li

At Chennai’s new rooftop bar, catch sunsets and sip on innovative cocktails like shiitake-infused whisky

Located on the 10th floor in Egmore, and spread across 4,500 square feet, Irida Skky Lounge focusses on technique-driven dishes and cocktails




li

Taste a slice of Amritsar in Chennai




li

A culinary adventure in Auroville: Explore authentic Korean cuisine at Nowana




li

Dubai’s Michelin starred Avatara, an Indian vegetarian restaurant launches in Mumbai




li

Egypt's Sudanese refugees using rich cuisine to build new lives

Sudanese entrepreneur brings Sudan’s culinary traditions to Egypt, aiming to introduce Egyptian palates to Sudanese culture




li

At The Madras Taproom, Chennai’s new resto bar, take on a challenge to demolish fiery chicken wings or a mammoth slice of cake

The menu, featuring 100 dishes, is a diverse mix of cuisines with dishes like spanakopita, Thai curry, muttai 65 and avakkai urulai




li

Head to Bengaluru’s Ishtaa to relish tried and tested comfort food














li

Who is Mike Huckabee, the evangelical, pro-settlement envoy to Israel? - Al Jazeera English

  1. Who is Mike Huckabee, the evangelical, pro-settlement envoy to Israel?  Al Jazeera English
  2. Mike Huckabee once said that ‘there’s really no such thing as a Palestinian’  CNN
  3. Trump nominates Mike Huckabee for US ambassador to Israel  Fox News
  4. Trump Picks Mike Huckabee, Former Arkansas Governor, for Ambassador to Israel  The New York Times




li

US defense contractor to pay former Iraqi detainees $42 million for its role in torture at notorious Abu Ghraib prison - CNN

  1. US defense contractor to pay former Iraqi detainees $42 million for its role in torture at notorious Abu Ghraib prison  CNN
  2. Abu Ghraib torture survivors win US civil case, $42m damages  Al Jazeera English
  3. US jury awards $42m to ex-detainees at Iraq's Abu Ghraib  BBC.com
  4. How a Troy lawyer convinced U.S. jury to award $42 million to 3 Iraqi prisoners  Detroit Free Press
  5. U.S. Jury Awards $42 Million to Iraqi Men Abused at Abu Ghraib  The New York Times




li

How will Donald Trump’s plans for education affect Chicago Public Schools? - Chicago Tribune

  1. How will Donald Trump’s plans for education affect Chicago Public Schools?  Chicago Tribune
  2. Trump pledged to close the Education Department. What would that mean?  The Washington Post
  3. Could Donald Trump eliminate the Department of Education?  WCNC.com
  4. So You Want To Abolish The Department Of Education? Here’s What You Need To Know.  Forbes





li

How to Ask Someone if They Like You As a Friend

If you really like spending time and hanging out with someone, you’re probably wondering if they feel the same way. While it’s sometimes pretty easy to tell if somebody is your friend, it never hurts to ask, especially if you want to pursue a more serious relationship with them. We know that it’s a little nerve-wracking to have this conversation, but there are a lot of ways to talk about it without any stress. Keep reading for a list of different direct and indirect ways you can pose the question.




li

How to Reality Check Quiz

We all have blind spots, especially when it comes to the ways we treat others (and ourselves). Unfortunately, it can be pretty tough to take a really objective look at what your own weak points are. We’re here to help. Hit “Start Quiz” to rip off the Band-aid and see what your blind spots really are. Keep in mind, though—this quiz is just for fun!




li

How to Know if a Girl Likes You

Easy ways to tell if she likes you as more than a friend (and what you can do about it)She glances your way, laughs at your jokes, and acts nervously around you. You’re not sure if she’s flirting, being friendly, or is simply uninterested. Whether you’ve had a crush on a girl for ages and are dying to know if the feeling is mutual or you just want to know if she likes you for curiosity’s sake, we’ll help you out. We consulted our dating experts to bring you 25 foolproof signs that a girl likes you.




li

How to Palm Reading Love Line

Hoping to learn more about the world of palmistry? The love (or heart) line is a great place to start. Often considered one of the 3 most important lines on your palms, the love line provides a valuable glimpse into a person’s romantic and emotional tendencies. We’ve covered everything you need to know about this essential line, so you can have an easy time reading someone else’s palm—or even your own!




