Future Think

Blog Description

Posted on

The name of and theme for your blog

  • RobertWhetsel.com – Diary of an αlphα Gεεk

The link for the main blog page

  • http://robertwhetsel.com

Any challenges that you had

  • none worked it out over the years
  • I have my own dedicated server on the www
  • working on the auto social media posting capabilities

The layout for your blog

  • main page attached in a jpeg
  • persistent menu UML attached in a jpeg

Blog Purpose

I write about technology(computer science, computer engineering, and data things & mobility – to come), my research and entrepreneurial endeavors. I have been writing off and on for more than 8 years. Work prevented me for a number of years from being able to post. Read Yes I’m Back on-line.

Forces affecting this blogs success

First the idea of success needs to be defined:

  • generate revenue [done]
  • have people read about my research [done]
visits in 24hrs
visits in 24hrs

Selling Ideas

Ideas can generate economic return according to Romer, “if they are important in the developing economic goods”, (Romer, 1998). For example, this author’s patent could generate revenue through licensing agreements.


Trusted Client Centric Application Architecture (61088209): Trusted Client Centric Application Architecture (TC2A2) provides the ability to exchange data between applications. TC2A2 acts as a universal data set to exchange data between applications. Application data from source applications is converted to a universal data set for one or more target applications. Then application data is transmitted to target applications in order to perform an exchange of data. TC2A2 may be used to synchronize data and perform other functions requiring data exchange between applications that typically may not be able to communicate with each other.


Other ways of economic generation from this blog is consulting contracts and additional job opportunities. Over the years, this medium has allowed this author to work as a consultant performing in a variety of roles for different clients. For example, serving as a Technology Strategist, mentoring senior management, and Enterprise Architect, Information Architect and Data Architect designing key capabilities across multiple business lines.

Blog Followers

This Blog has the ability to auto post to FaceBook, Twitter and Linkedin. In addition, I currently have almost 200 feedburner follows. Once I finish building my own wp-social plugin, I will also add Google+ to the social media blast expanding my web-footprint all leading back to RobertWhetsel.com.


Romer, P. M. (1998). Two strategies for economic development: using ideas and producing ideas. The strategic management of intellectual capital, 211-238.

(CLI) tutorial

Linux, Apache, MySQL & PHP CLI Style

Posted on

This how-to is a command-line instruction (CLI) tutorial, a step-by-step guide to install a Linux, Apache, MySQL and PHP (LAMP) server on a Debian based server using apt-get and tasksel. I’m using Ubuntu server 13.04 server in this example, however you could substitute any of the Debian based distribution as by your own requirements.

There is an operational requirement for a LAMP server.

1. You have a Ubuntu system running,
2. you know how to login to your system,
3. you know how to get to a terminal, (I have no X there is only CLI)
4. you have apt-get and tasksel installed on your system
5. and, MOST IMPORTANTLY the system has Internet access.

1. First you need to install tasksel, a package that allow a user to install multiple packages, META-PACKAGES, if it is not installed on your system.
sudo apt-get install tasksel

2. Next install the lamp-server packages
sudo tasksel install lamp-server

3. Follow the instructions i.e. enter a MySql password

4. Test your install
Open a browser on another machine and enter the ip address in the browser address bar and you should see:

          It works!
          This is the default web page for this server.
          The web server software is running but no content has been added, yet.

If everything went as planned it takes all of two minutes to go through this process.


(CLI) tutorial

Manually Install Oracle Java CLI Style

Posted on

This how-to is a command-line instruction (CLI) tutorial, a step-by-step guide to manually install Oracle’s Java from a precompiled bin. I’m using Ubuntu server 13.04 and JDK7 in this example, however you could substitute any of the JKD versions and Linux distribution as by your own requirements.

An application or service requires a Sun/Oracle Java installation instead of an OpenJDK.

1. You have a Ubuntu system running,
2. you know how to login to your system,
3. you know how to get to a terminal, (I have no X there is only CLI)
4. you have tar and wget installed on your system
5. and, MOST IMPORTANTLY the system has Internet access.

