Ain't no Saint

Industry analyst firm Quocirca surveyed 500 IT decision makers in the United States, Canada, United Kingdom, Australia and Japan, examining attitudes towards the value of confidential data including: personally identifiable information (PII), payment card data, intellectual property (IP) and email.

Clarifying the business impact of technology, quoted from Examining attitudes towards confidential data.

One xmas feasible scenariothat may beof your concern  : What it looks like if someone is reading your letter to Sandy Klaws, or even a second worst xmas scenario, what is Sandy Klaws who's tapping your phone to know your desires.

 A more serious approach via Yves Mulkers, editor of The Data Intelligence Connection

Because of Santa ain't no Saint! 

Jingle Bell

Time to move from Broadband to Infrastructure.

Encouraging innovative internet-native business models rather than working to preserve an industry threatened by innovation is n obligation for all of us professionals of the web and the Internet.

The Roman roads built with electronic pavement are working pretty well, given that the cities can maintain complex infrastructure such as water systems and roads, all the Telecom companies have reached at this time the entertainment and the media business. Today's work is about providing services, not transportation.

In a near future, if not now, we all know robots will accomplish the needed work to maintain, to install or to repair our wires and/or radios. Design today goes further than a work to implement or draw a mechanical behaviour, done by mechanical entities with the help of little AI coded in the motherboard. Not kidding.

Define what is The Internet.
The Internet can do video because it doesn’t promise video so that it doesn’t have to reserve capacity.
Long time ago, the term broadband was used to define a fat pipe that the provider would use to sell services. If you do not remember a world connected at 56Kpbs, this classicla definition of broadband does not apply to you, neither to your siblings.

  AT&T was acquired by SBC (NYSE:SBC) and, in fact, they operate as SBC in all its aspects; as well as the latam-spaniard news agency GRUPO PRISA was 'bought' by PRISACOM ,a brand division that sells advertising, the bets paradigm of what the essence of the term.service refers.

Infrastructure is what favours services.
One reason that infrastructure creates opportunity is that it is free-to-use.
With the same principle applied to public services such as rail roads, no matter if rail-roads fails, except is there is a certain hidden purpose on that fail , innovation and equability comes in hand with opportunity, in that way the Internet is paved with its natural policies.
It’s difficult to have a conversation when we don’t have a shared understanding of the meaning of words. In the case of the transition from the telecommunications services to the Internet as infrastructure the change in meaning is at the heart of the shift.
There is a buzz in these dark ages we live in, were a real scandal in Bohemia is served in terms of solution as a missed mean. The scandal refers to the use of the term neutral. An oxymoron, speaking in tech.

So what now ? A solution to the issue what model os service do we the people want, lies in the dumb pipes paradigm. The problem is for broadband providers, because of the value is created outside of their network, how do they make money beyond providing a dumb pipe?

A simple solution to avoid an sterile debate and a usefulness legislation, is real simple, it comes from natural language, a semantic solution, and passes by adapting our terms, not our knowledge, to the real Internet-native scenario we live in. Carriers are no longer carrying a meaningful message and thus, makes trouble.
It’s the equivalent of saying “huh” and repeating the messages.
Security and privacy, other well know terms associated to the use we humans make of the Internet, are a provided service-solution, functioning more like attributes and not bare-bones. Even they're part of the buzz or twinkle your ears, do not worry about them.
Jingle Bell, originally and frequently still called The Internet.

We, the people need to make a reboot, we are urged to the need to understand and to make understand, that is time to move from the broadband to the infrastructure. It’s time to get down.

via Bob Frankston

On Net Neutrality

Something I've not heard said in the #netneutrality debate. The Internet was created by the US government, the Department of Defense, and built out by universities. Taxpayers paid for it.
Dave Winer leave a mark on the debate, again.

the less complex but more sophisticated answer to the buzz, via scripting


What does the Web sound like?

Thanks to a major grant from the William and Flora Hewlett Foundation, artists Paul D. Miller (aka DJ Spooky) and Greg Niemeyer will be exploring that in a newly commissioned piece, “Sonic Web” that premieres worldwide in September 2018. 
The 11-movement multimedia piece is one of the first to be created with a $150,000 grant —part of the Hewlett 50 Art Commissions celebrating the Hewlett Foundation’s 50th anniversary.

The world premiere will take place in the Internet Archive Great Room next September — stay tuned!!

In my corporate email, via IA, shared with pleasure for you, dearest reader.

My Life as a Coder

Did ever ye been a designer, say a UX mate, or ye get involved in Data Science and the big macs?.

Below, some links that may re-inforce yer daily automated activity,
Command Examples for MySQL Binary Log Files
Binary log is very helpful in MySQL replication, where the main server will send the data from the binary logs to the remote servers.

Printing File Lines using Address and Patterns
sed is a “non-interactive” stream-oriented editor. Since its an “non-interactive” it can be used to automate editing if desired.

Nginx Rewrite Rule Examples with Reg-Ex and Flags
While Nginx rewrite rules does similar things like Apache, there are still lot of differences in terms of how you write a rewrite rule in Nginx.
Linked resources kindly provided and delivered in and out from an e-mail personal conversation, kindly started by Ramesh Natarajan.

For you, as this yours truly make pleasant use of them for his one chapter partial moment of the BST +1life entitled "my life as a coder". (which is quite similar to the content of the unwritten chapter "my life as a blogger", by the way)

Case examples printed and delivered, without an explicit permission. This unnatural and exceptional attitude, pretty sure will not bother anyone of us involved. Click and read.

say tah.

96 Industry Categories

IAC Awards Now Accepting Entries !!  

The Web Marketing Association announces the Call for Entries for the 16th annual Internet Advertising Competition (IAC)Awards .

