I’ve been thinking about the concepts of terrorist, terrorism, insurgent, and what these terms mean to our...
The following is specific to my distance learning students who are in networking, operating systems, or security...
Much of our thought about how the frontier began and our American version of our own history...
I’ve been looking at generational warfare from a slightly different perspective. As we have agricultural revolutions, industrial...
The following post is in response to the Wired news story that members of the Army are...
Office 2007 uses an XML based file format which have included bin files and formatting files in...
In the restriction of personal freedom for perceived security rarely do you gain that security you crave....
Abstract This paper discusses as an overview of the current methods and practices available to forensics investigator...
Hi I henceforth will be known as an Apple fan boy, Mac addict, snob, elitist media junky...
I was asked why after buying Dell computers for so many years and recommending them for so...
Rosco, R., Rogers, M. Liles, S., “Breaking Down Stereotypes: A Call for an ontological Model“. In proceedings...
With the increasing level of credentialism in the United States the number of people entering college will...
1986 CJ 7 Jeep Laredo Lots of pictures The Jeep CJ getting built here More Jeep pictures...
The use of a particular operating system should not be determined by the current hype surrounding it....
If Web 1.0 was defined by the dot bomb economy and the wholesale slaughter of Herman Miller...