This is part of the Abstract and Introduction I wrote for a paper for the DHS on PIINs, a concept of my own. I am writing a much lengthier essay/paper (perhaps even a small book) on the same subject which will include information on how to form PIINs of various kinds and in different industries using the same basic techniques and procedures and networks.

I use these same principles in the development of all of my PIINs regardless or industry or purpose. Although each PIIN is modified to service the particular requirements of how it is constructed and what exact purpose it serves.

Although this is a little out of order for my publishing schedule I offer this post up as my Business of Business post this week.


First of all, let me summarize the nature of the PIIN. The Personal (or Private) Intelligence and Investigative Network, like all networks is almost entirely dependent upon a series of established contact points. This is both the strength of the PIIN and the inherent weakness thereof. Therefore it is imperative that high-quality and functionally useful, as well as accurate and practical contact points be created, assessed and reassessed, and maintained over time. This is true whether the contact point is physical, biological, communicative, informational, electronic, technological, or computational. Every asset is a tool and the quality and functionality of those tools are the essential elements in the creation, maintenance, and performance of your PIIN. The Value of any Network is circumscribed by the acute and chronic qualities of those components, which within themselves compose the actual circumference, and separate elements of that real network. If the components of the network are of inferior grade, if the contacts are defectively impositional or of little practical use, or if the contact points are weak or insecure then the entire network is suspect and prone to failure at any and every point of transmission. The PIIN therefore should avoid both obvious and subtle deficits at all times by being practically and pragmatically useful, flexible, adaptable, in a state of constant positive growth and change, accessible, composed of superior components and contact points, secure, and most of all accurate and reliable.

Each and every network is therefore dependent upon the depth and breadth of the human contacts established interior to and exterior to that particular network and subject to the limitations of accuracy and the quality and quantity of valuable information that network can generate. The first real action needed to establish any PIIN and to make it fully functional is the recruitment, development, and maintenance of quality contacts. Contacts are always of the most absolute importance in the establishment of any PIIN. In addition the nature and quality of those contacts should be viewed as central and formative to the capabilities of every other contact point in the configuration and to the network as a whole. After an initial establishment of contacts those contacts should be immediately vetted and/or tested for accuracy and quality. This process of discrimination should be both an immediate tactical and testable undertaking and a long-term strategic process of recurring verification and reverification. Do not expect any particular source to be always accurate, but do not allow any particular source to function in an important role unless it has proven itself capable of both consistent reliability and trustworthiness.

After establishing a few reliable and trustworthy contact points the network must grow in order to gain new sources of information and intelligence as well as to develop and generate new capabilities. Therefore always view already established contacts and contact points as generators of new contacts, informants, intelligence and perhaps even secondary and tertiary networks, or sub-networks. Consider as well every potentially useful new contact or acquaintance as a possible future contact point in your greater network. Contact points should also be capable of redundancy and potential verification of information and intelligence gathered from other points along the nexus and for information gathered from sources outside the network. This is to say that contact points are more than simple sources of information; they will also function as multi-capable nodes along the operational structure of the entire network. I will expound upon the importance of and briefly discuss some of the details regarding contact points later in this paper. For now it is important to remember that contacts and sources provide information and possibly intelligence, but contact points can potentially serve many varied functions, such as; information retrieval, intelligence gathering, analysis, communications, coding, encryption, decoding/decryption, collation, research, as reliable and secure relay points, as information nodes, computational capabilities, disinformation and misinformation dissemination, and even serve as a sort of network disguise, and misdirectional cover or front.

Constantly look for, search out and develop new contacts, contact points, information and intelligence sources, and informants in order to successfully grow your network. Your network’s ultimate effectiveness will depend upon both the quality and quantity of your contacts, contact points, and your contact’s network. In the initial stages of building and developing your network concentrate on the quality of your contacts and contact points, but in the larger and long term concentrate upon both the quality and quantity of those contacts and contact points which comprise the elements of your network. Always develop and maintain quality to the greatest degree possible within all elements of your network, but also always grow and encourage quantity in the most consistent manner possible throughout all aspects of your network. This will assure that your network has both great depth and breadth and that it is capable of the widest and most valuable range of flexible and functional capacities possible.

It does not matter what the major focus of your network is, what it is most well designed to do, what it in actuality best does, or what the functional intent(s) or objective(s) may be, this introductory advice applies equally well to any possible network you might desire to establish in any field of activity or enterprise. The PIIN is a potentially invaluable tool for both the amateur and professional alike, for both citizen and official agent, and no matter the function or objective, the real capabilities of any established PIIN will be determined by the inventiveness, innovation, flexibility, enterprise, imagination and quality of the component parts of the network. And those component parts are composed and arranged by the originator of the network, that individual who is responsible for first establishing the nature and parameters of the own individual PIIN. The originator therefore will establish the genesis of the network and how well it grows and develops in the initial stages, but as the network grows it will develop capabilities never earlier imagined by the originator and will eventually become functional in an almost independent sense, as long as quality contacts and sources are developed and as long as those contacts and sources continue to grow and establish new capabilities and contacts of their own. A PIIN begins therefore as an idea and individual construct but over time develops into an almost biological organization of vast complexity and capacity. Drawing upon the collective skills and capabilities of the PIIN for whatever is desired or needed makes the PIIN a worthwhile and profitable venture for all individuals associated with that network, and because of the potential for continued and even exponential growth the PIIN is an extremely advantageous system of achieving complex objectives rapidly and of multiplying capabilities well beyond the individual level.

Because of the limitations of space regarding this essay I cannot describe all of the potential advantages that would possibly be gained by the formation of individual PIINs, either those advantages that would be enjoyed by agents or officers in the service of some official organization, or those advantages that would be enjoyed by citizens who have formed and are employing their own personal PIIN. But the potential advantages would be numerous, and such networks could beneficially overlap, inform, and service each other in times of national emergency or crisis. More importantly, if such networks were allowed to “cluster” and interact/interface in an efficient, secure, and positive manner then they would serve as invaluable intelligence gathering and investigative tools for the anticipation of disaster and the effective prevention and thwarting of many forms of malicious harm intended by the enemies of the United States.

As just one small example of how PIINs would make highly effective and useful tools for the benefit of both the citizenry and the government let me outline this scenario. A hostile entity decides upon a coordinated and simultaneous cyber-attack against both the American civil government and the Pentagon. These attacks overwhelm official servers who are the obvious targets of offensive action. During such periods of particular and isolated cyber attack against governmental and/or military networks, or even during periods of general and on-going netcentric engagement or warfare the PIIN can act as an emergency secondary or redundancy system of information and communications exchange, intelligence gathering, an investigative force as to who is attacking, why, from where, and how, and for coordinating a necessary and effective counteraction or response. While main systems are under attack, disabled, or malfunctioning PIINs can serve as ancillary and even secretive means of continuing vital operations or responding to attack. It is relatively easy to attack and at least temporarily paralyze large-scale and centralized networks efficiently given the proper time, coordination, planning, resources, incentives, and information on system vulnerabilities, but it would be nearly impossible to simultaneously disable all small-scale private and personal networks. PIINs are the private enterprise of innovative intelligence and investigative networks.

Other examples of the potential usefulness of the PIIN are easy enough to construct, such as creating and fostering “bridging links” between individual citizens, law enforcement agencies, governmental entities, and the military. PIINs can also be used as investigative networks and resources, as research hubs, as communication nodes, as a pool of expertise (both amateur and professional), as an emergency system of collective and clustered capability, as a functional and ever growing database of information, as an ancillary or auxiliary analytical network, and as an exchange for valuable contacts, sources, and useful informants. Perhaps just as important to the overall value-added aspect of the usefulness of the PIIN is the fact that most PIINs can be constructed at little to no cost using already available personal, technological, and organizational resources. It is simply a matter of redirecting already available resources to the construction and maintenance of the PIIN, or of simply reformatting the way in which contemporary networks are thought of and how they currently operate, or fail to operate, effectively.

