Japan Approved The Largest Military Budget Since World War II: What are they spending it on?

Japan has recently approved the largest military budget since World War II. The regional security concerns are the natural drivers of this investment, but interestingly, the US DoD budgets cuts seem to be having the biggest impact. US forces are scrimping and pulling back resources wherever they can; meanwhile encouraging the coalitions to pick up […]

ENIAC: The World’s First Computer Has Finally Been Resurrected

From Wired: Eccentric billionaires are tough to impress, so their minions must always think big when handed vague assignments. Ross Perot’s staffers did just that in 2006, when their boss declared that he wanted to decorate his Plano, Texas, headquarters with relics from computing history. Aware that a few measly Apple I’s and Altair 880’s […]

A Storify Dialog on Cyber Hurricane Katrina

Editor’s note: What follows is extracted from a storify post . This is a first post in this format for the CTOvision blog. Let us know what you think  on any aspect of this, including format in your browser, format in your newsletters and of course content- bg. The Foreign Policy Research Institute recently held a webinar […]

Cyber Offense, Defense, and Economics

The Center for Strategic and Budgetary Assessments (CSBA)–known for its assessments of the precision-strike revolution and work on Air Sea Battle–is tackling the intellectual challenge of cyber strategy. Its new report, Cyber Warfare: A ‘Nuclear’ Option? has not gotten much play in the blogosphere but has a number of interesting ideas. CSBA challenges dogmas on both sides […]

Meet Professor Norden, Chief of the Research Staff

You may recall the incredible story by Arthur C. Clarke titled “Superiority” (available in the collection: The Collected Stories of Arthur C. Clarke).  This short story, written in 1951, is such a great read because it captures some key, apparently enduring qualities of militaries that become seduced by their technological superiority. The result: Even though the […]

In Search of a Russian Winter of Information Systems Security

Bob Gourley recently wrote about the dangers of a Maginot Line approach to network security in “The Maginot Line of Information Systems Security”, based on of the paper by Dr. Rick Forno. In the Second World War, the French relied on the Maginot Line, a string of fortifications along the German border, to repel invaders. Feeling secure […]