The IAC Awards are the first and only industry-based advertising award competition dedicated exclusively to online advertising.
This international award program will evaluate all forms of online advertising, including email, page-based ads, online newsletters, mobile apps, Websites, video and social media in 96 industry categories. The Competition Web site is located at and the deadline for entry is January 31, 2018

Enjoy yourself.


A note,  that may be of your interest., received today in my personal email. It's from a colleague, Brewster Kahle, Founder & Digital Librarian.
For 21 years, the Internet Archive has been dedicated to a single mission: to give everyone access to all knowledge, forever. For free. Collect web pages? Why? Who would want to read a book on a screen? Why collect TV--isn’t it all garbage anyway?
Team at the Internet Archive, have the responsibility of a noble and respectful mission. To digitize books and music and television before they’re lost, to sustain the reliability of what’s on the Web. As a reader: How would you like to contribute?

This short post is not about colours, it does not mind if your favourite colour is the blue or is the red. Even the green, a mixture of gray and shade  This is not even an sponsored post. this is Now you have a mission, too. Contribute to keep the Internet Archive going in 2018.

The Internet Archive have plans, projects and a brighten future.

Donate. Imperative. Your time is just as important as a monetary contribution. Hurry up.

The Internet Archive is a California non-profit public benefit corporation that is tax-exempt under section 501c3 of the Internal Revenue Code. Federal Tax ID Number 94-3242767.

Mail your donation to:
Internet Archive
300 Funston Avenue
San Francisco, CA 94118


Scenarios are a versatile tool that teams can use throughout design to explore the unique needs and behaviour patterns of customers, identify solutions, draw stakeholders together to become active participants in a shared vision, and define elements of user testing.

via Shawn Henry. Remember that people are diverse.

Fix that injection, please

  1. All database interaction must be abstracted through stored procedures. 
  2. No stored procedure should have dynamic SQL unless there is no other option. 
  3. Applications should have no access to table or view objects unless required by dynamic SQL, which is allowed under rule #2. 
  4. All database calls should be parameterized instead of being inline dynamic SQL. 
  5. No user input should be trusted and thought of as safe; all user interactions are suspect. 
An excerpt from chapter nine of Securing SQL Server, author Denny Cherry, that might be of use in case you are trating with trasnsactional database (propiertary o not). Because of design, means architecture and understanding.

Via TechTarget

Being Judged

The Web Marketing Association announces the Call for Entries for the 16th annual Internet Advertising Competition (IAC) Awards.
The IAC Awards are the first and only industry-based advertising award competition dedicated exclusively to online advertising.
Judges will consist of a select group of Internet advertising professionals with an in-depth understanding of the current state-of-the-art in Web advertising.

Past competition judges have included top executives from leading corporations, institutions and media organizations such as Arc Worldwide, Brunner Digital, Campbell-Ewald, CNN, Deep Interactive Asia, Digitas, EuroRSCG 4D, Google, IBM Interactive, imc2, JWT, LeapFrog Interactive, Mass Transmit, McCann Worldgroup, Razorfish, Starwood Hotels & Resorts, Tectis GmbH, TMP Worldwide, Universal McCann Interactive and Wunderman / Y&R.
If you're best work is ready to be judged, enter at today!. Web site is located at, and the deadline for entry is January 31, 2018..

Ad Formats, Social Media Campaign, Online ad, Email Campaign, Online newsletter, Website, Online video, Mobile applications,Integrated ad campaign are welcome.

See you in there, dearest judges.


There is the professional doubt on microservices.

Which programming language lets you to deploy in a faster and safer way an API related to microservices?
Build an API for microservices in 5 minutes
In 2002 (yes, more than a decade ago), Jeff Bezos, CEO of Amazon, famously mandated that all internal development teams at the company must expose their data and functionality through Web services interfaces that can easily be consumed
How to Set up a Microservices Architecture in Ruby: A Step by Step Guide
In a microservices architecture, the described monolithic backend is instead substituted by a suite of distributed services. This design allows better separation of responsibilities, easier maintenance, greater flexibility in the choice of technologies for each service, and easier scalability and fault tolerance. At the same time, complex distributed systems have their set of challenges.
Developing a simple API gateway in PHP and Lumen
PHP 7 is a performant language, and frameworks such as Laravel and Symfony proven to the world that PHP can be both beautiful (expressive) and functional. Lumen, being a lightweight version of Laravel, is an ideal choice because we don’t need stuff like sessions, templates and other features of full stack applications.
Laravel API Tutorial: How to Build and Test a RESTful API
With the rise of mobile development and JavaScript frameworks, using a RESTful API is the best option to build a single interface between your data and your client.

Digital humanities Specialist

Central Plains Network for Digital Asset Management (CPN-DAM) was founded in October 2015. It has a regional focus encompassing Kansas, Missouri, Nebraska, Colorado and Oklahoma.
The network’s vision is to provide professional development, networking and collaborating opportunities for professionals involved or interested in digital asset management.
The network is open to all professionals from all backgrounds, including programmers, system administrators, librarians, digital humanities specialists and cultural heritage professionals.
To serve the regional focus as the leading educational and networking resource for professionals involved with or interested in digital asset management, as a mission, CPN-DAM has too an open and active community at Google+ that may be of your interest when stumbling.

Why? Simple. You may be a digital humanities specialist with a will to learn about preservation and classification of cultural heritage, read case studies of incorporating linked data controlled vocabularies in existing systems, know about case studies of linked data implementations, or case studies of using -- or Bibframe a conversion programs that apply the Library of Congress conversion specifications -- if you or your company are located to provide structured data on the Web.

