SlideShare a Scribd company logo
1 of 12
Battlefield Airmen Operating System


Connecting Battlefield Airmen in a social information environment:
• A Cyber Weapon System:
    Methodology of the Past (Doctrinal)
    Technology of the Today (Tactics, Techniques, Procedures)
    Neutralize threats of Tomorrow (Leverage Technology)
• Organizational Amnesia:
    •Someone in my organization knows the answer
    •Find the needle in the „hay-stack‟
• Analyze the process:
    •Get an hour back in your day thru the power of IBM
    •Stop throwing the needle into another „hay-stack‟
• Dynamically Collaborate in the “best practices” modern industry has to offer
Battlefield Airmen Operating System
                                                     The Solution

A Mobile Application Suite designed for rapid response to global
events:
• This OS is an application
  framework designed to allow users
  to rapidly project Combat Air
  Power:
    •     External Ignorance
           •   We don‟t know what we don‟t
               know
           •   We     don‟t    know  what
               questions to ask
           •   Some one out there knows
               the answers
    •     Internal Amnesia                    Full Spectrum Collaboration
           •   We don‟t know what we know
               already
•   Summary of “Big Data”: Move
    from search to discovery
Battlefield Airmen Operating System


    The Threat


•   In the past organized revolutions took years to
    materialize, and may have potentially flickered
    out without gaining momentum. Now, ideations
    can play out in a matter of minutes or days.

•   Natural and financial disasters or politically
    motivated movements are more likely to spawn
    high velocity social dynamics that result in
    unpredictable disasters which will surely lead to a
    global response from today's already tasked
    force.
                                                          The PAC responds
•   In the past twelve months, social networks have
    demonstrated that they provide a spring board
    for nearly instant mobilization of people to
    tremendous results.
Battlefield Airmen Operating System
                                                        Value Proposition

                                          The world has seen the power of social
                                           media environments like Facebook,
                                           Twitter, Wikis, Blogs, You Tube and
                                           Flickr. It has also seen the adoption of
                                           over 1 Billion mobile apps at mind
                                           blowing speeds.

                                          Our      potential   adversaries   in
                                           asymmetric engagements use all kinds
                                           of open media as a simple/cost
                                           effective C4 hub capability.
Internal Collaborative
environments are more                     In many cases this open media is
effective than external                    timelier in reporting critical events than
networks…. due to the                      the news sources and national security
ability   of    focused                    reporting structures.
powerful      Enterprise
Content Management                        The Value of Facebook: is not the
and Analytic tools.                        People or Content rather it‟s the ability
                                           to analyze the content.
Battlefield Airmen Operating System
                                                               Intelligence Gathering


  •   Even the most effective intelligence collection
      management processes in which humans set
      collection priorities will always be pitifully slow in
      their ability to react to network actions.

  •   The USAF can harness the power of external
      social tools in parallel to an internal social
      space which allows the enterprise to reduce
      operational cost thru the leveraging of smart
      technology.

  •   Summary:      Internal velocity must equal
      external velocity

…We need to develop tools and techniques to help our workforce negotiate better
business deals; and ensure our workforce has the skills, training, education and
experience to produce results for the Air Force and for the taxpayers.
                                                        Michael B. Donley
                                                        Secretary of the Air Force
Battlefield Airmen Operating System                        Build an “App for that”

Assessment and response to a cyber network requires a paradigm for
viewing the battlespace.     The BAOS is an accelerated framework designed for
                                       

                                           rapid assembly of applications.

                                          The weapon system must manipulate the data from the
                                           social network in many unique ways. This causes
                                           multiple intelligence gathering disciplines to be fussed
                                           together.
               Collapse Structures
                                          Multi-Int / A framework designed to view pedigree
                                           apps in a Thematic, Temporal and Geospatial
                                           representation




Strategic/Tactical Analysis          Natural Disaster Preparedness   Obvious /Non-Obvious Relationships
Battlefield Airmen Operating System




                                      IBM‟s “SIE” application frame-
                                         work is:
                                      1.   A reduction in operational costs
                                      2.   Flexible with agnostic plug-in
                                           capabilities (current & legacy)
        Forms
                                      3.   Agile and highly adaptable to
                                           meet specific mission
                                           applications/needs
                                      4.   A scalable framework for the
                                           enterprise
                                      5.   Built on open
                                           standards, unprecedented
                                           computing power and advanced
                                           analytics
Battlefield Airmen Operating System

                         The IBM Collaborative Workspace is built on a social
                         collaboration and discovery accelerator framework that is
                         highly extensible to support customizable applications
                         regardless if located on SIPR for US, BICES for NATO or
                         NIPR for other alliances.

