- How should the U.S. respond to China’s Taiwan Provocations?
- How Did We Get Into This Cybersecurity Mess?
- China’s Grand Strategy: Downloads
- China’s Grand Strategy: Part 8
- China’s Grand Strategy: Part 7
- China’s Grand Strategy: Part 6
- China’s Grand Strategy: Part 5
- China’s Grand Strategy: Part 4
- China’s Grand Strategy: Part 3
- China’s Grand Strategy: Part 2
- China’s Grand Strategy: Part 1
- Can DevSecOps Undo DoD’s Broken Software Failures?
- Part 2: Will Artificial Intelligence (AI) Help Maintain U.S. Naval Superiority over China’s Growing Naval Power?
- Part-1: Will Artificial Intelligence Help Maintain U.S. Naval Superiority over China’s Growing Naval Power?
- Effective DoD Acquisition Needs Less Noise … Part 2
- Effective DoD Acquisition Needs Less Noise! …Part 1
- Blockchain – The Coming Global Paradigm Shift!
- Navy Acquisition Can Easily Be Fixed
- Time for Transformational Cybersecurity Part II
- Time for Transformational Cybersecurity! Part I
- My Mistake — Congress has Already Enabled DoD “Speed to Capability”
- Why Can’t DoD Buy High-Tech IT While it is Still High-Tech?
- Time to Fix DoD Acquisition and Ensure Cybersecurity!
- Slow Change… Slow Humans!
- DoD’s Fatal Cybersecurity Flaw
- It’s Time to Change Navy’s Tactical IT Game!
- Time to Stop Measuring Inputs and Deliver IT Capability!
- Can DoD Get Out of It’s Cyber-IT Rut?
- Is DoD an Information Intensive Organization?
- Man and Machine: Our Integrated Future
Category Archives: Technology Evolution
How long does it take the U.S. Army to buy a new handgun? One would think a 90 day market review of the current plethora of commercial handguns could lead to a quick fixed-price contract. Not so; it took them 10 … Continue reading
As I clean up the 24 inches of snow delivered by Blizzard Jonas it is easy to ponder our human vulnerabilities. Amazingly, our weather prediction systems are so accurate that Jonas was detailed almost perfectly for all to avoid and survive. We humans … Continue reading
From the first military use of computers until the late 1980s, military computers were designed and built from the circuit board up. This included designing the instruction set architecture (ISA) that operated the computer’s primary functions. As a young military officer, part of … Continue reading
“…the result is institutionalized processes that prevent IT acquisitions from fully meeting operational needs while failing to defend against peer-capable cyber security threats!” Measuring inputs does not equal effective outputs! It is difficult to measure the output success of a military system acquisition … Continue reading
Unlike banks, security brokers, insurance companies and other information intensive organizations (IIOs), the military is not generally considered to be an IIO. Information intensive organizations routinely spend 20% of annual budget on IT products and support. In 2014 the U.S. … Continue reading
Eight weeks ago I walked into a San Diego, CA hospital to undergo elective surgery to repair two leaky valves in my otherwise healthy heart. My leaky heart valves were discovered following a 2012 ski trip, where the high altitude … Continue reading
“…sustaining exaggerated acquisition timelines in the name of good public stewardship has become an embarrassing National failure.” In my opinion there are two primary issues damaging our Nation’s future defenses! Loss of technical superiority – bureaucratic acquisition processes are … Continue reading
…there is an App for that… While working at the computer this evening I found myself smiling about the power of the IT tools now helping me live my professional and personal life. Despite being in senior CIO positions during … Continue reading
Earlier in my career, with the help of the brilliant minds of my co-workers, we in the Navy CIO office hyped the idea that “the future is so bright we gotta wear shades,” a phrase we borrowed from the 1986 … Continue reading