Month: February 2007

  • The Perfect Patch Storm

    [This was originally published on the OSVDB blog.] Steven Christey of CVE recently commented on the fact that Microsoft, Adobe, Cisco, Sun and HP all released multi-issue advisories on the same day (Feb 13). My first reaction was to come up with an amusing graphic depicting this perfect storm. Due to not having any graphic…

  • BumpTop 3D and Computer Interfaces: The Real Hurdle

    I’m a fan of videos showing advanced in computer interaction. The BumpTop 3D model is definitely neat, and the fundamental technology behind it is no doubt revolutionary. I say this sincerely because i recognize the functionality it offers and the difficulty in converting such ideas into graphic output, and more to the point, I take…

  • “We recovered the laptop!” … so what?

    [This was written with Lyger and originally published on attrition.org.] In May of 2006, the United States Department of Veterans Affairs publicly disclosed the fact that “Personal data on about 26.5 million U.S. military veterans was stolen from the residence of a Department of Veterans Affairs data analyst who improperly took the material home”, prompting a mass…

  • “We recovered the laptop!” … so what?

    [This was originally published on attrition.org. It was written by Lyger and Jericho.] In May of 2006, the United States Department of Veterans Affairs publicly disclosed the fact that “Personal data on about 26.5 million U.S. military veterans was stolen from the residence of a Department of Veterans Affairs data analyst who improperly took the material home“,…