Rendition Justin Beiber

January 30, 2014 at 12:54 pm | Posted in Uncategorized | Leave a comment
Tags: , , , , , , , ,

If the beebs were Haitian or Nepalese he’d be gone already. Why hasn’t DHS labelled him a terrorist threat and renditioned him to Yemen’s Socotra Island off the coast of Somalia already? He looks best in an orange prisoner smock.

Sending the little arrogant entitled child back to where he came from would be an insult to our Canadian neighbors.

petitions.whitehouse.gov

Strangelove: DCI Gen Petraeus & LTC Broadwell

November 16, 2012 at 3:40 pm | Posted in Uncategorized | Leave a comment
Tags: , , , ,

While General Petraeus may no longer be subject to the UCMJ, LTC Paula Broadwell, USAR, very well may be for sensing his power and seeking out his life essence, well described to Mandrake in the film Dr. Strangelove. If she had classified material at her home, which probably doesn’t have an authorized SCIF, she’s also subject to Article 15 and prosecution. Do her actions and behavior rise to the level of a Mata Hari, worthy of a firing squad? Well… she did take down the DCI using social engineering of his personal protective detail; who failed to protect him, assuming discretion being the better part of valor. As long as they’re getting great travel perquisites, e.g. AFRICOM General Ward’s detail, they’re going to perform as three wise monkeys: see no evil, hear no evil, and speak no evil.

V is for Vendetta versus valor comes to mind when contemplating Broadwell’s emails to Jill Kelley and General Allen. She was far more successful at disrupting our political, military and administrative processes than any terrorist or foreign intelligence service (FIS) could imagine.

FBI Special Agent Frederick W. Humphries II deserves a medal and promotion for his bulldog pursuit of her threat to national security. If anybody deserves whistleblower protection, SA Humphries does. No doubt his superiors, in a failed effort to appear apolitical and still embarrassed by Robert Hanssen, made very real decisions to stay away from the political fray.

The FBI is spending billions on biometric technology. Clearly the next step is implanting RFID-based micro-electronic penile DNA monitors into men of power that detect whether saliva and vaginal fluids are their wife’s or unauthorized personnel. There’s no need to ask, when your erection, programmed with a white list of approved precious bodily fluids, automatically tells when a violation occurs.

HTML 5 Stream Updates with Server Sent Events

August 8, 2012 at 7:12 pm | Posted in Uncategorized | Leave a comment

SSE is a browser API that lets you keep open a socket to your server for Publish-Subscribe (pubsub –not an underground place to get a beer and a hoagy).

http://www.html5rocks.com/en/tutorials/eventsource/basics/

When the stream connects, the open event is triggered, and whenever a new message is received, the message event triggers.

Ruby’s Domain Specific Language (DSL) Sinatra does this.

 

PUT – POST – GET – PATCH

Using a Dictionary in MVC Controller to populate DropDownList in View

May 1, 2012 at 3:35 pm | Posted in Uncategorized | Leave a comment
Tags: , ,

namespace EzPL8.Controllers
{
public class HomeController : Controller
{
private static Dictionary<int, string> getEggPrefs()
{
Dictionary<int, string> Eggs = new Dictionary<int, string>()
{
{ 0, “No Preference”},
{ 1, “I hate eggs”},
{ 2, “Over Easy”},
{ 3, “Sunny Side Up”},
{ 4, “Scrambled”},
{ 5, “Hard Boiled”},
{ 6, “Eggs Benedict”}
};
return Eggs;
}

public ActionResult Index()
{

SelectList selectList = new SelectList(getEggPrefs(), “Key”, “Value”);

ViewData["EggPrefs"] = selectList;

return View();
}

The View:

@{
ViewBag.Title = “EzPL8 Automatic Customer Recognition: Fast Food Faster – Smarter”;
}

@using (Html.BeginForm())
{
@Html.DropDownList(“EggPrefs”,”Egg Preference”)

//use a Lambda Expression to convert from a Dictionary to a SelectList type

@Html.DropDownListFor(m => m.Egg,
new SelectList(
Model.Egg,
“Key”,
“Value”), “Egg Preferences”)

