Create an Account
username: password:
 
  MemeStreams Logo

Post Haste

search

possibly noteworthy
Picture of possibly noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

possibly noteworthy's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
Current Events
  War on Terrorism
Recreation
Local Information
  Food
Science
Society
  International Relations
  Politics and Law
   Intellectual Property
  Military
Sports
Technology
  (Military Technology)
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Military Technology

Major US Arms Sales and Grants to Pakistan Since 2001
Topic: Military Technology 11:23 pm EST, Dec  3, 2007

Major government-to-government arms sales and grants to Pakistan since 2001 have included items useful for counterterrorism operations, along with a number of “big ticket” platforms more suited to conventional warfare. In dollar value terms, the bulk of purchases are made with Pakistani national funds — the Pentagon reports total Foreign Military Sales agreements with Pakistan worth $863 million in FY2002-FY2005; inprocess sales of F-16s and related equipment raised the value to $3.5 billion in FY2006 alone. The United States also has provided Pakistan with about $1.23 billion in Foreign Military Financing (FMF) since 2001, with a “base program” of $300 million per year beginning in FY2005. These funds are used to purchase U.S. military equipment. Pakistan also has been granted U.S. defense supplies as Excess Defense Articles (EDA).

...

Major US Arms Sales and Grants to Pakistan Since 2001


DoD Transformation: Challenges and Opportunities
Topic: Military Technology 11:22 pm EST, Dec  3, 2007

The federal government is on a “burning platform,” and the status quo way of doing business is unacceptable ...

Current Fiscal Policy Is Unsustainable: we cannot simply grow our way out of this problem. Tough choices will be required.

So much for the robots ...

DoD Transformation: Challenges and Opportunities


Who decides: Man or machine?
Topic: Military Technology 9:44 am EST, Dec  1, 2007

An officer working on Future Combat Systems comes out against robotic soldiers:

Although we have made extraordinary advances in technology over the years, it is unlikely that any robotic or artificial intelligence could ever replicate the ability of a trained fighting man in combat.

This reminds me of those quotes about heavier-than-air flight and 640 KB of random access memory.

But can you imagine the outcry when a team of robotic police respond to a swatting prank?

Who decides: Man or machine?


On These Planes, In-Flight Service Is Super-Secret
Topic: Military Technology 8:59 pm EST, Nov 28, 2007

Senior Airman Amanda Fauci's job is so sensitive she has nearly the same security clearance as a Secret Service agent. She sometimes goes on weeks-long classified assignments.

But on a recent mission, the 23-year-old was struggling. Her Texas-shaped sugar cookies made from prepared dough "blew up," she says. She ended up making a new batch from scratch at home that night. The next day, she served them to Defense Secretary Robert M. Gates, former President George H.W. Bush and other VIPs aboard a Boeing 757 bound for College Station, Texas.

"There was a sense of panic there for a moment" when the initial batch flopped, says Airman Fauci, a five-year service veteran.

On These Planes, In-Flight Service Is Super-Secret


Network Technologies for Networked Terrorists: Assessing the Value of ICTs to Modern Terrorist Organizations
Topic: Military Technology 9:24 pm EDT, Oct 10, 2007

This is what you might call a timely delivery.

Understanding how terrorists conduct successful operations is critical to countering them. Terrorist organizations use a wide range of network technologies as they plan and stage attacks. This book explores the role that these communications and computer technologies play and the net effect of their use, the purpose and manner in which the technology is used, the operational actions of terrorists and possible responses of security forces. The authors conclude that future network technologies modestly improve terrorist group efficiency, particularly for their supporting activities, but do not dramatically improve their attack operations. Precluding terrorists from getting the technology they want is impractical; developing direct counters is unlikely to yield high payoffs. Instead, exploiting the technologies and the information such technologies use to enable more direct security force operations are more promising options.

I want this on a t-shirt:

AQI runs SAP.

Presumably the global AQ is also up to date, although they might be GNU guys. I wonder if it took bin Laden four years to transition all of his legacy applications. Anyway, I'm sure the old guard is kvetching about how the new software has made things worse. ("If everything is in the system, why do I still have to print out my expense report?")

