Phone: (603) 233-1598
Email: DirkADSmith@gmail.com
Skype: DirkADSmith

Projects

The following list shows a selection of research, writing, and transition projects over the years. Also included are other efforts such as authoring magazine articles or books because the ability to research, understand, and then write about technology and business is a crucial aspect of any transition process. Please note that many cannot be viewed due to U.S. Department of Defense (DoD) or corporate restrictions.

Project Type Client/Employer Year Notes
The Correct Course for Compass Call Issue Paper Association of Old Crows for the DoD 2018 Paper to guide Congress' vote and DoD industry actions regarding a $1.7B USAF program
How to solve Windows 10 crashes in less than a minute Feature Article Network World Magazine 2016 Update version of this series covering Windows 10
How the NSA is improving security for everyone Feature Article Network World Magazine 2015 NSA's CSfC program tests commercial products for in-house use
NSA approves Samsung and Boeing mobile devices for employee use Companion Article Network World Magazine 2015 Samsung and Boeing mobile devices first certified by NSA CSfC program for in-house use
GIMIK and SKIFF: A Tale of Two Semi-Submersible Submarines Research Study Central Intelligence Agency (CIA) 2014 Joint study by Jim Anderson, LCDR USNR (ret) and Dirk A. D. Smith
Exclusive: Inside the NSA's private cloud Feature Article Network World Magazine 2014 National Security Agency is building its private cloud on commodity hardware, open source software
Cybersecurity fears drive SMBs to third-party payment services Feature Article Network World Magazine 2014 High profile breaches highlight the need for secure credit card processing
"A Trumpy Fit for James Bond" Feature Article WoodenBoat Magazine 2013 Issue #235 (Nov/Dec 2013): A secret boat in the CIA museum.
"5 examples of zero-day attacks" Companion Article Network World Magazine 2013 Current zero-day attacks affecting users worldwide
"Zero-day attacks: How to fight back" Feature Article Network World Magazine 2013 Also in CIO, CSO, and others from Australia to Europe
"Cybercrooks target SMBs with new types of attacks" Feature Article PC World Magazine and Network World Magazine 2013 Also carried in CIO, PC World and other publications from the U.S. to Bulgaria.
"How to solve Windows 8 crashes in less than a minute" Feature Article Network World Magazine 2013 Also carried in publications from Norway to China.
"Where to go for help with Windows crashes" Companion Article Network World Magazine 2013 The companion piece offers other sources for help including books, forums, etc.
"How to solve Windows 8 crashes" (Slide Show) Slide Show Network World Magazine 2013 The slide show takes the viewer through a brief look at solving crashes with a debugger.
NSA: Looking for a few good cybersecurity professionals Feature Article Network World Magazine 2012 The NSA partners with academia to train students for careers in cybersecurity. Also published in Australia, New Zealand and other countries and other publications.
The "Independent Web": the only place where YOU control your online presence Elliot's Blog Article Go Daddy 2012 How social media sites harvest your visitor data
IPV6: when 4,294,967,296 is not enough GigaOM Blog Article Go Daddy 2012 Article explains how the number of available Internet addresses is being increased
A Strong Password that's Easy to Remember (well . . . kind of) GigaOM Blog Article Go Daddy 2012 Article shows how to make passwords easy to remember and hard to crack. A Go Daddy article for GigaOM.
Nadine's Irish Mist Customer Success Story Go Daddy 2012 An Irish bar in California gets customers in the door with help from Go Daddy
Pacific Rim Divers   Customer
Success Story
Go Daddy 2012 Scuba dive company in Hawaii competes with the big outfits with help from Go Daddy
Mom's Originals Customer Success Story Go Daddy 2012 Gourmet pretzel company makes it to the Emmy's with help from Go Daddy
NSA security expert worries about mobility, cloud Feature Article CIO Magazine,
Network World Magazine
2012 Also published in ComputerWorld, CIO and other magazines from Germany to New Zealand.
How to profit from new domain name rules Feature Article Network World Magazine 2012 Also published in ComputerWorld, CIO, PC Advisor and PC World Magazines
Sex sells in the domain name game Feature Article Network World Magazine 2011 Also published in ComputerWorld, CIO, InfoWorld and PC World Magazines
Cyber SA
Cyber Situational Awareness
