ed

We take the Mercedes-Maybach GLS 600 on a 12-hour cross-country drive

We get an exclusive first look at the Mercedes-Maybach GLS 600 and take it for a spin in a rather challenging setting




ed

We take Hyundai Alcazar’s top-end Signature edition for a spin

The heavily updated Hyundai Alcazar is a heady combination of space, luxury and practicality




ed

Mahindra Thar Roxx: All-round, rugged appeal

Building on the Thar brand is the all-new, five-door version christened the Thar Roxx, but that is where the similarity with the three-door ends




ed

Experience Formula 1 engineering in the new Mercedes-AMG C 63 S E Performance sedan

Mercedes-Benz India has introduced the Mercedes-AMG C 63 S E PERFORMANCE, a hybrid sports sedan that blends high-performance engineering with Formula 1™-inspired technology




ed

A Michelin food guide-inspired gourmet trail across Dubai’s inventive restaurants

The latest edition of the influential Michelin food guide helps us chart a gourmet food trail across some of Dubai’s most luxurious, inventive restaurants




ed

An Ayurvedic cookbook wins the Gourmand World Cookbook Award 2023

Aimed at the global reader, The Ayurvedic Wellness Cookbook, which won the Gourmand Food Award 2023, offers in depth know how of Ayurvedic ingredients, recipes and cooking




ed

The Vallachira Onam to be showcased for tourism

Vallachira panchayat in Thrissur District of Kerala has held Onam celebrations without a break since 1962. The 10-day festival which highlights folk performances is now a showcase for tourists



  • Life & Style

ed

Hearty mixed vegetable avial recipe




ed

The Hindu’s day-long curated walk highlighting Chennai’s Biryani

This biryani tour began at 8 a.m. To celebrate Madras Day, The Hindu organised a day-long curated trail to highlight the unique varieties of this city favourite’s dish. For those of you who could not join us, here’s the list




ed

Chandon India debuts its still red wine, Aurva

Chandon, the award-winning sparkling wine brand, debuts its still red wine, Aurva, a culmination of six decades of pioneering winemaking across the globe



  • Life & Style

ed

Sonal Ved’s ‘India Local’ delves into India’s chaat scene

From Burmese atho to crispy lamb bhel, Sonal Ved has documented India’s classic chaat and street food in her new book India Local, with recipes from chefs and home kitchens




ed

In Kerala, ‘Millet Cafes’ to come up in every district in a phased manner to popularise millets products

The cafes will serve millet-based food products and also have these on sale, says Kerala Agriculture Minister P. Prasad




ed

Two Canada-based Malayali friends launch artisanal arrack brand

Two Canada-based Malayali friends brew Taika, an artisanal arrack using fruits, spices, dates and jaggery Their ‘naadan charayam’ label bears the image of an elephant and a Kerala bus




ed

Popular wedding caterers of Chennai are setting up kitchens for selling traditional sweets for Deepavali

Popular wedding caterers are setting up kitchens for Deepavali, enabling customers to try, buy and post traditional sweets. We travel to each festive outpost, sampling the coffee and ladoos




ed

At Chennai’s new rooftop bar, catch sunsets and sip on innovative cocktails like shiitake-infused whisky

Located on the 10th floor in Egmore, and spread across 4,500 square feet, Irida Skky Lounge focusses on technique-driven dishes and cocktails




ed

How India’s mixologists are curating history-inspired cocktail menus

The menus delve into different aspects of history — the heritage of a city, of a place, ingredients that have stood the test of time, and even, classic drinks




ed

Have you tried the ‘palooda,’ which is served for Iftar?

