Digital humanities Specialist

Central Plains Network for Digital Asset Management (CPN-DAM) was founded in October 2015. It has a regional focus encompassing Kansas, Missouri, Nebraska, Colorado and Oklahoma.
The network’s vision is to provide professional development, networking and collaborating opportunities for professionals involved or interested in digital asset management.
The network is open to all professionals from all backgrounds, including programmers, system administrators, librarians, digital humanities specialists and cultural heritage professionals.
To serve the regional focus as the leading educational and networking resource for professionals involved with or interested in digital asset management, as a mission, CPN-DAM has too an open and active community at Google+ that may be of your interest when stumbling.

Why? Simple. You may be a digital humanities specialist with a will to learn about preservation and classification of cultural heritage, read case studies of incorporating linked data controlled vocabularies in existing systems, know about case studies of linked data implementations, or case studies of using schema.org -- or Bibframe a conversion programs that apply the Library of Congress conversion specifications -- if you or your company are located to provide structured data on the Web.

Personal and public interests that may benefit from the advantages, case studies and practical professional development in all stages of digital asset management. All of them applied to design, business intelligence or business information, to name a few special cultural or technical profiles.

if you figure,as I do, that data is an asset, and management is a must, or if you wonder What is a digital project for businesses/corporations? , How are completed digital projects being marketed to increase traffic to them? there is a welcome hosts and attendants to its Practicing Digital Asset Management: Present and Future (2017)

A one, two-day conference this yours truly was kindly invited last year. A place where, as a professional of all backgrounds, I am kindly invited to attend this year's virtul conference.

 Moreover, this post is not sponsored, dude, there was just the noble intention to share my virtual location next on November 7th, 2017.

It seems that fortunately, Britons are welcome, too. Yum!.

Original Software

The Facebook has announced that it will release its popular open source React, Jest, Flow and Immutable.js projects under the MIT license, abandoning the Facebook BSD+Patents license for those projects.

Facebook re-licensing React.js is good news for all you, WordPress developers.

From my point of view, there is an understanding and couple of reasonable facts about the arguments and reasons why a company like Facebook, would still preserve its right on its own property, opening the code to third parties, which is still misunderstood as being open-sourced.

First, we all know what open-source means you take something from the community or from the earth (like water or wind) and you make use of it for your purposes. No reader of this blog, invented the first computer device, I guess. Open source enables a development method for software that harnesses the power of distributed peer review and transparency of process.

Secondly, you distribute the source code you have developed, through the proper powered distribution channels provided by the community such as repositories: distribution through embedded models in the same application< and third parties can and should inspect it and review it, with the proper tool. We do all agree with the transparency ethical attribute when working in code.

After investing you time, licensing the code, there is the notated open-sourced obligation to allow modifications and derived works, to must allow them to be distributed under the same terms as the license of the original software.

Here comes trouble.

Derived works means giving free drinks around to your competitors, face it before you full your mouth with kind words. No one can assure quality in derived works. And quality is the essence of well-written software.

In the case your code is the root upon your company stands up  -- and some companies, like Facebook, have been building, writing and even litigating for code reasons unnecessarily, over the last decade -- licensing under heavy manners may be negative for you and all your team. Your society does not fill well into the open society and its enemies.
Negativeness solely based on the vision and added value you company holds. Do not misunderstood me, please. This is nothing against public wealth, but against the vision some mates like that Proudhon has on private property. A devastating vision product of a lunatic visionary who wrote in french language. And this vision impregnates the idea of open-source.

Interfaces, communication or integration, are built in our era mostly using CMS tools, no matter if they are open nor closed, neither free ( the last in the list is the term you wrongly associate with source).

For this purpose, the move The Facebook has done changing its license terms is good for the community. it means some other methods of revenue have to be found. and means that your social platform, maybe, just maybe, one day will no longer be free of use in terms of subscription.
React a Javascript library to build interfaces, now is open source.
Immutable, a functional tool, intended for functional programming, is also free of use, under the Apache License terms.
Community, it's time to work to make better these tools. No bugs, please.
because of it is my guess, most of these tools (libraries) were built having in mind processes The Facebook offers to its clients: voting, ad insertion, and other feauterettes, your business model may not need at all.
Widgets oriented to business of which your neutral and open code may not benefit from. Because of code is built and written with a single purpose in mind. As when using a tool you won-t be using the SQL language to write templates for webpages, nor Javscript with the single purpose to validate forms in the client side.

Addenda

Even the infamous K. Marx showed a little respect and consideration for private property, and oriented aspects, if property does not means alienation. This is , your code belongs to me , so you are at my disposal. Shutting down platforms has been a normal activity in the last decade. No one writes code using the libraries provided by Nokia, Blackberry, either Opera Mini. Time spent with no profit returned. Freedom of trade, of a choice, presupposes property rights. Being materialists or Aristotelian if you rather prefer it, every man and woman is responsible of its own property, body and soul, which we all know it come inherited from our ancestors.
Now it is certainly easy to say to the single individual what Aristotle has already said: You have been begotten by your father and your mother; therefore in you the mating of two human beings – a species-act of human beings – has produced the human being.
You, your choice, your code is your child. Being you in the community  the ancestors won-t like you to fall down.

Custom Built

Readers may have noticed I have not paid very much attention to the brand new gadgets Apple Inc has provide us after a year of hard work. Not a single written line about the event. Which is unusual in this, yours truly, writer

Reasons for this, on purpose oblivion, may be due to focus and efforts on different interests, at a level of personal professional interests speaking, over last months. Professional interests which differ from that ones animojis represents. Bureaucratic stuff besides all, too.

