z

How to Introvert or Extrovert Quiz

Personality. You’ve got one; your friends have one—everyone has one! But what does it say about you and your social tendencies? In the early 1900s, Carl Jung coined the terms “introvert” and “extrovert” to describe personality traits and behaviors. Introverts tend to be more reserved, whereas extroverts thrive on social interaction. So, where do you fall? Are you an introvert, extrovert, or something in between? Answer these questions about what you would do in any given situation to find out.




z

How to Reality Check Quiz

We all have blind spots, especially when it comes to the ways we treat others (and ourselves). Unfortunately, it can be pretty tough to take a really objective look at what your own weak points are. We’re here to help. Hit “Start Quiz” to rip off the Band-aid and see what your blind spots really are. Keep in mind, though—this quiz is just for fun!




z

How to Step Out of Your Comfort Zone

Overcome fear and get comfortable with discomfortIt can certainly be challenging and a little scary to step out of your comfort zone, but facing unfamiliar challenges can help you feel happier and more fulfilled in the long run. You can end up discovering a lot about yourself and your abilities when you make an effort to take risks and try new things. To help you begin this transformation, we’ve rounded up the best, most effective strategies for stepping out of your comfort zone, embarking on new adventures, and expanding your personal horizons.




z

How to Are You Smarter than a 5th Grader Quiz

Do you remember how to find the circumference of a circle? What about the capital of New Jersey? We’re about to quiz you game-show style with a variety of elementary school trivia questions, from math and science to history, geography, and language arts. Answer these 12 “Are You Smarter Than a 5th Grader?” questions to test your knowledge and see if you come out on top!




z

Govt should prioritize housing to boost the real estate market, according to developers

This year’s budget, which sets up the housing sector, will not only help the one crore urban poor and middle-class families who lack a place to reside.  It will also boost the real estate market and open new doors for … Continue reading




z

Get the Nikon Z50 Two Lens Kit for $1,149 (originally $1,349) – $200 savings

The Nikon Z50 Two Lens Kit features a 20.9MP DX-format sensor, 4K video capabilities, and two versatile zoom lenses. This mirrorless camera kit provides a complete solution for both photography and videography. Reasons to Buy What Makes It Stand Out The Z50 combines Nikon’s mirrorless technology with a practical two-lens solution. The included VR (Vibration Reduction) lenses […]




z

Decentralized Identity Comes of Age

Summary: In session after session, attendees at EIC are hearing the message that decentralized identity is the answer to their identity problems.

I'm at European Identity Conference (EIC) this week. I haven't been for several years. One thing that has struck me is how much of the conversation is about decentralized identity and verifiable credentials. I can remember when the whole idea of decentralized identity was anathema here. The opening keynote, by Martin Kuppinger is Vision 2030: Rethinking Digital Identity in the Era of AI and Decentralization. And all he's talking about is decentralized identity and how it's at the core of solving long standing identity problems. Another data point: Steve McCown and Kim Hamilton-Duffy ran a session this morning called Decentralized Identity Technical Mastery which was a hands-on workshop. The rather large room was packed—standing room only.

I attended a couple of sessions on decentralized identity where I didn't know the companies, the speakers, or the specific platforms they were using. The space is too big to keep track of anymore. Identity professionals who were ignoring, or talking down, decentralized identity a few years ago are now promoting it.

This truly feels like a tipping point to me. At IIW, it's identity geeks talking with other identity geeks, so it's no surprise to see lots of discussion about new things. EIC is a different kind of conference. There are about 1000 people here I'd guess. Most of them aren't working on new standards or open source projects. Instead they're the folks from companies who come to conferences like EIC to learn how to solve the problems their organization is facing.

In the keynotes and in numerous sessions, the message that they're hearing is "decentralized identity will solve your problems." Martin closed his talk with the proclamation that "decentralized identity is the new paradigm for identity."


Photo Credit: Credential Tipping Point by DALL-E (public domain) Prompt: Draw a rectangular picture that shows a credential at a tipping point. Make the credential look like a lifelike credential, include cartoon picture, and some writing. Use bright friendly colors.

Tags:




z

What Is Decentralized Identity?

Summary: What is decentralized identity and why is it important? My attempt at a simple explanation.

In Yeah, yeah, yeah, yeah, yeah, nah, Alan Mayo references my recent blog post, Decentralized Identity Comes of Age, and says:

My challenge to the decentralization community is for them (someone) to explain how it works in relatively simple and reasonable terms. I say relative because identity is not simple, so we should not expect simple solutions.

This post is my attempt to do that for Alan and others.

