Home > Standards Blog

Advanced Search 

Welcome to ConsortiumInfo.org
Thursday, November 27 2014 @ 04:33 AM CST

Email Article To a Friend View Printable Version

The Lafayette Deception, Chap. 4: Got a Match?

Lafayette Deception (a Cyber Thriller)

Welcome to the sequel to The Alexandria Project, a cybersecurity thriller.  If you'd like to read the book this series is based on, you can read the first three chapters for free here (just click on the cover of the book). You can read a new chapter of The Lafayette Deception here every Monday. 

It was early afternoon when Frank and Josette rolled slowly into Gerlach, following a 1960’s era VW minibus.  Behind them was something that resembled a cross between a Viking long ship and a Mississippi river boat.  (“Ah! An Art Car!” Josette exclaimed.)

They hadn’t expected to find much in Gerlach, since Josette had already looked the hamlet up on the Internet.  A typical description read:

Welcome to Gerlach, Nevada (pop. 450). In this thriving metropolis you will find one elementary school, one high school, one post office, one propane distributor, one gas station, one motel, 3 bars and that's it.

Email Article To a Friend View Printable Version

Adventures in Self-Publishing, Chapter 3: Selecting a Print on Demand Publisher (Part I)

Adventures in Self-Publishing

This series highlights aspects of my experience self-publishing The Alexandria Project.   If you'd like to read the book this series is based on, you can read the first three chapters for free here (just click on the cover of the book). And you can read a new chapter of its sequel every Monday here.

Like just about every other step in self-publishing a book, researching and selecting a print on demand (POD) publisher can be a time-consuming and even bewildering experience.  The problem arises not from a lack of choices, but just the opposite.  Today, there are scores of publishers to choose from, with significant differences among them in business model, cost, speed, quality and reputation.  The challenge is therefore to figure out which one is just right you.

The first step in that process is to understand the high-level differences between the alternatives available.  At the highest level of categorization, there are currently three models from which to choose:

Email Article To a Friend View Printable Version

The Lafayette Deception, Chap. 3: Frank’s Long Day’s Journey into Night

Lafayette Deception (a Cyber Thriller)

Welcome to the sequel to The Alexandria Project, a cybersecurity thriller.  If you'd like to read the book this series is based on, you can read the first three chapters for free here (just click on the cover of the book). You can read a new chapter of The Lafayette Deception here every Monday.

Thanks to Leland at Wikimedia Commons.  Image under GNU Free Documentation License, Version 1.2The sun was once again shining the next morning as Frank drove west on Route 50. The harsh glare made it as hard to see as he was finding it difficult to think. Just the day before, he had been sitting in his clearing swearing at his laptop, and now he was off on what could prove to be two wild goose chases – the first, to find someone a government agency that didn’t exist was convinced was hacking into the pollsters’ computer systems, and the second to chauffeur a young French woman to a countercultural festival for reasons he was trying hard to pretend he did not understand.

Email Article To a Friend View Printable Version

Adventures in Self-Publishing, Chapter 2: eBook or Dead Tree?

Adventures in Self-Publishing

This series highlights aspects of my experience self-publishing The Alexandria Project.   If you'd like to read the book this series is based on, you can read the first three chapters for free here (just click on the cover of the book). And you can read a new chapter of its sequel every Monday here. You can read a new chapter of its sequel every Monday here. 

  Medieval copy of a book by Gautier de Metz, "L'image du Monde" - Wikimedia, public domainIf you are of a certain age (and I, most regrettably, am definitely of a certain age), a book means a certain thing, and that is this: something that you can hold in your hands, keep on a shelf, pack up and carry in a box in move after move (after move, after move…), and generally treasure for life, if it’s a good read or a valued resource. Kept indoors and absent a natural disaster, it can – and does – live on for centuries, always there, patiently waiting to be discovered anew, generation after generation.
 
It should therefore come as no surprise that the book I wrote last year, The Alexandria Project, will soon be available in tangible as well as eBook form. This is not to say that this makes a terrific amount of sense, viewed from any rational economic point of view. After all, it’s not likely that any bookstore will ever stock it. Moreover, because of costs of production, it’s also not likely that many people will buy it in soft cover, as compared to electronic form, let alone hardcover.
 
