A Universal Lemma For Compliance

2500 words, 9 1⁄2 minutes. Here I describe a lemma1 or helping theorem for technical compliance of IT with a focus on Information Security. It’s an approach for all compliance regimes whether regulatory or corporate. It doesn’t date, nor is it predicated on a technology or platform. It isn’t a trick. It doesn’t provide cover for inadequate security or incompetent staff. If you’re looking to evade compliance, disguise incompetence, or shirk accountability then you’re in the wrong article. »

The Largest Open Goal In Cyber Security

1000 words, 4 minutes. “But how was one to explain repeated instances of derisive laughter at melodramas and films that hardly set out to be funny?” - Prof. Eric Rentschler1 Out of place laughter is an anarchist in the dark. Someone who refuses to let the film cast its spell. Imagery is important. Moving or still. Whether it be religious iconography, depictions of national myth, a coat of arms, a rallying military standard, your company’s brand, or something as incidental as clip art. »

An Idea Whose Time Has Come

950 words, 4 1⁄2 minutes. “Nothing is as powerful as an idea whose time has come.” - Victor Hugo. This is the second of two posts on strategic software. The first explained what it is, what it does, and where to find it. Now I’ll tell you why it’s an idea whose time has come. I’ll tell you why it will be more powerful in some respects than traditional politics and how it will come to shape the world. »

The Age Of Strategic Software

1300 words, 5 minutes. “Whatever happens, we have got the Maxim gun, they have not.” - Hilaire Belloc. Once upon a time software was just for counting beans. It counted more beans faster and cheaper than anything else. Then computers became personal, then portable, then pocketable. All sorts of different kinds of software were created to serve the people and help them do their jobs better. Everyone became more productive. »

Beating The Samson Option

1300-1600 words, 6 1⁄2 to 8 1⁄2 minutes. “He grasped two pillars of the temple and bowed himself with all his might” - Judges 16:30. Introduction This post is about online services which rely partly, or wholly, on user-contributed content. It’s about what happens to that content if those services close. I’ll examine the constraints and motivations of the parties involved. I’ll then present a solution to the problem of what I call content custodianship. »