So here below, a few words.

Animojis do not represent a solid and conceivable reason to get a new phone. not even a big screen. I am not interested in screens neither sizes anymore. They are outdated. Too much nineties concept.

Straight now, I do not even wear an Apple Watch, even I love the idea and the design behind the device, and the code and software served. I still keep and wear a simple, silver stained pocket watch. Looking further to the timeline of life, sure I will get one, but not right now. Wearables will be, one day or another In a forthcoming near future, outdated by the power of IoT. Like CD Players. Still a nice approach.

However, due to some professionals activities of mine in the past, I would like to express some impressions of mine on the matter -- yes, it's not cool anymore to make a grammatical use the first pronoun person narrative in written blogs anymore. Sadly I am a first person re-teller -- and my perception in  the use of Apple's products

I was having a look at the show, once was published worldwide for the common people. The rest of us. There was a curiosity floating, not for  precise reason, but because of an article written by a once famous Apple devoted persona, who I personally know and from whom I have a lot of professional respect, that caught my attention. He is on advising and art direction these days. Years ago he was one of the coolest minds in design and web programming. And art direction is quite related to Apple more than anyother tech company. The rebel ones.

For this, I visioned the show, much more glamorous than other from competitors, and my impressions were a little poor. Except if you re a n investor and except for one thing:  he thing is that one can not agree more on the best momentum of the show, than the one John Gruber describes to us in his blog, which reads as follows:
Craig Federighi, demonstrating the new animoji feature by turning his face into an animated pile of poo: “If you were wondering what humanity would do when given access to the most advanced facial animation, now you know.”
This is the sign of times, and Apple is on the road. Do not blame on Apple for not being ahead of our needs, except if you get paid to writ such a things. It’ a simple question of humanity behaviour.
It is my personal impression, after visiting the show, Apple still cares about humans, not focusing on buyers, respecting them, and what's more important, not degrading our condition of human beings calling us "audience". Which is
pretty good.

But not, for the same reason I do not wear an Android phone, I am not buying a new gadget from Apple. You should, but to me, it's not the right option by now.

You should, but to me, it’s not the right option for my needs, by now. Except for the reason to test and work with the most advanced facial animation technology we ever have known, I find it missing  — and in this I also agree with Mr. Gruber —  , that little perfection for details that is hidden in every perfect work, beyond its natural updates.

But because of you are human, you should not give the back to the new Apple’s innovative products. They are pretty custom built to your needs, to what humanity would do.

Global Networked Information Environment

The National Information Standards Organization (NISO) announces the publication of a new Technical Report,NISO TR-06-2017, Issues in Vocabulary Management

..to determine the needs and requirements for extending the usability of the new bibliographic framework into the global networked information environment and to develop community consensus for a roadmap of activities needed in this space
Further Information:
Via niso dot org, a place where content publishers, libraries, and software developers turn for information industry standards that allow them to work together.

You can't win if you don't enter

You may want to demonstrate to the world the effectiveness of your mobile development capabilities.
The Web Marketing Association is proud to present the sixth annual MobileWebAwards competition
6th annual MobileWebAwards Awards

The deadline for entering the 6th annual MobileWebAwards Awards is

Like Paintings

Web design is the creation of digital environments that facilitate and encourage human activity; reflect or adapt to individual voices and content; and change gracefully over time while always retaining their identity.

If websites are architecture, why do we sell them like paintings?. Old gold from 2007. Via Jeffrey

Ps: Do not miss the list of wannabe commenters. ten years later, is priceless.

Index of Think

The W3C Thing Description (TD) is a central building block in a Web of Things (WoT) enabled system and can be considered as the entry point of a Thing (aka the index.html of the Thing).
The TD consists of semantic metadata for the Thing itself, a narrow-waist interaction model with WoT's Properties, Actions, and Events, a semantic schema to make data models machine-understandable, and features for Web Linking to express relations among Things.
Think on the Thing. Is just an index.

via Web of Things members

How to find a balance

The Web Marketing Association announces the winners of its 21th annual WebAward Competition for Web site development.

Entries in 96 industry categories were judged on design, copy writing, innovation, content, interactivity, navigation, and use of technology.

A complete list of the winning sites can be found at the WebAward Web site at www.webaward.org

Congratulations to you winners who helped make this industry leading award program a success.


Let me express my gratitude to the WMA, overall for its excellent and sophisticated work behind, too, This yours truly, helping as an invited judge, behind the scenes.

See you in the forthcoming edition.

Wise Blood

Five ways data-driven marketing can transform your business into a machine that can leave the competition in the dust.

As i do, to define right goals and performance indicators, make better business decisions faster, so you will spend budget more profitably and, why not, your company will reach the excellence it deserves.

Via Adobe

Addenda, Uh, speaking about graphics and visuals, here you can see the idea number 64360 for the forthcoming winter. Vote.

Design is a crucial element

“Small changes, like a few extra pixels of padding or the tint of a button, can have large and unexpected repercussions,”
Segonquart Studio Designed Website: Nasty Mondays circa 2010
Hand Crafted Design nastymondys @Segonquart Studio circa 2010

Designing to encourage addictive behavior is a studied skill. We all knew it, sorry lads.

