Quote of the Day – Oleg Volk (11/8/2012)

The resources obtained by such knowledge and the security provided by those resources are the real reason why being well to do is valued — it has less to do with the mythical greed and more with keeping self and family safe and secure.

Oleg VolkKnowledge As a Defensive Fortification
November 8, 2012


[First go read the whole thing.

He’s right on every last point.  It’s a matter of avoidance and lowering risk.  Now I will note that risk never reaches zero.  A friend of mine is a wonderful example of how people can still end up a statistical outlier on this front.

But like most things it’s a risk reward system.  Knowledge works as a defense in multiple ways.  Knowledge of history ultimately can serve as a very useful tool. -B]

Barron is the owner, editor, and principal author at The Minuteman, a competitive shooter, and staff member for Boomershoot. Even in his free time he’s merging his love and knowledge of computers and technology with his love of firearms.

He has a BS in electrical engineering from Washington State University. Immediately after college he went into work on embedded software and hardware for use in critical infrastructure. This included cryptographic communications equipment as well as command and control devices that were using that communications equipment. Since then he’s worked on just about everything ranging from toys, phones, other critical infrastructure, and even desktop applications. Doing everything from hardware system design, to software architecture, to actually writing software that makes your athletic band do its thing.

About Barron

Barron is the owner, editor, and principal author at The Minuteman, a competitive shooter, and staff member for Boomershoot. Even in his free time he’s merging his love and knowledge of computers and technology with his love of firearms. He has a BS in electrical engineering from Washington State University. Immediately after college he went into work on embedded software and hardware for use in critical infrastructure. This included cryptographic communications equipment as well as command and control devices that were using that communications equipment. Since then he’s worked on just about everything ranging from toys, phones, other critical infrastructure, and even desktop applications. Doing everything from hardware system design, to software architecture, to actually writing software that makes your athletic band do its thing.
Tagged . Bookmark the permalink.

Comments are closed.