li

By 2030, Bengaluru will possess 330-340 million square feet of office space in India: report

The primary demand generators for Bengaluru’s office market are anticipated to be the technology, engineering, manufacturing, and BFSI sectors.  The Confederation of Indian Industry and CBRE report projects that Bengaluru, the country’s IT hub, will maintain its dominant position in … Continue reading



  • Real Estate News
  • Bengaluru's real estate
  • Bengaluru's real estate market
  • India's real estate
  • Indian real estate

li

The elimination of indexation benefits in real estate will discourage secondary market sellers

The real estate industry warned that eliminating indexation benefits for long-term capital gains would stunt its expansion, negatively affecting property owners and potentially increasing taxes. While experts thought low returns could still be a problem, authorities disagreed, citing high real … Continue reading



  • Real Estate News
  • 2020 budget's impact on real estate
  • 2024 Budget
  • Indexation
  • Indian real estate
  • Indian Real Estate market
  • LTCG

li

By selling 5.5 lakh square meters of land in FY25, Noida Authority hopes to raise Rs 3,700 crore

According to officials, the Noida Authority projects that in the fiscal year 2024-2025, it will sell group housing plots for a maximum of Rs 1,080 crore and commercial land parcels for Rs 1,010 crore.  According to people who know the … Continue reading




li

Make your properties shine brighter this Diwali!

Hi there! As we light up our homes and hearts to welcome the joyous festival of Diwali, we want to extend our heartfelt wishes to you and your family for a season filled with health, happiness, and prosperity. ????✨ In … Continue reading




li

Trump’s Vision for Flying Cars Gains Credibility with Addition of UFO Expert

Trump's flying car initiative gains momentum as UFO expert Dr. Michael Salla signals potential involvement, bringing advanced aerospace expertise to ambitious urban development plan.




li

Flathead Warming Center supporters take to the streets to show solidarity with homeless population




li

Military eVoting Pilot Postponed

An eVoting pilot that would allow miltary staff stationed overseas to cast their ballots electronically has been postoned. The pilot program was scraped due to security concerns - concerns not just about the pilot, but the security of the Internet...




li

Federal eGov fund $92 million short

The 2005 U.S. federal budget includes just $5 million for the eGov fund. The amount requested for the year was $45 million. Last year the fund received just $3 million, which means over the last two years just $8 of...




li

Do Not Call List upheld

The on again, off again Federal Do Not Cal List is now officially, and permanently, on again. Earlier this week a U.S. Circuit Court of Appeals ruled that the FTC and FCC's registry does not violate the telephone solicitors First...




li

Search Interoperability Standards

The E-Government Act of 2002 calls for the U.S. Federal Government to enhance interoperability by adopting a common search standard. The Categorization of Government Information Workgroup has just finished the second version of their Statement of Requirements for Search Interoperability...




li

Feedback on NARA eGov policies saught

The Electronic Records Policy Working Group is inviting interested persons to provide their written views on issues relating to implementing section 207(e)(1)(A) of the E-Government Act of 2002. That section calls for ``the adoption by agencies of policies and procedures...




li

Decentralized Identity Comes of Age

Summary: In session after session, attendees at EIC are hearing the message that decentralized identity is the answer to their identity problems.

I'm at European Identity Conference (EIC) this week. I haven't been for several years. One thing that has struck me is how much of the conversation is about decentralized identity and verifiable credentials. I can remember when the whole idea of decentralized identity was anathema here. The opening keynote, by Martin Kuppinger is Vision 2030: Rethinking Digital Identity in the Era of AI and Decentralization. And all he's talking about is decentralized identity and how it's at the core of solving long standing identity problems. Another data point: Steve McCown and Kim Hamilton-Duffy ran a session this morning called Decentralized Identity Technical Mastery which was a hands-on workshop. The rather large room was packed—standing room only.

I attended a couple of sessions on decentralized identity where I didn't know the companies, the speakers, or the specific platforms they were using. The space is too big to keep track of anymore. Identity professionals who were ignoring, or talking down, decentralized identity a few years ago are now promoting it.

