , your code belongs to me , so you are at my disposal. Shutting down platforms has been a normal activity in the last decade. No one writes code using the libraries provided by Nokia, Blackberry, either Opera Mini. Time spent with no profit returned. Freedom of trade, of a choice, presupposes property rights. Being materialists or Aristotelian if you rather prefer it, every man and woman is responsible of its own property, body and soul, which we all know it come inherited from our ancestors.
Now it is certainly easy to say to the single individual what Aristotle has already said: You have been begotten by your father and your mother; therefore in you the mating of two human beings – a species-act of human beings – has produced the human being.
You, your choice, your code is your child. Being you in the community  the ancestors won-t like you to fall down.

Custom Built

Readers may have noticed I have not paid very much attention to the brand new gadgets Apple Inc has provide us after a year of hard work. Not a single written line about the event. Which is unusual in this, yours truly, writer

Reasons for this, on purpose oblivion, may be due to focus and efforts on different interests, at a level of personal professional interests speaking, over last months. Professional interests which differ from that ones animojis represents. Bureaucratic stuff besides all, too.

So here below, a few words.

Animojis do not represent a solid and conceivable reason to get a new phone. not even a big screen. I am not interested in screens neither sizes anymore. They are outdated. Too much nineties concept.

Straight now, I do not even wear an Apple Watch, even I love the idea and the design behind the device, and the code and software served. I still keep and wear a simple, silver stained pocket watch. Looking further to the timeline of life, sure I will get one, but not right now. Wearables will be, one day or another In a forthcoming near future, outdated by the power of IoT. Like CD Players. Still a nice approach.

However, due to some professionals activities of mine in the past, I would like to express some impressions of mine on the matter -- yes, it's not cool anymore to make a grammatical use the first pronoun person narrative in written blogs anymore. Sadly I am a first person re-teller -- and my perception in  the use of Apple's products

I was having a look at the show, once was published worldwide for the common people. The rest of us. There was a curiosity floating, not for  precise reason, but because of an article written by a once famous Apple devoted persona, who I personally know and from whom I have a lot of professional respect, that caught my attention. He is on advising and art direction these days. Years ago he was one of the coolest minds in design and web programming. And art direction is quite related to Apple more than anyother tech company. The rebel ones.

For this, I visioned the show, much more glamorous than other from competitors, and my impressions were a little poor. Except if you re a n investor and except for one thing:  he thing is that one can not agree more on the best momentum of the show, than the one John Gruber describes to us in his blog, which reads as follows:
Craig Federighi, demonstrating the new animoji feature by turning his face into an animated pile of poo: “If you were wondering what humanity would do when given access to the most advanced facial animation, now you know.”
This is the sign of times, and Apple is on the road. Do not blame on Apple for not being ahead of our needs, except if you get paid to writ such a things. It’ a simple question of humanity behaviour.
It is my personal impression, after visiting the show, Apple still cares about humans, not focusing on buyers, respecting them, and what's more important, not degrading our condition of human beings calling us "audience". Which is
pretty good.

But not, for the same reason I do not wear an Android phone, I am not buying a new gadget from Apple. You should, but to me, it's not the right option by now.

You should, but to me, it’s not the right option for my needs, by now. Except for the reason to test and work with the most advanced facial animation technology we ever have known, I find it missing  — and in this I also agree with Mr. Gruber —  , that little perfection for details that is hidden in every perfect work, beyond its natural updates.

But because of you are human, you should not give the back to the new Apple’s innovative products. They are pretty custom built to your needs, to what humanity would do.

Global Networked Information Environment

The National Information Standards Organization (NISO) announces the publication of a new Technical Report,NISO TR-06-2017, Issues in Vocabulary Management determine the needs and requirements for extending the usability of the new bibliographic framework into the global networked information environment and to develop community consensus for a roadmap of activities needed in this space
Further Information:
Via niso dot org, a place where content publishers, libraries, and software developers turn for information industry standards that allow them to work together.

You can't win if you don't enter

You may want to demonstrate to the world the effectiveness of your mobile development capabilities.
The Web Marketing Association is proud to present the sixth annual MobileWebAwards competition
6th annual MobileWebAwards Awards

The deadline for entering the 6th annual MobileWebAwards Awards is

Like Paintings

Web design is the creation of digital environments that facilitate and encourage human activity; reflect or adapt to individual voices and content; and change gracefully over time while always retaining their identity.

If websites are architecture, why do we sell them like paintings?. Old gold from 2007. Via Jeffrey

Ps: Do not miss the list of wannabe commenters. ten years later, is priceless.

