stop harassing climate scientists

Representative Lamar Smith is using his bully pulpit as head of the House Committee on Science, Space & Technology to subpoena National Oceanic and Atmospheric Administration (NOAA) climate scientists’ emails, peer review comments, and other private information. He’s upset with a paper NOAA scientists published in Science refuting claims of a global warming slowdown, so […]

Continue reading


Sustainable development indicators

Sustainable development indicators (SDI) are measures of sustainability, and attempt to quantify beyond the generic concept. Though there are disagreements among those from different disciplines (and influenced by different political beliefs about the nature of the good society), these disciplines and international organizations have each offered measures or indicators of how to measure the concept. […]

Continue reading


safe operating space

Footprint Calculator How much land area does it take to support your lifestyle? Take this quiz to find out your Ecological Footprint, discover your biggest areas of resource consumption, and learn what you can do to tread more lightly on the earth. There are limits to the individual’s ability to instigate major change on the […]

Continue reading


Stag hunt

From Wikipedia, the free encyclopedia In game theory, the stag hunt is a game that describes a conflict between safety and social cooperation. Other names for it or its variants include “assurance game”, “coordination game”, and “trust dilemma”. Jean-Jacques Rousseau described a situation in which two individuals go out on a hunt. Each can individually […]

Continue reading


flying objects

Uploaded on Sep 22, 2008 The AirTraffic team presents the global air traffic (simulation over 24 hours).http://radar.zhaw.ch/ Uploaded on Feb 19, 2010 Courtesy NASA FACET is a simulation tool for exploring advanced air traffic management concepts. An efficient and effective air traffic management system is vital to the U.S. transportation infrastructure. Since 1978, when the […]

Continue reading


Chop-Shop Electronics

The Hidden Dangers of Chop-Shop Electronics Do you really know what’s inside the electronic devices you use? Neither the U.S. military nor an increasing number of large corporations knows what’s in theirs. Between 2005 and 2008, the number of companies reporting incidents involving counterfeit chips—including recycled parts passed off as new, those that fail testing […]

Continue reading


Virtualization

Virtualization, in computing, is a term that refers to the various techniques, methods or approaches of creating a virtual (rather than actual) version of something, such as a virtual hardware platform, operating system (OS), storage device, or network resources. Hardware virtualization or platform virtualization refers to the creation of a virtual machine that acts like […]

Continue reading


Digital Forensics

What is odessa? It’s an acronym for “Open Digital Evidence Search and Seizure Architecture” The intent of this project is to provide a completely open and extensible suite of tools for performing digital evidence analysis as well as a means of generating a usable report detailing the analysis and any findings. The odessa tool suite […]

Continue reading


Information Systems Security

The Open Source Security Testing Methodologyhttp://www.isecom.org/mirror/OSSTMM.3.pdf The Information Systems Security Assessment Framework (ISSAF) seeks to integrate the following management tools and internal control checklists: Evaluate the organizations information security policies & processes to report on their compliance with IT industry standards, and applicable laws and regulatory requirements Identify and assess the business dependencies on infrastructure […]

Continue reading