No! Who would want to perpetuate the problem?!
“Despite the Joint Enterprise Defense Infrastructure being validated by the Joint Requirements Oversight Council, it still faces opposition from Congress and some in industry who seek to perpetuate the problem, and their government contracts, by obfuscating any simple solution to the state of being data rich and information poor.”
And the final recommendation is just an authoritative EDW. See that go on a tailspin before.
Source: Data Rich and Information Poor (DRIP): The Adversary of Lethality
It’s so much data, the scientists behind the image had to invent a new type of visualization.
Source: This crazily complex image shows the online footprint of all 50 states
Most of the infrastructure is common and will be unnecessary and redundant to duplicate. Intrusion is intrusion and payload is payload whether disruptive, destructive or persistent ISR.
The split stems from the different missions of the two agencies, according to Capt. Ed Devinney, director of corporate partnerships and technology outreach at Cyber Command.
Source: Pentagon official: Cyber Command and NSA may split infrastructure
Cooperation between banks and the U.S. government can help shore up a critical sector of the U.S. economy.
Source: Banking on Cooperation: The U.S. Government and the Finance Industry
Centuries ago, China led the world in technology innovation. It invented papermaking, printing, the compass, and gunpowder. Yet China failed to exploit its innovations — instead, the West did. Over time, the West subjugated China and achieved global dominance.
Today, the tables are turning. China is attempting to overtake the West as a global leader in technology innovation, just as the West did to China centuries ago.
Source: Applying America’s Superpowers: How the U.S. Should Respond to China’s Informatization Strategy
LOL … Reference Architecture. How many readers know what that means?
The intelligence community is entering a second era for its massive IT modernization project designed for better collaboration and integration across its 17 disparate agencies.
Source: A new generation of intelligence collaborative tools is coming
“DHS component elements generally do not see value in integrating information across the enterprise. And there is little incentive to change this paradigm, absent dedicated funding for the enterprise and a clear prioritization of this integration from the Department’s leadership.”
DejaVu. Reminds me of one of my Boeing experiences. Our group transitioned from Data Conversion to a newly minted Enterprise Information and Data Architecture under Enterprise Architecture and Integration. The group’s largest project was the Enterprise Data Warehouse to integrate data from silos owned by various business units and groups with no budget or incentive for those groups to share that data. Losing control of their fiefdom is also an unspoken concern of managers, and data is control. To make things worse, despite the “top-down” CIO (not CEO) mandate, those managers had to pay for the integration from their own budget … and push their other projects into not-on-schedule and over-budget to accommodate some thing that got them nothing in return. You guessed it, it was “you gotta be fucking kidding me” attitude walking into some meetings.
Technical challenges were surmountable but the organizational ones were not. It is not necessary to go into the detail of how some Architects felt about the ethics of pushing a product they did not believe in down the throat of other groups to their detriment, and I got into a spat with a couple managers almost outright telling them I am not a snake oil salesman. I do not know how that went, the last I know some clown Blue guy choked on it and lost the EDW budget.
As DHS announces major changes aimed at sharing more information with the private sector, The Cipher Brief talks with a former DHS Under Secretary for Intelligence and Analysis about the department’s big data challenges
Source: DHS’ Big Data Integration Challenge
Absent a clear understanding of which military problems emergent technologies are required to solve, there is, perhaps, too much confidence in their ability to reshape the character of the next war by enabling decisive battlefield advantage. More troublingly, predictions about machine-dominated warfare risk obscuring the human cost implicit in the use of violence to achieve a political objective.
Source: Emergent Technology, Military Advantage, and the Character of Future War
Here are a few concrete ways to get this alliance’s vibrant commercial technology sectors to address common national-security concerns.
Source: How the Five Eyes Can Harness Commercial Innovation
The system aims to aid checks for 4 million federal positions that require some clearance.
Source: DISA’s $49M answer to the background check backlog