fleur-de-lis

IraLis (International Registry of Authors-Links to Identify Scientists) is a standardization system of scientific authors' signatures.

The promoters were academic and professionals with wide experience in many different areas of activity in their profession, and who are deeply involved in the communication of scientific matters, Even it might seem abandoned, which is not,  IraLis still is a cute repo of use to find the specialist you want

Delfi Ramirez at IraLis
Delfi Ramirez at IraLis


IraLIS was a hype in between the years 2002 and 2010 of our modern era.

Still working. Still indexing.

U+269C

Shape It Up

Dan wrote an email in which there is the greatly appreciated input for you to fill the gap and the form provided

Constance invites you to unleash your imagination, in a proper way arguing pros and cons.

The question is simple: What do you think must be done to ensure the development of an open, trusted, accessible, and global Internet in the future?

You can take part and place your fingertip in the sand of History, here

Some conversations in these project were already  presented to UN trade experts in April, 2017 in Geneva.  but there is still  a lot to do.

The main intention is to help develop these recommendations to Internet leaders and actors, and policy makers if any for an open, trusted and global Internet in the Future.

A future which is occurring now, by the way. Uh.

I'm done. Your turn. 

Insides

An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials. The cracker obtains access to the computer systems or networks of the enterprise, and then conducts activities intended to cause harm to the enterprise.
What is an Insider threat, terms, references and all we need to know for the glorious summer by this sun of York, with same recommendations to prevent this nasty dwarfs who make the profit on the theft of information or corporate secrets; as you walk through the Internet.

You may not want to loose your wallet, if all your assets are digital. Which they are, in fact.

Via Margaret Rouse.

Individual and Team achievements

 2017 WebAward
There is now only one week left to enter the Web Marketing Association's 2017 WebAward Competition.  The WebAwards recognizes the individual and team achievements of Web professionals all over the world who create and maintain outstanding Web sites. The Competition Web site is located at www.WebAward.org and the deadline for entry is Wednesday, May 31, 2017.

18 Byte file, $14k bounty

I never felt comfortable using ImageMagick for desktop. Not under Ubuntu neither OSX. Really.

Not because of that, ehr, embrittled graphic user interface that most of the old open-source command software inherits. As if being open source means to be unpleasant.

Just because it was buggy. You had the feel it was buggy. Vulnerable.

Chris, feels the same. and does it technically in his analysis of the Yahoobleed :  A tricky vulnerability to spot because of the abstraction and also because this is a vulnerability caused by the absence of a necessary line of code, not the presence of a buggy line of code.

The ImageMagick Studio team did a great work back in 1999. But in our days there are no wizards, in a world of decreasing memory corruption and increasing sandboxing.

A world where  *bleed bugs provide a compelling option for easily stealing information from servers.

As that noble prized once sang, times are changing. Good bye, then , to the Ol' black magick. And it minds to me because of, in that old gone days,  before using c I was a fellow client of the yahoo email service.

And even in those prehistoric days, I never felt comfortable using ImageMagick.

ImageMagick was posted to Usenet's comp.archives group on August 1st, 1990.

Get yourself deepen on Yahoobleed  here, here and there

Via Jake Williams

The Good, The Bad. No Ugly


The Good

A kind public invitation for you to take part and visit the most celebrate meeting of the Infosec peepers community in Europe.Where hearts are entertaining June.

It does not mind you are a seller, a webmaster, a professor, or a thief. The brand new things brought and fresh delivered to you, by worldwide experts and professionals from the arena of applications, web services, care, analytics or services for you or your selected clientèle has a brunch in June.
As the annual meeting place for the industry, Infosecurity Europe brings together professionals from all around the globe and supports the community by providing opportunities to connect, be inspired, and learn how to overcome the latest security challenges.

Do your part to ensure that your organisation is prepared for future threats?. Sure you will kids.

Spread the word and invite your colleagues to join Infosecurity Europe in June as this yours truly does now - by sharing insight and lessons learned amongst the information security community, cyber defenders can protect against the threats of tomorrow.

