Cyber Woke for the Victims of Stalkers

People who are the victim of stalkers have a startlingly different cybersecurity risk profile. I heard the idea articulated and clearly defended by Allison Bishop at CyberWeek. Here is her twitter, proof that she is funny and evidence that she is wicked smart. She articulated several specific positions that are worth carefully articulating. First, she […]

Read More…

Facebook and Healthcare data, the contrarian view.

(Update May 2019.) Publishing this article was part of what started my recent investigation into Facebook’s cybersecurity and privacy practices. The outcome of that investigation means that I do not have any hopeful or positive things to say regarding Facebook and I believe that I was… and we all were, naive. I no longer hold […]

Read More…

Cascading Configuration Design Pattern

I have not been able to find simple plain-language descriptions of what the Cascading Configuration Design Pattern is. And really not that many complicated descriptions either.  Basically, this pattern is used to simplify very complicated configuration problems, by simplifying what would be a matrix of configuration decisions into a “cascade” of configurations using a hierarchy. […]

Read More…

QR Code as Art

Recently, I have come to realize how many issues I have hidden from by being a work-a-holic. Especially losing my mother and brother so close together. It was coming out in unhealthy ways and I have been looking for better ways to process those events, rather than letting them fester as a back-ground brain process. […]

Read More…

My political bias

I think, when one starts to write what could be a politically explosive blog posts, it is good order to reveal your political biases and opinions. I am about to write several, so this is a nice preface that I can just link to, in order to explain my perspective on current political issues. Let […]

Read More…