Palooda and Paalum Pazhavum are just two of the many traditional drinks that are served for Iftar




ed

Dubai’s Michelin starred Avatara, an Indian vegetarian restaurant launches in Mumbai




ed

Meet Chennai’s Willy Wonka in his chocolate factory as city-based Cheers Chocolates launches its first store




ed

Watch: Hyderabad’s Chika Cafe serves coffee-infused gulab jamun 




ed

Karnataka government wants sugar content in beer capped at 25% of weight of malt of grain and declared on bottle label

Brewers have taken exception to the draft notification on it and demanded its withdrawal




ed

Head to Bengaluru’s Ishtaa to relish tried and tested comfort food




ed

Celebrated Chennai cook, Mountbatten Mani Iyer, no more

The legendary wedding caterer Mountbatten Mani Iyer who was known for cooking memorable traditional wedding feasts passed away peacefully on September 22 in Chennai





ed

Teen infected in Canada’s first bird flu case is in critical condition - The Washington Post

  1. Teen infected in Canada’s first bird flu case is in critical condition  The Washington Post
  2. A Canadian teen is in critical condition with what is believed to be bird flu  The Associated Press
  3. Teenager in critical condition with Canada’s first human case of bird flu  The Guardian
  4. H5N1-infected teenager now in ‘critical condition’ say Canadian doctors  The Telegraph
  5. Canadian teen with suspected avian flu in critical condition  University of Minnesota Twin Cities





ed

Booker Prize Is Awarded to Samantha Harvey’s ‘Orbital’ - The New York Times

  1. Booker Prize Is Awarded to Samantha Harvey’s ‘Orbital’  The New York Times
  2. Samantha Harvey wins the Booker prize for “Orbital”  The Economist
  3. ‘This is a book we need now’: Sara Collins on choosing this year’s Booker winner  The Guardian
  4. Orbital by Samantha Harvey: the Booker prize-winner set to go 'stratospheric'  The Week
  5. The inconvenient truth about this year’s Booker Prize winner  The Independent





ed

Lego Horizon Adventures Sylens voice actor revealed following Lance Reddick’s passing - Video Games Chronicle

  1. Lego Horizon Adventures Sylens voice actor revealed following Lance Reddick’s passing  Video Games Chronicle
  2. Lego Horizon Adventures Review  IGN
  3. Lego Horizon Adventures: How Long to Beat (& Chapter List)  GameRant
  4. Lego Horizon Adventures is a delightful, kid-friendly twist on Horizon Zero Dawn  Polygon
  5. How LEGO Horizon Adventures was built with real LEGO bricks, out Nov 14  PlayStation







ed

IDF: ‘New Hezbollah targets’ reached in expanded south Lebanon ground operation - The Times of Israel

  1. IDF: ‘New Hezbollah targets’ reached in expanded south Lebanon ground operation  The Times of Israel
  2. A new deterrence for Lebanon is needed to avoid a long war with Israel  Al Jazeera English
  3. Lebanon awaits truce proposals after US envoy expresses hope  Reuters
  4. Israel-Gaza-Lebanon live updates: 'No cease-fire' in Lebanon, defense minister says  ABC News
  5. While Israel Seeks Deal in Lebanon, IDF and Hezbollah Escalate Their Attacks  Haaretz




ed

How will Donald Trump’s plans for education affect Chicago Public Schools? - Chicago Tribune

  1. How will Donald Trump’s plans for education affect Chicago Public Schools?  Chicago Tribune
  2. Trump pledged to close the Education Department. What would that mean?  The Washington Post
  3. Could Donald Trump eliminate the Department of Education?  WCNC.com
  4. So You Want To Abolish The Department Of Education? Here’s What You Need To Know.  Forbes




ed

How to Become Valedictorian

Weird Al Yankovic, Alicia Keys, and Jodi Foster. What do all of these celebrities have in common? They were all valedictorians of their class. Though being valedictorian won't make you a supermodel or singer, it can set you on an impressive path that can lead you to succeed in your college career and in the world at large. All you need is to have mental toughness, endurance, and an unbeatable work ethic. So how do you do it? Just follow these steps.




ed

DLF is set to debut high-end villas in Goa, priced between Rs 40 and Rs 50 crore

Approximately 32 kilometers from the Goa International Airport in Dabolim, the opulent project will have 62 villas atop Reis Mago, a hill in Goa.  In the second half of the 2024-2025 fiscal year, 62 ultra-luxury villas in Goa, priced between … Continue reading



  • Real Estate News
  • DLF in Goa
  • Goa
  • Goa's real estate
  • Goa's real estate market

ed

The Civil Code of Procedure (CPC) defines Attachment of Property

Before purchasing, buyers should confirm that a property is free from legal issues. They must comprehend ideas from the Code of Civil Procedure (CPC), such as “Attachment of Property,” to do this. Attachment is the legal term for taking possession … Continue reading



