More from Sam’s Skunk Worx. The following diagram is a method of discussing the cause and effect...
A pretty simple project I’m working on is concept mapping domains. This is a reductionist effort (so...
The current pseudo intellectualism surrounding all things-designated cyber is appalling in the entirety of lack of understanding...
I had the most delicious vegetarian fried rice at a little place call Sunflower Vegetarian in Vienna,...
The early part of the week was a little slower than normal with not a lot of...
Let’s face it, the potato is a practically perfect food. It is abundant, inexpensive and a fantastic...
I’m in Germany to speak at the Marshall Center tomorrow, and I’m going to be talking about...
Stop making excuses! I wrote a post essentially refuting the study done that said that healthy eating...
There was a study done recently that came to the conclusion that healthy eating is a privilege...
Consider the information technology and security environment. Since 1999 and late 2000 the economic engine of the...
I have been trying out a number of vegetarian recipes from a number of sources. My favorite...
The following graphic at the bottom of this page is a visualization of the impact of cyber...
Another work in progress. Starting to track cyber strategies and their hierarchy. Lots of strategies and doctrine...
First, this is NOT about cyber warfare and contrary to popular belief the Selil website has never...
The following graphic is a method of expressing a few very basic concepts in information assurance and...