1. Download Java SE 7 JDK for your Linux archive. For this example I’m using jdk-7u40-linux-x64.tar.gz, however you can select the version you need. (I used my browser on another machine to find the correct url- http://www.oracle.com/technetwork/java/javase/downloads/jdk7-downloads-1880260.html)
a. agree to the license,
b. then copy the link address you need i.e. http://download.oracle.com/otn-pub/java/jdk/7u40-b43/jdk-7u40-linux-x64.tar.gz
c. use wget with no cookies to download the file to your machine
          cookies wget –no-cookies –header “Cookie: gpw_e24=http%3A%2F%2Fwww.oracle.com” “use link address”

2. Move the archive to /opt/
          sudo mv jdk-7u40-linux-x64.tar.gz /opt/

3. Change to /opt/ folder and extract the JDK from the archive
          cd /opt/

4. Extract the file – all the files form this example was extracted to a new jdk1.7.0_40 folder
          sudo tar zxvf jdk-7u40-linux-x64.tar.gz

5. Make symbolic links to the new java binary.
          sudo ln -s -b /opt/jdk1.7.0_40/jre/bin/java /etc/alternatives/java
          sudo ln -s -b /opt/jdk1.7.0_40/jre/bin/java /usr/bin/java

6. Test your work
          java -version


Please reply with any comments if this helps or if you have an improvement on the steps.

Next article > how to install and configure Ubuntu server <maybe this should have come first>


Yes I am back on-line

Posted on

It has been a busy 4 years since I last took to the webways, but thanks to the government’s furlough I have time to rededicate myself to my writing. The site’s redesign is a simple easy to read no distractions full on blog style. IMHO this is the format I will be sticking with from now on, no muss – no fuss.

After the resume gets dusted off and updated I will look into updating all of previous articles and research if the tech has changed. In addition, I will be posting new series of articles on Big Data, Artificial Intelligence and of course my old standby; Cyber related research.

My Resume

Founder & Freelance Web Designer and Mobile Application Developer

Posted on

 The Raven Group Marion, VA (January 1992 – January 2002)

Managed all technical aspects used to provide services for clients. Used a repeatable web-site design process that allowed TRG to design and produce over 150 customized custom web applications, database-driven web sites and mobile applications on a variety of platforms for clients.

My Resume

Founder & Principal Consultant

Posted on

RavenSong Open Technologies, Inc. (01/1992 – 03/2009)

Frederick, MD

Oversaw and managed all aspects of RSOtech, Inc., led the planning for the overall company’s strategy; major offering was Managed Intelligence Services. Considered one of the leading experts in Cyber integrating intelligence-based security; and also recognized as one of the pioneer companies for complex open source migrations as recognized by Gold and Platinum partnerships with Novell, IBM, Red Hat, and Nitix (purchased by IBM).

Program/Project Management – Recruited, led, and mentored multiple teams of analysts, cyber professionals, and IT specialists in system administration, network administration, and enterprise application development to successfully complete client projects.

Selected Projects:

  • Integrated threat intelligence strategy with a risk based approach and we were able to expand the marketing potential of a mortgage research company to global financial institutions by elevating the security posture of their systems beyond current federal and state regulatory requirements for the entire life-cycle of financial data.
  • Expanded existing intelligence strategy for a large payment-collection company by adding additional controls for management that provided additional and automated customer services, distributed fraud prevention alerts across wide-area network, for accepting credit cards and electronic checks.
  • Successfully re-designed architecture of Novell product to make more scalable and overcome bandwidth constraints for use with Ritz Camera in an open source enterprise-wide IT modernization and service consolidation for 1200 remote locations and 50,000 users including secure system-wide management of point of sale devices.
  • Advised a startup technology firm and designed architecture to develop their new technology based on a Linux headless computer cluster, reduced months of their R&D and enabled them to demonstrate a prototype successfully for investors, the product was later used for collection management.


