DoD’s New Air Sea Battle Concept: An overview

By The recently released summary of the Air-Sea Battle: Service Collaboration to Address Anti-Access and Area Denial Challenges provides interesting reading on how DoD is preparing to meet evolving threats. It’s a direct challenge to DoD components to work together and collaborate – more than they ever have before. DoD has traditionally been a kluge of distinct […]

DoD’s New Air Sea Battle Concept: An overview

airseabattle

The recently released summary of the Air-Sea Battle: Service Collaboration to Address Anti-Access and Area Denial Challenges provides interesting reading on how DoD is preparing to meet evolving threats. It’s a direct challenge to DoD components to work together and collaborate – more than they ever have before. DoD has traditionally been a kluge of distinct and […]

Supporting the Defense Strategy: What does that mean to Industry?

It has become obvious that 2013 is going to be a difficult budget year for DoD Industries. Now is the time to stay focused and concentrate on the things that directly support the Defense Strategy. Everyone from Secretary Panetta on down has clearly stated that our Defense Strategy will focus on a swing towards the […]

Thetus Savanna Analysis Solution

Thetus Savanna is an analysis solution relevant to organizations that want to make sense of complex situations. The following is a summary from the Thetus website: The Savanna analysis solution packages intuitive design, access to data from many sources and a powerful suite of analytical tools into a single environment. Model Savanna is model-enabled, allowing […]

DoD and Non-Lethal to Lethal Scalability: Requirements driving new systems

Finding and destroying the enemy has always been the main priority of Militaries worldwide. Good intelligence and sophisticated weapons has traditionally been a recipe for success. Today, traditional “Hard Kill” responses are becoming increasingly less desirable and DoD is moving away from “symmetric” responses (you build something big and bad and we build something bigger […]

Anti-Access Area-Denial (A2AD) in Military Domains and in Cyberspace

Since 9/11, the US has invested heavily in high-end technologies to counter military threats. We have all been amazed at some of the breakthroughs that have been made. Eleven years of fighting on multiple battlefields has given us the opportunity to test these new technologies in places and ways that were never possible before. Throughout […]