Tag Archives: Bush

Brie at last or war’s a mouthful

Brie at last

By Russ Imrie August 30, 2013

I am disturbed and I am concerned about the recent uptick in warmed-over meals and re-animated fast food appearing at the table. I had been so looking forward to something fresh.

Make no mistake about it; I am in awe of the utensils and recipes that make American cuisine influential around the planet. It’s often the choice of both emerging foodies and of the established “Colonels” class.

Locally though, a fundamental quality of food, that it be securely rooted in tradition (and thus reflect upon our character,) is at risk today.

Discovering and then reheating last week’s “war on diet” pizza slice has always been a pleasant interlude. But when a savory home-cooked vegetable soup is reduced to a thick mish-mash and the onions, mushrooms, carrots, and delicate GMO free chicken lose “their way” in a pot of leftovers, I get a bad feeling about it. Times change.

Do not get me wrong. My [tribal] ancestors created a food that often served as well days or weeks along, if not better, than as a warm family main course: Kahnata. Dutch traders and settlers in what is now New York referred to this as “a kind of large corn dumpling.”

Warriors carried these heavy nourishing meals ready-to-throw along on canoe voyages in pursuit of beaver pelts and sometimes scalps. With some dried pre-GMO meat, it sustained and in a pinch could be heaved in the face of an enemy (or raiding bear.) Our French allies in those days could take along their hapless rations on raids against the rival Colonials south in New England but we packed a secret weapon that is tasty and nourishing to this day.

So is the source of my unsettled thoughts this morning. Lest we forget what food is  (and a particularly tasteless stew is on today’s “revisit”menu) let’s say grace and think deeply about what’s important.

distant US Capitol dome

U.S. Capitol SOTU eve, 2011 – photo Russ Imrie

Russell Imrie is a  Networking and Content Specialist, webmaster and an American Indian blogger living in the Washington DC area. More opinion pieces are at China Daily Mail and MediaSeenToo

Copyright Russell Imrie


Niagara Falls Flat on warning ubiquitous US network clients

Again, a huge leaky computer security flaw in a system widely deployed around the world has US authorities playing catch-up.

Russ Imrie – July 14, 2012 from the Washington Post

Breaches of important computer systems are commonplace and dangerous. Newly discovered vulnerabilities need to be promptly recoded and repaired and all users need to have that software patch deployed immediately. This before malignant code or unauthorized users gain administrative privileges in and control of a computer system.There is no excuse, other than saving face, for a systems vendor to delay alerting users their software and thus their safe and profitable operations are at risk.

The STUXNET malware that attacked Iran‘s centrifuges exploited a vulnerability in Windows systems and infected machine controls. Now, another system, the Niagara Framework by Tridium has security types scrambling to patch security holes and unsecured critical control systems worldwide and to find out why Tridium (a Honeywell subsidiary) did not alert users a year ago when it [security hole] was brought to their attention by a user who discovered anomolies.

Niagra literature touts applications that can…

Remotely monitor your equipment and analyze performance. Operators can respond to alarms, schedule maintenance, adjust control parameters and alter operating schedules using a PC web browser or handheld wireless device. Managing a remote customer site has never been easier.

Test attacks have proven that Niagara systems can be broken into and control taken over. At last users are being alerted about some quick fixes to reduce vulnerability but is it too late?

Affected systems – from WAPO

As you can see in this partial screen capture of the Washington Post’s graphic listing of affected systems, a comprehensive range of critical devices are at risk if the vulnerabilities are used to gain control with malicious intent.