Welcome!

James Carlini

Subscribe to James Carlini: eMailAlertsEmail Alerts
Get James Carlini via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by James Carlini

This is an excerpt of some concepts from his upcoming book, Nanokrieg: Beyond Blitzkrieg, a book covering the changes in Military Infrastructure, Strategies and Tactics needed to win the War on Terrorism. It includes chapters on cyberterrorism and cyberwarfare. With the latest terrorist occurrences in Brussels, Belgium, and Paris, France, on hard targets, we tend to equate terrorism with overt acts of small groups in shootings, stabbings, and bombings of people in order to disrupt their day-to-day lives and create fear in a region's economy. This is referred to as "asymmetrical warfare", where one enemy has a totally different level of resources and personnel to apply. Both sides are not equal in strength, but the weaker enemy makes up for it with non-traditional and guerilla warfare tactics to defeat and demoralize their enemy. Iron-Clad Clouds Are a Must in Today's... (more)

Micro-Second Synchronicity | @CloudExpo #Cloud #BigData #IoT #M2M

Nanokrieg© in Cloud Computing: Battles with Micro-Second Synchronicity If we are involved in a cyber-war, where are the frontlines? Should we be spending more time (and money) in figuring out cyber-warfare, instead of conventional warfare? (Part of this article is an excerpt of Carlini's upcoming book, NANOKRIEG: BEYOND BLITZKRIEG) In the middle of World War II, very basic and primitive computers were designed to improve accuracy for naval gunfire. The first computers ran complex mathematical applications to calculate trajectories and gunfire from large battleships. The size of ... (more)

Nanokrieg: The Next Trillion Dollar War | @CloudExpo #Cloud #Security

This is an excerpt of some key concepts from his upcoming book, NANOKRIEG: BEYOND BLITZKRIEG, a book defining the changes in Military Infrastructure, Strategies and Tactics needed to win the War on Terrorism. It includes chapters on cyberterrorism and cyberwarfare. If we are involved in a cyber-war, where are the frontlines? What are the defenses that will work? Much of the efforts done so far in cybersecurity are nothing more than building an ineffective Maginot Line for cyber-defenses. Should we be spending more time (and money) in figuring out cyberwarfare and protecting criti... (more)

Global Net Superiority: Preparing for NANOKRIEG© By @JamesCarlini | @ThingsExpo #IoT

"The United States has had Air superiority since 1947. Its military has shown dominance on the land, sea and in the air for decades, but what about having Global Net Superiority today - and tomorrow?" - James Carlini Cyber warfare is not a futuristic theory being discussed on one of the military channels by some obscure software architect anymore. It is a common occurrence in today's global economy and it appears some are trying to test the electronic defenses we have set up on the Internet. The question becomes, are we susceptible to a cyberattack? How much would we lose in a cy... (more)

Cloud Transactions: Timing as a Service (TaaS)

Many organizations are starting to look at cloud computing as a universal solution, but there are many applications that cannot be considered unless the framework of cloud computing includes Timing as a Service (TaaS)© as part of its fabric. Mission-critical applications require security measures including encryption, monitoring, and redundancy/resiliency, but that is not enough. As stated in an earlier article: (http://cloudcomputing.sys-con.com/node/2164323 ) If cloud computing is going to spread to more mission critical-type applications, it needs to get more exact and accur... (more)