Journal: Building Information Modeling as the Core of Sustainable Design Impacts on 40% of Global Energy Consumption

Analysis, Augmented Reality, Budgets & Funding, Commercial Intelligence, Communities of Practice, Computer/online security, Geospatial, InfoOps (IO), Intelligence (government), IO Mapping, IO Multinational, IO Sense-Making, Methods & Process, Policies, Reform, Strategy, Threats
Published October 27, 2010

OAKLAND, CA — Building information modeling can be a valuable tool for architects, engineers and contractors that allows them to explore different design options, see what projects will look like and understand how a structure will perform long before it's built.

BIM, as it's known in the industry, also can help building owners and operators throughout a structure's lifecycle by providing visual context to performance-related data, retrofit plans and other projects intended increase energy efficiency.

In a webcast on Tuesday moderated by GreenBiz.com Executive Editor Joel Makower, representatives for design software giant Autodesk, DPR Construction and the consulting engineering firm Glumac talked about “How Building Information Modeling Solutions Transform Sustainable Design.”

– – – – – – –

Increased costs of energy, ongoing challenges posed by the economy and concerns about sustainability, market demands, occupany and eventual regulation of carbon output combine to make building owners, operators and managers increasingly aware of how their properties perform — and compare with others.

Those issues and the availability of state and federal incentives are powerful drivers to improve portfolios. “Not surprisingly, large multinational companies are getting their buildings in order,” Deodhar said.

Examples include Walmart, which will retrofit 500 buildings this year, Marriott, whose hotel chain includes 275 hotels that bear the Energy Star label, and Starbucks, which by the close of the year will begin to seek LEED certification for all new company-owned stores around the world.

Globally, buildings account for about 40 percent of energy consumption and more than 200 million buildings are candidates for efficiency improvements, Deodhar said. But optimizing a building's environmental performance requires incorporating interrelated factors, such as location, orientation, internal systems, how the building is used and other variables, into design.

Read full article (long and valuable)

Phi Beta Iota: This is the kind of project we had in mind for DIA/DO (Directorate of Open Sources & Methods).  Apart from DoD being the biggest gorilla on the planet where any improvement can be measured in billions of dollars, this is the tip of the “true cost” iceberg and a success here could be immediately extended to every aspect of acquisition across all mobility, weapons, and other systems, over to the rest of the federal government, down to state and local, and out to the world.   In the 21st Century design is intelligence, intelligence is design, and intelligent design, not weapons, is the influencer most likely to achieve the desired outcome.

Journal: Technology Can Save Feds $1T in 10 Years

03 Economy, 09 Justice, 10 Security, Computer/online security, Government
content by Greener World Media

By GreenerComputing Staff at Greener World Media

Tue Oct 26, 2010 1:00am EDT

Throughout this highly charged election season, government spending and the federal deficit have been a linchpin of political arguments. At the same time, a gridlocked Congress means that very little has been accomplished despite all the debate.

But a report published earlier this month highlights seven ways that, using existing technologies, the federal government could save $100 billion dollars a year for the next 10 years, not-insignificant portion of the current federal deficit.

The report, “One Trillion Reasons,” was published by the Technology CEO Council, a group chaired by IBM CEO Samuel Palmisano. It lays out how technologies from data center management to fraud-fighting tools can improve efficiency and productivity in the government.

– – – – – –

Initiative 1: Consolidate Information Technology Infrastructure
Initiative 2: Streamline Government Supply Chains
Initiative 3: Reduce Energy Use
Initiative 4: Move to Shared Services for Mission-Support Activities.
Initiative 5: Apply Advanced Business Analytics to Reduce Improper Payments.
Initiative 6: Reduce Field Operations Footprint and Move to Electronic Self-Service.
Initiative 7: Monetize the government's assets

Read Full Article

Download Report (10 Page PDF)

Tip of the Hat to Bob Gourley at LinkedIn.

Journal: Who Controls (and Secures) the Internet?

