Archive for May, 2008
Where’d that firmware come from?
The word “hacker” is very frequently misused, insomuch as jargon can be misused. But who would dare argue with an RFC? This venerable 15 year old document incontrovertibly defines a hacker as “a person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. The […]
Posted: May 20th, 2008 under Accountability, Certification, Exploit, Trust, Validation.
Comments: 1
The Risk of Productivity
Last month’s RSA and Interop shows really demonstrated our industry’s penchant for the (sometimes seemingly incognizant and exploitative) overuse of the word “risk”. Being so beaten over the head with the word serves as a reminder that the measurement of risk isn’t easy. First, it’s strongly affected by situational context. A dignitary on a turbulent […]
Posted: May 2nd, 2008 under Uncategorized.
Comments: none