Personal and public interests that may benefit from the advantages, case studies and practical professional development in all stages of digital asset management. All of them applied to design, business intelligence or business information, to name a few special cultural or technical profiles.

if you figure,as I do, that data is an asset, and management is a must, or if you wonder What is a digital project for businesses/corporations? , How are completed digital projects being marketed to increase traffic to them? there is a welcome hosts and attendants to its Practicing Digital Asset Management: Present and Future (2017)

A one, two-day conference this yours truly was kindly invited last year. A place where, as a professional of all backgrounds, I am kindly invited to attend this year's virtul conference.

 Moreover, this post is not sponsored, dude, there was just the noble intention to share my virtual location next on November 7th, 2017.

It seems that fortunately, Britons are welcome, too. Yum!.

Original Software

The Facebook has announced that it will release its popular open source React, Jest, Flow and Immutable.js projects under the MIT license, abandoning the Facebook BSD+Patents license for those projects.

Facebook re-licensing React.js is good news for all you, WordPress developers.

From my point of view, there is an understanding and couple of reasonable facts about the arguments and reasons why a company like Facebook, would still preserve its right on its own property, opening the code to third parties, which is still misunderstood as being open-sourced.

First, we all know what open-source means you take something from the community or from the earth (like water or wind) and you make use of it for your purposes. No reader of this blog, invented the first computer device, I guess. Open source enables a development method for software that harnesses the power of distributed peer review and transparency of process.

Secondly, you distribute the source code you have developed, through the proper powered distribution channels provided by the community such as repositories: distribution through embedded models in the same application< and third parties can and should inspect it and review it, with the proper tool. We do all agree with the transparency ethical attribute when working in code.

After investing you time, licensing the code, there is the notated open-sourced obligation to allow modifications and derived works, to must allow them to be distributed under the same terms as the license of the original software.

Here comes trouble.

Derived works means giving free drinks around to your competitors, face it before you full your mouth with kind words. No one can assure quality in derived works. And quality is the essence of well-written software.

In the case your code is the root upon your company stands up  -- and some companies, like Facebook, have been building, writing and even litigating for code reasons unnecessarily, over the last decade -- licensing under heavy manners may be negative for you and all your team. Your society does not fill well into the open society and its enemies.
Negativeness solely based on the vision and added value you company holds. Do not misunderstood me, please. This is nothing against public wealth, but against the vision some mates like that Proudhon has on private property. A devastating vision product of a lunatic visionary who wrote in french language. And this vision impregnates the idea of open-source.

Interfaces, communication or integration, are built in our era mostly using CMS tools, no matter if they are open nor closed, neither free ( the last in the list is the term you wrongly associate with source).

For this purpose, the move The Facebook has done changing its license terms is good for the community. it means some other methods of revenue have to be found. and means that your social platform, maybe, just maybe, one day will no longer be free of use in terms of subscription.
React a Javascript library to build interfaces, now is open source.
Immutable, a functional tool, intended for functional programming, is also free of use, under the Apache License terms.
Community, it's time to work to make better these tools. No bugs, please.
because of it is my guess, most of these tools (libraries) were built having in mind processes The Facebook offers to its clients: voting, ad insertion, and other feauterettes, your business model may not need at all.
Widgets oriented to business of which your neutral and open code may not benefit from. Because of code is built and written with a single purpose in mind. As when using a tool you won-t be using the SQL language to write templates for webpages, nor Javscript with the single purpose to validate forms in the client side.


Even the infamous K. Marx showed a little respect and consideration for private property, and oriented aspects, if property does not means alienation. This is , your code belongs to me , so you are at my disposal. Shutting down platforms has been a normal activity in the last decade. No one writes code using the libraries provided by Nokia, Blackberry, either Opera Mini. Time spent with no profit returned. Freedom of trade, of a choice, presupposes property rights. Being materialists or Aristotelian if you rather prefer it, every man and woman is responsible of its own property, body and soul, which we all know it come inherited from our ancestors.
Now it is certainly easy to say to the single individual what Aristotle has already said: You have been begotten by your father and your mother; therefore in you the mating of two human beings – a species-act of human beings – has produced the human being.
You, your choice, your code is your child. Being you in the community  the ancestors won-t like you to fall down.

Custom Built

Readers may have noticed I have not paid very much attention to the brand new gadgets Apple Inc has provide us after a year of hard work. Not a single written line about the event. Which is unusual in this, yours truly, writer

Reasons for this, on purpose oblivion, may be due to focus and efforts on different interests, at a level of personal professional interests speaking, over last months. Professional interests which differ from that ones animojis represents. Bureaucratic stuff besides all, too.

So here below, a few words.

Animojis do not represent a solid and conceivable reason to get a new phone. not even a big screen. I am not interested in screens neither sizes anymore. They are outdated. Too much nineties concept.

Straight now, I do not even wear an Apple Watch, even I love the idea and the design behind the device, and the code and software served. I still keep and wear a simple, silver stained pocket watch. Looking further to the timeline of life, sure I will get one, but not right now. Wearables will be, one day or another In a forthcoming near future, outdated by the power of IoT. Like CD Players. Still a nice approach.

However, due to some professionals activities of mine in the past, I would like to express some impressions of mine on the matter -- yes, it's not cool anymore to make a grammatical use the first pronoun person narrative in written blogs anymore. Sadly I am a first person re-teller -- and my perception in  the use of Apple's products

I was having a look at the show, once was published worldwide for the common people. The rest of us. There was a curiosity floating, not for  precise reason, but because of an article written by a once famous Apple devoted persona, who I personally know and from whom I have a lot of professional respect, that caught my attention. He is on advising and art direction these days. Years ago he was one of the coolest minds in design and web programming. And art direction is quite related to Apple more than anyother tech company. The rebel ones.