                         The BAOS is:
                         • Ready to ingest “AFKN” in order to make the existing
                         networks and data bases more relevant and accessible to
                         the enterprise
                         •Ready to meet short term KM, collaboration and situational
                         awareness
                         •Designed to be the framework that enables extension of the
                         enterprise into the cloud
                         •A data and operating system agnostic framework ready to
                         deploy on any platform (Including JSTARS)

                         The BAOS will:
                         •Protect sources and methods with hidden communities and
                         file restricting the dissemination of sensitive information to
                         the right people at the right time
                         •Readily equipped with new and accurate data to support
                         crucial decision making
Battlefield Airmen Operating System
                                                        Organizational Pedigree


Rapidly assemble "an app for that" using embedded Portlet and Widget factories in order
to respond to emerging threats or requirements.

Rapidly build cyber weapon systems to provide the common operational environment
through the rapid assembly of “apps” for command, control, combat support, combat
service support, intelligence and business functions.

The framework, can rest on any operating platform as a service providing an enterprise-
wide Information Technology (IT) infrastructure, allowing consolidated Distributed Data
Centers (DDCs) to serve as the repositories of all USAF data and integrate National
Mission Forces and Theater Forces networks with appropriate controls.




    Tactics, Techniques,Procedures
Battlefield Airmen Operating System


                                  Ingesting: Data Bases, Sensors, Feeds and Sources


 Anonymously
Scraped Social
  Media Feeds


 Anonymously
     OSINT /
     PACINT
      Feeds


       Source
Repositories &
   Databases
Battlefield Airmen Operating System
                                                                Work Flow and Processes



                                                               Human (HITL)              Process
                                                                Highly efficient
                                                                    human
                                                                                       Management
                                                                  realization




Enterprise Social        Sensor Spectrum         Mash Up
  Organization           Organic, related &   Hub of easily
                          extended grid of    consumable
 A virtual (FOB) and
                           data base and         feeds
Dynamic Work Space
                              sensor
   where internal
                           management
 collaboration exists

                                                                  Analytics          Digital Authoring
                                                                  Orchestrated          Document
                                                              discovery for system      production
                                                                   realization



                                        A Recursive Model
Battlefield Airmen Operating System

                                           Doctrine governs the way in which
                                           the DoD conducts business. If the
                                           members of an enterprise are to use
                                           a system…then one would expect
                                           that system to be a framework that
                                           rests on that same doctrinal
                                           methodology.




                              Collaboration: Effective joint operations require
                              close coordination, cooperation, and information
                              sharing among multiple organizations. The most
                              common       technique     for    promoting    this
                              collaboration is the identification or formation of
                              centers, groups, bureaus, cells, offices,
                              elements, boards, working groups, and planning
                              teams and other enduring or temporary cross-
                              functional staff organizations that manage
                              specific processes and accomplish tasks in
                              support of mission accomplishment.

More Related Content

What's hot

Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012DCVTT
 
2 25008 domain_ten11.29.12_v2_opt
2 25008 domain_ten11.29.12_v2_opt2 25008 domain_ten11.29.12_v2_opt
2 25008 domain_ten11.29.12_v2_optEdda Kang
 
Nist leaf pressclub_032911
Nist leaf pressclub_032911Nist leaf pressclub_032911
Nist leaf pressclub_032911GovCloud Network
 
Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011commandersaini
 
Cloud Computing for DoD and Government 2010
Cloud Computing for DoD and Government 2010Cloud Computing for DoD and Government 2010
Cloud Computing for DoD and Government 2010Alexa Deaton
 
Security - Situational awareness
Security - Situational awarenessSecurity - Situational awareness
Security - Situational awarenessRaffael Marty
 
Cloud computing security_perspective
Cloud computing security_perspectiveCloud computing security_perspective
Cloud computing security_perspectivesolaigoundan
 
T Bahr M Lindlar Goportis Digital Preservation Pilot
T Bahr M Lindlar Goportis Digital Preservation PilotT Bahr M Lindlar Goportis Digital Preservation Pilot
T Bahr M Lindlar Goportis Digital Preservation PilotFuture Perfect 2012
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
2011 special edition - converged infrastructure
2011   special edition - converged infrastructure2011   special edition - converged infrastructure
2011 special edition - converged infrastructureclansmandresin
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the CloudSpiceworks
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...ptaglephd
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...Agora Group
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 

