Welcome!

James Carlini

Subscribe to James Carlini: eMailAlertsEmail Alerts
Get James Carlini via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by James Carlini

This is an excerpt of some key concepts from his upcoming book, NANOKRIEG: BEYOND BLITZKRIEG, a book defining the changes in Military Infrastructure, Strategies and Tactics needed to win the War on Terrorism. It includes chapters on cyberterrorism and cyberwarfare. If we are involved in a cyber-war, where are the frontlines? What are the defenses that will work? Much of the efforts done so far in cybersecurity are nothing more than building an ineffective Maginot Line for cyber-defenses. Should we be spending more time (and money) in figuring out cyberwarfare and protecting critical infrastructure instead of conventional warfare? Nanokrieg: A War Won and Lost in Microseconds When it comes to NANOKRIEG, attacks aren't measured in days or even hours. A whole cyberattack can last only a couple of seconds - or less. Battlefields are now in server farms, data centers, and a... (more)

Asymmetric Warfare Includes Cyberwarfare By @JamesCarlini | @CloudExpo #Cloud

This is an excerpt of some concepts from his upcoming book, Nanokrieg: Beyond Blitzkrieg, a book covering the changes in Military Infrastructure, Strategies and Tactics needed to win the War on Terrorism. It includes chapters on cyberterrorism and cyberwarfare. With the latest terrorist occurrences in Brussels, Belgium, and Paris, France, on hard targets, we tend to equate terrorism with overt acts of small groups in shootings, stabbings, and bombings of people in order to disrupt their day-to-day lives and create fear in a region's economy. This is referred to as "asymmetrical w... (more)

Has Your Enterprise Cloud Hit a Brick Wall?

You can design a great enterprise cloud network, but it will be very restricted if you are in a building that does not support broadband connectivity or mission-critical applications. What good is a multi-gigabit design if your connection to the central office is not fiber? Or redundant? Can you even have a mission-critical network if you only have one connection to one central office? Here are five ways to tell if your building is obsolete. Excerpt from James Carlini's upcoming book, Location, Location, Connectivity : How receptive is your building to all the new connectivity t... (more)

The Five Rules of Cloud Computing Litigation

“Once you get into Cloud Computing and past the glossy euphemisms, you better watch out for the real rocks in the road,” observes James Carlini. “Cloud computing is the major approach that most organizations should be adapting for their applications in this new era of mobile computing.” You have all read the ads and the articles that hype it, along with all the overnight experts that tout how they know that Cloud Computing is the universal solution for today’s and tomorrow’s organizations. Now, let’s get back on the ground and understand what some of the real potholes and obstac... (more)

Cloud Computing Procurement: As Easy as Remembering RFP

When it comes to procurement, any technology or service should be evaluated with a good set of criteria. Executive decisions should not be weighted solely on a single selection criterion such as price. This applies to any cloud computing service as well. The twelve criteria listed below (see Chart 1) forces executives to take a broader review of the many elements of the total cloud computing service, and not just price. Each criteria starts with an R, F, or P which makes it easy to remember the total framework for the Yardstick for Technology Procurement (RFP). Chart 1: Yardsti... (more)