Yahoo Acquisitions Power Flickr’s New Object Recognition Search, Editing And Video Capture | TechCrunch
"In fact, Yahoo is doing actual object recognition in searches now, automatically generating tags from things it recognizes in your images. Is there a cat in your picture, but you didn’t tag it cat, or bother to tag it at all? No problem, Flickr’s new search will see the cat and transparently add a “cat” tag, surfacing it in search results. The same goes for dogs, horses, sunsets and a variety of other subjects."

Any bets on whether you'll be able to get any of this stuff back via the API?
flickr  roboteyes 
2 days ago
When ‘Liking’ a Brand Online Voids the Right to Sue #b7c1c951c357ad1e9e4b14a764919b50
General Mills, the maker of cereals like Cheerios and Chex as well as brands like Bisquick and Betty Crocker, has quietly added language to its website to alert consumers that they give up their right to sue the company if they download coupons, “join” it in online communities like Facebook, enter a company-sponsored sweepstakes or contest or interact with it in a variety of other ways.

Instead, anyone who has received anything that could be construed as a benefit and who then has a dispute with the company over its products will have to use informal negotiation via email or go through arbitration to seek relief, according to the new terms posted on its site.
motive  law  highlights  from:instapaper  dt:year=2014  dt:month=04  dt:day=17  url:2823d28cd4b2ef4bd342f587d5c77ee0 
2 days ago
A Life with a View #b52e1b7d5def73602ddc475f47fa9161
You can imagine a more poignant version of this conversation over an iPad showing a Facebook feed. The Internet, with its constant parade of lives-that-might-have-been-yours and classmates-not-dated, is a jungle of yearnings. Yearnings that were once confined to fading and static memories of childhood, occasionally awakened by petrichor, now sneak into your life as a steady, colorful stream of living confusion, via windows in present realities. There was no equivalent in the past to being a silent spectator of other lives by default. You either had active, evolving relationships of mutual influence, or mutual invisibility. Like passengers on subways, we only saw people on other routes at stations. There were no relationships of continuous mutual spectatorship.
network  highlights  from:instapaper  dt:year=2014  dt:month=04  dt:day=17  url:dad5fb434d4d312a42edb9c83fb61918 
2 days ago
Michael Lewis: 'Wall Street has gone insane' #f55b9333fa8fdd2ada0f1810ed3379b7
The cornerstone of Flash Boys is a discovery made by an obscure Canadian banker, Brad Katsuyama, who noticed that whenever he tried to execute a trade, the stock price moved before the order went through. A long and tortured investigation revealed that the variable speeds at which trading information travels down fibre-optic cables to the exchanges was being exploited by brokers and high-frequency traders – so-called for the volume of trades they make – to jump the queue, buy the stocks in question and sell them back at a higher price to the person who expressed the original interest.
finance  motive  highlights  from:instapaper  dt:year=2014  dt:month=04  dt:day=17  url:b7fc7d1a6d7aff330220e936b9f5b90d 
2 days ago
Webstock '14: Erika Hall - Beyond Measure on Vimeo
"Biochemical facts were no match for a good story."
design  erikahall 
3 days ago
What Is This Future? | Datacide #f898c39c9d2f7ec46009eb44c1724ca6
Awarenesses will see this world, and together they will make a culture. The question is not if a culture will develop from the storm, but what it will be. A culture rising during a rapid recombination of agrarian, industrial, and information society, combining spirituality with spiritual machines, bio-mechanical medicines with ancient traditions. A culture experiencing radical self reliance and radical oppression, warlords and social media, space travel and ever more ubiquitous surveillance. There are many directions culture can develop within disruption, some are expansive and some are horrible. In this regard the counter culture wave of the 20th century is the counterpoint to the Weimar Republic’s slide into the Third Reich. Our contribution today is to make a demonstration. We might not have a connection to “the future” but we can have a connection to its people, we can help this future culture in its coming into being. The path is not in detailed ideology or rigid conception, but in practices and principles. Our words, critiques, actions, and stories converse with the future. What matters is collaboration across time. Our powerful vantage is our locus in history, recognizing and reflecting the paradox of a future without a future. We might not stop disaster, but relaying our intention is crucial.
highlights  from:instapaper  dt:year=2014  dt:month=04  dt:day=16  url:9be2a066bcd585368cde48032af446d7 
3 days ago
State photo-ID databases become troves for police #50a87450a738f3df515d56a230782d4b
A detective in Carlisle, Pa., attempting to learn the real name of a suspect known on the street as “Buddha the Shoota” compared a Facebook page picturing the man with the mug-shot database and got a promising lead.

