Outsourcing And The Future Of I.T.
Collect Capture everything that you need to track or remember or act on in what Allen calls a ‘bucket’: either …
Read MoreNanotech Musings
Nothing is worse for systems like Digg and Reddit than repetitive, mediocre content. These networks are designed to magnify the …
Read MoreHow To Advance In InfoSec: Don’t Study, Do.
A shepherd was herding his flock in a remote pasture when suddenly a brand-new BMW advanced out of a dust …
Read MoreWithout A Castle
From this NY Times article: It’s interesting that those middle class families that are complaining about unfair treatment don’t realize …
Read MoreRoleplaying: D&D and Creativity
As technology continues to be come more compact and more powerful, I think one of the biggest consumer/business breakthroughs is …
Read MoreLinux DHCP
In my last post I spoke about how tracking incentives can lead to the answers for why the world is …
Read MoreGiving Windows Mobile 5.0 A Try
Have you ever been in Linux and wanted to watch how much bandwidth was going in and out of your …
Read More3 Steps to Highly Efficient News Reading
A recent poster in an information security forum asked what it takes to succeed in the information security field. Having …
Read MoreStudent vs. Competitor
People who use the word “hacker” when they’re referring to computer criminals are not wrong. One can argue that they …
Read MoreRewarding Good Software Companies
One of the most important concepts in computer security is “knowing thy system”. This essentially means that in order to …
Read More












Recent Comments