For this, I visioned the show, much more glamorous than other from competitors, and my impressions were a little poor. Except if you re a n investor and except for one thing:  he thing is that one can not agree more on the best momentum of the show, than the one John Gruber describes to us in his blog, which reads as follows:
Craig Federighi, demonstrating the new animoji feature by turning his face into an animated pile of poo: “If you were wondering what humanity would do when given access to the most advanced facial animation, now you know.”
This is the sign of times, and Apple is on the road. Do not blame on Apple for not being ahead of our needs, except if you get paid to writ such a things. It’ a simple question of humanity behaviour.
It is my personal impression, after visiting the show, Apple still cares about humans, not focusing on buyers, respecting them, and what's more important, not degrading our condition of human beings calling us "audience". Which is
pretty good.

But not, for the same reason I do not wear an Android phone, I am not buying a new gadget from Apple. You should, but to me, it's not the right option by now.

You should, but to me, it’s not the right option for my needs, by now. Except for the reason to test and work with the most advanced facial animation technology we ever have known, I find it missing  — and in this I also agree with Mr. Gruber —  , that little perfection for details that is hidden in every perfect work, beyond its natural updates.

But because of you are human, you should not give the back to the new Apple’s innovative products. They are pretty custom built to your needs, to what humanity would do.

Global Networked Information Environment

The National Information Standards Organization (NISO) announces the publication of a new Technical Report,NISO TR-06-2017, Issues in Vocabulary Management determine the needs and requirements for extending the usability of the new bibliographic framework into the global networked information environment and to develop community consensus for a roadmap of activities needed in this space
Further Information:
Via niso dot org, a place where content publishers, libraries, and software developers turn for information industry standards that allow them to work together.

You can't win if you don't enter

You may want to demonstrate to the world the effectiveness of your mobile development capabilities.
The Web Marketing Association is proud to present the sixth annual MobileWebAwards competition
6th annual MobileWebAwards Awards

The deadline for entering the 6th annual MobileWebAwards Awards is

Like Paintings

Web design is the creation of digital environments that facilitate and encourage human activity; reflect or adapt to individual voices and content; and change gracefully over time while always retaining their identity.

If websites are architecture, why do we sell them like paintings?. Old gold from 2007. Via Jeffrey

Ps: Do not miss the list of wannabe commenters. ten years later, is priceless.

Index of Think

The W3C Thing Description (TD) is a central building block in a Web of Things (WoT) enabled system and can be considered as the entry point of a Thing (aka the index.html of the Thing).
The TD consists of semantic metadata for the Thing itself, a narrow-waist interaction model with WoT's Properties, Actions, and Events, a semantic schema to make data models machine-understandable, and features for Web Linking to express relations among Things.
Think on the Thing. Is just an index.

via Web of Things members

How to find a balance

The Web Marketing Association announces the winners of its 21th annual WebAward Competition for Web site development.

Entries in 96 industry categories were judged on design, copy writing, innovation, content, interactivity, navigation, and use of technology.

A complete list of the winning sites can be found at the WebAward Web site at

Congratulations to you winners who helped make this industry leading award program a success.

Let me express my gratitude to the WMA, overall for its excellent and sophisticated work behind, too, This yours truly, helping as an invited judge, behind the scenes.

See you in the forthcoming edition.

Wise Blood

Five ways data-driven marketing can transform your business into a machine that can leave the competition in the dust.

As i do, to define right goals and performance indicators, make better business decisions faster, so you will spend budget more profitably and, why not, your company will reach the excellence it deserves.

Via Adobe

Addenda, Uh, speaking about graphics and visuals, here you can see the idea number 64360 for the forthcoming winter. Vote.

Design is a crucial element

“Small changes, like a few extra pixels of padding or the tint of a button, can have large and unexpected repercussions,”
Segonquart Studio Designed Website: Nasty Mondays circa 2010
Hand Crafted Design nastymondys @Segonquart Studio circa 2010

Designing to encourage addictive behavior is a studied skill. We all knew it, sorry lads.

 Via Anne Quito

Fix Your Wagon

Drupal has released an update for its content management system (CMS) to address several critical security issues. Drupal 8.3.7 includes fixes for three vulnerabilities. Drupal has also issued a security advisory for Drupal 7.x.
Via Lee Neely 


And meanwhile, some hidden secrets from Segonquart Studio  In Motion, circa 2006
Posted by Segonquart Studio on Sunday, August 6, 2017


1.- A professional [designer]combines creative criteria with sound problem-solving strategy to create and implement effective communication design.

2.- A professional [designer] solves communication problems with effective and impactful information architecture.

3.- A professional [designer] conducts the necessary research and analysis to create sound communication design with clearly stated goals and objectives.

4.- Any self-promotion, advertising or publicity must not contain deliberate misstatements of competence, experience or professional capabilities..

5. -It must be fair both to client and other designers.
Business and ethical expectations which may -- and should -- be applicable to other fields of practice in our modern world. Becuase of when you solve problems, you act either as an architect, either as a designer.

Now there is the time we may need  to stablish a model of conduit for our digital age and assets, nothing better than the quoted from an ancient article and debate, circa 2004 at AIGA,  an authority on professionalism.

Number five looks hard in our age of selfies and vanity, but it charms me. Even at the peril of being hacked. Again.


WebAssembly in Firefox
WebAssembly. Future is Now.
WebAssembly or wasm is a new portable, size- and load-time-efficient format suitable for compilation to the web.

A Open standard plus more efficient than JavaScript, if you care about encryption and DRMs.for gaming et al.

Efficient binary format, that also has support for non-web embeddings., with eight hundred and something kids working on it. And you.

mkdir hello


: WG Action: Conclusion of ART Area General Applications Working Group (appsawg)
The APPSAWG has completed all of its milestones and is being closed.Thank you to past and present WG chairs, editors of WG documents, as well as WG participants, who together produced 35 RFCs since 2011.
Well-defined security issues, as well as calendaring, date and time formats, HTTP, internationalization, language tags, MIME, URIs and XML,  or small-scale additions to the protocol stack for HTTP and other application technologies, mostly related to service discovery and meta-data, were the main subjects discussed at the appswg working group from 2011 till 2017.