An Initiative from Reed Exhibitions, with still a million things to say here.


The Bad

Server services and domains at Segonquart Studio will be out of reach for a week. Meeh.

Uh. No panic. Down for a while, old skool method. Tomorrow was another day.

No Ugly

One thing that i am certain of.

Great things happen when the World agrees

Some links of use, for this Warre of May, because of great things always happen, when we agree.

Design focused and for your pleasure only.

The Dublin Core metadata element set -- Part 1: Core elements” is now published.
ISO 15836-1:2017 establishes 15 core metadata elements for cross-domain resource description. These terms are part of a larger set of metadata vocabularies maintained by the Dublin Core Metadata Initiative.

Translating UX Goals into Analytics Measurement Plans
Designers have often been told to focus on outcomes, not features, so that they solve the right problem instead of building the wrong thing.

A revised Candidate Recommendation of ActivityPub
The Social Web Working Group invites implementation of a revised Candidate Recommendation of "ActivityPub." ActivityPub allows websites a direct social connection to user software, including Follow, Like, Share, and Comment, without an intermediate social network provider.

A company that designs and manufactures exceptionally soft and comfortable children's sleep and loungewear.
RocketHub: What is your professional background?
Suzie Levett: I previously practiced Naturopathic medicine in a women's health and fertility clinic in Sydney.

What's My Risk?

The Open Web Application Security Project (OWASP) announced on Monday the first release candidate for the 2017 OWASP Top 10, which proposes two new vulnerability categories, The OWASP Top 10 2017 RC1.

A lot of discussions and opinions, here and there, by this project lead by Dave Wichers; not due to his leadership attributes but instead on the fact this new list may be obsolete (uh) but necessary, as it is de facto an standard for web professionals and now, in our decade, security IT professionals too.

Good news every four years are always good news. Think yourself in positive, Even this yours truly may be critical for several objective reasons with this RC1, the most vane reason because once, not so long ago, his candidature for an OWASP open position was kindly rejected ( no reasons, no need for a reason neither); in a world of private contractors and tons of assets offered by this contractors and professionals ( think theRSA), this volunteer based initiative deserves no less than respect.

Judge for yourself and help maintain and develop this. Be smart.

OWASP ZAP ATTACK
OWASP ZAP

Multi-Cost ALTO

Applications using the Internet already have access to some topology information of Internet Service Provider (ISP) network.

There is a working-draft discussed now at the IETF, quite promising, entitled draft-ietf-alto-multi-cost-09 with an intended status of standard track.

The ALTO (Application Layer-Traffic Optimization) Protocol ([RFC7285]) defines several services that return various metrics describing the costs between network endpoints.

The document defines a new service that allows an ALTO Client to retrieve several cost metrics in a single request for an ALTO Filtered Cost Map and Endpoint Cost Map. In addition, it extends the constraints to further filter those maps by allowing a client to specify a logical combination of tests on several cost metrics.

Authored by S. Randriamasy, W. Roome from Nokia Bell Labs, and N. Schwan from Thales Deutschland

If you want to know more about it, please follow the paths.

Expires: October 27, 2017

PMXPO 2017

PMXPO 2017, coming THURSDAY, April 27, 2017 at 10:30AM ET. It's the biggest virtual Project Management event of the year, brought to you by ProjectManagement.com, the world's biggest online community of project professionals. Be sure to log on to enjoy a full day of informative and entertaining presentations while earning PDUs.

See you inside, as soon as you have complimented this URL to enter the expo:

BSOD

Microsoft Publishes Digital Geneva Convention Docs

Microsoft has published a trio of policy papers in support of a Digital Geneva Convention. Two of the documents describe rules for countries and technology companies to abide by in cyberspace; the third calls for establishing an international body to attribute malicious cyberattacks. In a blog post, Microsoft president and Chief Legal Officer Brad Smith, noted that while the G7 has "published a declaration recognizing the urgent need to establish international norms for responsible nation state behavior in cyberspace," voluntary norms do not go far enough. 
Smith, who spoke about a Digital Geneva Convention at the RSA Conference earlier this year, wrote, "We need to... pursue a legally binding framework that would codify rules for governments and thus help prevent extraordinary damage."
The software based company, the one that long time ago flourished your screen with a charming  electric blue colour, advances masked in this brand new century. MS is holding a vision,  Which make us aware because of is a serious proof that may confirm the Theory of the Evolution, and besides, is making an educated guess:  Rules for countries and technology companies to abide by in cyberspace.

