Welcome!

James Carlini

Subscribe to James Carlini: eMailAlertsEmail Alerts
Get James Carlini via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by James Carlini

Nanokrieg© in Cloud Computing: Battles with Micro-Second Synchronicity If we are involved in a cyber-war, where are the frontlines? Should we be spending more time (and money) in figuring out cyber-warfare, instead of conventional warfare? (Part of this article is an excerpt of Carlini's upcoming book, NANOKRIEG: BEYOND BLITZKRIEG) In the middle of World War II, very basic and primitive computers were designed to improve accuracy for naval gunfire. The first computers ran complex mathematical applications to calculate trajectories and gunfire from large battleships. The size of the computer was huge and was made up of vacuum-tube technology. You could literally walk into the computer. (And needed to, when a tube went bad and you had to replace it.) Since then, computers shrank in size and costs, but their computing power and applications to various industries grew e... (more)

Nanokrieg: The Next Trillion Dollar War | @CloudExpo #Cloud #Security

This is an excerpt of some key concepts from his upcoming book, NANOKRIEG: BEYOND BLITZKRIEG, a book defining the changes in Military Infrastructure, Strategies and Tactics needed to win the War on Terrorism. It includes chapters on cyberterrorism and cyberwarfare. If we are involved in a cyber-war, where are the frontlines? What are the defenses that will work? Much of the efforts done so far in cybersecurity are nothing more than building an ineffective Maginot Line for cyber-defenses. Should we be spending more time (and money) in figuring out cyberwarfare and protecting criti... (more)

Asymmetric Warfare Includes Cyberwarfare By @JamesCarlini | @CloudExpo #Cloud

This is an excerpt of some concepts from his upcoming book, Nanokrieg: Beyond Blitzkrieg, a book covering the changes in Military Infrastructure, Strategies and Tactics needed to win the War on Terrorism. It includes chapters on cyberterrorism and cyberwarfare. With the latest terrorist occurrences in Brussels, Belgium, and Paris, France, on hard targets, we tend to equate terrorism with overt acts of small groups in shootings, stabbings, and bombings of people in order to disrupt their day-to-day lives and create fear in a region's economy. This is referred to as "asymmetrical w... (more)

Iron-Clad Cloud Networks By @JamesCarlini | @CloudExpo #IoT #Cloud

Iron-Clad Cloud Networks and Defending Against Nanokrieg© Today, most enterprises have some type of cloud-based solutions or are looking at cloud-based infrastructure for some of their enterprise applications. What is lacking in many organizations is the strategic design focus and sophisticated implementation for very secure infrastructure which not susceptible to cyberattacks. Hardening data centers as well as enterprise networks (and clouds) is a critical step to ensure an organization's business continuity. Forget "disaster recovery" as it is a dated term and dated concept. Di... (more)

Cloud Computing Connectors: Beware of Counterfeits

If you are a corporate executive contemplating adding some applications in a cloud computing network, be very aware of the vendors as well as your own internal system architects and Chief Technology Officers (CTOs) when they start talking about cost-effective networks, cheaper components and saving you money. What many network pseudo-experts don't know is that you don't build cheap networks. There are no "Fire Sales" on quality, especially when it comes to network infrastructures. Like anything else, you get what you pay for when it comes to buying the pieces for your network ju... (more)