sin

Creative Podcasting for Businesses

Podcasting content comes in a wide variety of shapes and sizes. Businesses are finding many different and creative ways of incorporating podcasts into their business strategies and marketing plans.

Here are just some of the various types of content that businesses are turning into podcasts...

Creative Podcasting for Businesses




sin

Advertising in RSS Feeds

As publishers have moved towards monetizing RSS feeds, their have been vibrant discussions as to whether advertisements in feeds are viable or whether they will drive subscribers away. At the end of the day while it appears that many are discussing the philosophical approaches to ads in RSS feeds few are taking the time to examine the options available for inserting advertisements in feeds. Ultimately the advertisements served are going to determine the success of RSS as an advertising medium. The ads served must be related to the content contained in the feed. If the RSS feed contains quality content, the ads are relevant, and the volume of ads is in balance with the volume of content served, advertising in RSS feeds will succeed. Take a closer look at some of the ad serving options currently available for RSS feeds.

Advertising in RSS Feeds




sin

Podcasting For Businesses

Regardless of the size of your business, or whether your company is public, private, a government agency, or a non-profit... there is little doubt that you should consider podcasting. Podcasting is a 21st century medium, and has proven that it is far more than just a passing fad.

Podcasting for Business




sin

Creative Podcasting for Businesses

Podcasting content comes in a wide variety of shapes and sizes. Businesses are finding many different and creative ways of incorporating podcasts into their business strategies and marketing plans.

Here are just some of the various types of content that businesses are turning into podcasts...

Creative Podcasting for Businesses




sin

Re-Using Content

Repurposing content is not a terribly new concept. Webmasters that picked up on the trend have benefited from traffic surges for a while now. Repurposing content is all about presenting the same content in a variety of different ways, or using different mediums to present the same content. Webmasters can manipulate content in order to provide the same content in any number of different formats.

Re-Using Content




sin

Podcasting For Businesses

Regardless of the size of your business, or whether your company is public, private, a government agency, or a non-profit... there is little doubt that you should consider podcasting. Podcasting is a 21st century medium, and has proven that it is far more than just a passing fad.
What is podcasting?

Podcasting is a relatively new communication medium. Podcasting's increasing popularity and low cost of entry makes it a great communication and promotional channel for companies to experiment with.

Podcasting is online audio content, and sometimes video content, that is delivered via an RSS feed.

Podcasting For Businesses




sin

Creative Podcasting for Businesses

Podcasting content comes in a wide variety of shapes and sizes. Businesses are finding many different and creative ways of incorporating podcasts into their business strategies and marketing plans.

Here are just some of the various types of content that businesses are turning into podcasts...
1. Audio Books

Books that are "read" aloud are no longer embraced only by the visually impaired. For example, commuters who want to make the most of their travel time have long embraced books-on-tape. The podcast medium is far more compact and portable, so audio books and similar content are now being made available as podcasts.
2. Audio Tours

Interested in a guided tour of a historic site, or a detailed explanation of a museum display? Audio tour podcasts with detailed explanations are becoming quite common.
3. Sermons

The word of God, Allah, or a bible study discussion are now all popular content for podcast material. It does not really matter the what the religious material might be -- what is important is that by turning those conversations and dialogs into podcasts, their reach is being extended and new audiences are being touched.

Creative Podcasting for Businesses




sin

What Can be Published Using RSS Feeds?

With all the vast amounts of information available on the web, it is becoming more and more difficult to sort through and find what you are looking for. RSS significantly lowers the signal-to-noise ratio. RSS has the unique ability to compile information and filter it, so you only see unique and relevant content. The information superhighway has become packed with content, and those familiar with technology are using RSS to filter the content, allowing them to drill down and access only the content they want, without having to wade through all the noise.

There are very few subjects or topics that do not currently have an RSS feed available. Perhaps it might be easier to ask what can not be published using RSS? RSS is a standard format to syndicate Internet content, not just blogs or podcasts, but any type of content. Podcasting clearly shows that feeds can be media-rich, and while podcasting is generally considered a medium for entertainment, the educational value of podcasting has not been lost on many educational institutions. The business community has been a little slower to embrace the power and importance of RSS as a communication medium, but industry leaders are gradually adopting it as a new and powerful method of communication. But back to the original point... RSS can deliver virtually any type of content, including spreadsheets, power point applications, database updates, video tutorial, and much more. The true value of RSS feeds is that the subscriber can review and evaluate the information at a time and place of their own choosing.

