Maybe magic markers really *are* a best in class data access control tool.

Image for post
Image for post
illustration by freepik

When I was asked to start the Identity team at Rebellion Defense my first thought was “do we need a whole team to do that?” After all, we weren’t going to build our own sign-on system when there were so many companies that focus on identity as their core product. It seemed like all that needed to be done was to select the appropriate tool, set it up and make sure it was maintained. That should be simple.

But to paraphrase the military theorist Carl von Clausewitz: In war all the simple things are difficult. …

Before ‘cyber’ was a prefix for everything internet and computers, it was how mathematicians were going to conquer the world.

Image for post
Image for post
Technology vector created by upklyak

I first encountered the word cybernetics while reading Benjamin Peters’s account of the Soviet Union’s attempts to invent the internet, How Not to Network a Nation (still a little disappointed that MIT didn’t spell it Nyetwork, come on!)


Marianne Bellotti

Lover of legacy systems and complex system failure. Opinions my own.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store