“Facebook is a great source for us,” said Detective Daniel Freedman, who can do facial searches from his department-issued smartphone. “He was surprised when we walked in and said, ‘How you doin’, Buddha?’  ”

He said the suspect responded, “How you know that?” — to which Freedman replied simply, “We’re the police.”

Safeguards and trends
surveillance  facebook  peopletagging  highlights  from:instapaper  dt:year=2014  dt:month=04  dt:day=16  url:b9442c4e3953426debe4920a2a2f99e4 
3 days ago
All the News We Hope to Print #1a651057f7c24e977b93ec71c1a05e88
What is the point of this practice? The short answer is that there are too few opportunities for people to come together in public discussion about the future. Future forecasting is generally left to the "experts." Science fiction offers a more populist approach, but it too often offers a nearly unrecognizable image of the world. The newspaper format—digital or print—is effective because of its familiarity to so many people, and because of its aura of authority. Seeing a well-known media outlet describing events of the future has the potential to prompt concrete thinking and widespread discussion about what lies ahead.
designfiction  papernet  highlights  from:instapaper  dt:year=2014  dt:month=04  dt:day=16  url:db4fb250a19e6ca23e90b6447d993304 
3 days ago
State photo-ID databases become troves for police #f2228fffc363781021b8e15c18ea5b92
The most widely used systems were honed on the battlefields of Afghanistan and Iraq as soldiers sought to identify insurgents. The increasingly widespread deployment of the technology in the United States has helped police find murderers, bank robbers and drug dealers, many of whom leave behind images on surveillance videos or social-media sites that can be compared against official photo databases.
surveillance  highlights  from:instapaper  dt:year=2014  dt:month=04  dt:day=16  url:b9442c4e3953426debe4920a2a2f99e4 
3 days ago
jwz: Heartbleed Hit List
Also I'd like to point out again that nearly every security bug you've experienced in your entire life was Dennis Ritchie's fault, for building the single most catastrophic design bug in the history of computing into the C language: the null-terminated string. Thanks, Dennis. Your gift keeps on giving.
c  design  software  heartbleed 
8 days ago
Avoiding ‘words to avoid’ | Inside GOV.UK
To help publishers avoid these words, we’ve built a new feature in Whitehall Publisher that highlights the words to avoid in the text as you type.
8 days ago
Answering the Critical Question: Can You Get Private SSL Keys Using Heartbleed? | CloudFlare Blog
"We modified our test version of NGINX to print out the location in memory of each request (s->s3->rrec.data), whenever there was an incoming heartbeat. We compared this to the location in memory where the private key is stored and found that we could never get a request to be at a lower address than our private keys regardless of the number of requests we sent. Since the exploit only reads higher addresses, it could not be used to obtain private keys."
heartbleed  security  whosonfirst 
8 days ago
Schneier on Security: More on Heartbleed
This may be a massive computer vulnerability, but all of the interesting aspects of it are human.
8 days ago
NSA Said to Have Used Heartbleed Bug, Exposing Consumers - Bloomberg
While many Internet companies rely on the free code, its integrity depends on a small number of underfunded researchers who devote their energies to the projects.

In contrast, the NSA has more than 1,000 experts devoted to ferreting out such flaws using sophisticated analysis techniques, many of them classified. The agency found the Heartbeat glitch shortly after its introduction, according to one of the people familiar with the matter, and it became a basic part of the agency’s toolkit for stealing account passwords and other common tasks.
nsa  surveillance  heartbleed 
8 days ago
How the Guardian uses GitHub to audit GitHub | Info | theguardian.com
These are the simple security requirements gu:who enforces on each account in order to help make your code more secure:

Two-factor authentication enabled
a full name in their GitHub profile, helping you identify users you can't identify by username alone
Sponsor – a more senior member of staff willing to vouch for the validity of the user’s membership in the organisation

