VMyths: Truth About Computer Security Hysteria

http://vmyths.com/about Vmyths traces its roots to a “Computer Virus Myths treatise” first published in 1988. It evolved into the critically acclaimed “Computer Virus Myths home page” in 1995, then it moved to Vmyths.com in 2000. Its name has changed over the years, but Vmyths remains true to its original goal: the eradication of computer security …

Reflections on Integrity UPDATED + Integrity RECAP

Updated 1 November 2012 to add core graphic: Graphic: Ethical Evidence-Based Decisions.  Updated 13 April 2012 to add new book: THE OPEN SOURCE EVERYTHING MANIFESTO: Transparency, Truth & Trust.  Updated 8 March 2012 to add underlying philosophical reference: 2012-03-08 GOD MAN INTERVAL Reformatted & Linked.  Updated 6 December 2011 to add this seminal reference: Journal: …

Journal: US Research & Development in the Toilet

U.S. innovation: On the skids Technologists look to a new White House to reverse decade-long slide in R&D By Gary Anthes, ComputerWorld, October 21, 2008 By most measures, the U.S. is in a decade-long decline in global technological competitiveness. The reasons are many and complex, but central among them is the country’s retreat from long-term …

NIGHTWATCH Extract: China, World, Global Military Reach

China-The World: For the record. China’s armed forces are ready to expand communication and cooperation with their counterparts worldwide to promote global peace, a senior officer with the Chinese Defense Ministry said. International military exchanges enhance mutual understanding and peace awareness among all troops across the globe and advance world peace, the officer said. NIGHTWATCH …

NATO on YouTube: Selective Summaries (5)

NATO You-Tube Front Page Phi Beta Iota Summary: Where should NATO go on out-of-area expeditionary operations?  How does NATO define security & stability?  How does NATO achieve balance between territorial defense and expeditionary operations, and between the voice of the big nations and the small nations?  What is defense?  What is 360 degree defense in …