10 Security, Computer/online security, Cyberscams, malware, spam, IO Secrets, Military, Officers Call
Marcus Aurelius Recommends

Who controls the internet?

By Misha Glenny

Published: October 8 2010 23:40 | Last updated: October 8 2010 23:40

Squared-jawed, with four stars decorating each shoulder, General Keith Alexander looks like a character straight out of an old American war movie. But his old-fashioned appearance belies the fact that the general has a new job that is so 21st-century it could have been dreamed up by a computer games designer. Alexander is the first boss of USCybercom, the United States Cyber Command, in charge of the Pentagon’s sprawling cyber networks and tasked with battling unknown enemies in a virtual world.

CINC CYBER Full Story Online

Last year, US Defense Secretary Robert Gates declared cyberspace to be the “fifth domain” of military operations, alongside land, sea, air and­ space. It is the first man-made military domain, requiring an entirely new Pentagon command. That went fully operational a week ago, marking a new chapter in the history of both warfare and the world wide web.

In his confirmation hearing, General Alexander sounded the alarm, declaring that the Pentagon’s computer systems “are probed 250,000 times an hour, up to six million per day”, and that among those attempting to break in were “more than 140 foreign spy organisations trying to infiltrate US networks”. Congress was left with a dark prophecy ringing in its ears: “It’s only a small step from disrupting to destroying parts of the network.”

Phi Beta Iota: Of the $12 billion a year to be spent, roughly 90% if not more will be spent on “vapor-ware.”  To understand the gap between the 67 people who actually know what needs to be done, and the hundreds of thousands who will be employed in cyber-theater (pun intended), see below.  There are multiple sucking chest wounds in this enterprise, the two largest are a) the DoD Grid is a mess with no integrity in the fullest sense of the word, trying to “secure” that mess is next to impossible; and  b) the only way to make Pentagon information operations safe is to make ALL operations safe, but this is not how the US Government and especially not how the Pentagon thinks–hence, another decade will be wasted.  The upside is that OpenBTS and all sorts of other opens are emergent, and we may all end up going to Web 4.0 while the Pentagon stays at Web 2.0.

See Also:

2010: OPINION–America’s Cyber Scam

1994 Sounding the Alarm on Cyber-Security

Continue reading “Journal: Who Controls (and Secures) the Internet?”

VMyths: Truth About Computer Security Hysteria

Commerce, Commercial Intelligence, Computer/online security, Cyberscams, malware, spam, Government, Hacking, Media, Misinformation & Propaganda, Power Behind-the-Scenes/Special Interests

http://vmyths.com/about

Vmyths traces its roots to a “Computer Virus Myths treatise” first published in 1988. It evolved into the critically acclaimed “Computer Virus Myths home page” in 1995, then it moved to Vmyths.com in 2000. Its name has changed over the years, but Vmyths remains true to its original goal: the eradication of computer security hysteria.

Vmyths sells the truth about computer security hysteria. We take no prisoners; we pull no punches; and we refuse computer security ads in order to maintain our independence.

Our editors:

Rob Rosenberger edits Vmyths and writes as a columnist. He is one of the “original” virus experts from the 1980s, and the first to focus on virus hysteria. Red Herring magazine describes him as “one of the most visible and cursed critics in computer security” today, and PC World magazine says he “is merciless with self-appointed virus experts and the credulous publications that quote them.” Rosenberger was one of only a dozen industry experts invited to the White House’s first-ever antivirus summit meeting in December 2000.

George C. Smith, Ph.D.
George C. Smith, Ph.D. serves as Vmyths‘ editor-at-large. He also writes as a columnist. His seminal book, The Virus Creation Labs, documents the insane early history of the antivirus world. He also published the critically acclaimed Crypt newsletter. The San Jose Mercury News recommends Smith’s work to “those who insist on at least a modicum of fact, accuracy and clear thinking in their tech news.”

Continue reading “VMyths: Truth About Computer Security Hysteria”

Journal: Microsoft Down, Apple Up, WHERE Is the Band?

