I see a problem with the continuing move toward corporate science. As corporations upgrade their research arms (good) there is not an associated upgrade to public research (bad). I trace a lot of the current scientific redundancy back to the…
Author: Samuel Liles
Draft: Cyber paradigm: Depiction of educational divergence
Another graphic from Sam’s little black book of ideas. This graphic is based on a lot of work I did while at Purdue. There isn’t anybody looking at the cyber schism currently, but what it shows is the difference in…
Some effects of technology on music and protest
Abstract This paper discusses the issues of technology, music, and the intersection with social movements such as protest. Relying heavily on discussion of the guitar and music hall as examples where technology has created radical change the discussion centers on…
Changing Tactics: Swarm and air power
David Ronfeldt and John Arquilla in the early 2000s discussed as part of Network-centric Warfare the concept of swarming. Large scale forces working autonomously with heightened capacity but perhaps lower cost and capability are able to work effectively against opponents.…
A laboratory-based course on wireless security
Abstract The objective of this paper is to provide information on how to create a course that informs students how to secure a wireless local area network (WLAN) through the execution of laboratory exercises. The expectation is that students will…
Creating appropriate paranoia within information assurance and security courses
Abstract The requisite behavior of paranoia in dealing with information assurance and security topics building towards a professional or subject matter expert is highly valued. Specifically the behaviors of inquiry and awareness leading to informed suspicion and paranoia in evaluating…
Considerations of defense in depth
Abstract Can we accept that the security of information is not the same as the security of systems? If you were to draw a Venn diagram of the two they would intersect but neither would encompass the other. Or, would…
Distributed Computer Forensics: Challenges and Possible Solutions
Abstract When the Internet began a small group of users were involved in the project, and the users knew each other quite well. When you consider the current state of the Internet and the variety of transactions currently taking place…
GAG ME: Danger room on Darpa Begs Hackers: Secure Our Networks, End ‘Season of Darkness’
Oh yeah I blew a gasket.
Cyber Security Over The Years
The following image is the one that you’d never expect. It is a graph from a fairly large data set created using an experiemental model. Using the OSI 7 Layer model the layer 0 for kinetic and layer 8 for people…
Kinect: A vision of user interfaces
Beguiling sound and visuals aside this is a revolutionary method of interacting with computers. The primary concepts of computing as a “whole of body” experience are just being tapped. The intrinsic value of using the entirety of gesture support in…
The iPad that could have been
If you look at the form and function of technology much of it is built upon the concepts and idea of things that have come before. While watching a young lady read her Kindle next to a person who was…
The unexpected bias of the DIME model and why “I” matters
A few years ago I was doing some writing and I found a discussion of a model called DIME. At the time the model was explained as the mechanisms of national power and was an acronym for diplomacy, information, military,…
Ubiquity and pervasiveness
For realistic ubiquity and pervasiveness of the Internet and the associated technologies and use cases the world must be wired more like a utility than like an accessory. We don’t need actual wires everywhere, but the effects of those connections…
Moving user screens from “local” display to “foreign” display
I was thinking about how to explain a process that might work in moving display data around and why you might want to do it. The following is my “poor” attempt at a graphic showing how things would move around.…