A few years ago I was doing some writing and I found a discussion of a model...
Sam
For realistic ubiquity and pervasiveness of the Internet and the associated technologies and use cases the world...
I was thinking about how to explain a process that might work in moving display data around...
I’ve included a link to a YouTube video on the vision Microsoft has of the future. Before...
The question almost certainly has to be asked at some point in time. Can a cyberwar topple...
Apple has a bit of an issue. The implementation of the iTunes portion of the Apple ecosystem...
More from Sam’s Skunk Worx. The following diagram is a method of discussing the cause and effect...
A pretty simple project I’m working on is concept mapping domains. This is a reductionist effort (so...
The current pseudo intellectualism surrounding all things-designated cyber is appalling in the entirety of lack of understanding...
The early part of the week was a little slower than normal with not a lot of...
I’m in Germany to speak at the Marshall Center tomorrow, and I’m going to be talking about...
Consider the information technology and security environment. Since 1999 and late 2000 the economic engine of the...
The following graphic at the bottom of this page is a visualization of the impact of cyber...
Another work in progress. Starting to track cyber strategies and their hierarchy. Lots of strategies and doctrine...
The following graphic is a method of expressing a few very basic concepts in information assurance and...