 Via Anne Quito

Fix Your Wagon

Drupal has released an update for its content management system (CMS) to address several critical security issues. Drupal 8.3.7 includes fixes for three vulnerabilities. Drupal has also issued a security advisory for Drupal 7.x.
Via Lee Neely 

2006


And meanwhile, some hidden secrets from Segonquart Studio  In Motion, circa 2006
Posted by Segonquart Studio on Sunday, August 6, 2017

Ethics

1.- A professional [designer]combines creative criteria with sound problem-solving strategy to create and implement effective communication design.

2.- A professional [designer] solves communication problems with effective and impactful information architecture.

3.- A professional [designer] conducts the necessary research and analysis to create sound communication design with clearly stated goals and objectives.

4.- Any self-promotion, advertising or publicity must not contain deliberate misstatements of competence, experience or professional capabilities..

5. -It must be fair both to client and other designers.
Business and ethical expectations which may -- and should -- be applicable to other fields of practice in our modern world. Becuase of when you solve problems, you act either as an architect, either as a designer.

Now there is the time we may need  to stablish a model of conduit for our digital age and assets, nothing better than the quoted from an ancient article and debate, circa 2004 at AIGA,  an authority on professionalism.

Number five looks hard in our age of selfies and vanity, but it charms me. Even at the peril of being hacked. Again.

Nondeterminism

WebAssembly in Firefox
WebAssembly. Future is Now.
WebAssembly or wasm is a new portable, size- and load-time-efficient format suitable for compilation to the web.

A Open standard plus more efficient than JavaScript, if you care about encryption and DRMs.for gaming et al.

Efficient binary format, that also has support for non-web embeddings., with eight hundred and something kids working on it. And you.

mkdir hello

Conclusion


: WG Action: Conclusion of ART Area General Applications Working Group (appsawg)
The APPSAWG has completed all of its milestones and is being closed.Thank you to past and present WG chairs, editors of WG documents, as well as WG participants, who together produced 35 RFCs since 2011.
Well-defined security issues, as well as calendaring, date and time formats, HTTP, internationalization, language tags, MIME, URIs and XML,  or small-scale additions to the protocol stack for HTTP and other application technologies, mostly related to service discovery and meta-data, were the main subjects discussed at the appswg working group from 2011 till 2017.

Discussion of new ART area topics should now will be brought to the DISPATCH WG.

Mission accomplished. You have done a great work. Me? well I was just an observer, more or less.

In your pocket, at your wrist, and on your desktop

A working group of experts at the IETF, in concrete ART Area General Applications Working Group (appsawg) is enhancing and updating a protocol. An access protocol, using precise terms.

This access protocol is the one that defines the access to your calendar; the one we technical people know as CalDAV, an open-standard

 CalDAV is designed for implementation by any collaborative software, client or server, that needs to maintain, access or share collections of events.

CalDAV is a real barebone protocol in our days Any collaborative software means the ones you make use everyday without noticing, as transparent as phone calls. Thus includes tasks, reads, and events in your daytime ( calendars , chats, whatsapps, whatever).

Some examples of software that makes your professional life easier may be free personal mail like  MSOutlook, Apple Calendar for IOs, Yahoo Calendar, Google Calendar et al.

The working proposal is featured in section 3.4 of the document. refers to some procedure in this collection of events

This specification defines an extension to the calendar access protocol (CalDAV) to allow attachments associated with iCalendar data to be stored and managed on the server.

Some problem this working group tries to solve are here exemplificated:   To add an attachment to an existing calendar object resource and the access for that event. What measures have to be implemented on the server to ensure the correct request allowing associated data? Which is the best method to ensure the security and wealth of the system and the solicitor after this request? What happens if a user --man or machine -- issues a POST method with attachments than can corrupt or damage the server or the data?


Brought to mind by the excellent work of Julian Reschke 

No distinction , not even required for that obsolete Mobile First development.  CalDAV acces protocol applies both to desktop and mobile devices. Another myth broken by this clean open-standards.

The rest, as always, is silence.

Saying ‘No’ is a UX Strategy Play

I never felt comfortable with the term "user", really.

Not when we are in a media like the web is. Indeed.

Indeed, there was a nice debate, in a niche of experts we met in a subscription list.

I guess the Web Marketing Association board, once, couple of years ago put the question over the question over the table. To find an answer, to solve a problem. t "What if we mean audience instead of users?"

The term audience fits better, like a hand in glove, like the term "people" when we design an strategy plan.

UX strategy plays range from providing regular usability testing, to introducing design studio workshops, to shifting the roadmap from a feature focus to a customer-problem focus.

delivered after reading Jared M. Spool's reflexions on playbooks.

Play it safe. No tricky timing.

fleur-de-lis

IraLis (International Registry of Authors-Links to Identify Scientists) is a standardization system of scientific authors' signatures.

The promoters were academic and professionals with wide experience in many different areas of activity in their profession, and who are deeply involved in the communication of scientific matters, Even it might seem abandoned, which is not,  IraLis still is a cute repo of use to find the specialist you want

Delfi Ramirez at IraLis
Delfi Ramirez at IraLis


IraLIS was a hype in between the years 2002 and 2010 of our modern era.

Still working. Still indexing.

U+269C

Shape It Up

Dan wrote an email in which there is the greatly appreciated input for you to fill the gap and the form provided

Constance invites you to unleash your imagination, in a proper way arguing pros and cons.

The question is simple: What do you think must be done to ensure the development of an open, trusted, accessible, and global Internet in the future?

