When trying to assess enterprise risk and the threats vectors that create risk there are standard models...
Rickover and Mitchell were visionary ambassadors and petty tyrants of their respective domains of war fighting. Each...
Here is one of the challenges I have been facing our vegetarian diet. My husband love ravioli....
Jeffrey Carr predicts 2012 isn’t going to be a pretty way forward for information security professionals, industry...
Consider the risk management of information and the principles of risk themselves. Do we have a culture...
EDIT 2/27/2012 — A lot of people are showing up looking at this lately. I have an...
Contention: There is a contention that cyber is the electromagnetic spectrum and that point is countered by...
The Internet has done strange things to us. We think we are more important than we are...
Abstract This paper explores two areas of the gender and technology in education issues. The first issue...
Unlike a lot of technologists I don’t have a bevy of personal computers I use. I only...
I see a problem with the continuing move toward corporate science. As corporations upgrade their research arms...
Another graphic from Sam’s little black book of ideas. This graphic is based on a lot of...
Abstract This paper discusses the issues of technology, music, and the intersection with social movements such as...
David Ronfeldt and John Arquilla in the early 2000s discussed as part of Network-centric Warfare the concept...