Never is too late. Roger, Redmond. "You can always just cross your fingers, search the Web, and try again".

After reading my income email, via the SANS Institute 

RFC 114

April 16, 1971 -- 46 years ago

Abhay Bhushan of MIT first publishes FTP in RFC 114
A file may or may not have access controls associated with it. The access controls designate the users' access privileges. In the absence of access controls, the files cannot be protected from accidental or unauthorized usage.

Image: 2002 Rus Shuler @ Pomeroy IT Solutions, all rights reserved

Foster Collaboration

There is an interesting debate these days, for those who do not celebrate all Easter, at the WHATWG.( Web Hypertext Application Technology Working Group).

The discussion, mostly, arises to the new possibilities that the audio tag should present for future implementations of elements featured the HTML5 language and its associated DOM API.

Mostly the use of this label is of public interest in what concerns to the transmission in streaming of contents for the web.

Is It Worth It?

These issues are all foreign to the neutrality of the technology itself, but necessary to be taken into account and implemented in a World in which the WWW is the mass communication media par excellence.

The pre-development and research reflection on this matter, actually presents concepts as interesting as the discussion of the streamed content, titles and singular attributes, the analysis of ISRC codes and regulations, or the famous article 15 of the WIPO's treaty.

I noticed to Patrick the similitude between what is referred in the industry as royalties and the term funding for scientists. I just wanted to mention that in this post, to know your opinion.  The greatest payoff on R&D is social return-return to organizations that do not participate directly. Like dancers in a stage.

Aside note: Apologies, dearest reader of this blog, for the poor written English featured in the linked email source. Ye know, life is hard in hostile territory and I am missing aptitudes, specially writing emails to a subscribers list.


AUDIO HTML 5 TAG
Radio, live transmission.

Return to the source.

When an R&D project is finished, contractors and vendors may reap further profits based on their experience.
For this reason, the meta-data, new HTML-version 5-dot-something attributes, and other future aspects and enhancements the audio tag may present and offer in the future, are being debated among a few selected team of us.

And yes, memoirs came to mind. The debate brought to mind thecontents of that article in the ISOC, entitled A Brief History of the Internet, Part I, and written circa May/June in the year 1997.

Hence, an excerpt
The idea of open-architecture networking was first introduced by Kahn shortly after having arrived at DARPA in 1972. This work was originally part of the packet radio program, but subsequently became a separate program in its own right. At the time, the program was called "Internetting". Key to making the packet radio system work was a reliable end-end protocol that could maintain effective communication in the face of jamming and other radio interference, or withstand intermittent blackout such as caused by being in a tunnel or blocked by the local terrain. Kahn first contemplated developing a protocol local only to the packet radio network, since that would avoid having to deal with the multitude of different operating systems, and continuing to use NCP.

Conclusion

We are not talking about patent features here.The debate and the research done is the present is through the official mailing listThe mailing list archives are publicly accessible. "It was clear that these systems could be used from a distance and, more important, that they fostered collaborative user communities"

Memoirs came to mind  to avoid re-inventing the circle. Said all, time for brunch, fostering collaboration.

Footnotes

A toast In the memoir of Robert W. Taylor, a truly smoker innovator. Building upon the shoulders of giants.

This your truly, from the battlefield, hostile territory, proudly thinking about web hypertext, since 2004.

Provenance

"Provenance is information about entities, activities, and people involved in producing a piece of data or thing, which can be used to form assessments about its quality, reliability or trustworthiness."
A must read, on the PROV,  defining various aspects that are necessary to achieve the vision of inter-operable interchange of provenance information in heterogeneous environments such as the Web via @ W3C PROV WG.

