RSS

Category Archives: Documents & Applications

All posts to share a document, file, or other non-post type of item are categorized here in order to group them for navigation and search. Any post related to the document will be grouped by category and tag given whatever association is relevant.

Application for Microsoft Academic Search App ID

Contact Person: Levii Smith
Contact Email: smithlev@levii.com 

The abundance of academic publications coupled with the highly specific nature of each publication makes the process of research extremely tedious. Existing academic search engines generally rank results by relevance to query keywords. Furthermore, the results are returned as a long list of links, which is easy to skim but difficult to actually use. These characteristics (based on web search) are not ideal for the domain of academic publications – when doing research, we want to know what the important papers are as well as the relevant ones, and also easily navigate between papers while remaining aware of the context of the search.

One useful measure of importance is number of citations (used by e.g. MS Academic Search and Google Scholar). We propose using this reference information to visualize the local neighborhood of a paper within the larger graph of academic publications. This is similar to the MAS citation graph, but would present both forward and backward references as well as make the vital features of importance and relevance more obvious to the user. This would facilitate rapid discovery of important information in fields unfamiliar to the user.

I have read and agreed with the Microsoft/MAS Terms of Use.
Microsoft Terms of Use
Microsoft Academic Search Terms of Use

Project URL: http://levii.com/academic-search-and-reference-visualization

 

Tags: , , ,

Safely Moving Sensitive Data Outside of the Organization: Using Outlook to Encrypt to External Entities

Sensitive information, whether: PKIMail-Simplified

  • FOUO documents being handled for the government
  • PII during hiring and staffing
  • Proprietary or confidential company information
  • Competition sensitive intelligence
  • Or any other protection required data (PRD)

Require special use and handling of digital communications.  Unfortunately, a lack of education and familiarity with available methods leads to (1) data either being exchanged using insecure means, or (2) a breakdown in communication.

Sharing this information without protection has significant implications under both criminal and civil law, as I’ve discussed before relating to issues of negligent entrustment.  Even so, it is quite often an area of Information Assurance (IA) delegated to the lowest levels to implement and follow from a policy perspective.  Given that breach could be a public-relations nightmare, and that statutory liability could be financially destructive to a firm; it’s essential that data is protected at rest, and while in transit.

Truthfully, among the methods available for dealing with risk (i.e. insurance, transference, mitigation, avoidance), the simplest in this regard is avoidance.  “Just don’t send PRD”.  However, a knee-jerk reaction not share sensitive data can be problematic to the operation of many organizational programs, and an intentional breakdown of the ability to engage in transparent operation is not only inefficient, but can signal larger communication issues likely to exist.

Too frequently, I’ve encountered the assumption that encrypted mail cannot be exchanged between unrelated organizations, though it really is a simple process that seems extraordinary. I think this is due in part to the lack of education we provide as part of corporate/government/etc. cyber-awareness programs, but is certainly due to the fact that the first step in the process (the public key exchange) is typically automated and transparent.  Since the advent of Kerberos, however, virtually every directory structure with a modern authentication uses some form of certificate authority (CA), and having neither PKI certificates available within an organization, or certificates signed by an external CA (eCA) borders on negligence.

This paper provides a short guide to address this gap, and assumes one of the most common scenarios within the enterprise; the use of a public key infrastructure and Microsoft Outlook. Though certainly relevant to contractors and the DoD, it remains applicable anywhere that meets these two criteria.

View Fullscreen
 

CNAP – Semester 1 – Chapters 10-15

(A Story of “How Levii met Tara”)

The fifth and final of a the Semester 1 training series of material. I’d originally developed this material late at night … or the wee hours of the morning, depending on your perspective. All four Semesters were originally developed while living in Abilene, TX; with later revisions after I’d moved to: San Antonio, TX; O’Fallon, IL; and Sembach, DE. The last update was made around 2005-2006 as a final handoff of instructional material to the 21st OWS systems flight to help prepare them for the CCNA examination, and as part of an after-hours DoD 8570 study group I formed for the IT/IS airmen in the area.

