NGO Security has a good explanation of how to create more granularity and levels for risk assessments with a Likert Scale: You don’t need to be a math or stats-guru to use a Likert Scale, it’s actually quite simple to implement and understand (an especially good feature when explaining the rationale for security decisions to … Continue reading Likert Scale for Risk Assessments→
I read a history exhibit at the Museum of the African Diaspora that showed how Calypso had been used by slaves to circumvent heavy censorship. Despite efforts by American and British authorities to restrict speech, encrypted messages were found in the open within popular songs. Artists and musicians managed to spread news and opinions about … Continue reading Women will rule the world→
It is far less expensive and three times more effective than mammography technology that detects breast cancer. The MBI (molecular breast imaging) co-inventor and advocate says she will see no financial gain from its use; yet its low-cost seems to be exactly what stands in the way of it getting recognition, let alone adoption. Dr. … Continue reading Breakthrough in Breast Cancer Detection→
Jim Getty, who was an inventor of the X Window System in the 80s, has a bone to pick about performance of his networks. He suspects there is a problem with TCP buffers related to network congestion and round trip time (RTT). …you don’t see the full glory of TCP RTT confusion caused by buffering … Continue reading Network Buffer Bloat→