Nanokrieg© in Cloud Computing: Battles with Micro-Second Synchronicity
If we are involved in a cyber-war, where are the frontlines? Should we be
spending more time (and money) in figuring out cyber-warfare, instead of
(Part of this article is an excerpt of Carlini's upcoming book, NANOKRIEG:
In the middle of World War II, very basic and primitive computers were
designed to improve accuracy for naval gunfire. The first computers ran
complex mathematical applications to calculate trajectories and gunfire from
large battleships. The size of the computer was huge and was made up of
vacuum-tube technology. You could literally walk into the computer. (And
needed to, when a tube went bad and you had to replace it.)
Since then, computers shrank in size and costs, but their computing power and
applications to various industries grew e... (more)
This is an excerpt of some concepts from his upcoming book, Nanokrieg: Beyond
Blitzkrieg, a book covering the changes in Military Infrastructure,
Strategies and Tactics needed to win the War on Terrorism. It includes
chapters on cyberterrorism and cyberwarfare.
With the latest terrorist occurrences in Brussels, Belgium, and Paris,
France, on hard targets, we tend to equate terrorism with overt acts of small
groups in shootings, stabbings, and bombings of people in order to disrupt
their day-to-day lives and create fear in a region's economy.
This is referred to as "asymmetrical w... (more)
Getting a second perspective based on several decades of diversified
experience can only fortify your decisions on strategically applying
technology to your organization.
With demands on enterprise systems changing so fast, most organizations'
architectures and frameworks of Intelligent Infrastructure are in a stressful
state. Many are focused on trying to maintain obsolete systems and few are
willing to make a major investment in change. What was considered
state-of-the-art two or three years ago can be obsolete today.
With the intelligent infrastructure that is in place in a va... (more)
Iron-Clad Cloud Networks and Defending Against Nanokrieg©
Today, most enterprises have some type of cloud-based solutions or are
looking at cloud-based infrastructure for some of their enterprise
applications. What is lacking in many organizations is the strategic design
focus and sophisticated implementation for very secure infrastructure which
not susceptible to cyberattacks.
Hardening data centers as well as enterprise networks (and clouds) is a
critical step to ensure an organization's business continuity. Forget
"disaster recovery" as it is a dated term and dated concept. Di... (more)
Was there some bias as to what got said on Twitter on the night of the
Twitter needs to be able to handle large volumes and if they can't, they
cannot say that they are providing any accurate public barometer on something
as important as a Presidential debate.
On the last Presidential debate (with Crowley as moderator), I wanted to send
a comment out as I was watching the debates and got tangled up on Twitter
(this was about 8:50 p.m. Central Time). Evidently, the Twitter "Cloud" was
deluged with tweets and they had a hard time handling it.
There was a rush to submit tw... (more)