Identity is how we recognize, remember, react to, and interact with other people, organizations, and services. Put another way, identity is about relationships. Online we suffer from a proximity problem. Since we're not near the parties we want to have relationships with, our natural means of recognizing, remembering, and interacting with others can't be used. Digital identity systems are meant to provide us with the means of creating online relationships.

Traditional identity systems have not served us well because they are owned and controlled by companies who build them for their own purposes. The relationships they support are anemic and transactional. We can't use them for any purpose except what their owner's allow.

Decentralized identity systems1 on the other hand allow you to create online relationships with any person, organization, or service you choose and give you the tools to manage and use those relationships. They help you recognize, remember, react to, and interact with them. The most important tool is a decentralized identity wallet. The world of decentralized identity wallets is still young, but organizations like the Linux Foundation's Open Wallet Foundation give me hope that useful, interoperable wallets are a tool we'll all be able to use soon. They are as foundational to decentralized identity as a browser is to the web.

Besides helping you manage peer-to-peer relationships with others online, wallets hold verifiable credentials, the digital analog to the credentials and cards you carry in a physical wallet. One of the most important aspects of digital relationships is providing information about yourself to those you interact with. Sometimes that information can come from you—it's self-asserted—but many times the other party wants to reliably know what others say about you. For example, if you establish a banking relationship, the bank is legally obligated to verify things like your name and address independent of what you say. Decentralized identity wallets allow you to prove things about yourself using credentials others provide to you. At the same time, they protect your privacy by limiting the information disclosed and forgoing the need for the party you're interacting with to directly contact others to verify the information you provide.

In summary, decentralized identity systems allow you to create digital relationships with other parties independently, without relying on any other organization or service. These relationships are direct, private, and secure. They also provide the means for you to prove things about yourself inside these relationships so that even though you're operating at a distance, you and the other party can have confidence in the relationship's authenticity.

How Does It Work

The preceding paragraphs say what decentralized identity is, and provide its benefits, but don't say how it works. Alan and others will likely want a few more details. Everything I describe below is handled by the wallet. The person using the wallet doesn't need to have any more knowledge of how they work than the operator of a browser needs to understand HTTP and HTML.

The foundation of a peer-to-peer, decentralized online relationship is an autonomic identifier like a peer DID. Identifiers are handles that someone else can use to identify someone or something else online. Peer DIDs can be created by a wallet at will, they're free, and they're self-certifying (i.e., there's no need for a third party). A relationship is created when two identity wallets create and exchange peer DIDs with each other on behalf of their owners. Peer DIDs allow the parties to the relationship to exchange private, secure messages.

There are four primary interaction patterns that wallets undertake when exchanging messages:

  1. DID Authentication which uses the DIDs to allow each party to authenticate the other
  2. Single-Party Credential Authorization where the same party issues and verifies the credential.
  3. Multi-Party Authorization where the credential issuer and verifier are different parties.
  4. Generalized Trustworthy Data Transfer which uses a collection of credentials to aid the wallet owner in completing online workflows.
Generalized Credential Exchange Pattern (click to enlarge)

Verifiable credentials make heavy use of cryptography to provide not only security and privacy, but also confidence that the credential data is authentic. This confidence is based on four properties a properly designed credential presentation protocol provides:

  1. The identifier of the credential issuer
  2. Proof that the credential is being presented by the party is was issued to
  3. Proof that the credential has not been tampered with
  4. The revocation status of the credential

The credential presentation can do all this while only disclosing the information needed for the interaction and without the verifier having to contact the credential issuer. Not having to contact the issuer ensures the credential can be used in situations with poor connectivity, that the issuer needn't be online, and preserves the credential subject's privacy about where the credential is being used.

A properly designed credential exchange protocol has four important properties:

  1. The system is decentralized and contextual. There is no central authority for all credentials. Every party can be an issuer, an owner, and a verifier. The system can be adapted to any country, any industry, any community, any set of credentials, any set of trust relationships.
  2. Issuers are free to determine what credentials to issue and whether or not to revoke them.
  3. Wallet owners are free to choose which credentials to carry and where and when they get shared. While some verifiers require a specific credential—such as a customs agent requiring a passport—others will accept a range of credentials. Therefore owners can decide which credentials to carry in their wallet based on the verifiers with whom they interact.
  4. Verifiers make their own decisions about which credentials to accept. For example, a bar you are trying to enter may accept any credential you have about your date of birth. This means some credentials (e.g., passports, driving licenses, birth certificates) may be much more useful than just for the original purpose for which they were issued.

These properties make a decentralized identity system self sovereign.

Why is Decentralized Identity Important?

