In the Summer of 2008, we tried something a little different for the garden. We knew we did not want a huge garden, but I wanted a little something. We experimented with three hanging planters for tomatoes. The planters came…
The Web 2.0 Bomb
It slices, dices, mixes, mashes, julienne fries, stirs and when you’re done lights venture capital cash on fire while creating social earthquakes. It is Web 2.0 the term used to describe social media. The new best thing in tech, half…
Spring 2009 Commencement
My address if I was asked to give one to my graduates. Today each graduate steps from the halls of academia into the world around them. Unlike other school commencements many of you have already been living in the world,…
How to wage cyber warfare: The technology and structure, Part 4
There are some basic components that are needed by any military so that they can succeed. The military force is required to have the appropriate technology to create an advantage and the training to overcome any adversaries corresponding advantage. The…
How to wage cyber warfare: Puzzle pieces, Part 3
Cyber warfare claimed by many is done by none. Most of the stuff identified as cyber warfare and security we see is actually defensive in nature. If we actually secured our computing systems a lot of the risks of damage…
Tourney of home offices: A minor contribution
I’ve been tagged in the tourney of home offices by my esteemed colleague Shane. This little round robin was set up by the infamous Zenpundit. I thought about cleaning it all up before I snapped some pictures but that wouldn’t…
How to wage cyber warfare: Barriers to entry, Part 2
There are large numbers of people who are all for the new thing called cyber warfare. Whether you are interested in waging cyber warfare for a nation state or are considering a corporate company on company engagement the realities are…
How to wage cyber warfare: A primer, Part 1
Cyber warfare is fought on a cyber space terrain. The terrain is made up of the communication components of the global spanning information grid. Consider all of the interconnected equipment, components, people, processes, procedures, and other elements that allow for…
National Cyber Range Proposal
As part of the experiential learning process students work is posted for comment. Feedback in the comments section is enthusiastically requested. My apologies for requiring users to be logged in the amount of spam was extensive. This particular project was…
Cyber response plan and framework
As part of the experiential learning process students work is posted for comment. The students of the assured systems and design course have completed a document that is a comprehensive look at cyber response and counter measures. Feedback in the comments…
Threats in the Age of Obama: 100 days into a presidency
I wrote a chapter for a book called “Threats in the age of Obama” that was edited by Michael Tanji and there were many superior authors included Dan tdaxp, Christopher Albon, Matt Armstrong, Matthew Burton, Molly Cernicek, Christopher Corpora, Shane…
Tech meme: Twitter Users
Twitter users with a bazillion followers are hubs. Twitter users who are retweeted a lot are routers. Twitter users with low follower to following ratios are firewalls. Twitter users who have wildly divergent follower communities are bridges. Twitter users who…
2009 Easter Dinner
Happy Zombie Day!!!!!
Yet another cyber treatise
With the impending release of the 60 day cyber review and myriad conferences to cover cyber security I wish to put a stick in the ground and make a pronouncement about cyber security, information assurance and security and anybody who…
Cybersecurity Act of 2009: A-tisket a-tasket all our eggs in one basket
The blogosphere is alight with discussion over section 18 “Cybersecurity responsibilities and authority” of the draft Cybersecurity Act 2009. The key phrase that has multiple organizations in a dither is located on page 44 and states “…The President… (2) may…