en

Decentralized Identity Comes of Age

Summary: In session after session, attendees at EIC are hearing the message that decentralized identity is the answer to their identity problems.

I'm at European Identity Conference (EIC) this week. I haven't been for several years. One thing that has struck me is how much of the conversation is about decentralized identity and verifiable credentials. I can remember when the whole idea of decentralized identity was anathema here. The opening keynote, by Martin Kuppinger is Vision 2030: Rethinking Digital Identity in the Era of AI and Decentralization. And all he's talking about is decentralized identity and how it's at the core of solving long standing identity problems. Another data point: Steve McCown and Kim Hamilton-Duffy ran a session this morning called Decentralized Identity Technical Mastery which was a hands-on workshop. The rather large room was packed—standing room only.

I attended a couple of sessions on decentralized identity where I didn't know the companies, the speakers, or the specific platforms they were using. The space is too big to keep track of anymore. Identity professionals who were ignoring, or talking down, decentralized identity a few years ago are now promoting it.

This truly feels like a tipping point to me. At IIW, it's identity geeks talking with other identity geeks, so it's no surprise to see lots of discussion about new things. EIC is a different kind of conference. There are about 1000 people here I'd guess. Most of them aren't working on new standards or open source projects. Instead they're the folks from companies who come to conferences like EIC to learn how to solve the problems their organization is facing.

In the keynotes and in numerous sessions, the message that they're hearing is "decentralized identity will solve your problems." Martin closed his talk with the proclamation that "decentralized identity is the new paradigm for identity."


Photo Credit: Credential Tipping Point by DALL-E (public domain) Prompt: Draw a rectangular picture that shows a credential at a tipping point. Make the credential look like a lifelike credential, include cartoon picture, and some writing. Use bright friendly colors.

Tags:




en

What Is Decentralized Identity?

Summary: What is decentralized identity and why is it important? My attempt at a simple explanation.

In Yeah, yeah, yeah, yeah, yeah, nah, Alan Mayo references my recent blog post, Decentralized Identity Comes of Age, and says:

My challenge to the decentralization community is for them (someone) to explain how it works in relatively simple and reasonable terms. I say relative because identity is not simple, so we should not expect simple solutions.

This post is my attempt to do that for Alan and others.

Identity is how we recognize, remember, react to, and interact with other people, organizations, and services. Put another way, identity is about relationships. Online we suffer from a proximity problem. Since we're not near the parties we want to have relationships with, our natural means of recognizing, remembering, and interacting with others can't be used. Digital identity systems are meant to provide us with the means of creating online relationships.

Traditional identity systems have not served us well because they are owned and controlled by companies who build them for their own purposes. The relationships they support are anemic and transactional. We can't use them for any purpose except what their owner's allow.

Decentralized identity systems1 on the other hand allow you to create online relationships with any person, organization, or service you choose and give you the tools to manage and use those relationships. They help you recognize, remember, react to, and interact with them. The most important tool is a decentralized identity wallet. The world of decentralized identity wallets is still young, but organizations like the Linux Foundation's Open Wallet Foundation give me hope that useful, interoperable wallets are a tool we'll all be able to use soon. They are as foundational to decentralized identity as a browser is to the web.

Besides helping you manage peer-to-peer relationships with others online, wallets hold verifiable credentials, the digital analog to the credentials and cards you carry in a physical wallet. One of the most important aspects of digital relationships is providing information about yourself to those you interact with. Sometimes that information can come from you—it's self-asserted—but many times the other party wants to reliably know what others say about you. For example, if you establish a banking relationship, the bank is legally obligated to verify things like your name and address independent of what you say. Decentralized identity wallets allow you to prove things about yourself using credentials others provide to you. At the same time, they protect your privacy by limiting the information disclosed and forgoing the need for the party you're interacting with to directly contact others to verify the information you provide.

In summary, decentralized identity systems allow you to create digital relationships with other parties independently, without relying on any other organization or service. These relationships are direct, private, and secure. They also provide the means for you to prove things about yourself inside these relationships so that even though you're operating at a distance, you and the other party can have confidence in the relationship's authenticity.

How Does It Work

The preceding paragraphs say what decentralized identity is, and provide its benefits, but don't say how it works. Alan and others will likely want a few more details. Everything I describe below is handled by the wallet. The person using the wallet doesn't need to have any more knowledge of how they work than the operator of a browser needs to understand HTTP and HTML.

