Here is one of the challenges I have been facing our vegetarian diet. My husband love ravioli....
Jeffrey Carr predicts 2012 isn’t going to be a pretty way forward for information security professionals, industry...
Consider the risk management of information and the principles of risk themselves. Do we have a culture...
EDIT 2/27/2012 — A lot of people are showing up looking at this lately. I have an...
Contention: There is a contention that cyber is the electromagnetic spectrum and that point is countered by...
The Internet has done strange things to us. We think we are more important than we are...
Abstract This paper explores two areas of the gender and technology in education issues. The first issue...
Unlike a lot of technologists I don’t have a bevy of personal computers I use. I only...
I see a problem with the continuing move toward corporate science. As corporations upgrade their research arms...
Another graphic from Sam’s little black book of ideas. This graphic is based on a lot of...
Abstract This paper discusses the issues of technology, music, and the intersection with social movements such as...
David Ronfeldt and John Arquilla in the early 2000s discussed as part of Network-centric Warfare the concept...
Abstract The objective of this paper is to provide information on how to create a course that...
Abstract The requisite behavior of paranoia in dealing with information assurance and security topics building towards a...