Discussion of new ART area topics should now will be brought to the DISPATCH WG.

Mission accomplished. You have done a great work. Me? well I was just an observer, more or less.

In your pocket, at your wrist, and on your desktop

A working group of experts at the IETF, in concrete ART Area General Applications Working Group (appsawg) is enhancing and updating a protocol. An access protocol, using precise terms.

This access protocol is the one that defines the access to your calendar; the one we technical people know as CalDAV, an open-standard

 CalDAV is designed for implementation by any collaborative software, client or server, that needs to maintain, access or share collections of events.

CalDAV is a real barebone protocol in our days Any collaborative software means the ones you make use everyday without noticing, as transparent as phone calls. Thus includes tasks, reads, and events in your daytime ( calendars , chats, whatsapps, whatever).

Some examples of software that makes your professional life easier may be free personal mail like  MSOutlook, Apple Calendar for IOs, Yahoo Calendar, Google Calendar et al.

The working proposal is featured in section 3.4 of the document. refers to some procedure in this collection of events

This specification defines an extension to the calendar access protocol (CalDAV) to allow attachments associated with iCalendar data to be stored and managed on the server.

Some problem this working group tries to solve are here exemplificated:   To add an attachment to an existing calendar object resource and the access for that event. What measures have to be implemented on the server to ensure the correct request allowing associated data? Which is the best method to ensure the security and wealth of the system and the solicitor after this request? What happens if a user --man or machine -- issues a POST method with attachments than can corrupt or damage the server or the data?

Brought to mind by the excellent work of Julian Reschke 

No distinction , not even required for that obsolete Mobile First development.  CalDAV acces protocol applies both to desktop and mobile devices. Another myth broken by this clean open-standards.

The rest, as always, is silence.

Saying ‘No’ is a UX Strategy Play

I never felt comfortable with the term "user", really.

Not when we are in a media like the web is. Indeed.

Indeed, there was a nice debate, in a niche of experts we met in a subscription list.

I guess the Web Marketing Association board, once, couple of years ago put the question over the question over the table. To find an answer, to solve a problem. t "What if we mean audience instead of users?"

The term audience fits better, like a hand in glove, like the term "people" when we design an strategy plan.

UX strategy plays range from providing regular usability testing, to introducing design studio workshops, to shifting the roadmap from a feature focus to a customer-problem focus.

delivered after reading Jared M. Spool's reflexions on playbooks.

Play it safe. No tricky timing.


IraLis (International Registry of Authors-Links to Identify Scientists) is a standardization system of scientific authors' signatures.

The promoters were academic and professionals with wide experience in many different areas of activity in their profession, and who are deeply involved in the communication of scientific matters, Even it might seem abandoned, which is not,  IraLis still is a cute repo of use to find the specialist you want

Delfi Ramirez at IraLis
Delfi Ramirez at IraLis

IraLIS was a hype in between the years 2002 and 2010 of our modern era.

Still working. Still indexing.


Shape It Up

Dan wrote an email in which there is the greatly appreciated input for you to fill the gap and the form provided

Constance invites you to unleash your imagination, in a proper way arguing pros and cons.

The question is simple: What do you think must be done to ensure the development of an open, trusted, accessible, and global Internet in the future?

You can take part and place your fingertip in the sand of History, here

Some conversations in these project were already  presented to UN trade experts in April, 2017 in Geneva.  but there is still  a lot to do.

The main intention is to help develop these recommendations to Internet leaders and actors, and policy makers if any for an open, trusted and global Internet in the Future.

A future which is occurring now, by the way. Uh.

I'm done. Your turn. 


An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials. The cracker obtains access to the computer systems or networks of the enterprise, and then conducts activities intended to cause harm to the enterprise.
What is an Insider threat, terms, references and all we need to know for the glorious summer by this sun of York, with same recommendations to prevent this nasty dwarfs who make the profit on the theft of information or corporate secrets; as you walk through the Internet.

You may not want to loose your wallet, if all your assets are digital. Which they are, in fact.

Via Margaret Rouse.

Individual and Team achievements

 2017 WebAward
There is now only one week left to enter the Web Marketing Association's 2017 WebAward Competition.  The WebAwards recognizes the individual and team achievements of Web professionals all over the world who create and maintain outstanding Web sites. The Competition Web site is located at and the deadline for entry is Wednesday, May 31, 2017.

18 Byte file, $14k bounty

I never felt comfortable using ImageMagick for desktop. Not under Ubuntu neither OSX. Really.

Not because of that, ehr, embrittled graphic user interface that most of the old open-source command software inherits. As if being open source means to be unpleasant.

Just because it was buggy. You had the feel it was buggy. Vulnerable.

Chris, feels the same. and does it technically in his analysis of the Yahoobleed :  A tricky vulnerability to spot because of the abstraction and also because this is a vulnerability caused by the absence of a necessary line of code, not the presence of a buggy line of code.

The ImageMagick Studio team did a great work back in 1999. But in our days there are no wizards, in a world of decreasing memory corruption and increasing sandboxing.

A world where  *bleed bugs provide a compelling option for easily stealing information from servers.

As that noble prized once sang, times are changing. Good bye, then , to the Ol' black magick. And it minds to me because of, in that old gone days,  before using c I was a fellow client of the yahoo email service.

And even in those prehistoric days, I never felt comfortable using ImageMagick.

ImageMagick was posted to Usenet's comp.archives group on August 1st, 1990.

