Voltaire and the Responsibility of Free Thought
After reviewing Sun Tzu and reflecting on two of my favorite battles, Cannae and Aljubarrota, it feels like the right moment to unwind a bit. War is a serious subject. It is fascinating to study fo...
After reviewing Sun Tzu and reflecting on two of my favorite battles, Cannae and Aljubarrota, it feels like the right moment to unwind a bit. War is a serious subject. It is fascinating to study fo...
Fought in Portugal in 1385, the Battle of Aljubarrota does not enjoy the same global spotlight as Cannae, Thermopylae, or other classical engagements. And yet, within medieval warfare, it stands as...
Hannibal Barca may never have met Sun Tzu or read The Art of War, but through his father and his early campaigns in Iberia, he became a student of warfare from a very young age. That education woul...
In a previous post, I argued that RTS games expose many of the same strategic principles described in The Art of War. But strategy only matters when it survives contact with the opponent. The ladde...
Sun Tzu never knew what a video game was. He never saw a keyboard, a mouse, or a minimap. He certainly never planned a Zergling run-by or a Dark Templar drop. And yet, many of the principles descri...
Recently I saw some interesting traffic in some of my engineering posts. Since I’m not using any analytics, besides my Nginx-Based Web Analytics script, I was wondering if the traffic reading was a...
In my Security by Design post, I listed Minimize Attack Surface as one of the core principles. Minimizing the attack surface is more than just closing open ports. While closing unnecessary ports, a...
Recently, there has been growing political debate around restricting social media access for teens under 13 or 16. Australia has already implemented a nationwide ban for those under 16. Several Eur...
I’ve always enjoyed the Predator movies, even if it isn’t exactly my favorite sci-fi franchise. Like Alien, the series has had its ups and downs, with the classics still standing as the strongest e...
Building secure software depends on a range of elements. Infrastructure matters, but a large part of a system’s actual risk profile is determined much earlier: in the way it is designed. Even a wel...