Provenance is the 'who'.

What is Web architecture?

As cited in the year 2004, a public working document, [ the TAG ], explains to us that there are a number of architectural principles that underlie the development of the World Wide Web. Some of these are well-known; others are less well-known or accepted.
(...) Web architecture refers to the underlying principles that should be adhered to by all Web components, whether developed inside or outside W3C. The architecture captures principles that affect such things as understandability, interoperability, scalability, accessibility, and internationalization.

For understandability, it is important that specifications be built on a common framework. This framework will provide a clearer picture of how specifications for Web technology work together.

For interoperability, there are some principles that cross Working Group boundaries to allow technical specifications to work together. For example, W3C has adopted an architectural principle that XML should be used for the syntax of Web formats unless there is a truly compelling reason not to (refer to "Assumed Syntax", by Tim Berners-Lee). This principle allows broad applicability of generic XML tools and is more likely to lead to general protocol elements that are useful for multiple purposes.

For scalability, it is important to base current work on wide applicability and future extensibility. For example, it is a common principle in designing specifications to avoid single points of control (e.g., a single registry that all specification writers or developers must use).
Web Architecture, a professional area and a subset of the Web technology -- (e.g., "Design Issues," "What is a Good Standard?," and "Common User Agent Problems,") ---, explained and defined by the W3C's Technical Architecture Group (TAG) Charter

W3C's Web Accessibility Initiative and Internationalization Activity are already producing Architectural Recommendations in the areas of accessibility and internationalization, respectively.

Circa 2004, repeat, 2004.

Bid Her Good Bye

TextWrangler is an all-purpose text and code editor for Mac OS X, based on the same award-winning technology as BBEdit, the leading professional HTML and text editor. 

Bare Bones is sunsetting TextWrangler, after all these plenty years. And they encourage anyone interested in TextWrangler to download and use BBEdit instead.

I met TextWrangler more than a decade ago which means a lot of years, seen the distance and the time elapsed. As much of us did, I felt in love with her logotype. It says a lot of things, a kind of farewell.

TextWrangler
TextWrangler from BareBones


We look one each other and we became friends at a glance. TextWrangler helped me to meet my needs, to reach my goals, to achieve my timeliness and she helped me to be productive while pleasantly writing software. Or text.

Because we all know of software is written text. This is the reason what uniqueness fits for a project or a prototype. You can feel the hands and the mind that wrote the script, the objects, the bones.Feel them  just looking and reading that small piece of written software.

TextWrangler also helped me when I need or needed to upload via FTP, or SFTP a piece of text to the server. I must confess you that I learned to write software with TextWrangler, which may seem too lightweight for programmers.

She was of help, too, in a forensic exam, for a litigation process. "Look,  this has built done using a Bare Bones product". Period.

TextWrangler became one of my decisive and favourite tools, and she is not going to be updated, so you better change to BBEdit, manufactured in North Chelmsford, MA. You will have the same, exactly the same features your present toolbox contains. Not a miss but an improvement, wanting to assist his dearest and only friend.

Because of all our tools are important.

It's Time

The single biggest problem with UTC is that the decisions to add seconds are made by a committee a few months in advance of the change. And this results in time becoming unpredictable because it is never possible to know if we are dealing with a corrected or uncorrected time.
An approximation to correct measure, leap seconds an deltas in the net by Phillip Hallam-Baker, on Sat, 31 December 2016 21:32 UTC.
This would enable manufacturers to build devices with built in correction tables for a design life of one century which should meet everyone's needs.
Worth a read, at the IEFT Mail Archive. Quoted from  Predictable Internet Time.

News From The Fields

Why is Artificial Intelligence an ISOC matter?.

A question raised in the conversation on the topic for a draft policy paper developed on Artificial Intelligence which is high on the G20 agenda.

