James Carlini

Subscribe to James Carlini: eMailAlertsEmail Alerts
Get James Carlini via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by James Carlini

Bitcoins are a digital cryptocurrency and have been around since 2009. As a substitute for legal tender, they are becoming a rage for investors and others but because there is no government agency auditing or performing regulatory oversights, you wonder if it is the perfect breeding ground for electronic nanocrime? Since the introduction of the Bitcoin, some competitors have emerged and the whole segment of cryptocurrencies are defined as Altcoins. Altcoins include: Dogecoin, Ethereum, Feathercoin, Litecoin, Monero, Novacoin, Peercoin, and Zetacoin. Some of these cryptocurrencies are considered improvements on the original Bitcoin algorithm structure, and they are gaining some traction as well. Some financial experts and analysts, including Warren Buffett and Ben Stein, are leery of the overall cryptocurrency market. Is it because it doesn't fit into their more tr... (more)

Cloud Computing Procurement: As Easy as Remembering RFP

When it comes to procurement, any technology or service should be evaluated with a good set of criteria. Executive decisions should not be weighted solely on a single selection criterion such as price. This applies to any cloud computing service as well. The twelve criteria listed below (see Chart 1) forces executives to take a broader review of the many elements of the total cloud computing service, and not just price. Each criteria starts with an R, F, or P which makes it easy to remember the total framework for the Yardstick for Technology Procurement (RFP). Chart 1: Yardsti... (more)

Cloud Transactions: Timing as a Service (TaaS)

Many organizations are starting to look at cloud computing as a universal solution, but there are many applications that cannot be considered unless the framework of cloud computing includes Timing as a Service (TaaS)© as part of its fabric. Mission-critical applications require security measures including encryption, monitoring, and redundancy/resiliency, but that is not enough. As stated in an earlier article: (http://cloudcomputing.sys-con.com/node/2164323 ) If cloud computing is going to spread to more mission critical-type applications, it needs to get more exact and accur... (more)

The Cost of Disruption in Network Projects

From an upcoming white paper on network infrastructure projects: Many organizations that are looking at implementing a new network infrastructure for cloud computing; a new building being built; or any other network capability, better look closer at their network designs. Why? All the cabling needed to build the network should fit the lifespan of the building, not the lifespan of the technology that is hanging off of it. A lot of network architects, network designers and "certified" network engineers seem to be forgetting this fundamental design concept. They also seem to be forg... (more)

Review | The Internet of Things: QNX Seminar

This is a summary of a QNX webinar that was just presented on July 10, 2014 by BlackBerry (BBRY) and QNX. This was an anticipated seminar because many people are looking for answers to questions they have about the big buzzword, the Internet of Things (IoT). They also want to know what role does the cloud-based product QNX play within this environment? The QNX webinar gave a good overview of what the QNX product was and how it fit into the overall business market. They are operating system agnostic, which means they can work with any device, not just one type of Operating Syste... (more)