Research and Proposal VisiTrend, LLC 2011 Research and proposal to US Air Force Research Laboratory.
US DoD / ITAR restricted
ePublishing:
What are the choices, procedures, and risks?
Industry Research and Report [A consulting company] 2011 Evaluate whether client company should ePublish its product-related materials
Cyberheist:
Training us not to be the weakest link
Book Review Neuhaus Publishing 2011 Study and review new book on cyber security
How to Solve Windows 7 Crashes in Minutes Feature Article Network World Magazine 2011 2012 Gold Tabbie Award winning article in international competition from TABPI
The Programmer's Code
Precis:
A middle-aged programmer is kidnapped but what he really needs is a bath
Novel TBD 2011 80,000 word technology-based mystery inspired by Smith's work for the Cyber Operations Branch of US Air Force Research Laboratory.
Anomaly Detection at Multiple Scales
Software utility to detect cyber threat from inside staff
Research and Proposal VisiTrend, LLC 2011 Proposal to Defense Advanced Research Projects Agency (DARPA) for cyber defense R&D project. US DoD / ITAR restricted
Translating Ada to C/C++:
Programming language translation software tool
Research and White Paper Charles River Analytics, Inc. 2010 For US Missile Defense Agency (MDA). US DoD / ITAR restricted
AdaTranslator
Programming language translation software tool
Data Sheet Charles River Analytics, Inc. 2010 For US Missile Defense Agency (MDA). US DoD / ITAR restricted
Go-To-Market Plan
Programming language translation software tool
Business Plan Charles River Analytics, Inc. 2010 For US Missile Defense Agency (MDA). US DoD / ITAR restricted
State of Ada:
Assess worldwide plans to translate Ada-based systems to C/C++
Survey and analysis Charles River Analytics, Inc. 2010 For US Missile Defense Agency (MDA). US DoD / ITAR restricted
The dog with the golden eyes who went blind and can again see Case Story Ocean State Veterinary Specialists 2010 Story and photography for company's 10 year anniversary book
Host Detection for Bots and Botnet Containment Product Design and White Paper Raytheon / DoD 2009 US DoD / ITAR restricted
Defending Against Zero-Day Cyber Attacks
Award Article US Air Force 2008 Innovation Success Story w/ graphic design
Final Technical Report Technical Report US Air Force 2008 Completed two year R&D project for USAF
Zero-Day Attack Prevention for Policy Enabled Response Proposal Raytheon / DoD 2008 $1.8mil Raytheon proposal to USAF
Protecting IT Systems from Cyber Attacks (Phase II) Proposal US Air Force Research Laboratory 2005 Won $750,000 defense R&D contract
How to solve Windows system crashes in minutes Feature Article Network World Magazine 2005 Highly successful piece linked worldwide and most read of that issue
Protecting IT Systems from Cyber Attacks (Phase I) Proposal US Air Force Research Laboratory 2004 Won $100,000 defense R&D contract
Ten Common Mangement Mistakes Feature Article Network World Magazine 2003 Most read article of that issue
Forcing Windows to Crash Article PC Magazine 2003 Short piece for Neal J. Rubenking's article
Preventing System Failures Technical Training Hewlett-Packard 2002 Created and gave 1 and 2 hour technical training classes at conferences
Alexander SPK User Guide (Windows) User Guide Alexander LAN, Inc. 2002 Both full and quick-start user guides for software
Novell's Guide to Resolving Critical Server Issues Book Novell Press 1998 Authored chapter for book
Crash Management Primer Book Compaq Computer Corporation 1998 100,000 copies distributed by Compaq on CD
Alexander SPK User Guide (NetWare) User Guide Alexander LAN, Inc. 1996 Full and quick-start guides for software
Memory Protection Using Intel's Ring Protection Scheme White Paper Nu-Mega Technologies, Inc. 1991 Explained new technology introduced by Intel and Nu-Mega
386|Power by Phar Lap: Identity Branding program Promotion Campaign Phar Lap Software, Inc. 1990 Product licensee program whereby they included our product logo in their materials
How to Gain Press Attention for Software Releases Study and Report Phar Lap Software, Inc. 1989 Instructional piece for company's Public Rrelations efforts
Choosing Graphic Support Feature Article Programmer's UPDATE Magazine 1988 Instructional article for software programmers
Plotting the Way to Tomorrow's Flying Machines Feature Article Research & Development Magazine 1988 First magazine article: Described aspect of NASA Space Plane project
Babson Giant Globe Project Feasibility Analysis Babson College 1983 Study to support a major renovation project