You can take part and place your fingertip in the sand of History, here

Some conversations in these project were already  presented to UN trade experts in April, 2017 in Geneva.  but there is still  a lot to do.

The main intention is to help develop these recommendations to Internet leaders and actors, and policy makers if any for an open, trusted and global Internet in the Future.

A future which is occurring now, by the way. Uh.

I'm done. Your turn. 

Insides

An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials. The cracker obtains access to the computer systems or networks of the enterprise, and then conducts activities intended to cause harm to the enterprise.
What is an Insider threat, terms, references and all we need to know for the glorious summer by this sun of York, with same recommendations to prevent this nasty dwarfs who make the profit on the theft of information or corporate secrets; as you walk through the Internet.

You may not want to loose your wallet, if all your assets are digital. Which they are, in fact.

Via Margaret Rouse.

Individual and Team achievements

 2017 WebAward
There is now only one week left to enter the Web Marketing Association's 2017 WebAward Competition.  The WebAwards recognizes the individual and team achievements of Web professionals all over the world who create and maintain outstanding Web sites. The Competition Web site is located at www.WebAward.org and the deadline for entry is Wednesday, May 31, 2017.

18 Byte file, $14k bounty

I never felt comfortable using ImageMagick for desktop. Not under Ubuntu neither OSX. Really.

Not because of that, ehr, embrittled graphic user interface that most of the old open-source command software inherits. As if being open source means to be unpleasant.

Just because it was buggy. You had the feel it was buggy. Vulnerable.

Chris, feels the same. and does it technically in his analysis of the Yahoobleed :  A tricky vulnerability to spot because of the abstraction and also because this is a vulnerability caused by the absence of a necessary line of code, not the presence of a buggy line of code.

The ImageMagick Studio team did a great work back in 1999. But in our days there are no wizards, in a world of decreasing memory corruption and increasing sandboxing.

A world where  *bleed bugs provide a compelling option for easily stealing information from servers.

As that noble prized once sang, times are changing. Good bye, then , to the Ol' black magick. And it minds to me because of, in that old gone days,  before using c I was a fellow client of the yahoo email service.

And even in those prehistoric days, I never felt comfortable using ImageMagick.

ImageMagick was posted to Usenet's comp.archives group on August 1st, 1990.

Get yourself deepen on Yahoobleed  here, here and there

Via Jake Williams

The Good, The Bad. No Ugly


The Good

A kind public invitation for you to take part and visit the most celebrate meeting of the Infosec peepers community in Europe.Where hearts are entertaining June.

It does not mind you are a seller, a webmaster, a professor, or a thief. The brand new things brought and fresh delivered to you, by worldwide experts and professionals from the arena of applications, web services, care, analytics or services for you or your selected clientèle has a brunch in June.
As the annual meeting place for the industry, Infosecurity Europe brings together professionals from all around the globe and supports the community by providing opportunities to connect, be inspired, and learn how to overcome the latest security challenges.

Do your part to ensure that your organisation is prepared for future threats?. Sure you will kids.

Spread the word and invite your colleagues to join Infosecurity Europe in June as this yours truly does now - by sharing insight and lessons learned amongst the information security community, cyber defenders can protect against the threats of tomorrow.

An Initiative from Reed Exhibitions, with still a million things to say here.


The Bad

Server services and domains at Segonquart Studio will be out of reach for a week. Meeh.

Uh. No panic. Down for a while, old skool method. Tomorrow was another day.

No Ugly

One thing that i am certain of.

Great things happen when the World agrees

Some links of use, for this Warre of May, because of great things always happen, when we agree.

Design focused and for your pleasure only.

The Dublin Core metadata element set -- Part 1: Core elements” is now published.
ISO 15836-1:2017 establishes 15 core metadata elements for cross-domain resource description. These terms are part of a larger set of metadata vocabularies maintained by the Dublin Core Metadata Initiative.

Translating UX Goals into Analytics Measurement Plans
Designers have often been told to focus on outcomes, not features, so that they solve the right problem instead of building the wrong thing.

A revised Candidate Recommendation of ActivityPub
The Social Web Working Group invites implementation of a revised Candidate Recommendation of "ActivityPub." ActivityPub allows websites a direct social connection to user software, including Follow, Like, Share, and Comment, without an intermediate social network provider.

A company that designs and manufactures exceptionally soft and comfortable children's sleep and loungewear.
RocketHub: What is your professional background?
Suzie Levett: I previously practiced Naturopathic medicine in a women's health and fertility clinic in Sydney.

What's My Risk?

The Open Web Application Security Project (OWASP) announced on Monday the first release candidate for the 2017 OWASP Top 10, which proposes two new vulnerability categories, The OWASP Top 10 2017 RC1.

A lot of discussions and opinions, here and there, by this project lead by Dave Wichers; not due to his leadership attributes but instead on the fact this new list may be obsolete (uh) but necessary, as it is de facto an standard for web professionals and now, in our decade, security IT professionals too.

Good news every four years are always good news. Think yourself in positive, Even this yours truly may be critical for several objective reasons with this RC1, the most vane reason because once, not so long ago, his candidature for an OWASP open position was kindly rejected ( no reasons, no need for a reason neither); in a world of private contractors and tons of assets offered by this contractors and professionals ( think theRSA), this volunteer based initiative deserves no less than respect.

Judge for yourself and help maintain and develop this. Be smart.

