Well, I finished one of my papers for the quarter, all 5,814 words of it!
I am posting it here for review. The topic is Information System Development research from 2000-2010, and it is a quantitative review of research articles published during that time period.
It's a good paper, but it's a bit dry because of the requirements of the course. Good original research results in it, though. It is definitely way more than the required literature review.
So, enjoy if you dare. Next quarter will be more exciting as I have some stuff that should be published soon on biologically inspired computing.
Jon
Research in Information System Development: An Analysis of Approach and Method
Hi everyone,
Yeah, the web needs another blog..... So why read this one?
Easy. There will be some really neat information about some new research that I will be doing for my PhD in IT-information security. It falls along the lines of biologically inspired computing towards the trustworthy computing initiative. Even though this is a Microsoft concept, it is a universal one. It basically means that you press the power button on your computer and.... that's it! No configuration problems, no viruses, no crashes, all the emails that you send are guaranteed to go to the correct person, no spoofed phishing sites, no botnets or zombies, and, if you buy a new accessory, you plug it in and it WORKS. Yes, I did say that this was a MICROSOFT initiative. Kinda surprising with the way that they do business sometimes, but, hey, their heart is in the right place.
I feel that one of the exciting fields that can get us closer to this concept is Biologically Inspired Computing, or observing and taking ideas from Mommy Nature and applying them through some really creative code and hardware. There has been a lot of work done on some of the areas like: Ant Heuristics, Artificial Intelligence, Neural Nets, Gene Replication, and so on. It's a fantastically interesting field and I recommend doing some reading on it.
As well as following my research, this blog will be used to show tips and tricks that I learn as I delve into the wiry depths of IT. There will be a lot of stuff about Information Security, penetration testing, and vulnerabilities. Along the way I am sure there will be lots of little stuff that gets in the way of ideas, like "How do I find...." or "What command is for this?" All that will be posted here as well.
This site is closely affiliated with my friend and research associate, Peter. He is running a blog along the way as well. Peter is awesome at solving tech issues and I highly recommend his blog for some great tricks and techniques. He's doing some great things with Linux right now.
So, enjoy the site! I hope you find something of interest, and if you do, drop a quick comment please.
Jon