What's hot (17)

Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012Modern Infrastructure E-Zine: November 2012
Modern Infrastructure E-Zine: November 2012
 
2 25008 domain_ten11.29.12_v2_opt
2 25008 domain_ten11.29.12_v2_opt2 25008 domain_ten11.29.12_v2_opt
2 25008 domain_ten11.29.12_v2_opt
 
Gmn full ad_mini-1
Gmn full ad_mini-1Gmn full ad_mini-1
Gmn full ad_mini-1
 
Nist leaf pressclub_032911
Nist leaf pressclub_032911Nist leaf pressclub_032911
Nist leaf pressclub_032911
 
Enterprise virtual machine on IBM Cloud
Enterprise virtual machine on IBM CloudEnterprise virtual machine on IBM Cloud
Enterprise virtual machine on IBM Cloud
 
Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011
 
Cloud Computing for DoD and Government 2010
Cloud Computing for DoD and Government 2010Cloud Computing for DoD and Government 2010
Cloud Computing for DoD and Government 2010
 
Security - Situational awareness
Security - Situational awarenessSecurity - Situational awareness
Security - Situational awareness
 
Cloud computing security_perspective
Cloud computing security_perspectiveCloud computing security_perspective
Cloud computing security_perspective
 
T Bahr M Lindlar Goportis Digital Preservation Pilot
T Bahr M Lindlar Goportis Digital Preservation PilotT Bahr M Lindlar Goportis Digital Preservation Pilot
T Bahr M Lindlar Goportis Digital Preservation Pilot
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
Dispelling the vapor around cloud computing
Dispelling the vapor around cloud computingDispelling the vapor around cloud computing
Dispelling the vapor around cloud computing
 
2011 special edition - converged infrastructure
2011   special edition - converged infrastructure2011   special edition - converged infrastructure
2011 special edition - converged infrastructure
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the Cloud
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 

Viewers also liked

Principle statement
Principle statementPrinciple statement
Principle statementLee Lun
 
power director
power director power director
power director Aya Nor
 
Applying Novaks New Mode Of Education
Applying Novaks New Mode Of EducationApplying Novaks New Mode Of Education
Applying Novaks New Mode Of Educationblbowen
 
2014 april yab meeting
2014 april yab meeting2014 april yab meeting
2014 april yab meetingLisa Dickson
 
Uzbekistan laws in english 150
Uzbekistan laws in english 150Uzbekistan laws in english 150
Uzbekistan laws in english 150hplei83
 
Swim Lesson 3 Give Me Quality Content.Key
Swim Lesson 3 Give Me Quality Content.KeySwim Lesson 3 Give Me Quality Content.Key
Swim Lesson 3 Give Me Quality Content.KeyEmily Reeves Dean
 
HealthCarePlanningAccountabilityAdvisoryCouncillReportToGeneralAssembly
HealthCarePlanningAccountabilityAdvisoryCouncillReportToGeneralAssemblyHealthCarePlanningAccountabilityAdvisoryCouncillReportToGeneralAssembly
HealthCarePlanningAccountabilityAdvisoryCouncillReportToGeneralAssemblyKim Paull
 
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...IJCNC
 
One day in my life. sanea
One day in my life. saneaOne day in my life. sanea
One day in my life. saneaSvetochkaBuch
 
Que es un_virus_informatico[1]
Que es un_virus_informatico[1]Que es un_virus_informatico[1]
Que es un_virus_informatico[1]alejagil221
 
Informe cads nuclears
Informe cads nuclearsInforme cads nuclears
Informe cads nuclearsXVAC
 
YMFYP International Portfolio Powerpoint
YMFYP International Portfolio PowerpointYMFYP International Portfolio Powerpoint
YMFYP International Portfolio PowerpointRaphael_Comte
 

Viewers also liked (17)

cross curiculm
cross curiculmcross curiculm
cross curiculm
 
Maneesha ppt
Maneesha pptManeesha ppt
Maneesha ppt
 
9 sheikh muhammadsaqib_7
9 sheikh muhammadsaqib_79 sheikh muhammadsaqib_7
9 sheikh muhammadsaqib_7
 