What Can be Published Using RSS Feeds?




sin

Podcasting For Businesses

Regardless of the size of your business, or whether your company is public, private, a government agency, or a non-profit... there is little doubt that you should consider podcasting. Podcasting is a 21st century medium, and has proven that it is far more than just a passing fad.

Podcasting For Businesses




sin

CF6449 BLUE RIDGE BAND - Chasing Sunsets (VF)

Catégorie - GROUPES » Genre - Country




sin

Advanced sensing tech can detect lung cancer in your exhaled breath

Researchers have developed a nanoscale sensor that detects lung cancer simply by analyzing the levels of a chemical called isoprene in your breath. The team believes its breakthrough could unlock a non-invasive, low-cost method to catch the disease early, and potentially save a lot of lives.

Continue Reading

Category: Cancer, Illnesses and conditions, Body & Mind

Tags: , , , ,




sin

First SpaceX Starship launch since 'chopsticks' catch: How to watch

Flight 6 of SpaceX's giant Starship is scheduled to fly no earlier than Monday, November 18, 2024. If there are no delays, the world's largest rocket ever to fly will lift off at 4:00 pm CST from the company's Texas Starbase. Here's how to watch.

Continue Reading

Category: Space, Science

Tags: , ,




sin

Watch: Ambitious robot learns to clean bathroom sink by watching

From washing urinals to tidying up the beach, we can already see a future where our robot servants help keep our world a little cleaner. Now, a robotic arm has mastered the surprisingly complex task of sink washing, showing off its ability to learn.

Continue Reading

Category: Robotics, Technology

Tags: , , ,




sin

Bacterial ‘sat nav’ tracks where you’ve been with surprising accuracy

We naturally pick up microorganisms as we move about the world. Now, researchers have developed an AI tool that accurately links you to a particular location using a sample of the bugs you’ve collected on your travels – like a bacterial satellite navigation system.

Continue Reading

Category: AI in Health, Medical Innovations, Body & Mind

Tags: , , , ,




sin

Stroboscopic photos capture magic of motion in a single frame

We're kicking off this week with a treat for your peepers. Unlike their usual settings, Harvard University staff photographer Niles Singer pointed a camera and a strobe flash at some of the school's athletes and performers as they ran, jumped, and danced in the dark.

Continue Reading

Category: Photography, Consumer Tech, Technology

Tags: ,




sin

Abusing Hindu Festivals to spark Violence and Hate

In addition to Ram Navami other local religious Yatras (processions), Ganga Aarti, (Prayer for river Ganges),Satsangs (religious meeting) , and other religious programs are being started with similar goals. The example of Kanwad Yatras (holy pilgrimage to collect Ganges water and to be put on Lord Shiva) is another example where the participants become aggressive.




sin

Hot NEWS for Business Owners ONLY

Heads Up Mark - Joyner has created another breakthrough gem -- 7 Day Business Turnaround. Go for it.




sin

Reducing Dementia Risk: The Surprising Benefits of a Firm Handshake

These simple lifestyle changes could protect your brain health and reduce the risk of dementia, here are a few powerful habits that can help keep your mind sharp for years to come.




sin

Coffee with Olive Oil: An New Trend with Surprising Health Benefits

A new trend is brewing in the coffee world: adding olive oil to coffee. While this combination may sound odd at first, it's gaining popularity among health enthusiasts and coffee fans alike.




sin

Replace Google Search with ChatGPT Using This Simple Trick

Many claim that search results from ChatGPT are better than traditional searches, and now there's an easy way to test it out.




sin

Sinch enables RCS provision via Customer Dashboard

(Telecompaper) Customer communications cloud software company Sinch said that Rich Communication Services (RCS) can now be provided using its Sinch Customer Dashboard...




sin

Singapore's Cyber Agency awards Veracity SGD 1 mln for bot detection

(Telecompaper) Veracity Trust Network has been awarded the Cybersecurity Co-Innovation and Development Fund (CCDF) CyberCall grant of SGD 1 million by the Cyber Security Agency Singapore (CSA)...




sin

WATCH: Young fan disconsolate over Lahore Qalandar's losing streak in PSL5

Teary-eyed boy refuses elders advice not to watch Lahore’s matches or to support another team




sin

CtrlS offers direct access to Oracle Cloud, AI services for Indian businesses

(Telecompaper) CtrlS Datacenters has announced it will provide its customers with direct high-speed connectivity to Oracle's cloud and AI services through Oracle Cloud Infrastructure (OCI) FastConnect...




sin

Singtel improves H1 underlying profit on stable revenues

(Telecompaper) Singtel saw strong EBIT growth of 27 percent year-on-year to SGD 738 million in fiscal first half to September...




