- Does China Hold the Strategic Advantage?
- ADM Archie Clemins Memoriam & New Webinars
- Webinar Update
- New Webinar Series
- How should the U.S. respond to China’s Taiwan Provocations?
- How Did We Get Into This Cybersecurity Mess?
- China’s Grand Strategy: Downloads
- China’s Grand Strategy: Part 8
- China’s Grand Strategy: Part 7
- China’s Grand Strategy: Part 6
- China’s Grand Strategy: Part 5
- China’s Grand Strategy: Part 4
- China’s Grand Strategy: Part 3
- China’s Grand Strategy: Part 2
- China’s Grand Strategy: Part 1
- Can DevSecOps Undo DoD’s Broken Software Failures?
- Part 2: Will Artificial Intelligence (AI) Help Maintain U.S. Naval Superiority over China’s Growing Naval Power?
- Part-1: Will Artificial Intelligence Help Maintain U.S. Naval Superiority over China’s Growing Naval Power?
- Effective DoD Acquisition Needs Less Noise … Part 2
- Effective DoD Acquisition Needs Less Noise! …Part 1
- Blockchain – The Coming Global Paradigm Shift!
- Navy Acquisition Can Easily Be Fixed
- Time for Transformational Cybersecurity Part II
- Time for Transformational Cybersecurity! Part I
- My Mistake — Congress has Already Enabled DoD “Speed to Capability”
- Why Can’t DoD Buy High-Tech IT While it is Still High-Tech?
- Time to Fix DoD Acquisition and Ensure Cybersecurity!
- Slow Change… Slow Humans!
- DoD’s Fatal Cybersecurity Flaw
- It’s Time to Change Navy’s Tactical IT Game!
Category Archives: Technology Evolution
Driven by peer naval competition from Russia and China, the U.S. Navy has embarked on a transformational Fleet Design vision to enhance U.S. naval warfare. Along with new weapon and sensor technologies, this vision is critically dependent upon out-pacing peer … Continue reading
The last post, Transformational Cyber Security Part I, discussed exciting inventions that turn cybersecurity upside-down by preventing malware from freeloading CPU instructions in a properly configured software defined data center (SDDC), thereby rendering on-premise cyber attacks null and void. It … Continue reading
One of the hardest things to change in human society is a long-standing myth. The current well accepted myth about information technology (IT) systems is that they cannot be defended against well-funded, determined hackers. Because such myths are rarely questioned, … Continue reading
How long does it take the U.S. Army to buy a new handgun? One would think a 90 day market review of the current plethora of commercial handguns could lead to a quick fixed-price contract. Not so; it took them 10 … Continue reading
As I clean up the 24 inches of snow delivered by Blizzard Jonas it is easy to ponder our human vulnerabilities. Amazingly, our weather prediction systems are so accurate that Jonas was detailed almost perfectly for all to avoid and survive. We humans … Continue reading
From the first military use of computers until the late 1980s, military computers were designed and built from the circuit board up. This included designing the instruction set architecture (ISA) that operated the computer’s primary functions. As a young military officer, part of … Continue reading
“…the result is institutionalized processes that prevent IT acquisitions from fully meeting operational needs while failing to defend against peer-capable cyber security threats!” Measuring inputs does not equal effective outputs! It is difficult to measure the output success of a military system acquisition … Continue reading
Unlike banks, security brokers, insurance companies and other information intensive organizations (IIOs), the military is not generally considered to be an IIO. Information intensive organizations routinely spend 20% of annual budget on IT products and support. In 2014 the U.S. … Continue reading
Eight weeks ago I walked into a San Diego, CA hospital to undergo elective surgery to repair two leaky valves in my otherwise healthy heart. My leaky heart valves were discovered following a 2012 ski trip, where the high altitude … Continue reading
“…sustaining exaggerated acquisition timelines in the name of good public stewardship has become an embarrassing National failure.” In my opinion there are two primary issues damaging our Nation’s future defenses! Loss of technical superiority – bureaucratic acquisition processes are … Continue reading