The broken “moral unity of man” according to F. Schlegel

Only a philosophical study of history may reach to its deeper secrets. In particular, if we seek a meaning, it is essential to look for completeness. Schlegel may be wrong in assuming an original unity of “nations,” but his diagnosis of the status of the mind in the modern world seems right. The following text … Continue reading The broken “moral unity of man” according to F. Schlegel

Security Lost and Recovered (and 4)

A transition to “complete” Security (in the sense described in the previous sections) requires a rediscovery of the context, this complex mesh of relationships through which we live and operate. This change must leverage a recognition of the personal, psychological, organisational and technical aspects. In following this path we need to base the IT disciplines … Continue reading Security Lost and Recovered (and 4)

Security Lost and Recovered (3)

A “complete Security” approach –in the sense I introduced in the previous article (http://carlos-trigoso.com/2014/04/28/security-lost-and-recovered-2/ ) applies a modal logic to grasp the fundamental aspects of any Security arrangement. This is a “deontic logic,” i.e. a logic of obligation, prohibition, interdiction and permission, which is able to represent the various moments of a Security model. In … Continue reading Security Lost and Recovered (3)

Alexander: “Independent Regions”

For many years, the following text from Christopher Alexander (A Pattern Language: Towns, Buildings, Construction, 1977) has been a fundamental reference for my understanding of the problems of human development.   “INDEPENDENT REGIONS “Metropolitan regions will not come to balance until each one is small and autonomous enough to be an independent sphere of culture. Therefore: … Continue reading Alexander: “Independent Regions”

Mirage of “Technology”

There is no Security consulting intervention that does not require organisational transformation. It is not only unsatisfactory, but definitely damaging to think otherwise. Security problems appear precisely then when the technology pretends to "automate" processes and safeguards that never existed or are weak in the organisation. Nevertheless the mirage of technology is still presented as … Continue reading Mirage of “Technology”

The Hewitt Actor Model and the Labyrinth of Metaphysics

There is a philosophical sense in which all entities (beings) should be comprehended (not only re-presented) as bundles of actions or “activities.” In turn, every action should be understood as a perception. To that end, Carl Hewitt’s Actor Model has been the obligatory point of reference for any discussion of concurrent computation and concurrent hardware … Continue reading The Hewitt Actor Model and the Labyrinth of Metaphysics

“Using Erlang in a Web Start-up”

  In “Using Erlang In A Web Start-Up,” Gordon Guthrie (hypernumbers.com) summarises the structural problem that Erlang environments bring to the Solution and the Security Architect: “Security is the  Achilles heel of Erlang. Due to the trusted nature of telephony networks (at least compared to the internet)Erlang has no security.  All nodes in an Erlang … Continue reading “Using Erlang in a Web Start-up”