sin

How to Deal With Flu Season's Surprising Companion: Pink Eye

Did you know that the flu, and even COVID, can cause pink eye? Here's how to treat it (and avoid spreading it to others).




sin

Vorige week in telecom: BCE waagt zich in de VS, Vodafone-3 fusie krijgt groen licht en BT en NTT werken aan wereldwijde business

Moet een telecombedrijf uitbreiden buiten zijn thuismarkt? Deze vraag kwam vorige week in het nieuws nadat BCE een grote stap naar de VS aankondigde, terwijl BT en NTT gemengde resultaten lieten zien bij het opbouwen van een internationale business...




sin

Dutch Business User Insights 2024 H1

The new report Dutch Business User Insights provides a snapshot of Dutch users of business services, with a clear focus on ICT services such as VPN, cloud, Teams and use of AI. Many employees have embraced the hybrid way way of working and this effects employer's choices of which ICT services are needed to facilitate this hybrid working.




sin

Telecom Business Market Insight 2024-Q2

In the Telecom Business Market Insight report Telecompaper analyses the Dutch business telecoms market, focusing on quantitative data up to Q2 2024. It offers a transparent and objective overview of the business market, through detailed insights into retail revenues and customer numbers. These are split into different types of telecom services.




sin

Netflix grows advertising audience to 70 mln subscribers ahead of year-end live events

(Telecompaper) ...




sin

Intel Denies RMA Request For Core i9-14900K CPU Witnessing Instability Issues Due To Use of Liquid-Metal Thermal Paste



  • HardForum Tech News

sin

7800X3D not rebooting when using restart from windows




sin

Assassin's Creed Shadows



  • PC Gaming & Hardware

sin

New Kia launches — EV9 and Carnival Limousine

Kia India unveils the EV9 e-SUV and Carnival Limousine, blending cutting-edge technology, luxury, and sustainability




sin

Sampling traditional flavours of Singapore with Theobroma

Kainaz Messman of Theobroma talks about the learnings of traditional food from the food collaboration in Singapore




sin

A culinary adventure in Auroville: Explore authentic Korean cuisine at Nowana




sin

Egypt's Sudanese refugees using rich cuisine to build new lives

Sudanese entrepreneur brings Sudan’s culinary traditions to Egypt, aiming to introduce Egyptian palates to Sudanese culture




sin

Circars Bistro: A new hub for American and continental cuisine in Visakhapatnam

Circars Bistro, Visakhapatnam’s newest American and continental dining space, offers a smorgasbord of offerings for the palate






sin

Lego Horizon Adventures Sylens voice actor revealed following Lance Reddick’s passing - Video Games Chronicle

  1. Lego Horizon Adventures Sylens voice actor revealed following Lance Reddick’s passing  Video Games Chronicle
  2. Lego Horizon Adventures Review  IGN
  3. Lego Horizon Adventures: How Long to Beat (& Chapter List)  GameRant
  4. Lego Horizon Adventures is a delightful, kid-friendly twist on Horizon Zero Dawn  Polygon
  5. How LEGO Horizon Adventures was built with real LEGO bricks, out Nov 14  PlayStation




sin

Tenant news to rejoice about! The April-June quarter saw an average price correction of 5-10% in Bengaluru’s rental housing market

Bengaluru’s rental housing market saw an average price correction of 5-10% during the April-June quarter of the current calendar year, according to local brokers who spoke with HT.com. This news should cheer up tenants in the city. The primary reasons … Continue reading



  • Real Estate News
  • Bengaluru's real estate
  • Bengaluru's real estate market
  • Bnegaluru's rental market
  • Indian real estate
  • Indian Real Estate market

sin

India’s commercial real estate market: Surpassing the global recession

Due to severe downturns in the global economy in 2023, the commercial real estate market saw a 66% annual decline in investments. Significant markets such as the US and Europe saw a 25% decline in leasing activity. The global commercial … Continue reading



  • Real Estate News
  • India's commercial market
  • India's real estate
  • Indian Real Estate market

sin

Govt should prioritize housing to boost the real estate market, according to developers

This year’s budget, which sets up the housing sector, will not only help the one crore urban poor and middle-class families who lack a place to reside.  It will also boost the real estate market and open new doors for … Continue reading




sin

Mumbai Rains: During the monsoon, the walk-in homebuyer’s activity slows down, impacting housing transactions

