In the fast-paced and ever-evolving world of high tech, companies often experience fluctuations in their workforce due to various factors. One such phenomenon is the occurrence of cyclical high-tech layoffs, which can serve as a potential indicator of the future…
Category: Scholarship of teaching and learning
Education and society and the scholarship of teaching and learning. This is inclusive of a series of articles that are being produced in an effort to drive discussion about meta-scholars and the meta-renaisance. Our goal will have achieved when both terms are being used often.
Student loans. Struggling to explain the new way
I see some pretty stupid people with meme’s based on their bias complaining about POTUS Biden desire to pay off student loans or at least pay them down. I’ve through family, loans, scholarships, and plain grit paid off my AA,…
Presentations, posts, categories
Presentations (PDF) Teaching Presentation Research Presentation Blog Posts Considerations of defense in depth Attribution of cyber adversaries Research Note: Defining attacker knowledge, skill, and ability Blog Categories Digital Forensics Incident Response Threat Intelligence Student Work
Digital forensic books
A not comprehensive reading list. Some of these are new, some are old, but they give a good overview of the discipline. If the book has exercises it is a good idea to do them. Operating System and Platform…
Strategy is a thing, an activity, and a level
I have been teaching my twin sons about strategy. We’ve looked at various authors, talked about it extensively during dinner, and tried to apply several of the concepts to real world events. I guess they corrected their 9th grade English…
Conference Submissions and Presentations made more effective with 10 quick tips
Strongly suggested viewing for students and professionals that are going to be doing presentations. Matthew McCullough walks you through a 10 step program of doing a presentation.
Cybersecurity and Incident Response Laboratory (CIRL) Proposal
The following is an example of a proposal I wrote to bring enhanced information assurance and security education to the College of Technology. Though the proposal never went forward I thought it might be interesting for others to read. There…
Career reflections and advice to my students
I have been reflecting on my career and how I got to where I am in my professional life as the last year winds down and the new year begins. Part of the reflection is due to the on going…
Ethics, job offers, and the university
Water cooler talk can be an interesting diversion if you do not apply too much critical thinking skills to the topic. Today, I am going to go ahead and work through a discussion that comes up every year at universities.…
University: If it is broke what does that mean?
The public university systems are under a significant stress from various directions. The complaints about tuition, educational strategies, structure of the university, and curriculum controls are directed from various constituencies. The university system has over a thousand years of history,…
Jailbreaking the degree: Voids warranty and may cause data loss
David Blake writing in TechCrunch discusses higher education and the failure to meet commoditized demands by breaking the degree structure into modules. Similar to many writers before his concern is about the trivial courses that mean nothing to the outlet…
The industrial devolution and disenfranchised knowledge worker
Higher education exists to terrorize and bankrupt students with tuition costs (double, triple, insert value here) the rate of inflation. It is a current meme in public policy and though higher education has its issues this is a crock and…
Identifying strategic traits and learning objectives
I’ve been working a project identifying a comprehensive cyber curriculum. The various standard infosec curriculums are primarily for non-conflict oriented entities, and NIST/NICE is really a human resources hiring tool. One aspect of this tasking is looking at the idea…
A laboratory-based course on wireless security
Abstract The objective of this paper is to provide information on how to create a course that informs students how to secure a wireless local area network (WLAN) through the execution of laboratory exercises. The expectation is that students will…
The distance education paradigm: A dalliance with success
What is the value of a university? The building and land have value. The resources and materials for research are often expensive and even priceless. The trade and product of a university is the talent and intellectual capital that is…