- China’s Grand Strategy: Downloads
- China’s Grand Strategy: Part 8
- China’s Grand Strategy: Part 7
- China’s Grand Strategy: Part 6
- China’s Grand Strategy: Part 5
- China’s Grand Strategy: Part 4
- China’s Grand Strategy: Part 3
- China’s Grand Strategy: Part 2
- China’s Grand Strategy: Part 1
- Can DevSecOps Undo DoD’s Broken Software Failures?
- Part 2: Will Artificial Intelligence (AI) Help Maintain U.S. Naval Superiority over China’s Growing Naval Power?
- Part-1: Will Artificial Intelligence Help Maintain U.S. Naval Superiority over China’s Growing Naval Power?
- Effective DoD Acquisition Needs Less Noise … Part 2
- Effective DoD Acquisition Needs Less Noise! …Part 1
- Blockchain – The Coming Global Paradigm Shift!
- Navy Acquisition Can Easily Be Fixed
- Time for Transformational Cybersecurity Part II
- Time for Transformational Cybersecurity! Part I
- My Mistake — Congress has Already Enabled DoD “Speed to Capability”
- Why Can’t DoD Buy High-Tech IT While it is Still High-Tech?
- Time to Fix DoD Acquisition and Ensure Cybersecurity!
- Slow Change… Slow Humans!
- DoD’s Fatal Cybersecurity Flaw
- It’s Time to Change Navy’s Tactical IT Game!
- Time to Stop Measuring Inputs and Deliver IT Capability!
- Can DoD Get Out of It’s Cyber-IT Rut?
- Is DoD an Information Intensive Organization?
- Man and Machine: Our Integrated Future
- Cyber-Security On the Global Playing Field
- We Won’t Get What We Don’t Measure!
Category Archives: DoD IT Acquisition
From the first military use of computers until the late 1980s, military computers were designed and built from the circuit board up. This included designing the instruction set architecture (ISA) that operated the computer’s primary functions. As a young military officer, part of … Continue reading
“…the result is institutionalized processes that prevent IT acquisitions from fully meeting operational needs while failing to defend against peer-capable cyber security threats!” Measuring inputs does not equal effective outputs! It is difficult to measure the output success of a military system acquisition … Continue reading
Pacing modern IT services is critical to the DoD in the face of peer cyber competitors. The future of U.S. military deterrence will depend up our ability to provide effective IT services while preventing cyber attacks. Continue reading
Unlike banks, security brokers, insurance companies and other information intensive organizations (IIOs), the military is not generally considered to be an IIO. Information intensive organizations routinely spend 20% of annual budget on IT products and support. In 2014 the U.S. … Continue reading
“…sustaining exaggerated acquisition timelines in the name of good public stewardship has become an embarrassing National failure.” In my opinion there are two primary issues damaging our Nation’s future defenses! Loss of technical superiority – bureaucratic acquisition processes are … Continue reading
I am a technology guy! I love the excitement of new technology of any kind. In my younger days I believed that all technology was good for mankind as long as humanity properly harnessed it. I believed that all technology … Continue reading
Diversity An important system principle not being considered as DoD continues to secure its Maginot Line around the DISN!! A New Leaf It has been almost a year since I posted my last blog entry so I decided that it … Continue reading
“Offered with full understanding of the challenges and opportunities these issues and suggested solutions represent for the future of America, and for the U.S. Navy’s role in securing that future.” Dr. Marv Langston – January 1st, 2010 This post … Continue reading
Our military Wave 3 information capability is hostage to current Wave 2 bureaucratic processes… …we can’t get there without radical change! Our DoD Culture does not Understand Technology Adoption DoD’s attempt to modernize Joint command & control (C2) is once … Continue reading
Enterprise network & computing, coupled with distributed-services technologies are transforming legacy mission and business systems… Introduction This post describes an acquisition concept that I am currently proposing for the DISA led Network Enabled Command Capability (NECC) Program. With this concept … Continue reading