That last one is interesting because of the way it’s expressed. The senior member of staff adds the user to a users.txt file in a dedicated GitHub repo, taking responsibility via git-blame for the user being in the organisation. This ensures there’s always someone to go to when membership for a dodgy account is in doubt.
guardian  github  provenance  whosonfirst  security 
8 days ago
The unveiling of ‘East-West/West-East’ by American artist Richard Serra in Qatar’s Brouq Nature Reserve
Set in a natural corridor formed by gypsum plateaus, East-West/West-East spans over a kilometre in length, and crosses the peninsula of the Brouq Nature Reserve connecting the waters of the Gulf. East-West/West-East consists of four steel plates measured by their relation to the topography. The plates, which rise to 14.7 meters and 16.7 meters above the ground, are level to each other; they are also level to the gypsum plateaus on either side. Despite the great distance that the plates span, all four can be seen and explored from either end of the sculpture.
The unveiling coincides with the artist’s first solo show in the Middle East at Al RIWAQ DOHA Exhibition Space and QMA Gallery at Katara where visitors can see an ambitious new large-scale work, Passage of Time, which is made up of two 66.5m long and 4.1m tall steel curves that snake diagonally through the exhibition space, and works from different periods of Serra’s fifty year career of sculptures and drawings. The exhibitions, both entitled Richard Serra, are curated by Alfred Pacquement, curator and former Director of theNational Museum of Modern Art, Centre Pompidou, Paris, and run from 10th April to 6th July 2014. The commission and exhibitions follow the 2011 installation of the artist’s first public artwork in the Middle East, 7, a vertical steel sculpture in the MIA (Museum of Islamic Art)Park.
sculpture  serra  artisyourfriend  qatar 
8 days ago
Download the first experiment in algorithmic publishing from Milan
"The three PDFs downloadable now from Dezeen were generated last night by an algorithmic journalism machine, using software that combines voice recognition technology and social media content posted using the #OnTheFlyMilan hashtag."
8 days ago
Alien Squad
"alien squad", aka: surveillance photos of 1930s communist and nazi groups in nyc city
nyc  surveillance  archive 
8 days ago
Surveillance Photos of NYC Communists and Nazis Go Online
look, history removed from the consequence of the present...
archive  motive  surveillance  photography 
8 days ago
"opinions is a small Web application that watches the Supreme Court of the United States website for new opinions, downloads the PDFs for each decision and looks for external URLs to use as seeds for web archiving. "
scotus  law  americaland  archive 
9 days ago
NTP Amplification Attacks Using CVE-2013-5211 | US-CERT
The attack relies on the exploitation of the 'monlist' feature of NTP, as described in CVE-2013-5211, which is enabled by default on older NTP-capable devices. This command causes a list of the last 600 IP addresses which connected to the NTP server to be sent to the victim. Due to the spoofed source address, when the NTP server sends the response it is sent instead to the victim. Because the size of the response is typically considerably larger than the request, the attacker is able to amplify the volume of traffic directed at the victim. Additionally, because the responses are legitimate data coming from valid servers, it is especially difficult to block these types of attacks. The solution is to disable “monlist” within the NTP server or to upgrade to the latest version of NTP (4.2.7) which disables the “monlist” functionality.
security  ntp  spacetime  ddos 
9 days ago
Heartbleed and Pinboard (Pinboard Blog)
In layman's terms, the bug was the equivalent of asking a stranger "hey, what's up?" and having them tell you their most private thoughts, going on about their divorce, sharing their credit card info, whatever was on their mind at the time. You could keep asking "what's up" as often as you wanted, and hear new things each time. Worst of all, the stranger would have no recollection that it had happened.

Of course, I heard about heartbleed before it was cool. The servers were patched by around 7 PM on Monday night, California time, before half the Internet started casually playing with Python scripts that exposed the bug.

So only truly malicious people could have seen your Pinboard secrets. Hooray!

In awful times like these, it's good to stop and reflect on the timeless wisdom of the Pinboard security page:

"Please do not store truly sensitive information in your Pinboard account."
heartbleed  pinboard 
9 days ago
What Heartbleed Can Teach The OSS Community About Marketing | Kalzumeus Software
CVE-2013-0156 was the Rails YAML deserialization vulnerability. ”Oh! I remember that one!”, said the technologists in the room. Your bosses don’t. Your bosses / stakeholders / customers / family / etc also cannot immediately understand, on hearing the words “Rails YAML deserialization vulnerability”, that large portions of the Internet nearly died in fire. After I wrote a post about that vulnerability I was told for weeks by frustrated technologists about e.g. VPs nixing remediation efforts due to not understanding how critical it was. That’s a failure of marketing.