OWASP ZAP ATTACK
OWASP ZAP

Multi-Cost ALTO

Applications using the Internet already have access to some topology information of Internet Service Provider (ISP) network.

There is a working-draft discussed now at the IETF, quite promising, entitled draft-ietf-alto-multi-cost-09 with an intended status of standard track.

The ALTO (Application Layer-Traffic Optimization) Protocol ([RFC7285]) defines several services that return various metrics describing the costs between network endpoints.

The document defines a new service that allows an ALTO Client to retrieve several cost metrics in a single request for an ALTO Filtered Cost Map and Endpoint Cost Map. In addition, it extends the constraints to further filter those maps by allowing a client to specify a logical combination of tests on several cost metrics.

Authored by S. Randriamasy, W. Roome from Nokia Bell Labs, and N. Schwan from Thales Deutschland

If you want to know more about it, please follow the paths.

Expires: October 27, 2017

PMXPO 2017

PMXPO 2017, coming THURSDAY, April 27, 2017 at 10:30AM ET. It's the biggest virtual Project Management event of the year, brought to you by ProjectManagement.com, the world's biggest online community of project professionals. Be sure to log on to enjoy a full day of informative and entertaining presentations while earning PDUs.

See you inside, as soon as you have complimented this URL to enter the expo:

BSOD

Microsoft Publishes Digital Geneva Convention Docs

Microsoft has published a trio of policy papers in support of a Digital Geneva Convention. Two of the documents describe rules for countries and technology companies to abide by in cyberspace; the third calls for establishing an international body to attribute malicious cyberattacks. In a blog post, Microsoft president and Chief Legal Officer Brad Smith, noted that while the G7 has "published a declaration recognizing the urgent need to establish international norms for responsible nation state behavior in cyberspace," voluntary norms do not go far enough. 
Smith, who spoke about a Digital Geneva Convention at the RSA Conference earlier this year, wrote, "We need to... pursue a legally binding framework that would codify rules for governments and thus help prevent extraordinary damage."
The software based company, the one that long time ago flourished your screen with a charming  electric blue colour, advances masked in this brand new century. MS is holding a vision,  Which make us aware because of is a serious proof that may confirm the Theory of the Evolution, and besides, is making an educated guess:  Rules for countries and technology companies to abide by in cyberspace.

Never is too late. Roger, Redmond. "You can always just cross your fingers, search the Web, and try again".

After reading my income email, via the SANS Institute 

RFC 114

April 16, 1971 -- 46 years ago

Abhay Bhushan of MIT first publishes FTP in RFC 114
A file may or may not have access controls associated with it. The access controls designate the users' access privileges. In the absence of access controls, the files cannot be protected from accidental or unauthorized usage.

Image: 2002 Rus Shuler @ Pomeroy IT Solutions, all rights reserved

Foster Collaboration

There is an interesting debate these days, for those who do not celebrate all Easter, at the WHATWG.( Web Hypertext Application Technology Working Group).

The discussion, mostly, arises to the new possibilities that the audio tag should present for future implementations of elements featured the HTML5 language and its associated DOM API.

Mostly the use of this label is of public interest in what concerns to the transmission in streaming of contents for the web.

Is It Worth It?

These issues are all foreign to the neutrality of the technology itself, but necessary to be taken into account and implemented in a World in which the WWW is the mass communication media par excellence.

The pre-development and research reflection on this matter, actually presents concepts as interesting as the discussion of the streamed content, titles and singular attributes, the analysis of ISRC codes and regulations, or the famous article 15 of the WIPO's treaty.

I noticed to Patrick the similitude between what is referred in the industry as royalties and the term funding for scientists. I just wanted to mention that in this post, to know your opinion.  The greatest payoff on R&D is social return-return to organizations that do not participate directly. Like dancers in a stage.

Aside note: Apologies, dearest reader of this blog, for the poor written English featured in the linked email source. Ye know, life is hard in hostile territory and I am missing aptitudes, specially writing emails to a subscribers list.


AUDIO HTML 5 TAG
Radio, live transmission.

Return to the source.

When an R&D project is finished, contractors and vendors may reap further profits based on their experience.
For this reason, the meta-data, new HTML-version 5-dot-something attributes, and other future aspects and enhancements the audio tag may present and offer in the future, are being debated among a few selected team of us.

And yes, memoirs came to mind. The debate brought to mind thecontents of that article in the ISOC, entitled A Brief History of the Internet, Part I, and written circa May/June in the year 1997.

Hence, an excerpt
The idea of open-architecture networking was first introduced by Kahn shortly after having arrived at DARPA in 1972. This work was originally part of the packet radio program, but subsequently became a separate program in its own right. At the time, the program was called "Internetting". Key to making the packet radio system work was a reliable end-end protocol that could maintain effective communication in the face of jamming and other radio interference, or withstand intermittent blackout such as caused by being in a tunnel or blocked by the local terrain. Kahn first contemplated developing a protocol local only to the packet radio network, since that would avoid having to deal with the multitude of different operating systems, and continuing to use NCP.

Conclusion

We are not talking about patent features here.The debate and the research done is the present is through the official mailing listThe mailing list archives are publicly accessible. "It was clear that these systems could be used from a distance and, more important, that they fostered collaborative user communities"

Memoirs came to mind  to avoid re-inventing the circle. Said all, time for brunch, fostering collaboration.

Footnotes

A toast In the memoir of Robert W. Taylor, a truly smoker innovator. Building upon the shoulders of giants.

