- Can DevSecOps Undo DoD’s Broken Software Failures? 09/21/2020 Marvin Langston
- Part 2: Will Artificial Intelligence (AI) Help Maintain U.S. Naval Superiority over China’s Growing Naval Power? 03/07/2020 Marv Langston
- Part-1: Will Artificial Intelligence Help Maintain U.S. Naval Superiority over China’s Growing Naval Power? 10/15/2019 Marv Langston
- Effective DoD Acquisition Needs Less Noise … Part 2 03/07/2019 Marv Langston
- Effective DoD Acquisition Needs Less Noise! …Part 1 01/06/2019 Marv Langston
- Blockchain – The Coming Global Paradigm Shift! 11/04/2018 Marv Langston
- Navy Acquisition Can Easily Be Fixed 05/21/2018 Marv Langston
- Time for Transformational Cybersecurity Part II 04/08/2018 Marv Langston
- Time for Transformational Cybersecurity! 03/13/2018 Marv Langston
- My Mistake — Congress has Already Enabled DoD “Speed to Capability” 08/12/2017 Marv Langston
- Can DevSecOps Undo DoD’s Broken Software Failures?
- Part 2: Will Artificial Intelligence (AI) Help Maintain U.S. Naval Superiority over China’s Growing Naval Power?
- Part-1: Will Artificial Intelligence Help Maintain U.S. Naval Superiority over China’s Growing Naval Power?
- Effective DoD Acquisition Needs Less Noise … Part 2
- Effective DoD Acquisition Needs Less Noise! …Part 1
- Blockchain – The Coming Global Paradigm Shift!
- Navy Acquisition Can Easily Be Fixed
- Time for Transformational Cybersecurity Part II
- Time for Transformational Cybersecurity!
- My Mistake — Congress has Already Enabled DoD “Speed to Capability”
- Why Can’t DoD Buy High-Tech IT While it is Still High-Tech?
- Time to Fix DoD Acquisition and Ensure Cybersecurity!
- Slow Change… Slow Humans!
- DoD’s Fatal Cybersecurity Flaw
- It’s Time to Change Navy’s Tactical IT Game!
- Time to Stop Measuring Inputs and Deliver IT Capability!
- Can DoD Get Out of It’s Cyber-IT Rut?
- Is DoD an Information Intensive Organization?
- Man and Machine: Our Integrated Future
- Cyber-Security On the Global Playing Field
- we won’t get what we don’t measure!
- … Information Technology really is starting to deliver…
- …I love TED talks…
- the future is still bright…
- an exponential perspective on National Security…
- the interesting thing about ideas…
- technology: autonomy is upon us!
- open letter to U.S. Navy leadership
- DoD can’t get to wave 3 using wave 2 processes!!!
Author Archives: Marv Langston
Now that we have a new administration readying to transform the Executive Branch, it is the right time to reverse decades of inefficient DoD acquisition! Because cyber vulnerabilities are pervasive, today’s acquisition challenges are even more complex than the challenges of twenty years ago. If … Continue reading
As I clean up the 24 inches of snow delivered by Blizzard Jonas it is easy to ponder our human vulnerabilities. Amazingly, our weather prediction systems are so accurate that Jonas was detailed almost perfectly for all to avoid and survive. We humans … Continue reading
“In today’s globalized world… …this approach couldn’t be more ill conceived!” The DoD currently attempts to mitigate cyber threats through onerous certification processes and drawn-out acquisition decision and implementation timelines. In today’s world plagued with cyber criminals and dedicated state sponsored cyber … Continue reading
From the first military use of computers until the late 1980s, military computers were designed and built from the circuit board up. This included designing the instruction set architecture (ISA) that operated the computer’s primary functions. As a young military officer, part of … Continue reading
“…the result is institutionalized processes that prevent IT acquisitions from fully meeting operational needs while failing to defend against peer-capable cyber security threats!” Measuring inputs does not equal effective outputs! It is difficult to measure the output success of a military system acquisition … Continue reading
Pacing modern IT services is critical to the DoD in the face of peer cyber competitors. The future of U.S. military deterrence will depend up our ability to provide effective IT services while preventing cyber attacks. Continue reading
Unlike banks, security brokers, insurance companies and other information intensive organizations (IIOs), the military is not generally considered to be an IIO. Information intensive organizations routinely spend 20% of annual budget on IT products and support. In 2014 the U.S. … Continue reading
Eight weeks ago I walked into a San Diego, CA hospital to undergo elective surgery to repair two leaky valves in my otherwise healthy heart. My leaky heart valves were discovered following a 2012 ski trip, where the high altitude … Continue reading
“…state and non-state actors have demonstrated that acts of cyber-crime, cyber-terrorism, and cyber-warfare will continue to be increasingly disruptive threats to our complex lives…” A couple of months ago I spoke on the subject of cyber-threats to a small evening … Continue reading
“…sustaining exaggerated acquisition timelines in the name of good public stewardship has become an embarrassing National failure.” In my opinion there are two primary issues damaging our Nation’s future defenses! Loss of technical superiority – bureaucratic acquisition processes are … Continue reading