In a recent Infoworld article by Tom Sullivan it is pointed out that companies are investigating or implementing policies and procedures to allow users to manage their own information technology assets. Link to infoworld story This is of course a…
ITS 472: Phase 2 Navy Marine Corps Intranet Project
Here are the links to the presentations: Group 1 Presentation Questions DOCUMENT 6.9 MB Group 2 Presentation DOCUMENT 15.5 MB Click here to go to the final document & presentation link
Twitter at twitter.com/selil
I’ve gone ahead and joined twitter and will be doing updates via Twitter. A few students have asked me why it took so long. Gosh I don’t know know why. So, if you are interested in seeing what I’m up…
What does the military want from the education system?
There are a lot of misconceptions about higher education, secondary education, and primary education. The K-12 system is where I’m going to restrict my comments for this discussion, and especially the public education system. That being said only a little…
Hacking a computer with a microphone
While talking with one of my students tonight I was reminded of this article. How about using a microphone to hack the key of a system? Using acoustic signature to get the encryption key and other information as a passive…
Example Semester Paper
Here is an example of an APA 5 semester paper that meets most of the requirements. With some comments. Example Semester Paper
Example Laboratory Paper
Here is an example of an APA 5 laboratory that meets most of the requirements. With some comments. It doesn’t follow APA 5 exactly but the changes (bolding, accenting, etc.) help rather than hinder the readability of the report. Laboratory…
Surviving and Thriving in Distance Learning Courses
This video discusses in detail some expectations and suggestions for distance learning students. The video is a very informal look at the different elements of a distance learning course and in a very simple and calm manner the syllabus of…
Samuel Liles awarded DHS Fellowship
I got asked about this a lot over the last week and thought I would announce it here. I am very honored to be the recipient of this award and look forward to the relationships and doors that it opens…
The Air Force is moving ahead with work on the cyber command
The Air Force is moving ahead with work on the cyber command (LINK). Air Force moving ahead with Cyber Command The Air Force is moving ahead on establishing its new Cyber Command, searching for permanent facilities and planning meetings to…
Future technology
The Army has embarked on a 200 billion dollar project to increase the technology that it uses and has some interesting implications. When we talk about security we often talk about defense in depth. In computers it is a series…
What you should put in a grad school personal statement
Depending on the school and university they are going to want to know a few things about you. Where have you been, what are you doing, and how will that effect where you are going. Most of the personal statements…
A mild rebuttal to John Robb’s open source warfare
“The US military is on the slow path to the realization that nation-building — from reconstruction to other forms of traditional COIN dogma that serve to return legitimacy to the government — doesn’t work. Politics and populations in our new…
Baby boomers….
They were born from the greatest generation. Their parents lived through depression, fought in an enormous war, and built the American economy and industry. The parents of the baby boomers created the American dream and then spoiled it into delirium…
Cyber-warfare threat or hype?
Center of gravity constructs look at the strategic, operational, and tactical elements of an adversary to identify weak points in the over all capability of resistance. Cyber-warfare attacks the computing and communication infrastructure of the adversary through a variety of…