This your truly, from the battlefield, hostile territory, proudly thinking about web hypertext, since 2004.

Provenance

"Provenance is information about entities, activities, and people involved in producing a piece of data or thing, which can be used to form assessments about its quality, reliability or trustworthiness."
A must read, on the PROV,  defining various aspects that are necessary to achieve the vision of inter-operable interchange of provenance information in heterogeneous environments such as the Web via @ W3C PROV WG.

Provenance is the 'who'.

What is Web architecture?

As cited in the year 2004, a public working document, [ the TAG ], explains to us that there are a number of architectural principles that underlie the development of the World Wide Web. Some of these are well-known; others are less well-known or accepted.
(...) Web architecture refers to the underlying principles that should be adhered to by all Web components, whether developed inside or outside W3C. The architecture captures principles that affect such things as understandability, interoperability, scalability, accessibility, and internationalization.

For understandability, it is important that specifications be built on a common framework. This framework will provide a clearer picture of how specifications for Web technology work together.

For interoperability, there are some principles that cross Working Group boundaries to allow technical specifications to work together. For example, W3C has adopted an architectural principle that XML should be used for the syntax of Web formats unless there is a truly compelling reason not to (refer to "Assumed Syntax", by Tim Berners-Lee). This principle allows broad applicability of generic XML tools and is more likely to lead to general protocol elements that are useful for multiple purposes.

For scalability, it is important to base current work on wide applicability and future extensibility. For example, it is a common principle in designing specifications to avoid single points of control (e.g., a single registry that all specification writers or developers must use).
Web Architecture, a professional area and a subset of the Web technology -- (e.g., "Design Issues," "What is a Good Standard?," and "Common User Agent Problems,") ---, explained and defined by the W3C's Technical Architecture Group (TAG) Charter

W3C's Web Accessibility Initiative and Internationalization Activity are already producing Architectural Recommendations in the areas of accessibility and internationalization, respectively.

Circa 2004, repeat, 2004.

Bid Her Good Bye

TextWrangler is an all-purpose text and code editor for Mac OS X, based on the same award-winning technology as BBEdit, the leading professional HTML and text editor. 

Bare Bones is sunsetting TextWrangler, after all these plenty years. And they encourage anyone interested in TextWrangler to download and use BBEdit instead.

I met TextWrangler more than a decade ago which means a lot of years, seen the distance and the time elapsed. As much of us did, I felt in love with her logotype. It says a lot of things, a kind of farewell.

TextWrangler
TextWrangler from BareBones


We look one each other and we became friends at a glance. TextWrangler helped me to meet my needs, to reach my goals, to achieve my timeliness and she helped me to be productive while pleasantly writing software. Or text.

Because we all know of software is written text. This is the reason what uniqueness fits for a project or a prototype. You can feel the hands and the mind that wrote the script, the objects, the bones.Feel them  just looking and reading that small piece of written software.

TextWrangler also helped me when I need or needed to upload via FTP, or SFTP a piece of text to the server. I must confess you that I learned to write software with TextWrangler, which may seem too lightweight for programmers.

She was of help, too, in a forensic exam, for a litigation process. "Look,  this has built done using a Bare Bones product". Period.

TextWrangler became one of my decisive and favourite tools, and she is not going to be updated, so you better change to BBEdit, manufactured in North Chelmsford, MA. You will have the same, exactly the same features your present toolbox contains. Not a miss but an improvement, wanting to assist his dearest and only friend.

Because of all our tools are important.

It's Time

The single biggest problem with UTC is that the decisions to add seconds are made by a committee a few months in advance of the change. And this results in time becoming unpredictable because it is never possible to know if we are dealing with a corrected or uncorrected time.
An approximation to correct measure, leap seconds an deltas in the net by Phillip Hallam-Baker, on Sat, 31 December 2016 21:32 UTC.
This would enable manufacturers to build devices with built in correction tables for a design life of one century which should meet everyone's needs.
Worth a read, at the IEFT Mail Archive. Quoted from  Predictable Internet Time.

News From The Fields

Why is Artificial Intelligence an ISOC matter?.

A question raised in the conversation on the topic for a draft policy paper developed on Artificial Intelligence which is high on the G20 agenda.

Internet Society [Member Number: 36154].
The goal of this paper is to explain a complex issue and also to offer a set of principles and recommendations to ensure AI services and products are developed and implemented in an ethical way. This is intended to be introductory and not an in-depth technical piece; ISOC is aiming to release it at the G20 Ministerial, later in April.
How much transparency may we get, do machines dream of electric sheep and all that current topics we as digitalized humans talk and care about.

There is a draft, a proposal on the AI subject, its  implications and how ethics may play a rule in the forthcoming future, or don't.

The current AI draft is available here in Box and is open for comments until 29 March: Here

If you wish to take part of this unique moment of democracy and human collaboration, if you have something to say about ; Please, read the draft and submit your comments to Carl Gahnberg and Ryan Polk

From this yours truly, Internet Society [Member Number: 36154].

Web Awards 2017

WEBAWARDS 2017

The 21st annual International WebAward Competition Call for Entry has begun. Adding an "award winner" to your profile starts with meeting the entry deadline. 31 05 2017

See you there!