Email Article To a Friend View Printable Version

The Lafayette Deception, Chap. 2: Shelter From the Storm

Lafayette Deception (a Cyber Thriller)

Welcome to the sequel to The Alexandria Project, a cybersecurity thriller.  If you'd like to read the book this series is based on, you can read the first three chapters for free here (just click on the cover of the book). You can read a new chapter of The Lafayette Deception here every Monday.

It was only an hour after the helicopter’s departure, but Frank was on the move, driving carefully down the jeep track through the wind-whipped, driving rain, periodically blinded by vivid flashes of lightning. This wasn’t the usual afternoon thunderstorm, where few raindrops survived the long descent through dry desert air without evaporating before reaching the ground. This was the product of a full monsoon front sweeping up from the Gulf, the kind the ranchers relied on to refill their stockponds and green up the grass again for their cattle.

Now that he had signed on with whoever it was that he would be reporting to, Frank was anxious to get started, and he wanted a change of scenery to go along with the new objective. It hadn’t taken long to pack up. But by then the storm was breaking over him.

Email Article To a Friend View Printable Version

The Lafayette Deception, Chap. 1: Hi Ho, Adversego!

Lafayette Deception (a Cyber Thriller)

Welcome to the sequel to The Alexandria Project, a cybersecurity thriller.  If you'd like to read the book this series is based on, you can read the first three chapters for free here (just click on the cover of the book). You can read a new chapter of The Lafayette Deception here every Monday.

Charlie Neibergall, courtesy of WikiCommons - Creative Commons Attribution-Share Alike 2.0 Generic license.A wide, Nevada valley stretched before Frank Adversego - stretched as far as he could see.  Something about this particular vista, though, pricked at his memory.  Something about the way the mountains converged in the hazy perspective of the distance. 

Ah - that was it.  This was the road he’d traveled in ghostly moonlight a year ago, wrestling with various demons, both past and present.  Happily, they had now all been laid to rest.  And who knew what might lie ahead?

Email Article To a Friend View Printable Version

Adventures in Self Publishing - The Introduction

Adventures in Self-Publishing

This series highlights aspects of my experience self-publishing The Alexandria Project.   If you'd like to read the book this series is based on, you can read the first three chapters for free here (just click on the cover of the book). And you can read a new chapter of its sequel every Monday here.

Ever thought about writing a book?  Well, be sure you know what you're getting into first, because by the time you hold the finished product in your hands, you may have a long, strange trip to get through first.

If you're a long time reader of The Standards Blog, you'll recall that in the first half of 2010 I wrote a book called The Alexandria Project.  I posted a new chapter of that book here at The Standards Blog every Monday, and by the end it comprised 29 chapters, plus prologue and epilogue.  Somewhere between 3 and 4,000 people loyally followed that tale through to its conclusion, and you can still find that rough first draft here

Email Article To a Friend View Printable Version

The Future of OpenOffice.org: How Not to Write a Press Release

OpenDocument and OOXML

Since 2005, I see that I have written over 227 blog entries about ODF (I say more than, because the very earliest got lost in an earlier platform migration).  Throughout the greatest part of this six year period, OpenOffice was the poster child ODF implementation - the one with the most users, the most press attention, the most corporate support - tens of millions of dollars of it, from Sun Microsystems.  Of course, there were other impressive implementations, both open source and proprietary alike.  OpenOffice, though, was always the default ODF implementation referenced by the press.

Email Article To a Friend View Printable Version

Appreciating Steve Jobs

Monday Witness

It's impossible for anyone who has witnessed the personal computer and personal technology age from its beginning to separate Steve Jobs from that incredible odyssey.  From the start, he envisioned, created, and defined new platforms and categories of media experience. 

Sometimes he was not the first to invent, as with the mouse, the MP3 Player, the smartphone and the slate computer.  But when he turned his exceptional perceptions, sense of style and insistence on perfection to each of these tools, he exposed the limited vision of those who had first introduced these tools by reenvisioning, recreating, and redefining what those tools could be. 

Each time, his vision almost instantly prevailed. 

Email Article To a Friend View Printable Version

The Lurching Landscape of Mobile

Intellectual property Rights

Anyone paying attention to technology news lately knows that the Titans are clashing for control, or at least a share of the monetary rewards, of the mobile marketplace.  When technology historians look back on this era, they'll likely see this as a time when the tectonic plates suddenly shifted, wrenching apart corporate monopolies and rearranging the terrain upon which the next great age of technical innovation and adoption will play out.  These sudden shifts have predictably sent tremors reverberating across the competitive landscape.