this is the first time i actually got involved - i wasn't part of the first two. the first one was too easy, the second was fun and challenging, but I jumped in to make the third one the toughest.
the answer is out there in plain sight - just look carefully.
Yes your involvement has made the challenge3 a real tough one, but still interesting and inspiring. We all are at the edge of our seats and enjoying this excitement.
Here is a comment from a trusted source, but what the heck does it all mean????
"The JPG file was probably processed with steganographic algorithms which embed payload bits into the Least Significant Bits (LSBs) of quantized DCT coefficients, before the Huffman encoder is applied. This steganographic technique causes the Pairs-of-Values (PoV), in normal images distributed unevenly throughout the image, to be evenly distributed, which can be detected using Chi-square test. Also, window smoothing by moving average is implemented on Chi-square test results, in order to improve accuracy. "
That kind of steganographic encoding is quite advanced and would involve the use of applications or downloads which we vowed not to do this time around.
So - the clue is you don't need to install any special software to process anything to see the clue which is in plain sight.
So if Sarah likes to network, but not in public places, I probably won't find her because I am looking on the internet ( a public place). The other alternative being Sarah likes to network in private places, or Sarah likes to network in the fed space....:-(
Suzi - the internet is not ALL public, some things require subscriptions... for example, your gmail account is not a public place, and neither is say LinkedIn from the previous challenge :) Yet they are both "on the Internet." Remember that "the Internet" is more than just www. stuff. Anything http:// or https:// or even ftp:// and so on is still considerd Internet. Don't confuse "world wide web" with Internet.
Basically if a password is required then its not public access, its restricted access, meaning anyone with the password may enter but not everyone is allowed. Hence its restricted to only those who subscribed, even though the subscription may not require any payment or authorization. Hence, certain "private" networks are acutally open to the public but their content is not inexed by the spiders.
Some places like LinkedIn blurr the line because you can take your private profile and publish it - but then you have to take an extra step to do so and make it available. So long as you don't do that then it would remain a "private" network.
the www is public insofar as you are not challenged with a password
the moment you are required to "log in" then it is no longer "public"
Of course, true seekers know that EVERYTHING can be public if you ask the right questions, but that's another bedtime story form another fairytale for another time :)
I think that's what Sarah is saying anyway... but yes, personal. I think comments on Ning and recommendations on LinkedIn are also very personal. But so is a phone call. Ultimately its all personal when you engage with a person.
That's awesome Suzi! I'm glad the clues are begining to show you a trail. There's a method to all this and everything will become clear with a few more steps. I'm honored and flattered that you've stopped by my page to drop a note but please keep in mind I'm not the only one who worked on this challenge. There's an organization behind it, I only recently got involved and happen to be the one among them who chose to "step out into the light" and be more vocal. In other words, I hope my style doesn't prejudice folks search methods too much because the grand design is not entirely mine.
Oh, I know you're just a "piece of the puzzle" and am still awaiting feedback.....even though I know I am not eligible for this challenge, I still want to solve it.
Thank you Shally for setting the masses straight, that who is actually behind SourceCon and it's challenges is not one man or woman but a collective of the best and brightest minds in the sourcing industry. To publicly take credit for others peoples creative work is the easy mans road.
"Two roads diverged in a wood, and I took the one less traveled by, And that has made all the difference"
Robert Frost
1920
Thank you, great "SourceCon Icon" for those wise words by one frosty poet - yet how many people around us do just that? Plagiarism is rampant in the age of the Internet. Those who succeeed do so most easily and gracefully when they recognize that in a community we all learn from each other and quickly adapt what we see so that it works for our own needs and so all that all it takes is a simple nod, hyperlink or other humble gesture to give credit where its due. Fankly I think modifying something to pretend its original is just more work than a quick "thank you" and get on with the show.
It was an honor and a pleasure to finally meet you and I'm sorry we didn't get to speak in any great detail. I would like to schedule some time this week to catch up. Hope all is well.
Recruiting Animal
May 2, 2007
Rob McIntosh
May 24, 2007
Slouch
May 24, 2007
Shally Steckerl
May 24, 2007
Kristi Young
Jun 5, 2007
Recruiting Animal
Jun 11, 2007
Shally Steckerl
https://v-me.vonage.com/shallysteckerl
Jun 16, 2007
Chad Sowash
Jun 19, 2007
Gina OLeary
Jul 5, 2007
NADNUK
Third one is really very tough one.
