Cyber-security expert Jim Feldkamp discusses the recent cyber attack on Honda’s global operations. Cyber-attacks are a constant risk for major companies. On June 9, 2020, BBC News released an article stating that Honda had confirmed a cyber-attack. Cyber-security expert Jim Feldkamp explained the Japanese car-maker made […]
Wine enthusiast Jim Feldkamp explains how the coronavirus pandemic has shifted wine industry trends and what will happen next. The world consumes roughly 24 billion liters of wine per year. This results in roughly $29 billion in revenue. However, the wine industry in 2020 looks […]
Professional Reedsy Editor Jim Feldkamp Explains How the Organization Boosts Author Potential in Self-Publishing Industry
Working as an editor with the online author resource Reedsy, Jim Feldkamp adds to the specialized tools available to boost author potential in the self-publishing industry.
Jim Feldkamp serves as a Subject Matter Expert at Georgetown University where he’s developed a course on “Terrorism and Unconventional Threats.” In the past, he was an adjunct professor at George Mason University, and George Washington University, teaching undergraduate courses in domestic and international terrorism. During his career, Jim Feldkamp has also authored and edited a university textbook through Cognella Academic Publishing.
In his spare time, he helps authors with a dream of self-publishing improve their craft and their potential in the industry as an experienced editor. With his help, and the help of professionals working remotely from around the world, Reedsy sits at the top of available publishing resources for aspiring authors.
“Reedsy was founded in 2014 and has grown into a tremendous international network of professionals that offer insight, tools, and free educational content to help authors succeed in the self-publishing industry,” says Jim Feldkamp. “To date, the company has assisted in producing more than 10,000 books.”
Reedsy is trusted all over the world for providing quality talent and assistance to authors, and they’re dedicated to working only with professionals such as marketers, editors, ghostwriters, and designers who have proven their worth in the industry. Authors coming to Reedsy for help include a diverse roster of writers from all walks of life who receive individualized support suited to their genre and budget.
“The company is based in 30 countries, bringing diverse perspectives and tried-and-true methods to amplify author success,” says Jim Feldkamp. “Ultimately, the goal of Reedsy is to help produce a vast variety of books and writers who aren’t restricted to the rules of mass-market culture.”
Jim Feldkamp says Reedsy offers lists of book promotion sites where self-published authors can boost recognition of their work. They also offer book review blogs to help generate buzz, Booktube channel guides to enlighten authors of available resources, and access to literary magazines. Reedsy even gives authors generator tools to help them shave off time when choosing elements like book titles, character names, and pen names.
Throughout the year, Reedsy offers short story ideas for creative thinking, weekly and annual writing contests to sharpen authors’ talent and boost audience, and many writing exercises that help authors improve their craft.
“As an editor with Reedsy, I have the opportunity to further expand the diverse perspective of self-published books while ensuring quality, engaging content for readers everywhere,” says Jim Feldkamp.
Professional book editor Jim Feldkamp demonstrates what he believes it takes in life to succeed in the often highly competitive editing field. A copy editor with experience at multiple publishing agencies, Jim Feldkamp specializes in national security, foreign affairs, history, and travel. Celebrated for his […]
Cybersecurity expert, author, and now-retired naval officer Jim Feldkamp looks back on more than 30 years of achievements, both personal and professional. Culminating in a crucial role as a subject matter expert at Georgetown University in Washington, D.C., Jim Feldkamp, a cybersecurity expert now based […]
With world events pushing the public towards mobile voting, Jim Feldkamp helps readers understand some of the widespread concerns over such a system.
Jim Feldkamp is a cybersecurity expert who has worked to deter and prevent security breaches for the government for years. Recently, House Speaker Nancy Pelosi vowed to make mobile voting, where voters can cast ballots in elections on their smart devices, an alternative to voting at typical locations during a potential pandemic.
“Voting remotely has always been a topic of concern for those attempting to avoid voter fraud and other illegal activities since it features less official oversight,” says Jim Feldkamp. “In the past, voters have been able to fill out and send in absentee ballots under certain circumstances, but now some states are planning to offer voters the chance to cast votes directly from their mobile devices.”
Some cybersecurity experts have raised concerns over mobile voting since the sort of systems required are unproven and tend to be vulnerable to hacking. Jim Feldkamp says that some states will begin offering voters with disabilities the chance to cast ballots remotely using their phones during the next primary elections. This allows those who may not feel safe at traditional polling locations due to their health or who are unable to leave their homes during the allotted time to cast their vote.