The next administration would do very well to consider encouraging the development of Private and Personal Intelligence and Investigative Networks throughout our society, and to encouraging the exploitation of such networks for the benefit of all the citizens of the United States of America.



How to Format Your Resume

The College of Westchester Online Division

The content of your resume—job experience, education, achievements—is important, but the appearance of the actual document also says a lot about you as a candidate. This infographic offers some tips on how to format your resume.

The College of Westchester offers resources to help students and graduates stand out to potential employers. Check us out to learn more.

From JobCluster

View original post

Getting in On LinkedIn

5th and Grenelle

The greatest lesson taught in DC is the power of professionalism. From building a network to perfecting a handshake, learning the steps towards a professional career is essential and valuable. DC is the ideal city in which to master these skills based on its production of highly successful politicians, business people, and scholars.

The BUDC program in particular has focused on networking, acquiring the motivation to pursue a career path, getting involved in the DC community, and being conscious of a professional online presence. The latter is the point I’m going to address. On the topic of professionalism, there is no better online social media to talk about than LinkedIn. LinkedIn can be a powerful tool if you know how to make the most of it.

Here are my LinkedIn recommendations:

Guide to Linkedin

Having an online presence is extremely important for our generation. Especially because I plan on pursuing a career path…

View original post 141 more words

Stop selling your soul for a loan: Online lenders solve cash flow problems with faster money lifeline

Financial Post

Yaniv Liron has pulled cash and credit from every available source to keep his 11-year-old web design and development business, Lumina, running smoothly — a situation familiar to many small business owners.

Even though his company, in New York City, is established and profitable, obtaining a bank loan or credit line has always been painful. The paperwork takes days to prepare, approval decisions can drag on for weeks or months, and the process, he said, “involves selling your soul and begging on your knees.”

Four months ago, he found a simpler source of working capital: Fundbox, a company that gives business owners cash advances against their outstanding invoices. Within an hour of signing up on Fundbox’s website and allowing access to his company’s bank account and accounting software, QuickBooks Online, Liron had a $2,500 credit line. It takes just a few mouse clicks for Liron to select an unpaid invoice…

View original post 749 more words

Living with a big YES: Overcoming Fear and Achieving Dreams by Ella Hooper

Bright Ideas Collective

We’re really excited to feature Ella Hooper as our guest blogger today for Fridays with Friends! I (Emily) met Ella a few weeks ago at a business conference and was so inspired by what she shared that I asked her to write a post for us, which she graciously agreed to do. She has profound words of wisdom and practical application in this post, I think you’ll enjoy it! Thanks so much Ella!


Recently I moved from Melbourne, Australia to attend a school in Northern California. I applied to the school spontaneously, was accepted, and needed to leave the Australia in 3 months. I had no savings and no idea how I was going to be able to live in another country where I couldn’t work. I am now 7 months in to living in America and how did I do it? A strong mind, great community and a belief…

View original post 571 more words


A very interesting perspective and one I agree with to a large extent. Actually I think one should set out to create a Brand – with a certain type of Vision, and adapt accordingly as one meets particular circumstances in and through the world. (Which is basically what he says later in the article.)

In other words one begins with a Vision and then discovers and develops as one goes along. It is not either/or, but both…


You Don’t Create Your Company’s Brand — You Discover It.
Matt Hanses

Writer & Consultant

April 15, 2015

Over $500 billion is spent on advertising each year. The average American is exposed to an estimated 3,000 ads per day. Fifteen minutes out of every hour of television programming is devoted to commercials.

Branding: 2 Key Lessons in Brand Building

That’s a lot of marketing. And a lot of marketers. With six million companies in the United States alone, that’s a lot of people competing to get their message out. How do you stand out from the crowd? How do you get noticed?

This is where branding comes in.
What is branding?

Branding is the art of distinguishing a product or service from its competitors. It’s the term for creating a recognizable “personality” which people will remember and react to.