  • Real Estate News
  • Attachment of Property
  • Civil code of Procedure
  • cpc
  • Indian laws
  • Indian real estate regulation

ed

Godrej Properties moves into Indore and purchases a 46-acre plot for planned development

Godrej Properties Ltd has announced the acquisition of a roughly 46-acre land parcel in Indore. According to the company’s July 31 regulatory filing, the development on this land will mostly consist of plotted residential units and offer an estimated saleable … Continue reading



  • Real Estate News
  • Godrej Proeprties
  • Indian real estate
  • Indian Real Estate market
  • Indore
  • Indore real estate
  • Indore real estate market

ed

12 Hidden iPhone Features You’ll Wish You Started Using Sooner

Try these 12 incredible iPhone tips and tricks for 2024 that will change the way you use your iPhone! From a hidden sleep timer in the Clock app to bypassing annoying ads in Safari WITHOUT an ad blocker, these hacks will save you time and headaches!




ed

Trump’s Vision for Flying Cars Gains Credibility with Addition of UFO Expert

Trump's flying car initiative gains momentum as UFO expert Dr. Michael Salla signals potential involvement, bringing advanced aerospace expertise to ambitious urban development plan.




ed

Timed ticketed entry for Glacier National Park next summer brings mixed reactions




ed

Military eVoting Pilot Postponed

An eVoting pilot that would allow miltary staff stationed overseas to cast their ballots electronically has been postoned. The pilot program was scraped due to security concerns - concerns not just about the pilot, but the security of the Internet...




ed

Federal eGov fund $92 million short

The 2005 U.S. federal budget includes just $5 million for the eGov fund. The amount requested for the year was $45 million. Last year the fund received just $3 million, which means over the last two years just $8 of...




ed

Feedback on NARA eGov policies saught

The Electronic Records Policy Working Group is inviting interested persons to provide their written views on issues relating to implementing section 207(e)(1)(A) of the E-Government Act of 2002. That section calls for ``the adoption by agencies of policies and procedures...




ed

Relationships are Entangled

Summary: People aren't digitally embodied. As a result, their online relationships are anemic. As we think about the kinds of digital identity systems that will help people live authentic online lives, we must build identity systems that give people tools to operationalize rich digital relationships.

Identity is the ability to recognize, remember, and react to people, organizations, systems, and things. In the current web, companies employ many ponderous technological systems to perform those functions. In these systems, we are like ghosts in the machines. We have "accounts" in companies' systems, but no good way to recognize, remember, and react to them or anyone else. We are not digital embodied.

One of the great benefits of embodiment is the ability to form and operationalize rich digital relationships. I've written a lot about the nature of digital relationships.

One of the discussions at VRM Day caused me to think about a feature of digital relationships I hadn't considered before. Someone said that if you think about a graph with people (or things, organizations, and so on) as the nodes, the relationships are the edges, like so1:

A single, bi-directional relationship (click to enlarge)

In this figure Alice and Bob have a bi-directional relationship. This is how I've normally thought about it and how I'd have drawn it. But in today's discussion, someone said that the relationship is shared and that Alice and Bob both control it. But I realized that viewpoint is too simple. Specifically, Alice and Bob each have a different perspective of that relationship and will use it separately.

For example, imagine that Alice is the cashier at a grocery store and Bob is a customer. Alice gives great service, so Bob seeks her out when he shops. Alice on the other hand has no particular recollection of Bob from encounter to encounter. For Alice, the relationship is ephemeral, but for Bob, it's longer term. The nature of each relationship is different. So, we might look at it like this:

Two uni-directional relationships (click to enlarge)

But after discussing it some more, I realized that these relationships aren't independent. They're entangled like this:

Entangled relationships (click to enlarge)

In the example I gave above, as Bob seeks out Alice more and more, Alice might come to recognize him and call him by name, changing the nature of her relationship with Bob. And that may influence the nature of Bob's relationship with Alice. Over time, these interactions influence both relationships. So, while Alice and Bob both have control over their relationship with the other, actions by one influence the other.

