Very soon, readers will see our new logo for SENDS throughout the entire website. As a preview, here it is: It was a lot more difficult to get to this new logo than I thought it would be when we first started doing SENDS. In fact, this is the fourth iteration in nine months, but thanks to some expert design work from SENDS Creative Advisor and blogger
By now, following our blog and web links, you have seen numerous references to what we in SENDS call a Science of Cyberspace. We’ve been thinking about what such a science would include and how it might be articulated since the beginning of SENDS two years ago. We even started calling it “open-source science” to demonstrate it wasn’t something that would be developed exclusively in a lab somewhere by Ph.D.s and computer scientists. Without going into a discussion of what
Introduction: Bob Schapiro’s previous SENDS blog post asserted that passwords are a security “solution” that’s part of the problem. Unfortunately, managing multiple passwords is just the tip of the iceberg regarding the cyber-security challenges that we collectively face. This post reflects on the current effort to redefine cyber-security and explores what empowering individuals to manage their personal information and cyber-presence might look like. A companion piece that fleshes out more of a required framework will follow next week. The NSTIC initiative The
In an October, 2010 blog, I commented about the importance of asking “the right questions” in critical situations. “It’s the questions, not the answers, which most guide us in strategic thinking and understanding…And equally important, it is the order in which you ask questions and experience discovery through responses to those questions that help you form strategies.” I wrote these words citing the inspiration of mentor Dr. David Schum of George Mason University. It’s an odd if fascinating experience to
As reflected throughout the SENDS Blog (here and here, for example), the SENDS Project seeks to understand the nature of cyberspace as a complex adaptive system (CAS) as well as reflectively thinking about cyberspace itself as a meta-system. Not only is cyberspace characterized as such a CAS, but increasingly the computer architectures and programming languages that support cyberspace-based communications must also support these levels of functionality. This functionality, discussed previously, includes the processes of exchange, self-organization and emergence.
Jane Austen’s novel, Sense and Sensibility, tells a story of rich, dynamic dealings among an interesting cross-representation of the people of late 18th Century English life. The successes and failures of the characters of the story, moderated by the emotions and realties of the time, are a microcosm of life even today. The characters lived their lives through complex interactions basically devoid of technology yet ultimately made wise and “sensible” decisions about their lives that produced a relatively “happy ending.” One