The foundation of a peer-to-peer, decentralized online relationship is an autonomic identifier like a peer DID. Identifiers are handles that someone else can use to identify someone or something else online. Peer DIDs can be created by a wallet at will, they're free, and they're self-certifying (i.e., there's no need for a third party). A relationship is created when two identity wallets create and exchange peer DIDs with each other on behalf of their owners. Peer DIDs allow the parties to the relationship to exchange private, secure messages.

There are four primary interaction patterns that wallets undertake when exchanging messages:

  1. DID Authentication which uses the DIDs to allow each party to authenticate the other
  2. Single-Party Credential Authorization where the same party issues and verifies the credential.
  3. Multi-Party Authorization where the credential issuer and verifier are different parties.
  4. Generalized Trustworthy Data Transfer which uses a collection of credentials to aid the wallet owner in completing online workflows.
Generalized Credential Exchange Pattern (click to enlarge)

Verifiable credentials make heavy use of cryptography to provide not only security and privacy, but also confidence that the credential data is authentic. This confidence is based on four properties a properly designed credential presentation protocol provides:

  1. The identifier of the credential issuer
  2. Proof that the credential is being presented by the party is was issued to
  3. Proof that the credential has not been tampered with
  4. The revocation status of the credential

The credential presentation can do all this while only disclosing the information needed for the interaction and without the verifier having to contact the credential issuer. Not having to contact the issuer ensures the credential can be used in situations with poor connectivity, that the issuer needn't be online, and preserves the credential subject's privacy about where the credential is being used.

A properly designed credential exchange protocol has four important properties:

  1. The system is decentralized and contextual. There is no central authority for all credentials. Every party can be an issuer, an owner, and a verifier. The system can be adapted to any country, any industry, any community, any set of credentials, any set of trust relationships.
  2. Issuers are free to determine what credentials to issue and whether or not to revoke them.
  3. Wallet owners are free to choose which credentials to carry and where and when they get shared. While some verifiers require a specific credential—such as a customs agent requiring a passport—others will accept a range of credentials. Therefore owners can decide which credentials to carry in their wallet based on the verifiers with whom they interact.
  4. Verifiers make their own decisions about which credentials to accept. For example, a bar you are trying to enter may accept any credential you have about your date of birth. This means some credentials (e.g., passports, driving licenses, birth certificates) may be much more useful than just for the original purpose for which they were issued.

These properties make a decentralized identity system self sovereign.

Why is Decentralized Identity Important?

Decentralized identity systems are designed to provide people with control, security, and privacy while enhancing the confidence we have in our online relationships. Some time ago, I wrote the following. I think it's an apt way to close any discussion of decentralized identity because unless we keep our eyes on the goal, we'll likely take shortcuts in implementation that fail to live up to their promise.

Presently, people don't have operational relationships anywhere online.2 We have plenty of online relationships, but they are not operational because we are prevented from acting by their anemic natures. Our helplessness is the result of the power imbalance that is inherent in bureaucratic relationships. The solution to the anemic relationships created by administrative identity systems is to provide people with the tools they need to operationalize their self-sovereign authority and act as peers with others online. Peer-to-peer relationships are the norm in the physical world. When we dine at a restaurant or shop at a store in the physical world, we do not do so under the control of some administrative system. Rather, we act as embodied agents and operationalize our relationships, whether they be long-lived or nascent, by acting for ourselves. Any properly designed decentralized identity system must provide people with the tools they need to be "embodied" in the digital world and act autonomously.

Time and again, various people have tried to create decentralized marketplaces or social networks only to fail to gain traction. These systems fail because they are not based on a firm foundation that allows people to act in relationships with sovereign authority in systems mediated through protocol rather than by the whims of companies. We have a fine example of a protocol mediated system in the internet, but we've failed to take up the daunting task of building the same kind of system for identity. Consequently, when we act, we do so without firm footing or sufficient leverage.

Ironically, the internet broke down the walled gardens of CompuServe and Prodigy with a protocol-mediated metasystem, but surveillance capitalism has rebuilt them on the web. No one could live an effective life in an amusement park. Similarly, we cannot function as fully embodied agents in the digital sphere within the administrative systems of surveillance capitalists, despite their attractions. The emergence of self-sovereign identity, agreements on protocols, and the creation of metasystems to operationalize them promises a digital world where decentralized interactions create life-like online experiences. The richer relationships that result from properly designed decentralized identity systems promise an online future that gives people the opportunity to act for themselves as autonomous human beings and supports their dignity so that they can live an effective online life.


