Showing posts with label DoD. Show all posts
Showing posts with label DoD. Show all posts

March 6, 2011

Meet ATLAS




This is amazing (watch the whole thing)!

Meet the latest and greatest military humanoid robot from Boston Dynamics--Atlas (aka PETMAN).

(Boston Dynamics is the same company that makes BigDog, the 4 legged, ground transport robot, that looks like a mule--called the Legged Squad Support System, LS3)

Watch the movement of the Atlas robot--it is JUST like a person: heel to toe walking.

See what happens when you push it--Atlas reacts/recovers like a human would.

The built up version has hands that help it balance and squeeze through tight spaces.

BusinessWeek (March 7-13, 2011) explains that this robot will be used initially for surveillance and emergency rescue missions.
I'm thinking Atlas should be pronounced like "at last" to recognize the amazing leap forward in robotics.

This is great stuff--and it demonstrates our growing understanding of not only computers and robotics, but also of the physical and behavioral sciences.

Share/Save/Bookmark

February 2, 2011

Half Man, Half Machine


I continue with my infatuation with everything robotics.
Here, the new Second Generation Exoskeleton Robotic Suit, the XOS 2, from Raytheon (Note: this is not a vendor endorsement)
Life imitating art--these robotic suits have been a favorite in Iron Man and the movie Alien.
I can't forget the scene in Alien when Sigourney Weaver puts on the robotic suit to fight the alien on the shuttle and blasts the alien into deep space.
In only 3-5 years, our military men and women will be wearing these and fighting with super-human capabilities.
The big hang-up with these right now is that they are tethered to a power supply, which limits mobility, but as the video explains, untethered versions will be coming soon.
I can envision commercial versions of these being worn in construction, manufacturing, warehousing--making work easier for people, decreasing job-related injuries and raising productivity.
I can also foresee theme parks where kids (and adults) prance around in mini-versions of these robotic suits and pretend they are superheros.
I also imagine these will make it into law enforcement, fire and rescue, and other emergency management functions where keeping the peace or saving lives can be enabled by robots and exoskeletons too.

Share/Save/Bookmark

January 9, 2011

The Center Of Gravity Is Information

Center of Gravity (COG) is a military concept that Dr. Joseph Strange defines as “primary sources of moral or physical strength, power, and resistance.” From a military perspective, this is where we should concentrate when attacking the enemy. As Prussian strategist Carl von Clausewitz states, “that is the point against which all our energies should be directed.”

In “Center of Gravity Analysis” (Military Review, July/August 2004), Army Colonel Dale Eikmeier describes the framework for COG and how an enemy (your threat) attempts to exploit them, as follows:

· Center of Gravity—the organizations that do the work (e.g. the military/industrial complex)

· Critical Capabilities (CC)—the strengths of the organization—its “primary abilities”

· Critical Requirements (CR)—the supplies that a COG use—the inputs that are their opportunities, if leveraged for future plans

· Critical Vulnerabilities (CV)—the vulnerabilities a COG has—e.g. exposed or unguarded critical infrastructure

From an enterprise architecture perspective, I greatly appreciate this analysis of COG as it aligns beautifully with Albert Humphrey’s famous Strenghts, Weaknesses, Opportunities, and Threats (SWOT) Analysis for organizational strategic planning.

Aside from typical SWOT analysis to develop your organization’s strategy, the COG analysis adds greater offensive analysis to SWOT--like the military, organizations using the COG model can disrupt competitors’ advantages by seeking to weaken them where they are most vulnerable.

For example, EA used in this fashion may lead a company to build a sophisticated online sales site that directs customers away from your competitor’s retail location. Similarly, acquiring a major supplier (i.e. vertically integrating) may disrupt a competitors’ supply capability, and so on. The point is that EA becomes a force for attack rather than a mere planning tool or information asset.

It is at this point that I disagree with the assertion in the article that “Information is not power; it is a tool, an enabler. It helps wield military or economic power. By itself, it is simply information.”

Far to the contrary, information is one of the greatest assets that we have. It is the way that an advanced, intellectually based society competes. Of note, our declining performance in Science, Technology, Engineering, and Mathematics (STEM), which is so greatly worrisome to our leadership, is of concern because it is directly a threat to our competitive advantage, both militarily and economically, in the global environment.

