Projects
The following list shows a selection of research, writing, and transition projects over the years. Also included are other efforts such as authoring magazine articles or books because the ability to research, understand, and then write about technology and business is a crucial aspect of any transition process. Please note that many cannot be viewed due to U.S. Department of Defense (DoD) or corporate restrictions.
Project | Type | Client/Employer | Year | Notes |
The Correct Course for Compass Call | Issue Paper | Association of Old Crows for the DoD | 2018 | Paper to guide Congress' vote and DoD industry actions regarding a $1.7B USAF program |
How to solve Windows 10 crashes in less than a minute | Feature Article | Network World Magazine | 2016 | Update version of this series covering Windows 10 |
How the NSA is improving security for everyone | Feature Article | Network World Magazine | 2015 | NSA's CSfC program tests commercial products for in-house use |
NSA approves Samsung and Boeing mobile devices for employee use | Companion Article | Network World Magazine | 2015 | Samsung and Boeing mobile devices first certified by NSA CSfC program for in-house use |
GIMIK and SKIFF: A Tale of Two Semi-Submersible Submarines | Research Study | Central Intelligence Agency (CIA) | 2014 | Joint study by Jim Anderson, LCDR USNR (ret) and Dirk A. D. Smith |
Exclusive: Inside the NSA's private cloud | Feature Article | Network World Magazine | 2014 | National Security Agency is building its private cloud on commodity hardware, open source software |
Cybersecurity fears drive SMBs to third-party payment services | Feature Article | Network World Magazine | 2014 | High profile breaches highlight the need for secure credit card processing |
"A Trumpy Fit for James Bond" | Feature Article | WoodenBoat Magazine | 2013 | Issue #235 (Nov/Dec 2013): A secret boat in the CIA museum. |
"5 examples of zero-day attacks" | Companion Article | Network World Magazine | 2013 | Current zero-day attacks affecting users worldwide |
"Zero-day attacks: How to fight back" | Feature Article | Network World Magazine | 2013 | Also in CIO, CSO, and others from Australia to Europe |
"Cybercrooks target SMBs with new types of attacks" | Feature Article | PC World Magazine and Network World Magazine | 2013 | Also carried in CIO, PC World and other publications from the U.S. to Bulgaria. |
"How to solve Windows 8 crashes in less than a minute" | Feature Article | Network World Magazine | 2013 | Also carried in publications from Norway to China. |
"Where to go for help with Windows crashes" | Companion Article | Network World Magazine | 2013 | The companion piece offers other sources for help including books, forums, etc. |
"How to solve Windows 8 crashes" (Slide Show) | Slide Show | Network World Magazine | 2013 | The slide show takes the viewer through a brief look at solving crashes with a debugger. |
NSA: Looking for a few good cybersecurity professionals | Feature Article | Network World Magazine | 2012 | The NSA partners with academia to train students for careers in cybersecurity. Also published in Australia, New Zealand and other countries and other publications. |
The "Independent Web": the only place where YOU control your online presence | Elliot's Blog Article | Go Daddy | 2012 | How social media sites harvest your visitor data |
IPV6: when 4,294,967,296 is not enough | GigaOM Blog Article | Go Daddy | 2012 | Article explains how the number of available Internet addresses is being increased |
A Strong Password that's Easy to Remember (well . . . kind of) | GigaOM Blog Article | Go Daddy | 2012 | Article shows how to make passwords easy to remember and hard to crack. A Go Daddy article for GigaOM. |
Nadine's Irish Mist | Customer Success Story | Go Daddy | 2012 | An Irish bar in California gets customers in the door with help from Go Daddy |
Pacific Rim Divers |
Customer Success Story |
Go Daddy | 2012 | Scuba dive company in Hawaii competes with the big outfits with help from Go Daddy |
Mom's Originals | Customer Success Story | Go Daddy | 2012 | Gourmet pretzel company makes it to the Emmy's with help from Go Daddy |
NSA security expert worries about mobility, cloud | Feature Article |
CIO Magazine, Network World Magazine |
2012 | Also published in ComputerWorld, CIO and other magazines from Germany to New Zealand. |
How to profit from new domain name rules | Feature Article | Network World Magazine | 2012 | Also published in ComputerWorld, CIO, PC Advisor and PC World Magazines |
Sex sells in the domain name game | Feature Article | Network World Magazine | 2011 | Also published in ComputerWorld, CIO, InfoWorld and PC World Magazines |
Cyber SA Cyber Situational Awareness |
Research and Proposal | VisiTrend, LLC | 2011 |
