The Global Offsets and Countertrade Association (GOCA) conference just concluded in Montreal. You may ask, “What is an offset and why is it important?” Defense offset agreements are arrangements in which the seller of a product or service agrees to provide benefits such as buying local products or services from a country as an inducement […]
Apps on smartphones and tablets have become so woven into the fabric of our daily lives that the phrase “There’s an App for that!” is no longer a wry amusement but almost universally true in our personal use. Apps can be found designed for a vast array of services, anything from making a reservation at […]
I recently had the pleasure of co-chairing a workshop on Cyber Resilience at AFCEA’s International Conference. So what is Cyber Resilience? Cyber attacks continue with regularity and increasing sophistication. Regardless of how much is spent on defensive measures, an organization must figure that a breach will occur. It’s no longer a matter of “if” but […]
Defence organisations are increasingly challenged by data. Sensors become more complex and the Internet of Things together with social media brings an ever-increasing volume, variety and veracity of data, which must be processed at speed to derive the insights needed to maintain information superiority. We describe data curation as integrating data, enriching it by aligning […]
Finding answers to questions today using the Internet is almost taken for granted. For those under 25, they have never had to do it any other way. For us somewhat older individuals, we remember the days when if you wanted to find out the population of Botswana, for example, then a trek to the library […]
Breaking away from traditional sequential processing architectures, brain inspired computing mimics how the human brain is constructed, resulting in a massively parallel yet very low power consumption chip. NeuroSynaptic processors take a radical new approach to military challenges including image recognition, machine vision, multi sensor fusion and signal processing.
Military organisations can reap economic and efficiency benefits from personal device usage. But it’s more than that. Without a proactive, informed approach to Bring Your Own Device (BYOD), this will happen anyway introducing vulnerabilities to cyber attack, or unintended malware infection.
Economic Vitality is the power that runs the economic strength in every country. In essence it is the sustainment of livable and viable communities. Security, both at a community and national level, plays an extremely important part of that to give confidence that investments today will be able to grow the future. The importance of […]
I hosted a discussion panel on Defence Supply Chair/Logistics Operations at the 13th SPADE Conference at The Hague, Netherlands on 19-21 May. This event, sponsored by AFCEA, IBM and Sol-Pass, had as a theme “Disruptive Innovation, enabling future capability”. Following a short presentation by each panel member, we enjoyed an engaged discussion session with the […]
It was my great pleasure to chair the Cyber Threat Intelligence stream one afternoon last week at the Counter Terror Expo in London. The presentations from Simon Saunders (Portcullis), John Reid (RepKnight) & Gabe Chomic (ISSA) gave me much to reflect on! Here are my six key learning points – with apologies to these good folks if I […]
Watson as a natural language processing tool became internationally recognized when it beat the all time reigning champions on the trivia quiz show “Jeopardy!” Many thought it was an interesting toy and nothing more. IBM’s investment in Watson natural language processing has proven its value to clients, including defense. Most defense organizations have vast troves […]
In my previous post – Cloud for the Military? – I described how cloud computing could help overcome the challenge of increasing mission complexity & agility in a climate of aggressive budget reductions. I concluded that the military don’t really have a choice and it’s really a question of what kind of Cloud is going to be deployed when rather than *if*. […]