More Related Content Similar to Improving Military Workflows - Structured Data for Military & Security Users (10) Improving Military Workflows - Structured Data for Military & Security Users1. Improving military and
security workflows
Five ways that military and security
organizations can use structured
open-source data to work faster
and smarter
2. Why structured open-source data?
Structured data is
Quick to search
Easy to query
Easy to manipulate
Copyright © 2012 IHS Inc. 2
4. How can it improve workflows?
1. Threat analysis
Copyright © 2012 IHS Inc. 4
5. 1. Threat analysis
Satellite images show
enemy tanks gathering
on an airfield near the
border
The threat must
be assessed
Copyright © 2012 IHS Inc. 5
8. 1. Threat analysis
Obtain enemy land
warfare platform
inventory intelligence
Copyright © 2012 IHS Inc. 8
10. 1. Threat analysis
Query returns only
platforms that meet
search criteria
Copyright © 2012 IHS Inc. 10
12. How can it improve workflows?
1. Threat analysis
2. Capability analysis
Copyright © 2012 IHS Inc. 12
14. 2. Capability analysis
Air superiority will
be key to success
Enemy air capability
must be assessed
Copyright © 2012 IHS Inc. 14
16. 2. Capability analysis
Cross-reference with
equipment in service
and order of battle
Copyright © 2012 IHS Inc. 16
17. 2. Capability analysis
Use structured open-
source data to search
ranges of air platforms
at each base
Copyright © 2012 IHS Inc. 17
19. How can it improve workflows?
1. Threat analysis
2. Capability analysis
3. Military planning
Copyright © 2012 IHS Inc. 19
20. 3. Military planning
A multinational
expeditionary force
prepares to move into
enemy terrain
Copyright © 2012 IHS Inc. 20
21. 3. Military planning
3.5m
Imagery of a strategic
crossing point reveals
that the bridge may be
too narrow to cross
Copyright © 2012 IHS Inc. 21
23. 3. Military planning
Query returns
land platforms too
wide to cross
Copyright © 2012 IHS Inc. 23
24. 3. Military planning
Need for alternative
routes or methods
identified
Copyright © 2012 IHS Inc. 24
25. 4. How can it improve workflows?
1. Threat analysis
2. Capability analysis
3. Military planning
4. Logistical analysis
Copyright © 2012 IHS Inc. 25
27. 4. Logistical analysis
Air transport capacity
is known
Dimensions of partner
land platforms are not
Copyright © 2012 IHS Inc. 27
29. 4. Logistical analysis
Sort results to identify
viable platforms and
1.85m
calculate transport
loading levels
6.25m
2.60m
Copyright © 2012 IHS Inc. 29
30. 4. Logistical analysis
Air transport capacity
for partner land
platforms is derived
Transportation levels
may be planned
Copyright © 2012 IHS Inc. 30
31. How can it improve workflows?
1. Threat analysis
2. Capability analysis
3. Military planning
4. Logistical analysis
5. Procurement requirements setting
Copyright © 2012 IHS Inc. 31
32. 5. Procurement requirements setting
A major procurement
program is initiated
Capability requirements
must be developed
Copyright © 2012 IHS Inc. 32
33. 5. Procurement requirements setting
Review structured open-
source data for existing
equipment and technology
capabilities
Copyright © 2012 IHS Inc. 33
34. 5. Procurement requirements setting
Data output provides 200 40
capability baseline 150 30
Endurance (h)
100 20
Max altitude
50 10
Max T-O Weight Payload weight
0 0
Set program capability
Endurance Max speed
requirements accordingly
Loitering speed Datalink range
Copyright © 2012 IHS Inc. 34
35. 5. Procurement requirements setting
Requirements are
benchmarked against
best in class
Commercial proposals
are easily measured
Copyright © 2012 IHS Inc. 35
36. Conclusion
Structured open-source
data is not a replacement
for proprietary sources
But it is a source of reliable
supporting information
And, used correctly, it can
help the military user to
work faster and smarter
Copyright © 2012 IHS Inc. 36