Information, as embodied by the Internet, is now the center of our society. With it, we perform critical tasks of information sharing, collaboration and education. Used effectively, our military has developed robust command, control, communications, computers, intelligence, reconnaissance, and surveillance (C4ISR)—all information-based. Similarly, our industry is highly competitive and advanced because of the engineering, innovation, and people behind it.

Enterprise architecture, once a small part of the IT infrastructure, can actually play a far greater role in the information society if we allow it to. We have morphed from the industrial age of the 18th and 19th centuries to a highly advanced information society that creates new sources of critical capability, but also new critical vulnerabilities that must be defended. And we must also leverage the vulnerability of our enemies in order to stay viable. Whether it’s cyber-warfare or economic survival, information is at the heart of everything we are successfully doing today.


Share/Save/Bookmark

January 2, 2011

The Robots Are Coming

Forget waiters and waitresses, the new Japanese Hajime Robot restaurant in Bangkok, Thailand invested almost $1 million on 4 robotic waitstaff.

You order your food by touch screen computer, and there is a countdown on the screen for when the food is ready and the robot brings it out to you.

While the samurai clad robots are not the best looking—their huge eyes are a little cartoonish—they are certainly quite dexterous and able as they nimbly serve the food in this restaurant and dance for the customers in between courses without missing a beat.

Initially automation affected the jobs of blue-collar workers in manufacturing and mechanical work as robots displaced people on the “assembly line.” Now we see the trend continuing and expanding with automation entering the service industry and jobs involving customer interaction, entertainment, and retail being affected. This is happening not only in restaurants, but also elder care (like robot uBot5 being developed out of University of Massachusetts), and in major retail establishments such as in warehouse automation with Kiva Systems robots being employed by major companies like Gap, Staples, and Zappos.

Further, the expansion of robots into traditional human work is also happening in our military—think Unmanned Aerial Vehicles (UAVs or Drones) like the Predators and Reapers, the robotics pack animals that can carry hundreds of pounds of gear (like Big Dog) and various bomb disposal robots. This is just the beginning.

We are witnessing the transformation of our workforce from traditional blue- and now even white-collar jobs to those with an emphasis on knowledge management (think engineers and technology professionals working at companies like iRobot, Intel, and Apple). This has obvious implications for selection of education pursuits and availability of professional opportunities in the future for our children and grandchildren.

The robots are coming. The robots ARE coming!


Share/Save/Bookmark

September 3, 2010

What's In An IT Acronym

In the military and public safety world, information technology is often discussed in broader strategic and operational terms.

For example, in the Coast Guard, it is referred to as C4&IT--Command, Control, Communication, Computers and Information Technology.

In the Department of Defense, they often use the term C4ISR--Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance.

According to GovTech Magazine, some public safety agencies (i.e. law enforcement and firefighting) often use another version of this, namely 4CI--Command, Control, Communications, Computers, and Intelligence.

The article provides some simple straightforward definitions for these (although perhaps skewed for first responders), as follows:

"- Command: The authority and responsibility for effectively using available resources, and for organizing, directing, coordinating and controlling personnel and equipment to fulfill a mission.

- Control: The ability to issue orders or directions, with the result that those directions are carried out.

- Communications: The most essential element. Communications between responders on the ground and command staff are critical to ensure that both groups have a common operating picture of the situation.

- Computers: They process, display and transport information needed by commanders, analysts and responders. Today this increasingly includes mobile devices, such as laptops and smartphones.

- Intelligence: The product of the collection, processing, integration, analysis, evaluation and interpretation of all available relevant information."

While these capabilities are all critical to mission performance, I am not sure why we have all these variations on the same theme, but at least, we all agree on the 4Cs or is it C4?


Share/Save/Bookmark

August 17, 2010

Social Networking, Blogging, and Tweeting in Plain English

Here are some great little videos that explain Social Networking, Blogging, and Tweeting in Plain English:

1) Social Networking

2) Blogging

3) Tweeting

Check out these and other social media learning resources, policies and procedures, discussion forums and more at the Department of Defense (DoD) Social Media Hub.

Share/Save/Bookmark

December 7, 2009

Let's Not Understate the Cyber Threat

Wow. I read with some surprise and consternation an article in Government Computer News, 4 December 2009. In this article, the author portrays the fears of a “digital Pearl Harbor” or overwhelming cyber attack on the United States as overblown—almost as if it’s of no real possibility or significant impact. In short, the article states:

“What good would it do an attacker to take down the vital U.S. networks? While the damage to this country could be great, the benefit to an attack would be nil if it could not be followed up. The real threat of cyber warfare is not in stand-alone attacks, but in attacks coordinated with military action.”

