Cool Atom Puzzle

Thought this was a pretty stunning puzzle of The Atom


With sections for: composition, atomic model, thermonuclear fusion, periodic table, radioactivity, positron emission tomography, fission of uranium, nuclear reactor, and atomic scientists. 


Wow that’s a lot of information for a Puzzle and one very nicely designed at that. 


Congrats on putting this 1,000 piece beauty together. 


These things make me realize how very much I still have to learn–and in this case, it starts with all these small things. 😉


(Source Photo: Andy Blumenthal)

Thought this was a pretty stunning puzzle of The Atom


With sections for: composition, atomic model, thermonuclear fusion, periodic table, radioactivity, positron emission tomography, fission of uranium, nuclear reactor, and atomic scientists. 


Wow that’s a lot of information for a Puzzle and one very nicely designed at that. 


Congrats on putting this 1,000 piece beauty together. 


These things make me realize how very much I still have to learn–and in this case, it starts with all these small things. 😉


(Source Photo: Andy Blumenthal)

If I Could Be Anyone(s)

So someone asked me a very deep personal question.

“If you had $20 million dollars and could do whatever you want (be whoever you want), what would that be?”


I was on the spot a little and didn’t have time to introspect the way I like to do, and I gave an answer that I really wasn’t happy with…and it’s been bothering me since. 


So sitting down now and really thinking about who I want to be–this is my real answer:


As a composite person, I want to have the:


– Lovingkindness of Mother Teresa


– Serenity of the Dalai Lama


– Spirituality of Moses


– Determination of Rocky


– Leadership of Rick Grimes


– Strength of Samson


– Agility of Bruce Lee


– Intellect of Sigmund Freud


– Understanding of Albert Einstein


– Ingenuity of Steve Jobs


– Inquisitiveness of Capt. James T. Kirk


– Bravery of those martyred in the Holocaust


– Heroism of Prime Minister Bibi Netanyahu


– Beauty of my wife and daughters


– The integrity of my dear father, Fred Blumenthal


What would I want to do–just simple things like:


– Cure Cancer, Parkinsons, ALS, etc.


– Eliminate poverty


– Herald in world peace


– Help/comfort those that are hurt and suffering


– Make people smile/happy


– Be a good person with integrity in all situations


I could probably go on and on, but generally this is what life means to me. 


Maybe today, I ain’t the smartest or fastest or strongest, but I have dreams, hopes, and aspirations. 


If that isn’t good enough, well at least I have a heart and a soul. 😉


(Source Photo: Dannielle Blumenthal)

18 Million–Change The SSNs

SSN

So, maybe one of the most detrimental hysts of information from the Federal government in history. 


Now involving over 18 million current and former federal employees, including military and intelligence personnel. 


No getting around it, but we are major screwed here–this is a treasure trove of personal and privacy information ready to use for identity theft, blackmail, assassination/decapitation attacks at home and work addresses, kidnapping of family members, and literally attacking our national security apparatus from the very inside out–it’s people. 


Imagine, if at the time of its choosing, an adversary attacks our nation, but preempts this with sophisticated and coordinated attacks on our critical government personnel–generals, spy masters, political kingpins, and other key decision makers–thereby distracting them from their duties of safeguarding our nation. 


This is our new Achilles Heel and overall a security disaster bar none!


Well, we can’t go back and put the genie back in the bottle–although wouldn’t it be nice if such critical information (if not encrypted–already unforgivable) would have a self-destruct mechanism on it that we could at least zap it dead.


But for the people whose personal identities are at risk–whose social security numbers (SSNs) and dates of birth (DOBs) have been compromised what can we do? 


While we can’t very well change people DOBs, why not at least issue them new SSNs to help thwart the adversaries peddling in this information in the black markets. 


If we can put a man on the moon, surely we can issue some 18 million new SSNs and mandate government and financial institutions to make the necessary updates to the records. 


This is not rocket science, and certainly we owe this much to our people to help protect them.