Index of Think

The W3C Thing Description (TD) is a central building block in a Web of Things (WoT) enabled system and can be considered as the entry point of a Thing (aka the index.html of the Thing).
The TD consists of semantic metadata for the Thing itself, a narrow-waist interaction model with WoT's Properties, Actions, and Events, a semantic schema to make data models machine-understandable, and features for Web Linking to express relations among Things.
Think on the Thing. Is just an index.

via Web of Things members

How to find a balance

The Web Marketing Association announces the winners of its 21th annual WebAward Competition for Web site development.

Entries in 96 industry categories were judged on design, copy writing, innovation, content, interactivity, navigation, and use of technology.

A complete list of the winning sites can be found at the WebAward Web site at

Congratulations to you winners who helped make this industry leading award program a success.

Let me express my gratitude to the WMA, overall for its excellent and sophisticated work behind, too, This yours truly, helping as an invited judge, behind the scenes.

See you in the forthcoming edition.

Wise Blood

Five ways data-driven marketing can transform your business into a machine that can leave the competition in the dust.

As i do, to define right goals and performance indicators, make better business decisions faster, so you will spend budget more profitably and, why not, your company will reach the excellence it deserves.

Via Adobe

Addenda, Uh, speaking about graphics and visuals, here you can see the idea number 64360 for the forthcoming winter. Vote.

Design is a crucial element

“Small changes, like a few extra pixels of padding or the tint of a button, can have large and unexpected repercussions,”
Segonquart Studio Designed Website: Nasty Mondays circa 2010
Hand Crafted Design nastymondys @Segonquart Studio circa 2010

Designing to encourage addictive behavior is a studied skill. We all knew it, sorry lads.

 Via Anne Quito

Fix Your Wagon

Drupal has released an update for its content management system (CMS) to address several critical security issues. Drupal 8.3.7 includes fixes for three vulnerabilities. Drupal has also issued a security advisory for Drupal 7.x.
Via Lee Neely 


And meanwhile, some hidden secrets from Segonquart Studio  In Motion, circa 2006
Posted by Segonquart Studio on Sunday, August 6, 2017


1.- A professional [designer]combines creative criteria with sound problem-solving strategy to create and implement effective communication design.

2.- A professional [designer] solves communication problems with effective and impactful information architecture.

3.- A professional [designer] conducts the necessary research and analysis to create sound communication design with clearly stated goals and objectives.

4.- Any self-promotion, advertising or publicity must not contain deliberate misstatements of competence, experience or professional capabilities..

5. -It must be fair both to client and other designers.
Business and ethical expectations which may -- and should -- be applicable to other fields of practice in our modern world. Becuase of when you solve problems, you act either as an architect, either as a designer.

Now there is the time we may need  to stablish a model of conduit for our digital age and assets, nothing better than the quoted from an ancient article and debate, circa 2004 at AIGA,  an authority on professionalism.

Number five looks hard in our age of selfies and vanity, but it charms me. Even at the peril of being hacked. Again.


WebAssembly in Firefox
WebAssembly. Future is Now.
WebAssembly or wasm is a new portable, size- and load-time-efficient format suitable for compilation to the web.

A Open standard plus more efficient than JavaScript, if you care about encryption and DRMs.for gaming et al.

Efficient binary format, that also has support for non-web embeddings., with eight hundred and something kids working on it. And you.

mkdir hello


: WG Action: Conclusion of ART Area General Applications Working Group (appsawg)
The APPSAWG has completed all of its milestones and is being closed.Thank you to past and present WG chairs, editors of WG documents, as well as WG participants, who together produced 35 RFCs since 2011.
Well-defined security issues, as well as calendaring, date and time formats, HTTP, internationalization, language tags, MIME, URIs and XML,  or small-scale additions to the protocol stack for HTTP and other application technologies, mostly related to service discovery and meta-data, were the main subjects discussed at the appswg working group from 2011 till 2017.

Discussion of new ART area topics should now will be brought to the DISPATCH WG.

Mission accomplished. You have done a great work. Me? well I was just an observer, more or less.

In your pocket, at your wrist, and on your desktop

A working group of experts at the IETF, in concrete ART Area General Applications Working Group (appsawg) is enhancing and updating a protocol. An access protocol, using precise terms.

This access protocol is the one that defines the access to your calendar; the one we technical people know as CalDAV, an open-standard

 CalDAV is designed for implementation by any collaborative software, client or server, that needs to maintain, access or share collections of events.