I frequently say that we don't build identity systems to manage identities, but rather to manage relationships. The problem with contemporary identity systems is that they are all one sided, controlled by one party—almost always a company. As I've said before, people are not digitally embodied and thus have no good way to manage their online relationships. As we strive to build better digital identity systems, I think it's paramount that we build systems that provide people with tools that embody them and provide them with the ability to operationalize their online relationships. These are more than decentralized; they are self-sovereign.

Notes

  1. Peer decentralized identifiers (DIDs) are a great technology for creating bi-directional relationships.

Tags:




ed

Decentralized Identity Comes of Age

Summary: In session after session, attendees at EIC are hearing the message that decentralized identity is the answer to their identity problems.

I'm at European Identity Conference (EIC) this week. I haven't been for several years. One thing that has struck me is how much of the conversation is about decentralized identity and verifiable credentials. I can remember when the whole idea of decentralized identity was anathema here. The opening keynote, by Martin Kuppinger is Vision 2030: Rethinking Digital Identity in the Era of AI and Decentralization. And all he's talking about is decentralized identity and how it's at the core of solving long standing identity problems. Another data point: Steve McCown and Kim Hamilton-Duffy ran a session this morning called Decentralized Identity Technical Mastery which was a hands-on workshop. The rather large room was packed—standing room only.

I attended a couple of sessions on decentralized identity where I didn't know the companies, the speakers, or the specific platforms they were using. The space is too big to keep track of anymore. Identity professionals who were ignoring, or talking down, decentralized identity a few years ago are now promoting it.

This truly feels like a tipping point to me. At IIW, it's identity geeks talking with other identity geeks, so it's no surprise to see lots of discussion about new things. EIC is a different kind of conference. There are about 1000 people here I'd guess. Most of them aren't working on new standards or open source projects. Instead they're the folks from companies who come to conferences like EIC to learn how to solve the problems their organization is facing.

In the keynotes and in numerous sessions, the message that they're hearing is "decentralized identity will solve your problems." Martin closed his talk with the proclamation that "decentralized identity is the new paradigm for identity."


Photo Credit: Credential Tipping Point by DALL-E (public domain) Prompt: Draw a rectangular picture that shows a credential at a tipping point. Make the credential look like a lifelike credential, include cartoon picture, and some writing. Use bright friendly colors.

Tags:




ed

What Is Decentralized Identity?

Summary: What is decentralized identity and why is it important? My attempt at a simple explanation.

In Yeah, yeah, yeah, yeah, yeah, nah, Alan Mayo references my recent blog post, Decentralized Identity Comes of Age, and says:

My challenge to the decentralization community is for them (someone) to explain how it works in relatively simple and reasonable terms. I say relative because identity is not simple, so we should not expect simple solutions.

This post is my attempt to do that for Alan and others.

Identity is how we recognize, remember, react to, and interact with other people, organizations, and services. Put another way, identity is about relationships. Online we suffer from a proximity problem. Since we're not near the parties we want to have relationships with, our natural means of recognizing, remembering, and interacting with others can't be used. Digital identity systems are meant to provide us with the means of creating online relationships.

Traditional identity systems have not served us well because they are owned and controlled by companies who build them for their own purposes. The relationships they support are anemic and transactional. We can't use them for any purpose except what their owner's allow.

Decentralized identity systems1 on the other hand allow you to create online relationships with any person, organization, or service you choose and give you the tools to manage and use those relationships. They help you recognize, remember, react to, and interact with them. The most important tool is a decentralized identity wallet. The world of decentralized identity wallets is still young, but organizations like the Linux Foundation's Open Wallet Foundation give me hope that useful, interoperable wallets are a tool we'll all be able to use soon. They are as foundational to decentralized identity as a browser is to the web.

Besides helping you manage peer-to-peer relationships with others online, wallets hold verifiable credentials, the digital analog to the credentials and cards you carry in a physical wallet. One of the most important aspects of digital relationships is providing information about yourself to those you interact with. Sometimes that information can come from you—it's self-asserted—but many times the other party wants to reliably know what others say about you. For example, if you establish a banking relationship, the bank is legally obligated to verify things like your name and address independent of what you say. Decentralized identity wallets allow you to prove things about yourself using credentials others provide to you. At the same time, they protect your privacy by limiting the information disclosed and forgoing the need for the party you're interacting with to directly contact others to verify the information you provide.