Aug 7, 2007
Shally Steckerl
the answer is out there in plain sight - just look carefully.
Aug 7, 2007
Yusuf Pathan
We are trying our level best to crack this one... a tough one though :-)
Aug 7, 2007
Satya. C. N.
Good Afternoon.
Yes your involvement has made the challenge3 a real tough one, but still interesting and inspiring. We all are at the edge of our seats and enjoying this excitement.
Wish me best of luck..... :)
Regards,
Satya. C. N.
Aug 8, 2007
Suzy Tonini
"The JPG file was probably processed with steganographic algorithms which embed payload bits into the Least Significant Bits (LSBs) of quantized DCT coefficients, before the Huffman encoder is applied. This steganographic technique causes the Pairs-of-Values (PoV), in normal images distributed unevenly throughout the image, to be evenly distributed, which can be detected using Chi-square test. Also, window smoothing by moving average is implemented on Chi-square test results, in order to improve accuracy. "
Aug 8, 2007
Rushit Shah
Give another Clue:-)
Aug 8, 2007
Shally Steckerl
That kind of steganographic encoding is quite advanced and would involve the use of applications or downloads which we vowed not to do this time around.
So - the clue is you don't need to install any special software to process anything to see the clue which is in plain sight.
Sarah likes to network but not in public places.
Aug 8, 2007
Rushit Shah
Aug 8, 2007
Suzy Tonini
I think Rushit is onto something....hope someone cracks this soon as Mike and I need a 3rd playmate for the SourceCon sandbox
Aug 8, 2007
Amie Ernst
Aug 8, 2007
Suzy Tonini
Aug 9, 2007
Shally Steckerl
Basically if a password is required then its not public access, its restricted access, meaning anyone with the password may enter but not everyone is allowed. Hence its restricted to only those who subscribed, even though the subscription may not require any payment or authorization. Hence, certain "private" networks are acutally open to the public but their content is not inexed by the spiders.
Some places like LinkedIn blurr the line because you can take your private profile and publish it - but then you have to take an extra step to do so and make it available. So long as you don't do that then it would remain a "private" network.
Aug 9, 2007
Suzy Tonini
Aug 9, 2007
Suzy Tonini
Aug 9, 2007
Shally Steckerl
the moment you are required to "log in" then it is no longer "public"
Of course, true seekers know that EVERYTHING can be public if you ask the right questions, but that's another bedtime story form another fairytale for another time :)
Aug 9, 2007
Randy Bailey
Aug 9, 2007
Shally Steckerl
I think that's what Sarah is saying anyway... but yes, personal. I think comments on Ning and recommendations on LinkedIn are also very personal. But so is a phone call. Ultimately its all personal when you engage with a person.
Aug 9, 2007
Shally Steckerl
Aug 9, 2007
Shally Steckerl
http://www.recruitingbloggers.com/rbs/2007/08/heres-why-i-thi.html#more
Aug 9, 2007
Suzy Tonini
Aug 10, 2007
Shally Steckerl
Aug 10, 2007
Slouch
Aug 10, 2007
Shally Steckerl
Aug 10, 2007
Shally Steckerl
Aug 10, 2007
Suzy Tonini
Aug 10, 2007
Satya. C. N.
It looks like this page is modified????? zzzzzzzzz.....
Aug 11, 2007
Shally Steckerl
Aug 12, 2007
SourceCon Dude
"Two roads diverged in a wood, and I took the one less traveled by, And that has made all the difference"
Robert Frost
1920
Aug 13, 2007
Shally Steckerl
Aug 13, 2007
Suzy Tonini
Aug 13, 2007
Slouch
Aug 15, 2007
Mike Notaro
Sep 17, 2007
Ray Towle
Thanks for sharing at SourceCon 2007! Only more time would have made it better. It was all PRIME Info. Kudos!
All the Best!
VirtualSourcer
Sep 17, 2007
Chad Sowash
Oct 25, 2007
Slouch
Nov 30, 2007
Slouch
Nov 30, 2007