I am a huge fan of posole. A Mexican stew made with hominy, chilis and pork. It is spicy and hearty and wonderful. The best posole I have ever eaten is found in Santa Fe, New Mexico at a little…
Microsoft Surface: Usability and mobility and presentation of tech
I watched the Microsoft Surface introduction with interest. I thought that the idea of the tablet running a full operating system and functionally tied to mobility through the use case rather than relegated to mobility by design would be interesting.…
Modifying Family Favorites
One of the obstacles facing a family changing their diet to vegetarian is the loss of favorite meals. As we changed our diet, I considered at the favorite recipes and looked for ways to modify them to be vegetarian. I…
Different realities and the impacts on policy
Adam Elkus has a great piece on how cyber punk has killed cyber security. I strongly suggest that you read it if you have time. This is a great way to get into some of the interesting pieces of how…
Chicken and Dumplings – Vegetarian Style
It has been a few months since I posted recipes. I have been busy writing my PhD exams and I have neglected the blog and even cooking. Life often interferes with our ability to do some of the everyday things…
When critical infrastructure is no longer a target then commodity infrastructure suffices
With the current list of critical infrastructures inclusive of electricity generation, telecommunication, water, transportation, and financial services you would think society has identified key risk points. I think that would be false. Though key resources are identified for each of…
Information assurance and security and cyber warfare is muskets in a sharks with lasers world
Freedberg writing “Military Debates Who Should Pull The Trigger For A Cyber Attack” Quotes General Cartwright (Ret) as saying “We’ve been thinking 90% defense, 10% offense. That’s bass-ackwards for us.” Later in the article Chairman of the Joint Chiefs of…
University: If it is broke what does that mean?
The public university systems are under a significant stress from various directions. The complaints about tuition, educational strategies, structure of the university, and curriculum controls are directed from various constituencies. The university system has over a thousand years of history,…
Hardware, software, wetware, and tasking security
In the early 2000s I was working at a company called NCR for a customer called Sun Microsystems. We were implementing a product called Sun Remote Services as customer premise monitoring equipment of the Sun hardware. A job like that…
Jailbreaking the degree: Voids warranty and may cause data loss
David Blake writing in TechCrunch discusses higher education and the failure to meet commoditized demands by breaking the degree structure into modules. Similar to many writers before his concern is about the trivial courses that mean nothing to the outlet…
Woes me information (cyber) security is hard
Lots of discussion in the mainstream press about every fortune 500 being hacked, the <insert name> government has hacked us into smithereens. The world is ending. We need to do <insert favorite vendor solution> to save the world. Bull pucky.…
Cyber security (cyber war) hype cycle writ large
In the late 1800s a new form of warfare was starting to rise into the collective understanding of the world militaries. Command and control warfare through automated means began with the telegraph. This allowed for a network centric conflict to…
The lost art of making do
Let’s face it, we all like things that are new and shiny. When given a choice most of us pick new over old. The ongoing economic recession has made it more challenging for all of us to get the new…
CERIAS Posters: Two posters on some of my works in progress
This week I’m attending the CERIAS symposium at Purdue University in West Lafayette Indiana. I’ve had some really great conversations with several leaders in the industry, and found some great contacts within government that may or may not lead anywhere.…
Strategic blindness: When aliens attack
United States doctrine and force structure is built around the domains of air, sea, land, space and now cyber. Domains as defined create cylinders of capability that can be merged and fought within. The domain construct is as much a…