One of the things I hear politicians say, especially near elections, is that the solution to the jobs crisis is for those who are unemployed or under employed to get retraining. This is a myth. It doesn’t help. Here is…
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
Distributed Computer Forensics: Challenges and Possible Solutions
Abstract When the Internet began a small group of users were involved in the project, and the users knew each other quite well. When you consider the current state of the Internet and the variety of transactions currently taking place…
GAG ME: Danger room on Darpa Begs Hackers: Secure Our Networks, End ‘Season of Darkness’
Oh yeah I blew a gasket.
Cyber Security Over The Years
The following image is the one that you’d never expect. It is a graph from a fairly large data set created using an experiemental model. Using the OSI 7 Layer model the layer 0 for kinetic and layer 8 for people…
Kinect: A vision of user interfaces
Beguiling sound and visuals aside this is a revolutionary method of interacting with computers. The primary concepts of computing as a “whole of body” experience are just being tapped. The intrinsic value of using the entirety of gesture support in…
The iPad that could have been
If you look at the form and function of technology much of it is built upon the concepts and idea of things that have come before. While watching a young lady read her Kindle next to a person who was…
The unexpected bias of the DIME model and why “I” matters
A few years ago I was doing some writing and I found a discussion of a model called DIME. At the time the model was explained as the mechanisms of national power and was an acronym for diplomacy, information, military,…
Ubiquity and pervasiveness
For realistic ubiquity and pervasiveness of the Internet and the associated technologies and use cases the world must be wired more like a utility than like an accessory. We don’t need actual wires everywhere, but the effects of those connections…
Moving user screens from “local” display to “foreign” display
I was thinking about how to explain a process that might work in moving display data around and why you might want to do it. The following is my “poor” attempt at a graphic showing how things would move around.…
Microsoft vision of productivity
I’ve included a link to a YouTube video on the vision Microsoft has of the future. Before you go watch it I want you to look at a few specific elements within the video and keep an eye out for…
Of this and that the cyberwar lexical conflict
The question almost certainly has to be asked at some point in time. Can a cyberwar topple a nation state? If you say yes you’re a fan boy, and if you say no you’re a skeptic. Regardless of the rickety…
Apple and federated identification issues iCloud/MobileMe/iTunes oh and Chad the Apple Asshat
Apple has a bit of an issue. The implementation of the iTunes portion of the Apple ecosystem occurred prior to the iPhone app store, or the arrival of the .Mac service which later became .Me then iCloud service environment. Whew..…
Diagram: Sony Data Breach (Hypothetical)
More from Sam’s Skunk Worx. The following diagram is a method of discussing the cause and effect relationship of how elements build to a information security breach. I used the Sony Data Breach (sorry Sony) utilizing only open source information…
The domain of land
A pretty simple project I’m working on is concept mapping domains. This is a reductionist effort (so therefore lossy) but it is kind of fun. Some of the basic rules are as follows. It has to be defined by being…
Pseudonymity to technofascism
The current pseudo intellectualism surrounding all things-designated cyber is appalling in the entirety of lack of understanding all things-designated cyber. Intellectualism and discussion of the taxonomical and semantical constructs does not solve the operational needs and currently does not drive…