Principle statement
Principle statementPrinciple statement
Principle statement
 
power director
power director power director
power director
 
Travel cambodia
Travel cambodiaTravel cambodia
Travel cambodia
 
Applying Novaks New Mode Of Education
Applying Novaks New Mode Of EducationApplying Novaks New Mode Of Education
Applying Novaks New Mode Of Education
 
2014 april yab meeting
2014 april yab meeting2014 april yab meeting
2014 april yab meeting
 
Uzbekistan laws in english 150
Uzbekistan laws in english 150Uzbekistan laws in english 150
Uzbekistan laws in english 150
 
Swim Lesson 3 Give Me Quality Content.Key
Swim Lesson 3 Give Me Quality Content.KeySwim Lesson 3 Give Me Quality Content.Key
Swim Lesson 3 Give Me Quality Content.Key
 
HealthCarePlanningAccountabilityAdvisoryCouncillReportToGeneralAssembly
HealthCarePlanningAccountabilityAdvisoryCouncillReportToGeneralAssemblyHealthCarePlanningAccountabilityAdvisoryCouncillReportToGeneralAssembly
HealthCarePlanningAccountabilityAdvisoryCouncillReportToGeneralAssembly
 
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
 
One day in my life. sanea
One day in my life. saneaOne day in my life. sanea
One day in my life. sanea
 
Que es un_virus_informatico[1]
Que es un_virus_informatico[1]Que es un_virus_informatico[1]
Que es un_virus_informatico[1]
 
Informe cads nuclears
Informe cads nuclearsInforme cads nuclears
Informe cads nuclears
 
YMFYP International Portfolio Powerpoint
YMFYP International Portfolio PowerpointYMFYP International Portfolio Powerpoint
YMFYP International Portfolio Powerpoint
 
Visit to capernaum
Visit to capernaumVisit to capernaum
Visit to capernaum
 

Similar to Battlefield airmen operating system19 apr

Cloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoDCloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoDGovCloud Network
 
CRTC Cloud- Michael Sandberg
CRTC Cloud- Michael SandbergCRTC Cloud- Michael Sandberg
CRTC Cloud- Michael SandbergKrisValerio
 
Optimizing Cloud Computing Through Cross- Domain Provisioning
Optimizing Cloud Computing Through Cross- Domain ProvisioningOptimizing Cloud Computing Through Cross- Domain Provisioning
Optimizing Cloud Computing Through Cross- Domain ProvisioningGaletech
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingGovCloud Network
 
Cloud Computing In DoD, IDGA Presentation
Cloud Computing In DoD, IDGA PresentationCloud Computing In DoD, IDGA Presentation
Cloud Computing In DoD, IDGA PresentationGovCloud Network
 
OpenNASA v2.0 Slideshare Large File
OpenNASA v2.0 Slideshare   Large FileOpenNASA v2.0 Slideshare   Large File
OpenNASA v2.0 Slideshare Large FileMegan Eskey
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013John Weiler
 
An Overview Of The Singularity Project
An  Overview Of The  Singularity  ProjectAn  Overview Of The  Singularity  Project
An Overview Of The Singularity Projectalanocu
 
ID301 - What’s Coming in IBM Connections
ID301 - What’s Coming in IBM ConnectionsID301 - What’s Coming in IBM Connections
ID301 - What’s Coming in IBM ConnectionsLuis Benitez
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up EMC
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxraghavanp4
 
Enterprise Mobility with Sybase Unwired Platform
Enterprise Mobility with Sybase Unwired PlatformEnterprise Mobility with Sybase Unwired Platform
Enterprise Mobility with Sybase Unwired PlatformInfosys
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorialAnna Liu
 
Architectural Implications of Cloud Computing
Architectural Implications of Cloud ComputingArchitectural Implications of Cloud Computing
Architectural Implications of Cloud Computingteknoport
 
Scale-Out Network-Attached Storage Addresses Storage Problems for Private Clo...
Scale-Out Network-Attached Storage Addresses Storage Problems for Private Clo...Scale-Out Network-Attached Storage Addresses Storage Problems for Private Clo...
Scale-Out Network-Attached Storage Addresses Storage Problems for Private Clo...IBM India Smarter Computing
 
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...Iver Band
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
IT-AAC Cloud Acquisition Roadmap
IT-AAC Cloud Acquisition RoadmapIT-AAC Cloud Acquisition Roadmap
IT-AAC Cloud Acquisition RoadmapGovCloud Network
 

Similar to Battlefield airmen operating system19 apr (20)

Cloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoDCloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoD
 