My Resume

Computer Scientist (Information Assurance Manager Level III), GS13

Posted on

US Army Research Laboratory (03/2009 – 05/2010)

Aberdeen Proving Grounds, MD

Given position to direct the Information Assurance research and development process for the Army Research Laboratory’s dedicated systems programs for the Counter Intelligence Division supporting Joint programs.

  • Developed and maintained a formal Information Assurance (IA) program by interpreting governance, standards, and policies for high capacity computing lab supporting grid computing programs. Successfully managed multiple, concurrent programs and ensured continuance of research projects supporting DoD’s operational Counter Intelligence mission.
  • Completely rewrote multiple, previously unacceptable, Continuity of Operations Plans (COOP) following best business practices, and built relationship with the Designated Approval Authority which subsequently accepted the new plans. Within 4 months of starting position, all assigned programs, which were previously non-compliant for over 2 years, were granted Authorization to Operate.
  • Developed vulnerability management strategy, evaluated the effectiveness of cyber security certification and accreditation plans, documented deficiencies and recommended corrective actions.
  • Developed new procedures for responding to security incidents including investigating and reporting security violations and incidents, as appropriate for information systems within the boundaries.
My Resume

Senior Computer Scientist, GS14, The Office of the Chief Information Assurance Executive

Posted on

 DISA – Chief Information Assurance Executive Directorate (May 2010 – December 2012)

The Office of the Chief Information Assurance Executive (CIAE) oversaw program management and implementation of DoD Information Assurance (cyber security) and NetOps capabilities in an enterprise environment. Given position to lead development of agency strategic plans and policies that directed programs in proper implementation of cyber initiatives for example, frameworks for risk-based decision making, defining active threats and prevention capabilities and supply risk chain management. Recommend action on emerging technologies and ensured compliance with the agency’s long-range and annual strategic guidance.

  • Recommended complex cyber security plans and strategies to senior management and mission partners after researching laws, Presidential Orders, DoD Directives, Director’s Intent and standards to support decisions on agency policies and best business practices for example, threat environment impact and threat intelligence.
  • Led working groups to define DoD’s threat environment which are then used to create threat mitigation strategies across multiple agencies. Steered analysis of the DoD Supply Chain Materiel Management Policy which resulted in written policy in DoD and provided intelligence support to the procurement process.
  • Authored and co-authored multiple DISA and DOD publications in Information Assurance and Cyber governance and policy including the mobility cyber security governance document for DISA.
  • Led cross agency groups to define cyber and intelligence alerts to support risk based decision making for the agency. Developed the Cyber Readiness Model currently used to harden core and in mitigation of active threats.
  • Led various inter-agency cyber security working groups involving 26 agencies including the NSA, USCC, DoD, DHS, law enforcement agencies and other Intelligence Agencies. In particular, achieved consensus, never before achieved at this scale, to address security, technical, legal and policy concerns of multiple agencies to enable sharing of data to enhance threat intelligence communication across these agencies.
My Resume

CNO Planner, 1LT, 25A N-9, Officer In Charge of Cyber Futures Team

Posted on

Selected Recent Military Experience with Cyber and Intelligence

Cyber Operational Planning • Computer Network Defense • Cyber & Intelligence Research

Computer Network Exploitation • Computer Network Attack • System Hardening

US Army Reserve held numerous leadership position after receiving a direct commission 2 November 2009.

US Army Reserve assigned to ARCYBER (08/2012 – present)

Ft. Belvoir, VA

Assigned to Army Reserve Cyber; the only cyber unit in Army Reserve actively supporting cyber and intelligence communities. As team lead, plan computer network operations (CNO) and develop strategic, operational and tactical plans for different missions, exercise support and mission partners such as other DoD agencies, Non-Governmental Organizations, and Joint missions. Create and present written reports for command level personnel.

