This is an excerpt of some key concepts from his upcoming book, NANOKRIEG:
BEYOND BLITZKRIEG, a book defining the changes in Military Infrastructure,
Strategies and Tactics needed to win the War on Terrorism. It includes
chapters on cyberterrorism and cyberwarfare.
If we are involved in a cyber-war, where are the frontlines? What are the
defenses that will work? Much of the efforts done so far in cybersecurity are
nothing more than building an ineffective Maginot Line for cyber-defenses.
Should we be spending more time (and money) in figuring out cyberwarfare and
protecting critical infrastructure instead of conventional warfare?
Nanokrieg: A War Won and Lost in Microseconds
When it comes to NANOKRIEG, attacks aren't measured in days or even hours. A
whole cyberattack can last only a couple of seconds - or less. Battlefields
are now in server farms, data centers, and a... (more)
Corporate Cyber-Sabotage: The Six-Phased Enterprise Assessment Framework
When the Tsunami of system failures paralyzes your organization from a
coordinated cyber-attack, it's too late for the CEO to think your
organization can "get through this event." It's too late.
Too many top executives and futurists are giddy about what the future holds
with the "Internet of Things" and the growth of technology-based applications
cutting across many, if not all, industries. Few are talking about
reinforcing corporate systems as well as hardening facilities and mission
critical applications t... (more)
If you are a corporate executive contemplating adding some applications in a
cloud computing network, be very aware of the vendors as well as your own
internal system architects and Chief Technology Officers (CTOs) when they
start talking about cost-effective networks, cheaper components and saving
What many network pseudo-experts don't know is that you don't build cheap
networks. There are no "Fire Sales" on quality, especially when it comes to
network infrastructures. Like anything else, you get what you pay for when it
comes to buying the pieces for your network ju... (more)
If cloud computing is going to spread to more mission-critical type
applications, it needs to get more accurate when it comes to
transaction-based applications. Trying to keep everything in a structured
framework is going to require a more rigorous network infrastructure that
includes timing down to milliseconds, if not nanoseconds.
One way to accomplish this is to use the IEEE 1588 protocol or "Precision
Time Protocol" (PTP), which provides timing. In an earlier article entitled,
"Cloud Transaction Synchronicity," I discussed the need for this type of
capability if financial or... (more)
Major retailers like Sears, Wal-Mart, Lowe's, Best Buy, Shell and others
announced last week their focus on developing MCX, Merchant Customer
Exchange, to enhance their sales and cover the growing demand for
capabilities to buy things from the smartphone.
This is a great milestone in the area of wireless because it adds credibility
to all those preaching that mobile wireless will create a huge paradigm shift
as to how the average consumer will be purchasing goods and services in the
future. When you get retailers that represent over $1 trillion in sales today
talking about devel... (more)