Network Technologies for Networked Terrorists: Assessing the Value of ICTs to Modern Terrorist Organizations


Wide-angled gigapixel satellite surveillance
Topic: Military Technology 10:57 pm EDT, Sep 29, 2007

A group of researchers at Sony and the University of Alabama in Huntsville have come up with a wide-angle camera that can image a 10-kilometer-square area from an altitude of 7.5 kilometers with a resolution better than 50 centimeters per pixel.

The trick is to build an array of light sensitive chips - each one recording small parts of a larger image - and place them at the focal plane of a large multiple-lens system. The camera would have gigapixel resolution, and able to record images at a rate of 4 frames per second.

The team suggests that such a camera mounted on an aircraft could provide images of a large city by itself. This would even allow individual vehicles to be monitored without any danger of losing them as they move from one ground level CCTV system to another.

Wide-angled gigapixel satellite surveillance


the official line and the reality on the ground
Topic: Military Technology 9:45 am EDT, Sep 29, 2007

the official line ...

A new Pentagon policy directive for US military intelligence mandates information-sharing with US domestic agencies and foreign partners and recognizes the leading role of the new director of national intelligence.

Although both have been long-standing priorities for the Bush administration, the new directive, drafted in the office of Undersecretary of Defense for Intelligence James R. Clapper Jr. and published last month, is the first time that they have been promulgated in such a high-level policy document at the Pentagon.

And reality on the ground ...

We all get briefed on how important information sharing and collaboration is, but in practice it is actively discouraged. The older generations (everyone in charge) are afraid that someone will steal an idea or publish something before they do and get all the credit.

Yes.

the official line and the reality on the ground


In Cyberwar, Coding is the New Maneuver
Topic: Military Technology 9:45 am EDT, Sep 29, 2007

There is a lot of talk about how agility in IT systems is necessary to "out turn" our adversaries in modern conflict.

The reality is that IT systems in the DoD today manifest very little agility. They are slow to build, slow to respond to changing requirements, and are frequently still integrated in a manner that makes for an incredibly brittle enterprise. This may not be the end of the world when your physical assets can still outperform everyone else's, but what about in the cyber domain? Is it ok there?

In cyber warfare, coding is the new maneuver.

Imagine a world where an armored maneuver commander would have to get to Milestone B before he could conduct a "thunder run," or one where an Air Operations Center would have to draft an RFP and obtain approval before it could dispatch a mission package to a deep target. It sounds silly, but a cyber domain commander working under the constraints of our current system for software acquisition might feel similarly constrained.

Yes.

In Cyberwar, Coding is the New Maneuver


QoS in Mission Orientated Ad-hoc Networks
Topic: Military Technology 7:39 pm EDT, Sep 27, 2007

Abstract
Normal design practice is to decouple the design of applications using a network from the design of the network itself. Designers optimize network performance by only focusing on network transport layer mechanisms for robustness (connectivity), efficiency (throughput), and speed of service (latency). Applications offer loads to the network and rely on the QoS function in the network to prioritize the traffic flows. By contrast, network centric operations focus on application layer features like situation awareness and synchronization to enhance force effectiveness. Therefore, in contrast to enterprise networks in which QoS processes messages based on fixed priorities by data type, in mission orientated MANET, QoS must be a cooperative function between application and network resource management that uses dynamic priority allocations derived from task priorities established by commanders within the echelon hierarchies.

QoS in Mission Orientated Ad-hoc Networks


The Knowledge Matrix Approach to Intelligence Fusion
Topic: Military Technology 6:40 pm EDT, Sep 25, 2007

As the US military transforms to an information-based force, it will need processes and methods to collect, combine, and utilize the intelligence that is generated by its assets.

The process known as fusion will play an important role in determining whether this intelligence is used in the most beneficial manner. The process of fusion, combining pieces of information to produce higher-quality information, knowledge, and understanding, is often poorly represented in constructive models and simulations that are used to analyze intelligence issues.

This report describes one approach to capturing the fusion process in a constructive simulation, providing detailed examples to aid in further development and instantiation.

The Knowledge Matrix Approach to Intelligence Fusion


(Last) Newer << 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0