}

Semantic Web References

April 21, 2012 at 3:10 pm | Posted in Uncategorized | Leave a comment

To learn more about the personal-centric and data-centric future, explore these tasty links:

The Programmable Web

Programmable web – an API directory

Mashery- API management

Apigee – Mobile API management

Pachube – program the Internet of Things

SimpleGeo – add location data to any mash-up

Twilio – programmable telecommunications

kynetx – a programming framework

IfThisThenThat – a simple scripting platform

Wolfram Alpha Pro – a huge programmable data resource

Xignite – financial data platform

Android@home – home management

NG Data – application framework

Singly.com – personal data programming platform

FacetApp – semantic programming platform

Data Repositories

Factual

Freebase

Drawn to Scale

World Bank Open Data

Data.gov

Data.gov.uk

Opscode

TheDataHub

Web Data Commons

LinkedData.org

OpenDataRegistry.com

Neurocommons.org

Personal Data Stores

Personal Data Ecosystem – the place to start

Sign up for the Personal Data Ecosystem monthly journal.

Attend the Internet Identity Workshops – that’s where the magic happens.

Cloud Consortium

Personal.com

Paoga.com

Diaspora.com

Everyme.com

Gravity Labs

Mydex (UK)

Media

The Live Web – Phil Windley’s extremely readable book

Stephen Wolfram on making data computable

IBM’s Internet of Things video

Microsoft Productivity Vision 2009

Microsoft Productivity Vision 2010 – must see

A Day Made of Glass – inspiring video by Corning

Neurocommons video – How to link and share science data

W3C Working Group paper on personal data and open web

ReadWriteWeb – all the news about the semantic/programmable web

Cloud Computing Journal

SemanticWeb.com

David Siegel’s Personal Data Locker Vision Video

Six Provocations for Big Data

Cloud of Data – Paul Miller’s blog

A list of people to follow on Twitter

Follow David Siegel on Twitter: @Pullnews

Projects

Tetherless Web

Google Cloud Print

Conferences

April 21, 2012 at 2:19 pm | Posted in Uncategorized | Leave a comment
Tags: , ,
2012-06-18 – 20 NY QConn International Software Dev Conference
2012-10-15 – 18 Hollywood, FL National Parking Association
2012-10-15 – 18 Hollywood, FL National Parking Association

RFID & Number of the Beast (666)

April 17, 2012 at 9:38 am | Posted in Uncategorized | Leave a comment
Tags: , ,

Have you heard the sound of a 14 gauge needle as it pierces human skin?  It’s enough to make your skin crawl.  Otherwise, what’s the big deal with having a microcomputer and magnetic induction antenna injected inside of us?   Human implantable RFID microchips where approved by the U.S. Food and Drug Administration (FDA) in 2004.  These low frequency fixed identities can be read when in close proximity to an interrogator antenna and reader,  but can’t be read more than a couple inches away.

Religious Issues

As for being marked by the number of the beast in Revelations 13:16, you earned yourself a number as soon as you were born, whether you wanted it or not, in the form of a birth certificate with a unique serial number. If you died during childbirth, in which case you wouldn’t be reading this, you earned yourself a Death Certificate.

In all reality, unless you were born in the woods and raised by wolves in a cave, there’s no getting around being marked in the virtual, paperwork, bureaucratic sense.  With 7-billion people on earth, escaping the computerized sensors and processes societies set up to manage and protect themselves is impossible for a sustained length of time.  Ask Osama Bin Laden and the Ted Kaczynski, the Unabomber how well they were able to hide.

We’re marked by 1000s of numbers ranging from our SSN, to a check number representing a payment for a bill #, a banking account number, a student id, a driver’s license number, to a transaction number every time we use an ATM or make a purchase at a grocery store.   Our lives have been marked by  wired and wireless telephone numbers, home addresses and IP addresses, optical barcodes used for loyalty programs and SKUs used at checkout cash registers/Point-of-Sales systems, an optical license plate on our cars,  and credit card numbers stored on magnetic stripes.

RFID is a more technologically sophisticated way of storing information.  RFID short range proximity technology allows NFC credit cards, access badges and transportation payment systems like Washington DC’s SmartTrip; slightly longer range vicinity access badges allow hands free entry and inventory control within a couple feet;  and long range RFID allows for toll booths to capture your vehicle’s identity at 60 mph and ski and snowboard operators to verify you’ve paid for a lift ticket.