This truly feels like a tipping point to me. At IIW, it's identity geeks talking with other identity geeks, so it's no surprise to see lots of discussion about new things. EIC is a different kind of conference. There are about 1000 people here I'd guess. Most of them aren't working on new standards or open source projects. Instead they're the folks from companies who come to conferences like EIC to learn how to solve the problems their organization is facing.

In the keynotes and in numerous sessions, the message that they're hearing is "decentralized identity will solve your problems." Martin closed his talk with the proclamation that "decentralized identity is the new paradigm for identity."


Photo Credit: Credential Tipping Point by DALL-E (public domain) Prompt: Draw a rectangular picture that shows a credential at a tipping point. Make the credential look like a lifelike credential, include cartoon picture, and some writing. Use bright friendly colors.

Tags:




li

What Is Decentralized Identity?

Summary: What is decentralized identity and why is it important? My attempt at a simple explanation.

In Yeah, yeah, yeah, yeah, yeah, nah, Alan Mayo references my recent blog post, Decentralized Identity Comes of Age, and says:

My challenge to the decentralization community is for them (someone) to explain how it works in relatively simple and reasonable terms. I say relative because identity is not simple, so we should not expect simple solutions.

This post is my attempt to do that for Alan and others.

Identity is how we recognize, remember, react to, and interact with other people, organizations, and services. Put another way, identity is about relationships. Online we suffer from a proximity problem. Since we're not near the parties we want to have relationships with, our natural means of recognizing, remembering, and interacting with others can't be used. Digital identity systems are meant to provide us with the means of creating online relationships.

Traditional identity systems have not served us well because they are owned and controlled by companies who build them for their own purposes. The relationships they support are anemic and transactional. We can't use them for any purpose except what their owner's allow.

Decentralized identity systems1 on the other hand allow you to create online relationships with any person, organization, or service you choose and give you the tools to manage and use those relationships. They help you recognize, remember, react to, and interact with them. The most important tool is a decentralized identity wallet. The world of decentralized identity wallets is still young, but organizations like the Linux Foundation's Open Wallet Foundation give me hope that useful, interoperable wallets are a tool we'll all be able to use soon. They are as foundational to decentralized identity as a browser is to the web.

Besides helping you manage peer-to-peer relationships with others online, wallets hold verifiable credentials, the digital analog to the credentials and cards you carry in a physical wallet. One of the most important aspects of digital relationships is providing information about yourself to those you interact with. Sometimes that information can come from you—it's self-asserted—but many times the other party wants to reliably know what others say about you. For example, if you establish a banking relationship, the bank is legally obligated to verify things like your name and address independent of what you say. Decentralized identity wallets allow you to prove things about yourself using credentials others provide to you. At the same time, they protect your privacy by limiting the information disclosed and forgoing the need for the party you're interacting with to directly contact others to verify the information you provide.

In summary, decentralized identity systems allow you to create digital relationships with other parties independently, without relying on any other organization or service. These relationships are direct, private, and secure. They also provide the means for you to prove things about yourself inside these relationships so that even though you're operating at a distance, you and the other party can have confidence in the relationship's authenticity.

How Does It Work

The preceding paragraphs say what decentralized identity is, and provide its benefits, but don't say how it works. Alan and others will likely want a few more details. Everything I describe below is handled by the wallet. The person using the wallet doesn't need to have any more knowledge of how they work than the operator of a browser needs to understand HTTP and HTML.

The foundation of a peer-to-peer, decentralized online relationship is an autonomic identifier like a peer DID. Identifiers are handles that someone else can use to identify someone or something else online. Peer DIDs can be created by a wallet at will, they're free, and they're self-certifying (i.e., there's no need for a third party). A relationship is created when two identity wallets create and exchange peer DIDs with each other on behalf of their owners. Peer DIDs allow the parties to the relationship to exchange private, secure messages.

