Improving Military Workflows - Structured Data for Military & Security Users

3,508 views

Published on

Five ways that military and security organizations can use structured open-source data to work faster and smarter.

Published in: News & Politics
1 Comment
1 Like
Statistics
Notes
  • As the founder and owner of a few companies, i..e., WayZen Technologies Inc. WayZenCloud LLC, The Rosenchild Group LLC., The Rosenchild Foundation, etc., it is with the utmost professionalism that I say that this presentation is of the highest caliber, and it would serve to be of great benefit to anyone, entity, organization, agency and or business regardless of size to review it and apply what they have learned.

    Kindest regards,

    Mr. Von''Victor Valentino Rosenchild
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total views
3,508
On SlideShare
0
From Embeds
0
Number of Embeds
32
Actions
Shares
0
Downloads
30
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

Improving Military Workflows - Structured Data for Military & Security Users

  1. Improving military andsecurity workflowsFive ways that military and securityorganizations can use structuredopen-source data to work fasterand smarter
  2. Why structured open-source data?Structured data isQuick to searchEasy to queryEasy to manipulate Copyright © 2012 IHS Inc. 2
  3. Why structured open-source data? Open-source data is Verified Independent UnclassifiedCopyright © 2012 IHS Inc. 3
  4. How can it improve workflows? 1. Threat analysisCopyright © 2012 IHS Inc. 4
  5. 1. Threat analysis Satellite images show enemy tanks gathering on an airfield near the borderThe threat mustbe assessed Copyright © 2012 IHS Inc. 5
  6. 1. Threat analysis Measure length 9.5mCopyright © 2012 IHS Inc. 6
  7. 1. Threat analysis Measure length Measure width 3.5m 9.5mCopyright © 2012 IHS Inc. 7
  8. 1. Threat analysis Obtain enemy land warfare platform inventory intelligenceCopyright © 2012 IHS Inc. 8
  9. 1. Threat analysisQuery structuredopen-source data bycountry, length andwidth Copyright © 2012 IHS Inc. 9
  10. 1. Threat analysis Query returns only platforms that meet search criteriaCopyright © 2012 IHS Inc. 10
  11. 1. Threat analysisDetected platforms areidentified quickly and T-72easilyThe threat is quantified Copyright © 2012 IHS Inc. 11
  12. How can it improve workflows? 1. Threat analysis 2. Capability analysisCopyright © 2012 IHS Inc. 12
  13. 2. Capability analysis Diplomacy is breaking down; conflict seems inevitableCopyright © 2012 IHS Inc. 13
  14. 2. Capability analysis Air superiority will be key to successEnemy air capabilitymust be assessed Copyright © 2012 IHS Inc. 14
  15. 2. Capability analysis Review intelligence of enemy air base locationsCopyright © 2012 IHS Inc. 15
  16. 2. Capability analysis Cross-reference with equipment in service and order of battleCopyright © 2012 IHS Inc. 16
  17. 2. Capability analysisUse structured open-source data to searchranges of air platformsat each base Copyright © 2012 IHS Inc. 17
  18. 2. Capability analysis Quantify and visualize enemy air strike rangeCopyright © 2012 IHS Inc. 18
  19. How can it improve workflows? 1. Threat analysis 2. Capability analysis 3. Military planningCopyright © 2012 IHS Inc. 19
  20. 3. Military planningA multinationalexpeditionary forceprepares to move intoenemy terrain Copyright © 2012 IHS Inc. 20
  21. 3. Military planning 3.5m Imagery of a strategic crossing point reveals that the bridge may be too narrow to crossCopyright © 2012 IHS Inc. 21
  22. 3. Military planningFilter structured open-source data forplatforms wider thanthe bridge crossing Copyright © 2012 IHS Inc. 22
  23. 3. Military planning Query returns land platforms too wide to crossCopyright © 2012 IHS Inc. 23
  24. 3. Military planning Need for alternative routes or methods identifiedCopyright © 2012 IHS Inc. 24
  25. 4. How can it improve workflows? 1. Threat analysis 2. Capability analysis 3. Military planning 4. Logistical analysisCopyright © 2012 IHS Inc. 25
  26. 4. Logistical analysisMultinational landforces require airtransport into theatre Copyright © 2012 IHS Inc. 26
  27. 4. Logistical analysis Air transport capacity is known Dimensions of partner land platforms are notCopyright © 2012 IHS Inc. 27
  28. 4. Logistical analysisQuery structured open-source land platformdata by length, widthand height Copyright © 2012 IHS Inc. 28
  29. 4. Logistical analysis Sort results to identify viable platforms and 1.85m calculate transport loading levels 6.25m 2.60mCopyright © 2012 IHS Inc. 29
  30. 4. Logistical analysisAir transport capacityfor partner landplatforms is derived Transportation levels may be planned Copyright © 2012 IHS Inc. 30
  31. How can it improve workflows? 1. Threat analysis 2. Capability analysis 3. Military planning 4. Logistical analysis 5. Procurement requirements settingCopyright © 2012 IHS Inc. 31
  32. 5. Procurement requirements settingA major procurementprogram is initiated Capability requirements must be developed Copyright © 2012 IHS Inc. 32
  33. 5. Procurement requirements settingReview structured open-source data for existingequipment and technologycapabilities Copyright © 2012 IHS Inc. 33
  34. 5. Procurement requirements setting Data output provides 200 40 capability baseline 150 30 Endurance (h) 100 20 Max altitude 50 10Max T-O Weight Payload weight 0 0 Set program capabilityEndurance Max speed requirements accordingly Loitering speed Datalink range Copyright © 2012 IHS Inc. 34
  35. 5. Procurement requirements settingRequirements arebenchmarked againstbest in class Commercial proposals are easily measured Copyright © 2012 IHS Inc. 35
  36. ConclusionStructured open-sourcedata is not a replacementfor proprietary sources But it is a source of reliable supporting informationAnd, used correctly, it canhelp the military user towork faster and smarter Copyright © 2012 IHS Inc. 36
  37. www.ihs.comCopyright © 2012 IHS Inc. 37

×