Get yourself deepen on Yahoobleed  here, here and there

Via Jake Williams

The Good, The Bad. No Ugly

The Good

A kind public invitation for you to take part and visit the most celebrate meeting of the Infosec peepers community in Europe.Where hearts are entertaining June.

It does not mind you are a seller, a webmaster, a professor, or a thief. The brand new things brought and fresh delivered to you, by worldwide experts and professionals from the arena of applications, web services, care, analytics or services for you or your selected clientèle has a brunch in June.
As the annual meeting place for the industry, Infosecurity Europe brings together professionals from all around the globe and supports the community by providing opportunities to connect, be inspired, and learn how to overcome the latest security challenges.

Do your part to ensure that your organisation is prepared for future threats?. Sure you will kids.

Spread the word and invite your colleagues to join Infosecurity Europe in June as this yours truly does now - by sharing insight and lessons learned amongst the information security community, cyber defenders can protect against the threats of tomorrow.

An Initiative from Reed Exhibitions, with still a million things to say here.

The Bad

Server services and domains at Segonquart Studio will be out of reach for a week. Meeh.

Uh. No panic. Down for a while, old skool method. Tomorrow was another day.

No Ugly

One thing that i am certain of.

Great things happen when the World agrees

Some links of use, for this Warre of May, because of great things always happen, when we agree.

Design focused and for your pleasure only.

The Dublin Core metadata element set -- Part 1: Core elements” is now published.
ISO 15836-1:2017 establishes 15 core metadata elements for cross-domain resource description. These terms are part of a larger set of metadata vocabularies maintained by the Dublin Core Metadata Initiative.

Translating UX Goals into Analytics Measurement Plans
Designers have often been told to focus on outcomes, not features, so that they solve the right problem instead of building the wrong thing.

A revised Candidate Recommendation of ActivityPub
The Social Web Working Group invites implementation of a revised Candidate Recommendation of "ActivityPub." ActivityPub allows websites a direct social connection to user software, including Follow, Like, Share, and Comment, without an intermediate social network provider.

A company that designs and manufactures exceptionally soft and comfortable children's sleep and loungewear.
RocketHub: What is your professional background?
Suzie Levett: I previously practiced Naturopathic medicine in a women's health and fertility clinic in Sydney.

What's My Risk?

The Open Web Application Security Project (OWASP) announced on Monday the first release candidate for the 2017 OWASP Top 10, which proposes two new vulnerability categories, The OWASP Top 10 2017 RC1.

A lot of discussions and opinions, here and there, by this project lead by Dave Wichers; not due to his leadership attributes but instead on the fact this new list may be obsolete (uh) but necessary, as it is de facto an standard for web professionals and now, in our decade, security IT professionals too.

Good news every four years are always good news. Think yourself in positive, Even this yours truly may be critical for several objective reasons with this RC1, the most vane reason because once, not so long ago, his candidature for an OWASP open position was kindly rejected ( no reasons, no need for a reason neither); in a world of private contractors and tons of assets offered by this contractors and professionals ( think theRSA), this volunteer based initiative deserves no less than respect.

Judge for yourself and help maintain and develop this. Be smart.


Multi-Cost ALTO

Applications using the Internet already have access to some topology information of Internet Service Provider (ISP) network.

There is a working-draft discussed now at the IETF, quite promising, entitled draft-ietf-alto-multi-cost-09 with an intended status of standard track.

The ALTO (Application Layer-Traffic Optimization) Protocol ([RFC7285]) defines several services that return various metrics describing the costs between network endpoints.

The document defines a new service that allows an ALTO Client to retrieve several cost metrics in a single request for an ALTO Filtered Cost Map and Endpoint Cost Map. In addition, it extends the constraints to further filter those maps by allowing a client to specify a logical combination of tests on several cost metrics.

Authored by S. Randriamasy, W. Roome from Nokia Bell Labs, and N. Schwan from Thales Deutschland

If you want to know more about it, please follow the paths.

Expires: October 27, 2017

PMXPO 2017

PMXPO 2017, coming THURSDAY, April 27, 2017 at 10:30AM ET. It's the biggest virtual Project Management event of the year, brought to you by, the world's biggest online community of project professionals. Be sure to log on to enjoy a full day of informative and entertaining presentations while earning PDUs.

See you inside, as soon as you have complimented this URL to enter the expo:


Microsoft Publishes Digital Geneva Convention Docs

Microsoft has published a trio of policy papers in support of a Digital Geneva Convention. Two of the documents describe rules for countries and technology companies to abide by in cyberspace; the third calls for establishing an international body to attribute malicious cyberattacks. In a blog post, Microsoft president and Chief Legal Officer Brad Smith, noted that while the G7 has "published a declaration recognizing the urgent need to establish international norms for responsible nation state behavior in cyberspace," voluntary norms do not go far enough. 
Smith, who spoke about a Digital Geneva Convention at the RSA Conference earlier this year, wrote, "We need to... pursue a legally binding framework that would codify rules for governments and thus help prevent extraordinary damage."
The software based company, the one that long time ago flourished your screen with a charming  electric blue colour, advances masked in this brand new century. MS is holding a vision,  Which make us aware because of is a serious proof that may confirm the Theory of the Evolution, and besides, is making an educated guess:  Rules for countries and technology companies to abide by in cyberspace.

Never is too late. Roger, Redmond. "You can always just cross your fingers, search the Web, and try again".

After reading my income email, via the SANS Institute 

RFC 114

April 16, 1971 -- 46 years ago

Abhay Bhushan of MIT first publishes FTP in RFC 114
A file may or may not have access controls associated with it. The access controls designate the users' access privileges. In the absence of access controls, the files cannot be protected from accidental or unauthorized usage.

Image: 2002 Rus Shuler @ Pomeroy IT Solutions, all rights reserved

Foster Collaboration

There is an interesting debate these days, for those who do not celebrate all Easter, at the WHATWG.( Web Hypertext Application Technology Working Group).

