PinnedMember-onlyNORAD and A.I. — The ExperimentMilitary Strategy Wow. It looks like the U.S. military took a page out of one I. tech manual and out pulsed a stream of new acronyms in this latest announcement. Here is the link: https://www.defense.gov/Newsroom/Transcripts/Transcript/Article/2711594/northcom-commander-gen-glen-d-vanherck-conducts-press-briefing-on-north-america/ U.S. Northern Command, General Glen D. VanHerck to the press briefing room today. General VanHerck is here…Supercomputer3 min readSupercomputer3 min read
PinnedMember-onlyCyber Weapons in Space?Eureka. Some good news on the cyberwarfare front. Air Force Space Command achieved a significant milestone on February 12 when the Cyberspace Vulnerability Assessment/Hunter (CVA/H) Weapon System reached Full Operational Capability (FOC) status. Achieving FOC means the CVA/H weapon system can serve as the premier enclave defense platform for prioritized…Cybersecurity3 min readCybersecurity3 min read
PinnedMember-onlyThere Goes Our DataWow, Ireland’s Health Services just got whacked by the Conti ransomware. We admire their determination not to pay the cybercriminals. Article link: https://zd.net/349RvKi Ireland’s Health Service Executive (HSE) has ruled out giving in to hackers’ demands as the country’s healthcare and social services continue to deal with the disruption caused…Data3 min readData3 min read
PinnedMember-onlyGiving You The BusinessWorking in Foreign Markets How do those multi-national company’s do it? In the MBA classes, professors discuss and teach how to enter your goods and services into foreign markets. There are several step-by-step formulas to approach foreign nationals to gain access to their evolving consumer base. …Malware4 min readMalware4 min read
PinnedMember-onlyBusiness Model Repackaged — DarknetHacking as a Service It was bound to happen sooner or later! The model in play for a few years is known as Ransomware as a Service (RaaS). The newer non-talented hackers are moving to the new business model, Hacking as a Service (HaaS). After all, as a Service (aaS) is the terminology de…Hacking3 min readHacking3 min read
6 days agoMember-onlyI Never Told You ButSimone sat cross-legged on the floor with her nose close to the wiry mess and harrumphed, “Trevor, we have another string that won’t stay lit. What did we do again to get this job? I’m happy to apologize for my crime. I think finding one dead and then pulling out…Christmas3 min readChristmas3 min read
Nov 16Member-onlyI Never Told You ButAs he neared the kitchen, Trevor heard his sister singing one of her favorite holiday tunes, Grandma Got Run Over By a Reindeer. He slowed his pace and peeked around the doorway. Using the wooden spoon as a microphone, dancing with her dark wavy hair bouncing, she hit the last…Thanksgiving4 min readThanksgiving4 min read
Nov 9Member-onlyOur Abbreviated WorldFor those unfamiliar with the demise of TDM/T-1 (time division multiplexing) most carriers are trying to get customers off legacy infrastructure primarily delivered over copper lines. If all customers move to VoIP (voice over Internet Protocol), the carriers can decommission the old generation of Class 5 switches. …Telecommunication4 min readTelecommunication4 min read
Nov 1Member-onlyI Never Told YouSimone looked up from her math worksheet homework. “Did Boss get back from the Austin Film Festival yet?” Trevor nodded, looking over the book he was reading for English. “Yeah, but it wasn’t good news. I heard parts when he told Annie. …Siblings3 min readSiblings3 min read
Oct 25Member-onlyI Never Told You ButTrevor methodically searched the house room by room until he found Simone in her closet under all her stuffed animals. The finger on her pursed lips signaled he must stay quiet. He noticed the anxious worry in her eyes as she waved him inside. He scooted next to her as…Siblings3 min readSiblings3 min read