A company with poor branding is throwing away marketing dollars. Why? Because without a focused message, companies weak in branding are invisible. Nobody remembers them and they blend in. They become just another leaf swirling in the wind, amid all those marketing messages consumers see each day.

In marketing, the point is to actually reach someone, to connect. The way to do this is by focusing attention, not dispersing it.
Discovering your brand

Too often, people try to “dream up” a brand for their company. However, a brand isn’t something you dream up — it’s something you discover. Specifically, it’s something you have to discover about yourself.

True branding must be based solely on the mission and culture of the organization. When people try to create branding separate from the company itself, the result may be pretentious, clichéd or ambiguous marketing. It waters down the company’s message.

Instead, a brand should reflect the company’s business plan, its mission and values. It has to be authentic. Therefore, when you brand a company (or anything else for that matter), you’re trying to capture its core identity. You have to look past the clutter and opinion and distill its true essence. This is what you convey to consumers — your brand. And your fonts, your design, your writing — all aspects of your marketing — should all align with that central concept. Now, you have focus. Now, you have penetration, because you’ve conveyed your company’s identity by first discovering yourself.

Related: The Basics of Branding
The ingredients of a brand

While there is probably no foolproof formula for discovering a company’s brand, there are pathways to accomplish that. Consider the following points the “ingredients” that go into making an authentic brand:

Company mission. This is the most important element of branding. Your mission is the spirit of your company, it’s the beating heart of what you do. In fact, your brand can be thought of as the outward expression of your company’s internal mission. Think of it this way: Why does your organization exist? What is it there for? You have assets, employees, vendors, relationships and internal systems. . . but why?
Values. What’s important to your company? What do you stand for? Every company has certain ideals that define what it is and does. These ideals could be environmental, social or ethical or could be standards of quality Whatever your company’s values are, they’re the very center of why you’re unique and are a crucial part of your brand.
Culture. Each company in the world has its own ethos — a particular style or panache. Whatever you call yours, embrace it. There may be a million competitors in your market space, but there’s only one you. Your company’s group culture is part of the fabric of who you are.
History. Your history tells a lot about you. Look to the company’s founders to help define your identity today. What were their values? What were they trying to accomplish? Every company came from somewhere. Your roots are an integral part of your company’s brand.
Plans. When you look at your next 10 years, where do you see yourself going? Your business plan and marketing strategy both influence how you present yourself and should be included in your branding. If you’re going after an entry-level market segment, don’t position yourself as a luxury brand. Your brand must encompass your real-world objectives.
Consumers. This is really what it’s all about. Your customers are the reason you exist. What are their needs? What do they think? Understanding your customers is a vital part of branding. Because if you don’t know whom you’re talking to, why bother to say anything at all?

It might take a bit of soul-searching to get at the essence of what makes your company special. The trick is to take a clear-eyed look and see what’s actually there. Because every brand is beautiful, every brand is inspiring.

Each just has to be discovered.


Bite what you can Chew

Well-observed and Wise Advice, especially for the inexperienced or those wishing to manage their growth in a logical and profitable manner.

The Wire Perspective

The time I have been around the business arena has taught me many lessons and one of those is not to take on endeavours that are more than your business can realistically manage.

Incomplete Temple Structure - India Incomplete Temple Structure – India

As small businesses the temptation to look out for that big break is always there. You want to get into the big time and because most of us have grown up in the ‘fast food’ era, we expect everything to work out instantly. Many are the stories of someone setting up a business targeting a ‘big deal’ with the expectation that it will see them take off comfortably.

More often than not, these businesses with alot of potential have chocked as a result of this approach and ended up in limbo. Not so long ago, an Internet Service provider that pioneered the use of internet services in remote areas using HF…

View original post 470 more words

#Startup #Financial Glossary

Beyond Boredom: 3 Steps for Refocusing Your Career

BlogPic414_Page_1I am seldom surprised at the types of challenges that advisers say they are experiencing because I have coached them for over 10 years, but in a recent Solutions Session, I heard a challenge that I must admit was unique.