Compare “Heartbleed” to CVE-2014-0160, which is apparently the official classification for the bug. (I say “apparently” because I cannot bring myself to care enough to spend a minute verifying that.) Crikey, what a great name that is.
heartbleed  marketing  design 
10 days ago
You Are Here
"You Are Here is a study of place.

Every day for the next year, we will make a map of a city in which we have lived.

Each of these maps will be an aggregation of thousands of microstories, tracing the narratives of our collective experience. We will make maps of the little things that make up life — from the trees we hug, to the places where we crashed our bikes, to the benches where we fell in love.

Over time, we will grow this to 100 different maps of 100 different cities, creating an atlas of human experience.

We hope that by showing these stories, we empower people to make their city — and therefore the world — a more beautiful place.

You Are Here is a project of the Social Computing Group at the MIT Media Lab."
maps  youarehere  via:bcamper 
10 days ago
Errata Security: 600,000 servers vulnerable to heartbleed
We found 28,581,134 machines (28-million) that responded with a valid SSL connection. Of those, only 615,268 (600-thousand) were vulnerable to the HeartBleed bug.
network  heartbleed 
10 days ago
Schneier on Security: Heartbleed
At this point, the odds are close to one that every target has had its private keys extracted by multiple intelligence agencies. The real question is whether or not someone deliberately inserted this bug into OpenSSL and has had two years of unfettered access to everything.
heartbleed  knownunknowns 
10 days ago
Social Change - BKM TECH
While there is an archival viewpoint to be made and one that we see fully, for us this was about setting a priority and making changes (not always popular ones) to honor those choices. It’s about saying when we are on a platform, we will engage (which is good for the community) or we will exit because it’s not appropriate engagement strategy to just sit. Community is a two-way street and requires engagement of both parties. There are places that are less community driven (or driven in a different way) that allow for sitting — that’s why we parked things at Wikimedia. Content can sit there and it can be owned by the community in a way that Flickr does not allow.
flickr  commons  brooklynmuseum 
11 days ago
A Few Thoughts on Cryptographic Engineering: Attack of the week: OpenSSL Heartbleed
"As you can see, the incoming (adversarially-generated) data contains a payload length ("payload") which is trusted without bounds checks. OpenSSL then allocates a buffer for its response, and copies "payload" data bytes from the pointer "pl" into it. Unfortunately, there's no check to make sure that there are actually "payload" bytes in data, or that this is in bounds. Hence the attacker gets a slice of data from main memory -- one that's up to 64KB in length.
security  heartbleed 
11 days ago
Bay of Tweets #61b1817c5324787004f1a343a5108d78
One might have also hoped that someone in the U.S. government asked the question: What if we fail? What if we are found out?

The answer, I’m afraid, can be found in the fear and outrage that slowly filled my Facebook page on Thursday as online activists around the world found out about the project—a boneheaded idea tailor-made to taint social media as a tool of the United States, and the activists as useful idiots at best, and traitors at worst.
motive  community  highlights  from:instapaper  dt:year=2014  dt:month=04  dt:day=08  url:88b3f1eddf563d7210e16b7ca64eeeff 
11 days ago
existential type crisis : Diagnosis of the OpenSSL Heartbleed Bug
"So we're allocating as much memory as the requester asked for"

...mother of god, that is the bug in a nutshell as if no one remembered that the first rule of internet club is trust no third-party claims
heartbleed  openssl  security  overflow 
11 days ago
A checker (site and tool) for CVE-2014-0160
ssl  security  golang  heartbleed 
11 days ago
The Fall of Internet Freedom: Meet the Company That Secretly Built ‘Cuban Twitter' #795dcc033f0f1d20ac203049315a02c8
That was the State Department’s program in 2010, at least. By January 2011—seven months after Eberhard and Mobile Accord were brought in—USAID and its initial contractor, Creative Associates, were getting antsy. ZunZuneo seemed successful, but Mobile Accord needed to make it sustainable or independent. As the AP reporters put it:

