This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
We just held our twelfth session of our new national security class Technology, Innovation and Modern War. Joe Felter , Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.
In 2007, I graduated United States Air Force Academy as a computer engineer and entered the Air Force’s acquisition corps , excited and confident about my ability to bring technology to bear for our airmen. Graduation day with classmate Joseph Helton (right), killed in action in Iraq in 2009. V-Model of Systems Engineering.
We just held our third session of our new national security class Technology, Innovation and Modern War. Joe Felter , Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.
We just had our first week of our new national security class Technology, Innovation and Modern War. If the past is a prologue, they’ll go off to senior roles in defense, policy and to the companies building new disruptive technologies. Technology to Weapons to Doctrine. And that has happened to us. As we described how the U.S.
We just had our first week of our new national security class Technology, Innovation and Modern War. If the past is a prologue, they’ll go off to senior roles in defense, policy and to the companies building new disruptive technologies. Technology to Weapons to Doctrine. And that has happened to us. As we described how the U.S.
All of our cards are designed by independent U.S.-based 18 years have passed and lots of things have changed, thus my most important goal these days is to keep up with the technology regarding the internet. After two decades of being a housewife, my husband returned from Iraq disabled, sparking a radical shift in our lifestyle.
Other companies, like Blendoor , have developed technology platforms that automatically strip out some of the “noisiest” parts of resumes. invasion of Iraq in 2003 as a classic example.) There’s a world of difference between experienced UX designers and people who read a blog post about it,” explained DePalma Studios’ Zach Watson.
I recently learned about the career of General Keith Alexander, a four-star Army general that led DoD agencies during the conflicts in Afghanistan and Iraq when attempted cyber-attacks against the U.S. He was able to make the complex technology simple through his simple presentation and communication. were on the rise.
We just held our third session of our new national security class Technology, Innovation and Modern War. Joe Felter , Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.
Policy makers need to know: regulations designed to manage big-companies actually protect those companies by stifling innovation (and competition) from startups. You can see the design of the program here. September 8, 2009 6:25 PM dbsaid. Big companies can afford entire departments dedicated to compliance. conference attendees.
The original two founders were soon joined by Cisco, Mashable, Iraq and Afghanistan Veterans of America (IAVA), Sony, Aldo, Groupon, UNICEF, Google, Skype, Microsoft and Unilever, which became additional founding members. The founders wanted to remind people that there’s more to the holiday season than commercialization and buying gifts.
Our keynote speaker was Palmer Luckey , founder of Oculus and the designer of the Oculus Rift. The teaching team consisted of: Pete Newell is a retired Army Colonel currently a Senior Visiting Research Fellow at the National Defense University’s Center for Technology and National Security Policy and CEO of BMNT. Presentation Format.
Our observation is that the DOD has more technology demos than they need, but often lack deep problem understanding. Note: The Hacking for Defense class was designed as “fundamental research” to be shared broadly and the results are not subject to restriction for proprietary or national security reasons. Worth your time to watch.
You designed it, your decisions led to the moment you're in now, and all these kinds of quotes and beliefs and mental models to make you take responsibility for your life, which is a very useful tool, but it's limited because it's not actually that accurate. That was luck to spot that technology. So that was huge for me.
It combines the same Lean Startup Methodology used by the National Science Foundation to commercialize science, with the rapid problem sourcing and curation methodology developed on the battlefields in Afghanistan and Iraq by Colonel Pete Newell and the US Army’s Rapid Equipping Force. Goals for the Hacking for Defense Class.
You designed it. That was luck to spot that technology. And then you can go further back and just say, listen, I was born in Baghdad, Iraq, and I came to the UK in London when I was three years old with my family to escape the war and all of that. Mo you know, you learned that you know, what you got in life is what you deserved.
We just held our eighteenth and final session of our new national security class Technology, Innovation and Modern War. Joe Felter , Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.
We just had our third week of our new national security class at Stanford – Technology, Innovation and Great Power Competition. Joe Felter , Raj Shah and I designed the class to cover how technology will shape all the elements of national power (our influence and footprint on the world stage). Orbis, 2020.
When Colonel Peter Newell headed up the Army’s Rapid Equipping Force (REF) he used lean methods on the battlefields of Iraq and Afghanistan to provide immediate technology solutions to urgent problems. Today, his company BMNT does for government and commercial customers what the Rapid Equipping Force did for the U.S.
We could design warfighting tactics based on knowing the tactics of our opponent. Our defense department and intelligence community owned proprietary advanced tools and technology. We and our contractors had the best technology domain experts. We could design and manufacture the best systems. Newell ran the U.S.
This book may be the Iraq war equivalent of “ Dispatches &# which defined Vietnam for my generation. It’s not something I’ve heard often from those in the technology sphere. Theme: Digg 3 Column by WP Designer. Both reminded me why National Service would be a very good idea.) It may not be for you.
BMNT , a new Silicon Valley company, is combining the Lean Methods it learned in combat with the technology expertise and speed of startups. The University of California managed research and development of the bomb design at Los Alamos while the US Army managed the Los Alamos facilities and the overall administration of the project.
For targets over uncontested airspace (Iraq, Afghanistan, Syria, Somalia, Yemen, Libya, etc.) Carriers were designed to be most effective launching a high number of sorties (number of flights) from ~225 miles from the target. Filed under: Hacking For Defense , Navy , Science and Industrial Policy , Technology.
The team validated several critical hypotheses about technology and acquisition (slide 2), further refined their Minimum Viable Product (slide 3) and really dug into the path of getting a solution acquired and deployed in the Special Operations Command (SOCOM) in slides 4 – 9. They mapped how to get a product deployed in JIDA in slide 9.
The team validated several critical hypotheses about technology and acquisition (slide 2), further refined their Minimum Viable Product (slide 3) and really dug into the path of getting a solution acquired and deployed in the Special Operations Command (SOCOM) in slides 4 – 9. They mapped how to get a product deployed in JIDA in slide 9.
We just had our second week of our new national security class at Stanford – Technology, Innovation and Great Power Competition. Joe Felter , Raj Shah and I designed the class to cover how technology will shape all the elements of national power (our influence and footprint on the world stage).
The United States just did this to China by limiting Huawei’s ability to outsource its in-house chip designs for manufacture by Taiwan Semiconductor Manufacturing Company (TSMC), a Taiwanese chip foundry. The goal is to reduce China’s dependence on foreign technology and promote Chinese high-tech companies globally. Here’s why.
The photo-op is lined with young men without explaining that it was market forces and technology, not actually EPA regulations, that are ending coal jobs and the promise implied to a future coal-dependent workforce. This picture from the “Energy Independence” signing ceremony yesterday illustrates my concern. That does not sit well with me.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content