Skip to main content

Posts

Design: the production that doesn’t forget the consumer

  I have learnt from creativity and design that the market often doesn’t pursue that someone claims to know.  A clear example is in the case of economic recession when the persons tend not to spend money for superfluous expenses but reduce their purchase to essential. Not even the infamous free obtains in certain event the forecast consent as often the sector tempts exorbitant advertising, pyramidal schemes and other illegal things.  It’s happen to discover in market and marketing analysis for the pre-supply  of an artwork or design project that sometimes that you think cannot like obtains more consent rather than that you think can like.   The company that produces common objects it knows rightly the market study continues also after production and marketability of products.  The study extends what the consumer likes, the level of satisfaction of purchase and if the use of product is the same which is created and produced.  The designers sometimes lik...
Recent posts

OSINT: open source intelligence in the free market

  In the sector of cybersecurity it exists the OSINT “intelligence open source” ,  or technical analysis and data harvest from open source. It seems in opposition to the defence of business assets but really it’s a way to understand as in some sectors the closing of informations to the public cannot be the best choise.  The OSINT is a complex and large field linked mainly to intelligence operations on some security themes in the free market. It’s at disposal of defence of company asset and market analysis of unfair competition. In the OSINT operation there are the analyses on change of companies that they try to defraud or the analyses on companies that they operate in unfair competition.  An example of company which is target of OSINT is bankruptcy company that they try to wash their reputation to return in the market with another name and take away financial resources to whom is in order with italian and international laws.  The free market isn’t always libera...

Abstract W | Cube City Nr 1: the background...

 In the introduction to this pubblication I have pinned a series of arguments on which to write future posts. To all creatives the main request is to write about the background of own work because the author is always the better person who can explain his own work.  I begin with Abstract W | Cube City.  I have explained in a previous post that the project in the complex have to do a different thing, but as the creative coder know well with the codes not always the programming works so.  Where the cube city is born?  It’s born from the morphologic analysis and the trasformation of the cities in the time. The creative version is an artistic way to explain the techniques that in architecture and urban planning could be difficult.  The first city I have imagined is Abstract W | Cube City Nr 1, or the grid city that in urban planning is a reticulate of road layout that they intersect in a regular and ortogonal way.  I’m starting from the study of Ippodamus ...

Cybersecurity: To be Zero (day)

    For many time I have spent awareness on cybersecurity and beta testing in opensource but also on proprietor operating system, softwares and applications.  Myself, as graphic programmer, have to meet programming errors bound to development tool so to have the doubt: is there a Zero day?  To correct an error doesn’t say there isn’t an hidden Zero day, or rather an exception in the development tool that requests a change of procedure to avoid the unknown obstacle in that moment.  Some errors emerge after many time and after the use of software or platform, they are bound wear of the application codes.  In a video “Code error - Code correction” I have introduced a tedious argument in the hacking.  From a creative point of view I said directly the error is more lovely than the correction.  From a security point of view it’s exactly the opposite, or rather an enormous damage for everyone that meets a Zero day that it wasn’t corrected.  The moti...

Cybersecurity: "The return of the procedure"

  I’m here to write again of cybersecurity in a different point of view from the vision of other people can imagine.  Many persons asked me to talk about cybersecurity in a special session but for me it’s impossible.  In my experience of design contests, also online, I have learnt that the consolidated procedures exist and they belong to security and legal section than creativity. An example are the contests for industrial design where is obligatory that the project:  doesn’t infringe the patents and copyright of others,  didn’t publish,  it remains unpublished until the exit of results and sometimes until the option of acquisition from the promoter of contest.  So happen either the contest platform or contest organization or candidates have to put in operation the procedures to prevent flight of news or other problems on projects before the exit of results. I can say that the iter doesn’t belong to creativity but meet the discourse of defence of compa...