Internet Society [Member Number: 36154].
The goal of this paper is to explain a complex issue and also to offer a set of principles and recommendations to ensure AI services and products are developed and implemented in an ethical way. This is intended to be introductory and not an in-depth technical piece; ISOC is aiming to release it at the G20 Ministerial, later in April.
How much transparency may we get, do machines dream of electric sheep and all that current topics we as digitalized humans talk and care about.

There is a draft, a proposal on the AI subject, its  implications and how ethics may play a rule in the forthcoming future, or don't.

The current AI draft is available here in Box and is open for comments until 29 March: Here

If you wish to take part of this unique moment of democracy and human collaboration, if you have something to say about ; Please, read the draft and submit your comments to Carl Gahnberg and Ryan Polk

From this yours truly, Internet Society [Member Number: 36154].

Web Awards 2017

WEBAWARDS 2017

The 21st annual International WebAward Competition Call for Entry has begun. Adding an "award winner" to your profile starts with meeting the entry deadline. 31 05 2017

See you there!

PESTLE

An acronym for Political, Economic, Social, Technology, Legal, and Environmental, which are the ingredients needed for your business cocktail receipt. Serve it chilled, not stirred.
Collecting the technical indicators, the attribution details, and applying PESTLE-type analysis to these situations is key to determining if your business can make an appropriate choice for mitigating impact of the attack, given the company’s goals, current condition, and business operations.
Rob (Kraus) explians the method and the measure for a succesful PESTLE flavour and taste in his essay entitled Here’s What Industry Experts Say About Making Threat Intelligence Actionable

There is a mutual agreement with most of the explained in the article, experience with stakeholders included, fragrances from an early past. Two scenarios; the atomic level and the holistic level. What do YOU know that might benefit  MY company. So we help one each other. Products and services.

Worth a read. Worth a taste at The Recorded Future Blog.  Fresh delivered in the bar. Before the desserts.

Lights, camera, action

Intelligence takes this process a stage further by interrogating data and information to tell a story (a forecast, for example) that can be used to inform decision making. Crucially, intelligence never answers a simple question, rather it paints a picture that can be used to help people answer much more complicated questions. (...) This intelligence doesn’t directly answer the question of whether you should be given the organ, but it does aid in their decision-making process.
Threat Data, Information, and Intelligence: What’s the Difference? a collection of common terms that now  belong to the process and tailored bussiness decisions, including design and concepts, as you allready know, by RFSID on March 8, 2017, via @RecordedFuture.

Threat Data, Information, and Intelligence: What’s the Difference?

Clear and concise, this yours truly still have his own reserves and disagrees ( theoreticals, of course) on the Big Data assertions meaning with this the importance of being buzz. Worth a read.

Semantics 2017

May I define semantics as the fine art of surfacing the waves of natural language and written software language.

Sematics, a technique that was -- when a student -- the foundation of my career. And here we go:  SEMANTiCS 2017 - The Linked Data Conference is the 13th International Conference on Semantic Systems. noticed from Sebastian Hellmann to the semantic attendants of the lip and sailors aboard like you and this yers truly. Open to participation and splitting the night in the following matters, Semantics 2017 Conference is focused on:

 Web Semantics, Linked (Open) Data & schema.org ( like those we make use when designing websites ) Corporate Knowledge Graphs ( like those we send to our clients interest as a sum) , Knowledge Integration and Language Technologies ( something we learned at school or sinking stones for profit), Data Quality Management ( which is know as SEO techniques et al) and Economics of Data, Data Services and Data Ecosystems ( which is known as a feasibility study for the project -- something you do mentally everyday).

Need more?

Interest for the conference are listed below, so you can scope your efforts and save time, by the dawn's early light.


Call to participate is open now, underneath the street lamps till dusk or till dawn , next May 17, 2017 (11:59 pm, Hawaii time).

Semantics 2017, A conference. September 14-17 2017. Amsterdam. Where the sailors all meet.

Apologies for cross-posting.

52


Probably the best browser. That foxy one who once made you love the web, reaches now it's 52, seems so glad to be here.

