Berto Jongman: Cell Hack of Air-Gapped Computers

IO Impotency
Berto Jongman
Berto Jongman

Researchers Hack Air-Gapped Computer With Simple Cell Phone

Phi Beta Iota: It's a pity US and Israel did not join in 1994 to commit to secure open source communications and computing — if absolutely trustworthy they would dominate the world marketplace by now. This vulnerability joins the long-known Chinese ability to ride electrical power circuits into US national security and commerical computers not connected to the Internet.

Stephen E. Arnold: IBM Mis-Representation of Federated Search Camelot — The Hard Questions Get Asked…

IO Impotency
Stephen E. Arnold
Stephen E. Arnold

IBM and Its Federated Search Camelot

IBM’s assertion is that there will be no more “data silos in enterprise search.” You can learn about IBM’s “reality” in a webcast.

Seven blistering professional questions below the fold.

Continue reading “Stephen E. Arnold: IBM Mis-Representation of Federated Search Camelot — The Hard Questions Get Asked…”

Stephen E. Arnold: Why Apps Suck

IO Impotency
Stephen E. Arnold
Stephen E. Arnold

Web Sites Going The Way Of The Dodo

EXTRACT

Browsers are universal and can access any content with a Web address.  Most Web sites also do not have an app counterpart, so the only way to access content is to use the old-fashioned browser.  Another issue is that apps cannot be crawled by search engines, so they are left out of search results. The biggest pitfall for apps is that they have to be downloaded in order to be accessed, which takes up screen space and disk space.

Steven Aftergood : JASON on Open Sources — 25 Years Late

#OSE Open Source Everything, Corruption, Government, IO Impotency
Steven Aftergood
Steven Aftergood

CROWD-SOURCING THE TREATY VERIFICATION PROBLEM

“Never before has so much information and analysis been so widely and openly available. The opportunities for addressing future [treaty] monitoring challenges include the ability to track activity, materials and components in far more detail than previously, both for purposes of treaty verification and to counter WMD proliferation,” according to a recent study from the JASON defense science advisory panel. See Open and Crowd-Sourced Data for Treaty Verification, October 2014.

Continue reading “Steven Aftergood : JASON on Open Sources — 25 Years Late”

Berto Jongman: IDA on Global Coverage — Without Reference to Prior Art or the Real World

Commerce, Corruption, Earth Intelligence, Government, IO Impotency, IO Tools, Non-Governmental
Berto Jongman
Berto Jongman

Without reference to Boyd Sutton or anyone else of note.

Rethinking the Concept of Global Coverage in the U.S. Intelligence Community

Institute for Defense Analysis, May 2015

Continue reading “Berto Jongman: IDA on Global Coverage — Without Reference to Prior Art or the Real World”

noble gold