Event: 17-18 March, Washington, DC, USA ICIW 2011

CFP: International Conference on Information Warfare and Security 17-18 March 2011, Washington, D.C. Information warfare, cyber-operations, and information security are areas of specialized research covering multiple areas of expertise.  This conference is designed to bring together conceptualists, operators, and researchers to exchange and explore ideas covering these areas.  Past conferences have attracted participants from all over the globe, …

Google, MSoft, IBM, HP, Oracle, Intel (chips), National Security and Perceived Internet Threats

U.S. Strategy: Control The World By Controlling The Internet A Chinese Perspective, by Chen Baoguo, August 24, 2010 In May 2009, Microsoft announced on its website that they would turn off the Windows Live Messenger service for Cuba, Syria, Iran, Sudan and North Korea, in accordance with US legislation. In January 2010, Google, the company …

Google: Post-Geographical, Post-National Super-State (Distorted Multi-Plex Eye)

Google’s Earth By WILLIAM GIBSON August 31, 2010 “I ACTUALLY think most people don’t want Google to answer their questions,” said the search giant’s chief executive, Eric Schmidt, in a recent and controversial interview. “They want Google to tell them what they should be doing next.” Do we really desire Google to tell us what …

Who’s Who in Collective Intelligence: John N. Warfield

Dr. John N. Warfield (1925-2009) was emeritus professor and director of the Institute for Advanced Study in the Integrative Sciences (IASIS) at George Mason University. He has been elected President of the Systems, Man, and Cybernetics Society of the Institute of Electrical and Electronics Engineers, and of the International Society for the Systems Sciences (formerly …

Journal: DoD, WikiLeaks, JCS, Security Ad Naseum…

Defense News August 23, 2010 Experts: DoD Could Have Prevented WikiLeaks Leak By William Matthews While senior Pentagon officials resort to bluster in hopes of preventing the WikiLeaks website from posting any more secret Afghan war documents on the Internet, security experts say there is a lot the U.S. military could have done to prevent …

Journal: Human-Centered Computing (Not…)

Human-centered computing should be–but is not today–about connecting all humans with all information in near-real-time, while providing back office tools that elevate the human brain and more properly plan information and communications technologies in a support role.  See for example our Citizen-Centered Graphics and all of the OSS/EIN Books.  Where the emergent meme is off-target …