There are four primary interaction patterns that wallets undertake when exchanging messages:

  1. DID Authentication which uses the DIDs to allow each party to authenticate the other
  2. Single-Party Credential Authorization where the same party issues and verifies the credential.
  3. Multi-Party Authorization where the credential issuer and verifier are different parties.
  4. Generalized Trustworthy Data Transfer which uses a collection of credentials to aid the wallet owner in completing online workflows.
Generalized Credential Exchange Pattern (click to enlarge)

Verifiable credentials make heavy use of cryptography to provide not only security and privacy, but also confidence that the credential data is authentic. This confidence is based on four properties a properly designed credential presentation protocol provides:

  1. The identifier of the credential issuer
  2. Proof that the credential is being presented by the party is was issued to
  3. Proof that the credential has not been tampered with
  4. The revocation status of the credential

The credential presentation can do all this while only disclosing the information needed for the interaction and without the verifier having to contact the credential issuer. Not having to contact the issuer ensures the credential can be used in situations with poor connectivity, that the issuer needn't be online, and preserves the credential subject's privacy about where the credential is being used.

A properly designed credential exchange protocol has four important properties:

  1. The system is decentralized and contextual. There is no central authority for all credentials. Every party can be an issuer, an owner, and a verifier. The system can be adapted to any country, any industry, any community, any set of credentials, any set of trust relationships.
  2. Issuers are free to determine what credentials to issue and whether or not to revoke them.
  3. Wallet owners are free to choose which credentials to carry and where and when they get shared. While some verifiers require a specific credential—such as a customs agent requiring a passport—others will accept a range of credentials. Therefore owners can decide which credentials to carry in their wallet based on the verifiers with whom they interact.
  4. Verifiers make their own decisions about which credentials to accept. For example, a bar you are trying to enter may accept any credential you have about your date of birth. This means some credentials (e.g., passports, driving licenses, birth certificates) may be much more useful than just for the original purpose for which they were issued.

These properties make a decentralized identity system self sovereign.

Why is Decentralized Identity Important?

Decentralized identity systems are designed to provide people with control, security, and privacy while enhancing the confidence we have in our online relationships. Some time ago, I wrote the following. I think it's an apt way to close any discussion of decentralized identity because unless we keep our eyes on the goal, we'll likely take shortcuts in implementation that fail to live up to their promise.

Presently, people don't have operational relationships anywhere online.2 We have plenty of online relationships, but they are not operational because we are prevented from acting by their anemic natures. Our helplessness is the result of the power imbalance that is inherent in bureaucratic relationships. The solution to the anemic relationships created by administrative identity systems is to provide people with the tools they need to operationalize their self-sovereign authority and act as peers with others online. Peer-to-peer relationships are the norm in the physical world. When we dine at a restaurant or shop at a store in the physical world, we do not do so under the control of some administrative system. Rather, we act as embodied agents and operationalize our relationships, whether they be long-lived or nascent, by acting for ourselves. Any properly designed decentralized identity system must provide people with the tools they need to be "embodied" in the digital world and act autonomously.

Time and again, various people have tried to create decentralized marketplaces or social networks only to fail to gain traction. These systems fail because they are not based on a firm foundation that allows people to act in relationships with sovereign authority in systems mediated through protocol rather than by the whims of companies. We have a fine example of a protocol mediated system in the internet, but we've failed to take up the daunting task of building the same kind of system for identity. Consequently, when we act, we do so without firm footing or sufficient leverage.

Ironically, the internet broke down the walled gardens of CompuServe and Prodigy with a protocol-mediated metasystem, but surveillance capitalism has rebuilt them on the web. No one could live an effective life in an amusement park. Similarly, we cannot function as fully embodied agents in the digital sphere within the administrative systems of surveillance capitalists, despite their attractions. The emergence of self-sovereign identity, agreements on protocols, and the creation of metasystems to operationalize them promises a digital world where decentralized interactions create life-like online experiences. The richer relationships that result from properly designed decentralized identity systems promise an online future that gives people the opportunity to act for themselves as autonomous human beings and supports their dignity so that they can live an effective online life.


Notes

  1. I prefer the term self-sovereign to decentralized because it describes the goal rather than the implementation, but I'll stick with decentralized here. All self-sovereign identity systems are decentralized. Not all decentralized identity systems are self-sovereign.
  2. The one exception I can think of to this is email. People act through email all the time in ways that aren't intermediated by their email provider. Again, it's a result of the architecture of email, set up over four decades ago and the culture that architecture supports.

Photo Credit: Young Woman Using a Wallet from DALL-E (public domain) Prompt: draw a rectangular picture of a young woman using a wallet.