The real estate industry in Mumbai has suffered the most as a result of the heavy rains and the numerous cases of waterlogging that have been reported. Real estate experts claim that between July and August, during the monsoon, walk-ins … Continue reading



  • Real Estate News
  • Indian real estate
  • Indian Real Estate market
  • Monsoon effect's on Real Estate
  • Mumbai's real estate
  • Mumbai's real estate market

sin

12 Hidden iPhone Features You’ll Wish You Started Using Sooner

Try these 12 incredible iPhone tips and tricks for 2024 that will change the way you use your iPhone! From a hidden sleep timer in the Clock app to bypassing annoying ads in Safari WITHOUT an ad blocker, these hacks will save you time and headaches!




sin

GPO signs on to using PKI

One of the issues regarding information on the web is ensuring authenticity, especially in regards to government information. The GPO recently announced they will be soon begin using public-key infrastructure and digital signatures to ensure authenticity of documents released online....




sin

Web 2.0 is Collapsing Under its Own Weight

Summary: The overhead of performing even simple tasks online is getting larger and larger. I question the security of almost all these supposedly "secure" messaging systems. And I'm tired of the 'Utopia of Rules' mindset pervasive in every organization. It's exhausting how they expect customers to constantly adapt to their needs.

I don't know if you recall the game Kerplunk. It's a classic children's game that has been around for decades. I remember playing it with my sister. The basic setup involves a transparent plastic tube, a number of sticks, and marbles. The sticks are threaded through the tube to form a web or nest at the bottom on which the marbles rest. We'd take turns removing a stick at a time, trying not to let any marbles fall through the web and out of the tube. At some point, the remaining sticks can't hold the marbles and everything falls down.

The modern web reminds me more and more of a big Kerplunk game and I think the marbles are about to fall. What started out as an easier way to do things like shop, bank, and get health care information has become increasingly complex over time. More and more of the email I receive seems to be simply directing me to log into some bespoke system to retrieve a message or engage in some workflow. And even with a password manager, the act of logging in is often a chore with different user interfaces, custom MFA requirements, and weird rules for passwords. Once you're on the system, session time-outs induce their own form of anxiety since stepping away for a few minutes to attend to something else might require going through the whole Kafkaesque process all over again. The modern web has turned into a dystopian theater of the absurd where even reading a simple appointment reminder from your doctor requires several minutes of stress-inducing interaction with baroque systems and processes.

And it's not just doctors, of course, banks, government agencies, hospitals, ecommerce sites, and customer service systems all adopt these special purpose messaging systems. If you ask these organizations why they use bespoke messaging systems, they'll list things like "timely and improved communication," "convenience," and "privacy and security." But the real reason is that it's more convenient for them because these systems are integrated with their backends and make their processes more manageable. There's certainly nothing about them that's more convenient, timely, or better than email for their customers1.

I also question the privacy and security premise. Email can be insecure. And your email provider can see the contents of your emails. But the messaging system run by your doctor or bank is likely less secure than the email systems run by Apple, Google, and the others. And achieving privacy by making everything incompatible so that you have to use a different system for each correspondent is like chopping off your finger to prevent hangnails.

How did we get here? Bureaucracy. Not just government bureaucracy, but bureaucracy of all kinds. In Utopia of Rules2, David Graeber talks about how power imbalances force the less powerful group to perform what he calls interpretive labor, the work of understanding and implementing what's better or more convenient for the more powerful partner. People are not equal participants in online interactions. We don't have the tools to be fully embodied online3. Because of this we are forced to play by the rules organizations online who are digitally embodied with servers, identity systems, customer management systems, and so on. And part of that is being forced to use their inconvenient and anemic messaging systems.

What's the answer? People need tools. I think digital wallets (a bad name for an important tool), autonomic (peer) identifiers with strong cryptography, and verifiable credentials are a huge step forward. These tools provide the means for people to be peers online rather that mere ghosts in someone else's machine. That's why I insist on using the term self-sovereign rather than decentralized to describe these systems. Cogito Ergo Sum.

Notes

  1. For a deeper dive into why one-off messaging systems are never as good as email, see Rich Sharing and Personal Channels. Email and other useful messaging systems exhibit a property called rich sharing that makes them much more robust that the simple idea of "sharing a message" would bring to mind.
  2. If you're interested in power imbalances and how they come about, I can't recommend Graeber's book highly enough. He had such a keen understanding of this problem and wrote about it in a way that's both informative and entertaining.
  3. I talk about this in more detail in Chapter 17 of Learning Digital Identity when I discuss authentic digital relationships.