Decentralized identity systems are designed to provide people with control, security, and privacy while enhancing the confidence we have in our online relationships. Some time ago, I wrote the following. I think it's an apt way to close any discussion of decentralized identity because unless we keep our eyes on the goal, we'll likely take shortcuts in implementation that fail to live up to their promise.

Presently, people don't have operational relationships anywhere online.2 We have plenty of online relationships, but they are not operational because we are prevented from acting by their anemic natures. Our helplessness is the result of the power imbalance that is inherent in bureaucratic relationships. The solution to the anemic relationships created by administrative identity systems is to provide people with the tools they need to operationalize their self-sovereign authority and act as peers with others online. Peer-to-peer relationships are the norm in the physical world. When we dine at a restaurant or shop at a store in the physical world, we do not do so under the control of some administrative system. Rather, we act as embodied agents and operationalize our relationships, whether they be long-lived or nascent, by acting for ourselves. Any properly designed decentralized identity system must provide people with the tools they need to be "embodied" in the digital world and act autonomously.

Time and again, various people have tried to create decentralized marketplaces or social networks only to fail to gain traction. These systems fail because they are not based on a firm foundation that allows people to act in relationships with sovereign authority in systems mediated through protocol rather than by the whims of companies. We have a fine example of a protocol mediated system in the internet, but we've failed to take up the daunting task of building the same kind of system for identity. Consequently, when we act, we do so without firm footing or sufficient leverage.

Ironically, the internet broke down the walled gardens of CompuServe and Prodigy with a protocol-mediated metasystem, but surveillance capitalism has rebuilt them on the web. No one could live an effective life in an amusement park. Similarly, we cannot function as fully embodied agents in the digital sphere within the administrative systems of surveillance capitalists, despite their attractions. The emergence of self-sovereign identity, agreements on protocols, and the creation of metasystems to operationalize them promises a digital world where decentralized interactions create life-like online experiences. The richer relationships that result from properly designed decentralized identity systems promise an online future that gives people the opportunity to act for themselves as autonomous human beings and supports their dignity so that they can live an effective online life.


Notes

  1. I prefer the term self-sovereign to decentralized because it describes the goal rather than the implementation, but I'll stick with decentralized here. All self-sovereign identity systems are decentralized. Not all decentralized identity systems are self-sovereign.
  2. The one exception I can think of to this is email. People act through email all the time in ways that aren't intermediated by their email provider. Again, it's a result of the architecture of email, set up over four decades ago and the culture that architecture supports.

Photo Credit: Young Woman Using a Wallet from DALL-E (public domain) Prompt: draw a rectangular picture of a young woman using a wallet.

Tags:




z

Our New Tickets Feature Makes Communicating with Clients a Breeze

We’re launching a new feature on The Hub: Tickets. Now you can effortlessly communicate with your clients entirely within The Hub, with an easy-to-use instant ticketing system. Plus, it’s entirely white label so it’ll appear to clients as part of your own site. Why We Created Tickets At the moment, you’re probably using email or […]



  • WPMU DEV Products

z

The City Center In Paris Is Now Designated A Limited Traffic Zone

Many citizens in Paris were caught off-guard on November 5 when a new ban on motorists in the first four arrondissements of central Paris came into effect. As they looked around their city neighborhoods, residents could see nearly forty signs for the ‘Zone à Trafic Limité’ (ZTL) — or “limited ... [continued]

The post The City Center In Paris Is Now Designated A Limited Traffic Zone appeared first on CleanTechnica.




z

Toyota Exec Says California ZEV Goal Is Impossible To Achieve

Toyota is already complaining about the state of California and CARB as it seems an opportunity to shove its point of view down our throats.

The post Toyota Exec Says California ZEV Goal Is Impossible To Achieve appeared first on CleanTechnica.





z

Something Weird in the Neighbourhood — Australian & New Zealand EV Market October Update

Weird things are happening in the Australian auto market at the moment. In recent weeks, we have seen the launch of several new electric vehicles: the BYD Shark EREV ute (see here), the fully electric Jeep Avenger, and the Deepal SO7 SUV made by Changan from China. Not only that, ... [continued]

The post Something Weird in the Neighbourhood — Australian & New Zealand EV Market October Update appeared first on CleanTechnica.




z

Zenbi = Zenbiフォーラム : 全国美術館会議機関誌(全国美術館会議): 「女性と抽象」展について : コレクションとジェンダー / 小川 綾子 ; 小林 紗由里 ; 佐原 しおり ; 堀田 文 ; 松田 貴子 ; 横山 由季子