Lori K, a veteran financial adviser with over 20 years in the business said, “My number one challenge is…well..that I’m bored,” she said emphatically.

I probed a bit.

“What exactly do you mean–bored with the work itself or the industry overall?”

She shared with me that she literally could retire because she was at “retirement age” but that she didn’t want to retire yet she was finding that she didn’t have the motivation she needed to grow her business any longer. Frankly she just wasn’t inspired to do any more than she absolutely had to.

I paused briefly before replying, “Lori, what you need is to get beyond your boredom.”

View original post 583 more words

How Virtual Assistants Can Help You Grow Your Business

virtually direct

Perfect Tasks for Your VA

Virtually most self-employed professionals or solo-business owner will reach the point where they can no longer run all the bases. More likely, they will start feeling overwhelmed with the day to day of running their business or feel like the “Jack of All Trades.” Did you know that it could represent as much as 80% in some cases? Yet many solo-business owners are often faced with a dilemma. Hiring full time staff to delegate specific tasks. In many cases this may not be an option.

Do you have enough actual work to justify full time staff? If not, is it possible to find somebody who has a range of skills so that you can allocate more than just a specific set of tasks to this person?

How many other costs are associated with taking on a new staff member? As business owners know only too well it’s simply not “just”…

View original post 444 more words

Getting Your Business Started – How To Advice

Micro Business Tips


Basically here’s my thoughts on starting a small business: You don’t need a loan, you don’t need investors and you sure as hell don’t need a partner. What you do need is ambition, a little bit of start up capital (like save some of your own money you’re saving) and a plan!

Here’s a quick checklist of things you should consider when starting a business:

  • Start with something you like to do or are passionate about
  • Will it monetize?
  • Surveys & market feedback
  • Select a good name that defines your business
  • Get registered with your state (if you’re in Indiana like me click here)

Please leave any comments or questions that you’d have below or on Twitter @microbiztips

I believe in giving credit…

View original post 47 more words


Had a superb idea for a new on-line business venture (start-up) called Unfinished Projects. I’m going to be approaching some potential partners with the idea later this week.

At this point I am merely creating the design sketches and outline for the business, but in a relatively short period of time I could easily develop both business and operating plans.

FremantleMedia Forms Joint Venture With BesTV, China Media Capital – MIPTV


bestv logoFremantleMedia is already active in the China market, having licensed such formats as Got Talent, Idol, The X Factor, Take Me Out and Family Feud to local broadcasters. Under a new partnership with media giants Shanghai Media Group and China Media Capital, the company will dig in further, creating and developing content specifically earmarked for the Middle Kingdom and destined for SMG’s Dragon TV and BesTV platforms. FremantleMedia International will handle worldwide distribution of the content that emerges from the joint venture.

china media capitalBased in Shanghai, the team will include what the partners say are “international experts,” along with local producers, to draw on Fremantle’s creative strengths. Stories will focus on Chinese values and tastes blended with Western structure and creativity.

The Chinese television market is growing rapidly and “the value of premium content is being created and manifested with unprecedented enthusiasmn,” says CMC founding chairman Ruigang Li…

View original post 107 more words

Tallwave has chosen the finalists in the High Tide startup competition


Source: Huffington Post Source: Huffington Post

Back in February, I wrote about a collaboration between Tallwave, a company dedicated to guiding fresh businesses on the path to permanence, and the owners of downtown Phoenix’s Luhrs City Center, which involved a competition called High Tide where entrepreneurs and startups present their ideas in hopes of winning $50,000 toward their enterprise along with resources valued at $45,000, as well as office space in Luhrs Tower.

