A new book is out “Threats in the age of Obama” with chapters by many fine writers....
As I turn Carl Von Clausewitz over in my mind the writing of a long dead Prussian...
Another great day with the kids at JOAD. Bulls eye bombers JOAD is in an interesting position...
Call for Chapters Chapter Proposals Due: February 20, 2009 Information Assurance and security Ethics in...
After a long hiatus on writing about archery something for people to think about. I love archery....
Can “On War” as a book from the dustbin of history reach out and touch the technologically...
The 44th president of the United States while not a technologist is an avid user of technology....
When considering the variable methods of depicting a model it sometimes is not so obvious what will...
When considering the generation warfare model as a tool of categorizing the types or scopes of conflict...
What can a user do that will obscure the path to analysis of a computer system so...
The idea of nation state conflict and conflict of ideology becomes a descriptive problem when looking at...
ITS450 is a course about software assurance. It is not a programming course and it is not...
There was the .com bubble; there was the correction due to terrorism. There have been myriad fiascos...
There is a fairly substantial body of work that looks at the difference between hierarchical organized groups...
The Chicagoboyz are hosting the round table I’m looking forward to the adventure of bouncing some ideas off them. For...