Notes

  1. I prefer the term self-sovereign to decentralized because it describes the goal rather than the implementation, but I'll stick with decentralized here. All self-sovereign identity systems are decentralized. Not all decentralized identity systems are self-sovereign.
  2. The one exception I can think of to this is email. People act through email all the time in ways that aren't intermediated by their email provider. Again, it's a result of the architecture of email, set up over four decades ago and the culture that architecture supports.

Photo Credit: Young Woman Using a Wallet from DALL-E (public domain) Prompt: draw a rectangular picture of a young woman using a wallet.

Tags:




en

Digital Identity and Access Control

Summary: Until we value freedom and independence in the digital world, we will yield up control of our digital lives to others who will act in their own interests, not ours.

In response to a post on X about China's social credit system, Paul Conlon said:

Digital ID is ultimately about access control where those who impose the system are the ones determining what you are required to be and do.

Provision of resources and liberties become conditional upon the whims of the affluent. Doesn't sound safe or convenient to me.

From X
Referenced 2024-08-28T08:10:31-0400

How Paul said this struck me because I've been thinking a lot about access control lately. I believe that we build identity systems to manage relationships, but, as Paul points out, in many cases the ultimately utility of identity systems is access control.

This isn't, by itself, a bad thing. I'm glad that Google controls access to my GMail account so that only I can use it. But it doesn't stop there. If I use my Google account to log into other things, then Google ultimately controls my access to everything I've used it for. This is federation's original sin1.

Paul's comment points out the primary problem with how we build identity systems today: when access control is centralized, it inherently shifts power towards those who manage the system. This dynamic can lead to a situation where individuals must conform to the expectations or demands of those in control, just to maintain their access to essential services or resources. While we often accept this trade-off for convenience—like using Google to manage multiple logins—the broader implications are troubling.

The more we rely on federated identity systems, with their tendency to centralization, the more we risk ceding control over our digital lives, reducing our autonomy, and increasing our dependence on entities whose goals may not align with our own. This is why the principles of self-sovereign identity (SSI) are so compelling. SSI proposes a model where individuals maintain control over their own identity, reducing the risks associated with centralized access control and enhancing personal freedom in the digital realm.

Critics of SSI will claim that giving people control over their identity means we have to accept their self assertions. Nothing could be further from the truth. When someone wants me to prove I'm over 18, I use a driver's license. The state is asserting my age, not me. But I'm in control of who I show that to and where. Sovereignty is about borders and imposes a system of relationships.

Now, China could use decentralized identity technology to build their social credit system. One credential, controlled by the state, that is used to access everything. Technology alone can't solve this problem. As a society, we have to want a digital world, modeled on the physical one, where individuals are the locus of control and use information and assertions from a variety of credentials to build and interact in authentic peer-to-peer relationships. Until we value freedom and independence in the digital world, we will yield up control of our digital lives to others who will act in their own interests, not ours.


Notes

  1. For similar reasons, I think federated social media systems are a bad idea too, but that's another blog post.

Photo Credit: Papers Please from DALL-E (public domain). Prompt: Draw a rectangular picture of police checking identity papers of people on the street

Tags:




en

Internet Identity Workshop XXXIX Report

Summary: We held the 39th edition of Internet Identity Workshop last week. Like always, it was a great week.

The 39th edition of the Internet Identity Workshop wrapped up last week. We have 364 attendees from around the world who called 178 sessions. I can't begin to describe the energy of the identity community when they all get together to discuss their favorite topics. If you like identity, or simply want to be part of an enthusiastic technical community, you should come to IIW.

As you can see by the pins in the map at the top of this post, there were attendees from all over the world. Not surprisingly, most of the attendees were from the US (251), followed by Canada (18) and France (14). Germany, Japan, and Australia rounded out the top six with 12, 9, and 7 attendees respectively. Attendees from India (5), Columbia (3), and Chile (2) show IIW's geographic diversity. Sadly, there were no attendees from Africa again. Please remember we offer scholarships for people from underrepresented areas, so if you'd like to come to IIW40, please let us know. If you're working on identity, we want you there.

For states and provinces, California was first with 131 attendees. Washington (19), Utah (14), New York (9), and Massachusetts (9) made up the rest of the top 5. San Jose (20), San Francisco (16), Paris (12), Oakland (11), and Seattle (9) were the top five cities.

