China’s Grand Strategy: Part 1

Will China’s rise be peaceful? What the smart money says
By Evan Dudik

Whether you believe China can be tamed depends a lot on who you ask.

Will China’s rise be peaceful? Is the world’s newest superpower benign? Is China the inevitable world hegemon? Should we accept, even welcome, this new superpower to the world order? Facilitate and encourage its membership in international organizations? Expect that in the course of time, China will accept and behave in accord with international norms of behavior?

Continue reading

Posted in Global Perspectives, National Security, The China Challenge | Leave a comment

Can DevSecOps Undo DoD’s Broken Software Failures?

The Department of Defense (DoD) has been developing software intensive systems for the last thirty years. Only in the past decade has the Department openly recognized that these software intensive systems are critical to the future of U.S. National Security. DevSecOps, short for Development, Security, Operations, is one of the hottest commercial information technology (IT) trends. Continue reading

Posted in Cybersecurity, DoD IT Acquisition, Technology Evolution | 22 Comments

Part 2: Will Artificial Intelligence (AI) Help Maintain U.S. Naval Superiority over China’s Growing Naval Power?

As discussed in Part 1 of this AI discussion, China’s central government plans to achieve AI breakthroughs by 2025 and world AI dominance by 2030. If the DoD’s past acquisition track record doesn’t change, it could be twenty years before significant AI technology is actually deployed to military units. Continue reading

Posted in DoD IT Acquisition, Global Perspectives, National Security, Technology Evolution, U.S. Navy Capability | 13 Comments

Part-1: Will Artificial Intelligence Help Maintain U.S. Naval Superiority over China’s Growing Naval Power?

Background

It is hard to pick up a magazine or newspaper today without seeing something about the amazing things artificial intelligence and/or machine learning (AI/ML) are doing to change our lives for the better. Most people enjoy the benefits of talking to our computers, cars, and home specialty devices like Google Home and Amazon Alexa but don’t think about or care that these technologies are enabled by natural language processing (NLP), one of the today’s most advanced forms of AI/ML. It is even possible today to get real time language translation earbuds to help us more easily explore visits to foreign countries, bringing the Star Trek universal translator that much closer to reality (https://www.startrek.com/database_article/universal-translator). Continue reading

Posted in DoD IT Acquisition, Global Perspectives, National Security, Technology Evolution, U.S. Navy Capability | Tagged , , , | 28 Comments

Effective DoD Acquisition Needs Less Noise … Part 2

The well-known valley of death between the DARPA or Military Service Science & Technology (S&T) development and military Programs of Record (PORs) is the result of the high-entropy, high-noise channel, that sits between S&T and the bureaucratic DoD acquisition system. This noisy acquisition demise can be traced backward from today’s Planning Programming Budgeting System (PPBS), Federal Acquisition Regulations (FAR), Operation of the Defense Acquisition System Instruction (DoD Instruction 5000.2), and Joint Capabilities Integration and Development System (JCIDS). Each are now large bureaucracies that help make up the majority of the 25,000-person army of centralized DoD oversight, operating from the Pentagon. Continue reading

Posted in DoD Acquisition, DoD IT Acquisition, Global Perspectives, Leadership, Technology Evolution | 17 Comments

Effective DoD Acquisition Needs Less Noise! …Part 1

Claude Shannon – Father of the Information Age

To fix DoD acquisition, one only has to leverage George Gilder‘s brilliant adoption of Claude Shannon‘s information theory as the economic growth engine. Shannon’s 1948 landmark information theory paper, “A Mathematical Theory of Communication,” defines information as surprise. For his mathematics and research he is credited as the father of the information age. He taught the world that information transmitted across a communication channel (a wire, a fiber, cell towers, or human networks) is information or surprise at the receiving end because it is unknown before it was sent. If we could predict new information communicated across a channel, it would have little or no value* Continue reading

Posted in DoD Acquisition, Global Perspectives, Leadership, Technology Evolution | 21 Comments

Blockchain – The Coming Global Paradigm Shift!

 

George Gilder, in his latest book, Life After Google: The Fall of the Big Data and the Rise of the Blockchain Economy, effectively argues that our current big data IT world (he uses Google as the metaphor and leading provider) is not here to stay because of inherent flaws, the most significant being cyber-insecurity and the associated loss of human privacy. George Gilder is an American writer, investor, 20-book author, and techno-utopian advocate. Despite it’s current hype, some may ask, what is blockchain? Continue reading

Posted in Cybersecurity, DoD IT Acquisition, Global Perspectives, Leadership, Technology Evolution | 11 Comments

Navy Acquisition Can Easily Be Fixed

Driven by peer naval competition from Russia and China, the U.S. Navy has embarked on a transformational Fleet Design vision to enhance U.S. naval warfare. Along with new weapon and sensor technologies, this vision is critically dependent upon out-pacing peer competitors with artificial intelligence and cyberspace control. Continue reading

Posted in Cybersecurity, DoD IT Acquisition, Global Perspectives, Leadership, Technology Evolution | 19 Comments

Time for Transformational Cybersecurity Part II

The last post, Transformational Cyber Security Part I, discussed exciting inventions that turn cybersecurity upside-down by preventing malware from freeloading CPU instructions in a properly configured software defined data center (SDDC), thereby rendering on-premise cyber attacks null and void.  It also discussed root-of-trust encrypted metavisor technology that protects applications and data operating in the cloud. Continue reading

Posted in Cybersecurity, DoD IT Acquisition, Global Perspectives, Technology Evolution | 2 Comments

Time for Transformational Cybersecurity! Part I

One of the hardest things to change in human society is a long-standing myth. The current well accepted myth about information technology (IT) systems is that they cannot be defended against well-funded, determined hackers.  Because such myths are rarely questioned, the cyber security workforce takes it as a given that even highly secured IT systems will be compromised at some point. The good news is that myth-busting cyber technologies are now available to transform cybersecurity from today’s major government, financial, and consumer challenge, into a future where all but deep insider cyber intrusion is impossible!  Continue reading

Posted in Cybersecurity, DoD IT Acquisition, Global Perspectives, Technology Evolution | Tagged , , , | 4 Comments