C3L is a consulting company offering advice and development in the area of standardisation related to security (the CIA paradigm) and privacy. This blog/web-presence is all about the activity of the company.
Subscribe to this blog
Follow by Email
C3L supporting Poole Hospital Charity event - March for Men 2021
The employees of C3L are taking part in March for Men 2021 and would appreciate your support.
Poole Hospital are calling on men - sons, fathers, brothers, uncles, grandfathers as well as their loved ones, to come together to walk, jog or run either 1km, 5km or 10km to help raise important funds to support men from across Dorset receiving treatment for prostate cancer at Poole Hospital.
March for Men is a virtual event, meaning you can undertake your walk or run at a location of your choice anytime during March. No matter your age, ability or gender you can be a part of this amazing event.
Poole Hospital Charity are excited to be joining March for Men for the first time and taking part to raise vital funds for men's health in Dorset.
With your support, they can make a difference to men receiving life saving cancer treatment at Poole Hospital.
If you would like to donate this event there are links provided:
Introduction Throughout the 20th Century the Royal Navy designed and examined different types of fleets that were never realised either due to budget constraints, arms treaties or the changing nature of war. These are only a few examples of the different types of unbuilt fleets. Some of these had prototypes built and tasted for the Royal Navy which would serve as technological testbeds. Images and info from secret projects forum, shipbucket, popular mechanics/science and naval-matters. Washington Naval Treaty (WNT) The Washington Naval Treaty was a treaty signed during 1922 among the major nations that had won World War I , which agreed to prevent an arms race by limiting naval construction. It was negotiated at the Washington Naval Conference , held in Washington, D.C. , from November 1921 to February 1922, and it was signed by the governments of the United Kingdom, the United States, France, Italy, and Japan. It limited the construction of battleships , battlecruisers
Introduction This blog post looks at the different groups of cancelled RAF projects. It will focus on the 50s, 60s, 90s/00s and a brief look at hypersonic research projects. While these projects were often cut or cancelled for budget or austerity reasons, they were also pushed by the changing nature of warfare firstly from conventional style WW2 warfare to the predicated quick, short scale nuclear war which was expected from 1947 to 1989. Later from the 90s and into the 21st Century a change from state on state conflict to facing insurgencies, counter-terrorism and peacekeeping missions again led to a change in how wars are fought. Though the work and research done on these projects would rarely go to waste with it being used and applied in other projects and works even if sometimes it could take another ten or twenty years before anything operational came of that work. There won't be large amounts of text explaining or exploring the designs there are far better sources for th
Introduction When designing new devices or applications there is a requirement nowadays to consider there functionality, usability and security. While there has been a push through secure-by-design guidelines for security to be built-in from the beginning there are still gaps in implementation and part of these gaps are design considerations of functionality and usability. Part of this that doing security well is hard work, but it should never block useful functionality for the user. Ideally, when security interferes with key software capabilities, the security must be tweaked. The answer should never be to abandon the functionality and certainly not to abandon the security. Though achieving this balance is admittedly not straightforward. This blog post will aim to look at this triad and how they can be balanced and not compromise each other. Defining the Triad in design A triangle can be used to help explain the relationship between the concepts of security, functionality and ea