PESTLE

An acronym for Political, Economic, Social, Technology, Legal, and Environmental, which are the ingredients needed for your business cocktail receipt. Serve it chilled, not stirred.
Collecting the technical indicators, the attribution details, and applying PESTLE-type analysis to these situations is key to determining if your business can make an appropriate choice for mitigating impact of the attack, given the company’s goals, current condition, and business operations.
Rob (Kraus) explians the method and the measure for a succesful PESTLE flavour and taste in his essay entitled Here’s What Industry Experts Say About Making Threat Intelligence Actionable

There is a mutual agreement with most of the explained in the article, experience with stakeholders included, fragrances from an early past. Two scenarios; the atomic level and the holistic level. What do YOU know that might benefit  MY company. So we help one each other. Products and services.

Worth a read. Worth a taste at The Recorded Future Blog.  Fresh delivered in the bar. Before the desserts.

Lights, camera, action

Intelligence takes this process a stage further by interrogating data and information to tell a story (a forecast, for example) that can be used to inform decision making. Crucially, intelligence never answers a simple question, rather it paints a picture that can be used to help people answer much more complicated questions. (...) This intelligence doesn’t directly answer the question of whether you should be given the organ, but it does aid in their decision-making process.
Threat Data, Information, and Intelligence: What’s the Difference? a collection of common terms that now  belong to the process and tailored bussiness decisions, including design and concepts, as you allready know, by RFSID on March 8, 2017, via @RecordedFuture.

Threat Data, Information, and Intelligence: What’s the Difference?

Clear and concise, this yours truly still have his own reserves and disagrees ( theoreticals, of course) on the Big Data assertions meaning with this the importance of being buzz. Worth a read.

Semantics 2017

May I define semantics as the fine art of surfacing the waves of natural language and written software language.

Sematics, a technique that was -- when a student -- the foundation of my career. And here we go:  SEMANTiCS 2017 - The Linked Data Conference is the 13th International Conference on Semantic Systems. noticed from Sebastian Hellmann to the semantic attendants of the lip and sailors aboard like you and this yers truly. Open to participation and splitting the night in the following matters, Semantics 2017 Conference is focused on:

 Web Semantics, Linked (Open) Data & schema.org ( like those we make use when designing websites ) Corporate Knowledge Graphs ( like those we send to our clients interest as a sum) , Knowledge Integration and Language Technologies ( something we learned at school or sinking stones for profit), Data Quality Management ( which is know as SEO techniques et al) and Economics of Data, Data Services and Data Ecosystems ( which is known as a feasibility study for the project -- something you do mentally everyday).

Need more?

Interest for the conference are listed below, so you can scope your efforts and save time, by the dawn's early light.


Call to participate is open now, underneath the street lamps till dusk or till dawn , next May 17, 2017 (11:59 pm, Hawaii time).

Semantics 2017, A conference. September 14-17 2017. Amsterdam. Where the sailors all meet.

Apologies for cross-posting.

52


Probably the best browser. That foxy one who once made you love the web, reaches now it's 52, seems so glad to be here.

Instead of a semester update, a deviation of a monthly continuous deploy, FirefoxESR 52 has matured and evolved with the web techniques. Now offering new tools at your disposal, new abilities, killing jar plugins ( but Flash Player), all these solid aspects are built for our and for your daily experienced basis. Solid ascpects as live CSS edition, with grids, and columns and future hacks HTML5's complete integration et al. This is why events unnerve me.

Firefox 52 ESR
 CSS grids with Firefox's new inspector tool

Firefox ages 52 and is out  and trembling in the streets. For your kids. For you nephew. For developers, too. Fifty-two, Both, ESR ( Extended Support Release) and  that version.

Whom for wheels are turning, be a professional. Choose the fox.

Updated  10th March 2017 16:53 GTM + 1: Klaus Hartnegg has written an article of this very special 52, that may be of your interest. Here


Fueled

Anyone who has ever been involved in running a business knows that an effective product or service does not guarantee success
So Dylan kindly wrote me and said, "Hey, Delfi, have a look at this Fueled Editorial!", which I gadly did, of course. Here it goes, briefly.

Fueled is about you and your needs. Their motto. Fueled is based in New York.

Idea+User Experience + Design + Bring Up Together

Closer to perfection . You have to explain how and what your client must expect. No hidden lies.Of course we all know about code and programming languages, it's our job to be up to day; but does the client has to know about them? I do not guess so. Not a serious studio or company will ever break a business conversation for an aspect of code. That's an inside, and insides belong to engineers.

An idea, how your customers will interact with this idea you love, what abut the design and the need for devices, and the final offer. Perfect. What you need to know is about website development for company succes.

There is a universally accepted fact in the business world: Proper branding is key to success.

Verizon or Barneys New York are brands that trust in Fueled

Reputation Is Vital

You have capricious behavior on the parts of opportunistic people, if there are no checks and balances to prevent them from behaving in that way. You might have the bureaucracy or government officials randomly changing rules without due process or checks and balances. You might have, in extreme circumstances, maximum economic instability. Or you might have political instability; you might have unrest in the streets.

Since we all agree Reputation and resilience are key ingredients that determine whether companies will survive tumultuous markets, not all the bad things occurs in developing economies.

One man may get atonished if he knows the facts that lies upon the bridge. Because reputations, your person, your brand, means what you are, the goods and eals your brand offers, the activity of a collection of human brains that work together to make this World, the best of the possible worlds.

Reputation is Vital to Survival in Turbulent Markets, an article written by Sean Silverthorne, featured in HBS this week.

After all these happens, resistance is futile.