In summary, decentralized identity systems allow you to create digital relationships with other parties independently, without relying on any other organization or service. These relationships are direct, private, and secure. They also provide the means for you to prove things about yourself inside these relationships so that even though you're operating at a distance, you and the other party can have confidence in the relationship's authenticity.

How Does It Work

The preceding paragraphs say what decentralized identity is, and provide its benefits, but don't say how it works. Alan and others will likely want a few more details. Everything I describe below is handled by the wallet. The person using the wallet doesn't need to have any more knowledge of how they work than the operator of a browser needs to understand HTTP and HTML.

The foundation of a peer-to-peer, decentralized online relationship is an autonomic identifier like a peer DID. Identifiers are handles that someone else can use to identify someone or something else online. Peer DIDs can be created by a wallet at will, they're free, and they're self-certifying (i.e., there's no need for a third party). A relationship is created when two identity wallets create and exchange peer DIDs with each other on behalf of their owners. Peer DIDs allow the parties to the relationship to exchange private, secure messages.

There are four primary interaction patterns that wallets undertake when exchanging messages:

  1. DID Authentication which uses the DIDs to allow each party to authenticate the other
  2. Single-Party Credential Authorization where the same party issues and verifies the credential.
  3. Multi-Party Authorization where the credential issuer and verifier are different parties.
  4. Generalized Trustworthy Data Transfer which uses a collection of credentials to aid the wallet owner in completing online workflows.
Generalized Credential Exchange Pattern (click to enlarge)

Verifiable credentials make heavy use of cryptography to provide not only security and privacy, but also confidence that the credential data is authentic. This confidence is based on four properties a properly designed credential presentation protocol provides:

  1. The identifier of the credential issuer
  2. Proof that the credential is being presented by the party is was issued to
  3. Proof that the credential has not been tampered with
  4. The revocation status of the credential

The credential presentation can do all this while only disclosing the information needed for the interaction and without the verifier having to contact the credential issuer. Not having to contact the issuer ensures the credential can be used in situations with poor connectivity, that the issuer needn't be online, and preserves the credential subject's privacy about where the credential is being used.

A properly designed credential exchange protocol has four important properties:

  1. The system is decentralized and contextual. There is no central authority for all credentials. Every party can be an issuer, an owner, and a verifier. The system can be adapted to any country, any industry, any community, any set of credentials, any set of trust relationships.
  2. Issuers are free to determine what credentials to issue and whether or not to revoke them.
  3. Wallet owners are free to choose which credentials to carry and where and when they get shared. While some verifiers require a specific credential—such as a customs agent requiring a passport—others will accept a range of credentials. Therefore owners can decide which credentials to carry in their wallet based on the verifiers with whom they interact.
  4. Verifiers make their own decisions about which credentials to accept. For example, a bar you are trying to enter may accept any credential you have about your date of birth. This means some credentials (e.g., passports, driving licenses, birth certificates) may be much more useful than just for the original purpose for which they were issued.

These properties make a decentralized identity system self sovereign.

Why is Decentralized Identity Important?

Decentralized identity systems are designed to provide people with control, security, and privacy while enhancing the confidence we have in our online relationships. Some time ago, I wrote the following. I think it's an apt way to close any discussion of decentralized identity because unless we keep our eyes on the goal, we'll likely take shortcuts in implementation that fail to live up to their promise.

Presently, people don't have operational relationships anywhere online.2 We have plenty of online relationships, but they are not operational because we are prevented from acting by their anemic natures. Our helplessness is the result of the power imbalance that is inherent in bureaucratic relationships. The solution to the anemic relationships created by administrative identity systems is to provide people with the tools they need to operationalize their self-sovereign authority and act as peers with others online. Peer-to-peer relationships are the norm in the physical world. When we dine at a restaurant or shop at a store in the physical world, we do not do so under the control of some administrative system. Rather, we act as embodied agents and operationalize our relationships, whether they be long-lived or nascent, by acting for ourselves. Any properly designed decentralized identity system must provide people with the tools they need to be "embodied" in the digital world and act autonomously.

