Reference: Citation Analytics 201

About the Idea, Advanced Cyber/IO, Analysis, Analysis, Articles & Chapters, Augmented Reality, Balance, Budgets & Funding, Collaboration Zones, Collective Intelligence, Communities of Practice, History, ICT-IT, info-graphics/data-visualization, InfoOps (IO), Maps, Methods & Process, Multinational Plus, Policies, Policies-Harmonization, Policy, Political, Politics of Science & Science of Politics, Power Behind-the-Scenes/Special Interests, Processing, Real Time, Research resources, Secrecy & Politics of Secrecy, Strategy-Holistic Coherence, Threats, Tools, Tribes

Phi Beta Iota: Most serious analysts now understand Citation Analytics 101.  It's time to move to Citation Analytics 202, and there is no better way to introduce the art of the possible than by pointing to Kevin W. Boyack, Katy Borner, and Richard Klavans (2007), “Mapping the Structure and Evolution of Chemistry Research (11th International Conference of Scientometrics and Infometrics, pp. 112-123.

Full Article with Color Graphics
Graphic as Printable Single Page PPT

There are several take-aways from this article, which is more or less the “coming out” of the Klavens-inspired infometrics field now that he has won his law-suit and has unchallenged access to all Institute of Scientific Information (ISI) access [this was one of the sources we used to win the Burundi Exercise before the Aspin-Brown Commission in 1995].

Continue reading “Reference: Citation Analytics 201”

Handbook: Synergy Strike Force, Dr. Dr. Dave Warner, Round II

About the Idea, Advanced Cyber/IO, Analysis, Analysis, Geospatial, Geospatial, Hacking, Historic Contributions, ICT-IT, info-graphics/data-visualization, InfoOps (IO), Innovation, Maps, Methods & Process, Peace Intelligence, Research resources, Technologies, Tools
 

Dr. Dr. Dave Warner

Phi Beta Iota:  STRONG ANGEL was the other major innovation besides CATALYST, Analysis 2000, and MCIA JNID.  Below is Round II from STRONG ANGEL, with Round II from M4IS2 soon to be made public, built around SILOBREAKER (actually, Son of SILOBREAKER).  We considered forcing visits to the Synergy Strike Force home page, but decided that the richness of the content there needed to be displayed here. 

I. Introduction

Welcome to the MESS-KIT wiki: Minimum Essential Software Services for Knowledge and Information Transfer

II. Structure

The MESS-KIT system is composed of three basic components — the software package, the virtual environment and the hardware:

a. APPLICATION SOFTWARE PACKAGE: One or more Virtual Machine Instances that package together an operating system with a web server environment and all free-and-open-source/commercial-off-the-shelf software modules. Example: A VMware instance of an Ubuntu Linux installation with a full LAMP web server hosting environment and associated web software.

b. VIRTUAL MACHINE CLIENT SOFTWARE: One Virtual Machine Software Client to package, distribute, and host one or more Application Software Packages and abstract the application software from the host operating system. Examples: VMWare Fusion and Sun VirtualBox.

c. HARDWARE: Hardware on which the Virtual Machine Client Software and Application Software Package will run. The Hardware will include a host operating system. Examples: MacMini running OSX, ASUS eeePC Netbook running eeeBuntu Linux.

Continue reading “Handbook: Synergy Strike Force, Dr. Dr. Dave Warner, Round II”

Reference: Are Hackers Pioneers with the Right Stuff or Criminal Pathological Scum? Mitch Kabay Reprises

03 Economy, 04 Education, 10 Transnational Crime, Civil Society, Collective Intelligence, Ethics, Hacking, ICT-IT, InfoOps (IO), Law Enforcement, Media Reports, Methods & Process, Mobile, Real Time, Technologies

Full Story Online
Full Story Online

Why Criminal Hackers Must Not Be Rewarded
Part 1: The Fruit of the Poisoned Tree

By M. E. Kabay, 11/30/2009

In 1995, I participated in a debate with distinguished security expert Robert D. Steele, a vigorous proponent of open-source intelligence. We discussed the advisability of hiring criminal hackers. Perhaps readers will find the polemic I published back then of interest today. I’m sure it will provoke vitriolic comments from the criminal hacker community.

Continue reading “Reference: Are Hackers Pioneers with the Right Stuff or Criminal Pathological Scum? Mitch Kabay Reprises”