Thank you, Satya

Nokia 3310 - 2017

  • 240x320.
  • 2.4-inch color.
  • Short Message Service
  • FM radio.
  • 2MP camera with an LED flash. 
  • Bluetooth v3.0, A2DP.
  • Web browsing is handled by Opera
  •  No touchscreen.
  • Ringtones.
The best phone, ever, ever made. An Affordable Access Initiative made real.

from now, You may need a professional team to develop the websites and custom software, your company needs for this new kid on the block. WAP 2.0/xHTML

A team of truly specialists and experts, who know the mobile experience on phones that have the four simple functions you need in a phone: Phone and receive phone calls, send text messages, play some games while in the tube or in the plane, browse the net wherever you are, without limitations and taking care of the resources of your environment. It's 2017, babe.

Because of the real smart is you, not your phone. 

You need a website. You need a game. You want the full experience. Here this yours truly. Segonquart Studio is your brand. On the arena, again.
 It's 2017 babe, three steps away  for the new-coming decade.

Mapping

Diplomacy with better mapping skills has had more success
A complete and illustrative article on how imagery, sometimes in the form of objects, other in the form of maps, allow us to have a better perception of this lonely planet place; where we live and see the places and travel.

At Segonquart Studio, I always loved mapping. Since its inception. That's one of the favourite sections to design and develop in the form of open source.

Segonquart Studio - Carlos Mata
Carlos Mata Jewellery - Segonquart Studio 2006

You may want recreate your eyes here, or there to mention a few tales from the past.

And read The Gazette, to stay up to date.

You'll love it.


All Forms Of Online Advertising

2017 Internet Advertising Competition Awards

This international award program will evaluate all forms of online advertising, including email, page-based ads, online newsletters, mobile apps, Websites, video and social media in 86 industry categories.


The Web Marketing Association has extended the deadline to enter the Web Marketing Association's 15th annual Internet Advertising Competition - (IAC) Awards. The new deadline to enter is Friday, February 17th at 5:00pm Eastern Time.

Not this time for this yours truly, but sure you will. See you there.

Hasta la Vista

In approximately March, 2017, Windows XP and Vista users will automatically be moved to the Firefox Extended Support Release (ESR).

Firefox is one of the few browsers that continues to support Windows XP and Vista, and we expect to continue to provide security updates for users until September 2017. Users do not need to take additional action to receive those updates. In mid-2017, user numbers on Windows XP and Vista will be reassessed and a final support end date will be announced.
In the meantime, we strongly encourage our users to upgrade to a version of Windows that is supported by Microsoft. Unsupported operating systems receive no security updates, have known exploits, and are dangerous for you to use. For planning purposes, enterprises using Firefox should consider September 2017 as the support end date for Windows XP and Vista.
For more information please visit the Firefox support page.

via the blog.
Any Windows XP or Vista user on a release channel NOT using a previous ESR and upgrading from a version prior to v52 can be upgraded directly to ESR 52.0.0 (once it becomes available); that is, their channel will be switched to ESR

Any Windows XP or Vista user on a release channel using ESR 45.8.0 can be upgraded directly to ESR 52.2.0 (once it becomes available)
and in my email, via Peter Dolanjski Product Manager, Firefox Mozilla

Theory, Technology and End Users

In my email, by Dr. Aida, from the UDC Consortium a la scientific mode:

International UDC Seminar 2017 marks the anniversaries of two conferences devoted to faceted classification research: sixty years since the First International Study Conference on Classification Research (Dorking, 1957) and twenty years since the the Sixth International Study Conference (London, 1997).

The objective of the conference is to revisit faceted analytical theory as a method for (re)constructing modern classifications and indexing languages and the role analytico-synthetic classifications have had in resource discovery and retrieval, from their introduction at the beginning of the 20th century to date. 


The conference will examine the challenges analytico-synthetic classifications represent for data modelling and interface design in the Web environment.

Most importantly, it will explore potential fields of application for faceted classifications in information organization, visualization and presentation of large datasets, social networks and in the open linked data environment.

High quality and innovative contributions are invited for the following topics:

  •  - The impact of faceted analytical theory and research on modern classification and indexing languages;
  •  - Data modelling, data management and data sharing of faceted and analytico-synthetic classifications; 
  • - Vocabulary mapping, semantic linking and natural language interfacing of analytico-synthetic systems; 
  • - Applications of faceted analytical theory on (re)constructing knowledge classifications and indexing languages; 
  • - End user interface design and user-friendly knowledge presentation for faceted systems; 
  • - Novel applications of faceted systems outside the bibliographic domain.

CONTRIBUTIONS:
Two kinds of contributions are invited: conference papers and posters

Authors should submit a paper proposal in the form of an extended abstract (1000-1200 words, including references, for papers; and 500-600 words for posters). The submission form is provided on the conference website.

Proposals will be reviewed by the Programme Committee consisting of an international panel of experts. Each submission will undergo a blind review by at least three reviewers.

The Conference proceedings will be published by Ergon Verlag and will be distributed at the conference. Best papers will be proposed for publishing in the Knowledge Organization journal

IMPORTANT DATES:

29 Jan 2017 Submission deadline 
1 Mar 2017 Notification of acceptance & paper submission instruction
15 May 2017 Papers submission (camera ready copy).

Hurry up, and bring there your pièce de résistance.!!

BTW:   I'm late, however. Won't be there. Thank you for letting be mycelf again, and for the kind invitation, doctor Aida.This, yours truly.
Newer Posts Older Posts Home