We'll have the book of proceedings out in a month or so with notes from the different sessions and descriptions of the 20 demos given during demo hour. Past proceedings are available here.

The next IIW takes place April 8-10, 2025 at the Computer History Museum. This will be IIW XL, number 40! We'll have registration open the first part of December. If you're interested in sponsoring, send me a note.

Tags:




en

Gender, Race, and Intersectional Bias in Resume Screening via Language Model Retrieval

Kyra Wilson, Aylin Caliskan, Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society, Nov 13, 2024

The topic of AI-based recruitment and hiring has been discussed here before and research continues apace. This item (13 page PDF), despite the characterization in GeekWire, is a fairly narrow study. It looks at three text-embedding models based on Mistral-7B-v0.1, and tests for gender and racial bias on applications containing name and position only, and name and position and some content (the paper discusses removing the name but does do it). The interesting bit is that intersectional bias (ie., combining gender and race) is not merely a combination of the separate biases; while separate biases exaggerated the discrimination, "intersectional results, on the other hand, do correspond more strongly to real-world discrimination in resume screening." Via Lisa Marie Blaschke, who in turn credits Audrey Watters.

Web: [Direct Link] [This Post]




en

View of Into the Open: Shared Stories of Open Educational Practices in Teacher Education

Helen J. DeWaard, Canadian Journal of Learning Technology, Nov 13, 2024

I enjoyed the lavish illustrations in this article, a rarity in academic publications. After anm introductory section, the paper offers what is essentially a dialogue around the topic of sharing and openness in education. This bit from  the abstract resonated most with me: "It is becoming ever more important to share expertise as practitioners, researchers, and theorists in the field of education by making explicit what is often tacit and unspoken, and when sharing knowledge, reflections, and actions. By actively thinking-out-loud through blogs, social media, and open scholarly publications, educators can openly share details of what, how, and why they do what they do." This is the space where OLDaily operates - a somewhat middle ground between full academia on the one hand and the popular press on the other.

Web: [Direct Link] [This Post]




en

View of Preparing Educators to Teach and Create With Generative Artificial Intelligence

Paula MacDowell, Kristin Moskalyk, Katrina Korchinski, Dirk Morrison, Canadian Journal of Learning and Technology, Nov 13, 2024

This paper reports on a process where thirty-five teachers enrolled in an elective three-credit multimedia design course "engaged in experiential activities focussed on developing artificial intelligence (AI) literacy, alongside a collaborative assignment to co-author an open-access textbook, Teaching and Creating With Generative Artificial Intelligence." In the process, "the Student Artificial Intelligence Literacy (SAIL) framework was developed (illustrated)." The paper concludes with the usual recommendations ('do no harm', 'develop communication skills', etc.). Each participant wrote a chapter, though a common template was used. I very much like the idea of producing a useful open resource as part of class activities. Oddly, the article doesn't provide a link to the textbook, but I found it here. It's a nice selection of 'how-to' articles that readers, I think, will find useful. One chapter (chapter 20 1/2?) is missing.

Web: [Direct Link] [This Post]




en

Green Open Access - Free for Authors But at a Cost for Readers

Lisa Janicke Hinchliffe, The Scholarly Kitchen, Nov 13, 2024

We expect The Scholarly Kitchen to represent the publishers' point of view, since that is its intent, but in this case it ventures into the realm of pure propaganda. No open access charges subscription fees to readers. In 'Gold' open access, publishers charge authors 'article publication fees', while in 'Green' open access no such fees are charged. So how is there a "cost" to readers? According to this article, it's in the time and effort it takes to find the 'version of record' of an article as compared to what is found in typical 'green' venues such as preprint repositories. This argument, of course, assumes readers want to find the 'version of record', and the author is ready with a 'fear, uncertainty, doubt (FUD)' argument. The author also argues that green versions are hard to find, compared to gold versions, ignoring such services as Unpaywall that index open access articles.