Instead of a semester update, a deviation of a monthly continuous deploy, FirefoxESR 52 has matured and evolved with the web techniques. Now offering new tools at your disposal, new abilities, killing jar plugins ( but Flash Player), all these solid aspects are built for our and for your daily experienced basis. Solid ascpects as live CSS edition, with grids, and columns and future hacks HTML5's complete integration et al. This is why events unnerve me.

Firefox 52 ESR
 CSS grids with Firefox's new inspector tool

Firefox ages 52 and is out  and trembling in the streets. For your kids. For you nephew. For developers, too. Fifty-two, Both, ESR ( Extended Support Release) and  that version.

Whom for wheels are turning, be a professional. Choose the fox.

Updated  10th March 2017 16:53 GTM + 1: Klaus Hartnegg has written an article of this very special 52, that may be of your interest. Here


Fueled

Anyone who has ever been involved in running a business knows that an effective product or service does not guarantee success
So Dylan kindly wrote me and said, "Hey, Delfi, have a look at this Fueled Editorial!", which I gadly did, of course. Here it goes, briefly.

Fueled is about you and your needs. Their motto. Fueled is based in New York.

Idea+User Experience + Design + Bring Up Together

Closer to perfection . You have to explain how and what your client must expect. No hidden lies.Of course we all know about code and programming languages, it's our job to be up to day; but does the client has to know about them? I do not guess so. Not a serious studio or company will ever break a business conversation for an aspect of code. That's an inside, and insides belong to engineers.

An idea, how your customers will interact with this idea you love, what abut the design and the need for devices, and the final offer. Perfect. What you need to know is about website development for company succes.

There is a universally accepted fact in the business world: Proper branding is key to success.

Verizon or Barneys New York are brands that trust in Fueled

Reputation Is Vital

You have capricious behavior on the parts of opportunistic people, if there are no checks and balances to prevent them from behaving in that way. You might have the bureaucracy or government officials randomly changing rules without due process or checks and balances. You might have, in extreme circumstances, maximum economic instability. Or you might have political instability; you might have unrest in the streets.

Since we all agree Reputation and resilience are key ingredients that determine whether companies will survive tumultuous markets, not all the bad things occurs in developing economies.

One man may get atonished if he knows the facts that lies upon the bridge. Because reputations, your person, your brand, means what you are, the goods and eals your brand offers, the activity of a collection of human brains that work together to make this World, the best of the possible worlds.

Reputation is Vital to Survival in Turbulent Markets, an article written by Sean Silverthorne, featured in HBS this week.

After all these happens, resistance is futile.

Thank you, Satya

Nokia 3310 - 2017

  • 240x320.
  • 2.4-inch color.
  • Short Message Service
  • FM radio.
  • 2MP camera with an LED flash. 
  • Bluetooth v3.0, A2DP.
  • Web browsing is handled by Opera
  •  No touchscreen.
  • Ringtones.
The best phone, ever, ever made. An Affordable Access Initiative made real.

from now, You may need a professional team to develop the websites and custom software, your company needs for this new kid on the block. WAP 2.0/xHTML

A team of truly specialists and experts, who know the mobile experience on phones that have the four simple functions you need in a phone: Phone and receive phone calls, send text messages, play some games while in the tube or in the plane, browse the net wherever you are, without limitations and taking care of the resources of your environment. It's 2017, babe.

Because of the real smart is you, not your phone. 

You need a website. You need a game. You want the full experience. Here this yours truly. Segonquart Studio is your brand. On the arena, again.
 It's 2017 babe, three steps away  for the new-coming decade.

Mapping

Diplomacy with better mapping skills has had more success
A complete and illustrative article on how imagery, sometimes in the form of objects, other in the form of maps, allow us to have a better perception of this lonely planet place; where we live and see the places and travel.

At Segonquart Studio, I always loved mapping. Since its inception. That's one of the favourite sections to design and develop in the form of open source.

Segonquart Studio - Carlos Mata
Carlos Mata Jewellery - Segonquart Studio 2006

You may want recreate your eyes here, or there to mention a few tales from the past.

And read The Gazette, to stay up to date.

You'll love it.


Older Posts Home