Wearing a RFID wristband or ankle band is a better approach to having your “ID” with you at all times, when you want to have it with you –in the shower, skydiving, while driving (as a modern day driver’s license replacement), at work; and when you don’t want it (cheating on your significant other – shopping for lingerie – or really anything related to sex).

Obsolescence

According to Moore’s Law, computing capabilities initially doubled every year, and is are still expected to double every three years.

Animal chips have increased in capacity from 9 to 10, to the current 15-characters.

Does that mean we’re going to have to have surgery for a sub-dermal under-the-skin upgrade every few years?  How about a product recall?

Multiple Standards

WikiPedia’s http://en.wikipedia.org/wiki/Microchip_implant_(animal) extensive list of problems with RFID in animals over the years should make any government entity proposing semi-permanent injections of RFID microchips and antennas curb their enthusiasm.  Some early manufacturers didn’t comply completely with  ISO 11784 and ISO 11785.  Some adopted encryption techniques to prevent cloning. While a “nice” idea it meant that a single tag interrogator/reader at a veterinarian or an animal shelter couldn’t read all of the tags from AVID™, AKC CAR/EID™, Digital Angel®, Home Again®, ResQ®, ALLFLEX®, Schering Plough™, 24 PET WATCH™, Lifechip®, Banfield®, Crystal Tag™, Datamars™, Trovan®, & Destron Fearing™.

The first 3-numbers in the companion-chip’s embedded RFID number either represent a manufacturer when > 900 or an ISO 3166-2  country code when < 900, e.g. 840 for the U.S..

I have a couple embedded animal chips:

  • DATAMARS resQ #981 020003947862
  • HomeAgain #985 121011271088
As a test, I tried reading them with an inexpensive RFID reader from Australia that plugs into a computer’s USB port and is capable of interrogating and writing multiple types of RFID chips http://www.priority1design.com.au/rfidread-mrw.pdf.  It reads the resQ® chip fine.  The HomeAgain chip is non-compliant, i.e., not Full Duplex FDX-B compatible, and therefor couldn’t be read.
Bayer (the aspirin folks), developed the resQ®  Scanner. It reads not only encrypted and unencrypted 125 kHz, in addition to other ISO-compliant 134.2 kHz, it reads the  HomeAgain™ as well as the encrypted and unencrypted AVID™ microchips.
Andy Kluck, who runs Max Microchip, writes more about the problems he encountered with RFID chips for animals at http://maxmicrochip.com/ISO_types.htm.  He’s also broken the AVID encryption algorithm.  If we can’t get RFID consistently effective for animals we shouldn’t be monkeying around with humans.
  • 9 numbers – Avid (800) 336-2843
  • 10 numbers with the single letter A at the end – Avid (800) 336-2843
  • 10 numbers/letters and does NOT begin with a 0 – HomeAgain (Schering-Plough) (888) 466-3242
  • 10 numbers beginning with a 000 – AKC Trovan (800) 252-7894
  • 10 digits beginning with 0A*- 24  PetWatch (866-597-2424)
  • 15 digits beginning with 985 – HomeAgain (888) 466-3242
  • 15 digits beginning with 981 – ResQ (877-PETLINK) (877-738-5465)
  • 15-digits beginning with98101 – Banfield (877-657-8738)
* 0A is hexadecimal for the number decimal number 10
Identity Theft

What happens if someone copies or clones your RFID chip?

On a less technological level what’s to keep someone from digging your RFID from under your skin to steal your identity?

The chip would need to be tied in to a database such as envisioned in REAL ID and PASS ID that lets a business, hospital, law enforcement officer (LEO), customs and border patrol or other service provider pull up the biometrics (face, fingerprints, iris scan) to quickly validate or verify the ID matched the individual.  This is no different than a clerk in a store or a bartender looking at your state issued ID’s name and picture to match the name on your credit card or to confirm you’re as old as you say you are.