Tags:




li

View of Preparing Educators to Teach and Create With Generative Artificial Intelligence

Paula MacDowell, Kristin Moskalyk, Katrina Korchinski, Dirk Morrison, Canadian Journal of Learning and Technology, Nov 13, 2024

This paper reports on a process where thirty-five teachers enrolled in an elective three-credit multimedia design course "engaged in experiential activities focussed on developing artificial intelligence (AI) literacy, alongside a collaborative assignment to co-author an open-access textbook, Teaching and Creating With Generative Artificial Intelligence." In the process, "the Student Artificial Intelligence Literacy (SAIL) framework was developed (illustrated)." The paper concludes with the usual recommendations ('do no harm', 'develop communication skills', etc.). Each participant wrote a chapter, though a common template was used. I very much like the idea of producing a useful open resource as part of class activities. Oddly, the article doesn't provide a link to the textbook, but I found it here. It's a nice selection of 'how-to' articles that readers, I think, will find useful. One chapter (chapter 20 1/2?) is missing.

Web: [Direct Link] [This Post]




li

UtahGov Search en Espanol<td valign=

Beginning Monday, November 22, UtahGov Search will include a search of Spanish language government produced information and publications. Just click on "en Espanol" and enter search terms in Spanish.




li

Utah RSS Feeds Featured at eGovLinks

eGovLinks, the e-Government starting point, is featuring two news feeds on its home page and site navigation bar, and both are from Utah State Government!




li

Check Accessibility from Your Toolbar

Steve Faulkner recently released a tool for Internet Explorer called the Accessibility Toolbar. It provides one-click access to accessibility validators and has features that go beyond simple accessibility checks.




li

Free Software for Section 508 Compliance

The General Services Administration is now offering at their Section 508 site their free STEP508 software to help government agencies...




li

Tough Choice: Apple Expo or Republican Gala

Forgoing watching Arnold at the RNC last night, I tuned in instead to the streaming video keynote from the Apple Expo 2004 in Paris. It was the first public demonstration of the Tiger OS and several other hardware and software products. For something to really rock your world, take a look at the new IMac G5.




li

Library of Congress Audio Archives Program

Michael Taft and Marcia Segal from the American Folk Life Center, Library of Congress will be in Utah on October 13, 2004 to discuss the The Save Our Sounds project and related digital issues. This Fall Caucus program will be from 9:00 a.m. to 3:00 p.m. in room 3211 Wilkinson Center on the campus of Brigham Young University and is sponsored by CIMA, the Conference of Inter-Mountain Archivists. There will be no charge to the event and lunch will be on your own from 12:00 noon to 1:30 p.m.




li

Monitor Ohio Public Utilities with RSS

Almost every Web site has a what's new section or page. The Public Utilities Commission of Ohio shows us that RSS syndication is a great way to allow your customers to monitor what's new on your agency's website.




li

I Like My Coffee #000000

Read to the end to see a bunk bed for cats. (Yes, really!) In today’s edition: We get a thrilling affiliate offer we can’t refuse from WP Forms. Twenty Twenty-Five and the like, impermanent beauty of the passage of time, man. How to make sure your WordPress site (and your XML sitemap) doesn’t get lost […]




li

Better Compression with Brotli

Pssst… have you noticed your site loading a bit faster than usual? It’s not your imagination! We’re happy to let you know that we’ve rolled out Brotli to all of your WPMU DEV hosted sites, giving you on average 11.62% better compression than before (and faster sites as a result!) It’s a change that’ll make […]




li

I Prefer Dark Mode Because Light Attracts Bugs

Read to the end for a tiny yet extremely majestic lion. In today’s edition: The truth behind the classic “average person eats 3 spiders per year” factoid. Tips that’ll make organizing your taxonomies a little less, uh… taxing. America’s finest news source, The Onion, is now powered by our old friend WP. Hot Off The […]




li

Our New Tickets Feature Makes Communicating with Clients a Breeze

We’re launching a new feature on The Hub: Tickets. Now you can effortlessly communicate with your clients entirely within The Hub, with an easy-to-use instant ticketing system. Plus, it’s entirely white label so it’ll appear to clients as part of your own site. Why We Created Tickets At the moment, you’re probably using email or […]



  • WPMU DEV Products