Web: [Direct Link] [This Post]




en

UtahGov Search en Espanol<td valign=

Beginning Monday, November 22, UtahGov Search will include a search of Spanish language government produced information and publications. Just click on "en Espanol" and enter search terms in Spanish.




en

New Government Open Source Initiative

MIT, Harvard, and the Commonwealth of Massachusetts announce the formation of a loose association of interested U.S. state and local governments to promote sharing of software under open source licenses.




en

Nominations Open for Digital Government Awards

For the fifth consecutive year, the Accenture and MIT Digital Government Awards are showcasing technology breakthroughs that deliver public sector...




en

Site Search for All Agencies, Cities, Counties

It's Christmas. See the cool search tool set that Santa has left under the tree for you and your website!




en

Learn Printer Friendly CSS Tricks

Gilbert Jorgensen from ITS will demonstrate at this month's eDG meeting how to set up a Web page so that it can be automatically reformatted as a printer friendly page. Several agency pages will be used as part of the demonstration. The eDG meeting provides a venue where State Web Developers can learn about State development standards and new initiatives. This eDG meeting will be Wednesday, Jan 21, 2004, 2 - 4 PM in State Office Building, Rm. B110.




en

Webcontent.gov Web Standards

FCW.com reports today that Webcontent.gov wil be unveiled on September 29. This site will help federal agencies put up more uniform content and adhere to laws and best practices for information accessibility.




en

Fed Trends in Restricting Information Access

Congress enacts open government legislation in three main areas: (1) laws that provide public access to federal records; (2) laws that allow the government to restrict public access to federal information; and (3) laws that provide for congressional access to federal records. A new 90-page Congressional Report by Rep. Henry A. Waxman provides a comprehensive, though arguably partisan, examination finding the Bush Administration has acted to restrict the amount of government information that is available.




en

State GILS Conference News

The Fifth Annual State GILS Conference, hosted this year by the State of Illinois, was a great success. U.S. states have been meeting ad hoc for the past five years to develop Government Information Locator Services to promote access to...




en

New Government Open Source Initiative

MIT, Harvard, and the Commonwealth of Massachusetts announce the formation of a loose association of interested U.S. state and local governments to promote sharing of software under open source licenses.




en

Arkansas Government eNewsroom

Arkansas has joined the growing number of states syndicating agency produced headlines for its citizenry using RSS. The Arkansas Government eNewsRoom is a news portal featuring a RSS 0.91 feed that indexes news releases in PDF format.




en

RSS Emergency Notifications and Alerts

Some efforts have been made by the federal government and states to create RSS feeds for emergency notifications and alerts. Much information is available on traditional websites, but surprisingly little is being syndicated. Independents outline how government and business can work together building RSS feeds to make our lifestyles and communities safer.




en

EGovernment News Archives

Those monitoring U.S. eGovernment progress and news should take a look at Multimedia Victoria, the Victorian Government's Repository of eGovernment Resources. Of particular note is its archives of State Government websites and egovernment reports. To find such a great resource...




en

E-Government Savvy Kiwi Integrate RSS

The Award for Best Government Website went to www.govt.nz at the 2003 NetGuide Awards in Auckland on November 14. New Zealand's State Service Commission�s E-government Unit develops the portal and has authored a RSS standard for press releases and event-related content published by government agencies.




en

RSS eNewsletters: Bridging the Gulf

Emarketing firms IMH, Inc. and eLaw Marketing offer new RSS services for publishing eNewsletters. Can the same thing be accomplished using your existing blogging software?




en

Annual Hosting Plans: We’re Finally Ready for Long Term Commitment

I bet you’re wondering why I’ve taken you to the softly-lit terrace of this 5-star restaurant at sunset, and hired this string quartet to play while we eat… With this Annual Hosting Plan, you’ll get a free .com domain, and a free webmail account. Plus, you’ll get the best hosting support you’ve ever experienced, and […]




en

Our New Tickets Feature Makes Communicating with Clients a Breeze

We’re launching a new feature on The Hub: Tickets. Now you can effortlessly communicate with your clients entirely within The Hub, with an easy-to-use instant ticketing system. Plus, it’s entirely white label so it’ll appear to clients as part of your own site. Why We Created Tickets At the moment, you’re probably using email or […]



  • WPMU DEV Products

en

On-Demand Development: Get Expert Support When You Need It

No in-house dev team? No problem. With our newest On Demand Development Service Add-On, our expert team of WordPress developers will be on hand to help you with anything you need, from simple CSS issues to building custom functionality. Need help with expanding the capabilities of the Forminator plugin so it caters to your specific […]



  • WPMU DEV Products

en

Inchcape & BYD Partner In New Distribution Agreement For Ethiopia!

