Blog Archives

La Ley de Parkinson

Interesante reflexión y tan obvia que muchos de nosotros la ignoramos. Leyendo el blog de Didac Lee, encontré este post (dialogo) que habla sobre el poco tiempo que tenemos y del cual nos quejamos. En el fondo es que no

Tagged with: , ,
Posted in Holism, Security

Protestant work ethic

By Wikipedia: The Protestant work ethic, sometimes called the Puritan work ethic, is a Calvinist value emphasizing the necessity of constant labor in a person’s calling as a sign of personal salvation. Protestants beginning with Martin Luther had reconceptualised work

Tagged with: , , ,
Posted in Holism, Security

Hacker Ethic

Six years ago I read the “The Hacker Ethic and the Spirit of Information Age” book, by Pekka Himanen (this book is a collaborative work between Pekka Himanen, Linus Torvalds and Manuel Castells -philosopher, hacker and sociologist, respectively) and understood

Tagged with: , ,
Posted in Holism, Security

What is Holism?

A Wikipedia definition is: Holism (from ὅλος holos, a Greek word meaning all, entire, total) is the idea that all the properties of a given system (biological, chemical, social, economic, mental, linguistic, etc.) cannot be determined or explained by its

Tagged with: , ,
Posted in Holism, Security

Ultra-mobile PC (UMPC): PC Portálites de bajo-coste, seguros, accesibles y usables

Después de la iniciativa de Nicholas Negroponte con su OLPC, PC Portátil para niños de 100 USD para fines educacionales, los fabricantes de Portátiles han visto una interesante oportunidad de negocio; hacer portátiles low-cost. Asustek, que fabrica portátiles para HP,

Tagged with: ,
Posted in Holism, Security, Usability

The Principle of Psychological acceptability

Jerome Saltzer and Michael Schroeder in “The Protection of Information in Computer Systems”: “[…] Psychological acceptability: It is essential that the human interface be designed for ease of use, so that users routinely and automatically apply the protection mechanisms correctly.

Tagged with: , ,
Posted in Holism, Security

Holistic System Security an cyber-security research priority

In the Report to the President on Cyber Security: A Crisis of Prioritization (February 2005) was published the cyber security priorities, theses were: Authentication Technologies Secure Fundamental Protocols Secure software Engineering and Software Assurance Holistic System Security Monitoring and Detection

Tagged with:
Posted in Holism, Security
Archives