Boeing Acquisitions 2008-2010

My twitter feed once again signals a Boeing acquisition. Cutting lots of fat internally while buying more companies doesn’t compute, but oh well. I decided to go back a few years to see just how many companies had been purchased. Newest-to-Oldest sort 2010 Summit CDM Technologies Narus Argon ST 2009 eXMeritus Alenia Vought Operations 2008 DRT Federated Software Group Tapestry Solutions Insitu ** **

November 22, 2010 · 1 min · Nick

Updated Stable

Since a lot of my fellow nerds have mentioned they are looking at the stables page, I updated the computers as well as providing some insight into why each machine is important to me. Still missing a ton of systems, but most are there. http://geekyschmidt.com/the-stable

November 13, 2010 · 1 min · Nick

Multi-core Security

A question from a distinguished colleague of mine: Q: Some security group is claiming that locking apps down to a single cpu is more secure that multi-threaded apps. Is there any basis in fact that I don’t know of or is this as ridiculous as I think it is? – Distinguished Dude A: It is called Side Channel Attacks…thus far its only a theory that has no known in the wild exploit ...

September 8, 2010 · 2 min · Nick

5 Years Since Katrina

Contents 1 Katrina 1.1 The Move 1.2 The Storm 1.3 The Evacuation 1.4 The Night before the Storm 1.5 The Morning of Truth 1.6 The Afternoon/Evening of Boredom 1.7 The Trip to Shreveport 1.8 The Aftermath 1.8.1 Share this: Katrina I haven’t written much about my time during Katrina, but I wanted to put some thoughts to paper as I don’t want to forget when I am older. I have waited 5 years to write this, I hope it was worth it. ...

August 30, 2010 · 16 min · Nick

“Netcraft confirms PGP Email Encryption is Dead!”

Rakkhi posted a great Lessons Learned on implementing email encryption: http://rakkhi.blogspot.com/2010/08/implementing-email-encryption-lessons.html The post got me thinking because I struggle dealing with subcontractors getting encryption. I refuse to send sensitive or even somewhat sensitive data over unencrypted links, but find that small (and even midsize companies) do not have the resources to implement. In a bind I have trained them on installing GnuPG and doing trusted exchanges, but the same pitfalls occur. ...

August 28, 2010 · 3 min · Nick