Identity Errors

RFID requires antennas, complex radio electronics, complex internet digital electronics, complex software and databases, and a reliable communications path to a database to look up information.  If there is an error or failure in any of these, your identity could become unavailable or worse confused with somebody else.

What happens if there is a manufacturing error and the same number is issued multiple times?

Encryption

Security is only as strong as the weakest link, and the mathematics of cryptography is almost never the weakest link. The fundamentals of cryptography are important, but far more important is how those fundamentals are implemented and used.”  Bruce Schneier

Encryption relies on a key to unlock information.  California, Civil Code Section 1798.79,  Title 1.80 Identification Documents, makes it a crime to monkey with encryption keys.

A person or entity that knowingly discloses, or causes to be
disclosed, the operational system keys used in a contactless
identification document system shall be punished by imprisonment in a
county jail for up to one year, a fine of not more than one thousand
five hundred dollars ($1,500), or both that fine and imprisonment.

Privacy

The National Conference of State Legislators’ summary by state  of RFID laws ranges from none allowed in Virginia as part of any state issued identities to a practical approach applied by Washington State.  Washington borders Canada, where Enhanced Drivers Licenses (EDL) are viewed as a significant convenience for those that cross the border as part of their daily job.

A low tech RFID tag that simply stores an unique identifier is nothing more than an electronic license plate.  Unless you have access to the DMV database you don’t know anything about who owns the vehicle, short of what the driver/passenger looks like.  A person with a RFID is like a car with a license plate, but more powerful in that a persons RFID is not line-of-sight constrained and can be turned off (put in an Altoids can) .

Federal law 18 USC § 2721 – PROHIBITION ON RELEASE AND USE OF CERTAIN PERSONAL INFORMATION FROM STATE MOTOR VEHICLE RECORDS, limits what states can do.  It doesn’t say anything about commercial use of license plates for communications such as Mitch Thrower’s Bump.com does, or conducting inventory of vehicles in parking lots using Automatic License Plate Readers (ALPR).

California law allows a person or entity to unintentionally remotely read a person’s identification document using RFID in the course of operating a contactless identification document system unless the person or entity:

(1) Discloses what it read to a third party whose purpose is to read a person’s identification document, or any information derived therefrom, without that person’s knowledge and consent.

(2) Stores what it read for the purpose of reading a person’s identification document, or any information derived therefrom, without that person’s knowledge and prior consent.

(3) Uses what it read for the purpose of reading a person’s identification document, or any information derived therefrom, without that person’s knowledge and prior consent.

Benefits

The Massachusetts Institute of  Technology (MIT) was instrumental in “The Internet of Things”, defining Machine to Machine (M2M) interfaces.  Over a dozen years ago they predicted the benefits that we’d experience in 2010.

Mythbusters RFID

April 11, 2012 at 7:24 pm | Posted in Uncategorized | Leave a comment
Tags:

Self Serve Checkout Prone to Fraud

April 11, 2012 at 11:24 am | Posted in Uncategorized | Leave a comment

Are those automated expensive laser equipped barcode scanners with built in scales and payment methods that read your loyalty card and print your receipt effective for decreasing cost and improving customer satisfaction?

Credit card skimmers read Track 2 data from a customers magnetic stripe on their credit card without the merchant knowing they’re hosting the software and hardware.  Examples include:

Customers enter the code for cheap bananas when they’re weighing expensive kumquats.  The average cost to consumers $500?

I like the human touch and cash.

FaceBook Advertising

April 10, 2012 at 10:02 pm | Posted in SEO - Search Engine Optimization, Web | Leave a comment
Tags:

1. Keep Landing Page Simple & Relevant
2. Clear Image 110×80 px in both white and grey background
3. Call to Action
4. Target 10-200,000 users
5. Test target groups/images in different campaigns
6. Pay for Clicks (CPC), not for views/impressions (CPM)
7. Use Suggested Bidding Range
8. Budget at least $50/day
9. No more than 4 ads per campaign

CTR = Click Through Rate, > 0.02% is a minimal number
Reach = Number of times ad displayed (should be > 1,000 in 2-hours)

 

Next Page »

Create a free website or blog at WordPress.com. | The Pool Theme.
Entries and comments feeds.

Follow

Get every new post delivered to your Inbox.

Join 252 other followers