Skip to main content

Brand and marketing: what do you communicate?

  The brand and marketing communication cannot be sometimes as simply as we think.   What does a brand represent is linked to the development line in the production or service sector, what does it communicate is linked to marketing strategy and to the satisfaction of consumers that buy its products and services.  From my commercial brand was born a fork that it’s a writing space where meet all the background of persona branding and commercial brand but also what the professional man behind both of them thinks or wants to show about its work.   It was born so SPACEFORMDSGN as an evolution of name branding of commercial brand.  The words that compose this name branding are an english variation: “ SPACE ” “ FORM ” “ DSGN ”.    In this case I have preferred to preserve the contracted part and use the words of root in english to extend the marketing of brand to the global market.  In the evolution for writing I have preferred the contracted ...

Cybersecurity: To be Zero (day)

 


For many time I have spent awareness on cybersecurity and beta testing in opensource but also on proprietor operating system, softwares and applications. 

Myself, as graphic programmer, have to meet programming errors bound to development tool so to have the doubt: is there a Zero day? 

To correct an error doesn’t say there isn’t an hidden Zero day, or rather an exception in the development tool that requests a change of procedure to avoid the unknown obstacle in that moment. 

Some errors emerge after many time and after the use of software or platform, they are bound wear of the application codes. 

In a video “Code error - Code correction” I have introduced a tedious argument in the hacking. 

From a creative point of view I said directly the error is more lovely than the correction. 

From a security point of view it’s exactly the opposite, or rather an enormous damage for everyone that meets a Zero day that it wasn’t corrected. 

The motivation to spend awareness on cybersecurity is just this: to instruct the users of pc for home or professional motive to resolve incidental security issue until the bug correction so to have good practice useful to everyone also in the future that can transfer in other situation. 

A pc isn’t a perfect machine. The major of users handle it in non professional mode and for home or game motive so there are controversis between common users and professionals with business activities because they don’t think in the same way. 

If from home motive can be a pleasure to do some things, for example see a film or game and talk with absent kith and kin, from professional motive can be a war with fraudulent attempt to enter illegally in simple operation as a communication with a client or a colleague. 

The human bug is disinformation, or rather they don’t know bug that can be carrier of illegality when they send a mail, a sms or they share or interact with app and games. 

A bug or a Zero day  are  always a carrier of interference, if the bug is on the web or can bring to online activities as web surf or communication platform it's worse. Ask to stay online to use the service can make visible personal data in the case of attacks as "SQL injection" or can damage the digital asset in the case of attacks as "denial of service". 

More than 2FA I have ask for the function of  logout for who has application bound to used PID device without account manager online, if there is a security bug on platform or application in the case of logout the error is of platform or application that didn’t correct an incidental issue login or logout service.  

Often the common users are unaware there is this type of bug and they think are immune from possible illegality that can try to enter in their accounts of service. 

I believe however it’s always a good practice for all to use at least a 2FA system that in the extreme case can block the illegal attempt to access the service, the question of attacks "brute force" it’s better to leave to another occasion.

Comments

Popular posts from this blog

Creative and security information specialist: the indipendence is a imperfect world of freedom

  I was hoping don’t write again a critical post on some arguments because this publication is born with a different purpose, but the persistence of events not related to my will oblige me to write again a critical post. The indipendence and the freedom of thinking taught me by my parents, in south of Italy they often clashed with events didn’t depend from my will but from the circumstances where the diversity and the creativity aren’t view as an added value that can innovate a process for the improvement of society.  Before me, many independent creatives and ethical hackers have talk about this subject, I could have to refrain to speak but I’m a creative coder and sometimes I don’t accept the interference of some people that aren’t in the sector of creativity and computing.  Many people define itself “creative”or “security information specialist”, also when it’s not so.  A client call a physician, a lawyer or an accountant because you need of that professional worke...

From concept design to reality: from fractals to design

  The accomplishment of a concept goes across a long way of many phase until the arrive of the product design to market where a client can buy it and the company can verify if the product collects the consent and the expetation of clients.  If a design competition represents a way to see a great deal of possible concept or not, the accomplishment of a marketable concept is rather different. In architecture it's known before of a preliminary project there is an important step that it's to have a committment and a real demand of the architectural project respondent to the necessity of a service for city or people.  In the design it's seems similar but the planning of an object is tied to the possible industrial production and if there isn't the market or clients for that product it's useles to begin a path for the concept design to the realized product.  To plan, any object or in any scale, it's a complex operation. It supposes a synthesis of function, technique, ...

Notes from creative journey: “The thinking behind design”

  I begin again to write after a long time of silence and after I have kept at a safe distance the world of writing. It’s not easy to return on one’s steps, especially if you are a visual creative who uses the writing for the necessary to explain the own projects.  It’s hard to explain to people who read you, the reasons which take you to open a publication on web, it’s hard to not think how you can make known the arguments each time you will discuss if you know these arguments are not common but there are few people interested them.  I think the first post must be a preface on what we would like write in the following posts. It must represent our imaginary line on which to pin down the topics we would like to talk about, a reference for all those times we lose sight the pourpose for which to write, a note to be read every time it’s missing the reasons to continue, an engagement to be revise to the need to reorganize own work in a new viewpoint and under new scenary....