CalDAV is a real barebone protocol in our days Any collaborative software means the ones you make use everyday without noticing, as transparent as phone calls. Thus includes tasks, reads, and events in your daytime ( calendars , chats, whatsapps, whatever).

Some examples of software that makes your professional life easier may be free personal mail like  MSOutlook, Apple Calendar for IOs, Yahoo Calendar, Google Calendar et al.

The working proposal is featured in section 3.4 of the document. refers to some procedure in this collection of events

This specification defines an extension to the calendar access protocol (CalDAV) to allow attachments associated with iCalendar data to be stored and managed on the server.

Some problem this working group tries to solve are here exemplificated:   To add an attachment to an existing calendar object resource and the access for that event. What measures have to be implemented on the server to ensure the correct request allowing associated data? Which is the best method to ensure the security and wealth of the system and the solicitor after this request? What happens if a user --man or machine -- issues a POST method with attachments than can corrupt or damage the server or the data?

Brought to mind by the excellent work of Julian Reschke 

No distinction , not even required for that obsolete Mobile First development.  CalDAV acces protocol applies both to desktop and mobile devices. Another myth broken by this clean open-standards.

The rest, as always, is silence.

Saying ‘No’ is a UX Strategy Play

I never felt comfortable with the term "user", really.

Not when we are in a media like the web is. Indeed.

Indeed, there was a nice debate, in a niche of experts we met in a subscription list.

I guess the Web Marketing Association board, once, couple of years ago put the question over the question over the table. To find an answer, to solve a problem. t "What if we mean audience instead of users?"

The term audience fits better, like a hand in glove, like the term "people" when we design an strategy plan.

UX strategy plays range from providing regular usability testing, to introducing design studio workshops, to shifting the roadmap from a feature focus to a customer-problem focus.

delivered after reading Jared M. Spool's reflexions on playbooks.

Play it safe. No tricky timing.


IraLis (International Registry of Authors-Links to Identify Scientists) is a standardization system of scientific authors' signatures.

The promoters were academic and professionals with wide experience in many different areas of activity in their profession, and who are deeply involved in the communication of scientific matters, Even it might seem abandoned, which is not,  IraLis still is a cute repo of use to find the specialist you want

Delfi Ramirez at IraLis
Delfi Ramirez at IraLis

IraLIS was a hype in between the years 2002 and 2010 of our modern era.

Still working. Still indexing.


Shape It Up

Dan wrote an email in which there is the greatly appreciated input for you to fill the gap and the form provided

Constance invites you to unleash your imagination, in a proper way arguing pros and cons.

The question is simple: What do you think must be done to ensure the development of an open, trusted, accessible, and global Internet in the future?

You can take part and place your fingertip in the sand of History, here

Some conversations in these project were already  presented to UN trade experts in April, 2017 in Geneva.  but there is still  a lot to do.

The main intention is to help develop these recommendations to Internet leaders and actors, and policy makers if any for an open, trusted and global Internet in the Future.

A future which is occurring now, by the way. Uh.

I'm done. Your turn. 


An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials. The cracker obtains access to the computer systems or networks of the enterprise, and then conducts activities intended to cause harm to the enterprise.
What is an Insider threat, terms, references and all we need to know for the glorious summer by this sun of York, with same recommendations to prevent this nasty dwarfs who make the profit on the theft of information or corporate secrets; as you walk through the Internet.

You may not want to loose your wallet, if all your assets are digital. Which they are, in fact.

Via Margaret Rouse.

Individual and Team achievements

 2017 WebAward
There is now only one week left to enter the Web Marketing Association's 2017 WebAward Competition.  The WebAwards recognizes the individual and team achievements of Web professionals all over the world who create and maintain outstanding Web sites. The Competition Web site is located at and the deadline for entry is Wednesday, May 31, 2017.

18 Byte file, $14k bounty

I never felt comfortable using ImageMagick for desktop. Not under Ubuntu neither OSX. Really.

Not because of that, ehr, embrittled graphic user interface that most of the old open-source command software inherits. As if being open source means to be unpleasant.

Just because it was buggy. You had the feel it was buggy. Vulnerable.

Chris, feels the same. and does it technically in his analysis of the Yahoobleed :  A tricky vulnerability to spot because of the abstraction and also because this is a vulnerability caused by the absence of a necessary line of code, not the presence of a buggy line of code.

The ImageMagick Studio team did a great work back in 1999. But in our days there are no wizards, in a world of decreasing memory corruption and increasing sandboxing.

A world where  *bleed bugs provide a compelling option for easily stealing information from servers.

As that noble prized once sang, times are changing. Good bye, then , to the Ol' black magick. And it minds to me because of, in that old gone days,  before using c I was a fellow client of the yahoo email service.

