Material likely to be included in the next version of the book.


  • Numenta research papers
  • D. Geer, Jr., A Rubicon, Hoover Institution Essay, Aegis Series Paper, no. 1801
  • K.J. Hole and S. Ahmad, “Biologically Driven Artificial Intelligence,” Computer, vol. 52, no. 8, 2019, 72–75
  • K.J. Hole, “Dominating Software Systems,” Software, vol. 36, no. 4, 2019, 81–87
  • K.J. Hole and C. Otterstad, “Software Systems with Antifragility to Downtime,” Computer, vol. 52, no. 2, 2019, 23–31
  • C. Otterstad and T. Yarygina, “Low-level Exploitation Mitigation by Diverse Microservices,” in proc. 6th European Conference on Service-Oriented and Cloud Computing (ESOCC 2017), Oslo, Norway, Sept. 27–29, 2017
  • L. Olav, K.J. Hole, C. Otterstad, Ø. Ytrehus, R. Aarseth, and J. Tellnes. “Vendor Malware: Detection Limits and Mitigation,” Computer, vol. 49, no. 8, 2016, 62–69