Author Archives: Marvin Langston

Podcast Update 3

Jim and I have been a little less active on the webinar series the last few months but now have two very useful Podcasts to share. Please comment below to let us know what you think. Podcast #11: Big Data … Continue reading

Posted in Cybersecurity, DoD Acquisition, DoD IT Acquisition, Technology Evolution | Leave a comment

Does China Hold the Strategic Advantage?

Does China Hold the Strategic Advantage by Operating Inside the U.S. and Allies’ OODA Loop? Guest post by Evan Dudik What is the biggest roadblock to a successful U.S. China strategy? Maybe it lies hidden in plain sight. Here’s a … Continue reading

Posted in Global Perspectives, National Security, The China Challenge | Leave a comment

ADM Archie Clemins Memoriam & New Webinars

Honoring Admiral Archie Clemins and an Introduction to the latest three posted webinars. Continue reading

Posted in Leadership, Technology Evolution | 10 Comments

Podcast Update

Jim and I have now completed six thirty minute webinars that are posted on this site, YouTube, and Linkedin. Here is a short introduction to these webinars. We find these discussions to be very informative and relevant to the challenges … Continue reading

Posted in Cybersecurity, DoD Acquisition, DoD IT Acquisition, Global Perspectives, Leadership, National Security, Technology Evolution, The China Challenge, U.S. Navy Capability | Leave a comment

New Podcast Series

Jim Pietrocini and I have started a new Podcast series intended to: Explore important topics in technology, global trends, DoD acquisition activities, and research & development related to U.S. National Security. Invite key thinkers and leaders to share their views, … Continue reading

Posted in Global Perspectives, National Security, Technology Evolution, The China Challenge | 3 Comments

How Did We Get Into This Cybersecurity Mess?

We all know that information about our adversaries and partner countries is and always has been critical to National Security. Before our interconnected world of the internet, information operations were more about human spying, one person to another. As technology … Continue reading

Posted in Cybersecurity, Technology Evolution | 15 Comments

Can DevSecOps Undo DoD’s Broken Software Failures?

The Department of Defense (DoD) has been developing software intensive systems for the last thirty years. Only in the past decade has the Department openly recognized that these software intensive systems are critical to the future of U.S. National Security. … Continue reading

Posted in Cybersecurity, DoD IT Acquisition, Technology Evolution | 22 Comments