While, I agree that a coordinated attack is obviously more dangerous than a cyber attack alone, the threat and potential damage of a cyber attack could potentially be devastating—with or without military action.

Let’s think for a second about how the military traditionally projects force around the world through conventional warfare—taking control of the air, land, and sea. Control the sea-lanes and you have power over 90%+ of international commerce. Control the land and you have power over people’s daily lives—including their ability to satisfy even basic needs for food, clothing, and shelter, their personal safety, and even their ability to govern themselves. Control the air and you control freedom of movement on the ground, people’s basic comings and goings. Traditional military power can affect just about every facet of people’s lives including ultimately the taking of life itself i.e. paying “the ultimate price.”

Now think for a second, about what a massive cyber attack could potentially do to us. At this stage in history, we have to ask ourselves not what elements could be affected by cyber attack, but what elements of our lives would not be impacted? This is the case since virtually our entire civil and elements of the military infrastructure are dependent on the Internet and the computers that are connected to them. If you “pull the plug” or corrupt the interconnected systems, “watch out” seems apropos.

The same areas that are vulnerable to traditional military attack are threatened by cyber attack: Commerce, Energy, Transportation, Finance, Health, Agriculture, (Defense)…are all deeply interwoven and dependent on our interconnected computer systems—and this is the case more and more.

Think e-Commerce, online banking and finance, manufacturing production systems, transportation systems, food production and safety, the energy grid, electronic health records, C4ISR, and so on.

While thank G-d, we have been spared a really devastating attack to date (if you exclude the massive data compromised/stolen in recent cyber attacks), we would be derelict in responsibilities for ensuring safety and security if we thought that was it.

Further, while unpleasant as it may be, we should consider the impact in terms of potential for physical harm or loss of life in the event of a serious cyber attack?

While many brush aside this possibility, there is certainly the potential. Even putting aside the potential public panic/chaos and ensuing loss of life and property that could occur in a serious attack, how about just taking out a single, major facility—like a dam, power plant, reservoir, electrical hub, transportation system, and so on. This is an important focus of efforts to ensure critical infrastructure protection, a public-private sector partnership initiative.

Rep. Lamar Smith, R-Texas said "Until we secure our cyber infrastructure, a few keystrokes and an Internet connection is all one needs to disable the economy and endanger lives.”

Sure, a severe and consequential attack would require ample skills, knowhow, resources, and sophistication—it is no small feat—but with the hosts of cyber criminals, terrorists, and hostile nation states out there increasingly trying to hack our systems, there is valid cause for concern.

This recognition of what’s possible does not mean it is probable or imminent. However, the awareness and understanding of our increasing dependence on the Internet and related systems and the acknowledgement that there are those out there—as in 9-11—who seek to do our country harm, should not blind us with fear, but rather spark us to constructively deal with the challenge and take proactive actions to secure the ever expanding realm of cyberspace.

The Executive Summary in the CyberSpace Policy Review that was conducted by the White House in 2009 sums it up, this way:

“The globally-interconnected digital information and communications infrastructure known as “cyberspace” underpins almost every facet of modern society and provides critical support for the U.S. economy, civil infrastructure, public safety, and national security. This technology has transformed the global economy and connected people in ways never imagined. Yet, cybersecurity risks pose some of the most serious economic and national security challenges of the 21st Century.”

We should not and cannot understate the possible threats against our nation, but rather we need to act responsibility and rationality, with resolve to protect our nation, before and not only after. As the CyberSpace Policy Review states:

“The Nation’s approach to cybersecurity over the past 15 years has failed to keep pace with the threat. We need to demonstrate abroad and at home that the United States takes cybersecurity-related issues, policies, and activities seriously.”

Fortunately, our nation has recognized the potential threat and is acting, as Security Focus reported on June 24, 2009: “The U.S. Secretary of Defense ordered the military to create a unified command to act as the nation's central hub for cyber capabilities and commanded the Pentagon to develop a policy framework for cyberspace operations.”

On a personal note, I am grateful for the many good, hardworking people in our military, civilian and private sector that are working to secure cyberspace for us, and believe we need to do this with vigor and resolve. It’s necessary in order to safeguard our future that is ever reliant on technology.


Share/Save/Bookmark