The operation had run into an unsolvable problem. USAID was paying tens of thousands of dollars in text messaging fees to Cuba’s communist telecommunications monopoly routed through a secret bank account and front companies. It was not a situation that it could either afford or justify — and if exposed it would be embarrassing, or worse.
highlights  from:instapaper  dt:year=2014  dt:month=04  dt:day=07  url:663e6a7df290436989b7faac5ee8a4e0 
12 days ago
Handsome Paper Notebooks Come With Digital Backup | Co.Design | business + design
"Sync" is a bit of a stretch to describe what Mod truly offers, which is a pre-paid, mail-in scanning service for its notebooks. For $25, you get a blank book (designed to be exactly the same size as an iPad Mini) and a Netflix-like pre-paid envelope. When you've filled up the notebook, you mail it back to Mod. They scan all the pages, and within five days all the content is replicated digitally in your Mod account. (You can have the notebook returned to you, but that costs extra; by default, the paper book will be destroyed by the scanning process and recycled.)
12 days ago
How Airbus Is Debugging the A350 #caf95f7c34f10e65b69846bdd43fa0e2
Like the A350, the A380 superjumbo was designed entirely on computers, but engineers working in the company’s German and French operations hadn’t used the same versions of the design software. When assembly line workers started installing bundles of wires, they discovered that the German software had miscalculated the amount of wiring needed for the fuselage, which had been designed on French software. Miles of wiring turned out to be too short and had to be torn out from half-completed airframes and replaced.
highlights  from:instapaper  dt:year=2014  dt:month=04  dt:day=05  url:b986288aa9372a1e62bb782c2c8ad713 
13 days ago
Domestic Folklore, or Washing Machines for Men #145f03a84d29079106f49807e7c49bee
Like it or not, there’s a Secret Language of Domesticity. In technology terms, it’s the equivalent of “viewing source”: it’s not intentionally secret, it’s just easy to ignore if you’re not interested or don’t understand it. It’s the thing that creates the persistent rhythms of the home, and it’s passed down – by and large – from mother to daughter.
highlights  from:instapaper  dt:year=2014  dt:month=04  dt:day=05  url:da6706aaef70e7cb8ddb985abda23ef1 
13 days ago
In the Loop: Designing Conversations With Algorithms | superflux #921f8ab3c1c002545c6aea036d94db1e
More broadly, the challenge we’re facing has a lot to do with the shift from mechanical systems to digital ones. Mechanical systems have a degree of transparency in that their form necessarily reveals their function and gives us signals about what they’re doing. Digital systems don’t implicitly reveal their processes, and so it is a relatively new state that designers now bear the burden of making those processes visible and available to interrogate.
motive  highlights  from:instapaper  dt:year=2014  dt:month=04  dt:day=05  url:ebf5370a59c684a71964064e95fc258c 
14 days ago
In the Loop: Designing Conversations With Algorithms | superflux #f1b285dddcf256b84914e9845dbd5fa7
The first behavior is adaptation. These are situations where I bend to the system’s will. For example, adaptations to the shortcomings of voice UI systems — mispronouncing a friend’s name to get my phone to call them; overenunciating; or speaking in a different accent because of the cultural assumptions built into voice recognition. We see people contort their behavior to perform for the system so that it responds optimally. This is compliance, an acknowledgement that we understand how a system listens, even when it’s not doing what we expect. We know that it isn’t flexible or responsive enough, so we shape ourselves to it. If this is the way we move forward, do half of us end up with Google accents and the other half with Apple accents? How much of our culture ends up being an adaptation to systems we can’t communicate well with?
highlights  from:instapaper  dt:year=2014  dt:month=04  dt:day=05  url:ebf5370a59c684a71964064e95fc258c 
14 days ago
George w bush paintings News, Video and Gossip - Gawker
I would pay good cash money for recreations of the Abu Ghraib photos in the style of George W. Bush's paintings.
from twitter_favs
15 days ago
Consumer Safety Notice for Nest Protect: Smoke + CO Alarm
At Nest, we conduct regular, rigorous tests to ensure that our products are the highest quality. During recent laboratory testing of the Nest Protect smoke alarm, we observed a unique combination of circumstances that caused us to question whether the Nest Wave (a feature that enables you to turn off your alarm with a wave of the hand) could be unintentionally activated. This could delay an alarm going off if there was a real fire. We identified this problem ourselves and are not aware of any customers who have experienced this, but the fact that it could even potentially happen is extremely important to me and I want to address it immediately.

