This quick quip is a simple mark in the sand for a new principle of software development and information technology implementation. Herosourcing unlike outsourcing often is an unintended consequence, but it can be a planned obsolesence practice.
Author: Samuel Liles
The Handbook of 5GW (Kindle Edition)
I have a chapter in a new book out. The Kindle edition was just released and the print edition will soon be released. With a bevy of top authors and edited by Dan Abbott this book is one of the…
Information theory: Is the light on or off
The following is a little thought experiment. It is not meant to answer any questions but to examine capabilities of cyber warfare from a metaphorical position (perhaps open). Using the principles of Schrodinger’s Cat (is the cat alive or dead)…
Information security: The leaky bucket theory of information flows
There is a lot of talk in the federal government about how hard/expensive it is to have good information security. That narrative is also part of the cyber warfare discussion currently seeking rampant funding. When the political machine finds a…
Cyber war myths: Other things nobody cares about
Cyber warfare is just like…. Pick your poison or bias. Heck pick strategic air warfare, pick some nuclear disarmament, get yourself some armor strategies. Talk about the Maginot line like it is actually a meaningful strategy in a networked world.…
Is the Apple eco-system an ethical technology solution
The information technology sphere of solutions is filled with advocates, fans, and outright addicts. Whether the solutions choices are segregated by closed source and open source the debate continues. The lion-share of end-point (laptop, desktop) solution market belongs to Microsoft…
An APA5 Outline (How To)
When writing papers it is sometimes a good idea to know the structure of what you are writing before you start. The American Psychological Association 5th edition is the current requirement for classes on citation and style. There are a…
The curious case of the Chinese Goooogling
When does the act of a nation state take on the specter of war? Consider if you will that at some point a transgression most assuredly has the emotional and physical manifestations of war. The Japanese attack against United States…
Review: Computer Capers by Thomas Whiteside
I’ve wanted for some time to increase the number of book reviews I publish and to get them up a little faster. I’ve been re-reading a bunch of my computer security books and the review for today is Computer Capers:…
Prognostications for 2010: The phoenix of predictions
Back in 2007 I made some pretty significant predictions. I would like to say that making predictions is not nearly as hard as you would think. The way technology is adapted is pretty straight forward. So to recap this is…
North West Indiana: Ice Storm December 2009
Here are some pictures from last night. The snow that fell was soon covered by a half inch of ice. That left areas like the park looking like an ice-rink. To say the footing and driving is treacherous would be…
Cloud Computing: Presentation by students
The students of ITS 470 Large Scale High Performance Systems created a cloud operating system. This presentation will give you a good over view of the topic. I won’t comment on the student with the horrible British accent. I won’t…
Cloud computing: An open source networked operating system
Cloud computing is a developing section of high performance computing. High performance computing includes many facets such as availability, processing, and reliability. In this project the facet of reliability is examined. Increasing the number of machines is one way to…
Cyber warfare: The academic community
The world of academia like any of the communities we have discussed is far from a cohesive mixture of opinions. The balance of the academic world is split between the large research universities, the regional public or private universities, and…
Cyber warfare: The corporate community
What does the corporate world bring to cyber warfare? I asked this question in a conference setting surrounded by military types and to stunned amazement listened to twenty minutes of how the corporate world has no place in cyber warfare.…