More from Sam’s Skunk Worx. The following diagram is a method of discussing the cause and effect...
Sam
A pretty simple project I’m working on is concept mapping domains. This is a reductionist effort (so...
The current pseudo intellectualism surrounding all things-designated cyber is appalling in the entirety of lack of understanding...
The early part of the week was a little slower than normal with not a lot of...
Relatively little going on this week other than stories being cleaned up from previous weeks. No hacker...
I’m in Germany to speak at the Marshall Center tomorrow, and I’m going to be talking about...
Leading into the week (over the weekend) there was a bit of a furor over the disclosure...
The week opened with more information on the Korean attacks. It seems the number of people may...
With another week of highly dramatic over blown talk in the media about how hackers declared war...
Consider the information technology and security environment. Since 1999 and late 2000 the economic engine of the...
The following graphic at the bottom of this page is a visualization of the impact of cyber...
Much in the same way as I’ve discussed the principle of science fiction informing us about information...
Another work in progress. Starting to track cyber strategies and their hierarchy. Lots of strategies and doctrine...
The week opened up with more discussion about computer incursions in South Korea. It was also interesting...
The following graphic is a method of expressing a few very basic concepts in information assurance and...