In an unprecedented move some months ago, Ethiopia became effectively the first country in the world to ban the import of internal combustion engine vehicles. That ban was not some futuristic target for 2030 or 2035. It was an immediate ban on the import of ICE cars, with no exceptions. ... [continued]

The post Inchcape & BYD Partner In New Distribution Agreement For Ethiopia! appeared first on CleanTechnica.




en

Renewables Gallop Ahead Down Under — A Queensland Sample

As I sit at my computer tapping out this article, the sun is shining in beautiful Brisbane, capital of Queensland, Australia. We are moving into summer and the sun is up long before I am. When I awake, the house battery is filling up and charging the car. Soon, the ... [continued]

The post Renewables Gallop Ahead Down Under — A Queensland Sample appeared first on CleanTechnica.




en

The City Center In Paris Is Now Designated A Limited Traffic Zone

Many citizens in Paris were caught off-guard on November 5 when a new ban on motorists in the first four arrondissements of central Paris came into effect. As they looked around their city neighborhoods, residents could see nearly forty signs for the ‘Zone à Trafic Limité’ (ZTL) — or “limited ... [continued]

The post The City Center In Paris Is Now Designated A Limited Traffic Zone appeared first on CleanTechnica.




en

Tesla Outsold By BMW & Volkswagen In Germany, MG In UK

Remember when the Tesla Model Y outsold every other electric car, anywhere in the world, all the time? That was then; this is now. According to Yahoo Finance, registration data from Germany’s Motor Transport Authority (KBA) shows the Volkswagen brand has delivered 49,200 electric cars in that country through the ... [continued]

The post Tesla Outsold By BMW & Volkswagen In Germany, MG In UK appeared first on CleanTechnica.




en

US Air Force Pursues Green Hydrogen Via Geothermal Energy

The US Department of Defense is pursuing next-generation geothermal energy systems that can produce zero emission electricity and green hydrogen, too.

The post US Air Force Pursues Green Hydrogen Via Geothermal Energy appeared first on CleanTechnica.




en

Is This The Year Of Peak Energy Emissions?

On one hand, 2024 is likely to be the year of global peak energy emissions. “It is a historic moment,” cheers the World Economic Forum (WEF) in this year’s edition of DNV’s Energy Transition Outlook. On the other hand, we have so much more work to do before we can ... [continued]

The post Is This The Year Of Peak Energy Emissions? appeared first on CleanTechnica.




en

Behind the Curtain: Power Grid Resilience for Data Centers

By Kyle Julian, Regional Director, Commercial & Industrial Sales, U.S. West Without data centers, life as we know it would collapse. That may sound like hyperbole, but our entire digital economy relies on data centers. But it turns out that data centers use a lot of electricity. In fact, the ... [continued]

The post Behind the Curtain: Power Grid Resilience for Data Centers appeared first on CleanTechnica.




en

Best Value for Money EVs — City Cars (A Segment)

This is the first of a five-part series of articles where I look at the best affordable EVs in each size category. There are plenty of good EVs right now, but one of the main challenges continues to be their price and how much more expensive they are compared to ... [continued]

The post Best Value for Money EVs — City Cars (A Segment) appeared first on CleanTechnica.




en

A YangWang U9 Recently Went 243 MPH — What It Says About BYD

While many of us were focused on the election, BYD announced that the YangWang U9 went 391.94 km/h (243 mph). Auto-translate under subtitles helps. This was not a one-off. No track-only equipment (other than a roll cage, for safety reasons), rockets, or gimmicks. It was a street-legal car using street ... [continued]

The post A YangWang U9 Recently Went 243 MPH — What It Says About BYD appeared first on CleanTechnica.




en

How Networks Of Ocean Sensors Can Improve Marine Weather Predictability

What difference would it make to be able to unlock ocean data at scale? How would deploying hundreds of marine sensing platforms improve marine weather predictability and accuracy? A company named Sofar is answering some of those questions these days due to their capacity to use real-time data to improve ... [continued]

The post How Networks Of Ocean Sensors Can Improve Marine Weather Predictability appeared first on CleanTechnica.





en

Best Value for Money EVs — Subcompacts (B Segment)

This is the second of a five-part series of articles (you can check the first part here), where I look at the best affordable EVs in each size category. There are plenty of good EVs right now, but one of the main challenges continues to be their price and how ... [continued]

The post Best Value for Money EVs — Subcompacts (B Segment) appeared first on CleanTechnica.




en

Waymo Opens to Anyone in Los Angeles!