26:2024.9, p.F-14-16

続きを読む




z

Zenbi = Zenbiフォーラム : 全国美術館会議機関誌(全国美術館会議): 学芸員をめぐるシンポジウムに参加して / 横山 勝彦

26:2024.9, p.F-11-13

続きを読む




z

Zenbi = Zenbiフォーラム : 全国美術館会議機関誌(全国美術館会議): 美術館のサステナビリティとは / 片岡 真実

26:2024.9, p.F-5-7

続きを読む




z

Zenbi = Zenbiフォーラム : 全国美術館会議機関誌(全国美術館会議): 総務課長!必見の事実 : セキュリティと環境活動家 : ICOM-ICMS東京大会2023に参加して / 杉浦 智

26:2024.9, p.F-8-10

続きを読む




z

Zenbi = Zenbiフォーラム : 全国美術館会議機関誌(全国美術館会議): 能登半島地震の初動対応について / 以倉 新

26:2024.9, p.F-2-5

続きを読む





z

Jeff Bezos's rocket company Blue Origin accused of 'toxic' culture











z

Virginia Recognized for RSS Services

The State of Virginia was recently recognized by the Center for Digital Government with a third place ranking in the Best of the Web and Digital Government Achievement Awards. The recognition came largely for Virginia's new syndication and alert services. In accepting the award Governor Mark Warner said, "Our real-time online live help customer service continues to set the pace for the nation, and the portal's desktop alerts via live RSS feeds ensure that Virginia.gov users always have access to the most current information." The VIPNet portal and its RSS feeds are managed by the Virginia Information Providers Network. There are currently at least 34 feeds. Virginia uses RSS feeds not only for alerts, but also as a monitoring service that keeps citizens informed of new resources and services added to the portal.




z

Get 'An Introduction to Optimization: With Applications to Machine Learning, 5th Edition' for FREE and save $106!

Fully updated to reflect modern developments in the field, the Fifth Edition of An Introduction to Optimization fills the need for an accessible, yet rigorous, introduction to optimization theory and methods, featuring innovative coverage and a straightforward approach. The book begins with a review of basic definitions and notations while also providing the related fundamental background of linear algebra, geometry, and calculus. With this foundation, the authors explore the essential topics of unconstrained optimization problems, linear programming problems, and nonlinear constrained optimization. In addition, the book includes an introduction to artificial neural networks, convex optimization, multi-objective optimization, and applications of optimization in… [Continue Reading]




z

How to Optimize UX Design for Screen Readers

Achieving digital accessibility and optimizing your platform for screen readers, can be a strategic decision with multifaceted benefits. Not only does it reflect empathy and inclusivity for visually impaired users, but it also potentially expands your audience and the reach …




z

Minimizing User Decision Fatigue in Web Design

Offering an array of choices might seem like an excellent way to cater to diverse user preferences, but more often than not, it can cause decision fatigue, negatively impacting the user experience and conversion rates. So, how do we strategically …






z

Runaway Parasite SEO! Google Penalizes Forbes!

Welcome back, everyone, to a new episode of the Niche Pursuits News Podcast! Like every week, we’re here to talk about the latest SEO news for publishers, inspire you with some stories about our side hustles, and shock you with…

The post Runaway Parasite SEO! Google Penalizes Forbes! appeared first on Niche Pursuits.




z

Comscore amplía su oferta de análisis lanzando un nuevo estudio de mercado sobre Consumo de medios digitales para Centroamérica y Cono Sur 2023

El estudio que considera 13 países de la región proporcionará información valiosa para la planificación, evaluación y comercialización de publicidad en medios y plataformas digitales.




z

What are the most visited social media platforms among Gen Z?




z

What are the most used social media apps among Gen Z?

Gen Z is well known for being social media savvy. But not all platforms are created equal, and with new trends emerging it can be hard to keep track of where Gen Z is spending its time. In this blog, we’ll walk through the apps where you’re most likely to find this cohort scrolling, liking, and viewing, covering the following topics: 

  • What social media app has the highest reach among Gen Z? 
  • What social media app has grown the fastest among Gen Z?
  • How does Gen Z’s social media usage compare to the general population? 
  • How does Gen Z’s social media usage compare to other age groups? 




z

Wimbledon 2023: Alcaraz wins to usher in a new era with social media a key player

Wimbledon 2023 wrapped up with a men’s final tennis masterclass, and social media didn't miss out on the action.




z

Signal offers an encrypted alternative to Zoom - see how it works

The ability to share secure links for video calls is just one of the privacy-focused messaging app's new features.




z

Dedicatorio Arzobispo Dmitri




z

Marzo 1, 2012




z

Marzo 2, 2012




z

Marzo 3, 2012




z

Marzo 4, 2012




z

Marzo 5, 2012




z

Marzo 6, 2012




z

Marzo 7, 2012




z

Marzo 8, 2012




z

Marzo 9, 2012