Let’s face it, the potato is a practically perfect food. It is abundant, inexpensive and a fantastic base for all kinds of other foods. I found this recipe for Pizza Potatoes on the Whole Foods site. I have made it…
This week in cyber conflict: September 5th – September 9th
Relatively little going on this week other than stories being cleaned up from previous weeks. No hacker conferences going on, and no major conflagrations to report. There are some squeaky articles about planned hacktivism or “major” attacks through cyber means…
Garmisch Germany
I’m in Germany to speak at the Marshall Center tomorrow, and I’m going to be talking about technology and the threats caused by new technologies. I’m talking to the senior executive seminar attendees. The following are some pictures I took…
This week in cyber conflict: August 29th – September 2nd
Leading into the week (over the weekend) there was a bit of a furor over the disclosure of a hacking tool that had an American university address listed. When supposedly the Chinese government yanked the video the hysteria went up.…
Stop making excuses!
Stop making excuses! I wrote a post essentially refuting the study done that said that healthy eating is a privilege of the rich. The main stream media pick up on this study and ran with it. Study: Healthy eating is…
Po’ Food – Or Eating Healthy Doesn’t Have to Be Expensive
There was a study done recently that came to the conclusion that healthy eating is a privilege for the rich (http://content.healthaffairs.org/content/early/2011/08/03/hlthaff.2010.1273.abstract). I disagree and I am going to show how you can have healthy vegetarian meals for cheap at the…
This week in cyber conflict: August 22nd – August 26th
The week opened with more information on the Korean attacks. It seems the number of people may have been larger than some earlier reports. Of course, this is actually more about a breach than it is about an actual attack.…
This week in cyber conflict: August 15th – August 19th
With another week of highly dramatic over blown talk in the media about how hackers declared war on BART you’d think the world was coming to an end. Since BART wasn’t brought to it’s knees nor was there a dramatic…
There is opinion, fact, and what you’ll likely do
Consider the information technology and security environment. Since 1999 and late 2000 the economic engine of the information age has eroded until in 2008 the stock market plunged. The market since then really hasn’t recovered. Sure the points go up…
The vegetarian recipes experiment
I have been trying out a number of vegetarian recipes from a number of sources. My favorite sources so far are the Whole Foods Market recipes (http://www.wholefoodsmarket.com/recipes/) and Vegan YumYum (http://veganyumyum.com/). I am trying to avoid a heavy reliance on…
Draft: Evaluation of incidents in cyber conflict [Graphic]
The following graphic at the bottom of this page is a visualization of the impact of cyber incidents that is a work in progress. There seems to be fairly substantial interest in the contents of my little black book of…
This week in cyber conflict: August 8th – August 12th
Much in the same way as I’ve discussed the principle of science fiction informing us about information assurance and security it appears a researcher at DefCon talked along a similar thread. I do think rather than Die Hard a better…
US Department of Defense Cyber Strategies [Graphic]
Another work in progress. Starting to track cyber strategies and their hierarchy. Lots of strategies and doctrine mention cyber so they’ll end up on here too. There are law enforcement strategies that will need to be added like the “Transnational…
My Journey to vegetarian
First, this is NOT about cyber warfare and contrary to popular belief the Selil website has never been about just what we do at work. This website is our endeavor to share with others our life. I am currently transitioning…
This week in cyber conflict: August 1st – August 5th
The week opened up with more discussion about computer incursions in South Korea. It was also interesting to see another despot led country to be tied to cyber attacks. The thread of aligning countries like Myanmar to cyber attacks is…