Skip to main content

Posts

Showing posts from August 30, 2020

Featured Post

On Trust, Bias, and Privilege: my Response to 'Anti-Blackness is no glitch'

In Winter 2020, Stephanie T. Jones and Natalie Melo wrote ‘Anti-Blackness is no glitch’: The need for critical conversations within computer science education . Jones and Melo mentioned, “The conversation around and application of computer science often reinforces neoliberal ideals” (Jones, Melo, November 25, 2020, pg. 42). Jones and Melo were saying this: the computer science revolution and organizational IT network futuristic left-wing best standards access is telling. For Trust, I am Checking my Privilege But this is not excluding contemporary conversations: any futuristic conversation based on personal interpretation is not from ABBA, so it is not prophecy (NIV, 2 Peter 1:20). For your review, Peter wrote, "For prophecy never had its origin in the human will, but prophets, though human, spoke from [ABBA] as they were carried along by the Holy Spirit" (2 Peter 1:21). You, reader, can predict something shall happen, but prediction is uncertain: it is a terminating series ca

On Hacking the Axis and Securing History Records

  On Security Requirements, Review Physical Might On May 7, 2020, John Arquilla wrote the August, 2020 blog column, Hacking the Axis . When qualifying great acts, consider Arquilla’s statement and regard for the twenty first century anno domini second World War, acronymed WWII. Arquilla wrote, “Observations of the 75 th anniversary of the end of World War II in Europe (May 8, 1945) included remembrances of such searing events as the struggle on Omaha Beach on D-Day, the Battle of the Bulge, and at least some recognition of the enormous contribution made by the Russian people to the defeat of Fascism” (Arquilla, 2020). Arquilla mentioned that the second World War’s European conclusion involved great physical struggles. Arquilla’s lesson learned began at the beginning of his column: in public security, physical might is important, and this is an utter security aspect. Emergent Cybersecurity Requirements With physical security, there is an emergent cybersecurity necessity that John

Contact Form

Name

Email *

Message *