Cyber Woke for the Victims of Stalkers

People who are the victim of stalkers have a startlingly different cybersecurity risk profile. I heard the idea articulated and clearly defended by Allison Bishop at CyberWeek. Here is her twitter, proof that she is funny and evidence that she is wicked smart. She articulated several specific positions that are worth carefully articulating. First, she […]

Read More…

Facebook and Healthcare data, the contrarian view.

(Update May 2019.) Publishing this article was part of what started my recent investigation into Facebook’s cybersecurity and privacy practices. The outcome of that investigation means that I do not have any hopeful or positive things to say regarding Facebook and I believe that I was… and we all were, naive. I no longer hold […]

Read More…

Cascading Configuration Design Pattern

I have not been able to find simple plain-language descriptions of what the Cascading Configuration Design Pattern is. And really not that many complicated descriptions either.  Basically, this pattern is used to simplify very complicated configuration problems, by simplifying what would be a matrix of configuration decisions into a “cascade” of configurations using a hierarchy. […]

Read More…

Does Epic resist or support interoperability? Hell if I know.

I just realized that my somewhat infamous question at the ONC annual meeting is recorded on video! The background on my question, which I made me very popular at the meeting afterwards, was that I had heard that Epic hired a lobbyist to convince congress that it is an interoperable company. That lobbyist and others at […]

Read More…