The discussion, mostly, arises to the new possibilities that the audio tag should present for future implementations of elements featured the HTML5 language and its associated DOM API.

Mostly the use of this label is of public interest in what concerns to the transmission in streaming of contents for the web.

Is It Worth It?

These issues are all foreign to the neutrality of the technology itself, but necessary to be taken into account and implemented in a World in which the WWW is the mass communication media par excellence.

The pre-development and research reflection on this matter, actually presents concepts as interesting as the discussion of the streamed content, titles and singular attributes, the analysis of ISRC codes and regulations, or the famous article 15 of the WIPO's treaty.

I noticed to Patrick the similitude between what is referred in the industry as royalties and the term funding for scientists. I just wanted to mention that in this post, to know your opinion.  The greatest payoff on R&D is social return-return to organizations that do not participate directly. Like dancers in a stage.

Aside note: Apologies, dearest reader of this blog, for the poor written English featured in the linked email source. Ye know, life is hard in hostile territory and I am missing aptitudes, specially writing emails to a subscribers list.

Radio, live transmission.

Return to the source.

When an R&D project is finished, contractors and vendors may reap further profits based on their experience.
For this reason, the meta-data, new HTML-version 5-dot-something attributes, and other future aspects and enhancements the audio tag may present and offer in the future, are being debated among a few selected team of us.

And yes, memoirs came to mind. The debate brought to mind thecontents of that article in the ISOC, entitled A Brief History of the Internet, Part I, and written circa May/June in the year 1997.

Hence, an excerpt
The idea of open-architecture networking was first introduced by Kahn shortly after having arrived at DARPA in 1972. This work was originally part of the packet radio program, but subsequently became a separate program in its own right. At the time, the program was called "Internetting". Key to making the packet radio system work was a reliable end-end protocol that could maintain effective communication in the face of jamming and other radio interference, or withstand intermittent blackout such as caused by being in a tunnel or blocked by the local terrain. Kahn first contemplated developing a protocol local only to the packet radio network, since that would avoid having to deal with the multitude of different operating systems, and continuing to use NCP.


We are not talking about patent features here.The debate and the research done is the present is through the official mailing listThe mailing list archives are publicly accessible. "It was clear that these systems could be used from a distance and, more important, that they fostered collaborative user communities"

Memoirs came to mind  to avoid re-inventing the circle. Said all, time for brunch, fostering collaboration.


A toast In the memoir of Robert W. Taylor, a truly smoker innovator. Building upon the shoulders of giants.

This your truly, from the battlefield, hostile territory, proudly thinking about web hypertext, since 2004.


"Provenance is information about entities, activities, and people involved in producing a piece of data or thing, which can be used to form assessments about its quality, reliability or trustworthiness."
A must read, on the PROV,  defining various aspects that are necessary to achieve the vision of inter-operable interchange of provenance information in heterogeneous environments such as the Web via @ W3C PROV WG.

Provenance is the 'who'.

What is Web architecture?

As cited in the year 2004, a public working document, [ the TAG ], explains to us that there are a number of architectural principles that underlie the development of the World Wide Web. Some of these are well-known; others are less well-known or accepted.
(...) Web architecture refers to the underlying principles that should be adhered to by all Web components, whether developed inside or outside W3C. The architecture captures principles that affect such things as understandability, interoperability, scalability, accessibility, and internationalization.

For understandability, it is important that specifications be built on a common framework. This framework will provide a clearer picture of how specifications for Web technology work together.

For interoperability, there are some principles that cross Working Group boundaries to allow technical specifications to work together. For example, W3C has adopted an architectural principle that XML should be used for the syntax of Web formats unless there is a truly compelling reason not to (refer to "Assumed Syntax", by Tim Berners-Lee). This principle allows broad applicability of generic XML tools and is more likely to lead to general protocol elements that are useful for multiple purposes.

For scalability, it is important to base current work on wide applicability and future extensibility. For example, it is a common principle in designing specifications to avoid single points of control (e.g., a single registry that all specification writers or developers must use).
Web Architecture, a professional area and a subset of the Web technology -- (e.g., "Design Issues," "What is a Good Standard?," and "Common User Agent Problems,") ---, explained and defined by the W3C's Technical Architecture Group (TAG) Charter

W3C's Web Accessibility Initiative and Internationalization Activity are already producing Architectural Recommendations in the areas of accessibility and internationalization, respectively.

Circa 2004, repeat, 2004.

Bid Her Good Bye

TextWrangler is an all-purpose text and code editor for Mac OS X, based on the same award-winning technology as BBEdit, the leading professional HTML and text editor. 

Bare Bones is sunsetting TextWrangler, after all these plenty years. And they encourage anyone interested in TextWrangler to download and use BBEdit instead.

I met TextWrangler more than a decade ago which means a lot of years, seen the distance and the time elapsed. As much of us did, I felt in love with her logotype. It says a lot of things, a kind of farewell.

TextWrangler from BareBones

We look one each other and we became friends at a glance. TextWrangler helped me to meet my needs, to reach my goals, to achieve my timeliness and she helped me to be productive while pleasantly writing software. Or text.

Because we all know of software is written text. This is the reason what uniqueness fits for a project or a prototype. You can feel the hands and the mind that wrote the script, the objects, the bones.Feel them  just looking and reading that small piece of written software.

TextWrangler also helped me when I need or needed to upload via FTP, or SFTP a piece of text to the server. I must confess you that I learned to write software with TextWrangler, which may seem too lightweight for programmers.

She was of help, too, in a forensic exam, for a litigation process. "Look,  this has built done using a Bare Bones product". Period.

