The emergence of big data combined with the revolution in sensor technology is having a synergistic effect that promises a boom in both realms. The ability to fuse sensor data is spurring the growth of large databases that amass more information than previously envisioned. Similarly, the growth of big data capabilities is spawning new sensor technologies and applications that will feed databases’ ever-increasing and diverse types of information.
Military people like to look at themselves, and it has nothing to do with vanity. Rather, it is about improving, but the attention is not always welcome at the business end. Senior personnel offer the usual advice: Cooperate and learn. Do not be defensive. Looking at ourselves can only make us better, so we go along with it. And often—not always, but enough to matter—we find out important facts we did not know.
All the challenges vexing a modern military—budgetary limitations; information technologies; cyber; and joint and coalition interoperability—are defining operations in the Asia-Pacific region. Covering more than half the Earth’s surface and comprising dozens of nations, the vast area is rife with geopolitical rivalries that complicate efforts at regional security. And, the one domain that knows no geographic bounds—cyberspace—weighs heavily on the success of potential warfighting operations in that region.
U.S. military officials may delay the next iteration of the Pentagon’s premier acquisition reform initiative, Better Buying Power 3.0, which likely will continue to improve service acquisition and exportability processes.
This rarely happens, but for 2014, defense and technology analysts are in agreement that big data and cybersecurity are the two drivers in planning and investment for information technology, both in government and in industry. Most everything else will be enabling these two key capabilities. While much attention has been focused on the threats and work being done globally on cybersecurity, I want to focus on big data.
Big data is critical because, unless it is collected, analyzed, managed and made ubiquitously available, many analysts and decision makers will be buried in information they cannot use effectively in a timely fashion. It also is the starting and ending point for many of the technologies and capabilities we care about: networks, data centers, cloud initiatives, storage, search, analytics and secure access
The U.S. Joint Chiefs of Staff has updated its maritime joint command and control guidance, reflecting changing practices across the fleet. Although the rewrite is part of regularly scheduled reviews, the timing is apt for world conditions. U.S. attention is moving east to a far more watery environment than the one the country has focused on for the last dozen or more years, and contentions among nations for waterway control continue to mount in areas such as the East China Sea.
The success of Operation Damayan, the massive Philippines typhoon relief effort by the U.S. Pacific Command, owes as much to preparation as to execution, according to a U.S. official involved in the operation. Military communications equipment designed for easy entry and quick activation provided essential networking capabilities. Longtime multinational and bilateral exercises laid the groundwork for interoperability, both technological and organizational, between U.S. and Philippine armed forces.
The increasing presence of news sources on the Internet offers an unprecedented opportunity to access open-source intelligence for a variety of purposes. Researchers from several U.S. universities have collaborated to take advantage of these resources, creating a big data collection and distribution process applicable to disciplines ranging from social research to national security.
U.S. Navy officials expect to award a full-deployment contract for a new shipboard network this spring, and they plan to install the system on nine ships this year. The network provides commonality across the fleet, replacing multiple aging networks, improving interoperability and driving down costs. The Common Afloat Networks and Enterprise Services (CANES) program represents a new business model for delivering capability to the fleet, Navy officials say. The program consolidates five legacy networks into one, which enhances operational effectiveness and provides better quality of life for deployed sailors.
When the U.S. Coast Guard fields its newest cutter next year, the ship will be equipped with an information technology package that offers common tools and capabilities among the cutter and aviation fleets. The technology suite will improve interoperability across the service and with other agencies, and it enhances situational awareness while providing flexibility for future upgrades.
A new software tool allows federal agencies to scan mobile device applications for security and accessibility issues prior to publishing them. The automated process allows developers to check their code rapidly against a variety of government guidelines to ensure that new mobile applications keep personnel and their organizations safe from hacking and other malicious outside threats.
An upgrade featuring a lightweight sensor and software system added to smaller unmanned vehicles can provide capabilities similar to those available on larger vehicles. As the Defense Department realigns its operational focus to the Pacific, deployable forces, such as special operations teams and Marine Corps expeditionary forces, need high-quality airborne intelligence, surveillance and reconnaissance. While such capabilities are normally provided by unmanned aircraft such as the MQ-1 Predator, smaller platforms have to meet this need for troops operating in remote areas. These smaller vehicles require fewer personnel and are easier to maintain, but they are also less capable.