Time and again, various people have tried to create decentralized marketplaces or social networks only to fail to gain traction. These systems fail because they are not based on a firm foundation that allows people to act in relationships with sovereign authority in systems mediated through protocol rather than by the whims of companies. We have a fine example of a protocol mediated system in the internet, but we've failed to take up the daunting task of building the same kind of system for identity. Consequently, when we act, we do so without firm footing or sufficient leverage.

Ironically, the internet broke down the walled gardens of CompuServe and Prodigy with a protocol-mediated metasystem, but surveillance capitalism has rebuilt them on the web. No one could live an effective life in an amusement park. Similarly, we cannot function as fully embodied agents in the digital sphere within the administrative systems of surveillance capitalists, despite their attractions. The emergence of self-sovereign identity, agreements on protocols, and the creation of metasystems to operationalize them promises a digital world where decentralized interactions create life-like online experiences. The richer relationships that result from properly designed decentralized identity systems promise an online future that gives people the opportunity to act for themselves as autonomous human beings and supports their dignity so that they can live an effective online life.


Notes

  1. I prefer the term self-sovereign to decentralized because it describes the goal rather than the implementation, but I'll stick with decentralized here. All self-sovereign identity systems are decentralized. Not all decentralized identity systems are self-sovereign.
  2. The one exception I can think of to this is email. People act through email all the time in ways that aren't intermediated by their email provider. Again, it's a result of the architecture of email, set up over four decades ago and the culture that architecture supports.

Photo Credit: Young Woman Using a Wallet from DALL-E (public domain) Prompt: draw a rectangular picture of a young woman using a wallet.

Tags:




ed

AI and writing, AI in education, AI regulation

Anna Mills, Bluesky Social, Nov 13, 2024

The most interesting migration in social media these days is from twitter to Bluesky. Here are two approaches to making it easier: the first is a 'starter pack' on people in AI and education. It makes use of the Bluesky Lists feature or the Bluesky Starter Pack. In the same genre, here's a Tech Media Starter Pack. The second, via Miguel Guhlin, is based on a hashtag with members listed on a Google Docs spreadsheet. It's cleverly done. You have to apply to be listed on the spreadsheet, and to be accepted you have to use the #Edusky hashtag in your account on Bluesky. Viral. Here's the Edusky feed.

Web: [Direct Link] [This Post]




ed

View of Into the Open: Shared Stories of Open Educational Practices in Teacher Education

Helen J. DeWaard, Canadian Journal of Learning Technology, Nov 13, 2024

I enjoyed the lavish illustrations in this article, a rarity in academic publications. After anm introductory section, the paper offers what is essentially a dialogue around the topic of sharing and openness in education. This bit from  the abstract resonated most with me: "It is becoming ever more important to share expertise as practitioners, researchers, and theorists in the field of education by making explicit what is often tacit and unspoken, and when sharing knowledge, reflections, and actions. By actively thinking-out-loud through blogs, social media, and open scholarly publications, educators can openly share details of what, how, and why they do what they do." This is the space where OLDaily operates - a somewhat middle ground between full academia on the one hand and the popular press on the other.

Web: [Direct Link] [This Post]




ed

View of Preparing Educators to Teach and Create With Generative Artificial Intelligence

Paula MacDowell, Kristin Moskalyk, Katrina Korchinski, Dirk Morrison, Canadian Journal of Learning and Technology, Nov 13, 2024

This paper reports on a process where thirty-five teachers enrolled in an elective three-credit multimedia design course "engaged in experiential activities focussed on developing artificial intelligence (AI) literacy, alongside a collaborative assignment to co-author an open-access textbook, Teaching and Creating With Generative Artificial Intelligence." In the process, "the Student Artificial Intelligence Literacy (SAIL) framework was developed (illustrated)." The paper concludes with the usual recommendations ('do no harm', 'develop communication skills', etc.). Each participant wrote a chapter, though a common template was used. I very much like the idea of producing a useful open resource as part of class activities. Oddly, the article doesn't provide a link to the textbook, but I found it here. It's a nice selection of 'how-to' articles that readers, I think, will find useful. One chapter (chapter 20 1/2?) is missing.

Web: [Direct Link] [This Post]