  • Created a Cyber Futures Team and serve as lead for efforts to build the next generation of intelligence and cyber tools for analysts.
  • Conduct research and analysis of intelligence and cyber, for example from Open and All-source Cyber Threat Intelligence and develop documents for Cyber operational reviews.
  • Validate and test complex security architecture and design solutions to produce detailed engineering specifications with recommended vendor technologies.

Develop technical and programmatic assessments, evaluate engineering and integration initiatives and serve as technical adviser for assessing cyber security policies, standards and guidelines.

US Army Reserve assigned to DET53 (03/2012 – 08/2012)

Adelphi, MD

Acted as S3 Staff Officer, responsible for planning operations as directed by the commander. Worked closely with the XO and Detachment Commander to develop the strategic planning process for training missions.

  • Led and trained a Computer Network Defense Team about to deploy to a combat zone in support of a cyber/intelligence mission.
  • Led and developed team members in incident handling and alerting and reporting procedure of cyber threats.
  • Supervised team in threat intelligence management processes to provide timely, relevant and actionable information and analysis to support active threat investigation and mitigation.

US Army Reserve assigned to NCRIOC (07/2010 – 03/2012)

Adelphi, MD

Served as S1/Adjutant OIC for over 100 Soldiers in the National Capital Region Information Operations Center (NCRIOC).

  • Advised the commander on all personnel actions including promotions and evaluations.
  • Supervised, trained, and mentored soldiers including senior NCOs, planned, distributed and monitored work assignments; evaluated work performance and provided feedback; reviewed, recommended and approved selections, promotions and reassignments; and initiated recognition and disciplinary actions for personnel.

 US Army Reserve assigned  to 497th CSSB (11/2009 – 07/2010)

US Army Reserve Center Salem, VA

Manage the tactical edge – unit’s signal assets, which include all aspects of automation and communications-electronics related to the planning, design, engineering, operations, logistical support and evaluation of systems and networks. Directed and managed installation, operation, networking and maintenance of signal equipment. Advised commander, and staffs on command and control signal requirements, capabilities, and operations.

Additional Duties: Physical Security Officer.

My Resume

Senior Big Data Computer Scientist, GS15, Enterprise Engineering Directorate

Posted on

Defense Information Systems Agency (12/2012 – present)

Ft. Meade, MD

Defense Information Systems Agency (DISA) provides enterprise services, and protects and defends the DoD and Intelligence Community’s Defense Information Systems network, including internet boundaries, long-haul telecommunication and satellite communication services. Given position to spearhead projects for strategic planning and policy for the DoD and DISA; brief seniors; develop and maintain relationships across agencies and with vendors to qualify their products and services for DoD data-related initiatives; and supervise and perform in-depth analyses for major data initiatives.

  • Pioneered new approach for integrating intelligence with cyber by applying big data analytics to acquire timely actionable relevant data; it improved predictive analysis of systems reliability with cyber events which will be used for future creation of log file strategies for enterprise capabilities.
  • Forged consensus with international standards bodies while leading cross agency teams in enterprise engineering standards and data for the DoD, other federal agencies and international partners which resulted in co-authorship of the DoD data framework used by all programs to achieve interoperability with the enterprise environment.
  • Influenced the future DoD Joint Information Environment (JIE) for all DoD and Intelligence community components by analyzing the effects of National Information Exchange Model (NIEM) and recommending modifications to the JIE’s reference data model which were subsequently accepted to improve functionality and ability to share intelligence.
  • Envisioned Data maturity model for DoD and advised the DoD’s CIO on data collection (acquisition) strategies and the Reference Data model to be used in JIE to ensure interoperability with other data systems.
  • Advised DoD CIO on interoperability, data standards, and data management of enterprise architecture and recommendations were incorporated into the DoD Instructions 8310, 8320 and 8330 to facilitate the sharing of timely, actionable and relevant data across agency boundaries.
  • As a leader in DISA’s mentoring program and actively working to build future leaders for DISA, led mentees in analytic activities for their personal, professional and technical growth.