“In addition, the mobile voting option is likely to extend to state residents who are overseas as well as voters in the military who may not be able to access polling booths,” says Jim Feldkamp. “West Virginia was the first to attempt statewide mobile voting, which they supplied to military and overseas voters in 2018. Today, there are many states showing interest in the system, with a handful intending to implement it in the upcoming primary.”
Mobile voting will help society by not asking large groups of people to crowd into polling sites, an important concern during present stay-at-home orders. Some disabilities make it impossible for voters to vote by mail without receiving assistance, but mobile voting will improve this by using guided prompts and offering virtual assistance.
However, many professionals have raised concerns over the safety of voting applications, stating that they contain too many vulnerabilities to be a viable solution. Even many proponents of mobile voting applications believe tighter security protections should be enacted before allowing the general population to use it. Some say it will be several years before we can conduct enough testing and verification on mobile voting for it to be a mainstream voting option.
“While there are plenty of kinks that need to be worked out and new security efforts that should be put in place, the benefits of mobile voting include increased voter turnout across the board, which is a tremendous factor to consider,” says Jim Feldkamp.
Having worked under a few of the nation’s top anti-terrorist organizations, Jim Feldkamp shares his thorough understanding of terrorism theory and politics in a new textbook. In the past, Commander USN Ret. Jim Feldkamp flew combat missions as a Naval Flight Officer during Desert Storm, […]
As yearly growing conditions have altered how and when seasonal grape production takes place as a result of global climate change, wine enthusiasts and connoisseurs like Jim Feldkamp called for greater environmental action to prevent the degradation of vineyards. “We really have to do something […]
As cyber technology products and services ramp up across the world over, it is important to protect oneself from the negative impacts of these systems. By studying the work of cybersecurity expert Jim Feldkamp, we can get a better understanding of these risks and apply safeguards to protect against them.
“If Americans are not prepared for an onslaught of hacking as a technological form of assault, then they are not preparing correctly.” the Cybersecurity expert has espoused over and over again throughout the years. Jim Feldkamp suggests keeping both computer hardware and software updated once every three to five years. “Ransomware can target major corporations so if they can be hacked easily, you, as a citizen, need to be aware of the issue.” Jim Feldkamp says.
Jim Feldkamp is a former US Naval Flight Officer, Counter-Measures Officer (ECMO), and Navigator for the EA-6B. Thanks to his assistance in Operation Desert Shield and Desert Storm in 1991, he became a Special Agent for the Federal Bureau of Investigation (FBI) at Norfolk, Virginia. His tasks were to develop the Joint Counter-Terrorism Task Force that would serve as an aerial surveillance tool against those terrorist suspects. After a short stint as a politician, Jim Feldkamp returned to his first love of military endeavors where he, in 2007, formed the precursor office of NMIO (National Maritime Intelligence Office) that worked to share information of domestic and international non-classified matters across federal and foreign governmental agencies. As a result, Jim Feldkamp has spent many hours in the office working up how best to share this information without having to deal with any leaks in the content being shared.
“Having a strong password that is tough to guess and don’t have any kind of pattern is key to maintaining secure systems.” Jim Feldkamp has noted several times in many of his keynote addresses to cybersecurity groups. “If you want to use a VPN with hashing algorithms in order to send and receive data from foreign countries, be careful to use the proper VPN as foreign parties can uncover information that you may have thought was being disguised but really isn’t.”
Thanks to his raw experience, Jim Feldkamp has transformed himself into a rather well-known expert in the cybersecurity space.
“If you are looking to transfer data from old hardware to new hardware, the most important first step is to transfer the data. Immediately afterward, wipe the data with a data wiping software. This doesn’t just delete the data but it wipes it out and creates a new binary code replacement that is virtually impossible to decode and obtain private data from.”
This advice and several others are just the tips of the iceberg when it comes to Jim Feldkamp’s knowledge in the area of cybersecurity. It will be interesting to see what new advice he will be able to deliver in the future as he continues his career as an official in the field.
As cyber technology products and services ramp up across the world over, it is important to protect oneself from the negative impacts of these systems. By studying the work of cybersecurity expert Jim Feldkamp, we can get a better understanding of these risks and apply […]