A “complete Security” approach –in the sense I introduced in the previous article (https://carlos-trigoso.com/2014/04/28/security-lost-and-recovered-2/ ) applies a modal logic to grasp the fundamental aspects of any Security arrangement. This is a “deontic logic,” i.e. a logic of obligation, prohibition, interdiction and permission, which is able to represent the various moments of a Security model. In … Continue reading Security Lost and Recovered (3)
Month: April 2014
Security Lost and Recovered (2)
A “complete” security strategy can be understood if we adopt an “information-theoretical” point of view. To do so, it is useful to describe the approach in the same way as we would consider a business model. A high level model of a business architecture shows the relationships between the participants, and the different functions and … Continue reading Security Lost and Recovered (2)
Security Lost and Recovered (1)
What have I learned in the 15 years I have been active in the Security profession? One thing, centrally: that Security must be complete or it will be meaningless. I need to explain what the term “complete” means in this context, first to avoid misunderstandings, but also to introduce a qualitative approach to Security. In … Continue reading Security Lost and Recovered (1)
Alexander: Independent Regions
For many years, the following text from Christopher Alexander (A Pattern Language: Towns, Buildings, Construction, 1977) has been a fundamental reference for my understanding of the problems of human development. “INDEPENDENT REGIONS “Metropolitan regions will not come to balance until each one is small and autonomous enough to be an independent sphere of culture. Therefore: … Continue reading Alexander: Independent Regions
Duality of the IT Function
Many times in conversation or debate it is useful to “step back” from the immediate matters at hand and look at the context. Having written that, I am even inclined to say that this is always the case, especially when addressing technology strategy. If we do so we will notice there are obvious problems with … Continue reading Duality of the IT Function
The Progress-Philistine
L. Klages describes the "progress philistine" as follows: "Listen to him chattering about how far "we" have come, how wonderful is the time in which "we" live, and how delightful are the gadgets that are available to "us"... Everything that he says sounds like the babbling of a carnival conjuror, everything that he says reveals … Continue reading The Progress-Philistine
The Traveler and the Gardener
A story told by Zhuang Zhou (Zhuangzi, 369 BC-286 BC): A traveler sees a gardener irrigating a plot of vegetables using a bucket; the traveler advises the gardener to use a machine that will do this work for him. The gardener says: "I have heard from my teacher that those who have cunning implements are cunning in their dealings, and … Continue reading The Traveler and the Gardener