CRTC Cloud- Michael Sandberg
CRTC Cloud- Michael SandbergCRTC Cloud- Michael Sandberg
CRTC Cloud- Michael Sandberg
 
Optimizing Cloud Computing Through Cross- Domain Provisioning
Optimizing Cloud Computing Through Cross- Domain ProvisioningOptimizing Cloud Computing Through Cross- Domain Provisioning
Optimizing Cloud Computing Through Cross- Domain Provisioning
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud Computing
 
Cloud Computing In DoD, IDGA Presentation
Cloud Computing In DoD, IDGA PresentationCloud Computing In DoD, IDGA Presentation
Cloud Computing In DoD, IDGA Presentation
 
OpenNASA v2.0 Slideshare Large File
OpenNASA v2.0 Slideshare   Large FileOpenNASA v2.0 Slideshare   Large File
OpenNASA v2.0 Slideshare Large File
 
Flying in the cloud
Flying in the cloud   Flying in the cloud
Flying in the cloud
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013
 
An Overview Of The Singularity Project
An  Overview Of The  Singularity  ProjectAn  Overview Of The  Singularity  Project
An Overview Of The Singularity Project
 
ID301 - What’s Coming in IBM Connections
ID301 - What’s Coming in IBM ConnectionsID301 - What’s Coming in IBM Connections
ID301 - What’s Coming in IBM Connections
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Enterprise Mobility with Sybase Unwired Platform
Enterprise Mobility with Sybase Unwired PlatformEnterprise Mobility with Sybase Unwired Platform
Enterprise Mobility with Sybase Unwired Platform
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorial
 
Architectural Implications of Cloud Computing
Architectural Implications of Cloud ComputingArchitectural Implications of Cloud Computing
Architectural Implications of Cloud Computing
 
Scale-Out Network-Attached Storage Addresses Storage Problems for Private Clo...
Scale-Out Network-Attached Storage Addresses Storage Problems for Private Clo...Scale-Out Network-Attached Storage Addresses Storage Problems for Private Clo...
Scale-Out Network-Attached Storage Addresses Storage Problems for Private Clo...
 
Thought Leader Interview: Dr. William Turner on the Software-Defined Future ...
Thought Leader Interview:  Dr. William Turner on the Software-Defined Future ...Thought Leader Interview:  Dr. William Turner on the Software-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software-Defined Future ...
 
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software­-Defined Future ...
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
IT-AAC Cloud Acquisition Roadmap
IT-AAC Cloud Acquisition RoadmapIT-AAC Cloud Acquisition Roadmap
IT-AAC Cloud Acquisition Roadmap
 

Recently uploaded

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 

Recently uploaded (20)