Five finalists out of 75 from that competition were announced yesterday, and two will go on to receive the grand prize. The startups are based in digital technology, and have space in Luhrs Tower until June as they undergo a training program that involves “prototype building, marketplace testing, sales workshops, branding and customer validation” (Edelen). Tallwave CEO Jeffrey Pruitt said that while the program does provide a means for entrepreneurs to advance their startups with less risk, he emphasized its…

View original post 323 more words

Five Often Overlooked Steps to Getting Started as a Freelance Content Marketer

Live to Write - Write to Live

journey one stepSeven years ago this spring, I was a freshly minted single mom building a new life for myself and my daughter amidst the wreckage of a less-than-amicable divorce. I wasn’t sure how I was going to keep things afloat financially, but I knew I didn’t want to return to my old agency life of sixty-hour weeks and around-the-clock meetings. Having spent the first three years of her life at home with my little girl, I was determined to find a way to work as an independent freelancer.

Through the serendipitous inquiries of several acquaintances, I managed to land a couple of long-term, freelance project management gigs. I snapped up the chance to generate some semi-regular income working remotely; but – although I was (very) grateful for the opportunities – I knew that, ultimately, I didn’t want to build my business around project management. I wanted to write.

This is the…

View original post 1,820 more words

Good Ideas Are Not Enough

The Baseline Scenario

By James Kwak

Dan Davies put together a brilliant roundup of the clever business models that financial technology startups are pitching to their investors — and why most of them are deeply flawed. Some of them apply much more broadly than to just the financial services industry. Number three, for example — “Hoping that a load of people who actively mistrust each other will trust you instead” — is a decent description of the business-to-business marketplaces that Ariba was trying to build when I worked there back at the beginning of the millennium.

I’d like to add two more general principles that apply to technology companies that are trying to serve the financial services industry — mainly learned during my years working at an insurance software company before going to law school.

Read more on Medium …

(I’m going to try switching to a Brad DeLong-style approach in which I put the beginnings of my Medium posts here…

View original post 25 more words

It Can Wait. Really.: The Real Solution to Notification Overload

The Baseline Scenario

By James Kwak

Beeping iPads! Buzzing phones! Zapping watches! Soon, apparently, we won’t be able to complete a thought without being interrupted by some “intelligent” piece of technology.

The solution, according to Steven Levy, is yet more technology:

a great artificial intelligence effort to comb through our information, assess the urgency and relevance, and use a deep knowledge of who we are and what we think is important to deliver the right notifications at the right time. . . .

the automated intake of our information will allow us to “know by wire,” as super-smart systems learn how to parcel things out in the least annoying and most useful fashion. They will curate better than any human can.

First of all, I’m skeptical. So is Levy, apparently; just a few paragraphs up, he writes, “the idea of One Feed to Rule Them All is ultimately a pipe dream.” The same factors…

View original post 32 more words


The Missal

If possible always invent in imitation of Nature. God knows his designs.

By the way I have long considered and have experimented with the idea of a reactive liquid armor that both redirects projectile trajectories and disperses force in spread waves rather than attempts to meet it with direct resistance.

So I found this step forward to be doubly interesting. In construction method, in design, and as a pointer towards improved future capabilities.


Illustration of deformation mechanisms in laminates

Illustration of deformation mechanisms in laminates

Rudykh et al

Body armor suffers from a core tension: it must be light enough so the soldier wearing it can still fight effectively, but strong enough to actually stop bullets and shrapnel. Durable, shock-absorbing Kevlar is the current standard, but it can definitely be improved upon. What if…

View original post 262 more words


The modern men of the West rarely lack for sustenance of the body. What they most lack is substance of the Soul.

What they are most in need of is True Courage and Virtue. What they most hunger for, without even being aware of it, is Real Manhood.

If the modern man of the West were regularly fed Real Manhood, or even far better, if he could habitually grow his own, then the benefit to himself, and the profit to the entire World would be incalculable.

The Dangerous Combination of Banking and Fintech

Wall Street and Beyond

Everyone, it seems, is starting to take note of the burgeoning “Fintech” scene. Jamie Dimon even specifically referenced the threat from Silicon Valley in yesterday’s letter to shareholders’

“There are hundreds of startups with a lot of brains and money working on various alternatives to traditional banking. The ones you read about most are in the lending business, whereby the firms can lend to individuals and small businesses very quickly and – these entities believe – effectively by using Big Data to enhance credit underwriting. They are very good at reducing the “pain points” in that they can make loans in minutes, which might take banks weeks. We are going to work hard to make our services as seamless and competitive as theirs. And we also are completely comfortable with partnering where it makes sense.”