And even in those prehistoric days, I never felt comfortable using ImageMagick.

ImageMagick was posted to Usenet's comp.archives group on August 1st, 1990.

Get yourself deepen on Yahoobleed  here, here and there

Via Jake Williams

The Good, The Bad. No Ugly

The Good

A kind public invitation for you to take part and visit the most celebrate meeting of the Infosec peepers community in Europe.Where hearts are entertaining June.

It does not mind you are a seller, a webmaster, a professor, or a thief. The brand new things brought and fresh delivered to you, by worldwide experts and professionals from the arena of applications, web services, care, analytics or services for you or your selected clientèle has a brunch in June.
As the annual meeting place for the industry, Infosecurity Europe brings together professionals from all around the globe and supports the community by providing opportunities to connect, be inspired, and learn how to overcome the latest security challenges.

Do your part to ensure that your organisation is prepared for future threats?. Sure you will kids.

Spread the word and invite your colleagues to join Infosecurity Europe in June as this yours truly does now - by sharing insight and lessons learned amongst the information security community, cyber defenders can protect against the threats of tomorrow.

An Initiative from Reed Exhibitions, with still a million things to say here.

The Bad

Server services and domains at Segonquart Studio will be out of reach for a week. Meeh.

Uh. No panic. Down for a while, old skool method. Tomorrow was another day.

No Ugly

One thing that i am certain of.

Great things happen when the World agrees

Some links of use, for this Warre of May, because of great things always happen, when we agree.

Design focused and for your pleasure only.

The Dublin Core metadata element set -- Part 1: Core elements” is now published.
ISO 15836-1:2017 establishes 15 core metadata elements for cross-domain resource description. These terms are part of a larger set of metadata vocabularies maintained by the Dublin Core Metadata Initiative.

Translating UX Goals into Analytics Measurement Plans
Designers have often been told to focus on outcomes, not features, so that they solve the right problem instead of building the wrong thing.

A revised Candidate Recommendation of ActivityPub
The Social Web Working Group invites implementation of a revised Candidate Recommendation of "ActivityPub." ActivityPub allows websites a direct social connection to user software, including Follow, Like, Share, and Comment, without an intermediate social network provider.

A company that designs and manufactures exceptionally soft and comfortable children's sleep and loungewear.
RocketHub: What is your professional background?
Suzie Levett: I previously practiced Naturopathic medicine in a women's health and fertility clinic in Sydney.

What's My Risk?

The Open Web Application Security Project (OWASP) announced on Monday the first release candidate for the 2017 OWASP Top 10, which proposes two new vulnerability categories, The OWASP Top 10 2017 RC1.

A lot of discussions and opinions, here and there, by this project lead by Dave Wichers; not due to his leadership attributes but instead on the fact this new list may be obsolete (uh) but necessary, as it is de facto an standard for web professionals and now, in our decade, security IT professionals too.

Good news every four years are always good news. Think yourself in positive, Even this yours truly may be critical for several objective reasons with this RC1, the most vane reason because once, not so long ago, his candidature for an OWASP open position was kindly rejected ( no reasons, no need for a reason neither); in a world of private contractors and tons of assets offered by this contractors and professionals ( think theRSA), this volunteer based initiative deserves no less than respect.

Judge for yourself and help maintain and develop this. Be smart.


Multi-Cost ALTO

Applications using the Internet already have access to some topology information of Internet Service Provider (ISP) network.

There is a working-draft discussed now at the IETF, quite promising, entitled draft-ietf-alto-multi-cost-09 with an intended status of standard track.

The ALTO (Application Layer-Traffic Optimization) Protocol ([RFC7285]) defines several services that return various metrics describing the costs between network endpoints.

The document defines a new service that allows an ALTO Client to retrieve several cost metrics in a single request for an ALTO Filtered Cost Map and Endpoint Cost Map. In addition, it extends the constraints to further filter those maps by allowing a client to specify a logical combination of tests on several cost metrics.

Authored by S. Randriamasy, W. Roome from Nokia Bell Labs, and N. Schwan from Thales Deutschland

If you want to know more about it, please follow the paths.

Expires: October 27, 2017

PMXPO 2017

PMXPO 2017, coming THURSDAY, April 27, 2017 at 10:30AM ET. It's the biggest virtual Project Management event of the year, brought to you by, the world's biggest online community of project professionals. Be sure to log on to enjoy a full day of informative and entertaining presentations while earning PDUs.

See you inside, as soon as you have complimented this URL to enter the expo:
Older Posts Home