TextWrangler became one of my decisive and favourite tools, and she is not going to be updated, so you better change to BBEdit, manufactured in North Chelmsford, MA. You will have the same, exactly the same features your present toolbox contains. Not a miss but an improvement, wanting to assist his dearest and only friend.

Because of all our tools are important.

It's Time

The single biggest problem with UTC is that the decisions to add seconds are made by a committee a few months in advance of the change. And this results in time becoming unpredictable because it is never possible to know if we are dealing with a corrected or uncorrected time.
An approximation to correct measure, leap seconds an deltas in the net by Phillip Hallam-Baker, on Sat, 31 December 2016 21:32 UTC.
This would enable manufacturers to build devices with built in correction tables for a design life of one century which should meet everyone's needs.
Worth a read, at the IEFT Mail Archive. Quoted from  Predictable Internet Time.

News From The Fields

Why is Artificial Intelligence an ISOC matter?.

A question raised in the conversation on the topic for a draft policy paper developed on Artificial Intelligence which is high on the G20 agenda.

Internet Society [Member Number: 36154].
The goal of this paper is to explain a complex issue and also to offer a set of principles and recommendations to ensure AI services and products are developed and implemented in an ethical way. This is intended to be introductory and not an in-depth technical piece; ISOC is aiming to release it at the G20 Ministerial, later in April.
How much transparency may we get, do machines dream of electric sheep and all that current topics we as digitalized humans talk and care about.

There is a draft, a proposal on the AI subject, its  implications and how ethics may play a rule in the forthcoming future, or don't.

The current AI draft is available here in Box and is open for comments until 29 March: Here

If you wish to take part of this unique moment of democracy and human collaboration, if you have something to say about ; Please, read the draft and submit your comments to Carl Gahnberg and Ryan Polk

From this yours truly, Internet Society [Member Number: 36154].

Web Awards 2017


The 21st annual International WebAward Competition Call for Entry has begun. Adding an "award winner" to your profile starts with meeting the entry deadline. 31 05 2017

See you there!


An acronym for Political, Economic, Social, Technology, Legal, and Environmental, which are the ingredients needed for your business cocktail receipt. Serve it chilled, not stirred.
Collecting the technical indicators, the attribution details, and applying PESTLE-type analysis to these situations is key to determining if your business can make an appropriate choice for mitigating impact of the attack, given the company’s goals, current condition, and business operations.
Rob (Kraus) explians the method and the measure for a succesful PESTLE flavour and taste in his essay entitled Here’s What Industry Experts Say About Making Threat Intelligence Actionable

There is a mutual agreement with most of the explained in the article, experience with stakeholders included, fragrances from an early past. Two scenarios; the atomic level and the holistic level. What do YOU know that might benefit  MY company. So we help one each other. Products and services.

Worth a read. Worth a taste at The Recorded Future Blog.  Fresh delivered in the bar. Before the desserts.

Lights, camera, action

Intelligence takes this process a stage further by interrogating data and information to tell a story (a forecast, for example) that can be used to inform decision making. Crucially, intelligence never answers a simple question, rather it paints a picture that can be used to help people answer much more complicated questions. (...) This intelligence doesn’t directly answer the question of whether you should be given the organ, but it does aid in their decision-making process.
Threat Data, Information, and Intelligence: What’s the Difference? a collection of common terms that now  belong to the process and tailored bussiness decisions, including design and concepts, as you allready know, by RFSID on March 8, 2017, via @RecordedFuture.

Threat Data, Information, and Intelligence: What’s the Difference?

Clear and concise, this yours truly still have his own reserves and disagrees ( theoreticals, of course) on the Big Data assertions meaning with this the importance of being buzz. Worth a read.

Semantics 2017

May I define semantics as the fine art of surfacing the waves of natural language and written software language.

Sematics, a technique that was -- when a student -- the foundation of my career. And here we go:  SEMANTiCS 2017 - The Linked Data Conference is the 13th International Conference on Semantic Systems. noticed from Sebastian Hellmann to the semantic attendants of the lip and sailors aboard like you and this yers truly. Open to participation and splitting the night in the following matters, Semantics 2017 Conference is focused on:

 Web Semantics, Linked (Open) Data & ( like those we make use when designing websites ) Corporate Knowledge Graphs ( like those we send to our clients interest as a sum) , Knowledge Integration and Language Technologies ( something we learned at school or sinking stones for profit), Data Quality Management ( which is know as SEO techniques et al) and Economics of Data, Data Services and Data Ecosystems ( which is known as a feasibility study for the project -- something you do mentally everyday).

Need more?

Interest for the conference are listed below, so you can scope your efforts and save time, by the dawn's early light.

Call to participate is open now, underneath the street lamps till dusk or till dawn , next May 17, 2017 (11:59 pm, Hawaii time).

Semantics 2017, A conference. September 14-17 2017. Amsterdam. Where the sailors all meet.

Apologies for cross-posting.


Probably the best browser. That foxy one who once made you love the web, reaches now it's 52, seems so glad to be here.

Instead of a semester update, a deviation of a monthly continuous deploy, FirefoxESR 52 has matured and evolved with the web techniques. Now offering new tools at your disposal, new abilities, killing jar plugins ( but Flash Player), all these solid aspects are built for our and for your daily experienced basis. Solid ascpects as live CSS edition, with grids, and columns and future hacks HTML5's complete integration et al. This is why events unnerve me.

Firefox 52 ESR
 CSS grids with Firefox's new inspector tool

Firefox ages 52 and is out  and trembling in the streets. For your kids. For you nephew. For developers, too. Fifty-two, Both, ESR ( Extended Support Release) and  that version.

Whom for wheels are turning, be a professional. Choose the fox.

Updated  10th March 2017 16:53 GTM + 1: Klaus Hartnegg has written an article of this very special 52, that may be of your interest. Here

Newer Posts Older Posts Home