Photo Credit: Playing Kerplunk from DALL-E (public domain) Prompt: Draw a picture of a boy and girl playing kerplunk that's 1200x500 pixels

Tags:




sin

Using X.509 Certs for DID Provenance

Summary: The abundance of X.509 certificate authorities who already perform identity proofing for businesses provides a rich resource that can be leveraged to boot the verifiable data ecosystem.

When you used a verifiable credential to prove something about yourself, the verifier can know cryptographically: (1) the identifiers for the issuer, (2) the credential hasn't been tampered with, (3) the credential was issued to you, and (4) the credential hasn't been revoked. These four checks are important because their establish the fidelity of the data being transferred. They don't, however, tell them whether they can trust the issuer. For that, they need to take the issuer's decentralized identifier (DID) that they got from credential presentation and determine who it belongs to.

At the most recent Internet Identity Workshop, Drummond Reed gave a session on how X.509 certificates could help with this. The first step, like always, is to resolve the DID and retrieve the DIDDoc that associates keys and endpoints with the DID. The endpoint can be an HTTP server and, of course, should have an X.509 certificate providing TLS security. That certificate, at the very least, has a a domain name to bind that to the certificate's public key. It can, if you pay for the feature, also include information about the entity that applied for the certificate. The certificate authority proofs that information and is vouching for it when they sign the certificate.

The key to making the X.509 certificate useful for checking the provenance of a DID lies in one key change. X.509 certificates can contain and extended field called a Subject Alternative Name. This following figure shows how it can help.

Using X.509 Certificates to establish the owner of a DID (click to enlarge)

In this figure:

  1. The issuer (Attestor) creates the DID they will use to issue the certificate along with its associated DIDDoc, including an HTTP endpoint for DID verification.
  2. Attestor applies for a X.509 certificate for that endpoint, including in the application the DID they created in (1).
  3. The certificate authority does it's usual proofing of the application and issues a certificate that includes the DID in the Subject Alternative Name field.
  4. The issuer creates a credential definition in the usual way that includes their DID and writes it to whatever Verifiable Data Registry their DID method dictates.
  5. Attestor issues a credential to a holder (Alice) using that credential definition.
  6. At some later time, Alice presents the credential to the verifier (Certiphi).
  7. Certiphi resolves the DID to get the DIDDoc and retrieves the verfication endpoint from the DIDDoc
  8. Certiphi retrieves the certificate for that endpoint1.
  9. Certiphi verifies the certificate by checking it's signature and ensures that the DID in the DIDDoc for the credential matches the one in certificate.2

The issuer's DID has now been tied in a verifiable way to whatever information is in the certificate. Provided the certificate includes information about the entity beyond the domain name, the verifier can use that information to determine whether or not the credential is authentic (i.e., issued by who the credential definition purports issued it). That might be all the evidence they need to determine whether to trust the entity. Certificate authorities could also issue verifiable credentials to the customer attesting the same verified claims—after all, it's one more product they can offer.

The benefit of doing issuer validation using X.509 certificates is that there are already many trusted X.509 certificate authorities in business who already do proofing of attributes about businesses. That's a huge chunk of the verifiable data ecosystem that doesn't need to be built because it can be leveraged. To make this work, digital certificate authorities would need to start offering to validate DIDs and include them in a certificate as a Subject Alternative Name. I don't discount that this will take some bureaucratic maneuvering. Certificate authorities will need to see a business opportunity. I'd love to see Digitcert or someone do a pilot on this.

Notes

  1. Note that this step might be combined with the previous step if the Verifiable Data Registry is the same server as the endpoint, but that's not necessarily going to be the case for a number of reasons.
  2. Note that this does not create a call back wherein Attestor can determine which credential was used, preserving the privacy of the presentation. Attestor does know one of its credentials has been presented to Certiphi. If this information leakage bothers you, then any web-based DID method is potentially a problem.

Tags:




sin

Watch: Ambitious robot learns to clean bathroom sink by watching

Michael Franco, New Atlas, Nov 13, 2024

The depth and detail in this paper (8 page PDF) are daunting, but the gist, as summarized in this post, is straightforward: provided only with observations of a human cleaning (" using a so-called instrumented tool, which is a standard tool equipped with additional sensors") the front of an ordinary sink, a robot arm learn to clean entire sinks with varying surface topology. "The model implicitly learned the correct
tool orientation and position w.r.t. the freeform 3D surface." Michael Franco speculates, "a fleet of robots could learn the basic moves from each other through what's known as 'federated learning' and then they could apply those moves to their individual, specified tasks."

Web: [Direct Link] [This Post]