New and Emerging Specs and Standards (September 2019)

ISO/IEC 15961-2:2019 Information Technology--Data Protocol for Radio Frequency Identification (RFID) for Item Management--Part 2: Registration of RFID Data Constructs

Technical Committee: ISO/IEC JTC 1/SC 31 Automatic identification and data capture techniques

“This document specifies the procedural requirements to maintain specific RFID data constructs. The data constructs are associated with managing open and closed applications that utilise RFID systems which conform to the data protocol defined in other parts of ISO/IEC 15961 and ISO/IEC 15962, and the air interface protocols of ISO/IEC 18000. It also outlines the obligations of the Registration Authority and the application administrators.”

W3C Publishing Working Group, First Public Working Draft on Publication Manifest

“This specification defines a general manifest format for expressing information about a digital publication. It uses metadata augmented to include various structural properties about publications, serialized in JSON-LD, to enable interoperability between publishing formats while accommodating variances in the information that needs to be expressed. This manifest format had originally been developed as part of larger work on Web Publications. As a result of some recent discussions, the publication schedule of the group has been modified and, while the Web Publication has been published as a Working Group Note, the Publication Manifest has become a stand-alone, recommendation track document.”

Intel, Google, Microsoft, and others launch Confidential Computing Consortium for data security

Khari Johnson, VentureBeat, August 21, 2019

“Major tech companies including Alibaba, Arm, Baidu, IBM, Intel, Google Cloud, Microsoft, and Red Hat today announced intent to form the Confidential Computing Consortium to improve security for data in use. Established by the Linux Foundation, the organization plans to bring together hardware vendors, developers, open source experts, and others to promote the use of confidential computing, advance common open source standards, and better protect data.”