View Fullscreen

Much of the work that went into developing a curriculum, summarizing data for these slides, and spending countless hours with stacks of books from Cisco Press could certainly be considered preparatory to other courses I’ve taught, any number of papers that I eventually did write, and a foundation to my self-identity as a person that enjoys sharing their knowledge; that would miss a key outcome. Those that know me have likely heard the story on how one of my earliest managers (and current colleague BTW) “conned” me into moving to Abilene. It was the light nights studying and working on this material, however, that introduced me to meet Tara. She took an interest in this strange young guy that showed up to IHOP every night with a laptop and stack of books, and who would eat his dinner with a gallon of coffee. So while I certainly hope this material finds a use to someone else, the opportunity to go back through it reinvigorates the memories of that first Christmas away from home, working on these slides, and the period that I was making a new friend; who years later … would become my wife.

This presentation covers the concepts of routing and addressing. Likely one of the most difficult areas for many people to initially grasp, sub-netting/CIDR were the subject of a few hours practice and working through problems as a group. I would typically run through three different methods of solving the problem, with increasing levels of decomposition and explanatory description back to the other methods. It’s my experience that subjects like this, as with many others that involve: formulas, solutions, proofs, sequential problem breakdown, etc., that could be solved multiple ways are often picked up quickly by the first 10% of a population, and they tend to be comfortable with multiple methods. The next 65% or so of the students will pick up given a second round of detailed explanation, but this group (and the final 25%) can be thrown back “off track” when demonstrating alternate methods, or further decomposition of the problem. It’s at this point then, that once a student ad the “ah ha!” moment, I would typically advise a student to excuse themselves from the class for remainder of the day, and give the sample problems a practice run a few hours later.

Reference Files:

The assessments and practical exam were delivered at the end of the Semester and are available below for reference.

 
Leave a comment

Posted by on December 20, 2013 in Documents & Applications

 

CNAP – Semester 1 – Chapters 8 & 9

The fourth part of the inter-networking training material provides basic information on infrastructure and cabling standards.

View Fullscreen

Reference Files:

The assessments and practical exam were delivered at the end of the Semester and are available below for reference.

 
Leave a comment

Posted by on December 20, 2013 in Documents & Applications

 

CNAP – Semester 1 – Chapters 5-7

The third installment of the material developed, this presentation focuses on: media, network topologies, and introduces MAC addressing with basic Layer 2 & 3 functional knowledge.

View Fullscreen

Reference Files:

The assessments and practical exam were delivered at the end of the Semester and are available below for reference.

 
Leave a comment

Posted by on December 20, 2013 in Documents & Applications

 

CNAP – Semester 1 – Chapters 3 & 4

The second of five presentations used for background for the training programs I ran until around 2005. This deck provides basic information about LAN devices, network topologies, and the basics of electrical theory used for inter-networking communications.

View Fullscreen

Reference Files:

The assessments and practical exam were delivered at the end of the Semester and are available below for reference.

 
Leave a comment

Posted by on December 20, 2013 in Documents & Applications

 

CNAP – Semester 1 – Chapters 1 & 2

These are the first chapters of the Semester 1 slides I developed for use in the Structured on the Job (SOJT) training program for the Air Force (AF) Cisco Networking Academy Program (CNAP), along with the background lab configuration and practical exam I required for course completion. The courses were taught over a 10 day period of four (4) hours per day.  The individual lab assignments, some of the graphics, and the reading material are (C) Cisco Systems 2003 and are utilized under the fair-use sections of Copyright for training and education purposes.  Feel free to use any material on this site, and attribution back is greatly appreciated.

View Fullscreen

Reference Files:

The assessments and practical exam were delivered at the end of the Semester and are available below for reference.

 
Leave a comment

Posted by on December 20, 2013 in Documents & Applications

 
 
%d bloggers like this: