Draft report on the improvement of the usage environment to address various issues surrounding the use of ICT services

Ministry of Internal Affairs and Communications: Call for opinions on the report (draft) on the improvement of the usage environment to address various issues surrounding the use of ICT services (Deadline: August 8)

About the "Study Group on the Improvement of the Environment for Using ICT Services" The "Report (Draft) on the Improvement of the Environment for Using ICT Services for Issues Surrounding the Use of ICT Services," compiled by the Ministry of Internal Affairs and Communications' "Study Group on the Improvement of the Environment for Using ICT Services" in July 7, is now open for public comment (e-Gov's public comment submission site). Deadline...

Further display Ministry of Internal Affairs and Communications: Call for opinions on the report (draft) on the improvement of the usage environment to address various issues surrounding the use of ICT services (Deadline: August 8)
Study Group on the Realization of a Safe and Secure Metaverse

Ministry of Internal Affairs and Communications Study Group on the Realization of a Safe and Secure Metaverse Announces 2025 Draft Report - Identity Verification, Privacy, and Accountability in the Metaverse (Public comments accepted until August 8th)

P.S.: Public comments are being accepted from August 8th to 4th. If you have any opinions, please visit https://www.soumu.go.jp/menu_news/s-news/27iicp01_01.html. The submission form and other details are available on this page of e-gov. Today, the 02000126th year of Reiwa...

Further display Ministry of Internal Affairs and Communications Study Group on the Realization of a Safe and Secure Metaverse Announces 2025 Draft Report - Identity Verification, Privacy, and Accountability in the Metaverse (Public comments accepted until August 8th)
Bach and Violin over BWV565 manuscript

Was Bach's "Toccata and Fugue in D minor, BWV 565" originally a violin piece?

Is Bach's "Toccata and Fugue in D minor BWV 565" a work by someone else? One of JS Bach's representative pieces is "Bach's "Toccata and Fugue in D minor BWV 565". The opening passage, "Charara-ra, chararara-ra-ra", is famous for this piece. This "representative piece", "Toccata"…

Further display Was Bach's "Toccata and Fugue in D minor, BWV 565" originally a violin piece?

MyDataJapan2025 opening ceremony

Good morning, everyone. I would like to express my sincere gratitude for your participation in MyData Japan 2025. Those gathered here today include business people, government officials, engineers, researchers, and citizens - all of us with different positions and expertise. However, we are all now discussing the question of "how to improve our relationship with data..."

Further display MyDataJapan2025 opening ceremony
The Financial Services Agency amends its supervisory guidelines. Phishing-resistant authentication methods will become mandatory. It's not biometric authentication as some articles say!

The Japanese Financial Services Agency amends supervisory guidelines. Phishing-resistant authentication methods will become mandatory. It is not biometric authentication as some media say, however! Public comments are open until August 8th.

On the 15th, the Financial Services Agency began accepting public comments under the title "Publication of a partial revision (draft) of the "Comprehensive Supervision Guidelines for Financial Instruments Business Operators, etc." The deadline is 18:17 PM on Monday, August 00th (must arrive by this date). This case concerns the theft of customer information (login IDs, etc.) from phishing sites disguised as securities company websites...

Further display The Japanese Financial Services Agency amends supervisory guidelines. Phishing-resistant authentication methods will become mandatory. It is not biometric authentication as some media say, however! Public comments are open until August 8th.
MyDataJapan2025 Preview

[Held on July 7th] MyData Japan 17: Digging deeper into the "practice" of utilizing personal data! The forefront of evolving data governance

The season for the MyDataJapan conference has come around again this year. "MyData Japan 2025 ~ MyData in Practice ~" is one of the largest conferences in Japan, which explores sustainable and ethical data utilization centered on individuals. This year's theme is "MyDa…

Further display [Held on July 7th] MyData Japan 17: Digging deeper into the "practice" of utilizing personal data! The forefront of evolving data governance

We tried installing a My Number card on an iPhone! Starting June 2024, 6

Starting June 2024, 6, you can finally use your My Number card on your iPhone! We actually set it up and verified what functions are available and what impact it has on your Android smartphone. 📱 Video Contents 🔑 What you need ⚠️ Important points 🎯 Time stamp…

Further display We tried installing a My Number card on an iPhone! Starting June 2024, 6
UK Data Use and Access Act 2025 receives UK ratification: a major milestone for digital identity

UK Data Access and Use Act 2025 receives Royal Assent: Major milestone for digital identity

On 6 June, the UK Data (Use and Access) Act received Royal Assent. As well as putting the underground asset register on a legal footing and supporting the future of smart data schemes, this is a key part of the Government's efforts to ensure that individuals and businesses across the UK can access trusted digital identity services when they need them...

Further display UK Data Access and Use Act 2025 receives Royal Assent: Major milestone for digital identity
The threat of real-time phishing that cannot be prevented by one-time passwords - The true nature of phishing resistance using passkeys

The threat of real-time phishing that cannot be prevented by one-time passwords - The true nature of phishing resistance using passkeys

In recent years, phishing attacks targeting financial institutions and other organizations have become more sophisticated, and a method called "real-time phishing" in particular has become a serious threat. This type of attack can even invalidate one-time passwords (OTPs), which have traditionally been considered effective in preventing phishing attacks.

Further display The threat of real-time phishing that cannot be prevented by one-time passwords - The true nature of phishing resistance using passkeys