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 

Battlefield airmen operating system19 apr

  • 1. Battlefield Airmen Operating System Connecting Battlefield Airmen in a social information environment: • A Cyber Weapon System: Methodology of the Past (Doctrinal) Technology of the Today (Tactics, Techniques, Procedures) Neutralize threats of Tomorrow (Leverage Technology) • Organizational Amnesia: •Someone in my organization knows the answer •Find the needle in the „hay-stack‟ • Analyze the process: •Get an hour back in your day thru the power of IBM •Stop throwing the needle into another „hay-stack‟ • Dynamically Collaborate in the “best practices” modern industry has to offer
  • 2. Battlefield Airmen Operating System The Solution A Mobile Application Suite designed for rapid response to global events: • This OS is an application framework designed to allow users to rapidly project Combat Air Power: • External Ignorance • We don‟t know what we don‟t know • We don‟t know what questions to ask • Some one out there knows the answers • Internal Amnesia Full Spectrum Collaboration • We don‟t know what we know already • Summary of “Big Data”: Move from search to discovery
  • 3. Battlefield Airmen Operating System The Threat • In the past organized revolutions took years to materialize, and may have potentially flickered out without gaining momentum. Now, ideations can play out in a matter of minutes or days. • Natural and financial disasters or politically motivated movements are more likely to spawn high velocity social dynamics that result in unpredictable disasters which will surely lead to a global response from today's already tasked force. The PAC responds • In the past twelve months, social networks have demonstrated that they provide a spring board for nearly instant mobilization of people to tremendous results.
  • 4. Battlefield Airmen Operating System Value Proposition  The world has seen the power of social media environments like Facebook, Twitter, Wikis, Blogs, You Tube and Flickr. It has also seen the adoption of over 1 Billion mobile apps at mind blowing speeds.  Our potential adversaries in asymmetric engagements use all kinds of open media as a simple/cost effective C4 hub capability. Internal Collaborative environments are more  In many cases this open media is effective than external timelier in reporting critical events than networks…. due to the the news sources and national security ability of focused reporting structures. powerful Enterprise Content Management  The Value of Facebook: is not the and Analytic tools. People or Content rather it‟s the ability to analyze the content.
  • 5. Battlefield Airmen Operating System Intelligence Gathering • Even the most effective intelligence collection management processes in which humans set collection priorities will always be pitifully slow in their ability to react to network actions. • The USAF can harness the power of external social tools in parallel to an internal social space which allows the enterprise to reduce operational cost thru the leveraging of smart technology. • Summary: Internal velocity must equal external velocity …We need to develop tools and techniques to help our workforce negotiate better business deals; and ensure our workforce has the skills, training, education and experience to produce results for the Air Force and for the taxpayers. Michael B. Donley Secretary of the Air Force
  • 6. Battlefield Airmen Operating System Build an “App for that” Assessment and response to a cyber network requires a paradigm for viewing the battlespace. The BAOS is an accelerated framework designed for  rapid assembly of applications.  The weapon system must manipulate the data from the social network in many unique ways. This causes multiple intelligence gathering disciplines to be fussed together. Collapse Structures  Multi-Int / A framework designed to view pedigree apps in a Thematic, Temporal and Geospatial representation Strategic/Tactical Analysis Natural Disaster Preparedness Obvious /Non-Obvious Relationships
  • 7. Battlefield Airmen Operating System IBM‟s “SIE” application frame- work is: 1. A reduction in operational costs 2. Flexible with agnostic plug-in capabilities (current & legacy) Forms 3. Agile and highly adaptable to meet specific mission applications/needs 4. A scalable framework for the enterprise 5. Built on open standards, unprecedented computing power and advanced analytics
  • 8. Battlefield Airmen Operating System The IBM Collaborative Workspace is built on a social collaboration and discovery accelerator framework that is highly extensible to support customizable applications regardless if located on SIPR for US, BICES for NATO or NIPR for other alliances. The BAOS is: • Ready to ingest “AFKN” in order to make the existing networks and data bases more relevant and accessible to the enterprise •Ready to meet short term KM, collaboration and situational awareness •Designed to be the framework that enables extension of the enterprise into the cloud •A data and operating system agnostic framework ready to deploy on any platform (Including JSTARS) The BAOS will: •Protect sources and methods with hidden communities and file restricting the dissemination of sensitive information to the right people at the right time •Readily equipped with new and accurate data to support crucial decision making
  • 9. Battlefield Airmen Operating System Organizational Pedigree Rapidly assemble "an app for that" using embedded Portlet and Widget factories in order to respond to emerging threats or requirements. Rapidly build cyber weapon systems to provide the common operational environment through the rapid assembly of “apps” for command, control, combat support, combat service support, intelligence and business functions. The framework, can rest on any operating platform as a service providing an enterprise- wide Information Technology (IT) infrastructure, allowing consolidated Distributed Data Centers (DDCs) to serve as the repositories of all USAF data and integrate National Mission Forces and Theater Forces networks with appropriate controls. Tactics, Techniques,Procedures
  • 10. Battlefield Airmen Operating System Ingesting: Data Bases, Sensors, Feeds and Sources Anonymously Scraped Social Media Feeds Anonymously OSINT / PACINT Feeds Source Repositories & Databases
  • 11. Battlefield Airmen Operating System Work Flow and Processes Human (HITL) Process Highly efficient human Management realization Enterprise Social Sensor Spectrum Mash Up Organization Organic, related & Hub of easily extended grid of consumable A virtual (FOB) and data base and feeds Dynamic Work Space sensor where internal management collaboration exists Analytics Digital Authoring Orchestrated Document discovery for system production realization A Recursive Model
  • 12. Battlefield Airmen Operating System Doctrine governs the way in which the DoD conducts business. If the members of an enterprise are to use a system…then one would expect that system to be a framework that rests on that same doctrinal methodology. Collaboration: Effective joint operations require close coordination, cooperation, and information sharing among multiple organizations. The most common technique for promoting this collaboration is the identification or formation of centers, groups, bureaus, cells, offices, elements, boards, working groups, and planning teams and other enduring or temporary cross- functional staff organizations that manage specific processes and accomplish tasks in support of mission accomplishment.