Posted by: David Scott
BTW, CMS, content management, cyber terror, cybersecurity, cyberterror, data security, futilitycloset.com, IT governance, the business-technology weave
— H.G. Wells
Dear Readers: The Business-Technology Weave blog has 800+ readers at present. I’d like to increase readership and thought I’d ask if you’d be willing to forward BTW’s URL –
- to a few colleagues and friends. They can also simply Google “The Business-Technology Weave.”
As thanks, I’d like to recommend one of the coolest sites I’ve stumbled upon in a long time: FutilityCloset.com. This site is a treasure trove of fun and interesting things. In their own words, “…a collection of entertaining curiosities in history, literature, mathematics, language, art, and philosophy. Each item is self-contained and written as concisely as possible…”. Their database has almost 6,000 items.
Check out the video “Both Sides Now,” (scroll down to it) where a Bach piece is rendered as a Möbius strip. It’s just over 3 minutes – let it get to the 1:45 minute mark – here’s where it gets really interesting.
Have fun! And… if you could blast out a recommendation for The Business-Technology Weave (only to those you’d feel would benefit, of course), I would much appreciate it – how about to 10 of your closest friends and associates?
Tomorrow: Back to business with an article regarding a top security expert’s warning about cyber-terror. To close, here’s a great quote I picked up from FutilityCloset:
“I have never thought much of the courage of a lion tamer. Inside the cage he is at least safe from other men. There is not much harm in a lion. He has no ideals, no religion, no politics, no chivalry, no gentility; in short, no reason for destroying anything that he does not want to eat.”
— George Bernard Shaw