Will our government be there for it’s own employees and patriots? 😉


(Source Photo: here with attribution to Donkey Hotey)

Time, Our Most Precious Asset

Einstein
Albert Einstein taught us how this world is governed by space and time. 



Before we are born and once we are gone, space and time no longer apply–we are in G-d’s realm.



Time is so important and precious, that even space is constrained by time–i.e. we cannot be in two places at the same time.



When it comes to time, we can never have enough and this pervades every aspect of our lives.



Here is a short list of how we are bound by time:

What Time Is It?

What Time Are We…?

Do You Have Time?

Can You Spare Some Time?

Who’s Got Time?

How Many Times?

How Much Time?

Do You Remember The Time That…?

Where Has The Time Gone?



Time Is Precious

This Time is Different

Only Time Will Tell

If Only There Was Time

Wish I Had More Time

Time is Too Short

It is Time

Time is Ticking

Time Flies

One Step At a Time

Maximize The Time You Have

Stop Wasting Time



Decision Time

Time To Change

Timeless

Timeline

Time Bound

Time Heals

Time is Money

In No Time

From The Beginning of Time

Once Upon A Time

There Was A Time

Now’s Not The Time

A Long Time Ago

Time To Getaway

Awesome Time

Great Time

Good Times

Bad Times

Marvelous Time

Excellent Time

Meaningful Time

Hopeful Time

Horrible Time

Depressed Times

Manic Times

Next Time

Time of My Life

Makeup Time

Time Out

It’s About Time

The First Time

This is The Last Time

There Is No Time Like The Present

Between The Time

About That Time

Same Time

Different Time

Parallel Time

Past Time

Make Time

Use Time

Spend Time

Save Time

Best Use of Your Time

Take Your Time

Short of Time

Losing Time

Taking Time

Stealing Time

Don’t Have Time

Some Time

No Time

Anytime

All of the Time

Every Time

Numerous Times

Exact Time

All The Time

At The Same Time

For The Time Being

Keep Time

Out of Time

Long Time

Short Time

Right Time

Wrong Time

Before It’s Time

Now is The Time

Past Time

Present Time

Future Time

Spacetime ContinuumTime Travel

(Not) Enough Time

Most of The Time

It’s The Only Time

Need More Time

Time is of The Essence

Tell Time

Local Time

World Time

Time Zones

Timetable

Timekeeper

Timekeeping

Time and Attendance

Overtime

Comp Time

Part Time

Full Time

Old Times

Modern Times

Wartime

Peacetime

Summertime

Wintertime

Springtime (wonder why there is no falltime?)

Setup Time

Time is on Your Side

Time of Redemption

Time of Mashiach (Messiah)

Time to Forgive

Time to Avenge

Judgement Time

Time Unfolds

End of Times

Confusing Times

Work Time

Busy Time

Down Time

Quiet Time

Meal Time

Bed Time

Nap Time

Starting Time

Ending Time

Almost Time

Happy Times

Sad Times

Holiday Time

Hopeful Times

Solemn Times

Special Time

Important Times

Tough Times

Structured Time

Lawless Times

Time of Doubt

Time of Birth

Time of Death

Time to Work

Time to Retire

Time Alone

Time Apart

Time Together

Me Time

My Time

Our Time

Family Time

Play Time

Party Time

Happy Hour Time

Game Time

Show Time

Movie Time

Real Time

Dinner Time

Lunch Time (no real breakfast time!)

Private Time

Time Stamp

Time Magazine



Thank You For Your Time 😉



With special appreciation To Rebecca Blumenthal for brainstorming this with me–it was a fun time! 



(Source Photo: Andy Blumenthal)

Balancing Cybersecurity And Citizen Freedom

Balancing Cybersecurity And Citizen Freedom

There is a very interesting discussion of the protection of Federal Networks and the Fourth Amendment in “Cybersecurity, Selected Legal Issues,” Congressional Research Service (CRS) Report for Congress (3 May 2012).