Analysis, Augmented Reality, Collaboration Zones, Computer/online security, info-graphics/data-visualization, InfoOps (IO), Key Players, Methods & Process, Reform
Full Story Online

Phi Beta Iota: Industry colleagues point out that Ballmer took over at the top while Jobs came back in at the bottom.  Our own view is that a convergence is occurring that will be settled between the personal device and the cloud–who comes up with the most secure reliable personal device (e.g. an eye-screen with earpiece/mike and voice or virtual keyboard or pointer) and the most global affordable mix of call centers, intelligence centers, and M4IS2 softwares, services, and sense-making within the cloud.  Google and Oracle and IBM (and their Brazilian, Chinese, and Russian counterparts) are on the same court, but none of them are truly focused on the end game: a World Brain with a Global Game in which we connect all humans to all information in all languages….an open self-organizing world in which profit comes from cost avoidance, truth, reconciliation, and non-zero outcomes.

Malware Intelligence of Modern Crimeware

Computer/online security, Cyberscams, malware, spam, Methods & Process, Privacy, Technologies
website

MalwareIntelligence is a site dedicated to the investigation of crimes committed using the Internet as the main channel of attack. Also, anything that involves maneuvering and criminal activities in this area, covering a wide spectrum in the field of computer criminology.

The mission is to work in a completely disinterested in the continuous improvement in prevention to security incidents that allow for timely contingency threats.

Thus MalwareIntelligence behind is a group of professionals in research, intelligence and information security, which fuse the various processes involved in these disciplines to offer exclusive content, quality and high value for the resolution of computer crime.

MalwareIntelligence currently has two divisions:

MalwareDisasters is devoted to analyzing malicious code from a purely involved in intelligence processes. The content expressed in this division refers mainly to activities “visual” of malware.

SecurityIntelligence channels information on information security, also from the standpoint of intelligence processes, resulting in a high-value content to understand the need to merge Intelligence in Information Security.

Thanks to Alexander Heid's talk at the Next Hope called “Modern CrimeWare Tools and Techniques: An Analysis of Underground Resources– Download Audio: 16kbps or 64kbps

Google, MSoft, IBM, HP, Oracle, Intel (chips), National Security and Perceived Internet Threats

04 Education, 04 Inter-State Conflict, 10 Security, Commerce, Computer/online security, Cyberscams, malware, spam, Government, Military, Misinformation & Propaganda, Secrecy & Politics of Secrecy, Technologies
  • U.S. Strategy: Control The World By Controlling The Internet
    A Chinese Perspective, by Chen Baoguo, August 24, 2010
    In May 2009, Microsoft announced on its website that they would turn off the Windows Live Messenger service for Cuba, Syria, Iran, Sudan and North Korea, in accordance with US legislation. In January 2010, Google, the company which owns the largest Internet information resources, declared that in order to establish a more open Internet environment, they had to abandon the Chinese market.What is even more worrying is that Senator Joseph Lieberman, chairman of US Homeland Security Committee, recently presented to the US Senate a bill titled “Protecting Cyberspace as a National Asset. “To control the world by controlling the Internet has been a dominant strategy of the US.From the network infrastructure protection of the Clinton era to the network anti-terrorism of the Bush era and to the “network deterrence” of the Obama era, the national information security strategy of the US has evolved from a preventative strategy to a preemptive one.Meanwhile, the methodology has moved from trying to control Internet hardware to control of Internet content.

  • Video: “The cyber-threat has been grossly exaggerated” debate between Marc Rotenberg & Bruce Schneier VERSUS Mike McConnell & Jonathan Zittrain

  • China Cyber-army Talk Pulled from Black Hat
    By: Brian Prince 2010-07-15
    A presentation on Chinese state-sponsored hacking has been pulled from the Black Hat security conference due to pressure from the Taiwanese government. The talk, titled “The Chinese Cyber Army: An Archaeological Study from 2001 to 2010,” was to be held by Wayne Huang, CTO of Web application security firm Armorize Technologies.