Monthly Archives: August 2009


Technology review recently provided another example of cyberbullying. When people take their disagreements online and use identity information to smear someone’s reputation or attack them it is not a joke.

Posted in Reputation | Leave a comment

Beckstrom’s Law

Beckstrom’s law says the value of the network is not the square of the number of nodes, it is the difference between the value of the transactions and the costs. as a formula: V = B – C’ – SI … Continue reading

Posted in Security | Leave a comment

Smart Meters Not Ready for Primetime

Example in the cleantech field where new technology is being deployed before fundamental security issues have been addressed. Fixing the problems after a security compromise is a lot more expensive. Some of the more dangerous new features should be delayed … Continue reading

Posted in Security | Leave a comment