The Department of Homeland Security (DHS) in conjunction with the National Security Agency (NSA) rolled out EINSTEIN, an intrusion detection system (IDS) in early iterations, and later an intrusion prevention system (IPS) at all Internet points of presence (POPs) for the government.

The system works through copying, storage, and deep packet inspection of not only the metadata for addressing information, but also the actual contents of the flow. This handling is necessary in order to identify suspicious malware signatures and behavior and alert the United States Computer Emergency Response Team (US-CERT) in order to block, quarantine, clean, and respond to the attacks and share information about these.

However, the civil liberties and privacy issue with EINSTEIN is that according to the Fourth Amendment, we are protected from unreasonable search and seizures. Thus, there are concerns about the violation of the Fourth Amendment, when DHS monitors and inspects addressing and content of all email and Internet communications to and from federal agency employees and the public–including not only from government email accounts and systems, but also from private email accounts such as Yahoo and Gmail and social media sites like Facebook and Twitter.

The justification for the use of EINSTEIN includes:

1. The government cannot reasonably get warrants in real time in order to safeguard the federal network and systems at the speed that the attacks are occurring.

2. The government places banners and user agreements on all Federal networks notifying users of monitoring, so there is no expectation of privacy in the communications.

3. The monitoring is conducted only for malicious computer activity and not for other unlawful activities—so “clean” traffic is promptly removed the system.

4. Privacy protections are ensured though review mechanisms, including Attorney General and Director of National Intelligence (DNI) reporting to Congress every six months and a sunset provision requiring monitoring reauthorization every four years.

This tension between monitoring of Federal networks and traffic and civil liberties and privacy is a re-occurring issue when it comes to cybersecurity. On one hand, we want cybersecurity, but on the other hand, we are anxious about this security infringing on our freedoms—whether freedom of expression, from search and seizure, from surveillance, or from potentially costly regulation, stifling innovation, and so forth. It is this tension that has stalled many cybersecurity bills such as the Stop Online Privacy Act (SOPA), Cyber Intelligence Sharing and Protection Act (CISPA), The Computer Security Act of 2012 and more.

In the absence of a clear way forward with legislation to regulate and enforce, or incentivize, standards and best practices for cybersecurity, particularly for critical infrastructure protection, as well as information sharing, the White House released Presidential Policy Directive/PDD-21 on Critical Infrastructure Security and Resilience to establish DHS and other federal agency roles in cybersecurity and to manage these on a risk-based model, so that critical infrastructure is identified, prioritized, assessed, and secured accordingly.

While PDD-21 is a step in the right direction, it is an ongoing challenge to mediate a balance between maintaining our values and constitutional freedoms, while at the same time securing cyberspace.

One thought is that perhaps we can model cybersecurity after the Posse Comitatus Act of 1878 that separated federal military from domestic national guard and law enforcement powers. Using this model, we can create in cyberspace a separation of cybersecurity from our borders outward by the federal government, and within the domestic private networks by our national guard and law enforcement.

Thus, we can create stronger security radiating out at the national periphery, while maintaining our important freedoms within, but always working together to identify and neutralize any and all threats to cyberspace. 😉

(Source Photo: Andy Blumenthal)

>Enterprise Architecture – Ask Lots of Questions!

>In User-centric Enterprise Architecture, we ask lots and lots of questions.

Why do we ask lots of questions?

In User-centric EA, we are not satisfied with the status quo. User-centric EA demands that we analyze problem areas and look for better ways of doing things. One important step in analyzing the “as-is” state is to question it. That means, we capture the current state, but then we ask about gaps, redundancies, inefficiencies, and opportunities. The purpose of asking and drilling down on the information in the architecture is to get a deeper understand of the business processes, the information requirements, and the technology solutions that can be brought to bear.

Albert Einstein said, “Learn from yesterday, live for today, hope for tomorrow. The important thing is not to stop questioning.”

Yesterday is EA history, today is the “as-is” architecture, tomorrow is the “to-be” architecture, and questioning is what we must do to make it all happen.