The fact is that banking is a field in which there hasn’t been much innovation…

View original post 903 more words

The Value of Exploitation

There is an awful lot here that I totally disagree with and that to me obviously misses the point. But as a general observation on value, money, and especially the hidden and intangible nature of “modern money” I think the author made some brilliant observations.

And I do not think that can continue, at least not in the current sense, because it is being constantly exposed by technology. On the other hand both technology and culture is allowing for the very opposite of what I said in the previous sentence, the “invisibility of immediate and perceptive value.” In a general sense.

I also have nothing at all against exploitation, or manipulation. Both are merely methods, it depends entirely upon how you put them to use. Exploitation and manipulation by tyranny, and theft, and seizing of the property and money of others is equally bad whether this is done by a street thug, or a government in the guise of taxation.

On the other hand the positive exploitation of your own talents, and of the talents of others, for some good end is entirely honorable and to be pursued at every opportunity if profits are shared equitably and fairly.

And manipulation of yourself and of others in a Virtuous and self-disciplined manner, that is entirely noteworthy and good. That is to say you want to increase Virtue, just as you do profit, and every available opportunity. That’s exactly how you should be manipulating things.

I know modern people love to think in either/or terms: them/us, wealthy/poor, have/have not, genius/stupid, and that terms like exploitation can only possibly mean, “bad, wrong, immoral, etc.”

They’re propagandized to think that way. That’s why they have so much bad, wrong, immorality, poverty, etc. They can’t get past their models and their paradigms to what should be their real objectives – everyone prospering, everyone fully exploiting what is best about themselves and others (rather than just being consumed with exploiting for entirely malignant advantage), etc. etc.

That is what cannot continue indefinitely.

Then again look at human history. We’re pretty damned good at it… and we don’t much bother to explore any more profitable venues.

The music industry has a math problem

I suspect that there is much to be said by the criticism of the mathematical model detailed in this article. I also suspect there are some simple algorithmic solutions, such as number of downloads in a given period of time – time popularity compression (equates to a greater payout), number of repeat downloads (equals greater payouts), number of on-going and continuous downloads (equals greater payouts), number of downloads that translate into live performance gigs, total number of downloads (all payouts in all categories being proportional profit rates as popularity increases), etc. etc. – that is you would use mathematical models that mimic or equate to the traditional industry musical models and apply them to the new standards in a graduated fashion. The profitability scale would increase over time as the measurement standards are reached and exceeded.

There would be a very logical and justifiable productivity to profitability scale.

Not very difficult to do at all, you just plug in the new equations at the particular rates that make profitability in comparison to the standard industry equivalents.

Just as math pointed out the discrepancies in the profitability models it can be used to formulate new models that either mimic the old models or improve upon the old models.

Active Defense: Security Operations Evolved

I completely agree with the idea that current cyber-defense models are wholly inadequate. What we need are anticipatory models (systems and applications really) that can successfully discriminate between normal operations and impending attacks and thwart them before they occur, not after.


Mark G. Manglicmot, Adam C. Tyra


Static cyber defenses based on fixed sensors and event correlation have proven insufficient. Defenders have adopted the cyber equivalent of placing a cop on a street corner with a pile of mug shots in the hopes that a criminal will walk close enough to be seen. However, as most bad guy hunters would attest, fighting evil consistently requires you to proactively investigate it, hunt it down, and kick in the door where you find it. The key here is hunting. Companies must evolve their security operations to proactively hunt intruders and either eradicate them from the network or confirm that they were not there in the first place.

In this paper, we present an “Active Defense” approach to security operations fusing enhanced infrastructure awareness with timely threat intelligence to surgically interrogate, monitor, and defend critical business enclaves. A holistic strategy is outlined along…

View original post 9,021 more words