We feel that the best and safest thing to do is to immediately disable the Nest Wave feature to resolve the issue and remove any safety concerns. While we fix Nest Wave, we have also halted sales of all new Nest Protect alarms to ensure no one buys an alarm that needs an immediate update.
nest  design  motive 
15 days ago
Nest’s Smoke Alarm Stumble Is a UI Lesson for Everybody | Design | WIRED
"After a nearly blemish-free record that culminated in a $3 billion acquisition by Google, Nest today issued a surprising halt to sales of Protect, its gesture-controlled smoke alarm. One of the device’s key features was that you could wave at it to turn it off. Turns out, sometimes people wave their arms around when there’s a fire in the house, too. Thus, as CEO Tony Fadell put it, “This could delay the alarm going off if there was a real fire.”"
design  nest  roboteyes  motive 
15 days ago
Schneier on Security: Ephemeral Apps #816e2f78c9da059ce1eb409857b2f825
The problem is that these new “ephemeral” conversations aren’t really ephemeral the way a face-to-face unrecorded conversation would be. They’re not ephemeral like a conversation during a walk in a deserted woods used to be before the invention of cell phones and GPS receivers.

At best, the data is recorded, used, saved and then deliberately deleted. At worst, the ephemeral nature is faked. While the apps make the posts, texts or messages unavailable to users quickly, they probably don’t erase them off their systems immediately. They certainly don’t erase them from their backup tapes, if they end up there.
surveillance  ephemera  highlights  from:instapaper  dt:year=2014  dt:month=04  dt:day=02  url:c871a09c7e80ec718a99d66a6b02456b 
17 days ago
« earlier      
/ 3d aa:ima=link aa:ima=post aa:post=10days aa:post=agency aa:post=airportcity aa:post=anti-aliasing aa:post=barcode aa:post=beta aa:post=bwr aa:post=connected aa:post=delmaps aa:post=delmaps_02 aa:post=donut-hole aa:post=dragons aa:post=enplacify aa:post=face aa:post=filtr03 aa:post=firedopplr aa:post=hills aa:post=historybox aa:post=intimacies aa:post=mw09 aa:post=mw2010 aa:post=mw2011 aa:post=mw2012 aa:post=nearby aa:post=objects aa:post=otaku aa:post=pattern aa:post=privatesquare aa:post=py-wsclustr-php aa:post=question aa:post=reproduction aa:post=spacemountain aa:post=things aa:post=turkishmmap aa:post=wall aa:post=wanderdrone aa:post=woedb aa:post=woelr aa:post=ws-decode aa:post=ws-modestmaps aa:post=youarehere aa:post=zomg aa:year=2005 aa:year=2006 aa:year=2007 aa:year=2008 aa:year=2009 aa:year=2010 aa:year=2011 aa:year=2012 aa:year=2013 aa:year=2014 aaronland airplanes airports americaland android api appengine architecture archive arduino artisyourfriend aws barcode bicycle bonus bwr camera canvas capacityplanning cats cli cloudcastles clustr colour communitiesofsuggestion community computervision conference cooperhewitt crouching crypto css d3 data database delicious design devel dotspotting drones dt:day=05 dt:day=07 dt:day=13 dt:day=14 dt:day=16 dt:day=19 dt:day=21 dt:day=26 dt:day=28 dt:month=01 dt:month=02 dt:month=03 dt:month=04 dt:month=05 dt:month=06 dt:month=07 dt:month=08 dt:month=09 dt:month=10 dt:month=11 dt:month=12 dt:year=2013 dt:year=2014 ec2 email etsy facebook finance flickr food foursquare from:instapaper galleries geo git github google hardware hidden highlights history historyboxes http instagram ios iphone java javascript jquery json keyboard language law london machinetags magicwords maps mobile montreal motive mozilla museum museums-and-the-network must namingthings network newaesthetic nodejs notifications nsa nyc ohyeahthat osm osx painting papernet perl photography php pinboard play prettymaps privacy publicspaces publictransportation python qr raspberrypi readme redacted resto roboteyes robots s3 search security semweb sensorworld sfba solr spacetime stamen stml surveillance sysadmin tagging travel twitter typos unfinishedhistory unicode unix video visualization voicefromabove whosonfirst wifi wikipedia yahoo

Copy this bookmark: