You are exchanging Email internally, where the exchange topic leads to items such as the following being included in your email body:
1. Source Code Snippets
2. Debug output
3. Credit Card Details
4. Other Personally Identifiable Information.
The items above are common across software development companies and development departments.
There are many dangerous points of failure and inadvertent identity and security compromises that arise from this simple (but all too common) workflow interaction. Examples include:
1. Email AddressBooks (including those served up by LDAP Servers) Entries -- you have a many contacts with first-names such as "John" and/or surnames such as "Smith" which means keystroke lookup oriented user interaction patterns (UX) can easily lead to wrong recipient email address values in the "To:", "cc:", and "bcc:" email fields
2. Email Apps & Services -- you have no control over the Email app used by Email recipients, so your mail content (comprised of personally identifiable information) is more than likely Ad fodder for their Email apps/services
3. Identity related Vulnerability -- in extreme cases, malicious use of the personally identifiable information (PII) that you've inadvertently exchanged occurs, and you find yourself as a victim, defendant, or suspect in a case that requires legal defense and unexpected expenses (you could also find yourself behind bars, since increasingly, we are moving towards a "guilty, until proven innocent" society, due to decreasing technology literacy, identity issues awareness, and privacy appreciation, across technology vendors and governments).
Use email packages that allow you to digitally sign and optionally encrypt email. Thus, in the situation I've outlined above, if you have a "To:", "cc:", or "bcc:" field entry, one of the following will occur, when you send signed and encrypted emails:
1. Email client will indicate to you that it doesn't have the Public Key of one of the mail recipients -- this is the trigger that also enables you understand that it was the wrong "John" or "Smith" targeted in regards to actual email recipient
2. If you only sign the Email -- at the very least, the context of the inadvertent exposure of personally identifiable information would be clear and much more defensible, the mail has your signature (digitally infeasible to replicate, modulo use of platforms afflicted by the Heartbleed OpenSSL bug).
 http://www.ietf.org/rfc/rfc2633.txt -- S/MIME spec (broadly adopted standard, across all major native Email apps/services, that enables signing and encryption of Emails)
 http://youid.openlinksw.com -- a simple tool for generating digital identity cards (certificates) that can then be used to send emails via S/MIME compliant email apps/services.
 https://plus.google.com/s/s%2Fmime%20idehen -- Other G+ Posts about S/MIME .
#SMIME #Identity #NymWars #Privacy #PKI #Email #WebID #YouID #NetID
G+ Circles is a powerful feature that is being under utilized due to poor UX. If you make the UX better, there will be more useful circles created, which ultimately creates more productivity for G+ users who will then reward your with more cohesive and coherent content.
Just enable basic control UX patterns such as;
filtering circle lists as users type e.g., if I have a circle name comprised of the literals "Google" , narrow down the circle selection as I type.
That's all you need to do re., you most powerful but currently under utilized social networking weapon.
#OpenLetter #Tip #Productivity #GooglePlus #UX
 http://yorkporc.wordpress.com/2014/04/10/my-heart-bleeds-for-nsa-and-gchq-wholly-still-able-to-steal-your-passwords/ -- my heart bleeds for NSA and GCHQ, wholly still able to steal your passwords
 http://yorkporc.wordpress.com/2014/04/09/software-engineering-subversion/ -- software engineering subversion– Peter Guttman’s draft book .
#Security #OpenSSL #TLS #Privacy #PKI #Breach #NSA #GCHQ
For all intents and purposes, the massive Linked Open Data (LOD) cloud is a global collection of jigsaw puzzle pieces in the form of entity names and entity description description documents to which the aforementioned entity names resolve.
As one would expect, in a setup like this, we are going to have lots of puzzle pieces that belong to a variety of boxes. Here are some links showing how one create a "context lenses" into DBpedia by combining puzzles pieces across DBpedia and YAGO en route to an enriched view Churches.
You can triangulate around these issues via other TBoxes that provide "context lenses" into DBpedia. Example, using YAGO which ultimately connects to DBpedia via an owl:sameAs relation in the ABox.
 http://lod.openlinksw.com/c/G2D6HBO -- YAGO lenses on "Church"
 http://lod.openlinksw.com/c/GBSZ7QL -- actual owl:sameAs relation that has a DBpedia entity as its object
 http://lod.openlinksw.com/c/G24JJLQ -- which basically indicates to me that we might even be missing some DBpedia data in our LOD Cloud cache since the DBpedia entity URI does indeed resolve to a DBpedia entity description document
 http://lod.openlinksw.com/c/G45FYMV -- here I've enables owl:sameAs inference context (via &sas=yes added to the URL) which brings us full cycle (notice all the objects of the rdf:type relation, inherited from YAGO, dynamically).
#DBpedia #YAGO #LOD #LinkedData #SemanticWeb #BigData #SmartData #OpenData
Here's a collection of SPARQL + Geo Spatial related demos, based on Virtuoso's SPARQL extensions.
 http://bit.ly/1gfRKBH -- Polygon and multiple points on a map
 http://bit.ly/1hpKqYz -- Multiple Polygons and multiple points on a map
 http://bit.ly/QdcQdk -- Lines and multiple points on a map.
#SPARQL #LinkedData #LOD #SemanticWeb #BigData #NewSQL #OpenData #Data #PivotViewer #NoSQL #Web30
- OpenLink SoftwareCEO, 1992 - present
- UnisysTechnical Specialist (DBMS, Unix, 4GLs, Networking), 1990 - 1992
- OpenLink Virtuoso -- a Universal Server for heterogeneous data virtualization, integration, and management (database behind: DBpedia, Linked Open Data cache, Sindice, and may other Linked Open Data Cloud oriented Data Spaces)
- OpenLink Universal Data Access Drivers -- covering high-performance ODBC, JDBC, ADO.NET, and OLE-DB drivers for all major DBMS engines
- OpenLink Data Spaces -- powerful platform for Personal Data Spaces (enterprise and InterWeb scales)
- URIBurner -- a powerful data generation and virtualization service for turning Web 1.0 and 2.0 data into Web 3.0 oriented structured Linked Data
- OpenLink Data Explorer -- powerful browser extensions (all major browsers) and bookmarklets for exploring the Web's Linked Data Space dimension.
Forcing cancer cells to devour themselves by blocking a protein signal |...
Cancer cell death by autophagy (Credit: Cell Reports) Under stress from chemotherapy or radiation, some cancer cells dodge death by autophag
Ars buys bitcoins at one of the country’s only Bitcoin ATMs
At a train station in Boston, a Bitcoin ATM has attracted hundreds of users.
Move over, small-time Bitcoin exchange startups—Wall Street has arrived
Gentlemen, start your trading bots. Things are about to get crazy.
What Oracle's Botched Obamacare Site Says About the Future of the Web | ...
It's bad enough that the state of Oregon has paid software giant Oracle over $100 million to build a healthcare exchange site that doesn't w
Details about Apple SSL vulnerability and iOS 7.0.6 patch | CrowdStrike
On February 21st, 2014 Apple pushed out an emergency SSL security update for iOS (7.0.6).
Bitcoin security model: trust by computation - O'Reilly Radar
Bitcoin is a distributed consensus network that maintains a secure and trusted distributed ledger through a process called proof-of-work. Bi
A UK Surgeon Successfully 3D Printed And Implanted A Pelvis
A British surgeon successfully implanted a 3-D...
The Next Microsoft CEO And Lessons From Indians in Silicon Valley
When Vijay Vashee joined Microsoft in 1982 he was just one of two Indians at the 160-person company. It added several more recruits from Ind
If You Used This Secure Webmail Site, the FBI Has Your Inbox | Threat Le...
Photo: Peter Earl McCollough/WIRED While investigating a hosting company known for sheltering child porn last year the FBI incidentally seiz
14 African Countries Forced by France to Pay Colonial Tax For the Benefi...
Did you know many African countries continue to pay colonial tax to France since their independence till today! When Sékou Touré of Guinea d
Cryptography experts pen open letter against NSA surveillance
The pressure on the US government to reform the NSA’s surveillance programs is growing. Apple, Google, and Microsoft all called for change l
Aaron Swartz Explains Why The NSA Needs To Be Stopped | Techdirt
Last week, when we wrote about the big "day of action" against the NSA in memory of Aaron Swartz, to be held February 11th, a few folks ques
U.S. Political News, Opinion and Analysis - HuffPost Politics
Follow American politics, keep up with the hottest political debates, and share your thoughts and opinions on the political news that matter