Oh yeah I blew a gasket.
Cyber Security Over The Years
The following image is the one that you’d never expect. It is a graph from a fairly large data set created using an experiemental model. Using the OSI 7 Layer model the layer 0 for kinetic and layer 8 for people…
Kinect: A vision of user interfaces
Beguiling sound and visuals aside this is a revolutionary method of interacting with computers. The primary concepts of computing as a “whole of body” experience are just being tapped. The intrinsic value of using the entirety of gesture support in…
The iPad that could have been
If you look at the form and function of technology much of it is built upon the concepts and idea of things that have come before. While watching a young lady read her Kindle next to a person who was…
The unexpected bias of the DIME model and why “I” matters
A few years ago I was doing some writing and I found a discussion of a model called DIME. At the time the model was explained as the mechanisms of national power and was an acronym for diplomacy, information, military,…
Ubiquity and pervasiveness
For realistic ubiquity and pervasiveness of the Internet and the associated technologies and use cases the world must be wired more like a utility than like an accessory. We don’t need actual wires everywhere, but the effects of those connections…
Moving user screens from “local” display to “foreign” display
I was thinking about how to explain a process that might work in moving display data around and why you might want to do it. The following is my “poor” attempt at a graphic showing how things would move around.…
Microsoft vision of productivity
I’ve included a link to a YouTube video on the vision Microsoft has of the future. Before you go watch it I want you to look at a few specific elements within the video and keep an eye out for…
Of this and that the cyberwar lexical conflict
The question almost certainly has to be asked at some point in time. Can a cyberwar topple a nation state? If you say yes you’re a fan boy, and if you say no you’re a skeptic. Regardless of the rickety…
Apple and federated identification issues iCloud/MobileMe/iTunes oh and Chad the Apple Asshat
Apple has a bit of an issue. The implementation of the iTunes portion of the Apple ecosystem occurred prior to the iPhone app store, or the arrival of the .Mac service which later became .Me then iCloud service environment. Whew..…
Diagram: Sony Data Breach (Hypothetical)
More from Sam’s Skunk Worx. The following diagram is a method of discussing the cause and effect relationship of how elements build to a information security breach. I used the Sony Data Breach (sorry Sony) utilizing only open source information…
The domain of land
A pretty simple project I’m working on is concept mapping domains. This is a reductionist effort (so therefore lossy) but it is kind of fun. Some of the basic rules are as follows. It has to be defined by being…
Pseudonymity to technofascism
The current pseudo intellectualism surrounding all things-designated cyber is appalling in the entirety of lack of understanding all things-designated cyber. Intellectualism and discussion of the taxonomical and semantical constructs does not solve the operational needs and currently does not drive…
Veggie Fried Rice
I had the most delicious vegetarian fried rice at a little place call Sunflower Vegetarian in Vienna, VA (http://www.crystalsunflower.com/Vienna/index_normal.htm) It gave me such a taste for vegetarian fried rice that I started searching recipes. Trust me, there are lots. I…
This week in cyber conflict: September 12th – September 16th
The early part of the week was a little slower than normal with not a lot of traffic being generated. News reports slowed substantially until more information started to be released on the DigiNotar hack details became more obvious. As…