Waymo continues to trot forward. After increasing its weekly passenger count by 50% in just two months earlier this year, it’s sure to do so again soon. The company has now opened up Waymo One robotaxi rides to anyone in Los Angeles. That’s across “Santa Monica, Hollywood Boulevard, USC, and ... [continued]

The post Waymo Opens to Anyone in Los Angeles! appeared first on CleanTechnica.




en

BLUETTI Unveils Elite 200 V2 Power Station: 17-Year Battery Life for Resilient Backup During Extreme Weather

This year, the U.S. has faced extreme weather, including record heatwaves and intense hurricanes, like Idalia, causing widespread disruptions and power outages. In August 2024, Hurricane Idalia alone left over 2.4 million homes and businesses without power​. As these natural disasters become more frequent, the vulnerability of traditional electricity grids ... [continued]

The post BLUETTI Unveils Elite 200 V2 Power Station: 17-Year Battery Life for Resilient Backup During Extreme Weather appeared first on CleanTechnica.




en

Hyundai Votes for Women, Diversity, and Inclusion

The timing on this one is pretty good. At a time when a barrage of overly macho yet lame middle-aged white manosphere “leaders” are bouncing off of the trampoline towards us, Hyundai is reminding us what an advanced democracy not overtaken by cancer is like. Well, maybe I’m going a ... [continued]

The post Hyundai Votes for Women, Diversity, and Inclusion appeared first on CleanTechnica.




en

WEBTOON Entertainment社、触って楽しむことのできる電子コミックをベンチャー企業Dot Inc.と共同で作成

2024年10月31日、電子コミックのプラットフォームWEBTOONを提供するWEBTOON Entertainment社が、触って楽しむことのできる電子コミック(tactile digital comics)を韓国のベンチャー企業Dot Inc.と共同で作成したと発表しました。

発表によると、これは視覚障害者向けに画像を点字に変換して表現するDot Inc.の技術を活用した取組です。今回作成されたのは電子コミックシリーズ“Yumi’s Cells”と“Hooky”の2タイトルで、Dot Inc.の点字ディスプレイDot Padで利用可能となる予定とあります。

WEBTOON Entertainment and Dot Inc. Release World’s First Tactile Digital Comics(WEBTOON, 2024/10/31)
https://about.webtoon.com/press-release/164

続きを読む




en

研究情報のオープン化に関する国際会議Paris Conference on Open Research Informationの開催報告書が公開

2024年9月にフランス・パリのソルボンヌ大学で開催された研究情報のオープン化に関する国際会議Paris Conference on Open Research Informationの開催報告書が、リポジトリZenodo上に掲載されています。

同会議には、2024年4月に出された研究情報のオープン化に関するバルセロナ宣言(“Barcelona Declaration on Open Research Information”)の署名者や支援団体らが参加しました。オープンな研究情報の作成や管理、利活用に関する経験やベストプラクティスが共有されるとともに、宣言の内容を実現するためのロードマップ策定に向けた議論が行われたとあります。

Paris Conference on Open Research Information(Barcelona Declaration on Open Research Information)
https://barcelona-declaration.org/conference_2024_paris/

続きを読む




en

Zenbi = Zenbiフォーラム : 全国美術館会議機関誌(全国美術館会議): 「女性と抽象」展について : コレクションとジェンダー / 小川 綾子 ; 小林 紗由里 ; 佐原 しおり ; 堀田 文 ; 松田 貴子 ; 横山 由季子

26:2024.9, p.F-14-16

続きを読む




en

Zenbi = Zenbiフォーラム : 全国美術館会議機関誌(全国美術館会議): 学芸員をめぐるシンポジウムに参加して / 横山 勝彦

26:2024.9, p.F-11-13

続きを読む




en

Zenbi = Zenbiフォーラム : 全国美術館会議機関誌(全国美術館会議): 美術館のサステナビリティとは / 片岡 真実

26:2024.9, p.F-5-7

続きを読む




en

Zenbi = Zenbiフォーラム : 全国美術館会議機関誌(全国美術館会議): 総務課長!必見の事実 : セキュリティと環境活動家 : ICOM-ICMS東京大会2023に参加して / 杉浦 智

26:2024.9, p.F-8-10

続きを読む




en

Zenbi = Zenbiフォーラム : 全国美術館会議機関誌(全国美術館会議): 能登半島地震の初動対応について / 以倉 新

26:2024.9, p.F-2-5

続きを読む