Voters pick the Top 100 over at Guitar World.
Unfortunately, they missed a few heavy hitters! Jerry Reed, Tommy Emmanuel, and Roy Clark are nowhere to be found.
Any "great guitarist" list should include these three. In fact, Tommy is a legend and through mentoring, Chet A admired the young Australian's style.
The Top 100 Results
1. Edward Van Halen - Van Halen
2. Brian May - Queen
3. Alex Lifeson - Rush
4. Jimi Hendrix
5. Joe Satriani
6. Jimmy Page - Led Zeppelin
7. Tony Iommi - Black Sabbath
8. Stevie Ray Vaughn
9. Dimebag Darrell - Pantera
10. Steve Vai
11. Randy Rhoads - Ozzy Osbourne/Quiet Riot
12. Dave Mustaine - Megadeth
13. David Gilmour - Pink Floyd
14. Les Paul
15. Duane Allman
16. Robert Johnson
17. John Petrucci - Dream Theater
18. Zakk Wylde - Ozzy Osbourne
19. James Hetfield - Metallica
20. Ritchie Blackmore - Rainbow/Deep Purple
21. Angus Young - AC/DC
22. Slash - Guns N Roses
23. Paul Gilbert - Mr. Big/Racer X
24. Buddy Guy
25. George Harrison - The Beatles
26. Vernon Reid - Living Color
27. Frank Zappa
28. Eric Clapton
29. Billy Gibbons - ZZ Top
30. Chet Atkins
31. Dickey Betts - Allman Brothers
32. Django Reinhardt
33. Mark Morton - Mastodon
34. Mark Tremonti - Creed
35. Warren Haynes - Allman Brothers
36. Kirk Hammett - Metallica
37. Jerry Cantrell - Alice In Chains
39. Jeff Beck
40. Keith Richards - The Rolling Stones
41. Michael Schenker
42. Carlos Santana
43. Yngwie Malmsteen
44. Chuck Berry
45. John Frusciante - Red Hot Chili Peppers
46. Jason Becker - David Lee Roth/Solo
47. Eric Johnson
48. Joe Bonamassa - Black Country Communion
49. Alexi Laiho
50. Dave Murray - Iron Maiden
51. Allan Holdsworth
52. Joe Walsh - The Eagles
53. Rick Nielsen - Cheap Trick
54. Jerry Garcia - Grateful Dead
55. B.B. King
56. Lindsey Buckingham - Fleetwood Mac
57. Tom Morello - Rage Against The Machine
58. Steve Lukather - Toto
59. Son House
60. John Lee Hooker
61. Steve Howe - Asia/Yes
62. Chuck Schuldiner - Death
63. John McLaughlin
64. Albert Lee
65. Pete Townshend - The Who
66. Alex Skolnick - Testament
67. Johnny Winter
68. George Lynch - Dokken/Lynch Mob
69. Kerry King - Slayer
70. Michael Angelo Batio
71. Jeff Loomis - Nevermore
72. Steve Morse - Deep Purple/ Dixie Dreggs
73. Rory Gallagher
74. Ted Nugent
75. Joe Perry - Aerosmith
76. Al Di Meola
77. Andy Summers - The Police
78. Chris Broderick - Megadeth
79. Gary Moore
80. KK Downing - Judas Priest
81. Nuno Bettencourt - Extreme
82. Ropert Fripp - King Crimson
83. Glenn Tipton - Judas Priest
84. Malcolm Young - AC/DC
85. Jeff Hanneman - Slayer
86. Peter Frampton
87. Synyster Gates - Aveneged Sevenfold
88. Neil Young
89. Kenny Wayne Shepherd
90. Robin Trower
91. T-Bone Walker
92. Ace Frehley
93. Gary Rossington - Lynyrd Skynryd
94. Albert King
95. Jack White - White Stripes
96. Mark Knopfler - Dire Straits
97. Tosin Abasi - Animals As Leaders
98. Derek Trucks - Allman Brothers
99. John 5
100. Wes Montgomery
October is National Cyber Security Awareness Month!
National Cyber Security Awareness Month is observed in October to drive awareness about our role in reducing cyber threat and staying secure.
Today, organizations are more dependent than ever on the vast worldwide network of computers, data, and websites that support internal and external transactions, communications, and more. Increased connectivity can bring about greater risk of theft, fraud, and abuse. It is important that organizations ensure their information and infrastructure are secure, reliable, and resilient.
Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI
Defining 900+ ready to use metrics that measure compliance, resiliency, and ROI, this book addresses measuring compliance with current legislation, regulations, and standards in the US, EC, and Canada including SOX, HIPAA, and the Data Protection Act-UK.
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Offering an insider's view of the secrets of hackers, this hands-on guide exposes methodologies hackers use to exploit physical access, network access, and wireless vectors, and shows you how you can outwit computer predators at their own game.
Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition
Detailing the most recent vulnerabilities and remedies along with legal disclosure methods, this book explains how to thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws.
Cybercrime and Espionage: An Analysis of Subversive Multivector Threats
Providing a wealth of knowledge related to the realities seen in the execution of advanced attacks, this book will educate you on realities of advanced, next generation threats, which take form in a variety ways.
Cyber Security Essentials
Illustrating more than 75 key security concepts with short, easy-to-understand descriptions, this book explains the concepts behind today's most prevalent threats, tactics, and procedures and provides actionable advice for the mitigation of common vulnerabilities.
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition
Walking you through the process of conducting an effective security assessment, this authoritative guide provides the tools and up-to-date understanding you need to select the security measures best suited to your organization.
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Providing full coverage of legal and ethical issues, operational vetting, and security team management, this one-of-a-kind guide shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders.
Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security
A groundbreaking exploration of how to identify and fight security threats at every level, this revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more.
Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP
Providing detailed case studies and tips on selecting appropriate security components, this authoritative guide lays out comprehensive technical, administrative, and operational strategies for security management.
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
Explaining how to develop and implement an effective cybersecurity program for ICS, this book provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.
Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges
Loaded with examples of real-world problems and solutions, this book introduces the theoretical foundations and techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems.
The founder of the Khan Academy asks, "what if we were to separate the teaching and credentialing roles of universities?"
He continues the idea to say there would be "rigorous, internationally recognized assessments that measured your understanding in proficiency in various fields."
Those exist today. Consider the technical, information systems, computer science field. A quick search reveals no less than 130+ tool or technology specific certifications for IT professionals. These range from operating systems to cyber security to application specific credentials. There are many more by profession including human resources, systems engineering, systems architecture, and program manager disciplines. The Professional Engineer credential is another distinguished certification.
Students ask about Credentials
As a professor, I often get asked which credentials are best to get and I always respond with the undergraduate or graduate degree. These teach us the discipline, the process, the knowledge, and often technique to approach problem solving. The lessons learned in undergraduate (and graduate) programs have "staying" power - they stay with students long after the degree has been completed and credential received.
Industry or Tool Specific Certifications
One of the issues I see with these assessments is they are specific to a tool or a version of a tool. To demonstrate mastery of a specific tool, these credentials may be considered worthy, but would not replace an education. Perhaps we have heard the term "paper MCSE", those individuals who have the credential, but are ineffective at their positions. This post from 2005 is an example where the individual passed the exams, but observed "the only problem was that I didn't know squat."
Another problem is the tools change through subsequent releases, feature upgrades, mergers, and acquisitions. If one mastered an operating system in 2001, the platform has undoubtedly changed 11 years later.
Complimentary Certifications and Traditional Education
There are high schools that teach traditional curriculum as well as IT certifications such as the Cisco CCNA and/or CISSP. Some higher education institutions include courses or modules that prepare students for certification exams. Industry certifications can be used to bolster a career or improve technical skills and practitioner skills after a university degree program is completed.
To answer the first question, I'm not sure why one would separate teaching and credentialing. I have not even addressed the complexities of exam bias and bias on the international scale.
Will post more on this later including the important social aspect of learning and education.
Larry Ellison, CEO of Oracle just announced that Oracle was launching a brand new cloud computing service. Think for a minute how profound this is given Ellison's resistance to cloud computing since 2008.
In 2008, Ellison had some sharp words about the subject:
"The interesting thing about cloud computing is that we've redefined cloud computing to include everything that we already do. I can't think of anything that isn't cloud computing with all of these announcements. The computer industry is the only industry that is more fashion-driven than women's fashion. Maybe I'm an idiot, but I have no idea what anyone is talking about. What is it? It's complete gibberish. It's insane. When is this idiocy going to stop?"
In contrast, Vivek Kundra, CIO of the U.S. Federal Government was an advocate of cloud computing, “I believe it's the future," he says. "It's moving technology leaders away from just owning assets, deploying assets and maintaining assets to fundamentally changing the way services are delivered“ (CIO, 2008).
The excerpts above were from my ACM and ISE Security award nominated dissertation research posted here: http://scholars.indstate.edu/handle/10484/2031