Research and proposal to US Air Force Research Laboratory. US DoD / ITAR restricted |
ePublishing: What are the choices, procedures, and risks? |
Industry Research and Report | [A consulting company] | 2011 | Evaluate whether client company should ePublish its product-related materials |
Cyberheist:
Training us not to be the weakest link |
Book Review | Neuhaus Publishing | 2011 | Study and review new book on cyber security |
How to Solve Windows 7 Crashes in Minutes | Feature Article | Network World Magazine | 2011 | 2012 Gold Tabbie Award winning article in international competition from TABPI |
The Programmer's Code Precis: A middle-aged programmer is kidnapped but what he really needs is a bath |
Novel | TBD | 2011 | 80,000 word technology-based mystery inspired by Smith's work for the Cyber Operations Branch of US Air Force Research Laboratory. |
Anomaly
Detection at Multiple Scales Software utility to detect cyber threat from inside staff |
Research and Proposal | VisiTrend, LLC | 2011 | Proposal to Defense Advanced Research Projects Agency (DARPA) for cyber defense R&D project. US DoD / ITAR restricted |
Translating Ada to C/C++: Programming language translation software tool |
Research and White Paper | Charles River Analytics, Inc. | 2010 | For US Missile Defense Agency (MDA). US DoD / ITAR restricted |
AdaTranslator Programming language translation software tool |
Data Sheet | Charles River Analytics, Inc. | 2010 | For US Missile Defense Agency (MDA). US DoD / ITAR restricted |
Go-To-Market Plan Programming language translation software tool |
Business Plan | Charles River Analytics, Inc. | 2010 | For US Missile Defense Agency (MDA). US DoD / ITAR restricted |
State of Ada: Assess worldwide plans to translate Ada-based systems to C/C++ |
Survey and analysis | Charles River Analytics, Inc. | 2010 | For US Missile Defense Agency (MDA). US DoD / ITAR restricted |
The dog with the golden eyes who went blind and can again see | Case Story | Ocean State Veterinary Specialists | 2010 | Story and photography for company's 10 year anniversary book |
Host Detection for Bots and Botnet Containment | Product Design and White Paper | Raytheon / DoD | 2009 | US DoD / ITAR restricted |
Defending Against Zero-Day Cyber Attacks |
Award Article | US Air Force | 2008 | Innovation Success Story w/ graphic design |
Final Technical Report | Technical Report | US Air Force | 2008 | Completed two year R&D project for USAF |
Zero-Day Attack Prevention for Policy Enabled Response | Proposal | Raytheon / DoD | 2008 | $1.8mil Raytheon proposal to USAF |
Protecting IT Systems from Cyber Attacks (Phase II) | Proposal | US Air Force Research Laboratory | 2005 | Won $750,000 defense R&D contract |
How to solve Windows system crashes in minutes | Feature Article | Network World Magazine | 2005 | Highly successful piece linked worldwide and most read of that issue |
Protecting IT Systems from Cyber Attacks (Phase I) | Proposal | US Air Force Research Laboratory | 2004 | Won $100,000 defense R&D contract |
Ten Common Mangement Mistakes | Feature Article | Network World Magazine | 2003 | Most read article of that issue |
Forcing Windows to Crash | Article | PC Magazine | 2003 | Short piece for Neal J. Rubenking's article |
Preventing System Failures | Technical Training | Hewlett-Packard | 2002 | Created and gave 1 and 2 hour technical training classes at conferences |
Alexander SPK User Guide (Windows) | User Guide | Alexander LAN, Inc. | 2002 | Both full and quick-start user guides for software |
Novell's Guide to Resolving Critical Server Issues | Book | Novell Press | 1998 | Authored chapter for book |
Crash Management Primer | Book | Compaq Computer Corporation | 1998 | 100,000 copies distributed by Compaq on CD |
Alexander SPK User Guide (NetWare) | User Guide | Alexander LAN, Inc. | 1996 | Full and quick-start guides for software |
Memory Protection Using Intel's Ring Protection Scheme | White Paper | Nu-Mega Technologies, Inc. | 1991 | Explained new technology introduced by Intel and Nu-Mega |
386|Power by Phar Lap: Identity Branding program | Promotion Campaign | Phar Lap Software, Inc. | 1990 | Product licensee program whereby they included our product logo in their materials |
How to Gain Press Attention for Software Releases | Study and Report | Phar Lap Software, Inc. | 1989 | Instructional piece for company's Public Rrelations efforts |
Choosing Graphic Support | Feature Article | Programmer's UPDATE Magazine | 1988 | Instructional article for software programmers |
Plotting the Way to Tomorrow's Flying Machines | Feature Article | Research & Development Magazine | 1988 | First magazine article: Described aspect of NASA Space Plane project |
Babson Giant Globe Project | Feasibility Analysis | Babson College | 1983 | Study to support a major renovation project |